@propulsionworks/cloudformation 0.1.16 → 0.1.17

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (27) hide show
  1. package/out/exports/resources.generated/aws-aiops-investigationgroup.d.ts +53 -13
  2. package/out/exports/resources.generated/aws-arczonalshift-zonalautoshiftconfiguration.d.ts +2 -0
  3. package/out/exports/resources.generated/aws-cassandra-table.d.ts +11 -4
  4. package/out/exports/resources.generated/aws-certificatemanager-certificate.d.ts +4 -0
  5. package/out/exports/resources.generated/aws-cloudformation-hookdefaultversion.d.ts +1 -1
  6. package/out/exports/resources.generated/aws-cloudformation-hooktypeconfig.d.ts +1 -1
  7. package/out/exports/resources.generated/aws-cloudformation-macro.d.ts +1 -0
  8. package/out/exports/resources.generated/aws-cloudformation-stack.d.ts +4 -4
  9. package/out/exports/resources.generated/aws-cloudformation-stackset.d.ts +37 -37
  10. package/out/exports/resources.generated/aws-cloudformation-waitcondition.d.ts +3 -2
  11. package/out/exports/resources.generated/aws-cloudformation-waitconditionhandle.d.ts +1 -1
  12. package/out/exports/resources.generated/aws-cloudfront-distribution.d.ts +3 -1
  13. package/out/exports/resources.generated/aws-datasync-locationefs.d.ts +1 -1
  14. package/out/exports/resources.generated/aws-ec2-customergateway.d.ts +1 -1
  15. package/out/exports/resources.generated/aws-ec2-vpnconnection.d.ts +2 -2
  16. package/out/exports/resources.generated/aws-ecs-taskdefinition.d.ts +0 -3
  17. package/out/exports/resources.generated/aws-fsx-filesystem.d.ts +25 -7
  18. package/out/exports/resources.generated/aws-glue-job.d.ts +1 -1
  19. package/out/exports/resources.generated/aws-kinesis-streamconsumer.d.ts +1 -1
  20. package/out/exports/resources.generated/aws-odb-cloudautonomousvmcluster.d.ts +19 -5
  21. package/out/exports/resources.generated/aws-odb-cloudexadatainfrastructure.d.ts +16 -4
  22. package/out/exports/resources.generated/aws-odb-cloudvmcluster.d.ts +28 -10
  23. package/out/exports/resources.generated/aws-odb-odbnetwork.d.ts +13 -3
  24. package/out/exports/resources.generated/aws-quicksight-custompermissions.d.ts +6 -0
  25. package/out/exports/resources.generated/aws-s3tables-table.d.ts +21 -9
  26. package/out/exports/resources.generated/aws-timestream-influxdbinstance.d.ts +1 -1
  27. package/package.json +1 -1
@@ -1,16 +1,44 @@
1
1
  import type { ResourceDefinitionWithAttributes, Tag } from "../main.ts";
2
2
  /**
3
- * Definition of AWS::AIOps::InvestigationGroup Resource Type
3
+ * Creates an *investigation group* in your account. Creating an investigation group is a one-time setup task for each Region in your account. It is a necessary task to be able to perform investigations.
4
+ *
5
+ * Settings in the investigation group help you centrally manage the common properties of your investigations, such as the following:
6
+ *
7
+ * - Who can access the investigations
8
+ * - Whether investigation data is encrypted with a customer managed AWS Key Management Service key.
9
+ * - How long investigations and their data are retained by default.
10
+ *
11
+ * Currently, you can have one investigation group in each Region in your account. Each investigation in a Region is a part of the investigation group in that Region
12
+ *
13
+ * To create an investigation group and set up Amazon Q Developer operational investigations, you must be signed in to an IAM principal that has the either the `AIOpsConsoleAdminPolicy` or the `AdministratorAccess` IAM policy attached, or to an account that has similar permissions.
14
+ *
15
+ * > You can optionally configure CloudWatch alarms to start investigations and add events to investigations. The examples section on this page demonstrates creating an investigation group and an alarm at the same time.
16
+ * >
17
+ * > For more information about configuring CloudWatch alarms to work with Amazon Q Developer operational investigations, see
4
18
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html}
5
19
  */
6
20
  export type AIOpsInvestigationGroup = ResourceDefinitionWithAttributes<"AWS::AIOps::InvestigationGroup", AIOpsInvestigationGroupProps, AIOpsInvestigationGroupAttribs>;
7
21
  /**
8
- * Definition of AWS::AIOps::InvestigationGroup Resource Type
22
+ * Creates an *investigation group* in your account. Creating an investigation group is a one-time setup task for each Region in your account. It is a necessary task to be able to perform investigations.
23
+ *
24
+ * Settings in the investigation group help you centrally manage the common properties of your investigations, such as the following:
25
+ *
26
+ * - Who can access the investigations
27
+ * - Whether investigation data is encrypted with a customer managed AWS Key Management Service key.
28
+ * - How long investigations and their data are retained by default.
29
+ *
30
+ * Currently, you can have one investigation group in each Region in your account. Each investigation in a Region is a part of the investigation group in that Region
31
+ *
32
+ * To create an investigation group and set up Amazon Q Developer operational investigations, you must be signed in to an IAM principal that has the either the `AIOpsConsoleAdminPolicy` or the `AdministratorAccess` IAM policy attached, or to an account that has similar permissions.
33
+ *
34
+ * > You can optionally configure CloudWatch alarms to start investigations and add events to investigations. The examples section on this page demonstrates creating an investigation group and an alarm at the same time.
35
+ * >
36
+ * > For more information about configuring CloudWatch alarms to work with Amazon Q Developer operational investigations, see
9
37
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html}
10
38
  */
11
39
  export type AIOpsInvestigationGroupProps = {
12
40
  /**
13
- * An array of key-value pairs of notification channels to apply to this resource.
41
+ * Use this property to integrate Amazon Q Developer operational investigations with Amazon Q in chat applications. This property is an array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more Amazon Q in chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see [Getting started with Amazon Q in chat applications](https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html) and [Resource type defined by AWS Chatbot](https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies) .
14
42
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-chatbotnotificationchannels}
15
43
  */
16
44
  ChatbotNotificationChannels?: ChatbotNotificationChannel[] | undefined;
@@ -20,6 +48,7 @@ export type AIOpsInvestigationGroupProps = {
20
48
  */
21
49
  CrossAccountConfigurations?: CrossAccountConfiguration[] | undefined;
22
50
  /**
51
+ * Use this property to specify a customer managed AWS KMS key to encrypt your investigation data. If you omit this property, Amazon Q Developer operational investigations will use an AWS key to encrypt the data. For more information, see [Encryption of investigation data](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-KMS) .
23
52
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-encryptionconfig}
24
53
  */
25
54
  EncryptionConfig?: EncryptionConfigMap | undefined;
@@ -29,31 +58,40 @@ export type AIOpsInvestigationGroupProps = {
29
58
  */
30
59
  InvestigationGroupPolicy?: string | undefined;
31
60
  /**
32
- * Flag to enable cloud trail history
61
+ * Specify `true` to enable Amazon Q Developer operational investigations to have access to change events that are recorded by CloudTrail . The default is `true` .
33
62
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-iscloudtraileventhistoryenabled}
34
63
  */
35
64
  IsCloudTrailEventHistoryEnabled?: boolean | undefined;
36
65
  /**
37
- * User friendly name for resources.
66
+ * A name for the investigation group.
38
67
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-name}
39
68
  */
40
69
  Name: string;
41
70
  /**
42
- * The number of days to retain the investigation group
71
+ * Specify how long that investigation data is kept. For more information, see [Operational investigation data retention](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Retention.html) .
72
+ *
73
+ * If you omit this parameter, the default of 90 days is used.
43
74
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-retentionindays}
44
75
  */
45
76
  RetentionInDays?: number | undefined;
46
77
  /**
47
- * The Investigation Role's ARN.
78
+ * Specify the ARN of the IAM role that Amazon Q Developer operational investigations will use when it gathers investigation data. The permissions in this role determine which of your resources that Amazon Q Developer operational investigations will have access to during investigations.
79
+ *
80
+ * For more information, see [How to control what data Amazon Q has access to during investigations](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data) .
48
81
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-rolearn}
49
82
  */
50
83
  RoleArn?: string | undefined;
51
84
  /**
85
+ * Enter the existing custom tag keys for custom applications in your system. Resource tags help Amazon Q narrow the search space when it is unable to discover definite relationships between resources. For example, to discover that an Amazon ECS service depends on an Amazon RDS database, Amazon Q can discover this relationship using data sources such as X-Ray and CloudWatch Application Signals. However, if you haven't deployed these features, Amazon Q will attempt to identify possible relationships. Tag boundaries can be used to narrow the resources that will be discovered by Amazon Q in these cases.
86
+ *
87
+ * You don't need to enter tags created by myApplications or AWS CloudFormation , because Amazon Q can automatically detect those tags.
52
88
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-tagkeyboundaries}
53
89
  */
54
90
  TagKeyBoundaries?: string[] | undefined;
55
91
  /**
56
- * An array of key-value pairs to apply to this resource.
92
+ * A list of key-value pairs to associate with the investigation group. You can associate as many as 50 tags with an investigation group.
93
+ *
94
+ * Tags can help you organize and categorize your resources.
57
95
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-tags}
58
96
  */
59
97
  Tags?: Tag[] | undefined;
@@ -63,32 +101,33 @@ export type AIOpsInvestigationGroupProps = {
63
101
  */
64
102
  export type AIOpsInvestigationGroupAttribs = {
65
103
  /**
66
- * The Investigation Group's ARN.
104
+ * The Amazon Resource Name (ARN) of the investigation group. For example, `arn:aws:aiops: *Region* : *account-id* :investigation-group: *investigation-group-id*`
67
105
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-arn}
68
106
  */
69
107
  Arn: string;
70
108
  /**
71
- * The timestamp value.
109
+ * The date and time that the investigation group was created.
72
110
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-createdat}
73
111
  */
74
112
  CreatedAt: string;
75
113
  /**
76
- * User friendly name for resources.
114
+ * The name of the user who created the investigation group.
77
115
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-createdby}
78
116
  */
79
117
  CreatedBy: string;
80
118
  /**
81
- * User friendly name for resources.
119
+ * The date and time that the investigation group was most recently modified.
82
120
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-lastmodifiedat}
83
121
  */
84
122
  LastModifiedAt: string;
85
123
  /**
86
- * User friendly name for resources.
124
+ * The name of the user who most recently modified the investigation group.
87
125
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-lastmodifiedby}
88
126
  */
89
127
  LastModifiedBy: string;
90
128
  };
91
129
  /**
130
+ * This structure is a string array. The first string is the ARN of a Amazon SNS topic. The array of strings display the ARNs of Amazon Q in chat applications configurations that are associated with that topic. For more information about these configuration ARNs, see [Getting started with Amazon Q in chat applications](https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html) and [Resource type defined by AWS Chatbot](https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies) .
92
131
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-aiops-investigationgroup-chatbotnotificationchannel.html}
93
132
  */
94
133
  export type ChatbotNotificationChannel = {
@@ -124,6 +163,7 @@ export type EncryptionConfigMap = {
124
163
  */
125
164
  EncryptionConfigurationType?: string | undefined;
126
165
  /**
166
+ * If the investigation group uses a customer managed key for encryption, this field displays the ID of that key.
127
167
  * @minLength 1
128
168
  * @maxLength 256
129
169
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-aiops-investigationgroup-encryptionconfigmap.html#cfn-aiops-investigationgroup-encryptionconfigmap-kmskeyid}
@@ -104,6 +104,8 @@ export type PracticeRunConfiguration = {
104
104
  * An array of one or more days and times that you can specify when ARC does not start practice runs for a resource. Days and times are in UTC.
105
105
  *
106
106
  * Specify blocked windows in the format `DAY:HH:MM-DAY:HH:MM` , separated by spaces. For example, `MON:18:30-MON:19:30 TUE:18:30-TUE:19:30` .
107
+ *
108
+ * > Blocked windows have to start and end on the same day. Windows that span multiple days aren't supported.
107
109
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-arczonalshift-zonalautoshiftconfiguration-practicerunconfiguration.html#cfn-arczonalshift-zonalautoshiftconfiguration-practicerunconfiguration-blockedwindows}
108
110
  */
109
111
  BlockedWindows?: string[] | undefined;
@@ -25,7 +25,7 @@ export type CassandraTableProps = {
25
25
  */
26
26
  BillingMode?: BillingMode | undefined;
27
27
  /**
28
- * Represents the CDC configuration for the table
28
+ * The settings for the CDC stream of a table. For more information about CDC streams, see [Working with change data capture (CDC) streams in Amazon Keyspaces](https://docs.aws.amazon.com/keyspaces/latest/devguide/cdc.html) in the *Amazon Keyspaces Developer Guide* .
29
29
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cassandra-table.html#cfn-cassandra-table-cdcspecification}
30
30
  */
31
31
  CdcSpecification?: CdcSpecification | undefined;
@@ -196,17 +196,24 @@ export type BillingMode = {
196
196
  ProvisionedThroughput?: ProvisionedThroughput | undefined;
197
197
  };
198
198
  /**
199
- * Represents the CDC configuration for the table
199
+ * The settings for the CDC stream of a table. For more information about CDC streams, see [Working with change data capture (CDC) streams in Amazon Keyspaces](https://docs.aws.amazon.com/keyspaces/latest/devguide/cdc.html) in the *Amazon Keyspaces Developer Guide* .
200
200
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cassandra-table-cdcspecification.html}
201
201
  */
202
202
  export type CdcSpecification = {
203
203
  /**
204
- * Indicates whether CDC is enabled or disabled for the table
204
+ * The status of the CDC stream. You can enable or disable a stream for a table.
205
205
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cassandra-table-cdcspecification.html#cfn-cassandra-table-cdcspecification-status}
206
206
  */
207
207
  Status: CdcStatus;
208
208
  /**
209
- * Specifies what data should be captured in the change data stream
209
+ * The view type specifies the changes Amazon Keyspaces records for each changed row in the stream. After you create the stream, you can't make changes to this selection.
210
+ *
211
+ * The options are:
212
+ *
213
+ * - `NEW_AND_OLD_IMAGES` - both versions of the row, before and after the change. This is the default.
214
+ * - `NEW_IMAGE` - the version of the row after the change.
215
+ * - `OLD_IMAGE` - the version of the row before the change.
216
+ * - `KEYS_ONLY` - the partition and clustering keys of the row that was changed.
210
217
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cassandra-table-cdcspecification.html#cfn-cassandra-table-cdcspecification-viewtype}
211
218
  */
212
219
  ViewType?: CdcViewType | undefined;
@@ -24,6 +24,10 @@ export type CertificateManagerCertificateProps = {
24
24
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-certificatemanager-certificate.html#cfn-certificatemanager-certificate-certificateauthorityarn}
25
25
  */
26
26
  CertificateAuthorityArn?: string | undefined;
27
+ /**
28
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-certificatemanager-certificate.html#cfn-certificatemanager-certificate-certificateexport}
29
+ */
30
+ CertificateExport?: string | undefined;
27
31
  /**
28
32
  * You can opt out of certificate transparency logging by specifying the `DISABLED` option. Opt in by specifying `ENABLED` .
29
33
  *
@@ -72,7 +72,7 @@ export type CloudFormationHookDefaultVersionProps = {
72
72
  */
73
73
  export type CloudFormationHookDefaultVersionAttribs = {
74
74
  /**
75
- * The Amazon Resource Number (ARN) of the activated Hook, in this account and Region.
75
+ * The Amazon Resource Number (ARN) of the activated Hook in this account and Region.
76
76
  * @pattern ^arn:aws[A-Za-z0-9-]{0,64}:cloudformation:[A-Za-z0-9-]{1,64}:([0-9]{12})?:type/hook/.+$
77
77
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-hookdefaultversion.html#cfn-cloudformation-hookdefaultversion-arn}
78
78
  */
@@ -86,7 +86,7 @@ export type CloudFormationHookTypeConfigProps = {
86
86
  */
87
87
  export type CloudFormationHookTypeConfigAttribs = {
88
88
  /**
89
- * The Amazon Resource Number (ARN) of the activated Hook type configuration, in this account and Region.
89
+ * The Amazon Resource Number (ARN) of the activated Hook type configuration in this account and Region.
90
90
  * @pattern ^arn:aws[A-Za-z0-9-]{0,64}:cloudformation:[A-Za-z0-9-]{1,64}:([0-9]{12})?:type(-configuration)?/hook/.+$
91
91
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-hooktypeconfig.html#cfn-cloudformation-hooktypeconfig-configurationarn}
92
92
  */
@@ -46,6 +46,7 @@ export type CloudFormationMacroProps = {
46
46
  */
47
47
  export type CloudFormationMacroAttribs = {
48
48
  /**
49
+ * Returns a unique identifier for the resource.
49
50
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-macro.html#cfn-cloudformation-macro-id}
50
51
  */
51
52
  Id: string;
@@ -2,7 +2,7 @@ import type { ResourceDefinitionWithAttributes, Tag } from "../main.ts";
2
2
  /**
3
3
  * The `AWS::CloudFormation::Stack` resource nests a stack as a resource in a top-level template. For more information, see [Nested stacks](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-nested-stacks.html) in the *AWS CloudFormation User Guide* .
4
4
  *
5
- * You can add output values from a nested stack within the containing template. You use the [GetAtt](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/intrinsic-function-reference-getatt.html) function with the nested stack's logical name and the name of the output value in the nested stack in the format `Outputs. *NestedStackOutputName*` .
5
+ * You can add output values from a nested stack within the containing template. You use the [GetAtt](https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/intrinsic-function-reference-getatt.html) function with the nested stack's logical name and the name of the output value in the nested stack in the format `Outputs. *NestedStackOutputName*` .
6
6
  *
7
7
  * We strongly recommend that updates to nested stacks are run from the parent stack.
8
8
  *
@@ -49,7 +49,7 @@ export type CloudFormationStack = ResourceDefinitionWithAttributes<"AWS::CloudFo
49
49
  /**
50
50
  * The `AWS::CloudFormation::Stack` resource nests a stack as a resource in a top-level template. For more information, see [Nested stacks](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-nested-stacks.html) in the *AWS CloudFormation User Guide* .
51
51
  *
52
- * You can add output values from a nested stack within the containing template. You use the [GetAtt](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/intrinsic-function-reference-getatt.html) function with the nested stack's logical name and the name of the output value in the nested stack in the format `Outputs. *NestedStackOutputName*` .
52
+ * You can add output values from a nested stack within the containing template. You use the [GetAtt](https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/intrinsic-function-reference-getatt.html) function with the nested stack's logical name and the name of the output value in the nested stack in the format `Outputs. *NestedStackOutputName*` .
53
53
  *
54
54
  * We strongly recommend that updates to nested stacks are run from the parent stack.
55
55
  *
@@ -179,12 +179,12 @@ export type CloudFormationStackProps = {
179
179
  */
180
180
  export type CloudFormationStackAttribs = {
181
181
  /**
182
- * Returns the unique ID of the change set.
182
+ * Returns the unique identifier of the change set.
183
183
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-stack.html#cfn-cloudformation-stack-changesetid}
184
184
  */
185
185
  ChangeSetId: string;
186
186
  /**
187
- * Returns The time at which the stack was created.
187
+ * Returns the time the stack was created.
188
188
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-stack.html#cfn-cloudformation-stack-creationtime}
189
189
  */
190
190
  CreationTime: string;
@@ -1,22 +1,22 @@
1
1
  import type { ResourceDefinitionWithAttributes, Tag } from "../main.ts";
2
2
  /**
3
- * The `AWS::CloudFormation::StackSet` resource enables you to provision stacks into AWS accounts and across Regions by using a single CloudFormation template. In the stack set, you specify the template to use, in addition to any parameters and capabilities that the template requires.
3
+ * The `AWS::CloudFormation::StackSet` resource contains information about a StackSet. With StackSets, you can provision stacks across AWS accounts and Regions from a single CloudFormation template. Each stack is based on the same CloudFormation template, but you can customize individual stacks using parameters.
4
4
  *
5
5
  * > Run deployments to nested StackSets from the parent stack, not directly through the StackSet API.
6
6
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-stackset.html}
7
7
  */
8
8
  export type CloudFormationStackSet = ResourceDefinitionWithAttributes<"AWS::CloudFormation::StackSet", CloudFormationStackSetProps, CloudFormationStackSetAttribs>;
9
9
  /**
10
- * The `AWS::CloudFormation::StackSet` resource enables you to provision stacks into AWS accounts and across Regions by using a single CloudFormation template. In the stack set, you specify the template to use, in addition to any parameters and capabilities that the template requires.
10
+ * The `AWS::CloudFormation::StackSet` resource contains information about a StackSet. With StackSets, you can provision stacks across AWS accounts and Regions from a single CloudFormation template. Each stack is based on the same CloudFormation template, but you can customize individual stacks using parameters.
11
11
  *
12
12
  * > Run deployments to nested StackSets from the parent stack, not directly through the StackSet API.
13
13
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-stackset.html}
14
14
  */
15
15
  export type CloudFormationStackSetProps = {
16
16
  /**
17
- * The Amazon Resource Number (ARN) of the IAM role to use to create this stack set. Specify an IAM role only if you are using customized administrator roles to control which users or groups can manage specific stack sets within the same administrator account.
17
+ * The Amazon Resource Number (ARN) of the IAM role to use to create this StackSet. Specify an IAM role only if you are using customized administrator roles to control which users or groups can manage specific StackSets within the same administrator account.
18
18
  *
19
- * Use customized administrator roles to control which users or groups can manage specific stack sets within the same administrator account. For more information, see [Grant self-managed permissions](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs-self-managed.html) in the *AWS CloudFormation User Guide* .
19
+ * Use customized administrator roles to control which users or groups can manage specific StackSets within the same administrator account. For more information, see [Grant self-managed permissions](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs-self-managed.html) in the *AWS CloudFormation User Guide* .
20
20
  *
21
21
  * Valid only if the permissions model is `SELF_MANAGED` .
22
22
  * @minLength 20
@@ -34,33 +34,33 @@ export type CloudFormationStackSetProps = {
34
34
  /**
35
35
  * Specifies whether you are acting as an account administrator in the organization's management account or as a delegated administrator in a member account.
36
36
  *
37
- * By default, `SELF` is specified. Use `SELF` for stack sets with self-managed permissions.
37
+ * By default, `SELF` is specified. Use `SELF` for StackSets with self-managed permissions.
38
38
  *
39
- * - To create a stack set with service-managed permissions while signed in to the management account, specify `SELF` .
40
- * - To create a stack set with service-managed permissions while signed in to a delegated administrator account, specify `DELEGATED_ADMIN` .
39
+ * - To create a StackSet with service-managed permissions while signed in to the management account, specify `SELF` .
40
+ * - To create a StackSet with service-managed permissions while signed in to a delegated administrator account, specify `DELEGATED_ADMIN` .
41
41
  *
42
42
  * Your AWS account must be registered as a delegated admin in the management account. For more information, see [Register a delegated administrator](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-delegated-admin.html) in the *AWS CloudFormation User Guide* .
43
43
  *
44
- * Stack sets with service-managed permissions are created in the management account, including stack sets that are created by delegated administrators.
44
+ * StackSets with service-managed permissions are created in the management account, including StackSets that are created by delegated administrators.
45
45
  *
46
46
  * Valid only if the permissions model is `SERVICE_MANAGED` .
47
47
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-stackset.html#cfn-cloudformation-stackset-callas}
48
48
  */
49
49
  CallAs?: "SELF" | "DELEGATED_ADMIN" | undefined;
50
50
  /**
51
- * The capabilities that are allowed in the stack set. Some stack set templates might include resources that can affect permissions in your AWS account —for example, by creating new IAM users. For more information, see [Acknowledging IAM resources in CloudFormation templates](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/control-access-with-iam.html#using-iam-capabilities) in the *AWS CloudFormation User Guide* .
51
+ * The capabilities that are allowed in the StackSet. Some StackSet templates might include resources that can affect permissions in your AWS account —for example, by creating new IAM users. For more information, see [Acknowledging IAM resources in CloudFormation templates](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/control-access-with-iam.html#using-iam-capabilities) in the *AWS CloudFormation User Guide* .
52
52
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-stackset.html#cfn-cloudformation-stackset-capabilities}
53
53
  */
54
54
  Capabilities?: Capability[] | undefined;
55
55
  /**
56
- * A description of the stack set.
56
+ * A description of the StackSet.
57
57
  * @minLength 1
58
58
  * @maxLength 1024
59
59
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-stackset.html#cfn-cloudformation-stackset-description}
60
60
  */
61
61
  Description?: string | undefined;
62
62
  /**
63
- * The name of the IAM execution role to use to create the stack set. If you don't specify an execution role, CloudFormation uses the `AWSCloudFormationStackSetExecutionRole` role for the stack set operation.
63
+ * The name of the IAM execution role to use to create the StackSet. If you don't specify an execution role, CloudFormation uses the `AWSCloudFormationStackSetExecutionRole` role for the StackSet operation.
64
64
  *
65
65
  * Valid only if the permissions model is `SELF_MANAGED` .
66
66
  *
@@ -77,7 +77,7 @@ export type CloudFormationStackSetProps = {
77
77
  *
78
78
  * > If there are already running or queued operations, StackSets queues all incoming operations even if they are non-conflicting.
79
79
  * >
80
- * > You can't modify your stack set's execution configuration while there are running or queued operations for that stack set.
80
+ * > You can't modify your StackSet's execution configuration while there are running or queued operations for that StackSet.
81
81
  *
82
82
  * When inactive (default), StackSets performs one operation at a time in request order.
83
83
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-stackset.html#cfn-cloudformation-stackset-managedexecution}
@@ -86,20 +86,20 @@ export type CloudFormationStackSetProps = {
86
86
  Active?: boolean | undefined;
87
87
  } | undefined;
88
88
  /**
89
- * The user-specified preferences for how CloudFormation performs a stack set operation.
89
+ * The user-specified preferences for how CloudFormation performs a StackSet operation.
90
90
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-stackset.html#cfn-cloudformation-stackset-operationpreferences}
91
91
  */
92
92
  OperationPreferences?: OperationPreferences | undefined;
93
93
  /**
94
- * The input parameters for the stack set template.
94
+ * The input parameters for the StackSet template.
95
95
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-stackset.html#cfn-cloudformation-stackset-parameters}
96
96
  */
97
97
  Parameters?: Parameter[] | undefined;
98
98
  /**
99
- * Describes how the IAM roles required for stack set operations are created.
99
+ * Describes how the IAM roles required for StackSet operations are created.
100
100
  *
101
101
  * - With `SELF_MANAGED` permissions, you must create the administrator and execution roles required to deploy to target accounts. For more information, see [Grant self-managed permissions](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs-self-managed.html) in the *AWS CloudFormation User Guide* .
102
- * - With `SERVICE_MANAGED` permissions, StackSets automatically creates the IAM roles required to deploy to accounts managed by AWS Organizations . For more information, see [Activate trusted access for stack sets with AWS Organizations](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-activate-trusted-access.html) in the *AWS CloudFormation User Guide* .
102
+ * - With `SERVICE_MANAGED` permissions, StackSets automatically creates the IAM roles required to deploy to accounts managed by AWS Organizations . For more information, see [Activate trusted access for StackSets with AWS Organizations](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-activate-trusted-access.html) in the *AWS CloudFormation User Guide* .
103
103
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-stackset.html#cfn-cloudformation-stackset-permissionmodel}
104
104
  */
105
105
  PermissionModel: "SERVICE_MANAGED" | "SELF_MANAGED";
@@ -109,7 +109,7 @@ export type CloudFormationStackSetProps = {
109
109
  */
110
110
  StackInstancesGroup?: StackInstances[] | undefined;
111
111
  /**
112
- * The name to associate with the stack set. The name must be unique in the Region where you create your stack set.
112
+ * The name to associate with the StackSet. The name must be unique in the Region where you create your StackSet.
113
113
  * @maxLength 128
114
114
  * @pattern ^[a-zA-Z][a-zA-Z0-9\-]{0,127}$
115
115
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-stackset.html#cfn-cloudformation-stackset-stacksetname}
@@ -142,9 +142,9 @@ export type CloudFormationStackSetProps = {
142
142
  TemplateURL: string;
143
143
  } | {
144
144
  /**
145
- * The Amazon Resource Number (ARN) of the IAM role to use to create this stack set. Specify an IAM role only if you are using customized administrator roles to control which users or groups can manage specific stack sets within the same administrator account.
145
+ * The Amazon Resource Number (ARN) of the IAM role to use to create this StackSet. Specify an IAM role only if you are using customized administrator roles to control which users or groups can manage specific StackSets within the same administrator account.
146
146
  *
147
- * Use customized administrator roles to control which users or groups can manage specific stack sets within the same administrator account. For more information, see [Grant self-managed permissions](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs-self-managed.html) in the *AWS CloudFormation User Guide* .
147
+ * Use customized administrator roles to control which users or groups can manage specific StackSets within the same administrator account. For more information, see [Grant self-managed permissions](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs-self-managed.html) in the *AWS CloudFormation User Guide* .
148
148
  *
149
149
  * Valid only if the permissions model is `SELF_MANAGED` .
150
150
  * @minLength 20
@@ -162,33 +162,33 @@ export type CloudFormationStackSetProps = {
162
162
  /**
163
163
  * Specifies whether you are acting as an account administrator in the organization's management account or as a delegated administrator in a member account.
164
164
  *
165
- * By default, `SELF` is specified. Use `SELF` for stack sets with self-managed permissions.
165
+ * By default, `SELF` is specified. Use `SELF` for StackSets with self-managed permissions.
166
166
  *
167
- * - To create a stack set with service-managed permissions while signed in to the management account, specify `SELF` .
168
- * - To create a stack set with service-managed permissions while signed in to a delegated administrator account, specify `DELEGATED_ADMIN` .
167
+ * - To create a StackSet with service-managed permissions while signed in to the management account, specify `SELF` .
168
+ * - To create a StackSet with service-managed permissions while signed in to a delegated administrator account, specify `DELEGATED_ADMIN` .
169
169
  *
170
170
  * Your AWS account must be registered as a delegated admin in the management account. For more information, see [Register a delegated administrator](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-delegated-admin.html) in the *AWS CloudFormation User Guide* .
171
171
  *
172
- * Stack sets with service-managed permissions are created in the management account, including stack sets that are created by delegated administrators.
172
+ * StackSets with service-managed permissions are created in the management account, including StackSets that are created by delegated administrators.
173
173
  *
174
174
  * Valid only if the permissions model is `SERVICE_MANAGED` .
175
175
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-stackset.html#cfn-cloudformation-stackset-callas}
176
176
  */
177
177
  CallAs?: "SELF" | "DELEGATED_ADMIN" | undefined;
178
178
  /**
179
- * The capabilities that are allowed in the stack set. Some stack set templates might include resources that can affect permissions in your AWS account —for example, by creating new IAM users. For more information, see [Acknowledging IAM resources in CloudFormation templates](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/control-access-with-iam.html#using-iam-capabilities) in the *AWS CloudFormation User Guide* .
179
+ * The capabilities that are allowed in the StackSet. Some StackSet templates might include resources that can affect permissions in your AWS account —for example, by creating new IAM users. For more information, see [Acknowledging IAM resources in CloudFormation templates](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/control-access-with-iam.html#using-iam-capabilities) in the *AWS CloudFormation User Guide* .
180
180
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-stackset.html#cfn-cloudformation-stackset-capabilities}
181
181
  */
182
182
  Capabilities?: Capability[] | undefined;
183
183
  /**
184
- * A description of the stack set.
184
+ * A description of the StackSet.
185
185
  * @minLength 1
186
186
  * @maxLength 1024
187
187
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-stackset.html#cfn-cloudformation-stackset-description}
188
188
  */
189
189
  Description?: string | undefined;
190
190
  /**
191
- * The name of the IAM execution role to use to create the stack set. If you don't specify an execution role, CloudFormation uses the `AWSCloudFormationStackSetExecutionRole` role for the stack set operation.
191
+ * The name of the IAM execution role to use to create the StackSet. If you don't specify an execution role, CloudFormation uses the `AWSCloudFormationStackSetExecutionRole` role for the StackSet operation.
192
192
  *
193
193
  * Valid only if the permissions model is `SELF_MANAGED` .
194
194
  *
@@ -205,7 +205,7 @@ export type CloudFormationStackSetProps = {
205
205
  *
206
206
  * > If there are already running or queued operations, StackSets queues all incoming operations even if they are non-conflicting.
207
207
  * >
208
- * > You can't modify your stack set's execution configuration while there are running or queued operations for that stack set.
208
+ * > You can't modify your StackSet's execution configuration while there are running or queued operations for that StackSet.
209
209
  *
210
210
  * When inactive (default), StackSets performs one operation at a time in request order.
211
211
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-stackset.html#cfn-cloudformation-stackset-managedexecution}
@@ -214,20 +214,20 @@ export type CloudFormationStackSetProps = {
214
214
  Active?: boolean | undefined;
215
215
  } | undefined;
216
216
  /**
217
- * The user-specified preferences for how CloudFormation performs a stack set operation.
217
+ * The user-specified preferences for how CloudFormation performs a StackSet operation.
218
218
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-stackset.html#cfn-cloudformation-stackset-operationpreferences}
219
219
  */
220
220
  OperationPreferences?: OperationPreferences | undefined;
221
221
  /**
222
- * The input parameters for the stack set template.
222
+ * The input parameters for the StackSet template.
223
223
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-stackset.html#cfn-cloudformation-stackset-parameters}
224
224
  */
225
225
  Parameters?: Parameter[] | undefined;
226
226
  /**
227
- * Describes how the IAM roles required for stack set operations are created.
227
+ * Describes how the IAM roles required for StackSet operations are created.
228
228
  *
229
229
  * - With `SELF_MANAGED` permissions, you must create the administrator and execution roles required to deploy to target accounts. For more information, see [Grant self-managed permissions](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs-self-managed.html) in the *AWS CloudFormation User Guide* .
230
- * - With `SERVICE_MANAGED` permissions, StackSets automatically creates the IAM roles required to deploy to accounts managed by AWS Organizations . For more information, see [Activate trusted access for stack sets with AWS Organizations](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-activate-trusted-access.html) in the *AWS CloudFormation User Guide* .
230
+ * - With `SERVICE_MANAGED` permissions, StackSets automatically creates the IAM roles required to deploy to accounts managed by AWS Organizations . For more information, see [Activate trusted access for StackSets with AWS Organizations](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-activate-trusted-access.html) in the *AWS CloudFormation User Guide* .
231
231
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-stackset.html#cfn-cloudformation-stackset-permissionmodel}
232
232
  */
233
233
  PermissionModel: "SERVICE_MANAGED" | "SELF_MANAGED";
@@ -237,7 +237,7 @@ export type CloudFormationStackSetProps = {
237
237
  */
238
238
  StackInstancesGroup?: StackInstances[] | undefined;
239
239
  /**
240
- * The name to associate with the stack set. The name must be unique in the Region where you create your stack set.
240
+ * The name to associate with the StackSet. The name must be unique in the Region where you create your StackSet.
241
241
  * @maxLength 128
242
242
  * @pattern ^[a-zA-Z][a-zA-Z0-9\-]{0,127}$
243
243
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-stackset.html#cfn-cloudformation-stackset-stacksetname}
@@ -274,7 +274,7 @@ export type CloudFormationStackSetProps = {
274
274
  */
275
275
  export type CloudFormationStackSetAttribs = {
276
276
  /**
277
- * The ID of the stack that you're creating.
277
+ * Returns the unique identifier of the resource.
278
278
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-stackset.html#cfn-cloudformation-stackset-stacksetid}
279
279
  */
280
280
  StackSetId: string;
@@ -305,7 +305,7 @@ export type Capability = "CAPABILITY_IAM" | "CAPABILITY_NAMED_IAM" | "CAPABILITY
305
305
  */
306
306
  export type ConcurrencyMode = "STRICT_FAILURE_TOLERANCE" | "SOFT_FAILURE_TOLERANCE";
307
307
  /**
308
- * The AWS OrganizationalUnitIds or Accounts for which to create stack instances in the specified Regions.
308
+ * The AWS `OrganizationalUnitIds` or `Accounts` for which to create stack instances in the specified Regions.
309
309
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudformation-stackset-deploymenttargets.html}
310
310
  */
311
311
  export type DeploymentTargets = {
@@ -344,7 +344,7 @@ export type DeploymentTargets = {
344
344
  OrganizationalUnitIds?: string[] | undefined;
345
345
  };
346
346
  /**
347
- * The user-specified preferences for how CloudFormation performs a stack set operation. For more information on maximum concurrent accounts and failure tolerance, see [Stack set operation options](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-concepts.html#stackset-ops-options) in the *AWS CloudFormation User Guide* .
347
+ * The user-specified preferences for how CloudFormation performs a StackSet operation. For more information on maximum concurrent accounts and failure tolerance, see [StackSet operation options](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-concepts.html#stackset-ops-options) in the *AWS CloudFormation User Guide* .
348
348
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudformation-stackset-operationpreferences.html}
349
349
  */
350
350
  export type OperationPreferences = {
@@ -354,7 +354,7 @@ export type OperationPreferences = {
354
354
  * - `STRICT_FAILURE_TOLERANCE` : This option dynamically lowers the concurrency level to ensure the number of failed accounts never exceeds the value of `FailureToleranceCount` +1. The initial actual concurrency is set to the lower of either the value of the `MaxConcurrentCount` , or the value of `FailureToleranceCount` +1. The actual concurrency is then reduced proportionally by the number of failures. This is the default behavior.
355
355
  *
356
356
  * If failure tolerance or Maximum concurrent accounts are set to percentages, the behavior is similar.
357
- * - `SOFT_FAILURE_TOLERANCE` : This option decouples `FailureToleranceCount` from the actual concurrency. This allows stack set operations to run at the concurrency level set by the `MaxConcurrentCount` value, or `MaxConcurrentPercentage` , regardless of the number of failures.
357
+ * - `SOFT_FAILURE_TOLERANCE` : This option decouples `FailureToleranceCount` from the actual concurrency. This allows StackSet operations to run at the concurrency level set by the `MaxConcurrentCount` value, or `MaxConcurrentPercentage` , regardless of the number of failures.
358
358
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudformation-stackset-operationpreferences.html#cfn-cloudformation-stackset-operationpreferences-concurrencymode}
359
359
  */
360
360
  ConcurrencyMode?: ConcurrencyMode | undefined;
@@ -443,7 +443,7 @@ export type StackInstances = {
443
443
  */
444
444
  DeploymentTargets: DeploymentTargets;
445
445
  /**
446
- * A list of stack set parameters whose values you want to override in the selected stack instances.
446
+ * A list of StackSet parameters whose values you want to override in the selected stack instances.
447
447
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudformation-stackset-stackinstances.html#cfn-cloudformation-stackset-stackinstances-parameteroverrides}
448
448
  */
449
449
  ParameterOverrides?: Parameter[] | undefined;
@@ -1,13 +1,13 @@
1
1
  import type { ResourceDefinitionWithAttributes } from "../main.ts";
2
2
  /**
3
- * The `AWS::CloudFormation::WaitCondition` resource provides a way to coordinate stack resource creation with configuration actions that are external to the stack creation or to track the status of a configuration process. In these situations, we recommend that you associate a `CreationPolicy` attribute with the wait condition instead of using a wait condition handle. For more information and an example, see [CreationPolicy attribute](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-attribute-creationpolicy.html) in the *AWS CloudFormation User Guide* . If you use a `CreationPolicy` with a wait condition, don't specify any of the wait condition's properties.
3
+ * The `AWS::CloudFormation::WaitCondition` resource provides a way to coordinate stack resource creation with configuration actions that are external to the stack creation or to track the status of a configuration process. In these situations, we recommend that you associate a `CreationPolicy` attribute with the wait condition instead of using a wait condition handle. For more information and an example, see [CreationPolicy attribute](https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-attribute-creationpolicy.html) in the *AWS CloudFormation User Guide* . If you use a `CreationPolicy` with a wait condition, don't specify any of the wait condition's properties.
4
4
  *
5
5
  * > If you use AWS PrivateLink , resources in the VPC that respond to wait conditions must have access to CloudFormation , specific Amazon S3 buckets. Resources must send wait condition responses to a presigned Amazon S3 URL. If they can't send responses to Amazon S3 , CloudFormation won't receive a response and the stack operation fails. For more information, see [Access CloudFormation using an interface endpoint ( AWS PrivateLink )](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/vpc-interface-endpoints.html) in the *AWS CloudFormation User Guide* . > For Amazon EC2 and Auto Scaling resources, we recommend that you use a `CreationPolicy` attribute instead of wait conditions. Add a `CreationPolicy` attribute to those resources, and use the `cfn-signal` helper script to signal when an instance creation process has completed successfully.
6
6
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-waitcondition.html}
7
7
  */
8
8
  export type CloudFormationWaitCondition = ResourceDefinitionWithAttributes<"AWS::CloudFormation::WaitCondition", CloudFormationWaitConditionProps, CloudFormationWaitConditionAttribs>;
9
9
  /**
10
- * The `AWS::CloudFormation::WaitCondition` resource provides a way to coordinate stack resource creation with configuration actions that are external to the stack creation or to track the status of a configuration process. In these situations, we recommend that you associate a `CreationPolicy` attribute with the wait condition instead of using a wait condition handle. For more information and an example, see [CreationPolicy attribute](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-attribute-creationpolicy.html) in the *AWS CloudFormation User Guide* . If you use a `CreationPolicy` with a wait condition, don't specify any of the wait condition's properties.
10
+ * The `AWS::CloudFormation::WaitCondition` resource provides a way to coordinate stack resource creation with configuration actions that are external to the stack creation or to track the status of a configuration process. In these situations, we recommend that you associate a `CreationPolicy` attribute with the wait condition instead of using a wait condition handle. For more information and an example, see [CreationPolicy attribute](https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-attribute-creationpolicy.html) in the *AWS CloudFormation User Guide* . If you use a `CreationPolicy` with a wait condition, don't specify any of the wait condition's properties.
11
11
  *
12
12
  * > If you use AWS PrivateLink , resources in the VPC that respond to wait conditions must have access to CloudFormation , specific Amazon S3 buckets. Resources must send wait condition responses to a presigned Amazon S3 URL. If they can't send responses to Amazon S3 , CloudFormation won't receive a response and the stack operation fails. For more information, see [Access CloudFormation using an interface endpoint ( AWS PrivateLink )](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/vpc-interface-endpoints.html) in the *AWS CloudFormation User Guide* . > For Amazon EC2 and Auto Scaling resources, we recommend that you use a `CreationPolicy` attribute instead of wait conditions. Add a `CreationPolicy` attribute to those resources, and use the `cfn-signal` helper script to signal when an instance creation process has completed successfully.
13
13
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-waitcondition.html}
@@ -42,6 +42,7 @@ export type CloudFormationWaitConditionProps = {
42
42
  */
43
43
  export type CloudFormationWaitConditionAttribs = {
44
44
  /**
45
+ * Returns a unique identifier for the resource.
45
46
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-waitcondition.html#cfn-cloudformation-waitcondition-id}
46
47
  */
47
48
  Id: string;
@@ -26,7 +26,7 @@ export type CloudFormationWaitConditionHandleProps = Record<string, never>;
26
26
  */
27
27
  export type CloudFormationWaitConditionHandleAttribs = {
28
28
  /**
29
- * A unique identifier for the resource.
29
+ * Returns a unique identifier for the resource.
30
30
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-waitconditionhandle.html#cfn-cloudformation-waitconditionhandle-id}
31
31
  */
32
32
  Id: string;
@@ -572,7 +572,7 @@ export type DistributionConfig = {
572
572
  */
573
573
  Comment?: string | undefined;
574
574
  /**
575
- * The connection mode to filter distributions by.
575
+ * This field specifies whether the connection mode is through a standard distribution (direct) or a multi-tenant distribution with distribution tenants(tenant-only).
576
576
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudfront-distribution-distributionconfig.html#cfn-cloudfront-distribution-distributionconfig-connectionmode}
577
577
  */
578
578
  ConnectionMode?: ConnectionMode | undefined;
@@ -723,6 +723,8 @@ export type DistributionConfig = {
723
723
  */
724
724
  ViewerCertificate?: ViewerCertificate | undefined;
725
725
  /**
726
+ * > Multi-tenant distributions only support AWS WAF V2 web ACLs.
727
+ *
726
728
  * A unique identifier that specifies the AWS WAF web ACL, if any, to associate with this distribution. To specify a web ACL created using the latest version of AWS WAF , use the ACL ARN, for example `arn:aws:wafv2:us-east-1:123456789012:global/webacl/ExampleWebACL/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111` . To specify a web ACL created using AWS WAF Classic, use the ACL ID, for example `a1b2c3d4-5678-90ab-cdef-EXAMPLE11111` .
727
729
  *
728
730
  * AWS WAF is a web application firewall that lets you monitor the HTTP and HTTPS requests that are forwarded to CloudFront, and lets you control access to your content. Based on conditions that you specify, such as the IP addresses that requests originate from or the values of query strings, CloudFront responds to requests either with the requested content or with an HTTP 403 status code (Forbidden). You can also configure CloudFront to return a custom error page when a request is blocked. For more information about AWS WAF , see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/what-is-aws-waf.html) .