Skip to content

Commit

Permalink
Updates SDK to v2.244.1
Browse files Browse the repository at this point in the history
  • Loading branch information
awstools committed May 21, 2018
1 parent 44a92ee commit 97f3a85
Show file tree
Hide file tree
Showing 12 changed files with 165 additions and 79 deletions.
7 changes: 7 additions & 0 deletions .changes/2.244.1.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
[
{
"type": "feature",
"category": "CloudFormation",
"description": "1) Filtered Update for StackSet based on Accounts and Regions: This feature will allow flexibility for the customers to roll out updates on a StackSet based on specific Accounts and Regions. 2) Support for customized ExecutionRoleName: This feature will allow customers to attach ExecutionRoleName to the StackSet thus ensuring more security and controlling the behavior of any AWS resources in the target accounts."
}
]
5 changes: 4 additions & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,10 @@
# Changelog for AWS SDK for JavaScript
<!--LATEST=2.243.1-->
<!--LATEST=2.244.1-->
<!--ENTRYINSERT-->

## 2.244.1
* feature: CloudFormation: 1) Filtered Update for StackSet based on Accounts and Regions: This feature will allow flexibility for the customers to roll out updates on a StackSet based on specific Accounts and Regions. 2) Support for customized ExecutionRoleName: This feature will allow customers to attach ExecutionRoleName to the StackSet thus ensuring more security and controlling the behavior of any AWS resources in the target accounts.

## 2.243.1
* feature: Iot: We are releasing DeleteJob and DeleteJobExecution APIs to allow customer to delete resources created using AWS IoT Jobs.

Expand Down
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ version.
To use the SDK in the browser, simply add the following script tag to your
HTML pages:

<script src="https://sdk.amazonaws.com/js/aws-sdk-2.243.1.min.js"></script>
<script src="https://sdk.amazonaws.com/js/aws-sdk-2.244.1.min.js"></script>

You can also build a custom browser SDK with your specified set of AWS services.
This can allow you to reduce the SDK's size, specify different API versions of
Expand Down
18 changes: 14 additions & 4 deletions apis/cloudformation-2010-05-15.min.json
Original file line number Diff line number Diff line change
Expand Up @@ -201,6 +201,7 @@
"shape": "Sv"
},
"AdministrationRoleARN": {},
"ExecutionRoleName": {},
"ClientRequestToken": {
"idempotencyToken": true
}
Expand Down Expand Up @@ -608,7 +609,8 @@
"shape": "Sv"
},
"StackSetARN": {},
"AdministrationRoleARN": {}
"AdministrationRoleARN": {},
"ExecutionRoleName": {}
}
}
}
Expand Down Expand Up @@ -644,6 +646,7 @@
"type": "boolean"
},
"AdministrationRoleARN": {},
"ExecutionRoleName": {},
"CreationTimestamp": {
"type": "timestamp"
},
Expand Down Expand Up @@ -863,7 +866,7 @@
"Version": {},
"Metadata": {},
"DeclaredTransforms": {
"shape": "S4v"
"shape": "S4w"
}
}
}
Expand Down Expand Up @@ -1352,8 +1355,15 @@
"shape": "S1k"
},
"AdministrationRoleARN": {},
"ExecutionRoleName": {},
"OperationId": {
"idempotencyToken": true
},
"Accounts": {
"shape": "S1g"
},
"Regions": {
"shape": "S1i"
}
}
},
Expand Down Expand Up @@ -1419,7 +1429,7 @@
},
"CapabilitiesReason": {},
"DeclaredTransforms": {
"shape": "S4v"
"shape": "S4w"
}
}
}
Expand Down Expand Up @@ -1516,7 +1526,7 @@
}
}
},
"S4v": {
"S4w": {
"type": "list",
"member": {}
}
Expand Down
41 changes: 36 additions & 5 deletions apis/cloudformation-2010-05-15.normal.json
Original file line number Diff line number Diff line change
Expand Up @@ -605,9 +605,10 @@
{"shape":"OperationInProgressException"},
{"shape":"OperationIdAlreadyExistsException"},
{"shape":"StaleRequestException"},
{"shape":"InvalidOperationException"}
{"shape":"InvalidOperationException"},
{"shape":"StackInstanceNotFoundException"}
],
"documentation":"<p>Updates the stack set and <i>all</i> associated stack instances.</p> <p>Even if the stack set operation created by updating the stack set fails (completely or partially, below or above a specified failure tolerance), the stack set is updated with your changes. Subsequent <a>CreateStackInstances</a> calls on the specified stack set use the updated stack set.</p>"
"documentation":"<p>Updates the stack set, and associated stack instances in the specified accounts and regions.</p> <p>Even if the stack set operation created by updating the stack set fails (completely or partially, below or above a specified failure tolerance), the stack set is updated with your changes. Subsequent <a>CreateStackInstances</a> calls on the specified stack set use the updated stack set.</p>"
},
"UpdateTerminationProtection":{
"name":"UpdateTerminationProtection",
Expand Down Expand Up @@ -1152,7 +1153,11 @@
},
"AdministrationRoleARN":{
"shape":"RoleARN",
"documentation":"<p>The Amazon Resource Number (ARN) of the IAM role to use to create this stack set. </p> <p>Specify an IAM role only if you are using customized administrator roles to control which users or groups can manage specific stack sets within the same administrator account. For more information, see <a href=\"http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs.html\">Define Permissions for Multiple Administrators</a> in the <i>AWS CloudFormation User Guide</i>.</p>"
"documentation":"<p>The Amazon Resource Number (ARN) of the IAM role to use to create this stack set. </p> <p>Specify an IAM role only if you are using customized administrator roles to control which users or groups can manage specific stack sets within the same administrator account. For more information, see <a href=\"http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs.html\">Prerequisites: Granting Permissions for Stack Set Operations</a> in the <i>AWS CloudFormation User Guide</i>.</p>"
},
"ExecutionRoleName":{
"shape":"ExecutionRoleName",
"documentation":"<p>The name of the IAM execution role to use to create the stack set. If you do not specify an execution role, AWS CloudFormation uses the <code>AWSCloudFormationStackSetExecutionRole</code> role for the stack set operation.</p> <p>Specify an IAM role only if you are using customized execution roles to control which stack resources users and groups can include in their stack sets. </p>"
},
"ClientRequestToken":{
"shape":"ClientRequestToken",
Expand Down Expand Up @@ -1657,6 +1662,12 @@
},
"documentation":"<p>The output for the <a>ExecuteChangeSet</a> action.</p>"
},
"ExecutionRoleName":{
"type":"string",
"max":64,
"min":1,
"pattern":"[a-zA-Z_0-9+=,.@-]+"
},
"ExecutionStatus":{
"type":"string",
"enum":[
Expand Down Expand Up @@ -3045,7 +3056,11 @@
},
"AdministrationRoleARN":{
"shape":"RoleARN",
"documentation":"<p>The Amazon Resource Number (ARN) of the IAM role used to create or update the stack set.</p> <p>Use customized administrator roles to control which users or groups can manage specific stack sets within the same administrator account. For more information, see <a href=\"http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs.html\">Define Permissions for Multiple Administrators</a> in the <i>AWS CloudFormation User Guide</i>.</p>"
"documentation":"<p>The Amazon Resource Number (ARN) of the IAM role used to create or update the stack set.</p> <p>Use customized administrator roles to control which users or groups can manage specific stack sets within the same administrator account. For more information, see <a href=\"http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs.html\">Prerequisites: Granting Permissions for Stack Set Operations</a> in the <i>AWS CloudFormation User Guide</i>.</p>"
},
"ExecutionRoleName":{
"shape":"ExecutionRoleName",
"documentation":"<p>The name of the IAM execution role used to create or update the stack set. </p> <p>Use customized execution roles to control which stack resources users and groups can include in their stack sets. </p>"
}
},
"documentation":"<p>A structure that contains information about a stack set. A stack set enables you to provision stacks into AWS accounts and across regions by using a single CloudFormation template. In the stack set, you specify the template to use, as well as any parameters and capabilities that the template requires. </p>"
Expand Down Expand Up @@ -3112,6 +3127,10 @@
"shape":"RoleARN",
"documentation":"<p>The Amazon Resource Number (ARN) of the IAM role used to perform this stack set operation. </p> <p>Use customized administrator roles to control which users or groups can manage specific stack sets within the same administrator account. For more information, see <a href=\"http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs.html\">Define Permissions for Multiple Administrators</a> in the <i>AWS CloudFormation User Guide</i>.</p>"
},
"ExecutionRoleName":{
"shape":"ExecutionRoleName",
"documentation":"<p>The name of the IAM execution role used to create or update the stack set.</p> <p>Use customized execution roles to control which stack resources users and groups can include in their stack sets. </p>"
},
"CreationTimestamp":{
"shape":"Timestamp",
"documentation":"<p>The time at which the operation was initiated. Note that the creation times for the stack set operation might differ from the creation time of the individual stacks themselves. This is because AWS CloudFormation needs to perform preparatory work for the operation, such as dispatching the work to the requested regions, before actually creating the first stacks.</p>"
Expand Down Expand Up @@ -3573,7 +3592,7 @@
],
"members":{
"StackSetName":{
"shape":"StackSetName",
"shape":"StackSetNameOrId",
"documentation":"<p>The name or unique ID of the stack set associated with the stack instances.</p>"
},
"Accounts":{
Expand Down Expand Up @@ -3662,10 +3681,22 @@
"shape":"RoleARN",
"documentation":"<p>The Amazon Resource Number (ARN) of the IAM role to use to update this stack set.</p> <p>Specify an IAM role only if you are using customized administrator roles to control which users or groups can manage specific stack sets within the same administrator account. For more information, see <a href=\"http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs.html\">Define Permissions for Multiple Administrators</a> in the <i>AWS CloudFormation User Guide</i>.</p> <p> If you specify a customized administrator role, AWS CloudFormation uses that role to update the stack. If you do not specify a customized administrator role, AWS CloudFormation performs the update using the role previously associated with the stack set, so long as you have permissions to perform operations on the stack set.</p>"
},
"ExecutionRoleName":{
"shape":"ExecutionRoleName",
"documentation":"<p>The name of the IAM execution role to use to update the stack set. If you do not specify an execution role, AWS CloudFormation uses the <code>AWSCloudFormationStackSetExecutionRole</code> role for the stack set operation.</p> <p>Specify an IAM role only if you are using customized execution roles to control which stack resources users and groups can include in their stack sets. </p> <p> If you specify a customized execution role, AWS CloudFormation uses that role to update the stack. If you do not specify a customized execution role, AWS CloudFormation performs the update using the role previously associated with the stack set, so long as you have permissions to perform operations on the stack set.</p>"
},
"OperationId":{
"shape":"ClientRequestToken",
"documentation":"<p>The unique ID for this stack set operation. </p> <p>The operation ID also functions as an idempotency token, to ensure that AWS CloudFormation performs the stack set operation only once, even if you retry the request multiple times. You might retry stack set operation requests to ensure that AWS CloudFormation successfully received them.</p> <p>If you don't specify an operation ID, AWS CloudFormation generates one automatically.</p> <p>Repeating this stack set operation with a new operation ID retries all stack instances whose status is <code>OUTDATED</code>. </p>",
"idempotencyToken":true
},
"Accounts":{
"shape":"AccountList",
"documentation":"<p>The accounts in which to update associated stack instances. If you specify accounts, you must also specify the regions in which to update stack set instances.</p> <p>To update <i>all</i> the stack instances associated with this stack set, do not specify the <code>Accounts</code> or <code>Regions</code> properties.</p> <p>If the stack set update includes changes to the template (that is, if the <code>TemplateBody</code> or <code>TemplateURL</code> properties are specified), or the <code>Parameters</code> property, AWS CloudFormation marks all stack instances with a status of <code>OUTDATED</code> prior to updating the stack instances in the specified accounts and regions. If the stack set update does not include changes to the template or parameters, AWS CloudFormation updates the stack instances in the specified accounts and regions, while leaving all other stack instances with their existing stack instance status. </p>"
},
"Regions":{
"shape":"RegionList",
"documentation":"<p>The regions in which to update associated stack instances. If you specify regions, you must also specify accounts in which to update stack set instances.</p> <p>To update <i>all</i> the stack instances associated with this stack set, do not specify the <code>Accounts</code> or <code>Regions</code> properties.</p> <p>If the stack set update includes changes to the template (that is, if the <code>TemplateBody</code> or <code>TemplateURL</code> properties are specified), or the <code>Parameters</code> property, AWS CloudFormation marks all stack instances with a status of <code>OUTDATED</code> prior to updating the stack instances in the specified accounts and regions. If the stack set update does not include changes to the template or parameters, AWS CloudFormation updates the stack instances in the specified accounts and regions, while leaving all other stack instances with their existing stack instance status. </p>"
}
}
},
Expand Down
Loading

0 comments on commit 97f3a85

Please sign in to comment.