aws-sdk-rds 1.166.0 → 1.168.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-rds/client.rb +513 -60
- data/lib/aws-sdk-rds/client_api.rb +38 -4
- data/lib/aws-sdk-rds/db_cluster.rb +165 -2
- data/lib/aws-sdk-rds/db_engine_version.rb +13 -0
- data/lib/aws-sdk-rds/db_instance.rb +146 -0
- data/lib/aws-sdk-rds/errors.rb +11 -0
- data/lib/aws-sdk-rds/resource.rb +97 -1
- data/lib/aws-sdk-rds/types.rb +552 -10
- data/lib/aws-sdk-rds.rb +1 -1
- metadata +2 -2
@@ -114,6 +114,7 @@ module Aws::RDS
|
|
114
114
|
CreateOptionGroupMessage = Shapes::StructureShape.new(name: 'CreateOptionGroupMessage')
|
115
115
|
CreateOptionGroupResult = Shapes::StructureShape.new(name: 'CreateOptionGroupResult')
|
116
116
|
CustomAvailabilityZoneNotFoundFault = Shapes::StructureShape.new(name: 'CustomAvailabilityZoneNotFoundFault')
|
117
|
+
CustomDBEngineVersionAMI = Shapes::StructureShape.new(name: 'CustomDBEngineVersionAMI')
|
117
118
|
CustomDBEngineVersionAlreadyExistsFault = Shapes::StructureShape.new(name: 'CustomDBEngineVersionAlreadyExistsFault')
|
118
119
|
CustomDBEngineVersionManifest = Shapes::StringShape.new(name: 'CustomDBEngineVersionManifest')
|
119
120
|
CustomDBEngineVersionNotFoundFault = Shapes::StructureShape.new(name: 'CustomDBEngineVersionNotFoundFault')
|
@@ -337,6 +338,7 @@ module Aws::RDS
|
|
337
338
|
DownloadDBLogFilePortionMessage = Shapes::StructureShape.new(name: 'DownloadDBLogFilePortionMessage')
|
338
339
|
EC2SecurityGroup = Shapes::StructureShape.new(name: 'EC2SecurityGroup')
|
339
340
|
EC2SecurityGroupList = Shapes::ListShape.new(name: 'EC2SecurityGroupList')
|
341
|
+
Ec2ImagePropertiesNotSupportedFault = Shapes::StructureShape.new(name: 'Ec2ImagePropertiesNotSupportedFault')
|
340
342
|
Endpoint = Shapes::StructureShape.new(name: 'Endpoint')
|
341
343
|
EngineDefaults = Shapes::StructureShape.new(name: 'EngineDefaults')
|
342
344
|
EngineFamily = Shapes::StringShape.new(name: 'EngineFamily')
|
@@ -422,6 +424,7 @@ module Aws::RDS
|
|
422
424
|
LogTypeList = Shapes::ListShape.new(name: 'LogTypeList')
|
423
425
|
Long = Shapes::IntegerShape.new(name: 'Long')
|
424
426
|
LongOptional = Shapes::IntegerShape.new(name: 'LongOptional')
|
427
|
+
MasterUserSecret = Shapes::StructureShape.new(name: 'MasterUserSecret')
|
425
428
|
MaxRecords = Shapes::IntegerShape.new(name: 'MaxRecords')
|
426
429
|
MinimumEngineVersionPerAllowedValue = Shapes::StructureShape.new(name: 'MinimumEngineVersionPerAllowedValue')
|
427
430
|
MinimumEngineVersionPerAllowedValueList = Shapes::ListShape.new(name: 'MinimumEngineVersionPerAllowedValueList')
|
@@ -868,11 +871,12 @@ module Aws::RDS
|
|
868
871
|
|
869
872
|
CreateCustomDBEngineVersionMessage.add_member(:engine, Shapes::ShapeRef.new(shape: CustomEngineName, required: true, location_name: "Engine"))
|
870
873
|
CreateCustomDBEngineVersionMessage.add_member(:engine_version, Shapes::ShapeRef.new(shape: CustomEngineVersion, required: true, location_name: "EngineVersion"))
|
871
|
-
CreateCustomDBEngineVersionMessage.add_member(:database_installation_files_s3_bucket_name, Shapes::ShapeRef.new(shape: BucketName,
|
874
|
+
CreateCustomDBEngineVersionMessage.add_member(:database_installation_files_s3_bucket_name, Shapes::ShapeRef.new(shape: BucketName, location_name: "DatabaseInstallationFilesS3BucketName"))
|
872
875
|
CreateCustomDBEngineVersionMessage.add_member(:database_installation_files_s3_prefix, Shapes::ShapeRef.new(shape: String255, location_name: "DatabaseInstallationFilesS3Prefix"))
|
873
|
-
CreateCustomDBEngineVersionMessage.add_member(:
|
876
|
+
CreateCustomDBEngineVersionMessage.add_member(:image_id, Shapes::ShapeRef.new(shape: String255, location_name: "ImageId"))
|
877
|
+
CreateCustomDBEngineVersionMessage.add_member(:kms_key_id, Shapes::ShapeRef.new(shape: KmsKeyIdOrArn, location_name: "KMSKeyId"))
|
874
878
|
CreateCustomDBEngineVersionMessage.add_member(:description, Shapes::ShapeRef.new(shape: Description, location_name: "Description"))
|
875
|
-
CreateCustomDBEngineVersionMessage.add_member(:manifest, Shapes::ShapeRef.new(shape: CustomDBEngineVersionManifest,
|
879
|
+
CreateCustomDBEngineVersionMessage.add_member(:manifest, Shapes::ShapeRef.new(shape: CustomDBEngineVersionManifest, location_name: "Manifest"))
|
876
880
|
CreateCustomDBEngineVersionMessage.add_member(:tags, Shapes::ShapeRef.new(shape: TagList, location_name: "Tags"))
|
877
881
|
CreateCustomDBEngineVersionMessage.struct_class = Types::CreateCustomDBEngineVersionMessage
|
878
882
|
|
@@ -931,6 +935,8 @@ module Aws::RDS
|
|
931
935
|
CreateDBClusterMessage.add_member(:serverless_v2_scaling_configuration, Shapes::ShapeRef.new(shape: ServerlessV2ScalingConfiguration, location_name: "ServerlessV2ScalingConfiguration"))
|
932
936
|
CreateDBClusterMessage.add_member(:network_type, Shapes::ShapeRef.new(shape: String, location_name: "NetworkType"))
|
933
937
|
CreateDBClusterMessage.add_member(:db_system_id, Shapes::ShapeRef.new(shape: String, location_name: "DBSystemId"))
|
938
|
+
CreateDBClusterMessage.add_member(:manage_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "ManageMasterUserPassword"))
|
939
|
+
CreateDBClusterMessage.add_member(:master_user_secret_kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "MasterUserSecretKmsKeyId"))
|
934
940
|
CreateDBClusterMessage.add_member(:source_region, Shapes::ShapeRef.new(shape: String, location_name: "SourceRegion"))
|
935
941
|
CreateDBClusterMessage.struct_class = Types::CreateDBClusterMessage
|
936
942
|
|
@@ -1006,6 +1012,8 @@ module Aws::RDS
|
|
1006
1012
|
CreateDBInstanceMessage.add_member(:backup_target, Shapes::ShapeRef.new(shape: String, location_name: "BackupTarget"))
|
1007
1013
|
CreateDBInstanceMessage.add_member(:network_type, Shapes::ShapeRef.new(shape: String, location_name: "NetworkType"))
|
1008
1014
|
CreateDBInstanceMessage.add_member(:storage_throughput, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "StorageThroughput"))
|
1015
|
+
CreateDBInstanceMessage.add_member(:manage_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "ManageMasterUserPassword"))
|
1016
|
+
CreateDBInstanceMessage.add_member(:master_user_secret_kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "MasterUserSecretKmsKeyId"))
|
1009
1017
|
CreateDBInstanceMessage.struct_class = Types::CreateDBInstanceMessage
|
1010
1018
|
|
1011
1019
|
CreateDBInstanceReadReplicaMessage.add_member(:db_instance_identifier, Shapes::ShapeRef.new(shape: String, required: true, location_name: "DBInstanceIdentifier"))
|
@@ -1149,6 +1157,10 @@ module Aws::RDS
|
|
1149
1157
|
|
1150
1158
|
CustomAvailabilityZoneNotFoundFault.struct_class = Types::CustomAvailabilityZoneNotFoundFault
|
1151
1159
|
|
1160
|
+
CustomDBEngineVersionAMI.add_member(:image_id, Shapes::ShapeRef.new(shape: String, location_name: "ImageId"))
|
1161
|
+
CustomDBEngineVersionAMI.add_member(:status, Shapes::ShapeRef.new(shape: String, location_name: "Status"))
|
1162
|
+
CustomDBEngineVersionAMI.struct_class = Types::CustomDBEngineVersionAMI
|
1163
|
+
|
1152
1164
|
CustomDBEngineVersionAlreadyExistsFault.struct_class = Types::CustomDBEngineVersionAlreadyExistsFault
|
1153
1165
|
|
1154
1166
|
CustomDBEngineVersionNotFoundFault.struct_class = Types::CustomDBEngineVersionNotFoundFault
|
@@ -1225,6 +1237,7 @@ module Aws::RDS
|
|
1225
1237
|
DBCluster.add_member(:serverless_v2_scaling_configuration, Shapes::ShapeRef.new(shape: ServerlessV2ScalingConfigurationInfo, location_name: "ServerlessV2ScalingConfiguration"))
|
1226
1238
|
DBCluster.add_member(:network_type, Shapes::ShapeRef.new(shape: String, location_name: "NetworkType"))
|
1227
1239
|
DBCluster.add_member(:db_system_id, Shapes::ShapeRef.new(shape: String, location_name: "DBSystemId"))
|
1240
|
+
DBCluster.add_member(:master_user_secret, Shapes::ShapeRef.new(shape: MasterUserSecret, location_name: "MasterUserSecret"))
|
1228
1241
|
DBCluster.struct_class = Types::DBCluster
|
1229
1242
|
|
1230
1243
|
DBClusterAlreadyExistsFault.struct_class = Types::DBClusterAlreadyExistsFault
|
@@ -1385,6 +1398,8 @@ module Aws::RDS
|
|
1385
1398
|
DBEngineVersion.add_member(:db_engine_description, Shapes::ShapeRef.new(shape: String, location_name: "DBEngineDescription"))
|
1386
1399
|
DBEngineVersion.add_member(:db_engine_version_description, Shapes::ShapeRef.new(shape: String, location_name: "DBEngineVersionDescription"))
|
1387
1400
|
DBEngineVersion.add_member(:default_character_set, Shapes::ShapeRef.new(shape: CharacterSet, location_name: "DefaultCharacterSet"))
|
1401
|
+
DBEngineVersion.add_member(:image, Shapes::ShapeRef.new(shape: CustomDBEngineVersionAMI, location_name: "Image"))
|
1402
|
+
DBEngineVersion.add_member(:db_engine_media_type, Shapes::ShapeRef.new(shape: String, location_name: "DBEngineMediaType"))
|
1388
1403
|
DBEngineVersion.add_member(:supported_character_sets, Shapes::ShapeRef.new(shape: SupportedCharacterSetsList, location_name: "SupportedCharacterSets"))
|
1389
1404
|
DBEngineVersion.add_member(:supported_nchar_character_sets, Shapes::ShapeRef.new(shape: SupportedCharacterSetsList, location_name: "SupportedNcharCharacterSets"))
|
1390
1405
|
DBEngineVersion.add_member(:valid_upgrade_target, Shapes::ShapeRef.new(shape: ValidUpgradeTargetList, location_name: "ValidUpgradeTarget"))
|
@@ -1492,6 +1507,7 @@ module Aws::RDS
|
|
1492
1507
|
DBInstance.add_member(:activity_stream_policy_status, Shapes::ShapeRef.new(shape: ActivityStreamPolicyStatus, location_name: "ActivityStreamPolicyStatus"))
|
1493
1508
|
DBInstance.add_member(:storage_throughput, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "StorageThroughput"))
|
1494
1509
|
DBInstance.add_member(:db_system_id, Shapes::ShapeRef.new(shape: String, location_name: "DBSystemId"))
|
1510
|
+
DBInstance.add_member(:master_user_secret, Shapes::ShapeRef.new(shape: MasterUserSecret, location_name: "MasterUserSecret"))
|
1495
1511
|
DBInstance.struct_class = Types::DBInstance
|
1496
1512
|
|
1497
1513
|
DBInstanceAlreadyExistsFault.struct_class = Types::DBInstanceAlreadyExistsFault
|
@@ -2242,6 +2258,8 @@ module Aws::RDS
|
|
2242
2258
|
|
2243
2259
|
EC2SecurityGroupList.member = Shapes::ShapeRef.new(shape: EC2SecurityGroup, location_name: "EC2SecurityGroup")
|
2244
2260
|
|
2261
|
+
Ec2ImagePropertiesNotSupportedFault.struct_class = Types::Ec2ImagePropertiesNotSupportedFault
|
2262
|
+
|
2245
2263
|
Endpoint.add_member(:address, Shapes::ShapeRef.new(shape: String, location_name: "Address"))
|
2246
2264
|
Endpoint.add_member(:port, Shapes::ShapeRef.new(shape: Integer, location_name: "Port"))
|
2247
2265
|
Endpoint.add_member(:hosted_zone_id, Shapes::ShapeRef.new(shape: String, location_name: "HostedZoneId"))
|
@@ -2471,6 +2489,11 @@ module Aws::RDS
|
|
2471
2489
|
|
2472
2490
|
LogTypeList.member = Shapes::ShapeRef.new(shape: String)
|
2473
2491
|
|
2492
|
+
MasterUserSecret.add_member(:secret_arn, Shapes::ShapeRef.new(shape: String, location_name: "SecretArn"))
|
2493
|
+
MasterUserSecret.add_member(:secret_status, Shapes::ShapeRef.new(shape: String, location_name: "SecretStatus"))
|
2494
|
+
MasterUserSecret.add_member(:kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "KmsKeyId"))
|
2495
|
+
MasterUserSecret.struct_class = Types::MasterUserSecret
|
2496
|
+
|
2474
2497
|
MinimumEngineVersionPerAllowedValue.add_member(:allowed_value, Shapes::ShapeRef.new(shape: String, location_name: "AllowedValue"))
|
2475
2498
|
MinimumEngineVersionPerAllowedValue.add_member(:minimum_engine_version, Shapes::ShapeRef.new(shape: String, location_name: "MinimumEngineVersion"))
|
2476
2499
|
MinimumEngineVersionPerAllowedValue.struct_class = Types::MinimumEngineVersionPerAllowedValue
|
@@ -2550,6 +2573,9 @@ module Aws::RDS
|
|
2550
2573
|
ModifyDBClusterMessage.add_member(:performance_insights_retention_period, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "PerformanceInsightsRetentionPeriod"))
|
2551
2574
|
ModifyDBClusterMessage.add_member(:serverless_v2_scaling_configuration, Shapes::ShapeRef.new(shape: ServerlessV2ScalingConfiguration, location_name: "ServerlessV2ScalingConfiguration"))
|
2552
2575
|
ModifyDBClusterMessage.add_member(:network_type, Shapes::ShapeRef.new(shape: String, location_name: "NetworkType"))
|
2576
|
+
ModifyDBClusterMessage.add_member(:manage_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "ManageMasterUserPassword"))
|
2577
|
+
ModifyDBClusterMessage.add_member(:rotate_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "RotateMasterUserPassword"))
|
2578
|
+
ModifyDBClusterMessage.add_member(:master_user_secret_kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "MasterUserSecretKmsKeyId"))
|
2553
2579
|
ModifyDBClusterMessage.struct_class = Types::ModifyDBClusterMessage
|
2554
2580
|
|
2555
2581
|
ModifyDBClusterParameterGroupMessage.add_member(:db_cluster_parameter_group_name, Shapes::ShapeRef.new(shape: String, required: true, location_name: "DBClusterParameterGroupName"))
|
@@ -2617,6 +2643,9 @@ module Aws::RDS
|
|
2617
2643
|
ModifyDBInstanceMessage.add_member(:resume_full_automation_mode_minutes, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "ResumeFullAutomationModeMinutes"))
|
2618
2644
|
ModifyDBInstanceMessage.add_member(:network_type, Shapes::ShapeRef.new(shape: String, location_name: "NetworkType"))
|
2619
2645
|
ModifyDBInstanceMessage.add_member(:storage_throughput, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "StorageThroughput"))
|
2646
|
+
ModifyDBInstanceMessage.add_member(:manage_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "ManageMasterUserPassword"))
|
2647
|
+
ModifyDBInstanceMessage.add_member(:rotate_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "RotateMasterUserPassword"))
|
2648
|
+
ModifyDBInstanceMessage.add_member(:master_user_secret_kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "MasterUserSecretKmsKeyId"))
|
2620
2649
|
ModifyDBInstanceMessage.struct_class = Types::ModifyDBInstanceMessage
|
2621
2650
|
|
2622
2651
|
ModifyDBInstanceResult.add_member(:db_instance, Shapes::ShapeRef.new(shape: DBInstance, location_name: "DBInstance"))
|
@@ -3114,7 +3143,7 @@ module Aws::RDS
|
|
3114
3143
|
RestoreDBClusterFromS3Message.add_member(:engine_version, Shapes::ShapeRef.new(shape: String, location_name: "EngineVersion"))
|
3115
3144
|
RestoreDBClusterFromS3Message.add_member(:port, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "Port"))
|
3116
3145
|
RestoreDBClusterFromS3Message.add_member(:master_username, Shapes::ShapeRef.new(shape: String, required: true, location_name: "MasterUsername"))
|
3117
|
-
RestoreDBClusterFromS3Message.add_member(:master_user_password, Shapes::ShapeRef.new(shape: String,
|
3146
|
+
RestoreDBClusterFromS3Message.add_member(:master_user_password, Shapes::ShapeRef.new(shape: String, location_name: "MasterUserPassword"))
|
3118
3147
|
RestoreDBClusterFromS3Message.add_member(:option_group_name, Shapes::ShapeRef.new(shape: String, location_name: "OptionGroupName"))
|
3119
3148
|
RestoreDBClusterFromS3Message.add_member(:preferred_backup_window, Shapes::ShapeRef.new(shape: String, location_name: "PreferredBackupWindow"))
|
3120
3149
|
RestoreDBClusterFromS3Message.add_member(:preferred_maintenance_window, Shapes::ShapeRef.new(shape: String, location_name: "PreferredMaintenanceWindow"))
|
@@ -3135,6 +3164,8 @@ module Aws::RDS
|
|
3135
3164
|
RestoreDBClusterFromS3Message.add_member(:domain_iam_role_name, Shapes::ShapeRef.new(shape: String, location_name: "DomainIAMRoleName"))
|
3136
3165
|
RestoreDBClusterFromS3Message.add_member(:serverless_v2_scaling_configuration, Shapes::ShapeRef.new(shape: ServerlessV2ScalingConfiguration, location_name: "ServerlessV2ScalingConfiguration"))
|
3137
3166
|
RestoreDBClusterFromS3Message.add_member(:network_type, Shapes::ShapeRef.new(shape: String, location_name: "NetworkType"))
|
3167
|
+
RestoreDBClusterFromS3Message.add_member(:manage_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "ManageMasterUserPassword"))
|
3168
|
+
RestoreDBClusterFromS3Message.add_member(:master_user_secret_kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "MasterUserSecretKmsKeyId"))
|
3138
3169
|
RestoreDBClusterFromS3Message.struct_class = Types::RestoreDBClusterFromS3Message
|
3139
3170
|
|
3140
3171
|
RestoreDBClusterFromS3Result.add_member(:db_cluster, Shapes::ShapeRef.new(shape: DBCluster, location_name: "DBCluster"))
|
@@ -3290,6 +3321,8 @@ module Aws::RDS
|
|
3290
3321
|
RestoreDBInstanceFromS3Message.add_member(:max_allocated_storage, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "MaxAllocatedStorage"))
|
3291
3322
|
RestoreDBInstanceFromS3Message.add_member(:network_type, Shapes::ShapeRef.new(shape: String, location_name: "NetworkType"))
|
3292
3323
|
RestoreDBInstanceFromS3Message.add_member(:storage_throughput, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "StorageThroughput"))
|
3324
|
+
RestoreDBInstanceFromS3Message.add_member(:manage_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "ManageMasterUserPassword"))
|
3325
|
+
RestoreDBInstanceFromS3Message.add_member(:master_user_secret_kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "MasterUserSecretKmsKeyId"))
|
3293
3326
|
RestoreDBInstanceFromS3Message.struct_class = Types::RestoreDBInstanceFromS3Message
|
3294
3327
|
|
3295
3328
|
RestoreDBInstanceFromS3Result.add_member(:db_instance, Shapes::ShapeRef.new(shape: DBInstance, location_name: "DBInstance"))
|
@@ -3802,6 +3835,7 @@ module Aws::RDS
|
|
3802
3835
|
o.output = Shapes::ShapeRef.new(shape: DBEngineVersion)
|
3803
3836
|
o.errors << Shapes::ShapeRef.new(shape: CustomDBEngineVersionAlreadyExistsFault)
|
3804
3837
|
o.errors << Shapes::ShapeRef.new(shape: CustomDBEngineVersionQuotaExceededFault)
|
3838
|
+
o.errors << Shapes::ShapeRef.new(shape: Ec2ImagePropertiesNotSupportedFault)
|
3805
3839
|
o.errors << Shapes::ShapeRef.new(shape: KMSKeyNotAccessibleFault)
|
3806
3840
|
end)
|
3807
3841
|
|
@@ -649,6 +649,23 @@ module Aws::RDS
|
|
649
649
|
data[:db_system_id]
|
650
650
|
end
|
651
651
|
|
652
|
+
# Contains the secret managed by RDS in Amazon Web Services Secrets
|
653
|
+
# Manager for the master user password.
|
654
|
+
#
|
655
|
+
# For more information, see [Password management with Amazon Web
|
656
|
+
# Services Secrets Manager][1] in the *Amazon RDS User Guide* and
|
657
|
+
# [Password management with Amazon Web Services Secrets Manager][2] in
|
658
|
+
# the *Amazon Aurora User Guide.*
|
659
|
+
#
|
660
|
+
#
|
661
|
+
#
|
662
|
+
# [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
|
663
|
+
# [2]: https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html
|
664
|
+
# @return [Types::MasterUserSecret]
|
665
|
+
def master_user_secret
|
666
|
+
data[:master_user_secret]
|
667
|
+
end
|
668
|
+
|
652
669
|
# @!endgroup
|
653
670
|
|
654
671
|
# @return [Client]
|
@@ -847,6 +864,8 @@ module Aws::RDS
|
|
847
864
|
# },
|
848
865
|
# network_type: "String",
|
849
866
|
# db_system_id: "String",
|
867
|
+
# manage_master_user_password: false,
|
868
|
+
# master_user_secret_kms_key_id: "String",
|
850
869
|
# source_region: "String",
|
851
870
|
# })
|
852
871
|
# @param [Hash] options ({})
|
@@ -1025,7 +1044,11 @@ module Aws::RDS
|
|
1025
1044
|
# The password for the master database user. This password can contain
|
1026
1045
|
# any printable ASCII character except "/", """, or "@".
|
1027
1046
|
#
|
1028
|
-
# Constraints:
|
1047
|
+
# Constraints:
|
1048
|
+
#
|
1049
|
+
# * Must contain from 8 to 41 characters.
|
1050
|
+
#
|
1051
|
+
# * Can't be specified if `ManageMasterUserPassword` is turned on.
|
1029
1052
|
#
|
1030
1053
|
# Valid for: Aurora DB clusters and Multi-AZ DB clusters
|
1031
1054
|
# @option options [String] :option_group_name
|
@@ -1558,6 +1581,52 @@ module Aws::RDS
|
|
1558
1581
|
# [1]: https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/USER_VPC.WorkingWithRDSInstanceinaVPC.html
|
1559
1582
|
# @option options [String] :db_system_id
|
1560
1583
|
# Reserved for future use.
|
1584
|
+
# @option options [Boolean] :manage_master_user_password
|
1585
|
+
# A value that indicates whether to manage the master user password with
|
1586
|
+
# Amazon Web Services Secrets Manager.
|
1587
|
+
#
|
1588
|
+
# For more information, see [Password management with Amazon Web
|
1589
|
+
# Services Secrets Manager][1] in the *Amazon RDS User Guide* and
|
1590
|
+
# [Password management with Amazon Web Services Secrets Manager][2] in
|
1591
|
+
# the *Amazon Aurora User Guide.*
|
1592
|
+
#
|
1593
|
+
# Constraints:
|
1594
|
+
#
|
1595
|
+
# * Can't manage the master user password with Amazon Web Services
|
1596
|
+
# Secrets Manager if `MasterUserPassword` is specified.
|
1597
|
+
#
|
1598
|
+
# ^
|
1599
|
+
#
|
1600
|
+
# Valid for: Aurora DB clusters and Multi-AZ DB clusters
|
1601
|
+
#
|
1602
|
+
#
|
1603
|
+
#
|
1604
|
+
# [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
|
1605
|
+
# [2]: https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html
|
1606
|
+
# @option options [String] :master_user_secret_kms_key_id
|
1607
|
+
# The Amazon Web Services KMS key identifier to encrypt a secret that is
|
1608
|
+
# automatically generated and managed in Amazon Web Services Secrets
|
1609
|
+
# Manager.
|
1610
|
+
#
|
1611
|
+
# This setting is valid only if the master user password is managed by
|
1612
|
+
# RDS in Amazon Web Services Secrets Manager for the DB cluster.
|
1613
|
+
#
|
1614
|
+
# The Amazon Web Services KMS key identifier is the key ARN, key ID,
|
1615
|
+
# alias ARN, or alias name for the KMS key. To use a KMS key in a
|
1616
|
+
# different Amazon Web Services account, specify the key ARN or alias
|
1617
|
+
# ARN.
|
1618
|
+
#
|
1619
|
+
# If you don't specify `MasterUserSecretKmsKeyId`, then the
|
1620
|
+
# `aws/secretsmanager` KMS key is used to encrypt the secret. If the
|
1621
|
+
# secret is in a different Amazon Web Services account, then you can't
|
1622
|
+
# use the `aws/secretsmanager` KMS key to encrypt the secret, and you
|
1623
|
+
# must use a customer managed KMS key.
|
1624
|
+
#
|
1625
|
+
# There is a default KMS key for your Amazon Web Services account. Your
|
1626
|
+
# Amazon Web Services account has a different default KMS key for each
|
1627
|
+
# Amazon Web Services Region.
|
1628
|
+
#
|
1629
|
+
# Valid for: Aurora DB clusters and Multi-AZ DB clusters
|
1561
1630
|
# @option options [String] :source_region
|
1562
1631
|
# The source region of the snapshot. This is only needed when the
|
1563
1632
|
# shapshot is encrypted and in a different region.
|
@@ -1734,6 +1803,9 @@ module Aws::RDS
|
|
1734
1803
|
# max_capacity: 1.0,
|
1735
1804
|
# },
|
1736
1805
|
# network_type: "String",
|
1806
|
+
# manage_master_user_password: false,
|
1807
|
+
# rotate_master_user_password: false,
|
1808
|
+
# master_user_secret_kms_key_id: "String",
|
1737
1809
|
# })
|
1738
1810
|
# @param [Hash] options ({})
|
1739
1811
|
# @option options [String] :new_db_cluster_identifier
|
@@ -1803,7 +1875,11 @@ module Aws::RDS
|
|
1803
1875
|
# The new password for the master database user. This password can
|
1804
1876
|
# contain any printable ASCII character except "/", """, or "@".
|
1805
1877
|
#
|
1806
|
-
# Constraints:
|
1878
|
+
# Constraints:
|
1879
|
+
#
|
1880
|
+
# * Must contain from 8 to 41 characters.
|
1881
|
+
#
|
1882
|
+
# * Can't be specified if `ManageMasterUserPassword` is turned on.
|
1807
1883
|
#
|
1808
1884
|
# Valid for: Aurora DB clusters and Multi-AZ DB clusters
|
1809
1885
|
# @option options [String] :option_group_name
|
@@ -2215,6 +2291,93 @@ module Aws::RDS
|
|
2215
2291
|
#
|
2216
2292
|
#
|
2217
2293
|
# [1]: https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/USER_VPC.WorkingWithRDSInstanceinaVPC.html
|
2294
|
+
# @option options [Boolean] :manage_master_user_password
|
2295
|
+
# A value that indicates whether to manage the master user password with
|
2296
|
+
# Amazon Web Services Secrets Manager.
|
2297
|
+
#
|
2298
|
+
# If the DB cluster doesn't manage the master user password with Amazon
|
2299
|
+
# Web Services Secrets Manager, you can turn on this management. In this
|
2300
|
+
# case, you can't specify `MasterUserPassword`.
|
2301
|
+
#
|
2302
|
+
# If the DB cluster already manages the master user password with Amazon
|
2303
|
+
# Web Services Secrets Manager, and you specify that the master user
|
2304
|
+
# password is not managed with Amazon Web Services Secrets Manager, then
|
2305
|
+
# you must specify `MasterUserPassword`. In this case, RDS deletes the
|
2306
|
+
# secret and uses the new password for the master user specified by
|
2307
|
+
# `MasterUserPassword`.
|
2308
|
+
#
|
2309
|
+
# For more information, see [Password management with Amazon Web
|
2310
|
+
# Services Secrets Manager][1] in the *Amazon RDS User Guide* and
|
2311
|
+
# [Password management with Amazon Web Services Secrets Manager][2] in
|
2312
|
+
# the *Amazon Aurora User Guide.*
|
2313
|
+
#
|
2314
|
+
# Valid for: Aurora DB clusters and Multi-AZ DB clusters
|
2315
|
+
#
|
2316
|
+
#
|
2317
|
+
#
|
2318
|
+
# [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
|
2319
|
+
# [2]: https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html
|
2320
|
+
# @option options [Boolean] :rotate_master_user_password
|
2321
|
+
# A value that indicates whether to rotate the secret managed by Amazon
|
2322
|
+
# Web Services Secrets Manager for the master user password.
|
2323
|
+
#
|
2324
|
+
# This setting is valid only if the master user password is managed by
|
2325
|
+
# RDS in Amazon Web Services Secrets Manager for the DB cluster. The
|
2326
|
+
# secret value contains the updated password.
|
2327
|
+
#
|
2328
|
+
# For more information, see [Password management with Amazon Web
|
2329
|
+
# Services Secrets Manager][1] in the *Amazon RDS User Guide* and
|
2330
|
+
# [Password management with Amazon Web Services Secrets Manager][2] in
|
2331
|
+
# the *Amazon Aurora User Guide.*
|
2332
|
+
#
|
2333
|
+
# Constraints:
|
2334
|
+
#
|
2335
|
+
# * You must apply the change immediately when rotating the master user
|
2336
|
+
# password.
|
2337
|
+
#
|
2338
|
+
# ^
|
2339
|
+
#
|
2340
|
+
# Valid for: Aurora DB clusters and Multi-AZ DB clusters
|
2341
|
+
#
|
2342
|
+
#
|
2343
|
+
#
|
2344
|
+
# [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
|
2345
|
+
# [2]: https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html
|
2346
|
+
# @option options [String] :master_user_secret_kms_key_id
|
2347
|
+
# The Amazon Web Services KMS key identifier to encrypt a secret that is
|
2348
|
+
# automatically generated and managed in Amazon Web Services Secrets
|
2349
|
+
# Manager.
|
2350
|
+
#
|
2351
|
+
# This setting is valid only if both of the following conditions are
|
2352
|
+
# met:
|
2353
|
+
#
|
2354
|
+
# * The DB cluster doesn't manage the master user password in Amazon
|
2355
|
+
# Web Services Secrets Manager.
|
2356
|
+
#
|
2357
|
+
# If the DB cluster already manages the master user password in Amazon
|
2358
|
+
# Web Services Secrets Manager, you can't change the KMS key that is
|
2359
|
+
# used to encrypt the secret.
|
2360
|
+
#
|
2361
|
+
# * You are turning on `ManageMasterUserPassword` to manage the master
|
2362
|
+
# user password in Amazon Web Services Secrets Manager.
|
2363
|
+
#
|
2364
|
+
# If you are turning on `ManageMasterUserPassword` and don't specify
|
2365
|
+
# `MasterUserSecretKmsKeyId`, then the `aws/secretsmanager` KMS key is
|
2366
|
+
# used to encrypt the secret. If the secret is in a different Amazon
|
2367
|
+
# Web Services account, then you can't use the `aws/secretsmanager`
|
2368
|
+
# KMS key to encrypt the secret, and you must use a customer managed
|
2369
|
+
# KMS key.
|
2370
|
+
#
|
2371
|
+
# The Amazon Web Services KMS key identifier is the key ARN, key ID,
|
2372
|
+
# alias ARN, or alias name for the KMS key. To use a KMS key in a
|
2373
|
+
# different Amazon Web Services account, specify the key ARN or alias
|
2374
|
+
# ARN.
|
2375
|
+
#
|
2376
|
+
# There is a default KMS key for your Amazon Web Services account. Your
|
2377
|
+
# Amazon Web Services account has a different default KMS key for each
|
2378
|
+
# Amazon Web Services Region.
|
2379
|
+
#
|
2380
|
+
# Valid for: Aurora DB clusters and Multi-AZ DB clusters
|
2218
2381
|
# @return [DBCluster]
|
2219
2382
|
def modify(options = {})
|
2220
2383
|
options = options.merge(db_cluster_identifier: @id)
|
@@ -70,6 +70,19 @@ module Aws::RDS
|
|
70
70
|
data[:default_character_set]
|
71
71
|
end
|
72
72
|
|
73
|
+
# The EC2 image
|
74
|
+
# @return [Types::CustomDBEngineVersionAMI]
|
75
|
+
def image
|
76
|
+
data[:image]
|
77
|
+
end
|
78
|
+
|
79
|
+
# A value that indicates the source media provider of the AMI based on
|
80
|
+
# the usage operation. Applicable for RDS Custom for SQL Server.
|
81
|
+
# @return [String]
|
82
|
+
def db_engine_media_type
|
83
|
+
data[:db_engine_media_type]
|
84
|
+
end
|
85
|
+
|
73
86
|
# A list of the character sets supported by this engine for the
|
74
87
|
# `CharacterSetName` parameter of the `CreateDBInstance` operation.
|
75
88
|
# @return [Array<Types::CharacterSet>]
|
@@ -741,6 +741,20 @@ module Aws::RDS
|
|
741
741
|
data[:db_system_id]
|
742
742
|
end
|
743
743
|
|
744
|
+
# Contains the secret managed by RDS in Amazon Web Services Secrets
|
745
|
+
# Manager for the master user password.
|
746
|
+
#
|
747
|
+
# For more information, see [Password management with Amazon Web
|
748
|
+
# Services Secrets Manager][1] in the *Amazon RDS User Guide.*
|
749
|
+
#
|
750
|
+
#
|
751
|
+
#
|
752
|
+
# [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
|
753
|
+
# @return [Types::MasterUserSecret]
|
754
|
+
def master_user_secret
|
755
|
+
data[:master_user_secret]
|
756
|
+
end
|
757
|
+
|
744
758
|
# @!endgroup
|
745
759
|
|
746
760
|
# @return [Client]
|
@@ -939,6 +953,8 @@ module Aws::RDS
|
|
939
953
|
# backup_target: "String",
|
940
954
|
# network_type: "String",
|
941
955
|
# storage_throughput: 1,
|
956
|
+
# manage_master_user_password: false,
|
957
|
+
# master_user_secret_kms_key_id: "String",
|
942
958
|
# })
|
943
959
|
# @param [Hash] options ({})
|
944
960
|
# @option options [String] :db_name
|
@@ -1240,6 +1256,9 @@ module Aws::RDS
|
|
1240
1256
|
# Not applicable. The password for the master user is managed by the DB
|
1241
1257
|
# cluster.
|
1242
1258
|
#
|
1259
|
+
# Constraints: Can't be specified if `ManageMasterUserPassword` is
|
1260
|
+
# turned on.
|
1261
|
+
#
|
1243
1262
|
# **MariaDB**
|
1244
1263
|
#
|
1245
1264
|
# Constraints: Must contain from 8 to 41 characters.
|
@@ -1981,6 +2000,45 @@ module Aws::RDS
|
|
1981
2000
|
# This setting applies only to the `gp3` storage type.
|
1982
2001
|
#
|
1983
2002
|
# This setting doesn't apply to RDS Custom or Amazon Aurora.
|
2003
|
+
# @option options [Boolean] :manage_master_user_password
|
2004
|
+
# A value that indicates whether to manage the master user password with
|
2005
|
+
# Amazon Web Services Secrets Manager.
|
2006
|
+
#
|
2007
|
+
# For more information, see [Password management with Amazon Web
|
2008
|
+
# Services Secrets Manager][1] in the *Amazon RDS User Guide.*
|
2009
|
+
#
|
2010
|
+
# Constraints:
|
2011
|
+
#
|
2012
|
+
# * Can't manage the master user password with Amazon Web Services
|
2013
|
+
# Secrets Manager if `MasterUserPassword` is specified.
|
2014
|
+
#
|
2015
|
+
# ^
|
2016
|
+
#
|
2017
|
+
#
|
2018
|
+
#
|
2019
|
+
# [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
|
2020
|
+
# @option options [String] :master_user_secret_kms_key_id
|
2021
|
+
# The Amazon Web Services KMS key identifier to encrypt a secret that is
|
2022
|
+
# automatically generated and managed in Amazon Web Services Secrets
|
2023
|
+
# Manager.
|
2024
|
+
#
|
2025
|
+
# This setting is valid only if the master user password is managed by
|
2026
|
+
# RDS in Amazon Web Services Secrets Manager for the DB instance.
|
2027
|
+
#
|
2028
|
+
# The Amazon Web Services KMS key identifier is the key ARN, key ID,
|
2029
|
+
# alias ARN, or alias name for the KMS key. To use a KMS key in a
|
2030
|
+
# different Amazon Web Services account, specify the key ARN or alias
|
2031
|
+
# ARN.
|
2032
|
+
#
|
2033
|
+
# If you don't specify `MasterUserSecretKmsKeyId`, then the
|
2034
|
+
# `aws/secretsmanager` KMS key is used to encrypt the secret. If the
|
2035
|
+
# secret is in a different Amazon Web Services account, then you can't
|
2036
|
+
# use the `aws/secretsmanager` KMS key to encrypt the secret, and you
|
2037
|
+
# must use a customer managed KMS key.
|
2038
|
+
#
|
2039
|
+
# There is a default KMS key for your Amazon Web Services account. Your
|
2040
|
+
# Amazon Web Services account has a different default KMS key for each
|
2041
|
+
# Amazon Web Services Region.
|
1984
2042
|
# @return [DBInstance]
|
1985
2043
|
def create(options = {})
|
1986
2044
|
options = options.merge(db_instance_identifier: @id)
|
@@ -2709,6 +2767,9 @@ module Aws::RDS
|
|
2709
2767
|
# resume_full_automation_mode_minutes: 1,
|
2710
2768
|
# network_type: "String",
|
2711
2769
|
# storage_throughput: 1,
|
2770
|
+
# manage_master_user_password: false,
|
2771
|
+
# rotate_master_user_password: false,
|
2772
|
+
# master_user_secret_kms_key_id: "String",
|
2712
2773
|
# })
|
2713
2774
|
# @param [Hash] options ({})
|
2714
2775
|
# @option options [Integer] :allocated_storage
|
@@ -2830,6 +2891,9 @@ module Aws::RDS
|
|
2830
2891
|
#
|
2831
2892
|
# Default: Uses existing setting
|
2832
2893
|
#
|
2894
|
+
# Constraints: Can't be specified if `ManageMasterUserPassword` is
|
2895
|
+
# turned on.
|
2896
|
+
#
|
2833
2897
|
# **MariaDB**
|
2834
2898
|
#
|
2835
2899
|
# Constraints: Must contain from 8 to 41 characters.
|
@@ -3483,6 +3547,88 @@ module Aws::RDS
|
|
3483
3547
|
# This setting applies only to the `gp3` storage type.
|
3484
3548
|
#
|
3485
3549
|
# This setting doesn't apply to RDS Custom or Amazon Aurora.
|
3550
|
+
# @option options [Boolean] :manage_master_user_password
|
3551
|
+
# A value that indicates whether to manage the master user password with
|
3552
|
+
# Amazon Web Services Secrets Manager.
|
3553
|
+
#
|
3554
|
+
# If the DB cluster doesn't manage the master user password with Amazon
|
3555
|
+
# Web Services Secrets Manager, you can turn on this management. In this
|
3556
|
+
# case, you can't specify `MasterUserPassword`.
|
3557
|
+
#
|
3558
|
+
# If the DB cluster already manages the master user password with Amazon
|
3559
|
+
# Web Services Secrets Manager, and you specify that the master user
|
3560
|
+
# password is not managed with Amazon Web Services Secrets Manager, then
|
3561
|
+
# you must specify `MasterUserPassword`. In this case, RDS deletes the
|
3562
|
+
# secret and uses the new password for the master user specified by
|
3563
|
+
# `MasterUserPassword`.
|
3564
|
+
#
|
3565
|
+
# For more information, see [Password management with Amazon Web
|
3566
|
+
# Services Secrets Manager][1] in the *Amazon RDS User Guide.*
|
3567
|
+
#
|
3568
|
+
# Constraints:
|
3569
|
+
#
|
3570
|
+
# * Can't manage the master user password with Amazon Web Services
|
3571
|
+
# Secrets Manager if `MasterUserPassword` is specified.
|
3572
|
+
#
|
3573
|
+
# ^
|
3574
|
+
#
|
3575
|
+
#
|
3576
|
+
#
|
3577
|
+
# [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
|
3578
|
+
# @option options [Boolean] :rotate_master_user_password
|
3579
|
+
# A value that indicates whether to rotate the secret managed by Amazon
|
3580
|
+
# Web Services Secrets Manager for the master user password.
|
3581
|
+
#
|
3582
|
+
# This setting is valid only if the master user password is managed by
|
3583
|
+
# RDS in Amazon Web Services Secrets Manager for the DB cluster. The
|
3584
|
+
# secret value contains the updated password.
|
3585
|
+
#
|
3586
|
+
# For more information, see [Password management with Amazon Web
|
3587
|
+
# Services Secrets Manager][1] in the *Amazon RDS User Guide.*
|
3588
|
+
#
|
3589
|
+
# Constraints:
|
3590
|
+
#
|
3591
|
+
# * You must apply the change immediately when rotating the master user
|
3592
|
+
# password.
|
3593
|
+
#
|
3594
|
+
# ^
|
3595
|
+
#
|
3596
|
+
#
|
3597
|
+
#
|
3598
|
+
# [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
|
3599
|
+
# @option options [String] :master_user_secret_kms_key_id
|
3600
|
+
# The Amazon Web Services KMS key identifier to encrypt a secret that is
|
3601
|
+
# automatically generated and managed in Amazon Web Services Secrets
|
3602
|
+
# Manager.
|
3603
|
+
#
|
3604
|
+
# This setting is valid only if both of the following conditions are
|
3605
|
+
# met:
|
3606
|
+
#
|
3607
|
+
# * The DB instance doesn't manage the master user password in Amazon
|
3608
|
+
# Web Services Secrets Manager.
|
3609
|
+
#
|
3610
|
+
# If the DB instance already manages the master user password in
|
3611
|
+
# Amazon Web Services Secrets Manager, you can't change the KMS key
|
3612
|
+
# used to encrypt the secret.
|
3613
|
+
#
|
3614
|
+
# * You are turning on `ManageMasterUserPassword` to manage the master
|
3615
|
+
# user password in Amazon Web Services Secrets Manager.
|
3616
|
+
#
|
3617
|
+
# If you are turning on `ManageMasterUserPassword` and don't specify
|
3618
|
+
# `MasterUserSecretKmsKeyId`, then the `aws/secretsmanager` KMS key is
|
3619
|
+
# used to encrypt the secret. If the secret is in a different Amazon
|
3620
|
+
# Web Services account, then you can't use the `aws/secretsmanager`
|
3621
|
+
# KMS key to encrypt the secret, and you must use a customer managed
|
3622
|
+
# KMS key.
|
3623
|
+
#
|
3624
|
+
# The Amazon Web Services KMS key identifier is the key ARN, key ID,
|
3625
|
+
# alias ARN, or alias name for the KMS key. To use a KMS key in a
|
3626
|
+
# different Amazon Web Services account, specify the key ARN or alias
|
3627
|
+
# ARN.
|
3628
|
+
#
|
3629
|
+
# There is a default KMS key for your Amazon Web Services account. Your
|
3630
|
+
# Amazon Web Services account has a different default KMS key for each
|
3631
|
+
# Amazon Web Services Region.
|
3486
3632
|
# @return [DBInstance]
|
3487
3633
|
def modify(options = {})
|
3488
3634
|
options = options.merge(db_instance_identifier: @id)
|
data/lib/aws-sdk-rds/errors.rb
CHANGED
@@ -85,6 +85,7 @@ module Aws::RDS
|
|
85
85
|
# * {DBSubnetQuotaExceededFault}
|
86
86
|
# * {DBUpgradeDependencyFailureFault}
|
87
87
|
# * {DomainNotFoundFault}
|
88
|
+
# * {Ec2ImagePropertiesNotSupportedFault}
|
88
89
|
# * {EventSubscriptionQuotaExceededFault}
|
89
90
|
# * {ExportTaskAlreadyExistsFault}
|
90
91
|
# * {ExportTaskNotFoundFault}
|
@@ -737,6 +738,16 @@ module Aws::RDS
|
|
737
738
|
end
|
738
739
|
end
|
739
740
|
|
741
|
+
class Ec2ImagePropertiesNotSupportedFault < ServiceError
|
742
|
+
|
743
|
+
# @param [Seahorse::Client::RequestContext] context
|
744
|
+
# @param [String] message
|
745
|
+
# @param [Aws::RDS::Types::Ec2ImagePropertiesNotSupportedFault] data
|
746
|
+
def initialize(context, message, data = Aws::EmptyStructure.new)
|
747
|
+
super(context, message, data)
|
748
|
+
end
|
749
|
+
end
|
750
|
+
|
740
751
|
class EventSubscriptionQuotaExceededFault < ServiceError
|
741
752
|
|
742
753
|
# @param [Seahorse::Client::RequestContext] context
|