diff --git a/clients/client-cloudformation/src/models/models_0.ts b/clients/client-cloudformation/src/models/models_0.ts index f41f28cb01026..6adbf8d37a592 100644 --- a/clients/client-cloudformation/src/models/models_0.ts +++ b/clients/client-cloudformation/src/models/models_0.ts @@ -2287,11 +2287,10 @@ export interface CreateStackInput { /** * @public - *

This deletion policy deletes newly created resources, but retains existing resources, when a stack operation is - * rolled back. This ensures new, empty, and unused resources are deleted, while critical resources and their data are - * retained. RetainExceptOnCreate can be specified for any resource that supports the - * - * DeletionPolicy attribute.

+ *

When set to true, newly created resources are deleted when the operation rolls back. This includes newly + * created resources marked with a deletion policy of Retain.

+ *

Default: false + *

*/ RetainExceptOnCreate?: boolean; } @@ -2834,7 +2833,7 @@ export interface CreateStackSetInput { *

* * - *

For more information, see Acknowledging IAM Resources in CloudFormation Templates.

+ *

For more information, see Acknowledging IAM Resources in CloudFormation Templates.

* *
  • *

    @@ -2842,11 +2841,11 @@ export interface CreateStackSetInput { *

    *

    Some templates reference macros. If your stack set template references one or more macros, you must create the * stack set directly from the processed template, without first reviewing the resulting changes in a change set. To - * create the stack set directly, you must acknowledge this capability. For more information, see Using CloudFormation Macros to Perform + * create the stack set directly, you must acknowledge this capability. For more information, see Using CloudFormation Macros to Perform * Custom Processing on Templates.

    * *

    Stack sets with service-managed permissions don't currently support the use of macros in templates. (This - * includes the AWS::Include and AWS::Serverless transforms, which are macros hosted by CloudFormation.) Even if you specify this capability for a + * includes the AWS::Include and AWS::Serverless transforms, which are macros hosted by CloudFormation.) Even if you specify this capability for a * stack set with service-managed permissions, if you reference a macro in your template the stack set operation will * fail.

    *
    @@ -2871,7 +2870,7 @@ export interface CreateStackSetInput { * @public *

    The Amazon Resource Name (ARN) of the IAM role to use to create this stack set.

    *

    Specify an IAM role only if you are using customized administrator roles to control which users - * or groups can manage specific stack sets within the same administrator account. For more information, see Prerequisites: Granting Permissions for Stack Set + * or groups can manage specific stack sets within the same administrator account. For more information, see Prerequisites: Granting Permissions for Stack Set * Operations in the CloudFormation User Guide.

    */ AdministrationRoleARN?: string; @@ -4981,7 +4980,8 @@ export interface DescribeStacksInput { * @public * *

    If you don't pass a parameter to StackName, the API returns a response that describes all - * resources in the account. This requires ListStacks and DescribeStacks permissions.

    + * resources in the account, which can impact performance. This requires ListStacks and DescribeStacks permissions.

    + *

    Consider using the ListStacks API if you're not passing a parameter to StackName.

    *

    The IAM policy below can be added to IAM policies when you want to limit * resource-level permissions and avoid returning a response when no parameter is sent in the request:

    *

    \{ "Version": "2012-10-17", "Statement": [\{ "Effect": "Deny", "Action": "cloudformation:DescribeStacks", @@ -5278,11 +5278,10 @@ export interface Stack { /** * @public - *

    This deletion policy deletes newly created resources, but retains existing resources, when a stack operation is - * rolled back. This ensures new, empty, and unused resources are deleted, while critical resources and their data are - * retained. RetainExceptOnCreate can be specified for any resource that supports the - * - * DeletionPolicy attribute.

    + *

    When set to true, newly created resources are deleted when the operation rolls back. This includes newly + * created resources marked with a deletion policy of Retain.

    + *

    Default: false + *

    */ RetainExceptOnCreate?: boolean; } @@ -5573,7 +5572,7 @@ export interface StackSet { * @public *

    The Amazon Resource Name (ARN) of the IAM role used to create or update the stack set.

    *

    Use customized administrator roles to control which users or groups can manage specific stack sets within the - * same administrator account. For more information, see Prerequisites: Granting Permissions for Stack Set Operations + * same administrator account. For more information, see Prerequisites: Granting Permissions for Stack Set Operations * in the CloudFormation User Guide.

    */ AdministrationRoleARN?: string; @@ -5815,7 +5814,7 @@ export interface StackSetOperation { * @public *

    The Amazon Resource Name (ARN) of the IAM role used to perform this stack set operation.

    *

    Use customized administrator roles to control which users or groups can manage specific stack sets within the - * same administrator account. For more information, see Define Permissions for Multiple Administrators in the + * same administrator account. For more information, see Define Permissions for Multiple Administrators in the * CloudFormation User Guide.

    */ AdministrationRoleARN?: string; @@ -6609,11 +6608,10 @@ export interface ExecuteChangeSetInput { /** * @public - *

    This deletion policy deletes newly created resources, but retains existing resources, when a stack operation is - * rolled back. This ensures new, empty, and unused resources are deleted, while critical resources and their data are - * retained. RetainExceptOnCreate can be specified for any resource that supports the - * - * DeletionPolicy attribute.

    + *

    When set to true, newly created resources are deleted when the operation rolls back. This includes newly + * created resources marked with a deletion policy of Retain.

    + *

    Default: false + *

    */ RetainExceptOnCreate?: boolean; } @@ -9408,11 +9406,10 @@ export interface RollbackStackInput { /** * @public - *

    This deletion policy deletes newly created resources, but retains existing resources, when a stack operation is - * rolled back. This ensures new, empty, and unused resources are deleted, while critical resources and their data are - * retained. RetainExceptOnCreate can be specified for any resource that supports the - * - * DeletionPolicy attribute.

    + *

    When set to true, newly created resources are deleted when the operation rolls back. This includes newly + * created resources marked with a deletion policy of Retain.

    + *

    Default: false + *

    */ RetainExceptOnCreate?: boolean; } @@ -9979,11 +9976,10 @@ export interface UpdateStackInput { /** * @public - *

    This deletion policy deletes newly created resources, but retains existing resources, when a stack operation is - * rolled back. This ensures new, empty, and unused resources are deleted, while critical resources and their data are - * retained. RetainExceptOnCreate can be specified for any resource that supports the - * - * DeletionPolicy attribute.

    + *

    When set to true, newly created resources are deleted when the operation rolls back. This includes newly + * created resources marked with a deletion policy of Retain.

    + *

    Default: false + *

    */ RetainExceptOnCreate?: boolean; } @@ -10241,7 +10237,7 @@ export interface UpdateStackSetInput { *

    *
  • * - *

    For more information, see Acknowledging IAM Resources in CloudFormation Templates.

    + *

    For more information, see Acknowledging IAM Resources in CloudFormation Templates.

    * *
  • *

    @@ -10249,11 +10245,11 @@ export interface UpdateStackSetInput { *

    *

    Some templates reference macros. If your stack set template references one or more macros, you must update the * stack set directly from the processed template, without first reviewing the resulting changes in a change set. To - * update the stack set directly, you must acknowledge this capability. For more information, see Using CloudFormation Macros to Perform + * update the stack set directly, you must acknowledge this capability. For more information, see Using CloudFormation Macros to Perform * Custom Processing on Templates.

    * *

    Stack sets with service-managed permissions do not currently support the use of macros in templates. (This - * includes the AWS::Include and AWS::Serverless transforms, which are macros hosted by CloudFormation.) Even if you specify this capability for a + * includes the AWS::Include and AWS::Serverless transforms, which are macros hosted by CloudFormation.) Even if you specify this capability for a * stack set with service-managed permissions, if you reference a macro in your template the stack set operation will * fail.

    *
    @@ -10302,7 +10298,7 @@ export interface UpdateStackSetInput { * @public *

    The Amazon Resource Name (ARN) of the IAM role to use to update this stack set.

    *

    Specify an IAM role only if you are using customized administrator roles to control which users - * or groups can manage specific stack sets within the same administrator account. For more information, see Granting Permissions for Stack Set + * or groups can manage specific stack sets within the same administrator account. For more information, see Granting Permissions for Stack Set * Operations in the CloudFormation User Guide.

    *

    If you specified a customized administrator role when you created the stack set, you must specify a customized * administrator role, even if it is the same customized administrator role used with this stack set previously.