aws-sdk-rds 1.298.0 → 1.299.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 738f5b39e1cf01768713ae1dd777c7782ea50684ec0e57e2d90a75bc926975e4
4
- data.tar.gz: e6a60d062999df8be0f3595550fa958aae6c9715202386408c277ed8abf53518
3
+ metadata.gz: 359854c6c1b64620b44b48b9a1bfccd479e57fcf6dc32bc1d2546ca0b0755682
4
+ data.tar.gz: 9895a661ac7cfc3f0641a01495994ab4417ad0f3a6ae865743b373f7d8878480
5
5
  SHA512:
6
- metadata.gz: 972e77428af78577d6d1f094a112a9001a46c32120336e3de8a52f1fd756a65e00cd98ba120cb587715913029faed9c09399b18312dca525e8b882f3d2bc464b
7
- data.tar.gz: 454acb1196ff21748f6a390cd516974a6b3e060f7fa81f84ab904e55044e776cb53796a212bcc3c82382a1de287c05444b7bc5cf3a1c0f19aa97eacefb1c465c
6
+ metadata.gz: 221afcad53bef70d185f791a8d31e1cdb06ff6d59035cb2477bc281f41f74d0b4f8cb65f39304c52382e7a6fc2146c0120c863ba71ca31d16299997290d8c584
7
+ data.tar.gz: 01f167bff7f25c239d0b75a5aed64014129820f16ccd31e5b090e72d1fbc5f42d3c55a39f086ead5aa85e341e48ecd9c6cdc298cac2db74f448c13175353d9c0
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.299.0 (2025-11-20)
5
+ ------------------
6
+
7
+ * Feature - Add support for VPC Encryption Controls.
8
+
4
9
  1.298.0 (2025-11-13)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.298.0
1
+ 1.299.0
@@ -3261,40 +3261,31 @@ module Aws::RDS
3261
3261
  # @option params [Boolean] :publicly_accessible
3262
3262
  # Specifies whether the DB cluster is publicly accessible.
3263
3263
  #
3264
+ # Valid for Cluster Type: Multi-AZ DB clusters only
3265
+ #
3264
3266
  # When the DB cluster is publicly accessible and you connect from
3265
- # outside of the DB cluster's virtual private cloud (VPC), its Domain
3266
- # Name System (DNS) endpoint resolves to the public IP address. When you
3267
+ # outside of the DB cluster's virtual private cloud (VPC), its domain
3268
+ # name system (DNS) endpoint resolves to the public IP address. When you
3267
3269
  # connect from within the same VPC as the DB cluster, the endpoint
3268
3270
  # resolves to the private IP address. Access to the DB cluster is
3269
- # ultimately controlled by the security group it uses. That public
3270
- # access isn't permitted if the security group assigned to the DB
3271
- # cluster doesn't permit it.
3271
+ # controlled by its security group settings.
3272
3272
  #
3273
3273
  # When the DB cluster isn't publicly accessible, it is an internal DB
3274
3274
  # cluster with a DNS name that resolves to a private IP address.
3275
3275
  #
3276
- # Valid for Cluster Type: Multi-AZ DB clusters only
3277
- #
3278
- # Default: The default behavior varies depending on whether
3279
- # `DBSubnetGroupName` is specified.
3280
- #
3281
- # If `DBSubnetGroupName` isn't specified, and `PubliclyAccessible`
3282
- # isn't specified, the following applies:
3283
- #
3284
- # * If the default VPC in the target Region doesn’t have an internet
3285
- # gateway attached to it, the DB cluster is private.
3276
+ # The default behavior when `PubliclyAccessible` is not specified
3277
+ # depends on whether a `DBSubnetGroup` is specified.
3286
3278
  #
3287
- # * If the default VPC in the target Region has an internet gateway
3288
- # attached to it, the DB cluster is public.
3279
+ # If `DBSubnetGroup` isn't specified, `PubliclyAccessible` defaults to
3280
+ # `true`.
3289
3281
  #
3290
- # If `DBSubnetGroupName` is specified, and `PubliclyAccessible` isn't
3291
- # specified, the following applies:
3282
+ # If `DBSubnetGroup` is specified, `PubliclyAccessible` defaults to
3283
+ # `false` unless the value of `DBSubnetGroup` is `default`, in which
3284
+ # case `PubliclyAccessible` defaults to `true`.
3292
3285
  #
3293
- # * If the subnets are part of a VPC that doesn’t have an internet
3294
- # gateway attached to it, the DB cluster is private.
3295
- #
3296
- # * If the subnets are part of a VPC that has an internet gateway
3297
- # attached to it, the DB cluster is public.
3286
+ # If `PubliclyAccessible` is true and the VPC that the `DBSubnetGroup`
3287
+ # is in doesn't have an internet gateway attached to it, Amazon RDS
3288
+ # returns an error.
3298
3289
  #
3299
3290
  # @option params [Boolean] :auto_minor_version_upgrade
3300
3291
  # Specifies whether minor engine upgrades are applied automatically to
@@ -5197,37 +5188,28 @@ module Aws::RDS
5197
5188
  # Specifies whether the DB instance is publicly accessible.
5198
5189
  #
5199
5190
  # When the DB instance is publicly accessible and you connect from
5200
- # outside of the DB instance's virtual private cloud (VPC), its Domain
5201
- # Name System (DNS) endpoint resolves to the public IP address. When you
5191
+ # outside of the DB instance's virtual private cloud (VPC), its domain
5192
+ # name system (DNS) endpoint resolves to the public IP address. When you
5202
5193
  # connect from within the same VPC as the DB instance, the endpoint
5203
5194
  # resolves to the private IP address. Access to the DB instance is
5204
- # ultimately controlled by the security group it uses. That public
5205
- # access is not permitted if the security group assigned to the DB
5206
- # instance doesn't permit it.
5195
+ # controlled by its security group settings.
5207
5196
  #
5208
5197
  # When the DB instance isn't publicly accessible, it is an internal DB
5209
5198
  # instance with a DNS name that resolves to a private IP address.
5210
5199
  #
5211
- # Default: The default behavior varies depending on whether
5212
- # `DBSubnetGroupName` is specified.
5200
+ # The default behavior when `PubliclyAccessible` is not specified
5201
+ # depends on whether a `DBSubnetGroup` is specified.
5213
5202
  #
5214
- # If `DBSubnetGroupName` isn't specified, and `PubliclyAccessible`
5215
- # isn't specified, the following applies:
5203
+ # If `DBSubnetGroup` isn't specified, `PubliclyAccessible` defaults to
5204
+ # `false` for Aurora instances and `true` for non-Aurora instances.
5216
5205
  #
5217
- # * If the default VPC in the target Region doesn’t have an internet
5218
- # gateway attached to it, the DB instance is private.
5206
+ # If `DBSubnetGroup` is specified, `PubliclyAccessible` defaults to
5207
+ # `false` unless the value of `DBSubnetGroup` is `default`, in which
5208
+ # case `PubliclyAccessible` defaults to `true`.
5219
5209
  #
5220
- # * If the default VPC in the target Region has an internet gateway
5221
- # attached to it, the DB instance is public.
5222
- #
5223
- # If `DBSubnetGroupName` is specified, and `PubliclyAccessible` isn't
5224
- # specified, the following applies:
5225
- #
5226
- # * If the subnets are part of a VPC that doesn’t have an internet
5227
- # gateway attached to it, the DB instance is private.
5228
- #
5229
- # * If the subnets are part of a VPC that has an internet gateway
5230
- # attached to it, the DB instance is public.
5210
+ # If `PubliclyAccessible` is true and the VPC that the `DBSubnetGroup`
5211
+ # is in doesn't have an internet gateway attached to it, Amazon RDS
5212
+ # returns an error.
5231
5213
  #
5232
5214
  # @option params [Array<Types::Tag>] :tags
5233
5215
  # Tags to assign to the DB instance.
@@ -21177,7 +21159,7 @@ module Aws::RDS
21177
21159
  #
21178
21160
  # * Must be in the distinguished name format.
21179
21161
  #
21180
- # * Can't be longer than 64 characters.
21162
+ # ^
21181
21163
  #
21182
21164
  # Example:
21183
21165
  # `OU=mymanagedADtestOU,DC=mymanagedADtest,DC=mymanagedAD,DC=mydomain`
@@ -32605,7 +32587,7 @@ module Aws::RDS
32605
32587
  tracer: tracer
32606
32588
  )
32607
32589
  context[:gem_name] = 'aws-sdk-rds'
32608
- context[:gem_version] = '1.298.0'
32590
+ context[:gem_version] = '1.299.0'
32609
32591
  Seahorse::Client::Request.new(handlers, context)
32610
32592
  end
32611
32593
 
@@ -776,6 +776,7 @@ module Aws::RDS
776
776
  ValidStorageOptions = Shapes::StructureShape.new(name: 'ValidStorageOptions')
777
777
  ValidStorageOptionsList = Shapes::ListShape.new(name: 'ValidStorageOptionsList')
778
778
  ValidUpgradeTargetList = Shapes::ListShape.new(name: 'ValidUpgradeTargetList')
779
+ VpcEncryptionControlViolationException = Shapes::StructureShape.new(name: 'VpcEncryptionControlViolationException', error: {"code" => "VpcEncryptionControlViolationException", "httpStatusCode" => 400, "senderFault" => true})
779
780
  VpcSecurityGroupIdList = Shapes::ListShape.new(name: 'VpcSecurityGroupIdList')
780
781
  VpcSecurityGroupMembership = Shapes::StructureShape.new(name: 'VpcSecurityGroupMembership')
781
782
  VpcSecurityGroupMembershipList = Shapes::ListShape.new(name: 'VpcSecurityGroupMembershipList')
@@ -4421,6 +4422,8 @@ module Aws::RDS
4421
4422
 
4422
4423
  ValidUpgradeTargetList.member = Shapes::ShapeRef.new(shape: UpgradeTarget, location_name: "UpgradeTarget")
4423
4424
 
4425
+ VpcEncryptionControlViolationException.struct_class = Types::VpcEncryptionControlViolationException
4426
+
4424
4427
  VpcSecurityGroupIdList.member = Shapes::ShapeRef.new(shape: String, location_name: "VpcSecurityGroupId")
4425
4428
 
4426
4429
  VpcSecurityGroupMembership.add_member(:vpc_security_group_id, Shapes::ShapeRef.new(shape: String, location_name: "VpcSecurityGroupId"))
@@ -4673,6 +4676,7 @@ module Aws::RDS
4673
4676
  o.errors << Shapes::ShapeRef.new(shape: DomainNotFoundFault)
4674
4677
  o.errors << Shapes::ShapeRef.new(shape: StorageTypeNotSupportedFault)
4675
4678
  o.errors << Shapes::ShapeRef.new(shape: OptionGroupNotFoundFault)
4679
+ o.errors << Shapes::ShapeRef.new(shape: VpcEncryptionControlViolationException)
4676
4680
  end)
4677
4681
 
4678
4682
  api.add_operation(:create_db_cluster_endpoint, Seahorse::Model::Operation.new.tap do |o|
@@ -4740,6 +4744,7 @@ module Aws::RDS
4740
4744
  o.errors << Shapes::ShapeRef.new(shape: BackupPolicyNotFoundFault)
4741
4745
  o.errors << Shapes::ShapeRef.new(shape: CertificateNotFoundFault)
4742
4746
  o.errors << Shapes::ShapeRef.new(shape: TenantDatabaseQuotaExceededFault)
4747
+ o.errors << Shapes::ShapeRef.new(shape: VpcEncryptionControlViolationException)
4743
4748
  end)
4744
4749
 
4745
4750
  api.add_operation(:create_db_instance_read_replica, Seahorse::Model::Operation.new.tap do |o|
@@ -4772,6 +4777,7 @@ module Aws::RDS
4772
4777
  o.errors << Shapes::ShapeRef.new(shape: DomainNotFoundFault)
4773
4778
  o.errors << Shapes::ShapeRef.new(shape: TenantDatabaseQuotaExceededFault)
4774
4779
  o.errors << Shapes::ShapeRef.new(shape: CertificateNotFoundFault)
4780
+ o.errors << Shapes::ShapeRef.new(shape: VpcEncryptionControlViolationException)
4775
4781
  end)
4776
4782
 
4777
4783
  api.add_operation(:create_db_parameter_group, Seahorse::Model::Operation.new.tap do |o|
@@ -5958,6 +5964,7 @@ module Aws::RDS
5958
5964
  o.errors << Shapes::ShapeRef.new(shape: StorageTypeNotAvailableFault)
5959
5965
  o.errors << Shapes::ShapeRef.new(shape: OptionGroupNotFoundFault)
5960
5966
  o.errors << Shapes::ShapeRef.new(shape: KMSKeyNotAccessibleFault)
5967
+ o.errors << Shapes::ShapeRef.new(shape: VpcEncryptionControlViolationException)
5961
5968
  end)
5962
5969
 
5963
5970
  api.add_operation(:modify_db_cluster_endpoint, Seahorse::Model::Operation.new.tap do |o|
@@ -6021,6 +6028,7 @@ module Aws::RDS
6021
6028
  o.errors << Shapes::ShapeRef.new(shape: NetworkTypeNotSupported)
6022
6029
  o.errors << Shapes::ShapeRef.new(shape: InvalidDBClusterStateFault)
6023
6030
  o.errors << Shapes::ShapeRef.new(shape: TenantDatabaseQuotaExceededFault)
6031
+ o.errors << Shapes::ShapeRef.new(shape: VpcEncryptionControlViolationException)
6024
6032
  end)
6025
6033
 
6026
6034
  api.add_operation(:modify_db_parameter_group, Seahorse::Model::Operation.new.tap do |o|
@@ -6403,6 +6411,7 @@ module Aws::RDS
6403
6411
  o.errors << Shapes::ShapeRef.new(shape: StorageTypeNotSupportedFault)
6404
6412
  o.errors << Shapes::ShapeRef.new(shape: InvalidDBInstanceStateFault)
6405
6413
  o.errors << Shapes::ShapeRef.new(shape: InsufficientDBInstanceCapacityFault)
6414
+ o.errors << Shapes::ShapeRef.new(shape: VpcEncryptionControlViolationException)
6406
6415
  end)
6407
6416
 
6408
6417
  api.add_operation(:restore_db_cluster_to_point_in_time, Seahorse::Model::Operation.new.tap do |o|
@@ -6433,6 +6442,7 @@ module Aws::RDS
6433
6442
  o.errors << Shapes::ShapeRef.new(shape: StorageTypeNotSupportedFault)
6434
6443
  o.errors << Shapes::ShapeRef.new(shape: DBClusterAutomatedBackupNotFoundFault)
6435
6444
  o.errors << Shapes::ShapeRef.new(shape: InsufficientDBInstanceCapacityFault)
6445
+ o.errors << Shapes::ShapeRef.new(shape: VpcEncryptionControlViolationException)
6436
6446
  end)
6437
6447
 
6438
6448
  api.add_operation(:restore_db_instance_from_db_snapshot, Seahorse::Model::Operation.new.tap do |o|
@@ -6465,6 +6475,7 @@ module Aws::RDS
6465
6475
  o.errors << Shapes::ShapeRef.new(shape: DBClusterSnapshotNotFoundFault)
6466
6476
  o.errors << Shapes::ShapeRef.new(shape: CertificateNotFoundFault)
6467
6477
  o.errors << Shapes::ShapeRef.new(shape: TenantDatabaseQuotaExceededFault)
6478
+ o.errors << Shapes::ShapeRef.new(shape: VpcEncryptionControlViolationException)
6468
6479
  end)
6469
6480
 
6470
6481
  api.add_operation(:restore_db_instance_from_s3, Seahorse::Model::Operation.new.tap do |o|
@@ -6492,6 +6503,7 @@ module Aws::RDS
6492
6503
  o.errors << Shapes::ShapeRef.new(shape: NetworkTypeNotSupported)
6493
6504
  o.errors << Shapes::ShapeRef.new(shape: BackupPolicyNotFoundFault)
6494
6505
  o.errors << Shapes::ShapeRef.new(shape: CertificateNotFoundFault)
6506
+ o.errors << Shapes::ShapeRef.new(shape: VpcEncryptionControlViolationException)
6495
6507
  end)
6496
6508
 
6497
6509
  api.add_operation(:restore_db_instance_to_point_in_time, Seahorse::Model::Operation.new.tap do |o|
@@ -6525,6 +6537,7 @@ module Aws::RDS
6525
6537
  o.errors << Shapes::ShapeRef.new(shape: DBInstanceAutomatedBackupNotFoundFault)
6526
6538
  o.errors << Shapes::ShapeRef.new(shape: TenantDatabaseQuotaExceededFault)
6527
6539
  o.errors << Shapes::ShapeRef.new(shape: CertificateNotFoundFault)
6540
+ o.errors << Shapes::ShapeRef.new(shape: VpcEncryptionControlViolationException)
6528
6541
  end)
6529
6542
 
6530
6543
  api.add_operation(:revoke_db_security_group_ingress, Seahorse::Model::Operation.new.tap do |o|
@@ -6563,6 +6576,7 @@ module Aws::RDS
6563
6576
  o.errors << Shapes::ShapeRef.new(shape: InvalidDBInstanceStateFault)
6564
6577
  o.errors << Shapes::ShapeRef.new(shape: InvalidDBShardGroupStateFault)
6565
6578
  o.errors << Shapes::ShapeRef.new(shape: KMSKeyNotAccessibleFault)
6579
+ o.errors << Shapes::ShapeRef.new(shape: VpcEncryptionControlViolationException)
6566
6580
  end)
6567
6581
 
6568
6582
  api.add_operation(:start_db_instance, Seahorse::Model::Operation.new.tap do |o|
@@ -6582,6 +6596,7 @@ module Aws::RDS
6582
6596
  o.errors << Shapes::ShapeRef.new(shape: DBClusterNotFoundFault)
6583
6597
  o.errors << Shapes::ShapeRef.new(shape: AuthorizationNotFoundFault)
6584
6598
  o.errors << Shapes::ShapeRef.new(shape: KMSKeyNotAccessibleFault)
6599
+ o.errors << Shapes::ShapeRef.new(shape: VpcEncryptionControlViolationException)
6585
6600
  end)
6586
6601
 
6587
6602
  api.add_operation(:start_db_instance_automated_backups_replication, Seahorse::Model::Operation.new.tap do |o|
@@ -1512,40 +1512,31 @@ module Aws::RDS
1512
1512
  # @option options [Boolean] :publicly_accessible
1513
1513
  # Specifies whether the DB cluster is publicly accessible.
1514
1514
  #
1515
+ # Valid for Cluster Type: Multi-AZ DB clusters only
1516
+ #
1515
1517
  # When the DB cluster is publicly accessible and you connect from
1516
- # outside of the DB cluster's virtual private cloud (VPC), its Domain
1517
- # Name System (DNS) endpoint resolves to the public IP address. When you
1518
+ # outside of the DB cluster's virtual private cloud (VPC), its domain
1519
+ # name system (DNS) endpoint resolves to the public IP address. When you
1518
1520
  # connect from within the same VPC as the DB cluster, the endpoint
1519
1521
  # resolves to the private IP address. Access to the DB cluster is
1520
- # ultimately controlled by the security group it uses. That public
1521
- # access isn't permitted if the security group assigned to the DB
1522
- # cluster doesn't permit it.
1522
+ # controlled by its security group settings.
1523
1523
  #
1524
1524
  # When the DB cluster isn't publicly accessible, it is an internal DB
1525
1525
  # cluster with a DNS name that resolves to a private IP address.
1526
1526
  #
1527
- # Valid for Cluster Type: Multi-AZ DB clusters only
1527
+ # The default behavior when `PubliclyAccessible` is not specified
1528
+ # depends on whether a `DBSubnetGroup` is specified.
1528
1529
  #
1529
- # Default: The default behavior varies depending on whether
1530
- # `DBSubnetGroupName` is specified.
1530
+ # If `DBSubnetGroup` isn't specified, `PubliclyAccessible` defaults to
1531
+ # `true`.
1531
1532
  #
1532
- # If `DBSubnetGroupName` isn't specified, and `PubliclyAccessible`
1533
- # isn't specified, the following applies:
1533
+ # If `DBSubnetGroup` is specified, `PubliclyAccessible` defaults to
1534
+ # `false` unless the value of `DBSubnetGroup` is `default`, in which
1535
+ # case `PubliclyAccessible` defaults to `true`.
1534
1536
  #
1535
- # * If the default VPC in the target Region doesn’t have an internet
1536
- # gateway attached to it, the DB cluster is private.
1537
- #
1538
- # * If the default VPC in the target Region has an internet gateway
1539
- # attached to it, the DB cluster is public.
1540
- #
1541
- # If `DBSubnetGroupName` is specified, and `PubliclyAccessible` isn't
1542
- # specified, the following applies:
1543
- #
1544
- # * If the subnets are part of a VPC that doesn’t have an internet
1545
- # gateway attached to it, the DB cluster is private.
1546
- #
1547
- # * If the subnets are part of a VPC that has an internet gateway
1548
- # attached to it, the DB cluster is public.
1537
+ # If `PubliclyAccessible` is true and the VPC that the `DBSubnetGroup`
1538
+ # is in doesn't have an internet gateway attached to it, Amazon RDS
1539
+ # returns an error.
1549
1540
  # @option options [Boolean] :auto_minor_version_upgrade
1550
1541
  # Specifies whether minor engine upgrades are applied automatically to
1551
1542
  # the DB cluster during the maintenance window. By default, minor engine
@@ -1729,37 +1729,28 @@ module Aws::RDS
1729
1729
  # Specifies whether the DB instance is publicly accessible.
1730
1730
  #
1731
1731
  # When the DB instance is publicly accessible and you connect from
1732
- # outside of the DB instance's virtual private cloud (VPC), its Domain
1733
- # Name System (DNS) endpoint resolves to the public IP address. When you
1732
+ # outside of the DB instance's virtual private cloud (VPC), its domain
1733
+ # name system (DNS) endpoint resolves to the public IP address. When you
1734
1734
  # connect from within the same VPC as the DB instance, the endpoint
1735
1735
  # resolves to the private IP address. Access to the DB instance is
1736
- # ultimately controlled by the security group it uses. That public
1737
- # access is not permitted if the security group assigned to the DB
1738
- # instance doesn't permit it.
1736
+ # controlled by its security group settings.
1739
1737
  #
1740
1738
  # When the DB instance isn't publicly accessible, it is an internal DB
1741
1739
  # instance with a DNS name that resolves to a private IP address.
1742
1740
  #
1743
- # Default: The default behavior varies depending on whether
1744
- # `DBSubnetGroupName` is specified.
1745
- #
1746
- # If `DBSubnetGroupName` isn't specified, and `PubliclyAccessible`
1747
- # isn't specified, the following applies:
1741
+ # The default behavior when `PubliclyAccessible` is not specified
1742
+ # depends on whether a `DBSubnetGroup` is specified.
1748
1743
  #
1749
- # * If the default VPC in the target Region doesn’t have an internet
1750
- # gateway attached to it, the DB instance is private.
1744
+ # If `DBSubnetGroup` isn't specified, `PubliclyAccessible` defaults to
1745
+ # `false` for Aurora instances and `true` for non-Aurora instances.
1751
1746
  #
1752
- # * If the default VPC in the target Region has an internet gateway
1753
- # attached to it, the DB instance is public.
1747
+ # If `DBSubnetGroup` is specified, `PubliclyAccessible` defaults to
1748
+ # `false` unless the value of `DBSubnetGroup` is `default`, in which
1749
+ # case `PubliclyAccessible` defaults to `true`.
1754
1750
  #
1755
- # If `DBSubnetGroupName` is specified, and `PubliclyAccessible` isn't
1756
- # specified, the following applies:
1757
- #
1758
- # * If the subnets are part of a VPC that doesn’t have an internet
1759
- # gateway attached to it, the DB instance is private.
1760
- #
1761
- # * If the subnets are part of a VPC that has an internet gateway
1762
- # attached to it, the DB instance is public.
1751
+ # If `PubliclyAccessible` is true and the VPC that the `DBSubnetGroup`
1752
+ # is in doesn't have an internet gateway attached to it, Amazon RDS
1753
+ # returns an error.
1763
1754
  # @option options [Array<Types::Tag>] :tags
1764
1755
  # Tags to assign to the DB instance.
1765
1756
  # @option options [String] :db_cluster_identifier
@@ -3742,7 +3733,7 @@ module Aws::RDS
3742
3733
  #
3743
3734
  # * Must be in the distinguished name format.
3744
3735
  #
3745
- # * Can't be longer than 64 characters.
3736
+ # ^
3746
3737
  #
3747
3738
  # Example:
3748
3739
  # `OU=mymanagedADtestOU,DC=mymanagedADtest,DC=mymanagedAD,DC=mydomain`
@@ -240,6 +240,7 @@ module Aws::RDS
240
240
  # * This error class is not used. `TenantDatabaseQuotaExceeded` is used during parsing instead.
241
241
  # * {UnsupportedDBEngineVersionFault}
242
242
  # * This error class is not used. `UnsupportedDBEngineVersion` is used during parsing instead.
243
+ # * {VpcEncryptionControlViolationException}
243
244
  #
244
245
  # Additionally, error classes are dynamically generated for service errors based on the error code
245
246
  # if they are not defined above.
@@ -1833,5 +1834,15 @@ module Aws::RDS
1833
1834
  end
1834
1835
  end
1835
1836
 
1837
+ class VpcEncryptionControlViolationException < ServiceError
1838
+
1839
+ # @param [Seahorse::Client::RequestContext] context
1840
+ # @param [String] message
1841
+ # @param [Aws::RDS::Types::VpcEncryptionControlViolationException] data
1842
+ def initialize(context, message, data = Aws::EmptyStructure.new)
1843
+ super(context, message, data)
1844
+ end
1845
+ end
1846
+
1836
1847
  end
1837
1848
  end
@@ -649,40 +649,31 @@ module Aws::RDS
649
649
  # @option options [Boolean] :publicly_accessible
650
650
  # Specifies whether the DB cluster is publicly accessible.
651
651
  #
652
+ # Valid for Cluster Type: Multi-AZ DB clusters only
653
+ #
652
654
  # When the DB cluster is publicly accessible and you connect from
653
- # outside of the DB cluster's virtual private cloud (VPC), its Domain
654
- # Name System (DNS) endpoint resolves to the public IP address. When you
655
+ # outside of the DB cluster's virtual private cloud (VPC), its domain
656
+ # name system (DNS) endpoint resolves to the public IP address. When you
655
657
  # connect from within the same VPC as the DB cluster, the endpoint
656
658
  # resolves to the private IP address. Access to the DB cluster is
657
- # ultimately controlled by the security group it uses. That public
658
- # access isn't permitted if the security group assigned to the DB
659
- # cluster doesn't permit it.
659
+ # controlled by its security group settings.
660
660
  #
661
661
  # When the DB cluster isn't publicly accessible, it is an internal DB
662
662
  # cluster with a DNS name that resolves to a private IP address.
663
663
  #
664
- # Valid for Cluster Type: Multi-AZ DB clusters only
665
- #
666
- # Default: The default behavior varies depending on whether
667
- # `DBSubnetGroupName` is specified.
668
- #
669
- # If `DBSubnetGroupName` isn't specified, and `PubliclyAccessible`
670
- # isn't specified, the following applies:
664
+ # The default behavior when `PubliclyAccessible` is not specified
665
+ # depends on whether a `DBSubnetGroup` is specified.
671
666
  #
672
- # * If the default VPC in the target Region doesn’t have an internet
673
- # gateway attached to it, the DB cluster is private.
667
+ # If `DBSubnetGroup` isn't specified, `PubliclyAccessible` defaults to
668
+ # `true`.
674
669
  #
675
- # * If the default VPC in the target Region has an internet gateway
676
- # attached to it, the DB cluster is public.
670
+ # If `DBSubnetGroup` is specified, `PubliclyAccessible` defaults to
671
+ # `false` unless the value of `DBSubnetGroup` is `default`, in which
672
+ # case `PubliclyAccessible` defaults to `true`.
677
673
  #
678
- # If `DBSubnetGroupName` is specified, and `PubliclyAccessible` isn't
679
- # specified, the following applies:
680
- #
681
- # * If the subnets are part of a VPC that doesn’t have an internet
682
- # gateway attached to it, the DB cluster is private.
683
- #
684
- # * If the subnets are part of a VPC that has an internet gateway
685
- # attached to it, the DB cluster is public.
674
+ # If `PubliclyAccessible` is true and the VPC that the `DBSubnetGroup`
675
+ # is in doesn't have an internet gateway attached to it, Amazon RDS
676
+ # returns an error.
686
677
  # @option options [Boolean] :auto_minor_version_upgrade
687
678
  # Specifies whether minor engine upgrades are applied automatically to
688
679
  # the DB cluster during the maintenance window. By default, minor engine
@@ -1901,37 +1892,28 @@ module Aws::RDS
1901
1892
  # Specifies whether the DB instance is publicly accessible.
1902
1893
  #
1903
1894
  # When the DB instance is publicly accessible and you connect from
1904
- # outside of the DB instance's virtual private cloud (VPC), its Domain
1905
- # Name System (DNS) endpoint resolves to the public IP address. When you
1895
+ # outside of the DB instance's virtual private cloud (VPC), its domain
1896
+ # name system (DNS) endpoint resolves to the public IP address. When you
1906
1897
  # connect from within the same VPC as the DB instance, the endpoint
1907
1898
  # resolves to the private IP address. Access to the DB instance is
1908
- # ultimately controlled by the security group it uses. That public
1909
- # access is not permitted if the security group assigned to the DB
1910
- # instance doesn't permit it.
1899
+ # controlled by its security group settings.
1911
1900
  #
1912
1901
  # When the DB instance isn't publicly accessible, it is an internal DB
1913
1902
  # instance with a DNS name that resolves to a private IP address.
1914
1903
  #
1915
- # Default: The default behavior varies depending on whether
1916
- # `DBSubnetGroupName` is specified.
1917
- #
1918
- # If `DBSubnetGroupName` isn't specified, and `PubliclyAccessible`
1919
- # isn't specified, the following applies:
1920
- #
1921
- # * If the default VPC in the target Region doesn’t have an internet
1922
- # gateway attached to it, the DB instance is private.
1923
- #
1924
- # * If the default VPC in the target Region has an internet gateway
1925
- # attached to it, the DB instance is public.
1904
+ # The default behavior when `PubliclyAccessible` is not specified
1905
+ # depends on whether a `DBSubnetGroup` is specified.
1926
1906
  #
1927
- # If `DBSubnetGroupName` is specified, and `PubliclyAccessible` isn't
1928
- # specified, the following applies:
1907
+ # If `DBSubnetGroup` isn't specified, `PubliclyAccessible` defaults to
1908
+ # `false` for Aurora instances and `true` for non-Aurora instances.
1929
1909
  #
1930
- # * If the subnets are part of a VPC that doesn’t have an internet
1931
- # gateway attached to it, the DB instance is private.
1910
+ # If `DBSubnetGroup` is specified, `PubliclyAccessible` defaults to
1911
+ # `false` unless the value of `DBSubnetGroup` is `default`, in which
1912
+ # case `PubliclyAccessible` defaults to `true`.
1932
1913
  #
1933
- # * If the subnets are part of a VPC that has an internet gateway
1934
- # attached to it, the DB instance is public.
1914
+ # If `PubliclyAccessible` is true and the VPC that the `DBSubnetGroup`
1915
+ # is in doesn't have an internet gateway attached to it, Amazon RDS
1916
+ # returns an error.
1935
1917
  # @option options [Array<Types::Tag>] :tags
1936
1918
  # Tags to assign to the DB instance.
1937
1919
  # @option options [String] :db_cluster_identifier
@@ -2790,40 +2790,31 @@ module Aws::RDS
2790
2790
  # @!attribute [rw] publicly_accessible
2791
2791
  # Specifies whether the DB cluster is publicly accessible.
2792
2792
  #
2793
+ # Valid for Cluster Type: Multi-AZ DB clusters only
2794
+ #
2793
2795
  # When the DB cluster is publicly accessible and you connect from
2794
- # outside of the DB cluster's virtual private cloud (VPC), its Domain
2795
- # Name System (DNS) endpoint resolves to the public IP address. When
2796
+ # outside of the DB cluster's virtual private cloud (VPC), its domain
2797
+ # name system (DNS) endpoint resolves to the public IP address. When
2796
2798
  # you connect from within the same VPC as the DB cluster, the endpoint
2797
2799
  # resolves to the private IP address. Access to the DB cluster is
2798
- # ultimately controlled by the security group it uses. That public
2799
- # access isn't permitted if the security group assigned to the DB
2800
- # cluster doesn't permit it.
2800
+ # controlled by its security group settings.
2801
2801
  #
2802
2802
  # When the DB cluster isn't publicly accessible, it is an internal DB
2803
2803
  # cluster with a DNS name that resolves to a private IP address.
2804
2804
  #
2805
- # Valid for Cluster Type: Multi-AZ DB clusters only
2806
- #
2807
- # Default: The default behavior varies depending on whether
2808
- # `DBSubnetGroupName` is specified.
2809
- #
2810
- # If `DBSubnetGroupName` isn't specified, and `PubliclyAccessible`
2811
- # isn't specified, the following applies:
2812
- #
2813
- # * If the default VPC in the target Region doesn’t have an internet
2814
- # gateway attached to it, the DB cluster is private.
2815
- #
2816
- # * If the default VPC in the target Region has an internet gateway
2817
- # attached to it, the DB cluster is public.
2805
+ # The default behavior when `PubliclyAccessible` is not specified
2806
+ # depends on whether a `DBSubnetGroup` is specified.
2818
2807
  #
2819
- # If `DBSubnetGroupName` is specified, and `PubliclyAccessible` isn't
2820
- # specified, the following applies:
2808
+ # If `DBSubnetGroup` isn't specified, `PubliclyAccessible` defaults
2809
+ # to `true`.
2821
2810
  #
2822
- # * If the subnets are part of a VPC that doesn’t have an internet
2823
- # gateway attached to it, the DB cluster is private.
2811
+ # If `DBSubnetGroup` is specified, `PubliclyAccessible` defaults to
2812
+ # `false` unless the value of `DBSubnetGroup` is `default`, in which
2813
+ # case `PubliclyAccessible` defaults to `true`.
2824
2814
  #
2825
- # * If the subnets are part of a VPC that has an internet gateway
2826
- # attached to it, the DB cluster is public.
2815
+ # If `PubliclyAccessible` is true and the VPC that the `DBSubnetGroup`
2816
+ # is in doesn't have an internet gateway attached to it, Amazon RDS
2817
+ # returns an error.
2827
2818
  # @return [Boolean]
2828
2819
  #
2829
2820
  # @!attribute [rw] auto_minor_version_upgrade
@@ -4235,36 +4226,27 @@ module Aws::RDS
4235
4226
  #
4236
4227
  # When the DB instance is publicly accessible and you connect from
4237
4228
  # outside of the DB instance's virtual private cloud (VPC), its
4238
- # Domain Name System (DNS) endpoint resolves to the public IP address.
4229
+ # domain name system (DNS) endpoint resolves to the public IP address.
4239
4230
  # When you connect from within the same VPC as the DB instance, the
4240
4231
  # endpoint resolves to the private IP address. Access to the DB
4241
- # instance is ultimately controlled by the security group it uses.
4242
- # That public access is not permitted if the security group assigned
4243
- # to the DB instance doesn't permit it.
4232
+ # instance is controlled by its security group settings.
4244
4233
  #
4245
4234
  # When the DB instance isn't publicly accessible, it is an internal
4246
4235
  # DB instance with a DNS name that resolves to a private IP address.
4247
4236
  #
4248
- # Default: The default behavior varies depending on whether
4249
- # `DBSubnetGroupName` is specified.
4250
- #
4251
- # If `DBSubnetGroupName` isn't specified, and `PubliclyAccessible`
4252
- # isn't specified, the following applies:
4253
- #
4254
- # * If the default VPC in the target Region doesn’t have an internet
4255
- # gateway attached to it, the DB instance is private.
4256
- #
4257
- # * If the default VPC in the target Region has an internet gateway
4258
- # attached to it, the DB instance is public.
4237
+ # The default behavior when `PubliclyAccessible` is not specified
4238
+ # depends on whether a `DBSubnetGroup` is specified.
4259
4239
  #
4260
- # If `DBSubnetGroupName` is specified, and `PubliclyAccessible` isn't
4261
- # specified, the following applies:
4240
+ # If `DBSubnetGroup` isn't specified, `PubliclyAccessible` defaults
4241
+ # to `false` for Aurora instances and `true` for non-Aurora instances.
4262
4242
  #
4263
- # * If the subnets are part of a VPC that doesn’t have an internet
4264
- # gateway attached to it, the DB instance is private.
4243
+ # If `DBSubnetGroup` is specified, `PubliclyAccessible` defaults to
4244
+ # `false` unless the value of `DBSubnetGroup` is `default`, in which
4245
+ # case `PubliclyAccessible` defaults to `true`.
4265
4246
  #
4266
- # * If the subnets are part of a VPC that has an internet gateway
4267
- # attached to it, the DB instance is public.
4247
+ # If `PubliclyAccessible` is true and the VPC that the `DBSubnetGroup`
4248
+ # is in doesn't have an internet gateway attached to it, Amazon RDS
4249
+ # returns an error.
4268
4250
  # @return [Boolean]
4269
4251
  #
4270
4252
  # @!attribute [rw] tags
@@ -19426,7 +19408,7 @@ module Aws::RDS
19426
19408
  #
19427
19409
  # * Must be in the distinguished name format.
19428
19410
  #
19429
- # * Can't be longer than 64 characters.
19411
+ # ^
19430
19412
  #
19431
19413
  # Example:
19432
19414
  # `OU=mymanagedADtestOU,DC=mymanagedADtest,DC=mymanagedAD,DC=mydomain`
@@ -29348,6 +29330,15 @@ module Aws::RDS
29348
29330
  include Aws::Structure
29349
29331
  end
29350
29332
 
29333
+ # The operation violates VPC encryption control settings. Make sure that
29334
+ # your DB instance type supports the Nitro encryption-in-transit
29335
+ # capability, or modify your VPC's encryption controls to not enforce
29336
+ # encryption-in-transit.
29337
+ #
29338
+ # @see http://docs.aws.amazon.com/goto/WebAPI/rds-2014-10-31/VpcEncryptionControlViolationException AWS API Documentation
29339
+ #
29340
+ class VpcEncryptionControlViolationException < Aws::EmptyStructure; end
29341
+
29351
29342
  # This data type is used as a response element for queries on VPC
29352
29343
  # security group membership.
29353
29344
  #
data/lib/aws-sdk-rds.rb CHANGED
@@ -80,7 +80,7 @@ module Aws::RDS
80
80
  autoload :ReservedDBInstancesOffering, 'aws-sdk-rds/reserved_db_instances_offering'
81
81
  autoload :ResourcePendingMaintenanceActionList, 'aws-sdk-rds/resource_pending_maintenance_action_list'
82
82
 
83
- GEM_VERSION = '1.298.0'
83
+ GEM_VERSION = '1.299.0'
84
84
 
85
85
  end
86
86
 
data/sig/errors.rbs CHANGED
@@ -301,6 +301,8 @@ module Aws
301
301
  end
302
302
  class UnsupportedDBEngineVersionFault < ::Aws::Errors::ServiceError
303
303
  end
304
+ class VpcEncryptionControlViolationException < ::Aws::Errors::ServiceError
305
+ end
304
306
  end
305
307
  end
306
308
  end
data/sig/types.rbs CHANGED
@@ -4404,6 +4404,9 @@ module Aws::RDS
4404
4404
  SENSITIVE: []
4405
4405
  end
4406
4406
 
4407
+ class VpcEncryptionControlViolationException < Aws::EmptyStructure
4408
+ end
4409
+
4407
4410
  class VpcSecurityGroupMembership
4408
4411
  attr_accessor vpc_security_group_id: ::String
4409
4412
  attr_accessor status: ::String
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-rds
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.298.0
4
+ version: 1.299.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services