diff --git a/clients/client-cloudformation/src/models/models_0.ts b/clients/client-cloudformation/src/models/models_0.ts index f41f28cb01026..6adbf8d37a592 100644 --- a/clients/client-cloudformation/src/models/models_0.ts +++ b/clients/client-cloudformation/src/models/models_0.ts @@ -2287,11 +2287,10 @@ export interface CreateStackInput { /** * @public - *
This deletion policy deletes newly created resources, but retains existing resources, when a stack operation is
- * rolled back. This ensures new, empty, and unused resources are deleted, while critical resources and their data are
- * retained. RetainExceptOnCreate
can be specified for any resource that supports the
- *
- * DeletionPolicy attribute.
When set to true
, newly created resources are deleted when the operation rolls back. This includes newly
+ * created resources marked with a deletion policy of Retain
.
Default: false
+ *
For more information, see Acknowledging IAM Resources in CloudFormation Templates.
+ *For more information, see Acknowledging IAM Resources in CloudFormation Templates.
* *@@ -2842,11 +2841,11 @@ export interface CreateStackSetInput { *
*Some templates reference macros. If your stack set template references one or more macros, you must create the * stack set directly from the processed template, without first reviewing the resulting changes in a change set. To - * create the stack set directly, you must acknowledge this capability. For more information, see Using CloudFormation Macros to Perform + * create the stack set directly, you must acknowledge this capability. For more information, see Using CloudFormation Macros to Perform * Custom Processing on Templates.
*Stack sets with service-managed permissions don't currently support the use of macros in templates. (This - * includes the AWS::Include and AWS::Serverless transforms, which are macros hosted by CloudFormation.) Even if you specify this capability for a + * includes the AWS::Include and AWS::Serverless transforms, which are macros hosted by CloudFormation.) Even if you specify this capability for a * stack set with service-managed permissions, if you reference a macro in your template the stack set operation will * fail.
*The Amazon Resource Name (ARN) of the IAM role to use to create this stack set.
*Specify an IAM role only if you are using customized administrator roles to control which users - * or groups can manage specific stack sets within the same administrator account. For more information, see Prerequisites: Granting Permissions for Stack Set + * or groups can manage specific stack sets within the same administrator account. For more information, see Prerequisites: Granting Permissions for Stack Set * Operations in the CloudFormation User Guide.
*/ AdministrationRoleARN?: string; @@ -4981,7 +4980,8 @@ export interface DescribeStacksInput { * @public *If you don't pass a parameter to StackName
, the API returns a response that describes all
- * resources in the account. This requires ListStacks
and DescribeStacks
permissions.
ListStacks
and DescribeStacks
permissions.
+ * Consider using the ListStacks API if you're not passing a parameter to StackName
.
The IAM policy below can be added to IAM policies when you want to limit * resource-level permissions and avoid returning a response when no parameter is sent in the request:
*\{ "Version": "2012-10-17", "Statement": [\{ "Effect": "Deny", "Action": "cloudformation:DescribeStacks", @@ -5278,11 +5278,10 @@ export interface Stack { /** * @public - *
This deletion policy deletes newly created resources, but retains existing resources, when a stack operation is
- * rolled back. This ensures new, empty, and unused resources are deleted, while critical resources and their data are
- * retained. RetainExceptOnCreate
can be specified for any resource that supports the
- *
- * DeletionPolicy attribute.
When set to true
, newly created resources are deleted when the operation rolls back. This includes newly
+ * created resources marked with a deletion policy of Retain
.
Default: false
+ *
The Amazon Resource Name (ARN) of the IAM role used to create or update the stack set.
*Use customized administrator roles to control which users or groups can manage specific stack sets within the - * same administrator account. For more information, see Prerequisites: Granting Permissions for Stack Set Operations + * same administrator account. For more information, see Prerequisites: Granting Permissions for Stack Set Operations * in the CloudFormation User Guide.
*/ AdministrationRoleARN?: string; @@ -5815,7 +5814,7 @@ export interface StackSetOperation { * @public *The Amazon Resource Name (ARN) of the IAM role used to perform this stack set operation.
*Use customized administrator roles to control which users or groups can manage specific stack sets within the - * same administrator account. For more information, see Define Permissions for Multiple Administrators in the + * same administrator account. For more information, see Define Permissions for Multiple Administrators in the * CloudFormation User Guide.
*/ AdministrationRoleARN?: string; @@ -6609,11 +6608,10 @@ export interface ExecuteChangeSetInput { /** * @public - *This deletion policy deletes newly created resources, but retains existing resources, when a stack operation is
- * rolled back. This ensures new, empty, and unused resources are deleted, while critical resources and their data are
- * retained. RetainExceptOnCreate
can be specified for any resource that supports the
- *
- * DeletionPolicy attribute.
When set to true
, newly created resources are deleted when the operation rolls back. This includes newly
+ * created resources marked with a deletion policy of Retain
.
Default: false
+ *
This deletion policy deletes newly created resources, but retains existing resources, when a stack operation is
- * rolled back. This ensures new, empty, and unused resources are deleted, while critical resources and their data are
- * retained. RetainExceptOnCreate
can be specified for any resource that supports the
- *
- * DeletionPolicy attribute.
When set to true
, newly created resources are deleted when the operation rolls back. This includes newly
+ * created resources marked with a deletion policy of Retain
.
Default: false
+ *
This deletion policy deletes newly created resources, but retains existing resources, when a stack operation is
- * rolled back. This ensures new, empty, and unused resources are deleted, while critical resources and their data are
- * retained. RetainExceptOnCreate
can be specified for any resource that supports the
- *
- * DeletionPolicy attribute.
When set to true
, newly created resources are deleted when the operation rolls back. This includes newly
+ * created resources marked with a deletion policy of Retain
.
Default: false
+ *
For more information, see Acknowledging IAM Resources in CloudFormation Templates.
+ *For more information, see Acknowledging IAM Resources in CloudFormation Templates.
* *@@ -10249,11 +10245,11 @@ export interface UpdateStackSetInput { *
*Some templates reference macros. If your stack set template references one or more macros, you must update the * stack set directly from the processed template, without first reviewing the resulting changes in a change set. To - * update the stack set directly, you must acknowledge this capability. For more information, see Using CloudFormation Macros to Perform + * update the stack set directly, you must acknowledge this capability. For more information, see Using CloudFormation Macros to Perform * Custom Processing on Templates.
*Stack sets with service-managed permissions do not currently support the use of macros in templates. (This - * includes the AWS::Include and AWS::Serverless transforms, which are macros hosted by CloudFormation.) Even if you specify this capability for a + * includes the AWS::Include and AWS::Serverless transforms, which are macros hosted by CloudFormation.) Even if you specify this capability for a * stack set with service-managed permissions, if you reference a macro in your template the stack set operation will * fail.
*The Amazon Resource Name (ARN) of the IAM role to use to update this stack set.
*Specify an IAM role only if you are using customized administrator roles to control which users - * or groups can manage specific stack sets within the same administrator account. For more information, see Granting Permissions for Stack Set + * or groups can manage specific stack sets within the same administrator account. For more information, see Granting Permissions for Stack Set * Operations in the CloudFormation User Guide.
*If you specified a customized administrator role when you created the stack set, you must specify a customized * administrator role, even if it is the same customized administrator role used with this stack set previously.