@propulsionworks/cloudformation 0.1.35 → 0.1.36

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (288) hide show
  1. package/out/exports/resources.generated/alexa-ask-skill.d.ts +1 -1
  2. package/out/exports/resources.generated/aws-aiops-investigationgroup.d.ts +4 -4
  3. package/out/exports/resources.generated/aws-amazonmq-broker.d.ts +2 -2
  4. package/out/exports/resources.generated/aws-amplify-branch.d.ts +2 -2
  5. package/out/exports/resources.generated/aws-apigateway-apikey.d.ts +1 -1
  6. package/out/exports/resources.generated/aws-apigateway-domainname.d.ts +6 -1
  7. package/out/exports/resources.generated/aws-apigateway-domainnamev2.d.ts +6 -1
  8. package/out/exports/resources.generated/aws-apigateway-method.d.ts +11 -0
  9. package/out/exports/resources.generated/aws-apigateway-model.d.ts +1 -1
  10. package/out/exports/resources.generated/aws-apigateway-restapi.d.ts +10 -0
  11. package/out/exports/resources.generated/aws-appconfig-configurationprofile.d.ts +1 -1
  12. package/out/exports/resources.generated/aws-appflow-connectorprofile.d.ts +2 -2
  13. package/out/exports/resources.generated/aws-appflow-flow.d.ts +2 -2
  14. package/out/exports/resources.generated/aws-apprunner-observabilityconfiguration.d.ts +1 -1
  15. package/out/exports/resources.generated/aws-apprunner-service.d.ts +1 -1
  16. package/out/exports/resources.generated/aws-apprunner-vpcconnector.d.ts +1 -1
  17. package/out/exports/resources.generated/aws-appsync-functionconfiguration.d.ts +2 -2
  18. package/out/exports/resources.generated/aws-aps-resourcepolicy.d.ts +2 -2
  19. package/out/exports/resources.generated/aws-aps-workspace.d.ts +1 -1
  20. package/out/exports/resources.generated/aws-athena-workgroup.d.ts +149 -0
  21. package/out/exports/resources.generated/aws-backup-backupplan.d.ts +6 -2
  22. package/out/exports/resources.generated/aws-backup-backupselection.d.ts +2 -2
  23. package/out/exports/resources.generated/aws-backup-backupvault.d.ts +2 -2
  24. package/out/exports/resources.generated/aws-backup-framework.d.ts +2 -2
  25. package/out/exports/resources.generated/aws-backup-logicallyairgappedbackupvault.d.ts +5 -5
  26. package/out/exports/resources.generated/aws-backup-reportplan.d.ts +2 -2
  27. package/out/exports/resources.generated/aws-batch-computeenvironment.d.ts +1 -1
  28. package/out/exports/resources.generated/aws-bedrock-agent.d.ts +1 -1
  29. package/out/exports/resources.generated/aws-bedrock-blueprint.d.ts +1 -1
  30. package/out/exports/resources.generated/aws-bedrock-dataautomationproject.d.ts +36 -2
  31. package/out/exports/resources.generated/aws-bedrock-datasource.d.ts +1 -1
  32. package/out/exports/resources.generated/aws-bedrock-guardrail.d.ts +1 -1
  33. package/out/exports/resources.generated/aws-bedrock-knowledgebase.d.ts +108 -3
  34. package/out/exports/resources.generated/aws-billingconductor-billinggroup.d.ts +3 -101
  35. package/out/exports/resources.generated/aws-billingconductor-customlineitem.d.ts +1 -1
  36. package/out/exports/resources.generated/aws-cassandra-table.d.ts +20 -0
  37. package/out/exports/resources.generated/aws-ce-anomalymonitor.d.ts +10 -2
  38. package/out/exports/resources.generated/aws-chatbot-microsoftteamschannelconfiguration.d.ts +2 -2
  39. package/out/exports/resources.generated/aws-chatbot-slackchannelconfiguration.d.ts +2 -2
  40. package/out/exports/resources.generated/aws-cloudformation-customresource.d.ts +5 -5
  41. package/out/exports/resources.generated/aws-cloudformation-guardhook.d.ts +3 -3
  42. package/out/exports/resources.generated/aws-cloudformation-hookdefaultversion.d.ts +2 -2
  43. package/out/exports/resources.generated/aws-cloudformation-hooktypeconfig.d.ts +2 -2
  44. package/out/exports/resources.generated/aws-cloudformation-hookversion.d.ts +3 -3
  45. package/out/exports/resources.generated/aws-cloudformation-lambdahook.d.ts +3 -3
  46. package/out/exports/resources.generated/aws-cloudformation-macro.d.ts +2 -2
  47. package/out/exports/resources.generated/aws-cloudformation-moduledefaultversion.d.ts +4 -4
  48. package/out/exports/resources.generated/aws-cloudformation-moduleversion.d.ts +3 -3
  49. package/out/exports/resources.generated/aws-cloudformation-publictypeversion.d.ts +4 -4
  50. package/out/exports/resources.generated/aws-cloudformation-publisher.d.ts +2 -2
  51. package/out/exports/resources.generated/aws-cloudformation-resourcedefaultversion.d.ts +2 -2
  52. package/out/exports/resources.generated/aws-cloudformation-resourceversion.d.ts +3 -3
  53. package/out/exports/resources.generated/aws-cloudformation-stack.d.ts +4 -4
  54. package/out/exports/resources.generated/aws-cloudformation-stackset.d.ts +19 -14
  55. package/out/exports/resources.generated/aws-cloudformation-typeactivation.d.ts +2 -2
  56. package/out/exports/resources.generated/aws-cloudformation-waitcondition.d.ts +4 -4
  57. package/out/exports/resources.generated/aws-cloudformation-waitconditionhandle.d.ts +2 -2
  58. package/out/exports/resources.generated/aws-cloudfront-connectionfunction.d.ts +95 -0
  59. package/out/exports/resources.generated/aws-cloudtrail-eventdatastore.d.ts +3 -3
  60. package/out/exports/resources.generated/aws-cloudtrail-trail.d.ts +41 -5
  61. package/out/exports/resources.generated/aws-cloudwatch-alarm.d.ts +1 -1
  62. package/out/exports/resources.generated/aws-codebuild-sourcecredential.d.ts +2 -2
  63. package/out/exports/resources.generated/aws-codecommit-repository.d.ts +1 -1
  64. package/out/exports/resources.generated/aws-codeconnections-connection.d.ts +2 -2
  65. package/out/exports/resources.generated/aws-codedeploy-application.d.ts +1 -1
  66. package/out/exports/resources.generated/aws-codedeploy-deploymentconfig.d.ts +1 -1
  67. package/out/exports/resources.generated/aws-codedeploy-deploymentgroup.d.ts +15 -15
  68. package/out/exports/resources.generated/aws-codepipeline-pipeline.d.ts +1 -1
  69. package/out/exports/resources.generated/aws-codestar-githubrepository.d.ts +4 -4
  70. package/out/exports/resources.generated/aws-codestarconnections-connection.d.ts +2 -2
  71. package/out/exports/resources.generated/aws-codestarnotifications-notificationrule.d.ts +2 -2
  72. package/out/exports/resources.generated/aws-cognito-identitypool.d.ts +2 -2
  73. package/out/exports/resources.generated/aws-cognito-terms.d.ts +54 -0
  74. package/out/exports/resources.generated/aws-comprehend-documentclassifier.d.ts +1 -1
  75. package/out/exports/resources.generated/aws-comprehend-flywheel.d.ts +3 -3
  76. package/out/exports/resources.generated/aws-config-configrule.d.ts +1 -1
  77. package/out/exports/resources.generated/aws-config-configurationrecorder.d.ts +2 -2
  78. package/out/exports/resources.generated/aws-config-deliverychannel.d.ts +8 -8
  79. package/out/exports/resources.generated/aws-connect-evaluationform.d.ts +3 -3
  80. package/out/exports/resources.generated/aws-customerprofiles-domain.d.ts +16 -0
  81. package/out/exports/resources.generated/aws-databrew-job.d.ts +1 -1
  82. package/out/exports/resources.generated/aws-directoryservice-microsoftad.d.ts +6 -6
  83. package/out/exports/resources.generated/aws-directoryservice-simplead.d.ts +6 -6
  84. package/out/exports/resources.generated/aws-dms-dataprovider.d.ts +1 -1
  85. package/out/exports/resources.generated/aws-dms-endpoint.d.ts +4 -4
  86. package/out/exports/resources.generated/aws-dms-eventsubscription.d.ts +1 -1
  87. package/out/exports/resources.generated/aws-dms-instanceprofile.d.ts +1 -1
  88. package/out/exports/resources.generated/aws-dms-replicationconfig.d.ts +2 -2
  89. package/out/exports/resources.generated/aws-dms-replicationinstance.d.ts +2 -2
  90. package/out/exports/resources.generated/aws-dms-replicationsubnetgroup.d.ts +1 -1
  91. package/out/exports/resources.generated/aws-docdb-dbcluster.d.ts +3 -3
  92. package/out/exports/resources.generated/aws-dsql-cluster.d.ts +6 -1
  93. package/out/exports/resources.generated/aws-dynamodb-globaltable.d.ts +3 -3
  94. package/out/exports/resources.generated/aws-dynamodb-table.d.ts +3 -3
  95. package/out/exports/resources.generated/aws-ec2-ec2fleet.d.ts +8 -0
  96. package/out/exports/resources.generated/aws-ec2-instanceconnectendpoint.d.ts +2 -2
  97. package/out/exports/resources.generated/aws-ec2-keypair.d.ts +4 -4
  98. package/out/exports/resources.generated/aws-ec2-launchtemplate.d.ts +10 -2
  99. package/out/exports/resources.generated/aws-ec2-natgateway.d.ts +37 -0
  100. package/out/exports/resources.generated/aws-ec2-securitygroup.d.ts +2 -2
  101. package/out/exports/resources.generated/aws-ec2-spotfleet.d.ts +8 -0
  102. package/out/exports/resources.generated/aws-ec2-transitgateway.d.ts +6 -0
  103. package/out/exports/resources.generated/aws-ec2-transitgatewaymeteringpolicy.d.ts +45 -0
  104. package/out/exports/resources.generated/aws-ec2-transitgatewaymeteringpolicyentry.d.ts +94 -0
  105. package/out/exports/resources.generated/aws-ec2-vpcencryptioncontrol.d.ts +150 -0
  106. package/out/exports/resources.generated/aws-ec2-vpcendpoint.d.ts +10 -0
  107. package/out/exports/resources.generated/aws-ec2-vpnconcentrator.d.ts +43 -0
  108. package/out/exports/resources.generated/aws-ec2-vpnconnection.d.ts +21 -0
  109. package/out/exports/resources.generated/aws-ecr-pulltimeupdateexclusion.d.ts +15 -0
  110. package/out/exports/resources.generated/aws-ecr-repository.d.ts +4 -4
  111. package/out/exports/resources.generated/aws-ecr-repositorycreationtemplate.d.ts +4 -4
  112. package/out/exports/resources.generated/aws-ecr-signingconfiguration.d.ts +63 -0
  113. package/out/exports/resources.generated/aws-ecs-capacityprovider.d.ts +12 -0
  114. package/out/exports/resources.generated/aws-ecs-expressgatewayservice.d.ts +207 -0
  115. package/out/exports/resources.generated/aws-ecs-service.d.ts +18 -18
  116. package/out/exports/resources.generated/aws-ecs-taskdefinition.d.ts +1 -1
  117. package/out/exports/resources.generated/aws-eks-cluster.d.ts +21 -6
  118. package/out/exports/resources.generated/aws-eks-nodegroup.d.ts +3 -3
  119. package/out/exports/resources.generated/aws-elasticache-cachecluster.d.ts +1 -1
  120. package/out/exports/resources.generated/aws-elasticloadbalancingv2-targetgroup.d.ts +5 -0
  121. package/out/exports/resources.generated/aws-elasticsearch-domain.d.ts +1 -1
  122. package/out/exports/resources.generated/aws-emr-studio.d.ts +1 -1
  123. package/out/exports/resources.generated/aws-entityresolution-idmappingworkflow.d.ts +1 -1
  124. package/out/exports/resources.generated/aws-events-archive.d.ts +1 -1
  125. package/out/exports/resources.generated/aws-events-connection.d.ts +1 -1
  126. package/out/exports/resources.generated/aws-events-eventbus.d.ts +1 -1
  127. package/out/exports/resources.generated/aws-events-rule.d.ts +1 -1
  128. package/out/exports/resources.generated/aws-evidently-experiment.d.ts +6 -6
  129. package/out/exports/resources.generated/aws-evidently-launch.d.ts +2 -2
  130. package/out/exports/resources.generated/aws-fms-notificationchannel.d.ts +1 -1
  131. package/out/exports/resources.generated/aws-fsx-filesystem.d.ts +7 -3
  132. package/out/exports/resources.generated/aws-fsx-storagevirtualmachine.d.ts +4 -0
  133. package/out/exports/resources.generated/aws-gamelift-fleet.d.ts +3 -3
  134. package/out/exports/resources.generated/aws-glue-datacatalogencryptionsettings.d.ts +5 -5
  135. package/out/exports/resources.generated/aws-glue-integration.d.ts +119 -0
  136. package/out/exports/resources.generated/aws-glue-integrationresourceproperty.d.ts +3 -3
  137. package/out/exports/resources.generated/aws-greengrass-connectordefinition.d.ts +3 -3
  138. package/out/exports/resources.generated/aws-greengrass-connectordefinitionversion.d.ts +1 -1
  139. package/out/exports/resources.generated/aws-greengrass-coredefinition.d.ts +3 -3
  140. package/out/exports/resources.generated/aws-greengrass-coredefinitionversion.d.ts +1 -1
  141. package/out/exports/resources.generated/aws-greengrass-devicedefinition.d.ts +3 -3
  142. package/out/exports/resources.generated/aws-greengrass-devicedefinitionversion.d.ts +1 -1
  143. package/out/exports/resources.generated/aws-greengrass-functiondefinition.d.ts +9 -9
  144. package/out/exports/resources.generated/aws-greengrass-functiondefinitionversion.d.ts +7 -7
  145. package/out/exports/resources.generated/aws-greengrass-group.d.ts +6 -6
  146. package/out/exports/resources.generated/aws-greengrass-loggerdefinition.d.ts +3 -3
  147. package/out/exports/resources.generated/aws-greengrass-loggerdefinitionversion.d.ts +1 -1
  148. package/out/exports/resources.generated/aws-greengrass-resourcedefinition.d.ts +14 -14
  149. package/out/exports/resources.generated/aws-greengrass-resourcedefinitionversion.d.ts +11 -11
  150. package/out/exports/resources.generated/aws-greengrass-subscriptiondefinition.d.ts +3 -3
  151. package/out/exports/resources.generated/aws-greengrass-subscriptiondefinitionversion.d.ts +1 -1
  152. package/out/exports/resources.generated/aws-greengrassv2-componentversion.d.ts +1 -1
  153. package/out/exports/resources.generated/aws-greengrassv2-deployment.d.ts +1 -1
  154. package/out/exports/resources.generated/aws-iam-group.d.ts +2 -2
  155. package/out/exports/resources.generated/aws-iam-grouppolicy.d.ts +1 -1
  156. package/out/exports/resources.generated/aws-iam-managedpolicy.d.ts +3 -3
  157. package/out/exports/resources.generated/aws-iam-policy.d.ts +2 -2
  158. package/out/exports/resources.generated/aws-iam-role.d.ts +3 -3
  159. package/out/exports/resources.generated/aws-iam-rolepolicy.d.ts +1 -1
  160. package/out/exports/resources.generated/aws-iam-samlprovider.d.ts +4 -4
  161. package/out/exports/resources.generated/aws-iam-user.d.ts +5 -5
  162. package/out/exports/resources.generated/aws-iam-userpolicy.d.ts +1 -1
  163. package/out/exports/resources.generated/aws-imagebuilder-containerrecipe.d.ts +7 -1
  164. package/out/exports/resources.generated/aws-imagebuilder-image.d.ts +0 -66
  165. package/out/exports/resources.generated/aws-imagebuilder-imagerecipe.d.ts +1 -1
  166. package/out/exports/resources.generated/aws-iot-encryptionconfiguration.d.ts +1 -1
  167. package/out/exports/resources.generated/aws-iot-logging.d.ts +2 -2
  168. package/out/exports/resources.generated/aws-iotevents-detectormodel.d.ts +8 -8
  169. package/out/exports/resources.generated/aws-kendra-datasource.d.ts +1 -1
  170. package/out/exports/resources.generated/aws-kinesisvideo-stream.d.ts +18 -1
  171. package/out/exports/resources.generated/aws-kms-alias.d.ts +6 -6
  172. package/out/exports/resources.generated/aws-kms-key.d.ts +32 -32
  173. package/out/exports/resources.generated/aws-kms-replicakey.d.ts +15 -15
  174. package/out/exports/resources.generated/aws-lakeformation-datalakesettings.d.ts +4 -0
  175. package/out/exports/resources.generated/aws-lambda-codesigningconfig.d.ts +1 -1
  176. package/out/exports/resources.generated/aws-lambda-eventsourcemapping.d.ts +10 -8
  177. package/out/exports/resources.generated/aws-lambda-function.d.ts +25 -9
  178. package/out/exports/resources.generated/aws-lex-bot.d.ts +3 -3
  179. package/out/exports/resources.generated/aws-lex-botalias.d.ts +2 -2
  180. package/out/exports/resources.generated/aws-lex-botversion.d.ts +2 -2
  181. package/out/exports/resources.generated/aws-lex-resourcepolicy.d.ts +2 -2
  182. package/out/exports/resources.generated/aws-licensemanager-grant.d.ts +2 -2
  183. package/out/exports/resources.generated/aws-licensemanager-license.d.ts +2 -2
  184. package/out/exports/resources.generated/aws-lightsail-container.d.ts +2 -2
  185. package/out/exports/resources.generated/aws-logs-integration.d.ts +1 -1
  186. package/out/exports/resources.generated/aws-logs-loganomalydetector.d.ts +2 -2
  187. package/out/exports/resources.generated/aws-logs-loggroup.d.ts +3 -3
  188. package/out/exports/resources.generated/aws-logs-transformer.d.ts +1 -1
  189. package/out/exports/resources.generated/aws-lookoutequipment-inferencescheduler.d.ts +3 -3
  190. package/out/exports/resources.generated/aws-macie-allowlist.d.ts +2 -2
  191. package/out/exports/resources.generated/aws-mediaconnect-flow.d.ts +3 -2
  192. package/out/exports/resources.generated/aws-mediaconnect-flowentitlement.d.ts +2 -2
  193. package/out/exports/resources.generated/aws-mediaconnect-flowoutput.d.ts +2 -2
  194. package/out/exports/resources.generated/aws-mediaconnect-flowsource.d.ts +1 -1
  195. package/out/exports/resources.generated/aws-mediaconnect-routerinput.d.ts +20 -2
  196. package/out/exports/resources.generated/aws-mediaconnect-routernetworkinterface.d.ts +4 -1
  197. package/out/exports/resources.generated/aws-mediaconnect-routeroutput.d.ts +22 -3
  198. package/out/exports/resources.generated/aws-mediaconvert-jobtemplate.d.ts +2 -2
  199. package/out/exports/resources.generated/aws-mediaconvert-preset.d.ts +2 -2
  200. package/out/exports/resources.generated/aws-mediaconvert-queue.d.ts +1 -1
  201. package/out/exports/resources.generated/aws-mediapackagev2-originendpointpolicy.d.ts +1 -1
  202. package/out/exports/resources.generated/aws-mediastore-container.d.ts +2 -2
  203. package/out/exports/resources.generated/aws-msk-cluster.d.ts +18 -5
  204. package/out/exports/resources.generated/aws-msk-configuration.d.ts +1 -1
  205. package/out/exports/resources.generated/aws-neptune-dbcluster.d.ts +2 -2
  206. package/out/exports/resources.generated/aws-neptune-dbinstance.d.ts +12 -12
  207. package/out/exports/resources.generated/aws-neptune-dbparametergroup.d.ts +1 -1
  208. package/out/exports/resources.generated/aws-networkfirewall-tlsinspectionconfiguration.d.ts +1 -1
  209. package/out/exports/resources.generated/aws-notifications-eventrule.d.ts +1 -1
  210. package/out/exports/resources.generated/aws-oam-link.d.ts +1 -1
  211. package/out/exports/resources.generated/aws-opensearchservice-domain.d.ts +27 -2
  212. package/out/exports/resources.generated/aws-opsworks-stack.d.ts +4 -4
  213. package/out/exports/resources.generated/aws-opsworkscm-server.d.ts +3 -3
  214. package/out/exports/resources.generated/aws-organizations-account.d.ts +10 -10
  215. package/out/exports/resources.generated/aws-organizations-organizationalunit.d.ts +2 -2
  216. package/out/exports/resources.generated/aws-pcs-cluster.d.ts +40 -0
  217. package/out/exports/resources.generated/aws-pipes-pipe.d.ts +1 -1
  218. package/out/exports/resources.generated/aws-qbusiness-application.d.ts +3 -3
  219. package/out/exports/resources.generated/aws-qbusiness-datasource.d.ts +1 -1
  220. package/out/exports/resources.generated/aws-qbusiness-webexperience.d.ts +1 -1
  221. package/out/exports/resources.generated/aws-qldb-ledger.d.ts +2 -2
  222. package/out/exports/resources.generated/aws-rbin-rule.d.ts +1 -1
  223. package/out/exports/resources.generated/aws-refactorspaces-application.d.ts +4 -4
  224. package/out/exports/resources.generated/aws-refactorspaces-route.d.ts +9 -9
  225. package/out/exports/resources.generated/aws-resiliencehub-app.d.ts +1 -1
  226. package/out/exports/resources.generated/aws-route53-keysigningkey.d.ts +1 -1
  227. package/out/exports/resources.generated/aws-route53-recordset.d.ts +4 -4
  228. package/out/exports/resources.generated/aws-route53-recordsetgroup.d.ts +4 -4
  229. package/out/exports/resources.generated/aws-rum-appmonitor.d.ts +3 -65
  230. package/out/exports/resources.generated/aws-s3-bucket.d.ts +25 -7
  231. package/out/exports/resources.generated/aws-s3-storagelens.d.ts +1 -1
  232. package/out/exports/resources.generated/aws-s3tables-tablebucket.d.ts +17 -0
  233. package/out/exports/resources.generated/aws-sagemaker-cluster.d.ts +57 -0
  234. package/out/exports/resources.generated/aws-sagemaker-dataqualityjobdefinition.d.ts +1 -1
  235. package/out/exports/resources.generated/aws-sagemaker-domain.d.ts +1 -1
  236. package/out/exports/resources.generated/aws-sagemaker-modelbiasjobdefinition.d.ts +1 -1
  237. package/out/exports/resources.generated/aws-sagemaker-modelexplainabilityjobdefinition.d.ts +1 -1
  238. package/out/exports/resources.generated/aws-sagemaker-modelqualityjobdefinition.d.ts +1 -1
  239. package/out/exports/resources.generated/aws-sagemaker-monitoringschedule.d.ts +1 -1
  240. package/out/exports/resources.generated/aws-sagemaker-partnerapp.d.ts +17 -0
  241. package/out/exports/resources.generated/aws-sagemaker-space.d.ts +1 -1
  242. package/out/exports/resources.generated/aws-sagemaker-userprofile.d.ts +1 -1
  243. package/out/exports/resources.generated/aws-secretsmanager-rotationschedule.d.ts +28 -2
  244. package/out/exports/resources.generated/aws-secretsmanager-secret.d.ts +9 -5
  245. package/out/exports/resources.generated/aws-securityhub-findingaggregator.d.ts +1 -1
  246. package/out/exports/resources.generated/aws-securityhub-hub.d.ts +2 -2
  247. package/out/exports/resources.generated/aws-servicecatalog-cloudformationproduct.d.ts +1 -22
  248. package/out/exports/resources.generated/aws-shield-drtaccess.d.ts +4 -4
  249. package/out/exports/resources.generated/aws-shield-proactiveengagement.d.ts +4 -4
  250. package/out/exports/resources.generated/aws-shield-protection.d.ts +6 -6
  251. package/out/exports/resources.generated/aws-shield-protectiongroup.d.ts +2 -2
  252. package/out/exports/resources.generated/aws-simspaceweaver-simulation.d.ts +2 -2
  253. package/out/exports/resources.generated/aws-smsvoice-protectconfiguration.d.ts +1 -1
  254. package/out/exports/resources.generated/aws-sns-subscription.d.ts +11 -11
  255. package/out/exports/resources.generated/aws-sns-topic.d.ts +14 -14
  256. package/out/exports/resources.generated/aws-sns-topicinlinepolicy.d.ts +3 -3
  257. package/out/exports/resources.generated/aws-sns-topicpolicy.d.ts +2 -2
  258. package/out/exports/resources.generated/aws-sqs-queue.d.ts +6 -6
  259. package/out/exports/resources.generated/aws-sqs-queuepolicy.d.ts +2 -2
  260. package/out/exports/resources.generated/aws-ssm-association.d.ts +1 -1
  261. package/out/exports/resources.generated/aws-ssm-document.d.ts +2 -2
  262. package/out/exports/resources.generated/aws-ssmincidents-replicationset.d.ts +2 -2
  263. package/out/exports/resources.generated/aws-ssmincidents-responseplan.d.ts +4 -4
  264. package/out/exports/resources.generated/aws-ssmquicksetup-configurationmanager.d.ts +1 -1
  265. package/out/exports/resources.generated/aws-ssmquicksetup-lifecycleautomation.d.ts +3 -3
  266. package/out/exports/resources.generated/aws-sso-application.d.ts +2 -2
  267. package/out/exports/resources.generated/aws-stepfunctions-activity.d.ts +3 -3
  268. package/out/exports/resources.generated/aws-stepfunctions-statemachine.d.ts +3 -3
  269. package/out/exports/resources.generated/aws-synthetics-canary.d.ts +3 -3
  270. package/out/exports/resources.generated/aws-timestream-database.d.ts +3 -3
  271. package/out/exports/resources.generated/aws-verifiedpermissions-identitysource.d.ts +2 -2
  272. package/out/exports/resources.generated/aws-vpclattice-domainverification.d.ts +51 -0
  273. package/out/exports/resources.generated/aws-vpclattice-resourceconfiguration.d.ts +22 -0
  274. package/out/exports/resources.generated/aws-vpclattice-servicenetworkresourceassociation.d.ts +5 -0
  275. package/out/exports/resources.generated/aws-vpclattice-servicenetworkvpcassociation.d.ts +26 -0
  276. package/out/exports/resources.generated/aws-wafregional-ratebasedrule.d.ts +2 -2
  277. package/out/exports/resources.generated/aws-wafregional-regexpatternset.d.ts +2 -2
  278. package/out/exports/resources.generated/aws-wafv2-ipset.d.ts +1 -1
  279. package/out/exports/resources.generated/aws-wafv2-regexpatternset.d.ts +1 -1
  280. package/out/exports/resources.generated/aws-wafv2-rulegroup.d.ts +1 -1
  281. package/out/exports/resources.generated/aws-wafv2-webacl.d.ts +5 -5
  282. package/out/exports/resources.generated/aws-wafv2-webaclassociation.d.ts +2 -2
  283. package/out/exports/resources.generated/aws-wisdom-aiagent.d.ts +70 -1
  284. package/out/exports/resources.generated/aws-workspaces-workspace.d.ts +2 -2
  285. package/out/exports/resources.generated/aws-workspacesweb-browsersettings.d.ts +5 -0
  286. package/out/exports/resources.generated/aws-workspacesweb-portal.d.ts +1 -1
  287. package/out/exports/resources.generated/aws-workspacesweb-sessionlogger.d.ts +1 -0
  288. package/package.json +1 -1
@@ -2,42 +2,42 @@ import type { ResourceDefinitionWithAttributes, PolicyDocument, Tag } from "../m
2
2
  /**
3
3
  * The `AWS::KMS::Key` resource specifies an [KMS key](https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#kms_keys) in AWS Key Management Service . You can use this resource to create symmetric encryption KMS keys, asymmetric KMS keys for encryption or signing, and symmetric HMAC KMS keys. You can use `AWS::KMS::Key` to create [multi-Region primary keys](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html#mrk-primary-key) of all supported types. To replicate a multi-Region key, use the `AWS::KMS::ReplicaKey` resource.
4
4
  *
5
- * > If you change the value of the `KeySpec` , `KeyUsage` , `Origin` , or `MultiRegion` properties of an existing KMS key, the update request fails, regardless of the value of the [`UpdateReplacePolicy` attribute](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-attribute-updatereplacepolicy.html) . This prevents you from accidentally deleting a KMS key by changing any of its immutable property values. > AWS KMS replaced the term *customer master key (CMK)* with *AWS KMS key* and *KMS key* . The concept has not changed. To prevent breaking changes, AWS KMS is keeping some variations of this term.
5
+ * > If you change the value of the `KeySpec` , `KeyUsage` , `Origin` , or `MultiRegion` properties of an existing KMS key, the update request fails, regardless of the value of the [`UpdateReplacePolicy` attribute](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-attribute-updatereplacepolicy.html) . This prevents you from accidentally deleting a KMS key by changing any of its immutable property values. > AWS replaced the term *customer master key (CMK)* with *AWS KMS key* and *KMS key* . The concept has not changed. To prevent breaking changes, AWS is keeping some variations of this term.
6
6
  *
7
- * You can use symmetric encryption KMS keys to encrypt and decrypt small amounts of data, but they are more commonly used to generate data keys and data key pairs. You can also use a symmetric encryption KMS key to encrypt data stored in AWS services that are [integrated with AWS KMS](https://docs.aws.amazon.com//kms/features/#AWS_Service_Integration) . For more information, see [Symmetric encryption KMS keys](https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#symmetric-cmks) in the *AWS Key Management Service Developer Guide* .
7
+ * You can use symmetric encryption KMS keys to encrypt and decrypt small amounts of data, but they are more commonly used to generate data keys and data key pairs. You can also use a symmetric encryption KMS key to encrypt data stored in AWS services that are [integrated with AWS](https://docs.aws.amazon.com//kms/features/#AWS_Service_Integration) . For more information, see [Symmetric encryption KMS keys](https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#symmetric-cmks) in the *AWS Key Management Service Developer Guide* .
8
8
  *
9
- * You can use asymmetric KMS keys to encrypt and decrypt data or sign messages and verify signatures. To create an asymmetric key, you must specify an asymmetric `KeySpec` value and a `KeyUsage` value. For details, see [Asymmetric keys in AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html) in the *AWS Key Management Service Developer Guide* .
9
+ * You can use asymmetric KMS keys to encrypt and decrypt data or sign messages and verify signatures. To create an asymmetric key, you must specify an asymmetric `KeySpec` value and a `KeyUsage` value. For details, see [Asymmetric keys in AWS](https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html) in the *AWS Key Management Service Developer Guide* .
10
10
  *
11
- * You can use HMAC KMS keys (which are also symmetric keys) to generate and verify hash-based message authentication codes. To create an HMAC key, you must specify an HMAC `KeySpec` value and a `KeyUsage` value of `GENERATE_VERIFY_MAC` . For details, see [HMAC keys in AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/hmac.html) in the *AWS Key Management Service Developer Guide* .
11
+ * You can use HMAC KMS keys (which are also symmetric keys) to generate and verify hash-based message authentication codes. To create an HMAC key, you must specify an HMAC `KeySpec` value and a `KeyUsage` value of `GENERATE_VERIFY_MAC` . For details, see [HMAC keys in AWS](https://docs.aws.amazon.com/kms/latest/developerguide/hmac.html) in the *AWS Key Management Service Developer Guide* .
12
12
  *
13
- * You can also create symmetric encryption, asymmetric, and HMAC multi-Region primary keys. To create a multi-Region primary key, set the `MultiRegion` property to `true` . For information about multi-Region keys, see [Multi-Region keys in AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the *AWS Key Management Service Developer Guide* .
13
+ * You can also create symmetric encryption, asymmetric, and HMAC multi-Region primary keys. To create a multi-Region primary key, set the `MultiRegion` property to `true` . For information about multi-Region keys, see [Multi-Region keys in AWS](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the *AWS Key Management Service Developer Guide* .
14
14
  *
15
15
  * You cannot use the `AWS::KMS::Key` resource to specify a KMS key with [imported key material](https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html) or a KMS key in a [custom key store](https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html) .
16
16
  *
17
17
  * *Regions*
18
18
  *
19
- * AWS KMS CloudFormation resources are available in all Regions in which AWS KMS and AWS CloudFormation are supported. You can use the `AWS::KMS::Key` resource to create and manage all KMS key types that are supported in a Region.
19
+ * AWS CloudFormation resources are available in all Regions in which AWS and CloudFormation are supported. You can use the `AWS::KMS::Key` resource to create and manage all KMS key types that are supported in a Region.
20
20
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kms-key.html}
21
21
  */
22
22
  export type KMSKey = ResourceDefinitionWithAttributes<"AWS::KMS::Key", KMSKeyProps, KMSKeyAttribs>;
23
23
  /**
24
24
  * The `AWS::KMS::Key` resource specifies an [KMS key](https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#kms_keys) in AWS Key Management Service . You can use this resource to create symmetric encryption KMS keys, asymmetric KMS keys for encryption or signing, and symmetric HMAC KMS keys. You can use `AWS::KMS::Key` to create [multi-Region primary keys](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html#mrk-primary-key) of all supported types. To replicate a multi-Region key, use the `AWS::KMS::ReplicaKey` resource.
25
25
  *
26
- * > If you change the value of the `KeySpec` , `KeyUsage` , `Origin` , or `MultiRegion` properties of an existing KMS key, the update request fails, regardless of the value of the [`UpdateReplacePolicy` attribute](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-attribute-updatereplacepolicy.html) . This prevents you from accidentally deleting a KMS key by changing any of its immutable property values. > AWS KMS replaced the term *customer master key (CMK)* with *AWS KMS key* and *KMS key* . The concept has not changed. To prevent breaking changes, AWS KMS is keeping some variations of this term.
26
+ * > If you change the value of the `KeySpec` , `KeyUsage` , `Origin` , or `MultiRegion` properties of an existing KMS key, the update request fails, regardless of the value of the [`UpdateReplacePolicy` attribute](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-attribute-updatereplacepolicy.html) . This prevents you from accidentally deleting a KMS key by changing any of its immutable property values. > AWS replaced the term *customer master key (CMK)* with *AWS KMS key* and *KMS key* . The concept has not changed. To prevent breaking changes, AWS is keeping some variations of this term.
27
27
  *
28
- * You can use symmetric encryption KMS keys to encrypt and decrypt small amounts of data, but they are more commonly used to generate data keys and data key pairs. You can also use a symmetric encryption KMS key to encrypt data stored in AWS services that are [integrated with AWS KMS](https://docs.aws.amazon.com//kms/features/#AWS_Service_Integration) . For more information, see [Symmetric encryption KMS keys](https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#symmetric-cmks) in the *AWS Key Management Service Developer Guide* .
28
+ * You can use symmetric encryption KMS keys to encrypt and decrypt small amounts of data, but they are more commonly used to generate data keys and data key pairs. You can also use a symmetric encryption KMS key to encrypt data stored in AWS services that are [integrated with AWS](https://docs.aws.amazon.com//kms/features/#AWS_Service_Integration) . For more information, see [Symmetric encryption KMS keys](https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#symmetric-cmks) in the *AWS Key Management Service Developer Guide* .
29
29
  *
30
- * You can use asymmetric KMS keys to encrypt and decrypt data or sign messages and verify signatures. To create an asymmetric key, you must specify an asymmetric `KeySpec` value and a `KeyUsage` value. For details, see [Asymmetric keys in AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html) in the *AWS Key Management Service Developer Guide* .
30
+ * You can use asymmetric KMS keys to encrypt and decrypt data or sign messages and verify signatures. To create an asymmetric key, you must specify an asymmetric `KeySpec` value and a `KeyUsage` value. For details, see [Asymmetric keys in AWS](https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html) in the *AWS Key Management Service Developer Guide* .
31
31
  *
32
- * You can use HMAC KMS keys (which are also symmetric keys) to generate and verify hash-based message authentication codes. To create an HMAC key, you must specify an HMAC `KeySpec` value and a `KeyUsage` value of `GENERATE_VERIFY_MAC` . For details, see [HMAC keys in AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/hmac.html) in the *AWS Key Management Service Developer Guide* .
32
+ * You can use HMAC KMS keys (which are also symmetric keys) to generate and verify hash-based message authentication codes. To create an HMAC key, you must specify an HMAC `KeySpec` value and a `KeyUsage` value of `GENERATE_VERIFY_MAC` . For details, see [HMAC keys in AWS](https://docs.aws.amazon.com/kms/latest/developerguide/hmac.html) in the *AWS Key Management Service Developer Guide* .
33
33
  *
34
- * You can also create symmetric encryption, asymmetric, and HMAC multi-Region primary keys. To create a multi-Region primary key, set the `MultiRegion` property to `true` . For information about multi-Region keys, see [Multi-Region keys in AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the *AWS Key Management Service Developer Guide* .
34
+ * You can also create symmetric encryption, asymmetric, and HMAC multi-Region primary keys. To create a multi-Region primary key, set the `MultiRegion` property to `true` . For information about multi-Region keys, see [Multi-Region keys in AWS](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the *AWS Key Management Service Developer Guide* .
35
35
  *
36
36
  * You cannot use the `AWS::KMS::Key` resource to specify a KMS key with [imported key material](https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html) or a KMS key in a [custom key store](https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html) .
37
37
  *
38
38
  * *Regions*
39
39
  *
40
- * AWS KMS CloudFormation resources are available in all Regions in which AWS KMS and AWS CloudFormation are supported. You can use the `AWS::KMS::Key` resource to create and manage all KMS key types that are supported in a Region.
40
+ * AWS CloudFormation resources are available in all Regions in which AWS and CloudFormation are supported. You can use the `AWS::KMS::Key` resource to create and manage all KMS key types that are supported in a Region.
41
41
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kms-key.html}
42
42
  */
43
43
  export type KMSKeyProps = {
@@ -63,11 +63,11 @@ export type KMSKeyProps = {
63
63
  /**
64
64
  * Enables automatic rotation of the key material for the specified KMS key. By default, automatic key rotation is not enabled.
65
65
  *
66
- * AWS KMS supports automatic rotation only for symmetric encryption KMS keys ( `KeySpec` = `SYMMETRIC_DEFAULT` ). For asymmetric KMS keys, HMAC KMS keys, and KMS keys with Origin `EXTERNAL` , omit the `EnableKeyRotation` property or set it to `false` .
66
+ * AWS supports automatic rotation only for symmetric encryption KMS keys ( `KeySpec` = `SYMMETRIC_DEFAULT` ). For asymmetric KMS keys, HMAC KMS keys, and KMS keys with Origin `EXTERNAL` , omit the `EnableKeyRotation` property or set it to `false` .
67
67
  *
68
- * To enable automatic key rotation of the key material for a multi-Region KMS key, set `EnableKeyRotation` to `true` on the primary key (created by using `AWS::KMS::Key` ). AWS KMS copies the rotation status to all replica keys. For details, see [Rotating multi-Region keys](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-manage.html#multi-region-rotate) in the *AWS Key Management Service Developer Guide* .
68
+ * To enable automatic key rotation of the key material for a multi-Region KMS key, set `EnableKeyRotation` to `true` on the primary key (created by using `AWS::KMS::Key` ). AWS copies the rotation status to all replica keys. For details, see [Rotating multi-Region keys](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-manage.html#multi-region-rotate) in the *AWS Key Management Service Developer Guide* .
69
69
  *
70
- * When you enable automatic rotation, AWS KMS automatically creates new key material for the KMS key one year after the enable date and every year thereafter. AWS KMS retains all key material until you delete the KMS key. For detailed information about automatic key rotation, see [Rotating KMS keys](https://docs.aws.amazon.com/kms/latest/developerguide/rotate-keys.html) in the *AWS Key Management Service Developer Guide* .
70
+ * When you enable automatic rotation, AWS automatically creates new key material for the KMS key one year after the enable date and every year thereafter. AWS retains all key material until you delete the KMS key. For detailed information about automatic key rotation, see [Rotating KMS keys](https://docs.aws.amazon.com/kms/latest/developerguide/rotate-keys.html) in the *AWS Key Management Service Developer Guide* .
71
71
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kms-key.html#cfn-kms-key-enablekeyrotation}
72
72
  */
73
73
  EnableKeyRotation?: boolean | undefined;
@@ -88,9 +88,9 @@ export type KMSKeyProps = {
88
88
  * If you provide a key policy, it must meet the following criteria:
89
89
  *
90
90
  * - The key policy must allow the caller to make a subsequent [PutKeyPolicy](https://docs.aws.amazon.com/kms/latest/APIReference/API_PutKeyPolicy.html) request on the KMS key. This reduces the risk that the KMS key becomes unmanageable. For more information, see [Default key policy](https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam) in the *AWS Key Management Service Developer Guide* . (To omit this condition, set `BypassPolicyLockoutSafetyCheck` to true.)
91
- * - Each statement in the key policy must contain one or more principals. The principals in the key policy must exist and be visible to AWS KMS . When you create a new AWS principal (for example, an IAM user or role), you might need to enforce a delay before including the new principal in a key policy because the new principal might not be immediately visible to AWS KMS . For more information, see [Changes that I make are not always immediately visible](https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency) in the *AWS Identity and Access Management User Guide* .
91
+ * - Each statement in the key policy must contain one or more principals. The principals in the key policy must exist and be visible to AWS . When you create a new AWS principal (for example, an IAM user or role), you might need to enforce a delay before including the new principal in a key policy because the new principal might not be immediately visible to AWS . For more information, see [Changes that I make are not always immediately visible](https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency) in the *AWS Identity and Access Management User Guide* .
92
92
  *
93
- * If you do not provide a key policy, AWS KMS attaches a default key policy to the KMS key. For more information, see [Default key policy](https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default) in the *AWS Key Management Service Developer Guide* .
93
+ * If you do not provide a key policy, AWS attaches a default key policy to the KMS key. For more information, see [Default key policy](https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default) in the *AWS Key Management Service Developer Guide* .
94
94
  *
95
95
  * A key policy document can include only the following characters:
96
96
  *
@@ -108,11 +108,11 @@ export type KMSKeyProps = {
108
108
  /**
109
109
  * Specifies the type of KMS key to create. The default value, `SYMMETRIC_DEFAULT` , creates a KMS key with a 256-bit symmetric key for encryption and decryption. In China Regions, `SYMMETRIC_DEFAULT` creates a 128-bit symmetric key that uses SM4 encryption. You can't change the `KeySpec` value after the KMS key is created. For help choosing a key spec for your KMS key, see [Choosing a KMS key type](https://docs.aws.amazon.com/kms/latest/developerguide/symm-asymm-choose.html) in the *AWS Key Management Service Developer Guide* .
110
110
  *
111
- * The `KeySpec` property determines the type of key material in the KMS key and the algorithms that the KMS key supports. To further restrict the algorithms that can be used with the KMS key, use a condition key in its key policy or IAM policy. For more information, see [AWS KMS condition keys](https://docs.aws.amazon.com/kms/latest/developerguide/policy-conditions.html#conditions-kms) in the *AWS Key Management Service Developer Guide* .
111
+ * The `KeySpec` property determines the type of key material in the KMS key and the algorithms that the KMS key supports. To further restrict the algorithms that can be used with the KMS key, use a condition key in its key policy or IAM policy. For more information, see [AWS condition keys](https://docs.aws.amazon.com/kms/latest/developerguide/policy-conditions.html#conditions-kms) in the *AWS Key Management Service Developer Guide* .
112
112
  *
113
- * > If you change the value of the `KeySpec` property on an existing KMS key, the update request fails, regardless of the value of the [`UpdateReplacePolicy` attribute](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-attribute-updatereplacepolicy.html) . This prevents you from accidentally deleting a KMS key by changing an immutable property value. > [AWS services that are integrated with AWS KMS](https://docs.aws.amazon.com/kms/features/#AWS_Service_Integration) use symmetric encryption KMS keys to protect your data. These services do not support encryption with asymmetric KMS keys. For help determining whether a KMS key is asymmetric, see [Identifying asymmetric KMS keys](https://docs.aws.amazon.com/kms/latest/developerguide/find-symm-asymm.html) in the *AWS Key Management Service Developer Guide* .
113
+ * > If you change the value of the `KeySpec` property on an existing KMS key, the update request fails, regardless of the value of the [`UpdateReplacePolicy` attribute](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-attribute-updatereplacepolicy.html) . This prevents you from accidentally deleting a KMS key by changing an immutable property value. > [AWS services that are integrated with AWS](https://docs.aws.amazon.com/kms/features/#AWS_Service_Integration) use symmetric encryption KMS keys to protect your data. These services do not support encryption with asymmetric KMS keys. For help determining whether a KMS key is asymmetric, see [Identifying asymmetric KMS keys](https://docs.aws.amazon.com/kms/latest/developerguide/find-symm-asymm.html) in the *AWS Key Management Service Developer Guide* .
114
114
  *
115
- * AWS KMS supports the following key specs for KMS keys:
115
+ * AWS supports the following key specs for KMS keys:
116
116
  *
117
117
  * - Symmetric encryption key (default)
118
118
  *
@@ -172,13 +172,13 @@ export type KMSKeyProps = {
172
172
  /**
173
173
  * Creates a multi-Region primary key that you can replicate in other AWS Regions . You can't change the `MultiRegion` value after the KMS key is created.
174
174
  *
175
- * For a list of AWS Regions in which multi-Region keys are supported, see [Multi-Region keys in AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the ** .
175
+ * For a list of AWS Regions in which multi-Region keys are supported, see [Multi-Region keys in AWS](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the ** .
176
176
  *
177
177
  * > If you change the value of the `MultiRegion` property on an existing KMS key, the update request fails, regardless of the value of the [`UpdateReplacePolicy` attribute](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-attribute-updatereplacepolicy.html) . This prevents you from accidentally deleting a KMS key by changing an immutable property value.
178
178
  *
179
179
  * For a multi-Region key, set to this property to `true` . For a single-Region key, omit this property or set it to `false` . The default value is `false` .
180
180
  *
181
- * *Multi-Region keys* are an AWS KMS feature that lets you create multiple interoperable KMS keys in different AWS Regions . Because these KMS keys have the same key ID, key material, and other metadata, you can use them to encrypt data in one AWS Region and decrypt it in a different AWS Region without making a cross-Region call or exposing the plaintext data. For more information, see [Multi-Region keys](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the *AWS Key Management Service Developer Guide* .
181
+ * *Multi-Region keys* are an AWS feature that lets you create multiple interoperable KMS keys in different AWS Regions . Because these KMS keys have the same key ID, key material, and other metadata, you can use them to encrypt data in one AWS Region and decrypt it in a different AWS Region without making a cross-Region call or exposing the plaintext data. For more information, see [Multi-Region keys](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the *AWS Key Management Service Developer Guide* .
182
182
  *
183
183
  * You can create a symmetric encryption, HMAC, or asymmetric multi-Region KMS key, and you can create a multi-Region key with imported key material. However, you cannot create a multi-Region key in a custom key store.
184
184
  *
@@ -188,26 +188,26 @@ export type KMSKeyProps = {
188
188
  */
189
189
  MultiRegion?: boolean | undefined;
190
190
  /**
191
- * The source of the key material for the KMS key. You cannot change the origin after you create the KMS key. The default is `AWS_KMS` , which means that AWS KMS creates the key material.
191
+ * The source of the key material for the KMS key. You cannot change the origin after you create the KMS key. The default is `AWS_KMS` , which means that AWS creates the key material.
192
192
  *
193
- * To [create a KMS key with no key material](https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys-create-cmk.html) (for imported key material), set this value to `EXTERNAL` . For more information about importing key material into AWS KMS , see [Importing Key Material](https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html) in the *AWS Key Management Service Developer Guide* .
193
+ * To [create a KMS key with no key material](https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys-create-cmk.html) (for imported key material), set this value to `EXTERNAL` . For more information about importing key material into AWS , see [Importing Key Material](https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html) in the *AWS Key Management Service Developer Guide* .
194
194
  *
195
195
  * You can ignore `ENABLED` when Origin is `EXTERNAL` . When a KMS key with Origin `EXTERNAL` is created, the key state is `PENDING_IMPORT` and `ENABLED` is `false` . After you import the key material, `ENABLED` updated to `true` . The KMS key can then be used for Cryptographic Operations.
196
196
  *
197
- * > - AWS CloudFormation doesn't support creating an `Origin` parameter of the `AWS_CLOUDHSM` or `EXTERNAL_KEY_STORE` values.
197
+ * > - CloudFormation doesn't support creating an `Origin` parameter of the `AWS_CLOUDHSM` or `EXTERNAL_KEY_STORE` values.
198
198
  * > - `EXTERNAL` is not supported for ML-DSA keys.
199
199
  * @default "AWS_KMS"
200
200
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kms-key.html#cfn-kms-key-origin}
201
201
  */
202
202
  Origin?: "AWS_KMS" | "EXTERNAL" | undefined;
203
203
  /**
204
- * Specifies the number of days in the waiting period before AWS KMS deletes a KMS key that has been removed from a CloudFormation stack. Enter a value between 7 and 30 days. The default value is 30 days.
204
+ * Specifies the number of days in the waiting period before AWS deletes a KMS key that has been removed from a CloudFormation stack. Enter a value between 7 and 30 days. The default value is 30 days.
205
205
  *
206
- * When you remove a KMS key from a CloudFormation stack, AWS KMS schedules the KMS key for deletion and starts the mandatory waiting period. The `PendingWindowInDays` property determines the length of waiting period. During the waiting period, the key state of KMS key is `Pending Deletion` or `Pending Replica Deletion` , which prevents the KMS key from being used in cryptographic operations. When the waiting period expires, AWS KMS permanently deletes the KMS key.
206
+ * When you remove a KMS key from a CloudFormation stack, AWS schedules the KMS key for deletion and starts the mandatory waiting period. The `PendingWindowInDays` property determines the length of waiting period. During the waiting period, the key state of KMS key is `Pending Deletion` or `Pending Replica Deletion` , which prevents the KMS key from being used in cryptographic operations. When the waiting period expires, AWS permanently deletes the KMS key.
207
207
  *
208
- * AWS KMS will not delete a [multi-Region primary key](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) that has replica keys. If you remove a multi-Region primary key from a CloudFormation stack, its key state changes to `PendingReplicaDeletion` so it cannot be replicated or used in cryptographic operations. This state can persist indefinitely. When the last of its replica keys is deleted, the key state of the primary key changes to `PendingDeletion` and the waiting period specified by `PendingWindowInDays` begins. When this waiting period expires, AWS KMS deletes the primary key. For details, see [Deleting multi-Region keys](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-delete.html) in the *AWS Key Management Service Developer Guide* .
208
+ * AWS will not delete a [multi-Region primary key](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) that has replica keys. If you remove a multi-Region primary key from a CloudFormation stack, its key state changes to `PendingReplicaDeletion` so it cannot be replicated or used in cryptographic operations. This state can persist indefinitely. When the last of its replica keys is deleted, the key state of the primary key changes to `PendingDeletion` and the waiting period specified by `PendingWindowInDays` begins. When this waiting period expires, AWS deletes the primary key. For details, see [Deleting multi-Region keys](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-delete.html) in the *AWS Key Management Service Developer Guide* .
209
209
  *
210
- * You cannot use a CloudFormation template to cancel deletion of the KMS key after you remove it from the stack, regardless of the waiting period. If you specify a KMS key in your template, even one with the same name, CloudFormation creates a new KMS key. To cancel deletion of a KMS key, use the AWS KMS console or the [CancelKeyDeletion](https://docs.aws.amazon.com/kms/latest/APIReference/API_CancelKeyDeletion.html) operation.
210
+ * You cannot use a CloudFormation template to cancel deletion of the KMS key after you remove it from the stack, regardless of the waiting period. If you specify a KMS key in your template, even one with the same name, CloudFormation creates a new KMS key. To cancel deletion of a KMS key, use the AWS console or the [CancelKeyDeletion](https://docs.aws.amazon.com/kms/latest/APIReference/API_CancelKeyDeletion.html) operation.
211
211
  *
212
212
  * For information about the `Pending Deletion` and `Pending Replica Deletion` key states, see [Key state: Effect on your KMS key](https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html) in the *AWS Key Management Service Developer Guide* . For more information about deleting KMS keys, see the [ScheduleKeyDeletion](https://docs.aws.amazon.com/kms/latest/APIReference/API_ScheduleKeyDeletion.html) operation in the *AWS Key Management Service API Reference* and [Deleting KMS keys](https://docs.aws.amazon.com/kms/latest/developerguide/deleting-keys.html) in the *AWS Key Management Service Developer Guide* .
213
213
  * @min 7
@@ -218,7 +218,7 @@ export type KMSKeyProps = {
218
218
  /**
219
219
  * Specifies a custom period of time between each rotation date. If no value is specified, the default value is 365 days.
220
220
  *
221
- * The rotation period defines the number of days after you enable automatic key rotation that AWS KMS will rotate your key material, and the number of days between each automatic rotation thereafter.
221
+ * The rotation period defines the number of days after you enable automatic key rotation that AWS will rotate your key material, and the number of days between each automatic rotation thereafter.
222
222
  *
223
223
  * You can use the [`kms:RotationPeriodInDays`](https://docs.aws.amazon.com/kms/latest/developerguide/conditions-kms.html#conditions-kms-rotation-period-in-days) condition key to further constrain the values that principals can specify in the `RotationPeriodInDays` parameter.
224
224
  *
@@ -232,9 +232,9 @@ export type KMSKeyProps = {
232
232
  /**
233
233
  * Assigns one or more tags to the replica key.
234
234
  *
235
- * > Tagging or untagging a KMS key can allow or deny permission to the KMS key. For details, see [ABAC for AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/abac.html) in the *AWS Key Management Service Developer Guide* .
235
+ * > Tagging or untagging a KMS key can allow or deny permission to the KMS key. For details, see [ABAC for AWS](https://docs.aws.amazon.com/kms/latest/developerguide/abac.html) in the *AWS Key Management Service Developer Guide* .
236
236
  *
237
- * For information about tags in AWS KMS , see [Tagging keys](https://docs.aws.amazon.com/kms/latest/developerguide/tagging-keys.html) in the *AWS Key Management Service Developer Guide* . For information about tags in CloudFormation, see [Tag](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html) .
237
+ * For information about tags in AWS , see [Tagging keys](https://docs.aws.amazon.com/kms/latest/developerguide/tagging-keys.html) in the *AWS Key Management Service Developer Guide* . For information about tags in CloudFormation, see [Tag](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html) .
238
238
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kms-key.html#cfn-kms-key-tags}
239
239
  */
240
240
  Tags?: Tag[] | undefined;
@@ -2,38 +2,38 @@ import type { ResourceDefinitionWithAttributes, PolicyDocument, Tag } from "../m
2
2
  /**
3
3
  * The `AWS::KMS::ReplicaKey` resource specifies a multi-Region replica key that is based on a multi-Region primary key.
4
4
  *
5
- * *Multi-Region keys* are an AWS KMS feature that lets you create multiple interoperable KMS keys in different AWS Regions . Because these KMS keys have the same key ID, key material, and other metadata, you can use them to encrypt data in one AWS Region and decrypt it in a different AWS Region without making a cross-Region call or exposing the plaintext data. For more information, see [Multi-Region keys](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the *AWS Key Management Service Developer Guide* .
5
+ * *Multi-Region keys* are an AWS feature that lets you create multiple interoperable KMS keys in different AWS Regions . Because these KMS keys have the same key ID, key material, and other metadata, you can use them to encrypt data in one AWS Region and decrypt it in a different AWS Region without making a cross-Region call or exposing the plaintext data. For more information, see [Multi-Region keys](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the *AWS Key Management Service Developer Guide* .
6
6
  *
7
7
  * A multi-Region *primary key* is a fully functional symmetric encryption KMS key, HMAC KMS key, or asymmetric KMS key that is also the model for replica keys in other AWS Regions . To create a multi-Region primary key, add an [AWS::KMS::Key](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kms-key.html) resource to your CloudFormation stack. Set its `MultiRegion` property to true.
8
8
  *
9
9
  * A multi-Region *replica key* is a fully functional KMS key that has the same key ID and key material as a multi-Region primary key, but is located in a different AWS Region of the same AWS partition. There can be multiple replicas of a primary key, but each must be in a different AWS Region .
10
10
  *
11
- * When you create a replica key in AWS CloudFormation , the replica key is created in the AWS Region represented by the endpoint you use for the request. If you try to replicate a multi-Region key into a Region in which the key type is not supported, the request will fail.
11
+ * When you create a replica key in CloudFormation , the replica key is created in the AWS Region represented by the endpoint you use for the request. If you try to replicate a multi-Region key into a Region in which the key type is not supported, the request will fail.
12
12
  *
13
- * A primary key and its replicas have the same key ID and key material. They also have the same key spec, key usage, key material origin, and automatic key rotation status. These properties are known as *shared properties* . If they change, AWS KMS synchronizes the change to all related multi-Region keys. All other properties of a replica key can differ, including its key policy, tags, aliases, and key state. AWS KMS does not synchronize these properties.
13
+ * A primary key and its replicas have the same key ID and key material. They also have the same key spec, key usage, key material origin, and automatic key rotation status. These properties are known as *shared properties* . If they change, AWS synchronizes the change to all related multi-Region keys. All other properties of a replica key can differ, including its key policy, tags, aliases, and key state. AWS does not synchronize these properties.
14
14
  *
15
15
  * *Regions*
16
16
  *
17
- * AWS KMS CloudFormation resources are available in all AWS Regions in which AWS KMS and AWS CloudFormation are supported. You can use the `AWS::KMS::ReplicaKey` resource to create replica keys in all Regions that support multi-Region KMS keys. For details, see [Multi-Region keys in AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the ** .
17
+ * AWS CloudFormation resources are available in all AWS Regions in which AWS and CloudFormation are supported. You can use the `AWS::KMS::ReplicaKey` resource to create replica keys in all Regions that support multi-Region KMS keys. For details, see [Multi-Region keys in AWS](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the ** .
18
18
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kms-replicakey.html}
19
19
  */
20
20
  export type KMSReplicaKey = ResourceDefinitionWithAttributes<"AWS::KMS::ReplicaKey", KMSReplicaKeyProps, KMSReplicaKeyAttribs>;
21
21
  /**
22
22
  * The `AWS::KMS::ReplicaKey` resource specifies a multi-Region replica key that is based on a multi-Region primary key.
23
23
  *
24
- * *Multi-Region keys* are an AWS KMS feature that lets you create multiple interoperable KMS keys in different AWS Regions . Because these KMS keys have the same key ID, key material, and other metadata, you can use them to encrypt data in one AWS Region and decrypt it in a different AWS Region without making a cross-Region call or exposing the plaintext data. For more information, see [Multi-Region keys](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the *AWS Key Management Service Developer Guide* .
24
+ * *Multi-Region keys* are an AWS feature that lets you create multiple interoperable KMS keys in different AWS Regions . Because these KMS keys have the same key ID, key material, and other metadata, you can use them to encrypt data in one AWS Region and decrypt it in a different AWS Region without making a cross-Region call or exposing the plaintext data. For more information, see [Multi-Region keys](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the *AWS Key Management Service Developer Guide* .
25
25
  *
26
26
  * A multi-Region *primary key* is a fully functional symmetric encryption KMS key, HMAC KMS key, or asymmetric KMS key that is also the model for replica keys in other AWS Regions . To create a multi-Region primary key, add an [AWS::KMS::Key](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kms-key.html) resource to your CloudFormation stack. Set its `MultiRegion` property to true.
27
27
  *
28
28
  * A multi-Region *replica key* is a fully functional KMS key that has the same key ID and key material as a multi-Region primary key, but is located in a different AWS Region of the same AWS partition. There can be multiple replicas of a primary key, but each must be in a different AWS Region .
29
29
  *
30
- * When you create a replica key in AWS CloudFormation , the replica key is created in the AWS Region represented by the endpoint you use for the request. If you try to replicate a multi-Region key into a Region in which the key type is not supported, the request will fail.
30
+ * When you create a replica key in CloudFormation , the replica key is created in the AWS Region represented by the endpoint you use for the request. If you try to replicate a multi-Region key into a Region in which the key type is not supported, the request will fail.
31
31
  *
32
- * A primary key and its replicas have the same key ID and key material. They also have the same key spec, key usage, key material origin, and automatic key rotation status. These properties are known as *shared properties* . If they change, AWS KMS synchronizes the change to all related multi-Region keys. All other properties of a replica key can differ, including its key policy, tags, aliases, and key state. AWS KMS does not synchronize these properties.
32
+ * A primary key and its replicas have the same key ID and key material. They also have the same key spec, key usage, key material origin, and automatic key rotation status. These properties are known as *shared properties* . If they change, AWS synchronizes the change to all related multi-Region keys. All other properties of a replica key can differ, including its key policy, tags, aliases, and key state. AWS does not synchronize these properties.
33
33
  *
34
34
  * *Regions*
35
35
  *
36
- * AWS KMS CloudFormation resources are available in all AWS Regions in which AWS KMS and AWS CloudFormation are supported. You can use the `AWS::KMS::ReplicaKey` resource to create replica keys in all Regions that support multi-Region KMS keys. For details, see [Multi-Region keys in AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the ** .
36
+ * AWS CloudFormation resources are available in all AWS Regions in which AWS and CloudFormation are supported. You can use the `AWS::KMS::ReplicaKey` resource to create replica keys in all Regions that support multi-Region KMS keys. For details, see [Multi-Region keys in AWS](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the ** .
37
37
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kms-replicakey.html}
38
38
  */
39
39
  export type KMSReplicaKeyProps = {
@@ -62,12 +62,12 @@ export type KMSReplicaKeyProps = {
62
62
  /**
63
63
  * The key policy that authorizes use of the replica key.
64
64
  *
65
- * The key policy is not a shared property of multi-Region keys. You can specify the same key policy or a different key policy for each key in a set of related multi-Region keys. AWS KMS does not synchronize this property.
65
+ * The key policy is not a shared property of multi-Region keys. You can specify the same key policy or a different key policy for each key in a set of related multi-Region keys. AWS does not synchronize this property.
66
66
  *
67
67
  * The key policy must conform to the following rules.
68
68
  *
69
69
  * - The key policy must give the caller [PutKeyPolicy](https://docs.aws.amazon.com/kms/latest/APIReference/API_PutKeyPolicy.html) permission on the KMS key. This reduces the risk that the KMS key becomes unmanageable. For more information, refer to the scenario in the [Default key policy](https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam) section of the **AWS Key Management Service Developer Guide** .
70
- * - Each statement in the key policy must contain one or more principals. The principals in the key policy must exist and be visible to AWS KMS . When you create a new AWS principal (for example, an IAM user or role), you might need to enforce a delay before including the new principal in a key policy because the new principal might not be immediately visible to AWS KMS . For more information, see [Changes that I make are not always immediately visible](https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency) in the *AWS Identity and Access Management User Guide* .
70
+ * - Each statement in the key policy must contain one or more principals. The principals in the key policy must exist and be visible to AWS . When you create a new AWS principal (for example, an IAM user or role), you might need to enforce a delay before including the new principal in a key policy because the new principal might not be immediately visible to AWS . For more information, see [Changes that I make are not always immediately visible](https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency) in the *AWS Identity and Access Management User Guide* .
71
71
  *
72
72
  * A key policy document can include only the following characters:
73
73
  *
@@ -82,9 +82,9 @@ export type KMSReplicaKeyProps = {
82
82
  */
83
83
  KeyPolicy: PolicyDocument;
84
84
  /**
85
- * Specifies the number of days in the waiting period before AWS KMS deletes a replica key that has been removed from a CloudFormation stack. Enter a value between 7 and 30 days. The default value is 30 days.
85
+ * Specifies the number of days in the waiting period before AWS deletes a replica key that has been removed from a CloudFormation stack. Enter a value between 7 and 30 days. The default value is 30 days.
86
86
  *
87
- * When you remove a replica key from a CloudFormation stack, AWS KMS schedules the replica key for deletion and starts the mandatory waiting period. The `PendingWindowInDays` property determines the length of waiting period. During the waiting period, the key state of replica key is `Pending Deletion` , which prevents it from being used in cryptographic operations. When the waiting period expires, AWS KMS permanently deletes the replica key.
87
+ * When you remove a replica key from a CloudFormation stack, AWS schedules the replica key for deletion and starts the mandatory waiting period. The `PendingWindowInDays` property determines the length of waiting period. During the waiting period, the key state of replica key is `Pending Deletion` , which prevents it from being used in cryptographic operations. When the waiting period expires, AWS permanently deletes the replica key.
88
88
  *
89
89
  * If the KMS key is a multi-Region primary key with replica keys, the waiting period begins when the last of its replica keys is deleted. Otherwise, the waiting period begins immediately.
90
90
  *
@@ -114,11 +114,11 @@ export type KMSReplicaKeyProps = {
114
114
  /**
115
115
  * Assigns one or more tags to the replica key.
116
116
  *
117
- * > Tagging or untagging a KMS key can allow or deny permission to the KMS key. For details, see [ABAC for AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/abac.html) in the *AWS Key Management Service Developer Guide* .
117
+ * > Tagging or untagging a KMS key can allow or deny permission to the KMS key. For details, see [ABAC for AWS](https://docs.aws.amazon.com/kms/latest/developerguide/abac.html) in the *AWS Key Management Service Developer Guide* .
118
118
  *
119
- * Tags are not a shared property of multi-Region keys. You can specify the same tags or different tags for each key in a set of related multi-Region keys. AWS KMS does not synchronize this property.
119
+ * Tags are not a shared property of multi-Region keys. You can specify the same tags or different tags for each key in a set of related multi-Region keys. AWS does not synchronize this property.
120
120
  *
121
- * Each tag consists of a tag key and a tag value. Both the tag key and the tag value are required, but the tag value can be an empty (null) string. You cannot have more than one tag on a KMS key with the same tag key. If you specify an existing tag key with a different tag value, AWS KMS replaces the current tag value with the specified one.
121
+ * Each tag consists of a tag key and a tag value. Both the tag key and the tag value are required, but the tag value can be an empty (null) string. You cannot have more than one tag on a KMS key with the same tag key. If you specify an existing tag key with a different tag value, AWS replaces the current tag value with the specified one.
122
122
  *
123
123
  * When you assign tags to an AWS resource, AWS generates a cost allocation report with usage and costs aggregated by tags. Tags can also be used to control access to a KMS key. For details, see [Tagging keys](https://docs.aws.amazon.com/kms/latest/developerguide/tagging-keys.html) .
124
124
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kms-replicakey.html#cfn-kms-replicakey-tags}
@@ -76,6 +76,10 @@ export type LakeFormationDataLakeSettingsProps = {
76
76
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lakeformation-datalakesettings.html#cfn-lakeformation-datalakesettings-parameters}
77
77
  */
78
78
  Parameters?: Record<string, unknown> | undefined;
79
+ /**
80
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lakeformation-datalakesettings.html#cfn-lakeformation-datalakesettings-readonlyadmins}
81
+ */
82
+ ReadOnlyAdmins?: Record<string, unknown> | undefined;
79
83
  /**
80
84
  * An array of UTF-8 strings.
81
85
  *
@@ -29,7 +29,7 @@ export type LambdaCodeSigningConfigProps = {
29
29
  /**
30
30
  * A list of tags to add to the code signing configuration.
31
31
  *
32
- * > You must have the `lambda:TagResource` , `lambda:UntagResource` , and `lambda:ListTags` permissions for your [IAM principal](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts.html) to manage the AWS CloudFormation stack. If you don't have these permissions, there might be unexpected behavior with stack-level tags propagating to the resource during resource creation and update.
32
+ * > You must have the `lambda:TagResource` , `lambda:UntagResource` , and `lambda:ListTags` permissions for your [IAM principal](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts.html) to manage the CloudFormation stack. If you don't have these permissions, there might be unexpected behavior with stack-level tags propagating to the resource during resource creation and update.
33
33
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-codesigningconfig.html#cfn-lambda-codesigningconfig-tags}
34
34
  */
35
35
  Tags?: Tag[] | undefined;
@@ -116,7 +116,7 @@ export type LambdaEventSourceMappingProps = {
116
116
  */
117
117
  FunctionResponseTypes?: "ReportBatchItemFailures"[] | undefined;
118
118
  /**
119
- * The ARN of the AWS Key Management Service ( AWS KMS ) customer managed key that Lambda uses to encrypt your function's [filter criteria](https://docs.aws.amazon.com/lambda/latest/dg/invocation-eventfiltering.html#filtering-basics) .
119
+ * The ARN of the AWS Key Management Service ( AWS ) customer managed key that Lambda uses to encrypt your function's [filter criteria](https://docs.aws.amazon.com/lambda/latest/dg/invocation-eventfiltering.html#filtering-basics) .
120
120
  * @minLength 12
121
121
  * @maxLength 2048
122
122
  * @pattern (arn:(aws[a-zA-Z-]*)?:[a-z0-9-.]+:.*)|()
@@ -124,6 +124,7 @@ export type LambdaEventSourceMappingProps = {
124
124
  */
125
125
  KmsKeyArn?: string | undefined;
126
126
  /**
127
+ * The function's Amazon CloudWatch Logs configuration settings.
127
128
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-eventsourcemapping.html#cfn-lambda-eventsourcemapping-loggingconfig}
128
129
  */
129
130
  LoggingConfig?: LoggingConfig | undefined;
@@ -171,7 +172,7 @@ export type LambdaEventSourceMappingProps = {
171
172
  */
172
173
  ParallelizationFactor?: number | undefined;
173
174
  /**
174
- * (Amazon MSK and self-managed Apache Kafka only) The provisioned mode configuration for the event source. For more information, see [provisioned mode](https://docs.aws.amazon.com/lambda/latest/dg/invocation-eventsourcemapping.html#invocation-eventsourcemapping-provisioned-mode) .
175
+ * (Amazon SQS, Amazon MSK, and self-managed Apache Kafka only) The provisioned mode configuration for the event source. For more information, see [provisioned mode](https://docs.aws.amazon.com/lambda/latest/dg/invocation-eventsourcemapping.html#invocation-eventsourcemapping-provisioned-mode) .
175
176
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-eventsourcemapping.html#cfn-lambda-eventsourcemapping-provisionedpollerconfig}
176
177
  */
177
178
  ProvisionedPollerConfig?: ProvisionedPollerConfig | undefined;
@@ -181,7 +182,7 @@ export type LambdaEventSourceMappingProps = {
181
182
  */
182
183
  Queues?: string[] | undefined;
183
184
  /**
184
- * (Amazon SQS only) The scaling configuration for the event source. For more information, see [Configuring maximum concurrency for Amazon SQS event sources](https://docs.aws.amazon.com/lambda/latest/dg/with-sqs.html#events-sqs-max-concurrency) .
185
+ * This property is for Amazon SQS event sources only. You cannot use `ProvisionedPollerConfig` while using `ScalingConfig` . These options are mutually exclusive. To remove the scaling configuration, pass an empty value.
185
186
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-eventsourcemapping.html#cfn-lambda-eventsourcemapping-scalingconfig}
186
187
  */
187
188
  ScalingConfig?: ScalingConfig | undefined;
@@ -220,7 +221,7 @@ export type LambdaEventSourceMappingProps = {
220
221
  /**
221
222
  * A list of tags to add to the event source mapping.
222
223
  *
223
- * > You must have the `lambda:TagResource` , `lambda:UntagResource` , and `lambda:ListTags` permissions for your [IAM principal](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts.html) to manage the AWS CloudFormation stack. If you don't have these permissions, there might be unexpected behavior with stack-level tags propagating to the resource during resource creation and update.
224
+ * > You must have the `lambda:TagResource` , `lambda:UntagResource` , and `lambda:ListTags` permissions for your [IAM principal](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts.html) to manage the CloudFormation stack. If you don't have these permissions, there might be unexpected behavior with stack-level tags propagating to the resource during resource creation and update.
224
225
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-eventsourcemapping.html#cfn-lambda-eventsourcemapping-tags}
225
226
  */
226
227
  Tags?: Tag[] | undefined;
@@ -347,11 +348,12 @@ export type FilterCriteria = {
347
348
  Filters?: Filter[] | undefined;
348
349
  };
349
350
  /**
351
+ * The function's Amazon CloudWatch Logs configuration settings.
350
352
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-lambda-eventsourcemapping-loggingconfig.html}
351
353
  */
352
354
  export type LoggingConfig = {
353
355
  /**
354
- * Event source mapping log granularity level override
356
+ * Set this property to filter the system logs for your function that Lambda sends to CloudWatch. Lambda only sends system logs at the selected level of detail and lower, where `DEBUG` is the highest level and `WARN` is the lowest.
355
357
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-lambda-eventsourcemapping-loggingconfig.html#cfn-lambda-eventsourcemapping-loggingconfig-systemloglevel}
356
358
  */
357
359
  SystemLogLevel?: "DEBUG" | "INFO" | "WARN" | undefined;
@@ -388,19 +390,19 @@ export type OnFailure = {
388
390
  Destination?: string | undefined;
389
391
  };
390
392
  /**
391
- * The [provisioned mode](https://docs.aws.amazon.com/lambda/latest/dg/invocation-eventsourcemapping.html#invocation-eventsourcemapping-provisioned-mode) configuration for the event source. Use provisioned mode to customize the minimum and maximum number of event pollers for your event source.
393
+ * The [provisioned mode](https://docs.aws.amazon.com/lambda/latest/dg/invocation-eventsourcemapping.html#invocation-eventsourcemapping-provisioned-mode) configuration for the event source. Use Provisioned Mode to customize the minimum and maximum number of event pollers for your event source.
392
394
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-lambda-eventsourcemapping-provisionedpollerconfig.html}
393
395
  */
394
396
  export type ProvisionedPollerConfig = {
395
397
  /**
396
- * The maximum number of event pollers this event source can scale up to.
398
+ * The maximum number of event pollers this event source can scale up to. For Amazon SQS events source mappings, default is 200, and minimum value allowed is 2. For Amazon MSK and self-managed Apache Kafka event source mappings, default is 200, and minimum value allowed is 1.
397
399
  * @min 1
398
400
  * @max 2000
399
401
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-lambda-eventsourcemapping-provisionedpollerconfig.html#cfn-lambda-eventsourcemapping-provisionedpollerconfig-maximumpollers}
400
402
  */
401
403
  MaximumPollers?: number | undefined;
402
404
  /**
403
- * The minimum number of event pollers this event source can scale down to.
405
+ * The minimum number of event pollers this event source can scale down to. For Amazon SQS events source mappings, default is 2, and minimum 2 required. For Amazon MSK and self-managed Apache Kafka event source mappings, default is 1.
404
406
  * @min 1
405
407
  * @max 200
406
408
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-lambda-eventsourcemapping-provisionedpollerconfig.html#cfn-lambda-eventsourcemapping-provisionedpollerconfig-minimumpollers}
@@ -83,7 +83,7 @@ export type LambdaFunctionProps = {
83
83
  */
84
84
  FileSystemConfigs?: FileSystemConfig[] | undefined;
85
85
  /**
86
- * The name of the Lambda function, up to 64 characters in length. If you don't specify a name, AWS CloudFormation generates one.
86
+ * The name of the Lambda function, up to 64 characters in length. If you don't specify a name, CloudFormation generates one.
87
87
  *
88
88
  * If you specify a name, you cannot perform updates that require replacement of this resource. You can perform updates that require no or some interruption. If you must replace the resource, specify a new name.
89
89
  * @minLength 1
@@ -103,7 +103,7 @@ export type LambdaFunctionProps = {
103
103
  */
104
104
  ImageConfig?: ImageConfig | undefined;
105
105
  /**
106
- * The ARN of the AWS Key Management Service ( AWS KMS ) customer managed key that's used to encrypt the following resources:
106
+ * The ARN of the AWS Key Management Service ( AWS ) customer managed key that's used to encrypt the following resources:
107
107
  *
108
108
  * - The function's [environment variables](https://docs.aws.amazon.com/lambda/latest/dg/configuration-envvars.html#configuration-envvars-encryption) .
109
109
  * - The function's [Lambda SnapStart](https://docs.aws.amazon.com/lambda/latest/dg/snapstart-security.html) snapshots.
@@ -178,10 +178,15 @@ export type LambdaFunctionProps = {
178
178
  /**
179
179
  * A list of [tags](https://docs.aws.amazon.com/lambda/latest/dg/tagging.html) to apply to the function.
180
180
  *
181
- * > You must have the `lambda:TagResource` , `lambda:UntagResource` , and `lambda:ListTags` permissions for your [IAM principal](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts.html) to manage the AWS CloudFormation stack. If you don't have these permissions, there might be unexpected behavior with stack-level tags propagating to the resource during resource creation and update.
181
+ * > You must have the `lambda:TagResource` , `lambda:UntagResource` , and `lambda:ListTags` permissions for your [IAM principal](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts.html) to manage the CloudFormation stack. If you don't have these permissions, there might be unexpected behavior with stack-level tags propagating to the resource during resource creation and update.
182
182
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-function.html#cfn-lambda-function-tags}
183
183
  */
184
184
  Tags?: Tag[] | undefined;
185
+ /**
186
+ * The function's tenant isolation configuration settings. Determines whether the Lambda function runs on a shared or dedicated infrastructure per unique tenant.
187
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-function.html#cfn-lambda-function-tenancyconfig}
188
+ */
189
+ TenancyConfig?: TenancyConfig | undefined;
185
190
  /**
186
191
  * The amount of time (in seconds) that Lambda allows a function to run before stopping it. The default is 3 seconds. The maximum allowed value is 900 seconds. For more information, see [Lambda execution environment](https://docs.aws.amazon.com/lambda/latest/dg/runtimes-context.html) .
187
192
  * @min 1
@@ -222,7 +227,7 @@ export type LambdaFunctionAttribs = {
222
227
  /**
223
228
  * The [deployment package](https://docs.aws.amazon.com/lambda/latest/dg/gettingstarted-package.html) for a Lambda function. To deploy a function defined as a container image, you specify the location of a container image in the Amazon ECR registry. For a .zip file deployment package, you can specify the location of an object in Amazon S3. For Node.js and Python functions, you can specify the function code inline in the template.
224
229
  *
225
- * > When you specify source code inline for a Node.js function, the `index` file that AWS CloudFormation creates uses the extension `.js` . This means that Lambda treats the file as a CommonJS module. ES modules aren't supported for inline functions.
230
+ * > When you specify source code inline for a Node.js function, the `index` file that CloudFormation creates uses the extension `.js` . This means that Lambda treats the file as a CommonJS module. ES modules aren't supported for inline functions.
226
231
  *
227
232
  * Changes to a deployment package in Amazon S3 or a container image in ECR are not detected automatically during stack updates. To update the function code, change the object key or version in the template.
228
233
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-lambda-function-code.html}
@@ -256,15 +261,15 @@ export type Code = {
256
261
  */
257
262
  S3ObjectVersion?: string | undefined;
258
263
  /**
259
- * The ARN of the AWS Key Management Service ( AWS KMS ) customer managed key that's used to encrypt your function's .zip deployment package. If you don't provide a customer managed key, Lambda uses an [AWS owned key](https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-owned-cmk) .
264
+ * The ARN of the AWS Key Management Service ( AWS ) customer managed key that's used to encrypt your function's .zip deployment package. If you don't provide a customer managed key, Lambda uses an [AWS owned key](https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-owned-cmk) .
260
265
  * @pattern ^(arn:(aws[a-zA-Z-]*)?:[a-z0-9-.]+:.*)|()$
261
266
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-lambda-function-code.html#cfn-lambda-function-code-sourcekmskeyarn}
262
267
  */
263
268
  SourceKMSKeyArn?: string | undefined;
264
269
  /**
265
- * (Node.js and Python) The source code of your Lambda function. If you include your function source inline with this parameter, AWS CloudFormation places it in a file named `index` and zips it to create a [deployment package](https://docs.aws.amazon.com/lambda/latest/dg/gettingstarted-package.html) . This zip file cannot exceed 4MB. For the `Handler` property, the first part of the handler identifier must be `index` . For example, `index.handler` .
270
+ * (Node.js and Python) The source code of your Lambda function. If you include your function source inline with this parameter, CloudFormation places it in a file named `index` and zips it to create a [deployment package](https://docs.aws.amazon.com/lambda/latest/dg/gettingstarted-package.html) . This zip file cannot exceed 4MB. For the `Handler` property, the first part of the handler identifier must be `index` . For example, `index.handler` .
266
271
  *
267
- * > When you specify source code inline for a Node.js function, the `index` file that AWS CloudFormation creates uses the extension `.js` . This means that Lambda treats the file as a CommonJS module. ES modules aren't supported for inline functions.
272
+ * > When you specify source code inline for a Node.js function, the `index` file that CloudFormation creates uses the extension `.js` . This means that Lambda treats the file as a CommonJS module. ES modules aren't supported for inline functions.
268
273
  *
269
274
  * For JSON, you must escape quotes and special characters such as newline ( `\n` ) with a backslash.
270
275
  *
@@ -421,6 +426,17 @@ export type SnapStart = {
421
426
  */
422
427
  ApplyOn: "PublishedVersions" | "None";
423
428
  };
429
+ /**
430
+ * Specifies the tenant isolation mode configuration for a Lambda function. This allows you to configure specific tenant isolation strategies for your function invocations. Tenant isolation configuration cannot be modified after function creation.
431
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-lambda-function-tenancyconfig.html}
432
+ */
433
+ export type TenancyConfig = {
434
+ /**
435
+ * Tenant isolation mode allows for invocation to be sent to a corresponding execution environment dedicated to a specific tenant ID.
436
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-lambda-function-tenancyconfig.html#cfn-lambda-function-tenancyconfig-tenantisolationmode}
437
+ */
438
+ TenantIsolationMode: "PER_TENANT";
439
+ };
424
440
  /**
425
441
  * The function's [AWS X-Ray](https://docs.aws.amazon.com/lambda/latest/dg/services-xray.html) tracing configuration. To sample and record incoming requests, set `Mode` to `Active` .
426
442
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-lambda-function-tracingconfig.html}
@@ -435,9 +451,9 @@ export type TracingConfig = {
435
451
  /**
436
452
  * The VPC security groups and subnets that are attached to a Lambda function. When you connect a function to a VPC, Lambda creates an elastic network interface for each combination of security group and subnet in the function's VPC configuration. The function can only access resources and the internet through that VPC. For more information, see [VPC Settings](https://docs.aws.amazon.com/lambda/latest/dg/configuration-vpc.html) .
437
453
  *
438
- * > When you delete a function, AWS CloudFormation monitors the state of its network interfaces and waits for Lambda to delete them before proceeding. If the VPC is defined in the same stack, the network interfaces need to be deleted by Lambda before AWS CloudFormation can delete the VPC's resources.
454
+ * > When you delete a function, CloudFormation monitors the state of its network interfaces and waits for Lambda to delete them before proceeding. If the VPC is defined in the same stack, the network interfaces need to be deleted by Lambda before CloudFormation can delete the VPC's resources.
439
455
  * >
440
- * > To monitor network interfaces, AWS CloudFormation needs the `ec2:DescribeNetworkInterfaces` permission. It obtains this from the user or role that modifies the stack. If you don't provide this permission, AWS CloudFormation does not wait for network interfaces to be deleted.
456
+ * > To monitor network interfaces, CloudFormation needs the `ec2:DescribeNetworkInterfaces` permission. It obtains this from the user or role that modifies the stack. If you don't provide this permission, CloudFormation does not wait for network interfaces to be deleted.
441
457
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-lambda-function-vpcconfig.html}
442
458
  */
443
459
  export type VpcConfig = {
@@ -1,6 +1,6 @@
1
1
  import type { ResourceDefinitionWithAttributes, Tag } from "../main.ts";
2
2
  /**
3
- * > Amazon Lex V2 is the only supported version in AWS CloudFormation .
3
+ * > Amazon Lex V2 is the only supported version in CloudFormation .
4
4
  *
5
5
  * Specifies an Amazon Lex conversational bot.
6
6
  *
@@ -9,7 +9,7 @@ import type { ResourceDefinitionWithAttributes, Tag } from "../main.ts";
9
9
  */
10
10
  export type LexBot = ResourceDefinitionWithAttributes<"AWS::Lex::Bot", LexBotProps, LexBotAttribs>;
11
11
  /**
12
- * > Amazon Lex V2 is the only supported version in AWS CloudFormation .
12
+ * > Amazon Lex V2 is the only supported version in CloudFormation .
13
13
  *
14
14
  * Specifies an Amazon Lex conversational bot.
15
15
  *
@@ -853,7 +853,7 @@ export type GrammarSlotTypeSetting = {
853
853
  */
854
854
  export type GrammarSlotTypeSource = {
855
855
  /**
856
- * The AWS KMS key required to decrypt the contents of the grammar, if any.
856
+ * The AWS key required to decrypt the contents of the grammar, if any.
857
857
  * @minLength 20
858
858
  * @maxLength 2048
859
859
  * @pattern ^arn:[\w\-]+:kms:[\w\-]+:[\d]{12}:(?:key\/[\w\-]+|alias\/[a-zA-Z0-9:\/_\-]{1,256})$
@@ -1,6 +1,6 @@
1
1
  import type { ResourceDefinitionWithAttributes, Tag } from "../main.ts";
2
2
  /**
3
- * > Amazon Lex V2 is the only supported version in AWS CloudFormation .
3
+ * > Amazon Lex V2 is the only supported version in CloudFormation .
4
4
  *
5
5
  * Specifies an alias for the specified version of a bot. Use an alias to enable you to change the version of a bot without updating applications that use the bot.
6
6
  *
@@ -9,7 +9,7 @@ import type { ResourceDefinitionWithAttributes, Tag } from "../main.ts";
9
9
  */
10
10
  export type LexBotAlias = ResourceDefinitionWithAttributes<"AWS::Lex::BotAlias", LexBotAliasProps, LexBotAliasAttribs>;
11
11
  /**
12
- * > Amazon Lex V2 is the only supported version in AWS CloudFormation .
12
+ * > Amazon Lex V2 is the only supported version in CloudFormation .
13
13
  *
14
14
  * Specifies an alias for the specified version of a bot. Use an alias to enable you to change the version of a bot without updating applications that use the bot.
15
15
  *
@@ -1,6 +1,6 @@
1
1
  import type { ResourceDefinitionWithAttributes } from "../main.ts";
2
2
  /**
3
- * > Amazon Lex V2 is the only supported version in AWS CloudFormation .
3
+ * > Amazon Lex V2 is the only supported version in CloudFormation .
4
4
  *
5
5
  * Specifies a new version of the bot based on the `DRAFT` version. If the `DRAFT` version of this resource hasn't changed since you created the last version, Amazon Lex doesn't create a new version, it returns the last created version.
6
6
  *
@@ -9,7 +9,7 @@ import type { ResourceDefinitionWithAttributes } from "../main.ts";
9
9
  */
10
10
  export type LexBotVersion = ResourceDefinitionWithAttributes<"AWS::Lex::BotVersion", LexBotVersionProps, LexBotVersionAttribs>;
11
11
  /**
12
- * > Amazon Lex V2 is the only supported version in AWS CloudFormation .
12
+ * > Amazon Lex V2 is the only supported version in CloudFormation .
13
13
  *
14
14
  * Specifies a new version of the bot based on the `DRAFT` version. If the `DRAFT` version of this resource hasn't changed since you created the last version, Amazon Lex doesn't create a new version, it returns the last created version.
15
15
  *
@@ -1,13 +1,13 @@
1
1
  import type { ResourceDefinitionWithAttributes, PolicyDocument } from "../main.ts";
2
2
  /**
3
- * > Amazon Lex V2 is the only supported version in AWS CloudFormation .
3
+ * > Amazon Lex V2 is the only supported version in CloudFormation .
4
4
  *
5
5
  * Specifies a new resource policy with the specified policy statements.
6
6
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lex-resourcepolicy.html}
7
7
  */
8
8
  export type LexResourcePolicy = ResourceDefinitionWithAttributes<"AWS::Lex::ResourcePolicy", LexResourcePolicyProps, LexResourcePolicyAttribs>;
9
9
  /**
10
- * > Amazon Lex V2 is the only supported version in AWS CloudFormation .
10
+ * > Amazon Lex V2 is the only supported version in CloudFormation .
11
11
  *
12
12
  * Specifies a new resource policy with the specified policy statements.
13
13
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lex-resourcepolicy.html}