cdk-lambda-subminute 2.0.292 → 2.0.294

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (43) hide show
  1. package/.jsii +3 -3
  2. package/lib/cdk-lambda-subminute.js +3 -3
  3. package/node_modules/aws-sdk/CHANGELOG.md +27 -1
  4. package/node_modules/aws-sdk/README.md +1 -1
  5. package/node_modules/aws-sdk/apis/cloudformation-2010-05-15.min.json +48 -47
  6. package/node_modules/aws-sdk/apis/cloudtrail-2013-11-01.min.json +11 -8
  7. package/node_modules/aws-sdk/apis/comprehend-2017-11-27.min.json +55 -0
  8. package/node_modules/aws-sdk/apis/connect-2017-08-08.min.json +7 -0
  9. package/node_modules/aws-sdk/apis/connectcases-2022-10-03.min.json +29 -16
  10. package/node_modules/aws-sdk/apis/ec2-2016-11-15.min.json +140 -82
  11. package/node_modules/aws-sdk/apis/eks-2017-11-01.min.json +242 -39
  12. package/node_modules/aws-sdk/apis/guardduty-2017-11-28.min.json +217 -52
  13. package/node_modules/aws-sdk/apis/logs-2014-03-28.min.json +372 -26
  14. package/node_modules/aws-sdk/apis/logs-2014-03-28.paginators.json +18 -0
  15. package/node_modules/aws-sdk/apis/models.lex.v2-2020-08-07.min.json +82 -76
  16. package/node_modules/aws-sdk/apis/omics-2022-11-28.min.json +26 -24
  17. package/node_modules/aws-sdk/apis/redshift-serverless-2021-04-21.min.json +9 -0
  18. package/node_modules/aws-sdk/apis/resiliencehub-2020-04-30.min.json +48 -24
  19. package/node_modules/aws-sdk/apis/sqs-2012-11-05.min.json +46 -117
  20. package/node_modules/aws-sdk/apis/sqs-2012-11-05.paginators.json +3 -3
  21. package/node_modules/aws-sdk/clients/cloudformation.d.ts +15 -10
  22. package/node_modules/aws-sdk/clients/cloudtrail.d.ts +50 -22
  23. package/node_modules/aws-sdk/clients/cloudwatchlogs.d.ts +422 -2
  24. package/node_modules/aws-sdk/clients/comprehend.d.ts +73 -19
  25. package/node_modules/aws-sdk/clients/connect.d.ts +6 -2
  26. package/node_modules/aws-sdk/clients/connectcases.d.ts +17 -2
  27. package/node_modules/aws-sdk/clients/ec2.d.ts +65 -0
  28. package/node_modules/aws-sdk/clients/eks.d.ts +221 -9
  29. package/node_modules/aws-sdk/clients/guardduty.d.ts +168 -2
  30. package/node_modules/aws-sdk/clients/lambda.d.ts +8 -8
  31. package/node_modules/aws-sdk/clients/lexmodelsv2.d.ts +8 -0
  32. package/node_modules/aws-sdk/clients/omics.d.ts +22 -4
  33. package/node_modules/aws-sdk/clients/rds.d.ts +2 -2
  34. package/node_modules/aws-sdk/clients/redshiftserverless.d.ts +12 -0
  35. package/node_modules/aws-sdk/clients/resiliencehub.d.ts +40 -2
  36. package/node_modules/aws-sdk/clients/sqs.d.ts +13 -12
  37. package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +1 -1
  38. package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +17 -17
  39. package/node_modules/aws-sdk/dist/aws-sdk.js +703 -285
  40. package/node_modules/aws-sdk/dist/aws-sdk.min.js +91 -91
  41. package/node_modules/aws-sdk/lib/core.js +1 -1
  42. package/node_modules/aws-sdk/package.json +1 -1
  43. package/package.json +3 -4
@@ -2,14 +2,16 @@
2
2
  "version": "2.0",
3
3
  "metadata": {
4
4
  "apiVersion": "2012-11-05",
5
+ "awsQueryCompatible": {},
5
6
  "endpointPrefix": "sqs",
6
- "protocol": "query",
7
+ "jsonVersion": "1.0",
8
+ "protocol": "json",
7
9
  "serviceAbbreviation": "Amazon SQS",
8
10
  "serviceFullName": "Amazon Simple Queue Service",
9
11
  "serviceId": "SQS",
10
12
  "signatureVersion": "v4",
11
- "uid": "sqs-2012-11-05",
12
- "xmlNamespace": "http://queue.amazonaws.com/doc/2012-11-05/"
13
+ "targetPrefix": "AmazonSQS",
14
+ "uid": "sqs-2012-11-05"
13
15
  },
14
16
  "operations": {
15
17
  "AddPermission": {
@@ -26,16 +28,12 @@
26
28
  "Label": {},
27
29
  "AWSAccountIds": {
28
30
  "type": "list",
29
- "member": {
30
- "locationName": "AWSAccountId"
31
- },
31
+ "member": {},
32
32
  "flattened": true
33
33
  },
34
34
  "Actions": {
35
35
  "type": "list",
36
- "member": {
37
- "locationName": "ActionName"
38
- },
36
+ "member": {},
39
37
  "flattened": true
40
38
  }
41
39
  }
@@ -52,7 +50,6 @@
52
50
  }
53
51
  },
54
52
  "output": {
55
- "resultWrapper": "CancelMessageMoveTaskResult",
56
53
  "type": "structure",
57
54
  "members": {
58
55
  "ApproximateNumberOfMessagesMoved": {
@@ -90,7 +87,6 @@
90
87
  "Entries": {
91
88
  "type": "list",
92
89
  "member": {
93
- "locationName": "ChangeMessageVisibilityBatchRequestEntry",
94
90
  "type": "structure",
95
91
  "required": [
96
92
  "Id",
@@ -109,7 +105,6 @@
109
105
  }
110
106
  },
111
107
  "output": {
112
- "resultWrapper": "ChangeMessageVisibilityBatchResult",
113
108
  "type": "structure",
114
109
  "required": [
115
110
  "Successful",
@@ -119,7 +114,6 @@
119
114
  "Successful": {
120
115
  "type": "list",
121
116
  "member": {
122
- "locationName": "ChangeMessageVisibilityBatchResultEntry",
123
117
  "type": "structure",
124
118
  "required": [
125
119
  "Id"
@@ -145,17 +139,14 @@
145
139
  "members": {
146
140
  "QueueName": {},
147
141
  "Attributes": {
148
- "shape": "Sk",
149
- "locationName": "Attribute"
142
+ "shape": "Sk"
150
143
  },
151
144
  "tags": {
152
- "shape": "Sm",
153
- "locationName": "Tag"
145
+ "shape": "Sm"
154
146
  }
155
147
  }
156
148
  },
157
149
  "output": {
158
- "resultWrapper": "CreateQueueResult",
159
150
  "type": "structure",
160
151
  "members": {
161
152
  "QueueUrl": {}
@@ -187,7 +178,6 @@
187
178
  "Entries": {
188
179
  "type": "list",
189
180
  "member": {
190
- "locationName": "DeleteMessageBatchRequestEntry",
191
181
  "type": "structure",
192
182
  "required": [
193
183
  "Id",
@@ -203,7 +193,6 @@
203
193
  }
204
194
  },
205
195
  "output": {
206
- "resultWrapper": "DeleteMessageBatchResult",
207
196
  "type": "structure",
208
197
  "required": [
209
198
  "Successful",
@@ -213,7 +202,6 @@
213
202
  "Successful": {
214
203
  "type": "list",
215
204
  "member": {
216
- "locationName": "DeleteMessageBatchResultEntry",
217
205
  "type": "structure",
218
206
  "required": [
219
207
  "Id"
@@ -255,12 +243,10 @@
255
243
  }
256
244
  },
257
245
  "output": {
258
- "resultWrapper": "GetQueueAttributesResult",
259
246
  "type": "structure",
260
247
  "members": {
261
248
  "Attributes": {
262
- "shape": "Sk",
263
- "locationName": "Attribute"
249
+ "shape": "Sk"
264
250
  }
265
251
  }
266
252
  }
@@ -277,7 +263,6 @@
277
263
  }
278
264
  },
279
265
  "output": {
280
- "resultWrapper": "GetQueueUrlResult",
281
266
  "type": "structure",
282
267
  "members": {
283
268
  "QueueUrl": {}
@@ -299,7 +284,6 @@
299
284
  }
300
285
  },
301
286
  "output": {
302
- "resultWrapper": "ListDeadLetterSourceQueuesResult",
303
287
  "type": "structure",
304
288
  "required": [
305
289
  "queueUrls"
@@ -326,13 +310,12 @@
326
310
  }
327
311
  },
328
312
  "output": {
329
- "resultWrapper": "ListMessageMoveTasksResult",
330
313
  "type": "structure",
331
314
  "members": {
332
315
  "Results": {
316
+ "flattened": true,
333
317
  "type": "list",
334
318
  "member": {
335
- "locationName": "ListMessageMoveTasksResultEntry",
336
319
  "type": "structure",
337
320
  "members": {
338
321
  "TaskHandle": {},
@@ -353,8 +336,7 @@
353
336
  "type": "long"
354
337
  }
355
338
  }
356
- },
357
- "flattened": true
339
+ }
358
340
  }
359
341
  }
360
342
  }
@@ -370,12 +352,10 @@
370
352
  }
371
353
  },
372
354
  "output": {
373
- "resultWrapper": "ListQueueTagsResult",
374
355
  "type": "structure",
375
356
  "members": {
376
357
  "Tags": {
377
- "shape": "Sm",
378
- "locationName": "Tag"
358
+ "shape": "Sm"
379
359
  }
380
360
  }
381
361
  }
@@ -392,7 +372,6 @@
392
372
  }
393
373
  },
394
374
  "output": {
395
- "resultWrapper": "ListQueuesResult",
396
375
  "type": "structure",
397
376
  "members": {
398
377
  "QueueUrls": {
@@ -426,9 +405,7 @@
426
405
  },
427
406
  "MessageAttributeNames": {
428
407
  "type": "list",
429
- "member": {
430
- "locationName": "MessageAttributeName"
431
- },
408
+ "member": {},
432
409
  "flattened": true
433
410
  },
434
411
  "MaxNumberOfMessages": {
@@ -444,13 +421,11 @@
444
421
  }
445
422
  },
446
423
  "output": {
447
- "resultWrapper": "ReceiveMessageResult",
448
424
  "type": "structure",
449
425
  "members": {
450
426
  "Messages": {
451
427
  "type": "list",
452
428
  "member": {
453
- "locationName": "Message",
454
429
  "type": "structure",
455
430
  "members": {
456
431
  "MessageId": {},
@@ -458,20 +433,14 @@
458
433
  "MD5OfBody": {},
459
434
  "Body": {},
460
435
  "Attributes": {
461
- "locationName": "Attribute",
462
436
  "type": "map",
463
- "key": {
464
- "locationName": "Name"
465
- },
466
- "value": {
467
- "locationName": "Value"
468
- },
437
+ "key": {},
438
+ "value": {},
469
439
  "flattened": true
470
440
  },
471
441
  "MD5OfMessageAttributes": {},
472
442
  "MessageAttributes": {
473
- "shape": "S1p",
474
- "locationName": "MessageAttribute"
443
+ "shape": "S1q"
475
444
  }
476
445
  }
477
446
  },
@@ -507,19 +476,16 @@
507
476
  "type": "integer"
508
477
  },
509
478
  "MessageAttributes": {
510
- "shape": "S1p",
511
- "locationName": "MessageAttribute"
479
+ "shape": "S1q"
512
480
  },
513
481
  "MessageSystemAttributes": {
514
- "shape": "S1w",
515
- "locationName": "MessageSystemAttribute"
482
+ "shape": "S1x"
516
483
  },
517
484
  "MessageDeduplicationId": {},
518
485
  "MessageGroupId": {}
519
486
  }
520
487
  },
521
488
  "output": {
522
- "resultWrapper": "SendMessageResult",
523
489
  "type": "structure",
524
490
  "members": {
525
491
  "MD5OfMessageBody": {},
@@ -542,7 +508,6 @@
542
508
  "Entries": {
543
509
  "type": "list",
544
510
  "member": {
545
- "locationName": "SendMessageBatchRequestEntry",
546
511
  "type": "structure",
547
512
  "required": [
548
513
  "Id",
@@ -555,12 +520,10 @@
555
520
  "type": "integer"
556
521
  },
557
522
  "MessageAttributes": {
558
- "shape": "S1p",
559
- "locationName": "MessageAttribute"
523
+ "shape": "S1q"
560
524
  },
561
525
  "MessageSystemAttributes": {
562
- "shape": "S1w",
563
- "locationName": "MessageSystemAttribute"
526
+ "shape": "S1x"
564
527
  },
565
528
  "MessageDeduplicationId": {},
566
529
  "MessageGroupId": {}
@@ -571,7 +534,6 @@
571
534
  }
572
535
  },
573
536
  "output": {
574
- "resultWrapper": "SendMessageBatchResult",
575
537
  "type": "structure",
576
538
  "required": [
577
539
  "Successful",
@@ -581,7 +543,6 @@
581
543
  "Successful": {
582
544
  "type": "list",
583
545
  "member": {
584
- "locationName": "SendMessageBatchResultEntry",
585
546
  "type": "structure",
586
547
  "required": [
587
548
  "Id",
@@ -615,8 +576,7 @@
615
576
  "members": {
616
577
  "QueueUrl": {},
617
578
  "Attributes": {
618
- "shape": "Sk",
619
- "locationName": "Attribute"
579
+ "shape": "Sk"
620
580
  }
621
581
  }
622
582
  }
@@ -636,7 +596,6 @@
636
596
  }
637
597
  },
638
598
  "output": {
639
- "resultWrapper": "StartMessageMoveTaskResult",
640
599
  "type": "structure",
641
600
  "members": {
642
601
  "TaskHandle": {}
@@ -669,9 +628,7 @@
669
628
  "QueueUrl": {},
670
629
  "TagKeys": {
671
630
  "type": "list",
672
- "member": {
673
- "locationName": "TagKey"
674
- },
631
+ "member": {},
675
632
  "flattened": true
676
633
  }
677
634
  }
@@ -682,7 +639,6 @@
682
639
  "Sg": {
683
640
  "type": "list",
684
641
  "member": {
685
- "locationName": "BatchResultErrorEntry",
686
642
  "type": "structure",
687
643
  "required": [
688
644
  "Id",
@@ -702,47 +658,30 @@
702
658
  },
703
659
  "Sk": {
704
660
  "type": "map",
705
- "key": {
706
- "locationName": "Name"
707
- },
708
- "value": {
709
- "locationName": "Value"
710
- },
711
- "flattened": true,
712
- "locationName": "Attribute"
661
+ "key": {},
662
+ "value": {},
663
+ "flattened": true
713
664
  },
714
665
  "Sm": {
715
666
  "type": "map",
716
- "key": {
717
- "locationName": "Key"
718
- },
719
- "value": {
720
- "locationName": "Value"
721
- },
722
- "flattened": true,
723
- "locationName": "Tag"
667
+ "key": {},
668
+ "value": {},
669
+ "flattened": true
724
670
  },
725
671
  "Sz": {
726
672
  "type": "list",
727
- "member": {
728
- "locationName": "AttributeName"
729
- },
673
+ "member": {},
730
674
  "flattened": true
731
675
  },
732
676
  "S17": {
733
677
  "type": "list",
734
- "member": {
735
- "locationName": "QueueUrl"
736
- },
678
+ "member": {},
737
679
  "flattened": true
738
680
  },
739
- "S1p": {
681
+ "S1q": {
740
682
  "type": "map",
741
- "key": {
742
- "locationName": "Name"
743
- },
683
+ "key": {},
744
684
  "value": {
745
- "locationName": "Value",
746
685
  "type": "structure",
747
686
  "required": [
748
687
  "DataType"
@@ -753,40 +692,32 @@
753
692
  "type": "blob"
754
693
  },
755
694
  "StringListValues": {
756
- "shape": "S1s",
757
- "flattened": true,
758
- "locationName": "StringListValue"
695
+ "shape": "S1t",
696
+ "flattened": true
759
697
  },
760
698
  "BinaryListValues": {
761
- "shape": "S1t",
762
- "flattened": true,
763
- "locationName": "BinaryListValue"
699
+ "shape": "S1u",
700
+ "flattened": true
764
701
  },
765
702
  "DataType": {}
766
703
  }
767
704
  },
768
705
  "flattened": true
769
706
  },
770
- "S1s": {
707
+ "S1t": {
771
708
  "type": "list",
772
- "member": {
773
- "locationName": "StringListValue"
774
- }
709
+ "member": {}
775
710
  },
776
- "S1t": {
711
+ "S1u": {
777
712
  "type": "list",
778
713
  "member": {
779
- "locationName": "BinaryListValue",
780
714
  "type": "blob"
781
715
  }
782
716
  },
783
- "S1w": {
717
+ "S1x": {
784
718
  "type": "map",
785
- "key": {
786
- "locationName": "Name"
787
- },
719
+ "key": {},
788
720
  "value": {
789
- "locationName": "Value",
790
721
  "type": "structure",
791
722
  "required": [
792
723
  "DataType"
@@ -797,14 +728,12 @@
797
728
  "type": "blob"
798
729
  },
799
730
  "StringListValues": {
800
- "shape": "S1s",
801
- "flattened": true,
802
- "locationName": "StringListValue"
731
+ "shape": "S1t",
732
+ "flattened": true
803
733
  },
804
734
  "BinaryListValues": {
805
- "shape": "S1t",
806
- "flattened": true,
807
- "locationName": "BinaryListValue"
735
+ "shape": "S1u",
736
+ "flattened": true
808
737
  },
809
738
  "DataType": {}
810
739
  }
@@ -2,15 +2,15 @@
2
2
  "pagination": {
3
3
  "ListDeadLetterSourceQueues": {
4
4
  "input_token": "NextToken",
5
- "limit_key": "MaxResults",
6
5
  "output_token": "NextToken",
6
+ "limit_key": "MaxResults",
7
7
  "result_key": "queueUrls"
8
8
  },
9
9
  "ListQueues": {
10
10
  "input_token": "NextToken",
11
- "limit_key": "MaxResults",
12
11
  "output_token": "NextToken",
12
+ "limit_key": "MaxResults",
13
13
  "result_key": "QueueUrls"
14
14
  }
15
15
  }
16
- }
16
+ }
@@ -245,11 +245,11 @@ declare class CloudFormation extends Service {
245
245
  */
246
246
  describeStackSetOperation(callback?: (err: AWSError, data: CloudFormation.Types.DescribeStackSetOperationOutput) => void): Request<CloudFormation.Types.DescribeStackSetOperationOutput, AWSError>;
247
247
  /**
248
- * Returns the description for the specified stack; if no stack name was specified, then it returns the description for all the stacks created. If the stack doesn't exist, an ValidationError is returned.
248
+ * Returns the description for the specified stack; if no stack name was specified, then it returns the description for all the stacks created. If the stack doesn't exist, a ValidationError is returned.
249
249
  */
250
250
  describeStacks(params: CloudFormation.Types.DescribeStacksInput, callback?: (err: AWSError, data: CloudFormation.Types.DescribeStacksOutput) => void): Request<CloudFormation.Types.DescribeStacksOutput, AWSError>;
251
251
  /**
252
- * Returns the description for the specified stack; if no stack name was specified, then it returns the description for all the stacks created. If the stack doesn't exist, an ValidationError is returned.
252
+ * Returns the description for the specified stack; if no stack name was specified, then it returns the description for all the stacks created. If the stack doesn't exist, a ValidationError is returned.
253
253
  */
254
254
  describeStacks(callback?: (err: AWSError, data: CloudFormation.Types.DescribeStacksOutput) => void): Request<CloudFormation.Types.DescribeStacksOutput, AWSError>;
255
255
  /**
@@ -915,6 +915,7 @@ declare namespace CloudFormation {
915
915
  export type Changes = Change[];
916
916
  export type ClientRequestToken = string;
917
917
  export type ClientToken = string;
918
+ export type ConcurrencyMode = "STRICT_FAILURE_TOLERANCE"|"SOFT_FAILURE_TOLERANCE"|string;
918
919
  export type ConfigurationSchema = string;
919
920
  export type ConnectionArn = string;
920
921
  export interface ContinueUpdateRollbackInput {
@@ -959,11 +960,11 @@ declare namespace CloudFormation {
959
960
  */
960
961
  Parameters?: Parameters;
961
962
  /**
962
- * In some cases, you must explicitly acknowledge that your stack template contains certain capabilities in order for CloudFormation to create the stack. CAPABILITY_IAM and CAPABILITY_NAMED_IAM Some stack templates might include resources that can affect permissions in your Amazon Web Services account; for example, by creating new Identity and Access Management (IAM) users. For those stacks, you must explicitly acknowledge this by specifying one of these capabilities. The following IAM resources require you to specify either the CAPABILITY_IAM or CAPABILITY_NAMED_IAM capability. If you have IAM resources, you can specify either capability. If you have IAM resources with custom names, you must specify CAPABILITY_NAMED_IAM. If you don't specify either of these capabilities, CloudFormation returns an InsufficientCapabilities error. If your stack template contains these resources, we suggest that you review all permissions associated with them and edit their permissions if necessary. AWS::IAM::AccessKey AWS::IAM::Group AWS::IAM::InstanceProfile AWS::IAM::Policy AWS::IAM::Role AWS::IAM::User AWS::IAM::UserToGroupAddition For more information, see Acknowledging IAM resources in CloudFormation templates. CAPABILITY_AUTO_EXPAND Some template contain macros. Macros perform custom processing on templates; this can include simple actions like find-and-replace operations, all the way to extensive transformations of entire templates. Because of this, users typically create a change set from the processed template, so that they can review the changes resulting from the macros before actually creating the stack. If your stack template contains one or more macros, and you choose to create a stack directly from the processed template, without first reviewing the resulting changes in a change set, you must acknowledge this capability. This includes the AWS::Include and AWS::Serverless transforms, which are macros hosted by CloudFormation. This capacity doesn't apply to creating change sets, and specifying it when creating change sets has no effect. If you want to create a stack from a stack template that contains macros and nested stacks, you must create or update the stack directly from the template using the CreateStack or UpdateStack action, and specifying this capability. For more information about macros, see Using CloudFormation macros to perform custom processing on templates.
963
+ * In some cases, you must explicitly acknowledge that your stack template contains certain capabilities in order for CloudFormation to create the stack. CAPABILITY_IAM and CAPABILITY_NAMED_IAM Some stack templates might include resources that can affect permissions in your Amazon Web Services account; for example, by creating new Identity and Access Management (IAM) users. For those stacks, you must explicitly acknowledge this by specifying one of these capabilities. The following IAM resources require you to specify either the CAPABILITY_IAM or CAPABILITY_NAMED_IAM capability. If you have IAM resources, you can specify either capability. If you have IAM resources with custom names, you must specify CAPABILITY_NAMED_IAM. If you don't specify either of these capabilities, CloudFormation returns an InsufficientCapabilities error. If your stack template contains these resources, we suggest that you review all permissions associated with them and edit their permissions if necessary. AWS::IAM::AccessKey AWS::IAM::Group AWS::IAM::InstanceProfile AWS::IAM::Policy AWS::IAM::Role AWS::IAM::User AWS::IAM::UserToGroupAddition For more information, see Acknowledging IAM resources in CloudFormation templates. CAPABILITY_AUTO_EXPAND Some template contain macros. Macros perform custom processing on templates; this can include simple actions like find-and-replace operations, all the way to extensive transformations of entire templates. Because of this, users typically create a change set from the processed template, so that they can review the changes resulting from the macros before actually creating the stack. If your stack template contains one or more macros, and you choose to create a stack directly from the processed template, without first reviewing the resulting changes in a change set, you must acknowledge this capability. This includes the AWS::Include and AWS::Serverless transforms, which are macros hosted by CloudFormation. This capacity doesn't apply to creating change sets, and specifying it when creating change sets has no effect. If you want to create a stack from a stack template that contains macros and nested stacks, you must create or update the stack directly from the template using the CreateStack or UpdateStack action, and specifying this capability. For more information about macros, see Using CloudFormation macros to perform custom processing on templates. Only one of the Capabilities and ResourceType parameters can be specified.
963
964
  */
964
965
  Capabilities?: Capabilities;
965
966
  /**
966
- * The template resource types that you have permissions to work with if you execute this change set, such as AWS::EC2::Instance, AWS::EC2::*, or Custom::MyCustomInstance. If the list of resource types doesn't include a resource type that you're updating, the stack update fails. By default, CloudFormation grants permissions to all resource types. Identity and Access Management (IAM) uses this parameter for condition keys in IAM policies for CloudFormation. For more information, see Controlling access with Identity and Access Management in the CloudFormation User Guide.
967
+ * The template resource types that you have permissions to work with if you execute this change set, such as AWS::EC2::Instance, AWS::EC2::*, or Custom::MyCustomInstance. If the list of resource types doesn't include a resource type that you're updating, the stack update fails. By default, CloudFormation grants permissions to all resource types. Identity and Access Management (IAM) uses this parameter for condition keys in IAM policies for CloudFormation. For more information, see Controlling access with Identity and Access Management in the CloudFormation User Guide. Only one of the Capabilities and ResourceType parameters can be specified.
967
968
  */
968
969
  ResourceTypes?: ResourceTypes;
969
970
  /**
@@ -1055,11 +1056,11 @@ declare namespace CloudFormation {
1055
1056
  */
1056
1057
  NotificationARNs?: NotificationARNs;
1057
1058
  /**
1058
- * In some cases, you must explicitly acknowledge that your stack template contains certain capabilities in order for CloudFormation to create the stack. CAPABILITY_IAM and CAPABILITY_NAMED_IAM Some stack templates might include resources that can affect permissions in your Amazon Web Services account; for example, by creating new Identity and Access Management (IAM) users. For those stacks, you must explicitly acknowledge this by specifying one of these capabilities. The following IAM resources require you to specify either the CAPABILITY_IAM or CAPABILITY_NAMED_IAM capability. If you have IAM resources, you can specify either capability. If you have IAM resources with custom names, you must specify CAPABILITY_NAMED_IAM. If you don't specify either of these capabilities, CloudFormation returns an InsufficientCapabilities error. If your stack template contains these resources, we recommend that you review all permissions associated with them and edit their permissions if necessary. AWS::IAM::AccessKey AWS::IAM::Group AWS::IAM::InstanceProfile AWS::IAM::Policy AWS::IAM::Role AWS::IAM::User AWS::IAM::UserToGroupAddition For more information, see Acknowledging IAM Resources in CloudFormation Templates. CAPABILITY_AUTO_EXPAND Some template contain macros. Macros perform custom processing on templates; this can include simple actions like find-and-replace operations, all the way to extensive transformations of entire templates. Because of this, users typically create a change set from the processed template, so that they can review the changes resulting from the macros before actually creating the stack. If your stack template contains one or more macros, and you choose to create a stack directly from the processed template, without first reviewing the resulting changes in a change set, you must acknowledge this capability. This includes the AWS::Include and AWS::Serverless transforms, which are macros hosted by CloudFormation. If you want to create a stack from a stack template that contains macros and nested stacks, you must create the stack directly from the template using this capability. You should only create stacks directly from a stack template that contains macros if you know what processing the macro performs. Each macro relies on an underlying Lambda service function for processing stack templates. Be aware that the Lambda function owner can update the function operation without CloudFormation being notified. For more information, see Using CloudFormation macros to perform custom processing on templates.
1059
+ * In some cases, you must explicitly acknowledge that your stack template contains certain capabilities in order for CloudFormation to create the stack. CAPABILITY_IAM and CAPABILITY_NAMED_IAM Some stack templates might include resources that can affect permissions in your Amazon Web Services account; for example, by creating new Identity and Access Management (IAM) users. For those stacks, you must explicitly acknowledge this by specifying one of these capabilities. The following IAM resources require you to specify either the CAPABILITY_IAM or CAPABILITY_NAMED_IAM capability. If you have IAM resources, you can specify either capability. If you have IAM resources with custom names, you must specify CAPABILITY_NAMED_IAM. If you don't specify either of these capabilities, CloudFormation returns an InsufficientCapabilities error. If your stack template contains these resources, we recommend that you review all permissions associated with them and edit their permissions if necessary. AWS::IAM::AccessKey AWS::IAM::Group AWS::IAM::InstanceProfile AWS::IAM::Policy AWS::IAM::Role AWS::IAM::User AWS::IAM::UserToGroupAddition For more information, see Acknowledging IAM Resources in CloudFormation Templates. CAPABILITY_AUTO_EXPAND Some template contain macros. Macros perform custom processing on templates; this can include simple actions like find-and-replace operations, all the way to extensive transformations of entire templates. Because of this, users typically create a change set from the processed template, so that they can review the changes resulting from the macros before actually creating the stack. If your stack template contains one or more macros, and you choose to create a stack directly from the processed template, without first reviewing the resulting changes in a change set, you must acknowledge this capability. This includes the AWS::Include and AWS::Serverless transforms, which are macros hosted by CloudFormation. If you want to create a stack from a stack template that contains macros and nested stacks, you must create the stack directly from the template using this capability. You should only create stacks directly from a stack template that contains macros if you know what processing the macro performs. Each macro relies on an underlying Lambda service function for processing stack templates. Be aware that the Lambda function owner can update the function operation without CloudFormation being notified. For more information, see Using CloudFormation macros to perform custom processing on templates. Only one of the Capabilities and ResourceType parameters can be specified.
1059
1060
  */
1060
1061
  Capabilities?: Capabilities;
1061
1062
  /**
1062
- * The template resource types that you have permissions to work with for this create stack action, such as AWS::EC2::Instance, AWS::EC2::*, or Custom::MyCustomInstance. Use the following syntax to describe template resource types: AWS::* (for all Amazon Web Services resources), Custom::* (for all custom resources), Custom::logical_ID (for a specific custom resource), AWS::service_name::* (for all resources of a particular Amazon Web Services service), and AWS::service_name::resource_logical_ID (for a specific Amazon Web Services resource). If the list of resource types doesn't include a resource that you're creating, the stack creation fails. By default, CloudFormation grants permissions to all resource types. Identity and Access Management (IAM) uses this parameter for CloudFormation-specific condition keys in IAM policies. For more information, see Controlling Access with Identity and Access Management.
1063
+ * The template resource types that you have permissions to work with for this create stack action, such as AWS::EC2::Instance, AWS::EC2::*, or Custom::MyCustomInstance. Use the following syntax to describe template resource types: AWS::* (for all Amazon Web Services resources), Custom::* (for all custom resources), Custom::logical_ID (for a specific custom resource), AWS::service_name::* (for all resources of a particular Amazon Web Services service), and AWS::service_name::resource_logical_ID (for a specific Amazon Web Services resource). If the list of resource types doesn't include a resource that you're creating, the stack creation fails. By default, CloudFormation grants permissions to all resource types. Identity and Access Management (IAM) uses this parameter for CloudFormation-specific condition keys in IAM policies. For more information, see Controlling Access with Identity and Access Management. Only one of the Capabilities and ResourceType parameters can be specified.
1063
1064
  */
1064
1065
  ResourceTypes?: ResourceTypes;
1065
1066
  /**
@@ -2865,7 +2866,7 @@ declare namespace CloudFormation {
2865
2866
  */
2866
2867
  LoggingConfig?: LoggingConfig;
2867
2868
  /**
2868
- * The Amazon Resource Name (ARN) of the IAM role for CloudFormation to assume when invoking the extension. For CloudFormation to assume the specified execution role, the role must contain a trust relationship with the CloudFormation service principle (resources.cloudformation.amazonaws.com). For more information about adding trust relationships, see Modifying a role trust policy in the Identity and Access Management User Guide. If your extension calls Amazon Web Services APIs in any of its handlers, you must create an IAM execution role that includes the necessary permissions to call those Amazon Web Services APIs, and provision that execution role in your account. When CloudFormation needs to invoke the resource type handler, CloudFormation assumes this execution role to create a temporary session token, which it then passes to the resource type handler, thereby supplying your resource type with the appropriate credentials.
2869
+ * The Amazon Resource Name (ARN) of the IAM role for CloudFormation to assume when invoking the extension. For CloudFormation to assume the specified execution role, the role must contain a trust relationship with the CloudFormation service principal (resources.cloudformation.amazonaws.com). For more information about adding trust relationships, see Modifying a role trust policy in the Identity and Access Management User Guide. If your extension calls Amazon Web Services APIs in any of its handlers, you must create an IAM execution role that includes the necessary permissions to call those Amazon Web Services APIs, and provision that execution role in your account. When CloudFormation needs to invoke the resource type handler, CloudFormation assumes this execution role to create a temporary session token, which it then passes to the resource type handler, thereby supplying your resource type with the appropriate credentials.
2869
2870
  */
2870
2871
  ExecutionRoleArn?: RoleArn;
2871
2872
  /**
@@ -3891,13 +3892,17 @@ declare namespace CloudFormation {
3891
3892
  */
3892
3893
  FailureTolerancePercentage?: FailureTolerancePercentage;
3893
3894
  /**
3894
- * The maximum number of accounts in which to perform this operation at one time. This is dependent on the value of FailureToleranceCount.MaxConcurrentCount is at most one more than the FailureToleranceCount. Note that this setting lets you specify the maximum for operations. For large deployments, under certain circumstances the actual number of accounts acted upon concurrently may be lower due to service throttling. Conditional: You must specify either MaxConcurrentCount or MaxConcurrentPercentage, but not both. By default, 1 is specified.
3895
+ * The maximum number of accounts in which to perform this operation at one time. This can depend on the value of FailureToleranceCount depending on your ConcurrencyMode. MaxConcurrentCount is at most one more than the FailureToleranceCount if you're using STRICT_FAILURE_TOLERANCE. Note that this setting lets you specify the maximum for operations. For large deployments, under certain circumstances the actual number of accounts acted upon concurrently may be lower due to service throttling. Conditional: You must specify either MaxConcurrentCount or MaxConcurrentPercentage, but not both. By default, 1 is specified.
3895
3896
  */
3896
3897
  MaxConcurrentCount?: MaxConcurrentCount;
3897
3898
  /**
3898
3899
  * The maximum percentage of accounts in which to perform this operation at one time. When calculating the number of accounts based on the specified percentage, CloudFormation rounds down to the next whole number. This is true except in cases where rounding down would result is zero. In this case, CloudFormation sets the number as one instead. Note that this setting lets you specify the maximum for operations. For large deployments, under certain circumstances the actual number of accounts acted upon concurrently may be lower due to service throttling. Conditional: You must specify either MaxConcurrentCount or MaxConcurrentPercentage, but not both. By default, 1 is specified.
3899
3900
  */
3900
3901
  MaxConcurrentPercentage?: MaxConcurrentPercentage;
3902
+ /**
3903
+ * Specifies how the concurrency level behaves during the operation execution. STRICT_FAILURE_TOLERANCE: Dynamically lowers the concurrency level to ensure the number of failed accounts never exceeds the FailureToleranceCount +1. StackSets will set the actual concurrency of your deployment as the minimum value between the MaxConcurrentCount and the FailureToleranceCount +1. This is the default behavior. If failure tolerance or Maximum concurrent accounts are set to percentages, the behavior is similar. SOFT_FAILURE_TOLERANCE: Always run at the concurrency level set by the user in the MaxConcurrentCount or MaxConcurrentPercentage, regardless of the number of failures.
3904
+ */
3905
+ ConcurrencyMode?: ConcurrencyMode;
3901
3906
  }
3902
3907
  export type StackSetOperationResultStatus = "PENDING"|"RUNNING"|"SUCCEEDED"|"FAILED"|"CANCELLED"|string;
3903
3908
  export type StackSetOperationResultSummaries = StackSetOperationResultSummary[];
@@ -4360,11 +4365,11 @@ declare namespace CloudFormation {
4360
4365
  */
4361
4366
  Parameters?: Parameters;
4362
4367
  /**
4363
- * In some cases, you must explicitly acknowledge that your stack template contains certain capabilities in order for CloudFormation to update the stack. CAPABILITY_IAM and CAPABILITY_NAMED_IAM Some stack templates might include resources that can affect permissions in your Amazon Web Services account; for example, by creating new Identity and Access Management (IAM) users. For those stacks, you must explicitly acknowledge this by specifying one of these capabilities. The following IAM resources require you to specify either the CAPABILITY_IAM or CAPABILITY_NAMED_IAM capability. If you have IAM resources, you can specify either capability. If you have IAM resources with custom names, you must specify CAPABILITY_NAMED_IAM. If you don't specify either of these capabilities, CloudFormation returns an InsufficientCapabilities error. If your stack template contains these resources, we suggest that you review all permissions associated with them and edit their permissions if necessary. AWS::IAM::AccessKey AWS::IAM::Group AWS::IAM::InstanceProfile AWS::IAM::Policy AWS::IAM::Role AWS::IAM::User AWS::IAM::UserToGroupAddition For more information, see Acknowledging IAM Resources in CloudFormation Templates. CAPABILITY_AUTO_EXPAND Some template contain macros. Macros perform custom processing on templates; this can include simple actions like find-and-replace operations, all the way to extensive transformations of entire templates. Because of this, users typically create a change set from the processed template, so that they can review the changes resulting from the macros before actually updating the stack. If your stack template contains one or more macros, and you choose to update a stack directly from the processed template, without first reviewing the resulting changes in a change set, you must acknowledge this capability. This includes the AWS::Include and AWS::Serverless transforms, which are macros hosted by CloudFormation. If you want to update a stack from a stack template that contains macros and nested stacks, you must update the stack directly from the template using this capability. You should only update stacks directly from a stack template that contains macros if you know what processing the macro performs. Each macro relies on an underlying Lambda service function for processing stack templates. Be aware that the Lambda function owner can update the function operation without CloudFormation being notified. For more information, see Using CloudFormation Macros to Perform Custom Processing on Templates.
4368
+ * In some cases, you must explicitly acknowledge that your stack template contains certain capabilities in order for CloudFormation to update the stack. CAPABILITY_IAM and CAPABILITY_NAMED_IAM Some stack templates might include resources that can affect permissions in your Amazon Web Services account; for example, by creating new Identity and Access Management (IAM) users. For those stacks, you must explicitly acknowledge this by specifying one of these capabilities. The following IAM resources require you to specify either the CAPABILITY_IAM or CAPABILITY_NAMED_IAM capability. If you have IAM resources, you can specify either capability. If you have IAM resources with custom names, you must specify CAPABILITY_NAMED_IAM. If you don't specify either of these capabilities, CloudFormation returns an InsufficientCapabilities error. If your stack template contains these resources, we suggest that you review all permissions associated with them and edit their permissions if necessary. AWS::IAM::AccessKey AWS::IAM::Group AWS::IAM::InstanceProfile AWS::IAM::Policy AWS::IAM::Role AWS::IAM::User AWS::IAM::UserToGroupAddition For more information, see Acknowledging IAM Resources in CloudFormation Templates. CAPABILITY_AUTO_EXPAND Some template contain macros. Macros perform custom processing on templates; this can include simple actions like find-and-replace operations, all the way to extensive transformations of entire templates. Because of this, users typically create a change set from the processed template, so that they can review the changes resulting from the macros before actually updating the stack. If your stack template contains one or more macros, and you choose to update a stack directly from the processed template, without first reviewing the resulting changes in a change set, you must acknowledge this capability. This includes the AWS::Include and AWS::Serverless transforms, which are macros hosted by CloudFormation. If you want to update a stack from a stack template that contains macros and nested stacks, you must update the stack directly from the template using this capability. You should only update stacks directly from a stack template that contains macros if you know what processing the macro performs. Each macro relies on an underlying Lambda service function for processing stack templates. Be aware that the Lambda function owner can update the function operation without CloudFormation being notified. For more information, see Using CloudFormation Macros to Perform Custom Processing on Templates. Only one of the Capabilities and ResourceType parameters can be specified.
4364
4369
  */
4365
4370
  Capabilities?: Capabilities;
4366
4371
  /**
4367
- * The template resource types that you have permissions to work with for this update stack action, such as AWS::EC2::Instance, AWS::EC2::*, or Custom::MyCustomInstance. If the list of resource types doesn't include a resource that you're updating, the stack update fails. By default, CloudFormation grants permissions to all resource types. Identity and Access Management (IAM) uses this parameter for CloudFormation-specific condition keys in IAM policies. For more information, see Controlling Access with Identity and Access Management.
4372
+ * The template resource types that you have permissions to work with for this update stack action, such as AWS::EC2::Instance, AWS::EC2::*, or Custom::MyCustomInstance. If the list of resource types doesn't include a resource that you're updating, the stack update fails. By default, CloudFormation grants permissions to all resource types. Identity and Access Management (IAM) uses this parameter for CloudFormation-specific condition keys in IAM policies. For more information, see Controlling Access with Identity and Access Management. Only one of the Capabilities and ResourceType parameters can be specified.
4368
4373
  */
4369
4374
  ResourceTypes?: ResourceTypes;
4370
4375
  /**