@propulsionworks/cloudformation 0.1.35 → 0.1.37

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (306) hide show
  1. package/out/exports/resources.generated/alexa-ask-skill.d.ts +1 -1
  2. package/out/exports/resources.generated/aws-aiops-investigationgroup.d.ts +4 -4
  3. package/out/exports/resources.generated/aws-amazonmq-broker.d.ts +2 -2
  4. package/out/exports/resources.generated/aws-amplify-branch.d.ts +2 -2
  5. package/out/exports/resources.generated/aws-apigateway-apikey.d.ts +1 -1
  6. package/out/exports/resources.generated/aws-apigateway-domainname.d.ts +6 -1
  7. package/out/exports/resources.generated/aws-apigateway-domainnamev2.d.ts +6 -1
  8. package/out/exports/resources.generated/aws-apigateway-method.d.ts +11 -0
  9. package/out/exports/resources.generated/aws-apigateway-model.d.ts +1 -1
  10. package/out/exports/resources.generated/aws-apigateway-restapi.d.ts +10 -0
  11. package/out/exports/resources.generated/aws-appconfig-configurationprofile.d.ts +1 -1
  12. package/out/exports/resources.generated/aws-appflow-connectorprofile.d.ts +2 -2
  13. package/out/exports/resources.generated/aws-appflow-flow.d.ts +2 -2
  14. package/out/exports/resources.generated/aws-apprunner-observabilityconfiguration.d.ts +1 -1
  15. package/out/exports/resources.generated/aws-apprunner-service.d.ts +1 -1
  16. package/out/exports/resources.generated/aws-apprunner-vpcconnector.d.ts +1 -1
  17. package/out/exports/resources.generated/aws-appsync-functionconfiguration.d.ts +2 -2
  18. package/out/exports/resources.generated/aws-aps-resourcepolicy.d.ts +2 -2
  19. package/out/exports/resources.generated/aws-aps-workspace.d.ts +1 -1
  20. package/out/exports/resources.generated/aws-athena-workgroup.d.ts +159 -1
  21. package/out/exports/resources.generated/aws-backup-backupplan.d.ts +6 -2
  22. package/out/exports/resources.generated/aws-backup-backupselection.d.ts +2 -2
  23. package/out/exports/resources.generated/aws-backup-backupvault.d.ts +2 -2
  24. package/out/exports/resources.generated/aws-backup-framework.d.ts +2 -2
  25. package/out/exports/resources.generated/aws-backup-logicallyairgappedbackupvault.d.ts +5 -5
  26. package/out/exports/resources.generated/aws-backup-reportplan.d.ts +2 -2
  27. package/out/exports/resources.generated/aws-batch-computeenvironment.d.ts +1 -1
  28. package/out/exports/resources.generated/aws-bedrock-agent.d.ts +1 -1
  29. package/out/exports/resources.generated/aws-bedrock-blueprint.d.ts +1 -1
  30. package/out/exports/resources.generated/aws-bedrock-dataautomationproject.d.ts +36 -2
  31. package/out/exports/resources.generated/aws-bedrock-datasource.d.ts +1 -1
  32. package/out/exports/resources.generated/aws-bedrock-guardrail.d.ts +3 -3
  33. package/out/exports/resources.generated/aws-bedrock-knowledgebase.d.ts +115 -3
  34. package/out/exports/resources.generated/aws-billingconductor-billinggroup.d.ts +3 -101
  35. package/out/exports/resources.generated/aws-billingconductor-customlineitem.d.ts +1 -1
  36. package/out/exports/resources.generated/aws-cassandra-table.d.ts +21 -0
  37. package/out/exports/resources.generated/aws-ce-anomalymonitor.d.ts +10 -2
  38. package/out/exports/resources.generated/aws-chatbot-microsoftteamschannelconfiguration.d.ts +2 -2
  39. package/out/exports/resources.generated/aws-chatbot-slackchannelconfiguration.d.ts +2 -2
  40. package/out/exports/resources.generated/aws-cloudformation-customresource.d.ts +5 -5
  41. package/out/exports/resources.generated/aws-cloudformation-guardhook.d.ts +3 -3
  42. package/out/exports/resources.generated/aws-cloudformation-hookdefaultversion.d.ts +2 -2
  43. package/out/exports/resources.generated/aws-cloudformation-hooktypeconfig.d.ts +2 -2
  44. package/out/exports/resources.generated/aws-cloudformation-hookversion.d.ts +3 -3
  45. package/out/exports/resources.generated/aws-cloudformation-lambdahook.d.ts +3 -3
  46. package/out/exports/resources.generated/aws-cloudformation-macro.d.ts +2 -2
  47. package/out/exports/resources.generated/aws-cloudformation-moduledefaultversion.d.ts +4 -4
  48. package/out/exports/resources.generated/aws-cloudformation-moduleversion.d.ts +3 -3
  49. package/out/exports/resources.generated/aws-cloudformation-publictypeversion.d.ts +4 -4
  50. package/out/exports/resources.generated/aws-cloudformation-publisher.d.ts +2 -2
  51. package/out/exports/resources.generated/aws-cloudformation-resourcedefaultversion.d.ts +2 -2
  52. package/out/exports/resources.generated/aws-cloudformation-resourceversion.d.ts +3 -3
  53. package/out/exports/resources.generated/aws-cloudformation-stack.d.ts +4 -4
  54. package/out/exports/resources.generated/aws-cloudformation-stackset.d.ts +19 -14
  55. package/out/exports/resources.generated/aws-cloudformation-typeactivation.d.ts +2 -2
  56. package/out/exports/resources.generated/aws-cloudformation-waitcondition.d.ts +4 -4
  57. package/out/exports/resources.generated/aws-cloudformation-waitconditionhandle.d.ts +2 -2
  58. package/out/exports/resources.generated/aws-cloudfront-connectionfunction.d.ts +113 -0
  59. package/out/exports/resources.generated/aws-cloudfront-distribution.d.ts +63 -0
  60. package/out/exports/resources.generated/aws-cloudfront-truststore.d.ts +101 -0
  61. package/out/exports/resources.generated/aws-cloudtrail-eventdatastore.d.ts +2 -2
  62. package/out/exports/resources.generated/aws-cloudtrail-trail.d.ts +43 -4
  63. package/out/exports/resources.generated/aws-cloudwatch-alarm.d.ts +1 -1
  64. package/out/exports/resources.generated/aws-codebuild-sourcecredential.d.ts +2 -2
  65. package/out/exports/resources.generated/aws-codecommit-repository.d.ts +1 -1
  66. package/out/exports/resources.generated/aws-codeconnections-connection.d.ts +2 -2
  67. package/out/exports/resources.generated/aws-codedeploy-application.d.ts +1 -1
  68. package/out/exports/resources.generated/aws-codedeploy-deploymentconfig.d.ts +1 -1
  69. package/out/exports/resources.generated/aws-codedeploy-deploymentgroup.d.ts +15 -15
  70. package/out/exports/resources.generated/aws-codepipeline-pipeline.d.ts +1 -1
  71. package/out/exports/resources.generated/aws-codestar-githubrepository.d.ts +4 -4
  72. package/out/exports/resources.generated/aws-codestarconnections-connection.d.ts +2 -2
  73. package/out/exports/resources.generated/aws-codestarnotifications-notificationrule.d.ts +2 -2
  74. package/out/exports/resources.generated/aws-cognito-identitypool.d.ts +2 -2
  75. package/out/exports/resources.generated/aws-cognito-terms.d.ts +85 -0
  76. package/out/exports/resources.generated/aws-comprehend-documentclassifier.d.ts +1 -1
  77. package/out/exports/resources.generated/aws-comprehend-flywheel.d.ts +3 -3
  78. package/out/exports/resources.generated/aws-config-configrule.d.ts +1 -1
  79. package/out/exports/resources.generated/aws-config-configurationrecorder.d.ts +2 -2
  80. package/out/exports/resources.generated/aws-config-deliverychannel.d.ts +8 -8
  81. package/out/exports/resources.generated/aws-connect-evaluationform.d.ts +3 -3
  82. package/out/exports/resources.generated/aws-customerprofiles-domain.d.ts +16 -0
  83. package/out/exports/resources.generated/aws-customerprofiles-segmentdefinition.d.ts +14 -2
  84. package/out/exports/resources.generated/aws-databrew-job.d.ts +1 -1
  85. package/out/exports/resources.generated/aws-deadline-fleet.d.ts +12 -16
  86. package/out/exports/resources.generated/aws-deadline-monitor.d.ts +3 -3
  87. package/out/exports/resources.generated/aws-directoryservice-microsoftad.d.ts +6 -6
  88. package/out/exports/resources.generated/aws-directoryservice-simplead.d.ts +6 -6
  89. package/out/exports/resources.generated/aws-dms-dataprovider.d.ts +1 -1
  90. package/out/exports/resources.generated/aws-dms-endpoint.d.ts +4 -4
  91. package/out/exports/resources.generated/aws-dms-eventsubscription.d.ts +1 -1
  92. package/out/exports/resources.generated/aws-dms-instanceprofile.d.ts +1 -1
  93. package/out/exports/resources.generated/aws-dms-replicationconfig.d.ts +2 -2
  94. package/out/exports/resources.generated/aws-dms-replicationinstance.d.ts +2 -2
  95. package/out/exports/resources.generated/aws-dms-replicationsubnetgroup.d.ts +1 -1
  96. package/out/exports/resources.generated/aws-docdb-dbcluster.d.ts +3 -3
  97. package/out/exports/resources.generated/aws-dsql-cluster.d.ts +6 -1
  98. package/out/exports/resources.generated/aws-dynamodb-globaltable.d.ts +3 -3
  99. package/out/exports/resources.generated/aws-dynamodb-table.d.ts +3 -3
  100. package/out/exports/resources.generated/aws-ec2-capacityreservation.d.ts +1 -1
  101. package/out/exports/resources.generated/aws-ec2-ec2fleet.d.ts +8 -0
  102. package/out/exports/resources.generated/aws-ec2-instanceconnectendpoint.d.ts +2 -2
  103. package/out/exports/resources.generated/aws-ec2-ipamscope.d.ts +1 -1
  104. package/out/exports/resources.generated/aws-ec2-keypair.d.ts +4 -4
  105. package/out/exports/resources.generated/aws-ec2-launchtemplate.d.ts +10 -2
  106. package/out/exports/resources.generated/aws-ec2-natgateway.d.ts +68 -0
  107. package/out/exports/resources.generated/aws-ec2-securitygroup.d.ts +2 -2
  108. package/out/exports/resources.generated/aws-ec2-spotfleet.d.ts +8 -0
  109. package/out/exports/resources.generated/aws-ec2-transitgateway.d.ts +6 -0
  110. package/out/exports/resources.generated/aws-ec2-transitgatewaymeteringpolicy.d.ts +48 -0
  111. package/out/exports/resources.generated/aws-ec2-transitgatewaymeteringpolicyentry.d.ts +96 -0
  112. package/out/exports/resources.generated/aws-ec2-volume.d.ts +136 -67
  113. package/out/exports/resources.generated/aws-ec2-vpcencryptioncontrol.d.ts +172 -0
  114. package/out/exports/resources.generated/aws-ec2-vpcendpoint.d.ts +10 -0
  115. package/out/exports/resources.generated/aws-ec2-vpnconcentrator.d.ts +43 -0
  116. package/out/exports/resources.generated/aws-ec2-vpnconnection.d.ts +28 -0
  117. package/out/exports/resources.generated/aws-ecr-pulltimeupdateexclusion.d.ts +18 -0
  118. package/out/exports/resources.generated/aws-ecr-repository.d.ts +4 -4
  119. package/out/exports/resources.generated/aws-ecr-repositorycreationtemplate.d.ts +4 -4
  120. package/out/exports/resources.generated/aws-ecr-signingconfiguration.d.ts +74 -0
  121. package/out/exports/resources.generated/aws-ecs-capacityprovider.d.ts +12 -0
  122. package/out/exports/resources.generated/aws-ecs-expressgatewayservice.d.ts +274 -0
  123. package/out/exports/resources.generated/aws-ecs-service.d.ts +20 -18
  124. package/out/exports/resources.generated/aws-ecs-taskdefinition.d.ts +1 -1
  125. package/out/exports/resources.generated/aws-eks-capability.d.ts +189 -0
  126. package/out/exports/resources.generated/aws-eks-cluster.d.ts +21 -5
  127. package/out/exports/resources.generated/aws-eks-nodegroup.d.ts +3 -3
  128. package/out/exports/resources.generated/aws-elasticache-cachecluster.d.ts +1 -1
  129. package/out/exports/resources.generated/aws-elasticloadbalancingv2-listener.d.ts +6 -1
  130. package/out/exports/resources.generated/aws-elasticloadbalancingv2-listenerrule.d.ts +5 -0
  131. package/out/exports/resources.generated/aws-elasticloadbalancingv2-loadbalancer.d.ts +3 -0
  132. package/out/exports/resources.generated/aws-elasticloadbalancingv2-targetgroup.d.ts +14 -7
  133. package/out/exports/resources.generated/aws-elasticsearch-domain.d.ts +1 -1
  134. package/out/exports/resources.generated/aws-emr-studio.d.ts +1 -1
  135. package/out/exports/resources.generated/aws-entityresolution-idmappingworkflow.d.ts +1 -1
  136. package/out/exports/resources.generated/aws-events-archive.d.ts +1 -1
  137. package/out/exports/resources.generated/aws-events-connection.d.ts +1 -1
  138. package/out/exports/resources.generated/aws-events-eventbus.d.ts +1 -1
  139. package/out/exports/resources.generated/aws-evidently-experiment.d.ts +6 -6
  140. package/out/exports/resources.generated/aws-evidently-launch.d.ts +2 -2
  141. package/out/exports/resources.generated/aws-fms-notificationchannel.d.ts +1 -1
  142. package/out/exports/resources.generated/aws-fsx-filesystem.d.ts +15 -3
  143. package/out/exports/resources.generated/aws-fsx-storagevirtualmachine.d.ts +12 -0
  144. package/out/exports/resources.generated/aws-gamelift-containergroupdefinition.d.ts +1 -1
  145. package/out/exports/resources.generated/aws-glue-connection.d.ts +0 -30
  146. package/out/exports/resources.generated/aws-glue-datacatalogencryptionsettings.d.ts +5 -5
  147. package/out/exports/resources.generated/aws-glue-integration.d.ts +119 -0
  148. package/out/exports/resources.generated/aws-glue-integrationresourceproperty.d.ts +3 -3
  149. package/out/exports/resources.generated/aws-greengrass-connectordefinition.d.ts +3 -3
  150. package/out/exports/resources.generated/aws-greengrass-connectordefinitionversion.d.ts +1 -1
  151. package/out/exports/resources.generated/aws-greengrass-coredefinition.d.ts +3 -3
  152. package/out/exports/resources.generated/aws-greengrass-coredefinitionversion.d.ts +1 -1
  153. package/out/exports/resources.generated/aws-greengrass-devicedefinition.d.ts +3 -3
  154. package/out/exports/resources.generated/aws-greengrass-devicedefinitionversion.d.ts +1 -1
  155. package/out/exports/resources.generated/aws-greengrass-functiondefinition.d.ts +9 -9
  156. package/out/exports/resources.generated/aws-greengrass-functiondefinitionversion.d.ts +7 -7
  157. package/out/exports/resources.generated/aws-greengrass-group.d.ts +6 -6
  158. package/out/exports/resources.generated/aws-greengrass-loggerdefinition.d.ts +3 -3
  159. package/out/exports/resources.generated/aws-greengrass-loggerdefinitionversion.d.ts +1 -1
  160. package/out/exports/resources.generated/aws-greengrass-resourcedefinition.d.ts +14 -14
  161. package/out/exports/resources.generated/aws-greengrass-resourcedefinitionversion.d.ts +11 -11
  162. package/out/exports/resources.generated/aws-greengrass-subscriptiondefinition.d.ts +3 -3
  163. package/out/exports/resources.generated/aws-greengrass-subscriptiondefinitionversion.d.ts +1 -1
  164. package/out/exports/resources.generated/aws-greengrassv2-componentversion.d.ts +1 -1
  165. package/out/exports/resources.generated/aws-greengrassv2-deployment.d.ts +1 -1
  166. package/out/exports/resources.generated/aws-iam-group.d.ts +2 -2
  167. package/out/exports/resources.generated/aws-iam-grouppolicy.d.ts +1 -1
  168. package/out/exports/resources.generated/aws-iam-managedpolicy.d.ts +3 -3
  169. package/out/exports/resources.generated/aws-iam-policy.d.ts +2 -2
  170. package/out/exports/resources.generated/aws-iam-role.d.ts +3 -3
  171. package/out/exports/resources.generated/aws-iam-rolepolicy.d.ts +1 -1
  172. package/out/exports/resources.generated/aws-iam-user.d.ts +2 -2
  173. package/out/exports/resources.generated/aws-iam-userpolicy.d.ts +1 -1
  174. package/out/exports/resources.generated/aws-imagebuilder-containerrecipe.d.ts +7 -1
  175. package/out/exports/resources.generated/aws-imagebuilder-image.d.ts +0 -66
  176. package/out/exports/resources.generated/aws-imagebuilder-imagerecipe.d.ts +1 -1
  177. package/out/exports/resources.generated/aws-iot-encryptionconfiguration.d.ts +1 -1
  178. package/out/exports/resources.generated/aws-iot-logging.d.ts +2 -2
  179. package/out/exports/resources.generated/aws-iotevents-detectormodel.d.ts +8 -8
  180. package/out/exports/resources.generated/aws-kendra-datasource.d.ts +1 -1
  181. package/out/exports/resources.generated/aws-kinesisvideo-stream.d.ts +23 -1
  182. package/out/exports/resources.generated/aws-kms-alias.d.ts +6 -6
  183. package/out/exports/resources.generated/aws-kms-key.d.ts +32 -32
  184. package/out/exports/resources.generated/aws-kms-replicakey.d.ts +15 -15
  185. package/out/exports/resources.generated/aws-lakeformation-datalakesettings.d.ts +4 -0
  186. package/out/exports/resources.generated/aws-lambda-capacityprovider.d.ts +179 -0
  187. package/out/exports/resources.generated/aws-lambda-codesigningconfig.d.ts +1 -1
  188. package/out/exports/resources.generated/aws-lambda-eventinvokeconfig.d.ts +3 -3
  189. package/out/exports/resources.generated/aws-lambda-eventsourcemapping.d.ts +16 -13
  190. package/out/exports/resources.generated/aws-lambda-function.d.ts +94 -9
  191. package/out/exports/resources.generated/aws-lambda-version.d.ts +23 -0
  192. package/out/exports/resources.generated/aws-lex-bot.d.ts +3 -3
  193. package/out/exports/resources.generated/aws-lex-botalias.d.ts +2 -2
  194. package/out/exports/resources.generated/aws-lex-botversion.d.ts +2 -2
  195. package/out/exports/resources.generated/aws-lex-resourcepolicy.d.ts +2 -2
  196. package/out/exports/resources.generated/aws-licensemanager-grant.d.ts +2 -2
  197. package/out/exports/resources.generated/aws-licensemanager-license.d.ts +2 -2
  198. package/out/exports/resources.generated/aws-lightsail-container.d.ts +2 -2
  199. package/out/exports/resources.generated/aws-logs-integration.d.ts +1 -1
  200. package/out/exports/resources.generated/aws-logs-loganomalydetector.d.ts +2 -2
  201. package/out/exports/resources.generated/aws-logs-loggroup.d.ts +3 -3
  202. package/out/exports/resources.generated/aws-logs-transformer.d.ts +1 -1
  203. package/out/exports/resources.generated/aws-lookoutequipment-inferencescheduler.d.ts +3 -3
  204. package/out/exports/resources.generated/aws-macie-allowlist.d.ts +2 -2
  205. package/out/exports/resources.generated/aws-mediaconnect-flow.d.ts +3 -2
  206. package/out/exports/resources.generated/aws-mediaconnect-flowentitlement.d.ts +2 -2
  207. package/out/exports/resources.generated/aws-mediaconnect-flowoutput.d.ts +2 -2
  208. package/out/exports/resources.generated/aws-mediaconnect-flowsource.d.ts +1 -1
  209. package/out/exports/resources.generated/aws-mediaconnect-routerinput.d.ts +20 -2
  210. package/out/exports/resources.generated/aws-mediaconnect-routernetworkinterface.d.ts +4 -1
  211. package/out/exports/resources.generated/aws-mediaconnect-routeroutput.d.ts +22 -3
  212. package/out/exports/resources.generated/aws-mediaconvert-jobtemplate.d.ts +2 -2
  213. package/out/exports/resources.generated/aws-mediaconvert-preset.d.ts +2 -2
  214. package/out/exports/resources.generated/aws-mediaconvert-queue.d.ts +1 -1
  215. package/out/exports/resources.generated/aws-mediapackagev2-originendpointpolicy.d.ts +1 -1
  216. package/out/exports/resources.generated/aws-mediastore-container.d.ts +2 -2
  217. package/out/exports/resources.generated/aws-msk-cluster.d.ts +18 -5
  218. package/out/exports/resources.generated/aws-msk-configuration.d.ts +1 -1
  219. package/out/exports/resources.generated/aws-neptune-dbcluster.d.ts +2 -2
  220. package/out/exports/resources.generated/aws-neptune-dbinstance.d.ts +12 -12
  221. package/out/exports/resources.generated/aws-neptune-dbparametergroup.d.ts +1 -1
  222. package/out/exports/resources.generated/aws-networkfirewall-tlsinspectionconfiguration.d.ts +1 -1
  223. package/out/exports/resources.generated/aws-notifications-eventrule.d.ts +1 -1
  224. package/out/exports/resources.generated/aws-oam-link.d.ts +1 -1
  225. package/out/exports/resources.generated/aws-opensearchservice-domain.d.ts +27 -2
  226. package/out/exports/resources.generated/aws-opsworks-stack.d.ts +4 -4
  227. package/out/exports/resources.generated/aws-opsworkscm-server.d.ts +3 -3
  228. package/out/exports/resources.generated/aws-organizations-account.d.ts +10 -10
  229. package/out/exports/resources.generated/aws-organizations-organizationalunit.d.ts +2 -2
  230. package/out/exports/resources.generated/aws-organizations-policy.d.ts +5 -1
  231. package/out/exports/resources.generated/aws-pcs-cluster.d.ts +41 -0
  232. package/out/exports/resources.generated/aws-pipes-pipe.d.ts +1 -1
  233. package/out/exports/resources.generated/aws-qbusiness-application.d.ts +3 -3
  234. package/out/exports/resources.generated/aws-qbusiness-datasource.d.ts +1 -1
  235. package/out/exports/resources.generated/aws-qbusiness-webexperience.d.ts +1 -1
  236. package/out/exports/resources.generated/aws-qldb-ledger.d.ts +2 -2
  237. package/out/exports/resources.generated/aws-rbin-rule.d.ts +11 -4
  238. package/out/exports/resources.generated/aws-refactorspaces-application.d.ts +4 -4
  239. package/out/exports/resources.generated/aws-refactorspaces-route.d.ts +9 -9
  240. package/out/exports/resources.generated/aws-resiliencehub-app.d.ts +1 -1
  241. package/out/exports/resources.generated/aws-route53-keysigningkey.d.ts +1 -1
  242. package/out/exports/resources.generated/aws-rtbfabric-outboundexternallink.d.ts +128 -0
  243. package/out/exports/resources.generated/aws-rum-appmonitor.d.ts +3 -65
  244. package/out/exports/resources.generated/aws-s3-accesspoint.d.ts +1 -1
  245. package/out/exports/resources.generated/aws-s3-bucket.d.ts +43 -8
  246. package/out/exports/resources.generated/aws-s3-storagelens.d.ts +1 -1
  247. package/out/exports/resources.generated/aws-s3objectlambda-accesspoint.d.ts +0 -6
  248. package/out/exports/resources.generated/aws-s3objectlambda-accesspointpolicy.d.ts +0 -2
  249. package/out/exports/resources.generated/aws-s3tables-tablebucket.d.ts +17 -0
  250. package/out/exports/resources.generated/aws-sagemaker-cluster.d.ts +63 -0
  251. package/out/exports/resources.generated/aws-sagemaker-dataqualityjobdefinition.d.ts +1 -1
  252. package/out/exports/resources.generated/aws-sagemaker-domain.d.ts +1 -1
  253. package/out/exports/resources.generated/aws-sagemaker-modelbiasjobdefinition.d.ts +1 -1
  254. package/out/exports/resources.generated/aws-sagemaker-modelexplainabilityjobdefinition.d.ts +1 -1
  255. package/out/exports/resources.generated/aws-sagemaker-modelqualityjobdefinition.d.ts +1 -1
  256. package/out/exports/resources.generated/aws-sagemaker-monitoringschedule.d.ts +1 -1
  257. package/out/exports/resources.generated/aws-sagemaker-partnerapp.d.ts +17 -0
  258. package/out/exports/resources.generated/aws-sagemaker-space.d.ts +1 -1
  259. package/out/exports/resources.generated/aws-sagemaker-userprofile.d.ts +1 -1
  260. package/out/exports/resources.generated/aws-secretsmanager-rotationschedule.d.ts +28 -2
  261. package/out/exports/resources.generated/aws-secretsmanager-secret.d.ts +10 -5
  262. package/out/exports/resources.generated/aws-securityhub-automationrulev2.d.ts +2 -2
  263. package/out/exports/resources.generated/aws-securityhub-findingaggregator.d.ts +1 -1
  264. package/out/exports/resources.generated/aws-securityhub-hub.d.ts +2 -2
  265. package/out/exports/resources.generated/aws-servicecatalog-cloudformationproduct.d.ts +1 -22
  266. package/out/exports/resources.generated/aws-shield-drtaccess.d.ts +4 -4
  267. package/out/exports/resources.generated/aws-shield-proactiveengagement.d.ts +4 -4
  268. package/out/exports/resources.generated/aws-shield-protection.d.ts +6 -6
  269. package/out/exports/resources.generated/aws-shield-protectiongroup.d.ts +2 -2
  270. package/out/exports/resources.generated/aws-simspaceweaver-simulation.d.ts +2 -2
  271. package/out/exports/resources.generated/aws-smsvoice-protectconfiguration.d.ts +1 -1
  272. package/out/exports/resources.generated/aws-sns-subscription.d.ts +11 -11
  273. package/out/exports/resources.generated/aws-sns-topic.d.ts +14 -14
  274. package/out/exports/resources.generated/aws-sns-topicinlinepolicy.d.ts +3 -3
  275. package/out/exports/resources.generated/aws-sns-topicpolicy.d.ts +2 -2
  276. package/out/exports/resources.generated/aws-sqs-queue.d.ts +6 -6
  277. package/out/exports/resources.generated/aws-sqs-queuepolicy.d.ts +2 -2
  278. package/out/exports/resources.generated/aws-ssm-association.d.ts +1 -1
  279. package/out/exports/resources.generated/aws-ssm-document.d.ts +2 -2
  280. package/out/exports/resources.generated/aws-ssmincidents-replicationset.d.ts +2 -2
  281. package/out/exports/resources.generated/aws-ssmincidents-responseplan.d.ts +4 -4
  282. package/out/exports/resources.generated/aws-ssmquicksetup-configurationmanager.d.ts +1 -1
  283. package/out/exports/resources.generated/aws-ssmquicksetup-lifecycleautomation.d.ts +3 -3
  284. package/out/exports/resources.generated/aws-stepfunctions-activity.d.ts +3 -3
  285. package/out/exports/resources.generated/aws-stepfunctions-statemachine.d.ts +3 -3
  286. package/out/exports/resources.generated/aws-synthetics-canary.d.ts +3 -3
  287. package/out/exports/resources.generated/aws-timestream-database.d.ts +3 -3
  288. package/out/exports/resources.generated/aws-transfer-webapp.d.ts +6 -2
  289. package/out/exports/resources.generated/aws-verifiedpermissions-identitysource.d.ts +2 -2
  290. package/out/exports/resources.generated/aws-vpclattice-domainverification.d.ts +51 -0
  291. package/out/exports/resources.generated/aws-vpclattice-resourceconfiguration.d.ts +22 -0
  292. package/out/exports/resources.generated/aws-vpclattice-servicenetworkresourceassociation.d.ts +5 -0
  293. package/out/exports/resources.generated/aws-vpclattice-servicenetworkvpcassociation.d.ts +26 -0
  294. package/out/exports/resources.generated/aws-wafregional-ratebasedrule.d.ts +2 -2
  295. package/out/exports/resources.generated/aws-wafregional-regexpatternset.d.ts +2 -2
  296. package/out/exports/resources.generated/aws-wafv2-ipset.d.ts +1 -1
  297. package/out/exports/resources.generated/aws-wafv2-regexpatternset.d.ts +1 -1
  298. package/out/exports/resources.generated/aws-wafv2-rulegroup.d.ts +1 -1
  299. package/out/exports/resources.generated/aws-wafv2-webacl.d.ts +5 -5
  300. package/out/exports/resources.generated/aws-wafv2-webaclassociation.d.ts +2 -2
  301. package/out/exports/resources.generated/aws-wisdom-aiagent.d.ts +70 -1
  302. package/out/exports/resources.generated/aws-workspaces-workspace.d.ts +2 -2
  303. package/out/exports/resources.generated/aws-workspacesweb-browsersettings.d.ts +5 -0
  304. package/out/exports/resources.generated/aws-workspacesweb-portal.d.ts +1 -1
  305. package/out/exports/resources.generated/aws-workspacesweb-sessionlogger.d.ts +1 -0
  306. package/package.json +1 -1
@@ -2,26 +2,26 @@ import type { ResourceDefinition, Tag } from "../main.ts";
2
2
  /**
3
3
  * The AWS::IoTEvents::DetectorModel resource creates a detector model. You create a *detector model* (a model of your equipment or process) using *states* . For each state, you define conditional (Boolean) logic that evaluates the incoming inputs to detect significant events. When an event is detected, it can change the state or trigger custom-built or predefined actions using other AWS services. You can define additional events that trigger actions when entering or exiting a state and, optionally, when a condition is met. For more information, see [How to Use AWS IoT Events](https://docs.aws.amazon.com/iotevents/latest/developerguide/how-to-use-iotevents.html) in the *AWS IoT Events Developer Guide* .
4
4
  *
5
- * > When you successfully update a detector model (using the AWS IoT Events console, AWS IoT Events API or CLI commands, or AWS CloudFormation ) all detector instances created by the model are reset to their initial states. (The detector's `state` , and the values of any variables and timers are reset.)
5
+ * > When you successfully update a detector model (using the AWS IoT Events console, AWS IoT Events API or CLI commands, or CloudFormation ) all detector instances created by the model are reset to their initial states. (The detector's `state` , and the values of any variables and timers are reset.)
6
6
  * >
7
- * > When you successfully update a detector model (using the AWS IoT Events console, AWS IoT Events API or CLI commands, or AWS CloudFormation ) the version number of the detector model is incremented. (A detector model with version number 1 before the update has version number 2 after the update succeeds.)
7
+ * > When you successfully update a detector model (using the AWS IoT Events console, AWS IoT Events API or CLI commands, or CloudFormation ) the version number of the detector model is incremented. (A detector model with version number 1 before the update has version number 2 after the update succeeds.)
8
8
  * >
9
- * > If you attempt to update a detector model using AWS CloudFormation and the update does not succeed, the system may, in some cases, restore the original detector model. When this occurs, the detector model's version is incremented twice (for example, from version 1 to version 3) and the detector instances are reset.
9
+ * > If you attempt to update a detector model using CloudFormation and the update does not succeed, the system may, in some cases, restore the original detector model. When this occurs, the detector model's version is incremented twice (for example, from version 1 to version 3) and the detector instances are reset.
10
10
  * >
11
- * > Also, be aware that if you attempt to update several detector models at once using AWS CloudFormation , some updates may succeed and others fail. In this case, the effects on each detector model's detector instances and version number depend on whether the update succeeded or failed, with the results as stated.
11
+ * > Also, be aware that if you attempt to update several detector models at once using CloudFormation , some updates may succeed and others fail. In this case, the effects on each detector model's detector instances and version number depend on whether the update succeeded or failed, with the results as stated.
12
12
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iotevents-detectormodel.html}
13
13
  */
14
14
  export type IoTEventsDetectorModel = ResourceDefinition<"AWS::IoTEvents::DetectorModel", IoTEventsDetectorModelProps>;
15
15
  /**
16
16
  * The AWS::IoTEvents::DetectorModel resource creates a detector model. You create a *detector model* (a model of your equipment or process) using *states* . For each state, you define conditional (Boolean) logic that evaluates the incoming inputs to detect significant events. When an event is detected, it can change the state or trigger custom-built or predefined actions using other AWS services. You can define additional events that trigger actions when entering or exiting a state and, optionally, when a condition is met. For more information, see [How to Use AWS IoT Events](https://docs.aws.amazon.com/iotevents/latest/developerguide/how-to-use-iotevents.html) in the *AWS IoT Events Developer Guide* .
17
17
  *
18
- * > When you successfully update a detector model (using the AWS IoT Events console, AWS IoT Events API or CLI commands, or AWS CloudFormation ) all detector instances created by the model are reset to their initial states. (The detector's `state` , and the values of any variables and timers are reset.)
18
+ * > When you successfully update a detector model (using the AWS IoT Events console, AWS IoT Events API or CLI commands, or CloudFormation ) all detector instances created by the model are reset to their initial states. (The detector's `state` , and the values of any variables and timers are reset.)
19
19
  * >
20
- * > When you successfully update a detector model (using the AWS IoT Events console, AWS IoT Events API or CLI commands, or AWS CloudFormation ) the version number of the detector model is incremented. (A detector model with version number 1 before the update has version number 2 after the update succeeds.)
20
+ * > When you successfully update a detector model (using the AWS IoT Events console, AWS IoT Events API or CLI commands, or CloudFormation ) the version number of the detector model is incremented. (A detector model with version number 1 before the update has version number 2 after the update succeeds.)
21
21
  * >
22
- * > If you attempt to update a detector model using AWS CloudFormation and the update does not succeed, the system may, in some cases, restore the original detector model. When this occurs, the detector model's version is incremented twice (for example, from version 1 to version 3) and the detector instances are reset.
22
+ * > If you attempt to update a detector model using CloudFormation and the update does not succeed, the system may, in some cases, restore the original detector model. When this occurs, the detector model's version is incremented twice (for example, from version 1 to version 3) and the detector instances are reset.
23
23
  * >
24
- * > Also, be aware that if you attempt to update several detector models at once using AWS CloudFormation , some updates may succeed and others fail. In this case, the effects on each detector model's detector instances and version number depend on whether the update succeeded or failed, with the results as stated.
24
+ * > Also, be aware that if you attempt to update several detector models at once using CloudFormation , some updates may succeed and others fail. In this case, the effects on each detector model's detector instances and version number depend on whether the update succeeded or failed, with the results as stated.
25
25
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iotevents-detectormodel.html}
26
26
  */
27
27
  export type IoTEventsDetectorModelProps = {
@@ -2293,7 +2293,7 @@ export type WorkDocsConfiguration = {
2293
2293
  /**
2294
2294
  * The identifier of the directory corresponding to your WorkDocs site repository.
2295
2295
  *
2296
- * You can find the organization ID in the [AWS Directory Service](https://docs.aws.amazon.com/directoryservicev2/) by going to *Active Directory* , then *Directories* . Your WorkDocs site directory has an ID, which is the organization ID. You can also set up a new WorkDocs directory in the AWS Directory Service console and enable a WorkDocs site for the directory in the WorkDocs console.
2296
+ * You can find the organization ID in the [Directory Service](https://docs.aws.amazon.com/directoryservicev2/) by going to *Active Directory* , then *Directories* . Your WorkDocs site directory has an ID, which is the organization ID. You can also set up a new WorkDocs directory in the Directory Service console and enable a WorkDocs site for the directory in the WorkDocs console.
2297
2297
  * @minLength 12
2298
2298
  * @maxLength 12
2299
2299
  * @pattern d-[0-9a-fA-F]{10}
@@ -41,7 +41,7 @@ export type KinesisVideoStreamProps = {
41
41
  */
42
42
  DeviceName?: string | undefined;
43
43
  /**
44
- * The ID of the AWS Key Management Service ( AWS KMS ) key that Kinesis Video Streams uses to encrypt data on the stream.
44
+ * The ID of the AWS Key Management Service ( AWS ) key that Kinesis Video Streams uses to encrypt data on the stream.
45
45
  * @minLength 1
46
46
  * @maxLength 2048
47
47
  * @pattern .+
@@ -64,6 +64,11 @@ export type KinesisVideoStreamProps = {
64
64
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kinesisvideo-stream.html#cfn-kinesisvideo-stream-name}
65
65
  */
66
66
  Name?: string | undefined;
67
+ /**
68
+ * The configuration for stream storage, including the default storage tier for stream data. This configuration determines how stream data is stored and accessed, with different tiers offering varying levels of performance and cost optimization.
69
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kinesisvideo-stream.html#cfn-kinesisvideo-stream-streamstorageconfiguration}
70
+ */
71
+ StreamStorageConfiguration?: StreamStorageConfiguration | undefined;
67
72
  /**
68
73
  * An array of key-value pairs to apply to this resource.
69
74
  *
@@ -82,4 +87,21 @@ export type KinesisVideoStreamAttribs = {
82
87
  */
83
88
  Arn: string;
84
89
  };
90
+ /**
91
+ * The configuration for stream storage, including the default storage tier for stream data. This configuration determines how stream data is stored and accessed, with different tiers offering varying levels of performance and cost optimization.
92
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-kinesisvideo-stream-streamstorageconfiguration.html}
93
+ */
94
+ export type StreamStorageConfiguration = {
95
+ /**
96
+ * The default storage tier for the stream data. This setting determines the storage class used for stream data, affecting both performance characteristics and storage costs.
97
+ *
98
+ * Available storage tiers:
99
+ *
100
+ * - `HOT` - Optimized for frequent access with the lowest latency and highest performance. Ideal for real-time applications and frequently accessed data.
101
+ * - `WARM` - Balanced performance and cost for moderately accessed data. Suitable for data that is accessed regularly but not continuously.
102
+ * @default "HOT"
103
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-kinesisvideo-stream-streamstorageconfiguration.html#cfn-kinesisvideo-stream-streamstorageconfiguration-defaultstoragetier}
104
+ */
105
+ DefaultStorageTier?: "HOT" | "WARM" | undefined;
106
+ };
85
107
  //# sourceMappingURL=aws-kinesisvideo-stream.d.ts.map
@@ -1,8 +1,8 @@
1
1
  import type { ResourceDefinition } from "../main.ts";
2
2
  /**
3
- * The `AWS::KMS::Alias` resource specifies a display name for a [KMS key](https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#kms_keys) . You can use an alias to identify a KMS key in the AWS KMS console, in the [DescribeKey](https://docs.aws.amazon.com/kms/latest/APIReference/API_DescribeKey.html) operation, and in [cryptographic operations](https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations) , such as [Decrypt](https://docs.aws.amazon.com/kms/latest/APIReference/API_Decrypt.html) and [GenerateDataKey](https://docs.aws.amazon.com/kms/latest/APIReference/API_GenerateDataKey.html) .
3
+ * The `AWS::KMS::Alias` resource specifies a display name for a [KMS key](https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#kms_keys) . You can use an alias to identify a KMS key in the AWS console, in the [DescribeKey](https://docs.aws.amazon.com/kms/latest/APIReference/API_DescribeKey.html) operation, and in [cryptographic operations](https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations) , such as [Decrypt](https://docs.aws.amazon.com/kms/latest/APIReference/API_Decrypt.html) and [GenerateDataKey](https://docs.aws.amazon.com/kms/latest/APIReference/API_GenerateDataKey.html) .
4
4
  *
5
- * > Adding, deleting, or updating an alias can allow or deny permission to the KMS key. For details, see [ABAC for AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/abac.html) in the *AWS Key Management Service Developer Guide* .
5
+ * > Adding, deleting, or updating an alias can allow or deny permission to the KMS key. For details, see [ABAC for AWS](https://docs.aws.amazon.com/kms/latest/developerguide/abac.html) in the *AWS Key Management Service Developer Guide* .
6
6
  *
7
7
  * Using an alias to refer to a KMS key can help you simplify key management. For example, an alias in your code can be associated with different KMS keys in different AWS Regions . For more information, see [Using aliases](https://docs.aws.amazon.com/kms/latest/developerguide/kms-alias.html) in the *AWS Key Management Service Developer Guide* .
8
8
  *
@@ -15,14 +15,14 @@ import type { ResourceDefinition } from "../main.ts";
15
15
  *
16
16
  * *Regions*
17
17
  *
18
- * AWS KMS CloudFormation resources are available in all AWS Regions in which AWS KMS and AWS CloudFormation are supported.
18
+ * AWS CloudFormation resources are available in all AWS Regions in which AWS and CloudFormation are supported.
19
19
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kms-alias.html}
20
20
  */
21
21
  export type KMSAlias = ResourceDefinition<"AWS::KMS::Alias", KMSAliasProps>;
22
22
  /**
23
- * The `AWS::KMS::Alias` resource specifies a display name for a [KMS key](https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#kms_keys) . You can use an alias to identify a KMS key in the AWS KMS console, in the [DescribeKey](https://docs.aws.amazon.com/kms/latest/APIReference/API_DescribeKey.html) operation, and in [cryptographic operations](https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations) , such as [Decrypt](https://docs.aws.amazon.com/kms/latest/APIReference/API_Decrypt.html) and [GenerateDataKey](https://docs.aws.amazon.com/kms/latest/APIReference/API_GenerateDataKey.html) .
23
+ * The `AWS::KMS::Alias` resource specifies a display name for a [KMS key](https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#kms_keys) . You can use an alias to identify a KMS key in the AWS console, in the [DescribeKey](https://docs.aws.amazon.com/kms/latest/APIReference/API_DescribeKey.html) operation, and in [cryptographic operations](https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations) , such as [Decrypt](https://docs.aws.amazon.com/kms/latest/APIReference/API_Decrypt.html) and [GenerateDataKey](https://docs.aws.amazon.com/kms/latest/APIReference/API_GenerateDataKey.html) .
24
24
  *
25
- * > Adding, deleting, or updating an alias can allow or deny permission to the KMS key. For details, see [ABAC for AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/abac.html) in the *AWS Key Management Service Developer Guide* .
25
+ * > Adding, deleting, or updating an alias can allow or deny permission to the KMS key. For details, see [ABAC for AWS](https://docs.aws.amazon.com/kms/latest/developerguide/abac.html) in the *AWS Key Management Service Developer Guide* .
26
26
  *
27
27
  * Using an alias to refer to a KMS key can help you simplify key management. For example, an alias in your code can be associated with different KMS keys in different AWS Regions . For more information, see [Using aliases](https://docs.aws.amazon.com/kms/latest/developerguide/kms-alias.html) in the *AWS Key Management Service Developer Guide* .
28
28
  *
@@ -35,7 +35,7 @@ export type KMSAlias = ResourceDefinition<"AWS::KMS::Alias", KMSAliasProps>;
35
35
  *
36
36
  * *Regions*
37
37
  *
38
- * AWS KMS CloudFormation resources are available in all AWS Regions in which AWS KMS and AWS CloudFormation are supported.
38
+ * AWS CloudFormation resources are available in all AWS Regions in which AWS and CloudFormation are supported.
39
39
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kms-alias.html}
40
40
  */
41
41
  export type KMSAliasProps = {
@@ -2,42 +2,42 @@ import type { ResourceDefinitionWithAttributes, PolicyDocument, Tag } from "../m
2
2
  /**
3
3
  * The `AWS::KMS::Key` resource specifies an [KMS key](https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#kms_keys) in AWS Key Management Service . You can use this resource to create symmetric encryption KMS keys, asymmetric KMS keys for encryption or signing, and symmetric HMAC KMS keys. You can use `AWS::KMS::Key` to create [multi-Region primary keys](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html#mrk-primary-key) of all supported types. To replicate a multi-Region key, use the `AWS::KMS::ReplicaKey` resource.
4
4
  *
5
- * > If you change the value of the `KeySpec` , `KeyUsage` , `Origin` , or `MultiRegion` properties of an existing KMS key, the update request fails, regardless of the value of the [`UpdateReplacePolicy` attribute](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-attribute-updatereplacepolicy.html) . This prevents you from accidentally deleting a KMS key by changing any of its immutable property values. > AWS KMS replaced the term *customer master key (CMK)* with *AWS KMS key* and *KMS key* . The concept has not changed. To prevent breaking changes, AWS KMS is keeping some variations of this term.
5
+ * > If you change the value of the `KeySpec` , `KeyUsage` , `Origin` , or `MultiRegion` properties of an existing KMS key, the update request fails, regardless of the value of the [`UpdateReplacePolicy` attribute](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-attribute-updatereplacepolicy.html) . This prevents you from accidentally deleting a KMS key by changing any of its immutable property values. > AWS replaced the term *customer master key (CMK)* with *AWS KMS key* and *KMS key* . The concept has not changed. To prevent breaking changes, AWS is keeping some variations of this term.
6
6
  *
7
- * You can use symmetric encryption KMS keys to encrypt and decrypt small amounts of data, but they are more commonly used to generate data keys and data key pairs. You can also use a symmetric encryption KMS key to encrypt data stored in AWS services that are [integrated with AWS KMS](https://docs.aws.amazon.com//kms/features/#AWS_Service_Integration) . For more information, see [Symmetric encryption KMS keys](https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#symmetric-cmks) in the *AWS Key Management Service Developer Guide* .
7
+ * You can use symmetric encryption KMS keys to encrypt and decrypt small amounts of data, but they are more commonly used to generate data keys and data key pairs. You can also use a symmetric encryption KMS key to encrypt data stored in AWS services that are [integrated with AWS](https://docs.aws.amazon.com//kms/features/#AWS_Service_Integration) . For more information, see [Symmetric encryption KMS keys](https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#symmetric-cmks) in the *AWS Key Management Service Developer Guide* .
8
8
  *
9
- * You can use asymmetric KMS keys to encrypt and decrypt data or sign messages and verify signatures. To create an asymmetric key, you must specify an asymmetric `KeySpec` value and a `KeyUsage` value. For details, see [Asymmetric keys in AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html) in the *AWS Key Management Service Developer Guide* .
9
+ * You can use asymmetric KMS keys to encrypt and decrypt data or sign messages and verify signatures. To create an asymmetric key, you must specify an asymmetric `KeySpec` value and a `KeyUsage` value. For details, see [Asymmetric keys in AWS](https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html) in the *AWS Key Management Service Developer Guide* .
10
10
  *
11
- * You can use HMAC KMS keys (which are also symmetric keys) to generate and verify hash-based message authentication codes. To create an HMAC key, you must specify an HMAC `KeySpec` value and a `KeyUsage` value of `GENERATE_VERIFY_MAC` . For details, see [HMAC keys in AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/hmac.html) in the *AWS Key Management Service Developer Guide* .
11
+ * You can use HMAC KMS keys (which are also symmetric keys) to generate and verify hash-based message authentication codes. To create an HMAC key, you must specify an HMAC `KeySpec` value and a `KeyUsage` value of `GENERATE_VERIFY_MAC` . For details, see [HMAC keys in AWS](https://docs.aws.amazon.com/kms/latest/developerguide/hmac.html) in the *AWS Key Management Service Developer Guide* .
12
12
  *
13
- * You can also create symmetric encryption, asymmetric, and HMAC multi-Region primary keys. To create a multi-Region primary key, set the `MultiRegion` property to `true` . For information about multi-Region keys, see [Multi-Region keys in AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the *AWS Key Management Service Developer Guide* .
13
+ * You can also create symmetric encryption, asymmetric, and HMAC multi-Region primary keys. To create a multi-Region primary key, set the `MultiRegion` property to `true` . For information about multi-Region keys, see [Multi-Region keys in AWS](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the *AWS Key Management Service Developer Guide* .
14
14
  *
15
15
  * You cannot use the `AWS::KMS::Key` resource to specify a KMS key with [imported key material](https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html) or a KMS key in a [custom key store](https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html) .
16
16
  *
17
17
  * *Regions*
18
18
  *
19
- * AWS KMS CloudFormation resources are available in all Regions in which AWS KMS and AWS CloudFormation are supported. You can use the `AWS::KMS::Key` resource to create and manage all KMS key types that are supported in a Region.
19
+ * AWS CloudFormation resources are available in all Regions in which AWS and CloudFormation are supported. You can use the `AWS::KMS::Key` resource to create and manage all KMS key types that are supported in a Region.
20
20
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kms-key.html}
21
21
  */
22
22
  export type KMSKey = ResourceDefinitionWithAttributes<"AWS::KMS::Key", KMSKeyProps, KMSKeyAttribs>;
23
23
  /**
24
24
  * The `AWS::KMS::Key` resource specifies an [KMS key](https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#kms_keys) in AWS Key Management Service . You can use this resource to create symmetric encryption KMS keys, asymmetric KMS keys for encryption or signing, and symmetric HMAC KMS keys. You can use `AWS::KMS::Key` to create [multi-Region primary keys](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html#mrk-primary-key) of all supported types. To replicate a multi-Region key, use the `AWS::KMS::ReplicaKey` resource.
25
25
  *
26
- * > If you change the value of the `KeySpec` , `KeyUsage` , `Origin` , or `MultiRegion` properties of an existing KMS key, the update request fails, regardless of the value of the [`UpdateReplacePolicy` attribute](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-attribute-updatereplacepolicy.html) . This prevents you from accidentally deleting a KMS key by changing any of its immutable property values. > AWS KMS replaced the term *customer master key (CMK)* with *AWS KMS key* and *KMS key* . The concept has not changed. To prevent breaking changes, AWS KMS is keeping some variations of this term.
26
+ * > If you change the value of the `KeySpec` , `KeyUsage` , `Origin` , or `MultiRegion` properties of an existing KMS key, the update request fails, regardless of the value of the [`UpdateReplacePolicy` attribute](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-attribute-updatereplacepolicy.html) . This prevents you from accidentally deleting a KMS key by changing any of its immutable property values. > AWS replaced the term *customer master key (CMK)* with *AWS KMS key* and *KMS key* . The concept has not changed. To prevent breaking changes, AWS is keeping some variations of this term.
27
27
  *
28
- * You can use symmetric encryption KMS keys to encrypt and decrypt small amounts of data, but they are more commonly used to generate data keys and data key pairs. You can also use a symmetric encryption KMS key to encrypt data stored in AWS services that are [integrated with AWS KMS](https://docs.aws.amazon.com//kms/features/#AWS_Service_Integration) . For more information, see [Symmetric encryption KMS keys](https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#symmetric-cmks) in the *AWS Key Management Service Developer Guide* .
28
+ * You can use symmetric encryption KMS keys to encrypt and decrypt small amounts of data, but they are more commonly used to generate data keys and data key pairs. You can also use a symmetric encryption KMS key to encrypt data stored in AWS services that are [integrated with AWS](https://docs.aws.amazon.com//kms/features/#AWS_Service_Integration) . For more information, see [Symmetric encryption KMS keys](https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#symmetric-cmks) in the *AWS Key Management Service Developer Guide* .
29
29
  *
30
- * You can use asymmetric KMS keys to encrypt and decrypt data or sign messages and verify signatures. To create an asymmetric key, you must specify an asymmetric `KeySpec` value and a `KeyUsage` value. For details, see [Asymmetric keys in AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html) in the *AWS Key Management Service Developer Guide* .
30
+ * You can use asymmetric KMS keys to encrypt and decrypt data or sign messages and verify signatures. To create an asymmetric key, you must specify an asymmetric `KeySpec` value and a `KeyUsage` value. For details, see [Asymmetric keys in AWS](https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html) in the *AWS Key Management Service Developer Guide* .
31
31
  *
32
- * You can use HMAC KMS keys (which are also symmetric keys) to generate and verify hash-based message authentication codes. To create an HMAC key, you must specify an HMAC `KeySpec` value and a `KeyUsage` value of `GENERATE_VERIFY_MAC` . For details, see [HMAC keys in AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/hmac.html) in the *AWS Key Management Service Developer Guide* .
32
+ * You can use HMAC KMS keys (which are also symmetric keys) to generate and verify hash-based message authentication codes. To create an HMAC key, you must specify an HMAC `KeySpec` value and a `KeyUsage` value of `GENERATE_VERIFY_MAC` . For details, see [HMAC keys in AWS](https://docs.aws.amazon.com/kms/latest/developerguide/hmac.html) in the *AWS Key Management Service Developer Guide* .
33
33
  *
34
- * You can also create symmetric encryption, asymmetric, and HMAC multi-Region primary keys. To create a multi-Region primary key, set the `MultiRegion` property to `true` . For information about multi-Region keys, see [Multi-Region keys in AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the *AWS Key Management Service Developer Guide* .
34
+ * You can also create symmetric encryption, asymmetric, and HMAC multi-Region primary keys. To create a multi-Region primary key, set the `MultiRegion` property to `true` . For information about multi-Region keys, see [Multi-Region keys in AWS](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the *AWS Key Management Service Developer Guide* .
35
35
  *
36
36
  * You cannot use the `AWS::KMS::Key` resource to specify a KMS key with [imported key material](https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html) or a KMS key in a [custom key store](https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html) .
37
37
  *
38
38
  * *Regions*
39
39
  *
40
- * AWS KMS CloudFormation resources are available in all Regions in which AWS KMS and AWS CloudFormation are supported. You can use the `AWS::KMS::Key` resource to create and manage all KMS key types that are supported in a Region.
40
+ * AWS CloudFormation resources are available in all Regions in which AWS and CloudFormation are supported. You can use the `AWS::KMS::Key` resource to create and manage all KMS key types that are supported in a Region.
41
41
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kms-key.html}
42
42
  */
43
43
  export type KMSKeyProps = {
@@ -63,11 +63,11 @@ export type KMSKeyProps = {
63
63
  /**
64
64
  * Enables automatic rotation of the key material for the specified KMS key. By default, automatic key rotation is not enabled.
65
65
  *
66
- * AWS KMS supports automatic rotation only for symmetric encryption KMS keys ( `KeySpec` = `SYMMETRIC_DEFAULT` ). For asymmetric KMS keys, HMAC KMS keys, and KMS keys with Origin `EXTERNAL` , omit the `EnableKeyRotation` property or set it to `false` .
66
+ * AWS supports automatic rotation only for symmetric encryption KMS keys ( `KeySpec` = `SYMMETRIC_DEFAULT` ). For asymmetric KMS keys, HMAC KMS keys, and KMS keys with Origin `EXTERNAL` , omit the `EnableKeyRotation` property or set it to `false` .
67
67
  *
68
- * To enable automatic key rotation of the key material for a multi-Region KMS key, set `EnableKeyRotation` to `true` on the primary key (created by using `AWS::KMS::Key` ). AWS KMS copies the rotation status to all replica keys. For details, see [Rotating multi-Region keys](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-manage.html#multi-region-rotate) in the *AWS Key Management Service Developer Guide* .
68
+ * To enable automatic key rotation of the key material for a multi-Region KMS key, set `EnableKeyRotation` to `true` on the primary key (created by using `AWS::KMS::Key` ). AWS copies the rotation status to all replica keys. For details, see [Rotating multi-Region keys](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-manage.html#multi-region-rotate) in the *AWS Key Management Service Developer Guide* .
69
69
  *
70
- * When you enable automatic rotation, AWS KMS automatically creates new key material for the KMS key one year after the enable date and every year thereafter. AWS KMS retains all key material until you delete the KMS key. For detailed information about automatic key rotation, see [Rotating KMS keys](https://docs.aws.amazon.com/kms/latest/developerguide/rotate-keys.html) in the *AWS Key Management Service Developer Guide* .
70
+ * When you enable automatic rotation, AWS automatically creates new key material for the KMS key one year after the enable date and every year thereafter. AWS retains all key material until you delete the KMS key. For detailed information about automatic key rotation, see [Rotating KMS keys](https://docs.aws.amazon.com/kms/latest/developerguide/rotate-keys.html) in the *AWS Key Management Service Developer Guide* .
71
71
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kms-key.html#cfn-kms-key-enablekeyrotation}
72
72
  */
73
73
  EnableKeyRotation?: boolean | undefined;
@@ -88,9 +88,9 @@ export type KMSKeyProps = {
88
88
  * If you provide a key policy, it must meet the following criteria:
89
89
  *
90
90
  * - The key policy must allow the caller to make a subsequent [PutKeyPolicy](https://docs.aws.amazon.com/kms/latest/APIReference/API_PutKeyPolicy.html) request on the KMS key. This reduces the risk that the KMS key becomes unmanageable. For more information, see [Default key policy](https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam) in the *AWS Key Management Service Developer Guide* . (To omit this condition, set `BypassPolicyLockoutSafetyCheck` to true.)
91
- * - Each statement in the key policy must contain one or more principals. The principals in the key policy must exist and be visible to AWS KMS . When you create a new AWS principal (for example, an IAM user or role), you might need to enforce a delay before including the new principal in a key policy because the new principal might not be immediately visible to AWS KMS . For more information, see [Changes that I make are not always immediately visible](https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency) in the *AWS Identity and Access Management User Guide* .
91
+ * - Each statement in the key policy must contain one or more principals. The principals in the key policy must exist and be visible to AWS . When you create a new AWS principal (for example, an IAM user or role), you might need to enforce a delay before including the new principal in a key policy because the new principal might not be immediately visible to AWS . For more information, see [Changes that I make are not always immediately visible](https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency) in the *AWS Identity and Access Management User Guide* .
92
92
  *
93
- * If you do not provide a key policy, AWS KMS attaches a default key policy to the KMS key. For more information, see [Default key policy](https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default) in the *AWS Key Management Service Developer Guide* .
93
+ * If you do not provide a key policy, AWS attaches a default key policy to the KMS key. For more information, see [Default key policy](https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default) in the *AWS Key Management Service Developer Guide* .
94
94
  *
95
95
  * A key policy document can include only the following characters:
96
96
  *
@@ -108,11 +108,11 @@ export type KMSKeyProps = {
108
108
  /**
109
109
  * Specifies the type of KMS key to create. The default value, `SYMMETRIC_DEFAULT` , creates a KMS key with a 256-bit symmetric key for encryption and decryption. In China Regions, `SYMMETRIC_DEFAULT` creates a 128-bit symmetric key that uses SM4 encryption. You can't change the `KeySpec` value after the KMS key is created. For help choosing a key spec for your KMS key, see [Choosing a KMS key type](https://docs.aws.amazon.com/kms/latest/developerguide/symm-asymm-choose.html) in the *AWS Key Management Service Developer Guide* .
110
110
  *
111
- * The `KeySpec` property determines the type of key material in the KMS key and the algorithms that the KMS key supports. To further restrict the algorithms that can be used with the KMS key, use a condition key in its key policy or IAM policy. For more information, see [AWS KMS condition keys](https://docs.aws.amazon.com/kms/latest/developerguide/policy-conditions.html#conditions-kms) in the *AWS Key Management Service Developer Guide* .
111
+ * The `KeySpec` property determines the type of key material in the KMS key and the algorithms that the KMS key supports. To further restrict the algorithms that can be used with the KMS key, use a condition key in its key policy or IAM policy. For more information, see [AWS condition keys](https://docs.aws.amazon.com/kms/latest/developerguide/policy-conditions.html#conditions-kms) in the *AWS Key Management Service Developer Guide* .
112
112
  *
113
- * > If you change the value of the `KeySpec` property on an existing KMS key, the update request fails, regardless of the value of the [`UpdateReplacePolicy` attribute](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-attribute-updatereplacepolicy.html) . This prevents you from accidentally deleting a KMS key by changing an immutable property value. > [AWS services that are integrated with AWS KMS](https://docs.aws.amazon.com/kms/features/#AWS_Service_Integration) use symmetric encryption KMS keys to protect your data. These services do not support encryption with asymmetric KMS keys. For help determining whether a KMS key is asymmetric, see [Identifying asymmetric KMS keys](https://docs.aws.amazon.com/kms/latest/developerguide/find-symm-asymm.html) in the *AWS Key Management Service Developer Guide* .
113
+ * > If you change the value of the `KeySpec` property on an existing KMS key, the update request fails, regardless of the value of the [`UpdateReplacePolicy` attribute](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-attribute-updatereplacepolicy.html) . This prevents you from accidentally deleting a KMS key by changing an immutable property value. > [AWS services that are integrated with AWS](https://docs.aws.amazon.com/kms/features/#AWS_Service_Integration) use symmetric encryption KMS keys to protect your data. These services do not support encryption with asymmetric KMS keys. For help determining whether a KMS key is asymmetric, see [Identifying asymmetric KMS keys](https://docs.aws.amazon.com/kms/latest/developerguide/find-symm-asymm.html) in the *AWS Key Management Service Developer Guide* .
114
114
  *
115
- * AWS KMS supports the following key specs for KMS keys:
115
+ * AWS supports the following key specs for KMS keys:
116
116
  *
117
117
  * - Symmetric encryption key (default)
118
118
  *
@@ -172,13 +172,13 @@ export type KMSKeyProps = {
172
172
  /**
173
173
  * Creates a multi-Region primary key that you can replicate in other AWS Regions . You can't change the `MultiRegion` value after the KMS key is created.
174
174
  *
175
- * For a list of AWS Regions in which multi-Region keys are supported, see [Multi-Region keys in AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the ** .
175
+ * For a list of AWS Regions in which multi-Region keys are supported, see [Multi-Region keys in AWS](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the ** .
176
176
  *
177
177
  * > If you change the value of the `MultiRegion` property on an existing KMS key, the update request fails, regardless of the value of the [`UpdateReplacePolicy` attribute](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-attribute-updatereplacepolicy.html) . This prevents you from accidentally deleting a KMS key by changing an immutable property value.
178
178
  *
179
179
  * For a multi-Region key, set to this property to `true` . For a single-Region key, omit this property or set it to `false` . The default value is `false` .
180
180
  *
181
- * *Multi-Region keys* are an AWS KMS feature that lets you create multiple interoperable KMS keys in different AWS Regions . Because these KMS keys have the same key ID, key material, and other metadata, you can use them to encrypt data in one AWS Region and decrypt it in a different AWS Region without making a cross-Region call or exposing the plaintext data. For more information, see [Multi-Region keys](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the *AWS Key Management Service Developer Guide* .
181
+ * *Multi-Region keys* are an AWS feature that lets you create multiple interoperable KMS keys in different AWS Regions . Because these KMS keys have the same key ID, key material, and other metadata, you can use them to encrypt data in one AWS Region and decrypt it in a different AWS Region without making a cross-Region call or exposing the plaintext data. For more information, see [Multi-Region keys](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the *AWS Key Management Service Developer Guide* .
182
182
  *
183
183
  * You can create a symmetric encryption, HMAC, or asymmetric multi-Region KMS key, and you can create a multi-Region key with imported key material. However, you cannot create a multi-Region key in a custom key store.
184
184
  *
@@ -188,26 +188,26 @@ export type KMSKeyProps = {
188
188
  */
189
189
  MultiRegion?: boolean | undefined;
190
190
  /**
191
- * The source of the key material for the KMS key. You cannot change the origin after you create the KMS key. The default is `AWS_KMS` , which means that AWS KMS creates the key material.
191
+ * The source of the key material for the KMS key. You cannot change the origin after you create the KMS key. The default is `AWS_KMS` , which means that AWS creates the key material.
192
192
  *
193
- * To [create a KMS key with no key material](https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys-create-cmk.html) (for imported key material), set this value to `EXTERNAL` . For more information about importing key material into AWS KMS , see [Importing Key Material](https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html) in the *AWS Key Management Service Developer Guide* .
193
+ * To [create a KMS key with no key material](https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys-create-cmk.html) (for imported key material), set this value to `EXTERNAL` . For more information about importing key material into AWS , see [Importing Key Material](https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html) in the *AWS Key Management Service Developer Guide* .
194
194
  *
195
195
  * You can ignore `ENABLED` when Origin is `EXTERNAL` . When a KMS key with Origin `EXTERNAL` is created, the key state is `PENDING_IMPORT` and `ENABLED` is `false` . After you import the key material, `ENABLED` updated to `true` . The KMS key can then be used for Cryptographic Operations.
196
196
  *
197
- * > - AWS CloudFormation doesn't support creating an `Origin` parameter of the `AWS_CLOUDHSM` or `EXTERNAL_KEY_STORE` values.
197
+ * > - CloudFormation doesn't support creating an `Origin` parameter of the `AWS_CLOUDHSM` or `EXTERNAL_KEY_STORE` values.
198
198
  * > - `EXTERNAL` is not supported for ML-DSA keys.
199
199
  * @default "AWS_KMS"
200
200
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kms-key.html#cfn-kms-key-origin}
201
201
  */
202
202
  Origin?: "AWS_KMS" | "EXTERNAL" | undefined;
203
203
  /**
204
- * Specifies the number of days in the waiting period before AWS KMS deletes a KMS key that has been removed from a CloudFormation stack. Enter a value between 7 and 30 days. The default value is 30 days.
204
+ * Specifies the number of days in the waiting period before AWS deletes a KMS key that has been removed from a CloudFormation stack. Enter a value between 7 and 30 days. The default value is 30 days.
205
205
  *
206
- * When you remove a KMS key from a CloudFormation stack, AWS KMS schedules the KMS key for deletion and starts the mandatory waiting period. The `PendingWindowInDays` property determines the length of waiting period. During the waiting period, the key state of KMS key is `Pending Deletion` or `Pending Replica Deletion` , which prevents the KMS key from being used in cryptographic operations. When the waiting period expires, AWS KMS permanently deletes the KMS key.
206
+ * When you remove a KMS key from a CloudFormation stack, AWS schedules the KMS key for deletion and starts the mandatory waiting period. The `PendingWindowInDays` property determines the length of waiting period. During the waiting period, the key state of KMS key is `Pending Deletion` or `Pending Replica Deletion` , which prevents the KMS key from being used in cryptographic operations. When the waiting period expires, AWS permanently deletes the KMS key.
207
207
  *
208
- * AWS KMS will not delete a [multi-Region primary key](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) that has replica keys. If you remove a multi-Region primary key from a CloudFormation stack, its key state changes to `PendingReplicaDeletion` so it cannot be replicated or used in cryptographic operations. This state can persist indefinitely. When the last of its replica keys is deleted, the key state of the primary key changes to `PendingDeletion` and the waiting period specified by `PendingWindowInDays` begins. When this waiting period expires, AWS KMS deletes the primary key. For details, see [Deleting multi-Region keys](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-delete.html) in the *AWS Key Management Service Developer Guide* .
208
+ * AWS will not delete a [multi-Region primary key](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) that has replica keys. If you remove a multi-Region primary key from a CloudFormation stack, its key state changes to `PendingReplicaDeletion` so it cannot be replicated or used in cryptographic operations. This state can persist indefinitely. When the last of its replica keys is deleted, the key state of the primary key changes to `PendingDeletion` and the waiting period specified by `PendingWindowInDays` begins. When this waiting period expires, AWS deletes the primary key. For details, see [Deleting multi-Region keys](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-delete.html) in the *AWS Key Management Service Developer Guide* .
209
209
  *
210
- * You cannot use a CloudFormation template to cancel deletion of the KMS key after you remove it from the stack, regardless of the waiting period. If you specify a KMS key in your template, even one with the same name, CloudFormation creates a new KMS key. To cancel deletion of a KMS key, use the AWS KMS console or the [CancelKeyDeletion](https://docs.aws.amazon.com/kms/latest/APIReference/API_CancelKeyDeletion.html) operation.
210
+ * You cannot use a CloudFormation template to cancel deletion of the KMS key after you remove it from the stack, regardless of the waiting period. If you specify a KMS key in your template, even one with the same name, CloudFormation creates a new KMS key. To cancel deletion of a KMS key, use the AWS console or the [CancelKeyDeletion](https://docs.aws.amazon.com/kms/latest/APIReference/API_CancelKeyDeletion.html) operation.
211
211
  *
212
212
  * For information about the `Pending Deletion` and `Pending Replica Deletion` key states, see [Key state: Effect on your KMS key](https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html) in the *AWS Key Management Service Developer Guide* . For more information about deleting KMS keys, see the [ScheduleKeyDeletion](https://docs.aws.amazon.com/kms/latest/APIReference/API_ScheduleKeyDeletion.html) operation in the *AWS Key Management Service API Reference* and [Deleting KMS keys](https://docs.aws.amazon.com/kms/latest/developerguide/deleting-keys.html) in the *AWS Key Management Service Developer Guide* .
213
213
  * @min 7
@@ -218,7 +218,7 @@ export type KMSKeyProps = {
218
218
  /**
219
219
  * Specifies a custom period of time between each rotation date. If no value is specified, the default value is 365 days.
220
220
  *
221
- * The rotation period defines the number of days after you enable automatic key rotation that AWS KMS will rotate your key material, and the number of days between each automatic rotation thereafter.
221
+ * The rotation period defines the number of days after you enable automatic key rotation that AWS will rotate your key material, and the number of days between each automatic rotation thereafter.
222
222
  *
223
223
  * You can use the [`kms:RotationPeriodInDays`](https://docs.aws.amazon.com/kms/latest/developerguide/conditions-kms.html#conditions-kms-rotation-period-in-days) condition key to further constrain the values that principals can specify in the `RotationPeriodInDays` parameter.
224
224
  *
@@ -232,9 +232,9 @@ export type KMSKeyProps = {
232
232
  /**
233
233
  * Assigns one or more tags to the replica key.
234
234
  *
235
- * > Tagging or untagging a KMS key can allow or deny permission to the KMS key. For details, see [ABAC for AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/abac.html) in the *AWS Key Management Service Developer Guide* .
235
+ * > Tagging or untagging a KMS key can allow or deny permission to the KMS key. For details, see [ABAC for AWS](https://docs.aws.amazon.com/kms/latest/developerguide/abac.html) in the *AWS Key Management Service Developer Guide* .
236
236
  *
237
- * For information about tags in AWS KMS , see [Tagging keys](https://docs.aws.amazon.com/kms/latest/developerguide/tagging-keys.html) in the *AWS Key Management Service Developer Guide* . For information about tags in CloudFormation, see [Tag](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html) .
237
+ * For information about tags in AWS , see [Tagging keys](https://docs.aws.amazon.com/kms/latest/developerguide/tagging-keys.html) in the *AWS Key Management Service Developer Guide* . For information about tags in CloudFormation, see [Tag](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html) .
238
238
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kms-key.html#cfn-kms-key-tags}
239
239
  */
240
240
  Tags?: Tag[] | undefined;
@@ -2,38 +2,38 @@ import type { ResourceDefinitionWithAttributes, PolicyDocument, Tag } from "../m
2
2
  /**
3
3
  * The `AWS::KMS::ReplicaKey` resource specifies a multi-Region replica key that is based on a multi-Region primary key.
4
4
  *
5
- * *Multi-Region keys* are an AWS KMS feature that lets you create multiple interoperable KMS keys in different AWS Regions . Because these KMS keys have the same key ID, key material, and other metadata, you can use them to encrypt data in one AWS Region and decrypt it in a different AWS Region without making a cross-Region call or exposing the plaintext data. For more information, see [Multi-Region keys](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the *AWS Key Management Service Developer Guide* .
5
+ * *Multi-Region keys* are an AWS feature that lets you create multiple interoperable KMS keys in different AWS Regions . Because these KMS keys have the same key ID, key material, and other metadata, you can use them to encrypt data in one AWS Region and decrypt it in a different AWS Region without making a cross-Region call or exposing the plaintext data. For more information, see [Multi-Region keys](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the *AWS Key Management Service Developer Guide* .
6
6
  *
7
7
  * A multi-Region *primary key* is a fully functional symmetric encryption KMS key, HMAC KMS key, or asymmetric KMS key that is also the model for replica keys in other AWS Regions . To create a multi-Region primary key, add an [AWS::KMS::Key](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kms-key.html) resource to your CloudFormation stack. Set its `MultiRegion` property to true.
8
8
  *
9
9
  * A multi-Region *replica key* is a fully functional KMS key that has the same key ID and key material as a multi-Region primary key, but is located in a different AWS Region of the same AWS partition. There can be multiple replicas of a primary key, but each must be in a different AWS Region .
10
10
  *
11
- * When you create a replica key in AWS CloudFormation , the replica key is created in the AWS Region represented by the endpoint you use for the request. If you try to replicate a multi-Region key into a Region in which the key type is not supported, the request will fail.
11
+ * When you create a replica key in CloudFormation , the replica key is created in the AWS Region represented by the endpoint you use for the request. If you try to replicate a multi-Region key into a Region in which the key type is not supported, the request will fail.
12
12
  *
13
- * A primary key and its replicas have the same key ID and key material. They also have the same key spec, key usage, key material origin, and automatic key rotation status. These properties are known as *shared properties* . If they change, AWS KMS synchronizes the change to all related multi-Region keys. All other properties of a replica key can differ, including its key policy, tags, aliases, and key state. AWS KMS does not synchronize these properties.
13
+ * A primary key and its replicas have the same key ID and key material. They also have the same key spec, key usage, key material origin, and automatic key rotation status. These properties are known as *shared properties* . If they change, AWS synchronizes the change to all related multi-Region keys. All other properties of a replica key can differ, including its key policy, tags, aliases, and key state. AWS does not synchronize these properties.
14
14
  *
15
15
  * *Regions*
16
16
  *
17
- * AWS KMS CloudFormation resources are available in all AWS Regions in which AWS KMS and AWS CloudFormation are supported. You can use the `AWS::KMS::ReplicaKey` resource to create replica keys in all Regions that support multi-Region KMS keys. For details, see [Multi-Region keys in AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the ** .
17
+ * AWS CloudFormation resources are available in all AWS Regions in which AWS and CloudFormation are supported. You can use the `AWS::KMS::ReplicaKey` resource to create replica keys in all Regions that support multi-Region KMS keys. For details, see [Multi-Region keys in AWS](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the ** .
18
18
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kms-replicakey.html}
19
19
  */
20
20
  export type KMSReplicaKey = ResourceDefinitionWithAttributes<"AWS::KMS::ReplicaKey", KMSReplicaKeyProps, KMSReplicaKeyAttribs>;
21
21
  /**
22
22
  * The `AWS::KMS::ReplicaKey` resource specifies a multi-Region replica key that is based on a multi-Region primary key.
23
23
  *
24
- * *Multi-Region keys* are an AWS KMS feature that lets you create multiple interoperable KMS keys in different AWS Regions . Because these KMS keys have the same key ID, key material, and other metadata, you can use them to encrypt data in one AWS Region and decrypt it in a different AWS Region without making a cross-Region call or exposing the plaintext data. For more information, see [Multi-Region keys](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the *AWS Key Management Service Developer Guide* .
24
+ * *Multi-Region keys* are an AWS feature that lets you create multiple interoperable KMS keys in different AWS Regions . Because these KMS keys have the same key ID, key material, and other metadata, you can use them to encrypt data in one AWS Region and decrypt it in a different AWS Region without making a cross-Region call or exposing the plaintext data. For more information, see [Multi-Region keys](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the *AWS Key Management Service Developer Guide* .
25
25
  *
26
26
  * A multi-Region *primary key* is a fully functional symmetric encryption KMS key, HMAC KMS key, or asymmetric KMS key that is also the model for replica keys in other AWS Regions . To create a multi-Region primary key, add an [AWS::KMS::Key](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kms-key.html) resource to your CloudFormation stack. Set its `MultiRegion` property to true.
27
27
  *
28
28
  * A multi-Region *replica key* is a fully functional KMS key that has the same key ID and key material as a multi-Region primary key, but is located in a different AWS Region of the same AWS partition. There can be multiple replicas of a primary key, but each must be in a different AWS Region .
29
29
  *
30
- * When you create a replica key in AWS CloudFormation , the replica key is created in the AWS Region represented by the endpoint you use for the request. If you try to replicate a multi-Region key into a Region in which the key type is not supported, the request will fail.
30
+ * When you create a replica key in CloudFormation , the replica key is created in the AWS Region represented by the endpoint you use for the request. If you try to replicate a multi-Region key into a Region in which the key type is not supported, the request will fail.
31
31
  *
32
- * A primary key and its replicas have the same key ID and key material. They also have the same key spec, key usage, key material origin, and automatic key rotation status. These properties are known as *shared properties* . If they change, AWS KMS synchronizes the change to all related multi-Region keys. All other properties of a replica key can differ, including its key policy, tags, aliases, and key state. AWS KMS does not synchronize these properties.
32
+ * A primary key and its replicas have the same key ID and key material. They also have the same key spec, key usage, key material origin, and automatic key rotation status. These properties are known as *shared properties* . If they change, AWS synchronizes the change to all related multi-Region keys. All other properties of a replica key can differ, including its key policy, tags, aliases, and key state. AWS does not synchronize these properties.
33
33
  *
34
34
  * *Regions*
35
35
  *
36
- * AWS KMS CloudFormation resources are available in all AWS Regions in which AWS KMS and AWS CloudFormation are supported. You can use the `AWS::KMS::ReplicaKey` resource to create replica keys in all Regions that support multi-Region KMS keys. For details, see [Multi-Region keys in AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the ** .
36
+ * AWS CloudFormation resources are available in all AWS Regions in which AWS and CloudFormation are supported. You can use the `AWS::KMS::ReplicaKey` resource to create replica keys in all Regions that support multi-Region KMS keys. For details, see [Multi-Region keys in AWS](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) in the ** .
37
37
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kms-replicakey.html}
38
38
  */
39
39
  export type KMSReplicaKeyProps = {
@@ -62,12 +62,12 @@ export type KMSReplicaKeyProps = {
62
62
  /**
63
63
  * The key policy that authorizes use of the replica key.
64
64
  *
65
- * The key policy is not a shared property of multi-Region keys. You can specify the same key policy or a different key policy for each key in a set of related multi-Region keys. AWS KMS does not synchronize this property.
65
+ * The key policy is not a shared property of multi-Region keys. You can specify the same key policy or a different key policy for each key in a set of related multi-Region keys. AWS does not synchronize this property.
66
66
  *
67
67
  * The key policy must conform to the following rules.
68
68
  *
69
69
  * - The key policy must give the caller [PutKeyPolicy](https://docs.aws.amazon.com/kms/latest/APIReference/API_PutKeyPolicy.html) permission on the KMS key. This reduces the risk that the KMS key becomes unmanageable. For more information, refer to the scenario in the [Default key policy](https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam) section of the **AWS Key Management Service Developer Guide** .
70
- * - Each statement in the key policy must contain one or more principals. The principals in the key policy must exist and be visible to AWS KMS . When you create a new AWS principal (for example, an IAM user or role), you might need to enforce a delay before including the new principal in a key policy because the new principal might not be immediately visible to AWS KMS . For more information, see [Changes that I make are not always immediately visible](https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency) in the *AWS Identity and Access Management User Guide* .
70
+ * - Each statement in the key policy must contain one or more principals. The principals in the key policy must exist and be visible to AWS . When you create a new AWS principal (for example, an IAM user or role), you might need to enforce a delay before including the new principal in a key policy because the new principal might not be immediately visible to AWS . For more information, see [Changes that I make are not always immediately visible](https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency) in the *AWS Identity and Access Management User Guide* .
71
71
  *
72
72
  * A key policy document can include only the following characters:
73
73
  *
@@ -82,9 +82,9 @@ export type KMSReplicaKeyProps = {
82
82
  */
83
83
  KeyPolicy: PolicyDocument;
84
84
  /**
85
- * Specifies the number of days in the waiting period before AWS KMS deletes a replica key that has been removed from a CloudFormation stack. Enter a value between 7 and 30 days. The default value is 30 days.
85
+ * Specifies the number of days in the waiting period before AWS deletes a replica key that has been removed from a CloudFormation stack. Enter a value between 7 and 30 days. The default value is 30 days.
86
86
  *
87
- * When you remove a replica key from a CloudFormation stack, AWS KMS schedules the replica key for deletion and starts the mandatory waiting period. The `PendingWindowInDays` property determines the length of waiting period. During the waiting period, the key state of replica key is `Pending Deletion` , which prevents it from being used in cryptographic operations. When the waiting period expires, AWS KMS permanently deletes the replica key.
87
+ * When you remove a replica key from a CloudFormation stack, AWS schedules the replica key for deletion and starts the mandatory waiting period. The `PendingWindowInDays` property determines the length of waiting period. During the waiting period, the key state of replica key is `Pending Deletion` , which prevents it from being used in cryptographic operations. When the waiting period expires, AWS permanently deletes the replica key.
88
88
  *
89
89
  * If the KMS key is a multi-Region primary key with replica keys, the waiting period begins when the last of its replica keys is deleted. Otherwise, the waiting period begins immediately.
90
90
  *
@@ -114,11 +114,11 @@ export type KMSReplicaKeyProps = {
114
114
  /**
115
115
  * Assigns one or more tags to the replica key.
116
116
  *
117
- * > Tagging or untagging a KMS key can allow or deny permission to the KMS key. For details, see [ABAC for AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/abac.html) in the *AWS Key Management Service Developer Guide* .
117
+ * > Tagging or untagging a KMS key can allow or deny permission to the KMS key. For details, see [ABAC for AWS](https://docs.aws.amazon.com/kms/latest/developerguide/abac.html) in the *AWS Key Management Service Developer Guide* .
118
118
  *
119
- * Tags are not a shared property of multi-Region keys. You can specify the same tags or different tags for each key in a set of related multi-Region keys. AWS KMS does not synchronize this property.
119
+ * Tags are not a shared property of multi-Region keys. You can specify the same tags or different tags for each key in a set of related multi-Region keys. AWS does not synchronize this property.
120
120
  *
121
- * Each tag consists of a tag key and a tag value. Both the tag key and the tag value are required, but the tag value can be an empty (null) string. You cannot have more than one tag on a KMS key with the same tag key. If you specify an existing tag key with a different tag value, AWS KMS replaces the current tag value with the specified one.
121
+ * Each tag consists of a tag key and a tag value. Both the tag key and the tag value are required, but the tag value can be an empty (null) string. You cannot have more than one tag on a KMS key with the same tag key. If you specify an existing tag key with a different tag value, AWS replaces the current tag value with the specified one.
122
122
  *
123
123
  * When you assign tags to an AWS resource, AWS generates a cost allocation report with usage and costs aggregated by tags. Tags can also be used to control access to a KMS key. For details, see [Tagging keys](https://docs.aws.amazon.com/kms/latest/developerguide/tagging-keys.html) .
124
124
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kms-replicakey.html#cfn-kms-replicakey-tags}
@@ -76,6 +76,10 @@ export type LakeFormationDataLakeSettingsProps = {
76
76
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lakeformation-datalakesettings.html#cfn-lakeformation-datalakesettings-parameters}
77
77
  */
78
78
  Parameters?: Record<string, unknown> | undefined;
79
+ /**
80
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lakeformation-datalakesettings.html#cfn-lakeformation-datalakesettings-readonlyadmins}
81
+ */
82
+ ReadOnlyAdmins?: Record<string, unknown> | undefined;
79
83
  /**
80
84
  * An array of UTF-8 strings.
81
85
  *