You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: packages/@aws-cdk/cfnspec/spec-source/cfn-docs/cfn-docs.json
+23-24
Original file line number
Diff line number
Diff line change
@@ -13710,9 +13710,8 @@
13710
13710
"AttributeDefinitions": "A list of attributes that describe the key schema for the table and indexes.\n\nThis property is required to create a DynamoDB table.\n\nUpdate requires: [Some interruptions](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-some-interrupt) . Replacement if you edit an existing AttributeDefinition.",
13711
13711
"BillingMode": "Specify how you are charged for read and write throughput and how you manage capacity.\n\nValid values include:\n\n- `PROVISIONED` - We recommend using `PROVISIONED` for predictable workloads. `PROVISIONED` sets the billing mode to [Provisioned Mode](https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/HowItWorks.ReadWriteCapacityMode.html#HowItWorks.ProvisionedThroughput.Manual) .\n- `PAY_PER_REQUEST` - We recommend using `PAY_PER_REQUEST` for unpredictable workloads. `PAY_PER_REQUEST` sets the billing mode to [On-Demand Mode](https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/HowItWorks.ReadWriteCapacityMode.html#HowItWorks.OnDemand) .\n\nIf not specified, the default is `PROVISIONED` .",
13712
13712
"ContributorInsightsSpecification": "The settings used to enable or disable CloudWatch Contributor Insights for the specified table.",
13713
-
"DeletionProtectionEnabled": "Determines if a table is protected from deletion. When enabled, the table cannot be deleted by any user or process. This setting is disabled by default.",
13714
13713
"GlobalSecondaryIndexes": "Global secondary indexes to be created on the table. You can create up to 20 global secondary indexes.\n\n> If you update a table to include a new global secondary index, AWS CloudFormation initiates the index creation and then proceeds with the stack update. AWS CloudFormation doesn't wait for the index to complete creation because the backfilling phase can take a long time, depending on the size of the table. You can't use the index or update the table until the index's status is `ACTIVE` . You can track its status by using the DynamoDB [DescribeTable](https://docs.aws.amazon.com/cli/latest/reference/dynamodb/describe-table.html) command.\n> \n> If you add or delete an index during an update, we recommend that you don't update any other resources. If your stack fails to update and is rolled back while adding a new index, you must manually delete the index.\n> \n> Updates are not supported. The following are exceptions:\n> \n> - If you update either the contributor insights specification or the provisioned throughput values of global secondary indexes, you can update the table without interruption.\n> - You can delete or add one global secondary index without interruption. If you do both in the same update (for example, by changing the index's logical ID), the update fails.",
13715
-
"ImportSourceSpecification": "Specifies the properties of data being imported from the S3 bucket source to the table.\n\n> If you specify the `ImportSourceSpecification` property, and also specify either the `StreamSpecification` , the `TableClass` property, or the `DeletionProtectionEnabled` property, the IAM entity creating/updating stack must have `UpdateTable` permission.",
13714
+
"ImportSourceSpecification": "Specifies the properties of data being imported from the S3 bucket source to the table.\n\n> If you specify the `ImportSourceSpecification` property, and also specify either the `StreamSpecification` or `TableClass` property, the IAM entity creating/updating stack must have `UpdateTable` permission.",
13716
13715
"KeySchema": "Specifies the attributes that make up the primary key for the table. The attributes in the `KeySchema` property must also be defined in the `AttributeDefinitions` property.",
13717
13716
"KinesisStreamSpecification": "The Kinesis Data Streams configuration for the specified table.",
13718
13717
"LocalSecondaryIndexes": "Local secondary indexes to be created on the table. You can create up to 5 local secondary indexes. Each index is scoped to a given hash key value. The size of each hash key can be up to 10 gigabytes.",
@@ -42490,33 +42489,33 @@
42490
42489
"AWS::RolesAnywhere::CRL": {
42491
42490
"attributes": {
42492
42491
"CrlId": "The unique primary identifier of the Crl",
42493
-
"Ref": "The name of the CRL."
42492
+
"Ref": "`Ref` returns `CrlId` ."
42494
42493
},
42495
-
"description": "Creates a Crl.",
42494
+
"description": "Imports the certificate revocation list (CRL). A CRL is a list of certificates that have been revoked by the issuing certificate Authority (CA). IAM Roles Anywhere validates against the CRL before issuing credentials.\n\n*Required permissions:* `rolesanywhere:ImportCrl` .",
42496
42495
"properties": {
42497
-
"CrlData": "x509 v3 Certificate Revocation List to revoke auth for corresponding certificates presented in CreateSession operations",
42498
-
"Enabled": "The enabled status of the resource.",
42499
-
"Name": "The customer specified name of the resource.",
42500
-
"Tags": "A list of Tags.",
42496
+
"CrlData": "The x509 v3 specified certificate revocation list (CRL).",
42497
+
"Enabled": "Specifies whether the certificate revocation list (CRL) is enabled.",
42498
+
"Name": "The name of the certificate revocation list (CRL).",
42499
+
"Tags": "A list of tags to attach to the certificate revocation list (CRL).",
42501
42500
"TrustAnchorArn": "The ARN of the TrustAnchor the certificate revocation list (CRL) will provide revocation for."
42502
42501
}
42503
42502
},
42504
42503
"AWS::RolesAnywhere::Profile": {
42505
42504
"attributes": {
42506
42505
"ProfileArn": "The ARN of the profile.",
42507
42506
"ProfileId": "The unique primary identifier of the Profile",
42508
-
"Ref": "The name of the Profile"
42507
+
"Ref": "`Ref` returns `ProfileId` ."
42509
42508
},
42510
-
"description": "Creates a Profile.",
42509
+
"description": "Creates a *profile* , a list of the roles that Roles Anywhere service is trusted to assume. You use profiles to intersect permissions with IAM managed policies.\n\n*Required permissions:* `rolesanywhere:CreateProfile` .",
42511
42510
"properties": {
42512
-
"DurationSeconds": "The number of seconds vended session credentials will be valid for",
42513
-
"Enabled": "The enabled status of the resource.",
42514
-
"ManagedPolicyArns": "A list of managed policy ARNs. Managed policies identified by this list will be applied to the vended session credentials.",
42515
-
"Name": "The customer specified name of the resource.",
42516
-
"RequireInstanceProperties": "Specifies whether instance properties are required in CreateSession requests with this profile.",
42517
-
"RoleArns": "A list of IAM role ARNs that can be assumed when this profile is specified in a CreateSession request.",
42518
-
"SessionPolicy": "A session policy that will applied to the trust boundary of the vended session credentials.",
42519
-
"Tags": "A list of Tags."
42511
+
"DurationSeconds": "Sets the maximum number of seconds that vended temporary credentials through [CreateSession](https://docs.aws.amazon.com/rolesanywhere/latest/userguide/authentication-create-session.html) will be valid for, between 900 and 3600.",
42512
+
"Enabled": "Indicates whether the profile is enabled.",
42513
+
"ManagedPolicyArns": "A list of managed policy ARNs that apply to the vended session credentials.",
42514
+
"Name": "The name of the profile.",
42515
+
"RequireInstanceProperties": "Specifies whether instance properties are required in temporary credential requests with this profile.",
42516
+
"RoleArns": "A list of IAM role ARNs. During `CreateSession` , if a matching role ARN is provided, the properties in this profile will be applied to the intersection session policy.",
42517
+
"SessionPolicy": "A session policy that applies to the trust boundary of the vended session credentials.",
42518
+
"Tags": "The tags to attach to the profile."
42520
42519
}
42521
42520
},
42522
42521
"AWS::RolesAnywhere::TrustAnchor": {
@@ -42525,25 +42524,25 @@
42525
42524
"TrustAnchorArn": "The ARN of the trust anchor.",
42526
42525
"TrustAnchorId": "The unique identifier of the trust anchor."
42527
42526
},
42528
-
"description": "Creates a TrustAnchor.",
42527
+
"description": "Creates a trust anchor to establish trust between IAM Roles Anywhere and your certificate authority (CA). You can define a trust anchor as a reference to an AWS Private Certificate Authority ( AWS Private CA ) or by uploading a CA certificate. Your AWS workloads can authenticate with the trust anchor using certificates issued by the CA in exchange for temporary AWS credentials.\n\n*Required permissions:* `rolesanywhere:CreateTrustAnchor` .",
42529
42528
"properties": {
42530
42529
"Enabled": "Indicates whether the trust anchor is enabled.",
42531
42530
"Name": "The name of the trust anchor.",
42532
42531
"Source": "The trust anchor type and its related certificate data.",
42533
-
"Tags": ""
42532
+
"Tags": "The tags to attach to the trust anchor."
42534
42533
}
42535
42534
},
42536
42535
"AWS::RolesAnywhere::TrustAnchor.Source": {
42537
42536
"attributes": {},
42538
-
"description": "Object representing the TrustAnchor type and its related certificate data.",
42537
+
"description": "The trust anchor type and its related certificate data.",
42539
42538
"properties": {
42540
-
"SourceData": "A union object representing the data field of the TrustAnchor depending on its type",
42541
-
"SourceType": "The type of the TrustAnchor."
42539
+
"SourceData": "The data field of the trust anchor depending on its type.",
42540
+
"SourceType": "The type of the TrustAnchor.\n\n> `AWS_ACM_PCA` is not an allowed value in your region."
42542
42541
}
42543
42542
},
42544
42543
"AWS::RolesAnywhere::TrustAnchor.SourceData": {
42545
42544
"attributes": {},
42546
-
"description": "A union object representing the data field of the TrustAnchor depending on its type",
42545
+
"description": "The data field of the trust anchor depending on its type.",
42547
42546
"properties": {
42548
42547
"AcmPcaArn": "The root certificate of the AWS Private Certificate Authority specified by this ARN is used in trust validation for temporary credential requests. Included for trust anchors of type `AWS_ACM_PCA` .\n\n> This field is not supported in your region.",
42549
42548
"X509CertificateData": "The PEM-encoded data for the certificate anchor. Included for trust anchors of type `CERTIFICATE_BUNDLE` ."
0 commit comments