@aws-sdk/client-rds 3.235.0 → 3.237.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -3062,7 +3062,15 @@ export interface CreateDBClusterMessage {
3062
3062
  MasterUsername?: string;
3063
3063
  /**
3064
3064
  * <p>The password for the master database user. This password can contain any printable ASCII character except "/", """, or "@".</p>
3065
- * <p>Constraints: Must contain from 8 to 41 characters.</p>
3065
+ * <p>Constraints:</p>
3066
+ * <ul>
3067
+ * <li>
3068
+ * <p>Must contain from 8 to 41 characters.</p>
3069
+ * </li>
3070
+ * <li>
3071
+ * <p>Can't be specified if <code>ManageMasterUserPassword</code> is turned on.</p>
3072
+ * </li>
3073
+ * </ul>
3066
3074
  * <p>Valid for: Aurora DB clusters and Multi-AZ DB clusters</p>
3067
3075
  */
3068
3076
  MasterUserPassword?: string;
@@ -3529,6 +3537,38 @@ export interface CreateDBClusterMessage {
3529
3537
  * <p>Reserved for future use.</p>
3530
3538
  */
3531
3539
  DBSystemId?: string;
3540
+ /**
3541
+ * <p>A value that indicates whether to manage the master user password with Amazon Web Services Secrets Manager.</p>
3542
+ * <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html">Password management with Amazon Web Services Secrets Manager</a>
3543
+ * in the <i>Amazon RDS User Guide</i> and <a href="https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html">Password management with Amazon Web Services Secrets Manager</a>
3544
+ * in the <i>Amazon Aurora User Guide.</i>
3545
+ * </p>
3546
+ * <p>Constraints:</p>
3547
+ * <ul>
3548
+ * <li>
3549
+ * <p>Can't manage the master user password with Amazon Web Services Secrets Manager if <code>MasterUserPassword</code>
3550
+ * is specified.</p>
3551
+ * </li>
3552
+ * </ul>
3553
+ * <p>Valid for: Aurora DB clusters and Multi-AZ DB clusters</p>
3554
+ */
3555
+ ManageMasterUserPassword?: boolean;
3556
+ /**
3557
+ * <p>The Amazon Web Services KMS key identifier to encrypt a secret that is automatically generated and
3558
+ * managed in Amazon Web Services Secrets Manager.</p>
3559
+ * <p>This setting is valid only if the master user password is managed by RDS in Amazon Web Services Secrets
3560
+ * Manager for the DB cluster.</p>
3561
+ * <p>The Amazon Web Services KMS key identifier is the key ARN, key ID, alias ARN, or alias name for the KMS key.
3562
+ * To use a KMS key in a different Amazon Web Services account, specify the key ARN or alias ARN.</p>
3563
+ * <p>If you don't specify <code>MasterUserSecretKmsKeyId</code>, then the <code>aws/secretsmanager</code>
3564
+ * KMS key is used to encrypt the secret. If the secret is in a different Amazon Web Services account, then you can't
3565
+ * use the <code>aws/secretsmanager</code> KMS key to encrypt the secret, and you must use a customer
3566
+ * managed KMS key.</p>
3567
+ * <p>There is a default KMS key for your Amazon Web Services account. Your Amazon Web Services account
3568
+ * has a different default KMS key for each Amazon Web Services Region.</p>
3569
+ * <p>Valid for: Aurora DB clusters and Multi-AZ DB clusters</p>
3570
+ */
3571
+ MasterUserSecretKmsKeyId?: string;
3532
3572
  }
3533
3573
  /**
3534
3574
  * <p>Describes an Amazon Web Services Identity and Access Management (IAM) role that is associated with a DB cluster.</p>
@@ -3630,6 +3670,53 @@ export declare enum WriteForwardingStatus {
3630
3670
  ENABLING = "enabling",
3631
3671
  UNKNOWN = "unknown"
3632
3672
  }
3673
+ /**
3674
+ * <p>Contains the secret managed by RDS in Amazon Web Services Secrets Manager for the master user password.</p>
3675
+ * <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html">Password management with Amazon Web Services Secrets Manager</a>
3676
+ * in the <i>Amazon RDS User Guide</i> and <a href="https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html">Password management with Amazon Web Services Secrets Manager</a>
3677
+ * in the <i>Amazon Aurora User Guide.</i>
3678
+ * </p>
3679
+ */
3680
+ export interface MasterUserSecret {
3681
+ /**
3682
+ * <p>The Amazon Resource Name (ARN) of the secret.</p>
3683
+ */
3684
+ SecretArn?: string;
3685
+ /**
3686
+ * <p>The status of the secret.</p>
3687
+ * <p>The possible status values include the following:</p>
3688
+ * <ul>
3689
+ * <li>
3690
+ * <p>
3691
+ * <code>creating</code> - The secret is being created.</p>
3692
+ * </li>
3693
+ * <li>
3694
+ * <p>
3695
+ * <code>active</code> - The secret is available for normal use and rotation.</p>
3696
+ * </li>
3697
+ * <li>
3698
+ * <p>
3699
+ * <code>rotating</code> - The secret is being rotated.</p>
3700
+ * </li>
3701
+ * <li>
3702
+ * <p>
3703
+ * <code>impaired</code> - The secret can be used to access database credentials,
3704
+ * but it can't be rotated. A secret might have this status if, for example,
3705
+ * permissions are changed so that RDS can no longer access either the secret or
3706
+ * the KMS key for the secret.</p>
3707
+ * <p>When a secret has this status, you can correct the condition that caused the
3708
+ * status. Alternatively, modify the DB instance to turn off automatic management
3709
+ * of database credentials, and then modify the DB instance again to turn on
3710
+ * automatic management of database credentials.</p>
3711
+ * </li>
3712
+ * </ul>
3713
+ */
3714
+ SecretStatus?: string;
3715
+ /**
3716
+ * <p>The Amazon Web Services KMS key identifier that is used to encrypt the secret.</p>
3717
+ */
3718
+ KmsKeyId?: string;
3719
+ }
3633
3720
  /**
3634
3721
  * <p>A list of the log types whose configuration is still pending. In other words, these log types are in the process of being activated or deactivated.</p>
3635
3722
  */
@@ -4159,6 +4246,14 @@ export interface DBCluster {
4159
4246
  * <p>Reserved for future use.</p>
4160
4247
  */
4161
4248
  DBSystemId?: string;
4249
+ /**
4250
+ * <p>Contains the secret managed by RDS in Amazon Web Services Secrets Manager for the master user password.</p>
4251
+ * <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html">Password management with Amazon Web Services Secrets Manager</a>
4252
+ * in the <i>Amazon RDS User Guide</i> and <a href="https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html">Password management with Amazon Web Services Secrets Manager</a>
4253
+ * in the <i>Amazon Aurora User Guide.</i>
4254
+ * </p>
4255
+ */
4256
+ MasterUserSecret?: MasterUserSecret;
4162
4257
  }
4163
4258
  export interface CreateDBClusterResult {
4164
4259
  /**
@@ -5014,6 +5109,7 @@ export interface CreateDBInstanceMessage {
5014
5109
  * </p>
5015
5110
  * <p>Not applicable. The password for the master user is managed by the DB
5016
5111
  * cluster.</p>
5112
+ * <p>Constraints: Can't be specified if <code>ManageMasterUserPassword</code> is turned on.</p>
5017
5113
  * <p>
5018
5114
  * <b>MariaDB</b>
5019
5115
  * </p>
@@ -5695,6 +5791,35 @@ export interface CreateDBInstanceMessage {
5695
5791
  * <p>This setting doesn't apply to RDS Custom or Amazon Aurora.</p>
5696
5792
  */
5697
5793
  StorageThroughput?: number;
5794
+ /**
5795
+ * <p>A value that indicates whether to manage the master user password with Amazon Web Services Secrets Manager.</p>
5796
+ * <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html">Password management with Amazon Web Services Secrets Manager</a>
5797
+ * in the <i>Amazon RDS User Guide.</i>
5798
+ * </p>
5799
+ * <p>Constraints:</p>
5800
+ * <ul>
5801
+ * <li>
5802
+ * <p>Can't manage the master user password with Amazon Web Services Secrets Manager if <code>MasterUserPassword</code>
5803
+ * is specified.</p>
5804
+ * </li>
5805
+ * </ul>
5806
+ */
5807
+ ManageMasterUserPassword?: boolean;
5808
+ /**
5809
+ * <p>The Amazon Web Services KMS key identifier to encrypt a secret that is automatically generated and
5810
+ * managed in Amazon Web Services Secrets Manager.</p>
5811
+ * <p>This setting is valid only if the master user password is managed by RDS in Amazon Web Services Secrets
5812
+ * Manager for the DB instance.</p>
5813
+ * <p>The Amazon Web Services KMS key identifier is the key ARN, key ID, alias ARN, or alias name for the KMS key.
5814
+ * To use a KMS key in a different Amazon Web Services account, specify the key ARN or alias ARN.</p>
5815
+ * <p>If you don't specify <code>MasterUserSecretKmsKeyId</code>, then the <code>aws/secretsmanager</code>
5816
+ * KMS key is used to encrypt the secret. If the secret is in a different Amazon Web Services account, then you can't
5817
+ * use the <code>aws/secretsmanager</code> KMS key to encrypt the secret, and you must use a customer
5818
+ * managed KMS key.</p>
5819
+ * <p>There is a default KMS key for your Amazon Web Services account. Your Amazon Web Services account
5820
+ * has a different default KMS key for each Amazon Web Services Region.</p>
5821
+ */
5822
+ MasterUserSecretKmsKeyId?: string;
5698
5823
  }
5699
5824
  /**
5700
5825
  * <p>Describes an Amazon Web Services Identity and Access Management (IAM) role that is associated with a DB instance.</p>
@@ -6552,6 +6677,13 @@ export interface DBInstance {
6552
6677
  * the name of the CDB. This setting is valid for RDS Custom only.</p>
6553
6678
  */
6554
6679
  DBSystemId?: string;
6680
+ /**
6681
+ * <p>Contains the secret managed by RDS in Amazon Web Services Secrets Manager for the master user password.</p>
6682
+ * <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html">Password management with Amazon Web Services Secrets Manager</a>
6683
+ * in the <i>Amazon RDS User Guide.</i>
6684
+ * </p>
6685
+ */
6686
+ MasterUserSecret?: MasterUserSecret;
6555
6687
  }
6556
6688
  export interface CreateDBInstanceResult {
6557
6689
  /**
@@ -10491,38 +10623,6 @@ export interface DescribeDBProxiesResponse {
10491
10623
  */
10492
10624
  Marker?: string;
10493
10625
  }
10494
- export interface DescribeDBProxyEndpointsRequest {
10495
- /**
10496
- * <p>The name of the DB proxy whose endpoints you want to describe. If you omit
10497
- * this parameter, the output includes information about all DB proxy endpoints
10498
- * associated with all your DB proxies.</p>
10499
- */
10500
- DBProxyName?: string;
10501
- /**
10502
- * <p>The name of a DB proxy endpoint to describe. If you omit this parameter,
10503
- * the output includes information about all DB proxy endpoints associated with
10504
- * the specified proxy.</p>
10505
- */
10506
- DBProxyEndpointName?: string;
10507
- /**
10508
- * <p>This parameter is not currently supported.</p>
10509
- */
10510
- Filters?: Filter[];
10511
- /**
10512
- * <p>An optional pagination token provided by a previous request.
10513
- * If this parameter is specified, the response includes only records beyond the marker,
10514
- * up to the value specified by <code>MaxRecords</code>.</p>
10515
- */
10516
- Marker?: string;
10517
- /**
10518
- * <p>The maximum number of records to include in the response. If more records exist
10519
- * than the specified <code>MaxRecords</code> value, a pagination token called a marker is
10520
- * included in the response so that the remaining results can be retrieved.</p>
10521
- * <p>Default: 100</p>
10522
- * <p>Constraints: Minimum 20, maximum 100.</p>
10523
- */
10524
- MaxRecords?: number;
10525
- }
10526
10626
  /**
10527
10627
  * @internal
10528
10628
  */
@@ -10759,6 +10859,10 @@ export declare const DBClusterOptionGroupStatusFilterSensitiveLog: (obj: DBClust
10759
10859
  * @internal
10760
10860
  */
10761
10861
  export declare const DomainMembershipFilterSensitiveLog: (obj: DomainMembership) => any;
10862
+ /**
10863
+ * @internal
10864
+ */
10865
+ export declare const MasterUserSecretFilterSensitiveLog: (obj: MasterUserSecret) => any;
10762
10866
  /**
10763
10867
  * @internal
10764
10868
  */
@@ -11251,7 +11355,3 @@ export declare const DescribeDBProxiesRequestFilterSensitiveLog: (obj: DescribeD
11251
11355
  * @internal
11252
11356
  */
11253
11357
  export declare const DescribeDBProxiesResponseFilterSensitiveLog: (obj: DescribeDBProxiesResponse) => any;
11254
- /**
11255
- * @internal
11256
- */
11257
- export declare const DescribeDBProxyEndpointsRequestFilterSensitiveLog: (obj: DescribeDBProxyEndpointsRequest) => any;
@@ -1,6 +1,38 @@
1
1
  import { ExceptionOptionType as __ExceptionOptionType } from "@aws-sdk/smithy-client";
2
2
  import { ActivityStreamMode, ActivityStreamPolicyStatus, ActivityStreamStatus, AutomationMode, AvailabilityZone, BlueGreenDeployment, Certificate, DBCluster, DBClusterSnapshotAttributesResult, DBInstance, DBInstanceAutomatedBackup, DBProxy, DBProxyEndpoint, DBSecurityGroup, DBSnapshot, DBSubnetGroup, EventSubscription, ExportSourceType, ExportTask, Filter, GlobalCluster, OptionGroup, OptionSetting, Parameter, ProcessorFeature, ReplicaMode, ResourcePendingMaintenanceActions, ScalingConfiguration, ServerlessV2ScalingConfiguration, Tag, UserAuthConfig } from "./models_0";
3
3
  import { RDSServiceException as __BaseException } from "./RDSServiceException";
4
+ export interface DescribeDBProxyEndpointsRequest {
5
+ /**
6
+ * <p>The name of the DB proxy whose endpoints you want to describe. If you omit
7
+ * this parameter, the output includes information about all DB proxy endpoints
8
+ * associated with all your DB proxies.</p>
9
+ */
10
+ DBProxyName?: string;
11
+ /**
12
+ * <p>The name of a DB proxy endpoint to describe. If you omit this parameter,
13
+ * the output includes information about all DB proxy endpoints associated with
14
+ * the specified proxy.</p>
15
+ */
16
+ DBProxyEndpointName?: string;
17
+ /**
18
+ * <p>This parameter is not currently supported.</p>
19
+ */
20
+ Filters?: Filter[];
21
+ /**
22
+ * <p>An optional pagination token provided by a previous request.
23
+ * If this parameter is specified, the response includes only records beyond the marker,
24
+ * up to the value specified by <code>MaxRecords</code>.</p>
25
+ */
26
+ Marker?: string;
27
+ /**
28
+ * <p>The maximum number of records to include in the response. If more records exist
29
+ * than the specified <code>MaxRecords</code> value, a pagination token called a marker is
30
+ * included in the response so that the remaining results can be retrieved.</p>
31
+ * <p>Default: 100</p>
32
+ * <p>Constraints: Minimum 20, maximum 100.</p>
33
+ */
34
+ MaxRecords?: number;
35
+ }
4
36
  export interface DescribeDBProxyEndpointsResponse {
5
37
  /**
6
38
  * <p>The list of <code>ProxyEndpoint</code> objects returned by the API operation.</p>
@@ -2960,7 +2992,15 @@ export interface ModifyDBClusterMessage {
2960
2992
  Port?: number;
2961
2993
  /**
2962
2994
  * <p>The new password for the master database user. This password can contain any printable ASCII character except "/", """, or "@".</p>
2963
- * <p>Constraints: Must contain from 8 to 41 characters.</p>
2995
+ * <p>Constraints:</p>
2996
+ * <ul>
2997
+ * <li>
2998
+ * <p>Must contain from 8 to 41 characters.</p>
2999
+ * </li>
3000
+ * <li>
3001
+ * <p>Can't be specified if <code>ManageMasterUserPassword</code> is turned on.</p>
3002
+ * </li>
3003
+ * </ul>
2964
3004
  * <p>Valid for: Aurora DB clusters and Multi-AZ DB clusters</p>
2965
3005
  */
2966
3006
  MasterUserPassword?: string;
@@ -3308,6 +3348,66 @@ export interface ModifyDBClusterMessage {
3308
3348
  * <p>Valid for: Aurora DB clusters only</p>
3309
3349
  */
3310
3350
  NetworkType?: string;
3351
+ /**
3352
+ * <p>A value that indicates whether to manage the master user password with Amazon Web Services Secrets Manager.</p>
3353
+ * <p>If the DB cluster doesn't manage the master user password with Amazon Web Services Secrets Manager, you can turn
3354
+ * on this management. In this case, you can't specify <code>MasterUserPassword</code>.</p>
3355
+ * <p>If the DB cluster already manages the master user password with Amazon Web Services Secrets Manager, and you specify that the
3356
+ * master user password is not managed with Amazon Web Services Secrets Manager, then you must specify <code>MasterUserPassword</code>.
3357
+ * In this case, RDS deletes the secret and uses the new password for the master user specified by
3358
+ * <code>MasterUserPassword</code>.</p>
3359
+ * <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html">Password management with Amazon Web Services Secrets Manager</a>
3360
+ * in the <i>Amazon RDS User Guide</i> and <a href="https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html">Password management with Amazon Web Services Secrets Manager</a>
3361
+ * in the <i>Amazon Aurora User Guide.</i>
3362
+ * </p>
3363
+ * <p>Valid for: Aurora DB clusters and Multi-AZ DB clusters</p>
3364
+ */
3365
+ ManageMasterUserPassword?: boolean;
3366
+ /**
3367
+ * <p>A value that indicates whether to rotate the secret managed by Amazon Web Services Secrets Manager for the
3368
+ * master user password.</p>
3369
+ * <p>This setting is valid only if the master user password is managed by RDS in Amazon Web Services Secrets
3370
+ * Manager for the DB cluster. The secret value contains the updated password.</p>
3371
+ * <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html">Password management with Amazon Web Services Secrets Manager</a>
3372
+ * in the <i>Amazon RDS User Guide</i> and <a href="https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html">Password management with Amazon Web Services Secrets Manager</a>
3373
+ * in the <i>Amazon Aurora User Guide.</i>
3374
+ * </p>
3375
+ * <p>Constraints:</p>
3376
+ * <ul>
3377
+ * <li>
3378
+ * <p>You must apply the change immediately when rotating the master user password.</p>
3379
+ * </li>
3380
+ * </ul>
3381
+ * <p>Valid for: Aurora DB clusters and Multi-AZ DB clusters</p>
3382
+ */
3383
+ RotateMasterUserPassword?: boolean;
3384
+ /**
3385
+ * <p>The Amazon Web Services KMS key identifier to encrypt a secret that is automatically generated and
3386
+ * managed in Amazon Web Services Secrets Manager.</p>
3387
+ * <p>This setting is valid only if both of the following conditions are met:</p>
3388
+ * <ul>
3389
+ * <li>
3390
+ * <p>The DB cluster doesn't manage the master user password in Amazon Web Services Secrets Manager.</p>
3391
+ * <p>If the DB cluster already manages the master user password in Amazon Web Services Secrets
3392
+ * Manager, you can't change the KMS key that is used to encrypt the secret.</p>
3393
+ * </li>
3394
+ * <li>
3395
+ * <p>You are turning on <code>ManageMasterUserPassword</code> to manage the master user password
3396
+ * in Amazon Web Services Secrets Manager.</p>
3397
+ * <p>If you are turning on <code>ManageMasterUserPassword</code> and don't specify
3398
+ * <code>MasterUserSecretKmsKeyId</code>, then the <code>aws/secretsmanager</code>
3399
+ * KMS key is used to encrypt the secret. If the secret is in a different Amazon Web Services account, then you can't
3400
+ * use the <code>aws/secretsmanager</code> KMS key to encrypt the secret, and you must use a customer
3401
+ * managed KMS key.</p>
3402
+ * </li>
3403
+ * </ul>
3404
+ * <p>The Amazon Web Services KMS key identifier is the key ARN, key ID, alias ARN, or alias name for the KMS key.
3405
+ * To use a KMS key in a different Amazon Web Services account, specify the key ARN or alias ARN.</p>
3406
+ * <p>There is a default KMS key for your Amazon Web Services account. Your Amazon Web Services account
3407
+ * has a different default KMS key for each Amazon Web Services Region.</p>
3408
+ * <p>Valid for: Aurora DB clusters and Multi-AZ DB clusters</p>
3409
+ */
3410
+ MasterUserSecretKmsKeyId?: string;
3311
3411
  }
3312
3412
  export interface ModifyDBClusterResult {
3313
3413
  /**
@@ -3497,13 +3597,13 @@ export interface ModifyDBInstanceMessage {
3497
3597
  /**
3498
3598
  * <p>The new compute and memory capacity of the DB instance, for example db.m4.large. Not all DB instance classes are available in all
3499
3599
  * Amazon Web Services Regions, or for all database engines. For the full list of DB instance classes, and availability for your engine, see <a href="https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Concepts.DBInstanceClass.html">DB Instance Class</a> in the
3500
- * <i>Amazon RDS User Guide</i> or
3600
+ * <i>Amazon RDS User Guide</i> or
3501
3601
  * <a href="https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/Concepts.DBInstanceClass.html">Aurora
3502
3602
  * DB instance classes</a> in the <i>Amazon Aurora User Guide</i>. For RDS Custom, see <a href="https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/custom-reqs-limits.html#custom-reqs-limits.instances">DB instance class support for RDS Custom for Oracle</a> and <a href="https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/custom-reqs-limits-MS.html#custom-reqs-limits.instancesMS">
3503
- * DB instance class support for RDS Custom for SQL Server</a>.</p>
3603
+ * DB instance class support for RDS Custom for SQL Server</a>.</p>
3504
3604
  * <p>If you modify the DB instance class, an outage occurs during the change. The change is
3505
3605
  * applied during the next maintenance window, unless you specify
3506
- * <code>ApplyImmediately</code> in your request.</p>
3606
+ * <code>ApplyImmediately</code> in your request. </p>
3507
3607
  * <p>Default: Uses existing setting</p>
3508
3608
  */
3509
3609
  DBInstanceClass?: string;
@@ -3578,6 +3678,7 @@ export interface ModifyDBInstanceMessage {
3578
3678
  * <p>Not applicable. The password for the master user is managed by the DB cluster. For
3579
3679
  * more information, see <code>ModifyDBCluster</code>.</p>
3580
3680
  * <p>Default: Uses existing setting</p>
3681
+ * <p>Constraints: Can't be specified if <code>ManageMasterUserPassword</code> is turned on.</p>
3581
3682
  * <p>
3582
3683
  * <b>MariaDB</b>
3583
3684
  * </p>
@@ -4171,6 +4272,68 @@ export interface ModifyDBInstanceMessage {
4171
4272
  * <p>This setting doesn't apply to RDS Custom or Amazon Aurora.</p>
4172
4273
  */
4173
4274
  StorageThroughput?: number;
4275
+ /**
4276
+ * <p>A value that indicates whether to manage the master user password with Amazon Web Services Secrets Manager.</p>
4277
+ * <p>If the DB cluster doesn't manage the master user password with Amazon Web Services Secrets Manager, you can turn
4278
+ * on this management. In this case, you can't specify <code>MasterUserPassword</code>.</p>
4279
+ * <p>If the DB cluster already manages the master user password with Amazon Web Services Secrets Manager, and you specify that the
4280
+ * master user password is not managed with Amazon Web Services Secrets Manager, then you must specify <code>MasterUserPassword</code>.
4281
+ * In this case, RDS deletes the secret and uses the new password for the master user specified by
4282
+ * <code>MasterUserPassword</code>.</p>
4283
+ * <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html">Password management with Amazon Web Services Secrets Manager</a>
4284
+ * in the <i>Amazon RDS User Guide.</i>
4285
+ * </p>
4286
+ * <p>Constraints:</p>
4287
+ * <ul>
4288
+ * <li>
4289
+ * <p>Can't manage the master user password with Amazon Web Services Secrets Manager if <code>MasterUserPassword</code>
4290
+ * is specified.</p>
4291
+ * </li>
4292
+ * </ul>
4293
+ */
4294
+ ManageMasterUserPassword?: boolean;
4295
+ /**
4296
+ * <p>A value that indicates whether to rotate the secret managed by Amazon Web Services Secrets Manager for the
4297
+ * master user password.</p>
4298
+ * <p>This setting is valid only if the master user password is managed by RDS in Amazon Web Services Secrets
4299
+ * Manager for the DB cluster. The secret value contains the updated password.</p>
4300
+ * <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html">Password management with Amazon Web Services Secrets Manager</a>
4301
+ * in the <i>Amazon RDS User Guide.</i>
4302
+ * </p>
4303
+ * <p>Constraints:</p>
4304
+ * <ul>
4305
+ * <li>
4306
+ * <p>You must apply the change immediately when rotating the master user password.</p>
4307
+ * </li>
4308
+ * </ul>
4309
+ */
4310
+ RotateMasterUserPassword?: boolean;
4311
+ /**
4312
+ * <p>The Amazon Web Services KMS key identifier to encrypt a secret that is automatically generated and
4313
+ * managed in Amazon Web Services Secrets Manager.</p>
4314
+ * <p>This setting is valid only if both of the following conditions are met:</p>
4315
+ * <ul>
4316
+ * <li>
4317
+ * <p>The DB instance doesn't manage the master user password in Amazon Web Services Secrets Manager.</p>
4318
+ * <p>If the DB instance already manages the master user password in Amazon Web Services Secrets Manager,
4319
+ * you can't change the KMS key used to encrypt the secret.</p>
4320
+ * </li>
4321
+ * <li>
4322
+ * <p>You are turning on <code>ManageMasterUserPassword</code> to manage the master user password
4323
+ * in Amazon Web Services Secrets Manager.</p>
4324
+ * <p>If you are turning on <code>ManageMasterUserPassword</code> and don't specify
4325
+ * <code>MasterUserSecretKmsKeyId</code>, then the <code>aws/secretsmanager</code>
4326
+ * KMS key is used to encrypt the secret. If the secret is in a different Amazon Web Services account, then you can't
4327
+ * use the <code>aws/secretsmanager</code> KMS key to encrypt the secret, and you must use a customer
4328
+ * managed KMS key.</p>
4329
+ * </li>
4330
+ * </ul>
4331
+ * <p>The Amazon Web Services KMS key identifier is the key ARN, key ID, alias ARN, or alias name for the KMS key.
4332
+ * To use a KMS key in a different Amazon Web Services account, specify the key ARN or alias ARN.</p>
4333
+ * <p>There is a default KMS key for your Amazon Web Services account. Your Amazon Web Services account
4334
+ * has a different default KMS key for each Amazon Web Services Region.</p>
4335
+ */
4336
+ MasterUserSecretKmsKeyId?: string;
4174
4337
  }
4175
4338
  export interface ModifyDBInstanceResult {
4176
4339
  /**
@@ -5262,9 +5425,17 @@ export interface RestoreDBClusterFromS3Message {
5262
5425
  MasterUsername: string | undefined;
5263
5426
  /**
5264
5427
  * <p>The password for the master database user. This password can contain any printable ASCII character except "/", """, or "@".</p>
5265
- * <p>Constraints: Must contain from 8 to 41 characters.</p>
5428
+ * <p>Constraints:</p>
5429
+ * <ul>
5430
+ * <li>
5431
+ * <p>Must contain from 8 to 41 characters.</p>
5432
+ * </li>
5433
+ * <li>
5434
+ * <p>Can't be specified if <code>ManageMasterUserPassword</code> is turned on.</p>
5435
+ * </li>
5436
+ * </ul>
5266
5437
  */
5267
- MasterUserPassword: string | undefined;
5438
+ MasterUserPassword?: string;
5268
5439
  /**
5269
5440
  * <p>A value that indicates that the restored DB cluster should be associated with the specified option group.</p>
5270
5441
  * <p>Permanent options can't be removed from an option group. An option group can't be removed from a
@@ -5450,6 +5621,36 @@ export interface RestoreDBClusterFromS3Message {
5450
5621
  * </p>
5451
5622
  */
5452
5623
  NetworkType?: string;
5624
+ /**
5625
+ * <p>A value that indicates whether to manage the master user password with Amazon Web Services Secrets Manager.</p>
5626
+ * <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html">Password management with Amazon Web Services Secrets Manager</a>
5627
+ * in the <i>Amazon RDS User Guide</i> and <a href="https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html">Password management with Amazon Web Services Secrets Manager</a>
5628
+ * in the <i>Amazon Aurora User Guide.</i>
5629
+ * </p>
5630
+ * <p>Constraints:</p>
5631
+ * <ul>
5632
+ * <li>
5633
+ * <p>Can't manage the master user password with Amazon Web Services Secrets Manager if <code>MasterUserPassword</code>
5634
+ * is specified.</p>
5635
+ * </li>
5636
+ * </ul>
5637
+ */
5638
+ ManageMasterUserPassword?: boolean;
5639
+ /**
5640
+ * <p>The Amazon Web Services KMS key identifier to encrypt a secret that is automatically generated and
5641
+ * managed in Amazon Web Services Secrets Manager.</p>
5642
+ * <p>This setting is valid only if the master user password is managed by RDS in Amazon Web Services Secrets
5643
+ * Manager for the DB cluster.</p>
5644
+ * <p>The Amazon Web Services KMS key identifier is the key ARN, key ID, alias ARN, or alias name for the KMS key.
5645
+ * To use a KMS key in a different Amazon Web Services account, specify the key ARN or alias ARN.</p>
5646
+ * <p>If you don't specify <code>MasterUserSecretKmsKeyId</code>, then the <code>aws/secretsmanager</code>
5647
+ * KMS key is used to encrypt the secret. If the secret is in a different Amazon Web Services account, then you can't
5648
+ * use the <code>aws/secretsmanager</code> KMS key to encrypt the secret, and you must use a customer
5649
+ * managed KMS key.</p>
5650
+ * <p>There is a default KMS key for your Amazon Web Services account. Your Amazon Web Services account
5651
+ * has a different default KMS key for each Amazon Web Services Region.</p>
5652
+ */
5653
+ MasterUserSecretKmsKeyId?: string;
5453
5654
  }
5454
5655
  export interface RestoreDBClusterFromS3Result {
5455
5656
  /**
@@ -6723,7 +6924,27 @@ export interface RestoreDBInstanceFromS3Message {
6723
6924
  /**
6724
6925
  * <p>The password for the master user.
6725
6926
  * The password can include any printable ASCII character except "/", """, or "@".</p>
6927
+ * <p>Constraints: Can't be specified if <code>ManageMasterUserPassword</code> is turned on.</p>
6928
+ * <p>
6929
+ * <b>MariaDB</b>
6930
+ * </p>
6726
6931
  * <p>Constraints: Must contain from 8 to 41 characters.</p>
6932
+ * <p>
6933
+ * <b>Microsoft SQL Server</b>
6934
+ * </p>
6935
+ * <p>Constraints: Must contain from 8 to 128 characters.</p>
6936
+ * <p>
6937
+ * <b>MySQL</b>
6938
+ * </p>
6939
+ * <p>Constraints: Must contain from 8 to 41 characters.</p>
6940
+ * <p>
6941
+ * <b>Oracle</b>
6942
+ * </p>
6943
+ * <p>Constraints: Must contain from 8 to 30 characters.</p>
6944
+ * <p>
6945
+ * <b>PostgreSQL</b>
6946
+ * </p>
6947
+ * <p>Constraints: Must contain from 8 to 128 characters.</p>
6727
6948
  */
6728
6949
  MasterUserPassword?: string;
6729
6950
  /**
@@ -7070,6 +7291,35 @@ export interface RestoreDBInstanceFromS3Message {
7070
7291
  * <p>This setting doesn't apply to RDS Custom or Amazon Aurora.</p>
7071
7292
  */
7072
7293
  StorageThroughput?: number;
7294
+ /**
7295
+ * <p>A value that indicates whether to manage the master user password with Amazon Web Services Secrets Manager.</p>
7296
+ * <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html">Password management with Amazon Web Services Secrets Manager</a>
7297
+ * in the <i>Amazon RDS User Guide.</i>
7298
+ * </p>
7299
+ * <p>Constraints:</p>
7300
+ * <ul>
7301
+ * <li>
7302
+ * <p>Can't manage the master user password with Amazon Web Services Secrets Manager if <code>MasterUserPassword</code>
7303
+ * is specified.</p>
7304
+ * </li>
7305
+ * </ul>
7306
+ */
7307
+ ManageMasterUserPassword?: boolean;
7308
+ /**
7309
+ * <p>The Amazon Web Services KMS key identifier to encrypt a secret that is automatically generated and
7310
+ * managed in Amazon Web Services Secrets Manager.</p>
7311
+ * <p>This setting is valid only if the master user password is managed by RDS in Amazon Web Services Secrets
7312
+ * Manager for the DB instance.</p>
7313
+ * <p>The Amazon Web Services KMS key identifier is the key ARN, key ID, alias ARN, or alias name for the KMS key.
7314
+ * To use a KMS key in a different Amazon Web Services account, specify the key ARN or alias ARN.</p>
7315
+ * <p>If you don't specify <code>MasterUserSecretKmsKeyId</code>, then the <code>aws/secretsmanager</code>
7316
+ * KMS key is used to encrypt the secret. If the secret is in a different Amazon Web Services account, then you can't
7317
+ * use the <code>aws/secretsmanager</code> KMS key to encrypt the secret, and you must use a customer
7318
+ * managed KMS key.</p>
7319
+ * <p>There is a default KMS key for your Amazon Web Services account. Your Amazon Web Services account
7320
+ * has a different default KMS key for each Amazon Web Services Region.</p>
7321
+ */
7322
+ MasterUserSecretKmsKeyId?: string;
7073
7323
  }
7074
7324
  export interface RestoreDBInstanceFromS3Result {
7075
7325
  /**
@@ -7988,6 +8238,10 @@ export interface SwitchoverReadReplicaResult {
7988
8238
  */
7989
8239
  DBInstance?: DBInstance;
7990
8240
  }
8241
+ /**
8242
+ * @internal
8243
+ */
8244
+ export declare const DescribeDBProxyEndpointsRequestFilterSensitiveLog: (obj: DescribeDBProxyEndpointsRequest) => any;
7991
8245
  /**
7992
8246
  * @internal
7993
8247
  */
@@ -6,8 +6,10 @@ import {
6
6
  MetadataBearer as __MetadataBearer,
7
7
  MiddlewareStack,
8
8
  } from "@aws-sdk/types";
9
- import { DescribeDBProxyEndpointsRequest } from "../models/models_0";
10
- import { DescribeDBProxyEndpointsResponse } from "../models/models_1";
9
+ import {
10
+ DescribeDBProxyEndpointsRequest,
11
+ DescribeDBProxyEndpointsResponse,
12
+ } from "../models/models_1";
11
13
  import {
12
14
  RDSClientResolvedConfig,
13
15
  ServiceInputTypes,