aws-sdk-docdb 1.79.0 → 1.81.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: a9b09dd8888acdf0fd302fadfb7ea75b8b8447e4b09300197e6c58c992397f56
4
- data.tar.gz: 3fde06d394192c91c30e5078e612d25ad7c23dba33588e3cb8edbbcf5ddc4c96
3
+ metadata.gz: 6adbfdf67f16ce1567f4613788bf19c2df7d629ec6015dad05b1e1de7b68fcd6
4
+ data.tar.gz: c7f4978704f193d5c4e1f52f486953622a57726f7b6c884f8b8765dc1977b40c
5
5
  SHA512:
6
- metadata.gz: 6f90e212dac8fd769c820a0d4579d34ef7999709f3e9461d6e0a8e3ac912e29f9cc7c0bcdf40a001b24c8077bf9a148805ea52f5ccab9f8953fa25bff1d340f0
7
- data.tar.gz: 3bf275861499b73c658a48b91c7134f82898accae127d9fbc734c5ef6b33d00b9326e1b629b1509e7d724409a348891be36b44c37628b34190bef6e4918d5abc
6
+ metadata.gz: cd30086743d23d20083e908f79634733f27dfd1c5488ef28b3df8ccae913da985f2ac7c92c923a93efbe982a32ea8aa56431f1e9b0b4b714e04ea1397cd85774
7
+ data.tar.gz: 75df490a009076b5376f2ecabbed52443ed7ea91e30082be0625712d8a383f1fecafb5ed69bc8681ba5ab6bae1056609c68f254a2cd5948697d2879525831da0
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.81.0 (2025-01-15)
5
+ ------------------
6
+
7
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
8
+
9
+ 1.80.0 (2024-12-20)
10
+ ------------------
11
+
12
+ * Feature - Support AWS Secret Manager managed password for AWS DocumentDB instance-based cluster.
13
+
4
14
  1.79.0 (2024-11-06)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.79.0
1
+ 1.81.0
@@ -259,11 +259,34 @@ module Aws::DocDB
259
259
  # Used when loading credentials from the shared credentials file
260
260
  # at HOME/.aws/credentials. When not specified, 'default' is used.
261
261
  #
262
+ # @option options [String] :request_checksum_calculation ("when_supported")
263
+ # Determines when a checksum will be calculated for request payloads. Values are:
264
+ #
265
+ # * `when_supported` - (default) When set, a checksum will be
266
+ # calculated for all request payloads of operations modeled with the
267
+ # `httpChecksum` trait where `requestChecksumRequired` is `true` and/or a
268
+ # `requestAlgorithmMember` is modeled.
269
+ # * `when_required` - When set, a checksum will only be calculated for
270
+ # request payloads of operations modeled with the `httpChecksum` trait where
271
+ # `requestChecksumRequired` is `true` or where a `requestAlgorithmMember`
272
+ # is modeled and supplied.
273
+ #
262
274
  # @option options [Integer] :request_min_compression_size_bytes (10240)
263
275
  # The minimum size in bytes that triggers compression for request
264
276
  # bodies. The value must be non-negative integer value between 0
265
277
  # and 10485780 bytes inclusive.
266
278
  #
279
+ # @option options [String] :response_checksum_validation ("when_supported")
280
+ # Determines when checksum validation will be performed on response payloads. Values are:
281
+ #
282
+ # * `when_supported` - (default) When set, checksum validation is performed on all
283
+ # response payloads of operations modeled with the `httpChecksum` trait where
284
+ # `responseAlgorithms` is modeled, except when no modeled checksum algorithms
285
+ # are supported.
286
+ # * `when_required` - When set, checksum validation is not performed on
287
+ # response payloads of operations unless the checksum algorithm is supported and
288
+ # the `requestValidationModeMember` member is set to `ENABLED`.
289
+ #
267
290
  # @option options [Proc] :retry_backoff
268
291
  # A proc or lambda used for backoff. Defaults to 2**retries * retry_base_delay.
269
292
  # This option is only used in the `legacy` retry mode.
@@ -1020,6 +1043,35 @@ module Aws::DocDB
1020
1043
  #
1021
1044
  # </note>
1022
1045
  #
1046
+ # @option params [Boolean] :manage_master_user_password
1047
+ # Specifies whether to manage the master user password with Amazon Web
1048
+ # Services Secrets Manager.
1049
+ #
1050
+ # Constraint: You can't manage the master user password with Amazon Web
1051
+ # Services Secrets Manager if `MasterUserPassword` is specified.
1052
+ #
1053
+ # @option params [String] :master_user_secret_kms_key_id
1054
+ # The Amazon Web Services KMS key identifier to encrypt a secret that is
1055
+ # automatically generated and managed in Amazon Web Services Secrets
1056
+ # Manager. This setting is valid only if the master user password is
1057
+ # managed by Amazon DocumentDB in Amazon Web Services Secrets Manager
1058
+ # for the DB cluster.
1059
+ #
1060
+ # The Amazon Web Services KMS key identifier is the key ARN, key ID,
1061
+ # alias ARN, or alias name for the KMS key. To use a KMS key in a
1062
+ # different Amazon Web Services account, specify the key ARN or alias
1063
+ # ARN.
1064
+ #
1065
+ # If you don't specify `MasterUserSecretKmsKeyId`, then the
1066
+ # `aws/secretsmanager` KMS key is used to encrypt the secret. If the
1067
+ # secret is in a different Amazon Web Services account, then you can't
1068
+ # use the `aws/secretsmanager` KMS key to encrypt the secret, and you
1069
+ # must use a customer managed KMS key.
1070
+ #
1071
+ # There is a default KMS key for your Amazon Web Services account. Your
1072
+ # Amazon Web Services account has a different default KMS key for each
1073
+ # Amazon Web Services Region.
1074
+ #
1023
1075
  # @option params [String] :source_region
1024
1076
  # The source region of the snapshot. This is only needed when the
1025
1077
  # shapshot is encrypted and in a different region.
@@ -1057,6 +1109,8 @@ module Aws::DocDB
1057
1109
  # deletion_protection: false,
1058
1110
  # global_cluster_identifier: "GlobalClusterIdentifier",
1059
1111
  # storage_type: "String",
1112
+ # manage_master_user_password: false,
1113
+ # master_user_secret_kms_key_id: "String",
1060
1114
  # source_region: "String",
1061
1115
  # })
1062
1116
  #
@@ -1106,6 +1160,9 @@ module Aws::DocDB
1106
1160
  # resp.db_cluster.enabled_cloudwatch_logs_exports[0] #=> String
1107
1161
  # resp.db_cluster.deletion_protection #=> Boolean
1108
1162
  # resp.db_cluster.storage_type #=> String
1163
+ # resp.db_cluster.master_user_secret.secret_arn #=> String
1164
+ # resp.db_cluster.master_user_secret.secret_status #=> String
1165
+ # resp.db_cluster.master_user_secret.kms_key_id #=> String
1109
1166
  #
1110
1167
  # @see http://docs.aws.amazon.com/goto/WebAPI/docdb-2014-10-31/CreateDBCluster AWS API Documentation
1111
1168
  #
@@ -1858,6 +1915,9 @@ module Aws::DocDB
1858
1915
  # resp.db_cluster.enabled_cloudwatch_logs_exports[0] #=> String
1859
1916
  # resp.db_cluster.deletion_protection #=> Boolean
1860
1917
  # resp.db_cluster.storage_type #=> String
1918
+ # resp.db_cluster.master_user_secret.secret_arn #=> String
1919
+ # resp.db_cluster.master_user_secret.secret_status #=> String
1920
+ # resp.db_cluster.master_user_secret.kms_key_id #=> String
1861
1921
  #
1862
1922
  # @see http://docs.aws.amazon.com/goto/WebAPI/docdb-2014-10-31/DeleteDBCluster AWS API Documentation
1863
1923
  #
@@ -2706,6 +2766,9 @@ module Aws::DocDB
2706
2766
  # resp.db_clusters[0].enabled_cloudwatch_logs_exports[0] #=> String
2707
2767
  # resp.db_clusters[0].deletion_protection #=> Boolean
2708
2768
  # resp.db_clusters[0].storage_type #=> String
2769
+ # resp.db_clusters[0].master_user_secret.secret_arn #=> String
2770
+ # resp.db_clusters[0].master_user_secret.secret_status #=> String
2771
+ # resp.db_clusters[0].master_user_secret.kms_key_id #=> String
2709
2772
  #
2710
2773
  # @see http://docs.aws.amazon.com/goto/WebAPI/docdb-2014-10-31/DescribeDBClusters AWS API Documentation
2711
2774
  #
@@ -3676,6 +3739,9 @@ module Aws::DocDB
3676
3739
  # resp.db_cluster.enabled_cloudwatch_logs_exports[0] #=> String
3677
3740
  # resp.db_cluster.deletion_protection #=> Boolean
3678
3741
  # resp.db_cluster.storage_type #=> String
3742
+ # resp.db_cluster.master_user_secret.secret_arn #=> String
3743
+ # resp.db_cluster.master_user_secret.secret_status #=> String
3744
+ # resp.db_cluster.master_user_secret.kms_key_id #=> String
3679
3745
  #
3680
3746
  # @see http://docs.aws.amazon.com/goto/WebAPI/docdb-2014-10-31/FailoverDBCluster AWS API Documentation
3681
3747
  #
@@ -3979,6 +4045,60 @@ module Aws::DocDB
3979
4045
  #
3980
4046
  # Default value is `standard `
3981
4047
  #
4048
+ # @option params [Boolean] :manage_master_user_password
4049
+ # Specifies whether to manage the master user password with Amazon Web
4050
+ # Services Secrets Manager. If the cluster doesn't manage the master
4051
+ # user password with Amazon Web Services Secrets Manager, you can turn
4052
+ # on this management. In this case, you can't specify
4053
+ # `MasterUserPassword`. If the cluster already manages the master user
4054
+ # password with Amazon Web Services Secrets Manager, and you specify
4055
+ # that the master user password is not managed with Amazon Web Services
4056
+ # Secrets Manager, then you must specify `MasterUserPassword`. In this
4057
+ # case, Amazon DocumentDB deletes the secret and uses the new password
4058
+ # for the master user specified by `MasterUserPassword`.
4059
+ #
4060
+ # @option params [String] :master_user_secret_kms_key_id
4061
+ # The Amazon Web Services KMS key identifier to encrypt a secret that is
4062
+ # automatically generated and managed in Amazon Web Services Secrets
4063
+ # Manager.
4064
+ #
4065
+ # This setting is valid only if both of the following conditions are
4066
+ # met:
4067
+ #
4068
+ # * The cluster doesn't manage the master user password in Amazon Web
4069
+ # Services Secrets Manager. If the cluster already manages the master
4070
+ # user password in Amazon Web Services Secrets Manager, you can't
4071
+ # change the KMS key that is used to encrypt the secret.
4072
+ #
4073
+ # * You are enabling `ManageMasterUserPassword` to manage the master
4074
+ # user password in Amazon Web Services Secrets Manager. If you are
4075
+ # turning on `ManageMasterUserPassword` and don't specify
4076
+ # `MasterUserSecretKmsKeyId`, then the `aws/secretsmanager` KMS key is
4077
+ # used to encrypt the secret. If the secret is in a different Amazon
4078
+ # Web Services account, then you can't use the `aws/secretsmanager`
4079
+ # KMS key to encrypt the secret, and you must use a customer managed
4080
+ # KMS key.
4081
+ #
4082
+ # The Amazon Web Services KMS key identifier is the key ARN, key ID,
4083
+ # alias ARN, or alias name for the KMS key. To use a KMS key in a
4084
+ # different Amazon Web Services account, specify the key ARN or alias
4085
+ # ARN.
4086
+ #
4087
+ # There is a default KMS key for your Amazon Web Services account. Your
4088
+ # Amazon Web Services account has a different default KMS key for each
4089
+ # Amazon Web Services Region.
4090
+ #
4091
+ # @option params [Boolean] :rotate_master_user_password
4092
+ # Specifies whether to rotate the secret managed by Amazon Web Services
4093
+ # Secrets Manager for the master user password.
4094
+ #
4095
+ # This setting is valid only if the master user password is managed by
4096
+ # Amazon DocumentDB in Amazon Web Services Secrets Manager for the
4097
+ # cluster. The secret value contains the updated password.
4098
+ #
4099
+ # Constraint: You must apply the change immediately when rotating the
4100
+ # master user password.
4101
+ #
3982
4102
  # @return [Types::ModifyDBClusterResult] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
3983
4103
  #
3984
4104
  # * {Types::ModifyDBClusterResult#db_cluster #db_cluster} => Types::DBCluster
@@ -4004,6 +4124,9 @@ module Aws::DocDB
4004
4124
  # allow_major_version_upgrade: false,
4005
4125
  # deletion_protection: false,
4006
4126
  # storage_type: "String",
4127
+ # manage_master_user_password: false,
4128
+ # master_user_secret_kms_key_id: "String",
4129
+ # rotate_master_user_password: false,
4007
4130
  # })
4008
4131
  #
4009
4132
  # @example Response structure
@@ -4052,6 +4175,9 @@ module Aws::DocDB
4052
4175
  # resp.db_cluster.enabled_cloudwatch_logs_exports[0] #=> String
4053
4176
  # resp.db_cluster.deletion_protection #=> Boolean
4054
4177
  # resp.db_cluster.storage_type #=> String
4178
+ # resp.db_cluster.master_user_secret.secret_arn #=> String
4179
+ # resp.db_cluster.master_user_secret.secret_status #=> String
4180
+ # resp.db_cluster.master_user_secret.kms_key_id #=> String
4055
4181
  #
4056
4182
  # @see http://docs.aws.amazon.com/goto/WebAPI/docdb-2014-10-31/ModifyDBCluster AWS API Documentation
4057
4183
  #
@@ -5127,6 +5253,9 @@ module Aws::DocDB
5127
5253
  # resp.db_cluster.enabled_cloudwatch_logs_exports[0] #=> String
5128
5254
  # resp.db_cluster.deletion_protection #=> Boolean
5129
5255
  # resp.db_cluster.storage_type #=> String
5256
+ # resp.db_cluster.master_user_secret.secret_arn #=> String
5257
+ # resp.db_cluster.master_user_secret.secret_status #=> String
5258
+ # resp.db_cluster.master_user_secret.kms_key_id #=> String
5130
5259
  #
5131
5260
  # @see http://docs.aws.amazon.com/goto/WebAPI/docdb-2014-10-31/RestoreDBClusterFromSnapshot AWS API Documentation
5132
5261
  #
@@ -5351,6 +5480,9 @@ module Aws::DocDB
5351
5480
  # resp.db_cluster.enabled_cloudwatch_logs_exports[0] #=> String
5352
5481
  # resp.db_cluster.deletion_protection #=> Boolean
5353
5482
  # resp.db_cluster.storage_type #=> String
5483
+ # resp.db_cluster.master_user_secret.secret_arn #=> String
5484
+ # resp.db_cluster.master_user_secret.secret_status #=> String
5485
+ # resp.db_cluster.master_user_secret.kms_key_id #=> String
5354
5486
  #
5355
5487
  # @see http://docs.aws.amazon.com/goto/WebAPI/docdb-2014-10-31/RestoreDBClusterToPointInTime AWS API Documentation
5356
5488
  #
@@ -5429,6 +5561,9 @@ module Aws::DocDB
5429
5561
  # resp.db_cluster.enabled_cloudwatch_logs_exports[0] #=> String
5430
5562
  # resp.db_cluster.deletion_protection #=> Boolean
5431
5563
  # resp.db_cluster.storage_type #=> String
5564
+ # resp.db_cluster.master_user_secret.secret_arn #=> String
5565
+ # resp.db_cluster.master_user_secret.secret_status #=> String
5566
+ # resp.db_cluster.master_user_secret.kms_key_id #=> String
5432
5567
  #
5433
5568
  # @see http://docs.aws.amazon.com/goto/WebAPI/docdb-2014-10-31/StartDBCluster AWS API Documentation
5434
5569
  #
@@ -5507,6 +5642,9 @@ module Aws::DocDB
5507
5642
  # resp.db_cluster.enabled_cloudwatch_logs_exports[0] #=> String
5508
5643
  # resp.db_cluster.deletion_protection #=> Boolean
5509
5644
  # resp.db_cluster.storage_type #=> String
5645
+ # resp.db_cluster.master_user_secret.secret_arn #=> String
5646
+ # resp.db_cluster.master_user_secret.secret_status #=> String
5647
+ # resp.db_cluster.master_user_secret.kms_key_id #=> String
5510
5648
  #
5511
5649
  # @see http://docs.aws.amazon.com/goto/WebAPI/docdb-2014-10-31/StopDBCluster AWS API Documentation
5512
5650
  #
@@ -5605,7 +5743,7 @@ module Aws::DocDB
5605
5743
  tracer: tracer
5606
5744
  )
5607
5745
  context[:gem_name] = 'aws-sdk-docdb'
5608
- context[:gem_version] = '1.79.0'
5746
+ context[:gem_version] = '1.81.0'
5609
5747
  Seahorse::Client::Request.new(handlers, context)
5610
5748
  end
5611
5749
 
@@ -34,6 +34,7 @@ module Aws::DocDB
34
34
  CertificateMessage = Shapes::StructureShape.new(name: 'CertificateMessage')
35
35
  CertificateNotFoundFault = Shapes::StructureShape.new(name: 'CertificateNotFoundFault', error: {"code"=>"CertificateNotFound", "httpStatusCode"=>404, "senderFault"=>true})
36
36
  CloudwatchLogsExportConfiguration = Shapes::StructureShape.new(name: 'CloudwatchLogsExportConfiguration')
37
+ ClusterMasterUserSecret = Shapes::StructureShape.new(name: 'ClusterMasterUserSecret')
37
38
  CopyDBClusterParameterGroupMessage = Shapes::StructureShape.new(name: 'CopyDBClusterParameterGroupMessage')
38
39
  CopyDBClusterParameterGroupResult = Shapes::StructureShape.new(name: 'CopyDBClusterParameterGroupResult')
39
40
  CopyDBClusterSnapshotMessage = Shapes::StructureShape.new(name: 'CopyDBClusterSnapshotMessage')
@@ -314,6 +315,11 @@ module Aws::DocDB
314
315
  CloudwatchLogsExportConfiguration.add_member(:disable_log_types, Shapes::ShapeRef.new(shape: LogTypeList, location_name: "DisableLogTypes"))
315
316
  CloudwatchLogsExportConfiguration.struct_class = Types::CloudwatchLogsExportConfiguration
316
317
 
318
+ ClusterMasterUserSecret.add_member(:secret_arn, Shapes::ShapeRef.new(shape: String, location_name: "SecretArn"))
319
+ ClusterMasterUserSecret.add_member(:secret_status, Shapes::ShapeRef.new(shape: String, location_name: "SecretStatus"))
320
+ ClusterMasterUserSecret.add_member(:kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "KmsKeyId"))
321
+ ClusterMasterUserSecret.struct_class = Types::ClusterMasterUserSecret
322
+
317
323
  CopyDBClusterParameterGroupMessage.add_member(:source_db_cluster_parameter_group_identifier, Shapes::ShapeRef.new(shape: String, required: true, location_name: "SourceDBClusterParameterGroupIdentifier"))
318
324
  CopyDBClusterParameterGroupMessage.add_member(:target_db_cluster_parameter_group_identifier, Shapes::ShapeRef.new(shape: String, required: true, location_name: "TargetDBClusterParameterGroupIdentifier"))
319
325
  CopyDBClusterParameterGroupMessage.add_member(:target_db_cluster_parameter_group_description, Shapes::ShapeRef.new(shape: String, required: true, location_name: "TargetDBClusterParameterGroupDescription"))
@@ -356,6 +362,8 @@ module Aws::DocDB
356
362
  CreateDBClusterMessage.add_member(:deletion_protection, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "DeletionProtection"))
357
363
  CreateDBClusterMessage.add_member(:global_cluster_identifier, Shapes::ShapeRef.new(shape: GlobalClusterIdentifier, location_name: "GlobalClusterIdentifier"))
358
364
  CreateDBClusterMessage.add_member(:storage_type, Shapes::ShapeRef.new(shape: String, location_name: "StorageType"))
365
+ CreateDBClusterMessage.add_member(:manage_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "ManageMasterUserPassword"))
366
+ CreateDBClusterMessage.add_member(:master_user_secret_kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "MasterUserSecretKmsKeyId"))
359
367
  CreateDBClusterMessage.add_member(:source_region, Shapes::ShapeRef.new(shape: String, location_name: "SourceRegion"))
360
368
  CreateDBClusterMessage.struct_class = Types::CreateDBClusterMessage
361
369
 
@@ -463,6 +471,7 @@ module Aws::DocDB
463
471
  DBCluster.add_member(:enabled_cloudwatch_logs_exports, Shapes::ShapeRef.new(shape: LogTypeList, location_name: "EnabledCloudwatchLogsExports"))
464
472
  DBCluster.add_member(:deletion_protection, Shapes::ShapeRef.new(shape: Boolean, location_name: "DeletionProtection"))
465
473
  DBCluster.add_member(:storage_type, Shapes::ShapeRef.new(shape: String, location_name: "StorageType"))
474
+ DBCluster.add_member(:master_user_secret, Shapes::ShapeRef.new(shape: ClusterMasterUserSecret, location_name: "MasterUserSecret"))
466
475
  DBCluster.struct_class = Types::DBCluster
467
476
 
468
477
  DBClusterAlreadyExistsFault.struct_class = Types::DBClusterAlreadyExistsFault
@@ -981,6 +990,9 @@ module Aws::DocDB
981
990
  ModifyDBClusterMessage.add_member(:allow_major_version_upgrade, Shapes::ShapeRef.new(shape: Boolean, location_name: "AllowMajorVersionUpgrade"))
982
991
  ModifyDBClusterMessage.add_member(:deletion_protection, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "DeletionProtection"))
983
992
  ModifyDBClusterMessage.add_member(:storage_type, Shapes::ShapeRef.new(shape: String, location_name: "StorageType"))
993
+ ModifyDBClusterMessage.add_member(:manage_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "ManageMasterUserPassword"))
994
+ ModifyDBClusterMessage.add_member(:master_user_secret_kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "MasterUserSecretKmsKeyId"))
995
+ ModifyDBClusterMessage.add_member(:rotate_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "RotateMasterUserPassword"))
984
996
  ModifyDBClusterMessage.struct_class = Types::ModifyDBClusterMessage
985
997
 
986
998
  ModifyDBClusterParameterGroupMessage.add_member(:db_cluster_parameter_group_name, Shapes::ShapeRef.new(shape: String, required: true, location_name: "DBClusterParameterGroupName"))
@@ -279,6 +279,51 @@ module Aws::DocDB
279
279
  include Aws::Structure
280
280
  end
281
281
 
282
+ # Contains the secret managed by Amazon DocumentDB in Amazon Web
283
+ # Services Secrets Manager for the master user password.
284
+ #
285
+ # @!attribute [rw] secret_arn
286
+ # The Amazon Resource Name (ARN) of the secret.
287
+ # @return [String]
288
+ #
289
+ # @!attribute [rw] secret_status
290
+ # The status of the secret.
291
+ #
292
+ # The possible status values include the following:
293
+ #
294
+ # * creating - The secret is being created.
295
+ #
296
+ # * active - The secret is available for normal use and rotation.
297
+ #
298
+ # * rotating - The secret is being rotated.
299
+ #
300
+ # * impaired - The secret can be used to access database credentials,
301
+ # but it can't be rotated. A secret might have this status if, for
302
+ # example, permissions are changed so that Amazon DocumentDB can no
303
+ # longer access either the secret or the KMS key for the secret.
304
+ #
305
+ # When a secret has this status, you can correct the condition that
306
+ # caused the status. Alternatively, modify the instance to turn off
307
+ # automatic management of database credentials, and then modify the
308
+ # instance again to turn on automatic management of database
309
+ # credentials.
310
+ # @return [String]
311
+ #
312
+ # @!attribute [rw] kms_key_id
313
+ # The Amazon Web Services KMS key identifier that is used to encrypt
314
+ # the secret.
315
+ # @return [String]
316
+ #
317
+ # @see http://docs.aws.amazon.com/goto/WebAPI/docdb-2014-10-31/ClusterMasterUserSecret AWS API Documentation
318
+ #
319
+ class ClusterMasterUserSecret < Struct.new(
320
+ :secret_arn,
321
+ :secret_status,
322
+ :kms_key_id)
323
+ SENSITIVE = []
324
+ include Aws::Structure
325
+ end
326
+
282
327
  # Represents the input to CopyDBClusterParameterGroup.
283
328
  #
284
329
  # @!attribute [rw] source_db_cluster_parameter_group_identifier
@@ -686,6 +731,37 @@ module Aws::DocDB
686
731
  # </note>
687
732
  # @return [String]
688
733
  #
734
+ # @!attribute [rw] manage_master_user_password
735
+ # Specifies whether to manage the master user password with Amazon Web
736
+ # Services Secrets Manager.
737
+ #
738
+ # Constraint: You can't manage the master user password with Amazon
739
+ # Web Services Secrets Manager if `MasterUserPassword` is specified.
740
+ # @return [Boolean]
741
+ #
742
+ # @!attribute [rw] master_user_secret_kms_key_id
743
+ # The Amazon Web Services KMS key identifier to encrypt a secret that
744
+ # is automatically generated and managed in Amazon Web Services
745
+ # Secrets Manager. This setting is valid only if the master user
746
+ # password is managed by Amazon DocumentDB in Amazon Web Services
747
+ # Secrets Manager for the DB cluster.
748
+ #
749
+ # The Amazon Web Services KMS key identifier is the key ARN, key ID,
750
+ # alias ARN, or alias name for the KMS key. To use a KMS key in a
751
+ # different Amazon Web Services account, specify the key ARN or alias
752
+ # ARN.
753
+ #
754
+ # If you don't specify `MasterUserSecretKmsKeyId`, then the
755
+ # `aws/secretsmanager` KMS key is used to encrypt the secret. If the
756
+ # secret is in a different Amazon Web Services account, then you
757
+ # can't use the `aws/secretsmanager` KMS key to encrypt the secret,
758
+ # and you must use a customer managed KMS key.
759
+ #
760
+ # There is a default KMS key for your Amazon Web Services account.
761
+ # Your Amazon Web Services account has a different default KMS key for
762
+ # each Amazon Web Services Region.
763
+ # @return [String]
764
+ #
689
765
  # @!attribute [rw] source_region
690
766
  # The source region of the snapshot. This is only needed when the
691
767
  # shapshot is encrypted and in a different region.
@@ -715,6 +791,8 @@ module Aws::DocDB
715
791
  :deletion_protection,
716
792
  :global_cluster_identifier,
717
793
  :storage_type,
794
+ :manage_master_user_password,
795
+ :master_user_secret_kms_key_id,
718
796
  :source_region)
719
797
  SENSITIVE = []
720
798
  include Aws::Structure
@@ -1373,6 +1451,11 @@ module Aws::DocDB
1373
1451
  # Default value is `standard `
1374
1452
  # @return [String]
1375
1453
  #
1454
+ # @!attribute [rw] master_user_secret
1455
+ # The secret managed by Amazon DocumentDB in Amazon Web Services
1456
+ # Secrets Manager for the master user password.
1457
+ # @return [Types::ClusterMasterUserSecret]
1458
+ #
1376
1459
  # @see http://docs.aws.amazon.com/goto/WebAPI/docdb-2014-10-31/DBCluster AWS API Documentation
1377
1460
  #
1378
1461
  class DBCluster < Struct.new(
@@ -1408,7 +1491,8 @@ module Aws::DocDB
1408
1491
  :cluster_create_time,
1409
1492
  :enabled_cloudwatch_logs_exports,
1410
1493
  :deletion_protection,
1411
- :storage_type)
1494
+ :storage_type,
1495
+ :master_user_secret)
1412
1496
  SENSITIVE = []
1413
1497
  include Aws::Structure
1414
1498
  end
@@ -4228,6 +4312,64 @@ module Aws::DocDB
4228
4312
  # Default value is `standard `
4229
4313
  # @return [String]
4230
4314
  #
4315
+ # @!attribute [rw] manage_master_user_password
4316
+ # Specifies whether to manage the master user password with Amazon Web
4317
+ # Services Secrets Manager. If the cluster doesn't manage the master
4318
+ # user password with Amazon Web Services Secrets Manager, you can turn
4319
+ # on this management. In this case, you can't specify
4320
+ # `MasterUserPassword`. If the cluster already manages the master user
4321
+ # password with Amazon Web Services Secrets Manager, and you specify
4322
+ # that the master user password is not managed with Amazon Web
4323
+ # Services Secrets Manager, then you must specify
4324
+ # `MasterUserPassword`. In this case, Amazon DocumentDB deletes the
4325
+ # secret and uses the new password for the master user specified by
4326
+ # `MasterUserPassword`.
4327
+ # @return [Boolean]
4328
+ #
4329
+ # @!attribute [rw] master_user_secret_kms_key_id
4330
+ # The Amazon Web Services KMS key identifier to encrypt a secret that
4331
+ # is automatically generated and managed in Amazon Web Services
4332
+ # Secrets Manager.
4333
+ #
4334
+ # This setting is valid only if both of the following conditions are
4335
+ # met:
4336
+ #
4337
+ # * The cluster doesn't manage the master user password in Amazon Web
4338
+ # Services Secrets Manager. If the cluster already manages the
4339
+ # master user password in Amazon Web Services Secrets Manager, you
4340
+ # can't change the KMS key that is used to encrypt the secret.
4341
+ #
4342
+ # * You are enabling `ManageMasterUserPassword` to manage the master
4343
+ # user password in Amazon Web Services Secrets Manager. If you are
4344
+ # turning on `ManageMasterUserPassword` and don't specify
4345
+ # `MasterUserSecretKmsKeyId`, then the `aws/secretsmanager` KMS key
4346
+ # is used to encrypt the secret. If the secret is in a different
4347
+ # Amazon Web Services account, then you can't use the
4348
+ # `aws/secretsmanager` KMS key to encrypt the secret, and you must
4349
+ # use a customer managed KMS key.
4350
+ #
4351
+ # The Amazon Web Services KMS key identifier is the key ARN, key ID,
4352
+ # alias ARN, or alias name for the KMS key. To use a KMS key in a
4353
+ # different Amazon Web Services account, specify the key ARN or alias
4354
+ # ARN.
4355
+ #
4356
+ # There is a default KMS key for your Amazon Web Services account.
4357
+ # Your Amazon Web Services account has a different default KMS key for
4358
+ # each Amazon Web Services Region.
4359
+ # @return [String]
4360
+ #
4361
+ # @!attribute [rw] rotate_master_user_password
4362
+ # Specifies whether to rotate the secret managed by Amazon Web
4363
+ # Services Secrets Manager for the master user password.
4364
+ #
4365
+ # This setting is valid only if the master user password is managed by
4366
+ # Amazon DocumentDB in Amazon Web Services Secrets Manager for the
4367
+ # cluster. The secret value contains the updated password.
4368
+ #
4369
+ # Constraint: You must apply the change immediately when rotating the
4370
+ # master user password.
4371
+ # @return [Boolean]
4372
+ #
4231
4373
  # @see http://docs.aws.amazon.com/goto/WebAPI/docdb-2014-10-31/ModifyDBClusterMessage AWS API Documentation
4232
4374
  #
4233
4375
  class ModifyDBClusterMessage < Struct.new(
@@ -4245,7 +4387,10 @@ module Aws::DocDB
4245
4387
  :engine_version,
4246
4388
  :allow_major_version_upgrade,
4247
4389
  :deletion_protection,
4248
- :storage_type)
4390
+ :storage_type,
4391
+ :manage_master_user_password,
4392
+ :master_user_secret_kms_key_id,
4393
+ :rotate_master_user_password)
4249
4394
  SENSITIVE = []
4250
4395
  include Aws::Structure
4251
4396
  end
data/lib/aws-sdk-docdb.rb CHANGED
@@ -55,7 +55,7 @@ module Aws::DocDB
55
55
  autoload :EndpointProvider, 'aws-sdk-docdb/endpoint_provider'
56
56
  autoload :Endpoints, 'aws-sdk-docdb/endpoints'
57
57
 
58
- GEM_VERSION = '1.79.0'
58
+ GEM_VERSION = '1.81.0'
59
59
 
60
60
  end
61
61
 
data/sig/client.rbs CHANGED
@@ -39,7 +39,9 @@ module Aws
39
39
  ?logger: untyped,
40
40
  ?max_attempts: Integer,
41
41
  ?profile: String,
42
+ ?request_checksum_calculation: String,
42
43
  ?request_min_compression_size_bytes: Integer,
44
+ ?response_checksum_validation: String,
43
45
  ?retry_backoff: Proc,
44
46
  ?retry_base_delay: Float,
45
47
  ?retry_jitter: (:none | :equal | :full | ^(Integer) -> Integer),
@@ -181,6 +183,8 @@ module Aws
181
183
  ?deletion_protection: bool,
182
184
  ?global_cluster_identifier: ::String,
183
185
  ?storage_type: ::String,
186
+ ?manage_master_user_password: bool,
187
+ ?master_user_secret_kms_key_id: ::String,
184
188
  ?source_region: ::String
185
189
  ) -> _CreateDBClusterResponseSuccess
186
190
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _CreateDBClusterResponseSuccess
@@ -739,7 +743,10 @@ module Aws
739
743
  ?engine_version: ::String,
740
744
  ?allow_major_version_upgrade: bool,
741
745
  ?deletion_protection: bool,
742
- ?storage_type: ::String
746
+ ?storage_type: ::String,
747
+ ?manage_master_user_password: bool,
748
+ ?master_user_secret_kms_key_id: ::String,
749
+ ?rotate_master_user_password: bool
743
750
  ) -> _ModifyDBClusterResponseSuccess
744
751
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _ModifyDBClusterResponseSuccess
745
752
 
data/sig/resource.rbs CHANGED
@@ -39,7 +39,9 @@ module Aws
39
39
  ?logger: untyped,
40
40
  ?max_attempts: Integer,
41
41
  ?profile: String,
42
+ ?request_checksum_calculation: String,
42
43
  ?request_min_compression_size_bytes: Integer,
44
+ ?response_checksum_validation: String,
43
45
  ?retry_backoff: Proc,
44
46
  ?retry_base_delay: Float,
45
47
  ?retry_jitter: (:none | :equal | :full | ^(Integer) -> Integer),
data/sig/types.rbs CHANGED
@@ -76,6 +76,13 @@ module Aws::DocDB
76
76
  SENSITIVE: []
77
77
  end
78
78
 
79
+ class ClusterMasterUserSecret
80
+ attr_accessor secret_arn: ::String
81
+ attr_accessor secret_status: ::String
82
+ attr_accessor kms_key_id: ::String
83
+ SENSITIVE: []
84
+ end
85
+
79
86
  class CopyDBClusterParameterGroupMessage
80
87
  attr_accessor source_db_cluster_parameter_group_identifier: ::String
81
88
  attr_accessor target_db_cluster_parameter_group_identifier: ::String
@@ -127,6 +134,8 @@ module Aws::DocDB
127
134
  attr_accessor deletion_protection: bool
128
135
  attr_accessor global_cluster_identifier: ::String
129
136
  attr_accessor storage_type: ::String
137
+ attr_accessor manage_master_user_password: bool
138
+ attr_accessor master_user_secret_kms_key_id: ::String
130
139
  attr_accessor source_region: ::String
131
140
  SENSITIVE: []
132
141
  end
@@ -262,6 +271,7 @@ module Aws::DocDB
262
271
  attr_accessor enabled_cloudwatch_logs_exports: ::Array[::String]
263
272
  attr_accessor deletion_protection: bool
264
273
  attr_accessor storage_type: ::String
274
+ attr_accessor master_user_secret: Types::ClusterMasterUserSecret
265
275
  SENSITIVE: []
266
276
  end
267
277
 
@@ -914,6 +924,9 @@ module Aws::DocDB
914
924
  attr_accessor allow_major_version_upgrade: bool
915
925
  attr_accessor deletion_protection: bool
916
926
  attr_accessor storage_type: ::String
927
+ attr_accessor manage_master_user_password: bool
928
+ attr_accessor master_user_secret_kms_key_id: ::String
929
+ attr_accessor rotate_master_user_password: bool
917
930
  SENSITIVE: []
918
931
  end
919
932
 
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-docdb
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.79.0
4
+ version: 1.81.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-11-06 00:00:00.000000000 Z
11
+ date: 2025-01-15 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -19,7 +19,7 @@ dependencies:
19
19
  version: '3'
20
20
  - - ">="
21
21
  - !ruby/object:Gem::Version
22
- version: 3.210.0
22
+ version: 3.216.0
23
23
  type: :runtime
24
24
  prerelease: false
25
25
  version_requirements: !ruby/object:Gem::Requirement
@@ -29,7 +29,7 @@ dependencies:
29
29
  version: '3'
30
30
  - - ">="
31
31
  - !ruby/object:Gem::Version
32
- version: 3.210.0
32
+ version: 3.216.0
33
33
  - !ruby/object:Gem::Dependency
34
34
  name: aws-sigv4
35
35
  requirement: !ruby/object:Gem::Requirement