cdk-docker-image-deployment 0.0.111 → 0.0.113

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (30) hide show
  1. package/.jsii +3 -3
  2. package/lib/destination.js +1 -1
  3. package/lib/docker-image-deployment.js +1 -1
  4. package/lib/source.js +1 -1
  5. package/node_modules/aws-sdk/CHANGELOG.md +15 -1
  6. package/node_modules/aws-sdk/README.md +1 -1
  7. package/node_modules/aws-sdk/apis/compute-optimizer-2019-11-01.min.json +311 -42
  8. package/node_modules/aws-sdk/apis/compute-optimizer-2019-11-01.paginators.json +30 -0
  9. package/node_modules/aws-sdk/apis/connect-2017-08-08.min.json +202 -93
  10. package/node_modules/aws-sdk/apis/connectparticipant-2018-09-07.min.json +17 -1
  11. package/node_modules/aws-sdk/apis/fsx-2018-03-01.min.json +13 -12
  12. package/node_modules/aws-sdk/apis/iotdeviceadvisor-2020-09-18.min.json +17 -3
  13. package/node_modules/aws-sdk/apis/kinesis-video-webrtc-storage-2018-05-10.min.json +0 -17
  14. package/node_modules/aws-sdk/apis/rds-2014-10-31.min.json +212 -169
  15. package/node_modules/aws-sdk/clients/computeoptimizer.d.ts +350 -4
  16. package/node_modules/aws-sdk/clients/connect.d.ts +122 -8
  17. package/node_modules/aws-sdk/clients/connectparticipant.d.ts +57 -28
  18. package/node_modules/aws-sdk/clients/fsx.d.ts +6 -1
  19. package/node_modules/aws-sdk/clients/inspector2.d.ts +1 -1
  20. package/node_modules/aws-sdk/clients/iotdeviceadvisor.d.ts +28 -24
  21. package/node_modules/aws-sdk/clients/kinesisvideowebrtcstorage.d.ts +0 -19
  22. package/node_modules/aws-sdk/clients/rds.d.ts +86 -8
  23. package/node_modules/aws-sdk/clients/secretsmanager.d.ts +8 -8
  24. package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +1 -1
  25. package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +9 -9
  26. package/node_modules/aws-sdk/dist/aws-sdk.js +417 -265
  27. package/node_modules/aws-sdk/dist/aws-sdk.min.js +77 -77
  28. package/node_modules/aws-sdk/lib/core.js +1 -1
  29. package/node_modules/aws-sdk/package.json +1 -1
  30. package/package.json +4 -4
@@ -130,7 +130,7 @@ declare namespace IotDeviceAdvisor {
130
130
  /**
131
131
  * Creates a Device Advisor test suite with suite definition configuration.
132
132
  */
133
- suiteDefinitionConfiguration?: SuiteDefinitionConfiguration;
133
+ suiteDefinitionConfiguration: SuiteDefinitionConfiguration;
134
134
  /**
135
135
  * The tags to be attached to the suite definition.
136
136
  */
@@ -138,19 +138,19 @@ declare namespace IotDeviceAdvisor {
138
138
  }
139
139
  export interface CreateSuiteDefinitionResponse {
140
140
  /**
141
- * Creates a Device Advisor test suite with suite UUID.
141
+ * The UUID of the test suite created.
142
142
  */
143
143
  suiteDefinitionId?: UUID;
144
144
  /**
145
- * Creates a Device Advisor test suite with Amazon Resource Name (ARN).
145
+ * The Amazon Resource Name (ARN) of the test suite.
146
146
  */
147
147
  suiteDefinitionArn?: AmazonResourceName;
148
148
  /**
149
- * Creates a Device Advisor test suite with suite definition name.
149
+ * The suite definition name of the test suite. This is a required parameter.
150
150
  */
151
151
  suiteDefinitionName?: SuiteDefinitionName;
152
152
  /**
153
- * Creates a Device Advisor test suite with TimeStamp of when it was created.
153
+ * The timestamp of when the test suite was created.
154
154
  */
155
155
  createdAt?: Timestamp;
156
156
  }
@@ -376,7 +376,7 @@ declare namespace IotDeviceAdvisor {
376
376
  }
377
377
  export interface ListTagsForResourceRequest {
378
378
  /**
379
- * The ARN of the IoT Device Advisor resource.
379
+ * The resource ARN of the IoT Device Advisor resource. This can be SuiteDefinition ARN or SuiteRun ARN.
380
380
  */
381
381
  resourceArn: AmazonResourceName;
382
382
  }
@@ -405,7 +405,7 @@ declare namespace IotDeviceAdvisor {
405
405
  /**
406
406
  * Suite run configuration.
407
407
  */
408
- suiteRunConfiguration?: SuiteRunConfiguration;
408
+ suiteRunConfiguration: SuiteRunConfiguration;
409
409
  /**
410
410
  * The tags to be attached to the suite run.
411
411
  */
@@ -424,6 +424,10 @@ declare namespace IotDeviceAdvisor {
424
424
  * Starts a Device Advisor test suite run based on suite create time.
425
425
  */
426
426
  createdAt?: Timestamp;
427
+ /**
428
+ * The response of an Device Advisor test endpoint.
429
+ */
430
+ endpoint?: Endpoint;
427
431
  }
428
432
  export type Status = "PASS"|"FAIL"|"CANCELED"|"PENDING"|"RUNNING"|"STOPPING"|"STOPPED"|"PASS_WITH_WARNINGS"|"ERROR"|string;
429
433
  export interface StopSuiteRunRequest {
@@ -442,9 +446,9 @@ declare namespace IotDeviceAdvisor {
442
446
  export type String256 = string;
443
447
  export interface SuiteDefinitionConfiguration {
444
448
  /**
445
- * Gets Suite Definition Configuration name.
449
+ * Gets the suite definition name. This is a required parameter.
446
450
  */
447
- suiteDefinitionName?: SuiteDefinitionName;
451
+ suiteDefinitionName: SuiteDefinitionName;
448
452
  /**
449
453
  * Gets the devices configured.
450
454
  */
@@ -454,19 +458,19 @@ declare namespace IotDeviceAdvisor {
454
458
  */
455
459
  intendedForQualification?: IntendedForQualificationBoolean;
456
460
  /**
457
- * Verifies if the test suite is a long duration test.
461
+ * Verifies if the test suite is a long duration test.
458
462
  */
459
463
  isLongDurationTest?: IsLongDurationTestBoolean;
460
464
  /**
461
- * Gets test suite root group.
465
+ * Gets the test suite root group. This is a required parameter.
462
466
  */
463
- rootGroup?: RootGroup;
467
+ rootGroup: RootGroup;
464
468
  /**
465
- * Gets the device permission ARN.
469
+ * Gets the device permission ARN. This is a required parameter.
466
470
  */
467
- devicePermissionRoleArn?: AmazonResourceName;
471
+ devicePermissionRoleArn: AmazonResourceName;
468
472
  /**
469
- * Gets the MQTT protocol that is configured in the suite definition.
473
+ * Sets the MQTT protocol that is configured in the suite definition.
470
474
  */
471
475
  protocol?: Protocol;
472
476
  }
@@ -488,11 +492,11 @@ declare namespace IotDeviceAdvisor {
488
492
  */
489
493
  intendedForQualification?: IntendedForQualificationBoolean;
490
494
  /**
491
- * Verifies if the test suite is a long duration test.
495
+ * Verifies if the test suite is a long duration test.
492
496
  */
493
497
  isLongDurationTest?: IsLongDurationTestBoolean;
494
498
  /**
495
- * Gets the MQTT protocol that is configured in the suite definition.
499
+ * Gets the MQTT protocol that is configured in the suite definition.
496
500
  */
497
501
  protocol?: Protocol;
498
502
  /**
@@ -505,11 +509,11 @@ declare namespace IotDeviceAdvisor {
505
509
  export type SuiteDefinitionVersion = string;
506
510
  export interface SuiteRunConfiguration {
507
511
  /**
508
- * Gets the primary device for suite run.
512
+ * Sets the primary device for the test suite run. This requires a thing ARN or a certificate ARN.
509
513
  */
510
- primaryDevice?: DeviceUnderTest;
514
+ primaryDevice: DeviceUnderTest;
511
515
  /**
512
- * Gets test case list.
516
+ * Sets test case list.
513
517
  */
514
518
  selectedTestList?: SelectedTestList;
515
519
  /**
@@ -567,7 +571,7 @@ declare namespace IotDeviceAdvisor {
567
571
  export type TagMap = {[key: string]: String256};
568
572
  export interface TagResourceRequest {
569
573
  /**
570
- * The resource ARN of an IoT Device Advisor resource.
574
+ * The resource ARN of an IoT Device Advisor resource. This can be SuiteDefinition ARN or SuiteRun ARN.
571
575
  */
572
576
  resourceArn: AmazonResourceName;
573
577
  /**
@@ -658,7 +662,7 @@ declare namespace IotDeviceAdvisor {
658
662
  export type UUID = string;
659
663
  export interface UntagResourceRequest {
660
664
  /**
661
- * The resource ARN of an IoT Device Advisor resource.
665
+ * The resource ARN of an IoT Device Advisor resource. This can be SuiteDefinition ARN or SuiteRun ARN.
662
666
  */
663
667
  resourceArn: AmazonResourceName;
664
668
  /**
@@ -676,7 +680,7 @@ declare namespace IotDeviceAdvisor {
676
680
  /**
677
681
  * Updates a Device Advisor test suite with suite definition configuration.
678
682
  */
679
- suiteDefinitionConfiguration?: SuiteDefinitionConfiguration;
683
+ suiteDefinitionConfiguration: SuiteDefinitionConfiguration;
680
684
  }
681
685
  export interface UpdateSuiteDefinitionResponse {
682
686
  /**
@@ -688,7 +692,7 @@ declare namespace IotDeviceAdvisor {
688
692
  */
689
693
  suiteDefinitionArn?: AmazonResourceName;
690
694
  /**
691
- * Suite definition name of the updated test suite.
695
+ * Updates the suite definition name. This is a required parameter.
692
696
  */
693
697
  suiteDefinitionName?: SuiteDefinitionName;
694
698
  /**
@@ -19,28 +19,9 @@ declare class KinesisVideoWebRTCStorage extends Service {
19
19
  * Join the ongoing one way-video and/or multi-way audio WebRTC session as a video producing device for an input channel. If there’s no existing session for the channel, a new streaming session needs to be created, and the Amazon Resource Name (ARN) of the signaling channel must be provided. Currently for the SINGLE_MASTER type, a video producing device is able to ingest both audio and video media into a stream, while viewers can only ingest audio. Both a video producing device and viewers can join the session first, and wait for other participants. While participants are having peer to peer conversations through webRTC, the ingested media session will be stored into the Kinesis Video Stream. Multiple viewers are able to playback real-time media. Customers can also use existing Kinesis Video Streams features like HLS or DASH playback, Image generation, and more with ingested WebRTC media. Assume that only one video producing device client can be associated with a session for the channel. If more than one client joins the session of a specific channel as a video producing device, the most recent client request takes precedence.
20
20
  */
21
21
  joinStorageSession(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
22
- /**
23
- * Join the ongoing one way-video and/or multi-way audio WebRTC session as a viewer for an input channel. If there’s no existing session for the channel, create a new streaming session and provide the Amazon Resource Name (ARN) of the signaling channel (channelArn) and client id (clientId). Currently for SINGLE_MASTER type, a video producing device is able to ingest both audio and video media into a stream, while viewers can only ingest audio. Both a video producing device and viewers can join a session first and wait for other participants. While participants are having peer to peer conversations through webRTC, the ingested media session will be stored into the Kinesis Video Stream. Multiple viewers are able to playback real-time media. Customers can also use existing Kinesis Video Streams features like HLS or DASH playback, Image generation, and more with ingested WebRTC media. If there’s an existing session with the same clientId that's found in the join session request, the new request takes precedence.
24
- */
25
- joinStorageSessionAsViewer(params: KinesisVideoWebRTCStorage.Types.JoinStorageSessionAsViewerInput, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
26
- /**
27
- * Join the ongoing one way-video and/or multi-way audio WebRTC session as a viewer for an input channel. If there’s no existing session for the channel, create a new streaming session and provide the Amazon Resource Name (ARN) of the signaling channel (channelArn) and client id (clientId). Currently for SINGLE_MASTER type, a video producing device is able to ingest both audio and video media into a stream, while viewers can only ingest audio. Both a video producing device and viewers can join a session first and wait for other participants. While participants are having peer to peer conversations through webRTC, the ingested media session will be stored into the Kinesis Video Stream. Multiple viewers are able to playback real-time media. Customers can also use existing Kinesis Video Streams features like HLS or DASH playback, Image generation, and more with ingested WebRTC media. If there’s an existing session with the same clientId that's found in the join session request, the new request takes precedence.
28
- */
29
- joinStorageSessionAsViewer(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
30
22
  }
31
23
  declare namespace KinesisVideoWebRTCStorage {
32
24
  export type ChannelArn = string;
33
- export type ClientId = string;
34
- export interface JoinStorageSessionAsViewerInput {
35
- /**
36
- * The Amazon Resource Name (ARN) of the signaling channel.
37
- */
38
- channelArn: ChannelArn;
39
- /**
40
- * The unique identifier for the sender client.
41
- */
42
- clientId: ClientId;
43
- }
44
25
  export interface JoinStorageSessionInput {
45
26
  /**
46
27
  * The Amazon Resource Name (ARN) of the signaling channel.
@@ -1848,7 +1848,7 @@ declare namespace RDS {
1848
1848
  */
1849
1849
  MasterUsername?: String;
1850
1850
  /**
1851
- * The password for the master database user. This password can contain any printable ASCII character except "/", """, or "@". Constraints: Must contain from 8 to 41 characters. Valid for: Aurora DB clusters and Multi-AZ DB clusters
1851
+ * The password for the master database user. This password can contain any printable ASCII character except "/", """, or "@". Constraints: Must contain from 8 to 41 characters. Can't be specified if ManageMasterUserPassword is turned on. Valid for: Aurora DB clusters and Multi-AZ DB clusters
1852
1852
  */
1853
1853
  MasterUserPassword?: String;
1854
1854
  /**
@@ -1984,6 +1984,14 @@ declare namespace RDS {
1984
1984
  * Reserved for future use.
1985
1985
  */
1986
1986
  DBSystemId?: String;
1987
+ /**
1988
+ * A value that indicates whether to manage the master user password with Amazon Web Services Secrets Manager. For more information, see Password management with Amazon Web Services Secrets Manager in the Amazon RDS User Guide and Password management with Amazon Web Services Secrets Manager in the Amazon Aurora User Guide. Constraints: Can't manage the master user password with Amazon Web Services Secrets Manager if MasterUserPassword is specified. Valid for: Aurora DB clusters and Multi-AZ DB clusters
1989
+ */
1990
+ ManageMasterUserPassword?: BooleanOptional;
1991
+ /**
1992
+ * The Amazon Web Services KMS key identifier to encrypt a secret that is automatically generated and managed in Amazon Web Services Secrets Manager. This setting is valid only if the master user password is managed by RDS in Amazon Web Services Secrets Manager for the DB cluster. The Amazon Web Services KMS key identifier is the key ARN, key ID, alias ARN, or alias name for the KMS key. To use a KMS key in a different Amazon Web Services account, specify the key ARN or alias ARN. If you don't specify MasterUserSecretKmsKeyId, then the aws/secretsmanager KMS key is used to encrypt the secret. If the secret is in a different Amazon Web Services account, then you can't use the aws/secretsmanager KMS key to encrypt the secret, and you must use a customer managed KMS key. There is a default KMS key for your Amazon Web Services account. Your Amazon Web Services account has a different default KMS key for each Amazon Web Services Region. Valid for: Aurora DB clusters and Multi-AZ DB clusters
1993
+ */
1994
+ MasterUserSecretKmsKeyId?: String;
1987
1995
  /**
1988
1996
  * The ID of the region that contains the source for the read replica.
1989
1997
  */
@@ -2056,7 +2064,7 @@ declare namespace RDS {
2056
2064
  */
2057
2065
  MasterUsername?: String;
2058
2066
  /**
2059
- * The password for the master user. The password can include any printable ASCII character except "/", """, or "@". Amazon Aurora Not applicable. The password for the master user is managed by the DB cluster. MariaDB Constraints: Must contain from 8 to 41 characters. Microsoft SQL Server Constraints: Must contain from 8 to 128 characters. MySQL Constraints: Must contain from 8 to 41 characters. Oracle Constraints: Must contain from 8 to 30 characters. PostgreSQL Constraints: Must contain from 8 to 128 characters.
2067
+ * The password for the master user. The password can include any printable ASCII character except "/", """, or "@". Amazon Aurora Not applicable. The password for the master user is managed by the DB cluster. Constraints: Can't be specified if ManageMasterUserPassword is turned on. MariaDB Constraints: Must contain from 8 to 41 characters. Microsoft SQL Server Constraints: Must contain from 8 to 128 characters. MySQL Constraints: Must contain from 8 to 41 characters. Oracle Constraints: Must contain from 8 to 30 characters. PostgreSQL Constraints: Must contain from 8 to 128 characters.
2060
2068
  */
2061
2069
  MasterUserPassword?: String;
2062
2070
  /**
@@ -2239,6 +2247,14 @@ declare namespace RDS {
2239
2247
  * Specifies the storage throughput value for the DB instance. This setting applies only to the gp3 storage type. This setting doesn't apply to RDS Custom or Amazon Aurora.
2240
2248
  */
2241
2249
  StorageThroughput?: IntegerOptional;
2250
+ /**
2251
+ * A value that indicates whether to manage the master user password with Amazon Web Services Secrets Manager. For more information, see Password management with Amazon Web Services Secrets Manager in the Amazon RDS User Guide. Constraints: Can't manage the master user password with Amazon Web Services Secrets Manager if MasterUserPassword is specified.
2252
+ */
2253
+ ManageMasterUserPassword?: BooleanOptional;
2254
+ /**
2255
+ * The Amazon Web Services KMS key identifier to encrypt a secret that is automatically generated and managed in Amazon Web Services Secrets Manager. This setting is valid only if the master user password is managed by RDS in Amazon Web Services Secrets Manager for the DB instance. The Amazon Web Services KMS key identifier is the key ARN, key ID, alias ARN, or alias name for the KMS key. To use a KMS key in a different Amazon Web Services account, specify the key ARN or alias ARN. If you don't specify MasterUserSecretKmsKeyId, then the aws/secretsmanager KMS key is used to encrypt the secret. If the secret is in a different Amazon Web Services account, then you can't use the aws/secretsmanager KMS key to encrypt the secret, and you must use a customer managed KMS key. There is a default KMS key for your Amazon Web Services account. Your Amazon Web Services account has a different default KMS key for each Amazon Web Services Region.
2256
+ */
2257
+ MasterUserSecretKmsKeyId?: String;
2242
2258
  }
2243
2259
  export interface CreateDBInstanceReadReplicaMessage {
2244
2260
  /**
@@ -2907,6 +2923,10 @@ declare namespace RDS {
2907
2923
  * Reserved for future use.
2908
2924
  */
2909
2925
  DBSystemId?: String;
2926
+ /**
2927
+ * Contains the secret managed by RDS in Amazon Web Services Secrets Manager for the master user password. For more information, see Password management with Amazon Web Services Secrets Manager in the Amazon RDS User Guide and Password management with Amazon Web Services Secrets Manager in the Amazon Aurora User Guide.
2928
+ */
2929
+ MasterUserSecret?: MasterUserSecret;
2910
2930
  }
2911
2931
  export interface DBClusterBacktrack {
2912
2932
  /**
@@ -3673,6 +3693,10 @@ declare namespace RDS {
3673
3693
  * The Oracle system ID (Oracle SID) for a container database (CDB). The Oracle SID is also the name of the CDB. This setting is valid for RDS Custom only.
3674
3694
  */
3675
3695
  DBSystemId?: String;
3696
+ /**
3697
+ * Contains the secret managed by RDS in Amazon Web Services Secrets Manager for the master user password. For more information, see Password management with Amazon Web Services Secrets Manager in the Amazon RDS User Guide.
3698
+ */
3699
+ MasterUserSecret?: MasterUserSecret;
3676
3700
  }
3677
3701
  export interface DBInstanceAutomatedBackup {
3678
3702
  /**
@@ -5950,6 +5974,20 @@ declare namespace RDS {
5950
5974
  export type LogTypeList = String[];
5951
5975
  export type Long = number;
5952
5976
  export type LongOptional = number;
5977
+ export interface MasterUserSecret {
5978
+ /**
5979
+ * The Amazon Resource Name (ARN) of the secret.
5980
+ */
5981
+ SecretArn?: String;
5982
+ /**
5983
+ * The status of the secret. The possible status values include the following: creating - The secret is being created. active - The secret is available for normal use and rotation. rotating - The secret is being rotated. impaired - The secret can be used to access database credentials, but it can't be rotated. A secret might have this status if, for example, permissions are changed so that RDS can no longer access either the secret or the KMS key for the secret. When a secret has this status, you can correct the condition that caused the status. Alternatively, modify the DB instance to turn off automatic management of database credentials, and then modify the DB instance again to turn on automatic management of database credentials.
5984
+ */
5985
+ SecretStatus?: String;
5986
+ /**
5987
+ * The Amazon Web Services KMS key identifier that is used to encrypt the secret.
5988
+ */
5989
+ KmsKeyId?: String;
5990
+ }
5953
5991
  export type MaxRecords = number;
5954
5992
  export interface MinimumEngineVersionPerAllowedValue {
5955
5993
  /**
@@ -6095,7 +6133,7 @@ declare namespace RDS {
6095
6133
  */
6096
6134
  Port?: IntegerOptional;
6097
6135
  /**
6098
- * The new password for the master database user. This password can contain any printable ASCII character except "/", """, or "@". Constraints: Must contain from 8 to 41 characters. Valid for: Aurora DB clusters and Multi-AZ DB clusters
6136
+ * The new password for the master database user. This password can contain any printable ASCII character except "/", """, or "@". Constraints: Must contain from 8 to 41 characters. Can't be specified if ManageMasterUserPassword is turned on. Valid for: Aurora DB clusters and Multi-AZ DB clusters
6099
6137
  */
6100
6138
  MasterUserPassword?: String;
6101
6139
  /**
@@ -6207,6 +6245,18 @@ declare namespace RDS {
6207
6245
  * The network type of the DB cluster. Valid values: IPV4 DUAL The network type is determined by the DBSubnetGroup specified for the DB cluster. A DBSubnetGroup can support only the IPv4 protocol or the IPv4 and the IPv6 protocols (DUAL). For more information, see Working with a DB instance in a VPC in the Amazon Aurora User Guide. Valid for: Aurora DB clusters only
6208
6246
  */
6209
6247
  NetworkType?: String;
6248
+ /**
6249
+ * A value that indicates whether to manage the master user password with Amazon Web Services Secrets Manager. If the DB cluster doesn't manage the master user password with Amazon Web Services Secrets Manager, you can turn on this management. In this case, you can't specify MasterUserPassword. If the DB cluster already manages the master user password with Amazon Web Services Secrets Manager, and you specify that the master user password is not managed with Amazon Web Services Secrets Manager, then you must specify MasterUserPassword. In this case, RDS deletes the secret and uses the new password for the master user specified by MasterUserPassword. For more information, see Password management with Amazon Web Services Secrets Manager in the Amazon RDS User Guide and Password management with Amazon Web Services Secrets Manager in the Amazon Aurora User Guide. Valid for: Aurora DB clusters and Multi-AZ DB clusters
6250
+ */
6251
+ ManageMasterUserPassword?: BooleanOptional;
6252
+ /**
6253
+ * A value that indicates whether to rotate the secret managed by Amazon Web Services Secrets Manager for the master user password. This setting is valid only if the master user password is managed by RDS in Amazon Web Services Secrets Manager for the DB cluster. The secret value contains the updated password. For more information, see Password management with Amazon Web Services Secrets Manager in the Amazon RDS User Guide and Password management with Amazon Web Services Secrets Manager in the Amazon Aurora User Guide. Constraints: You must apply the change immediately when rotating the master user password. Valid for: Aurora DB clusters and Multi-AZ DB clusters
6254
+ */
6255
+ RotateMasterUserPassword?: BooleanOptional;
6256
+ /**
6257
+ * The Amazon Web Services KMS key identifier to encrypt a secret that is automatically generated and managed in Amazon Web Services Secrets Manager. This setting is valid only if both of the following conditions are met: The DB cluster doesn't manage the master user password in Amazon Web Services Secrets Manager. If the DB cluster already manages the master user password in Amazon Web Services Secrets Manager, you can't change the KMS key that is used to encrypt the secret. You are turning on ManageMasterUserPassword to manage the master user password in Amazon Web Services Secrets Manager. If you are turning on ManageMasterUserPassword and don't specify MasterUserSecretKmsKeyId, then the aws/secretsmanager KMS key is used to encrypt the secret. If the secret is in a different Amazon Web Services account, then you can't use the aws/secretsmanager KMS key to encrypt the secret, and you must use a customer managed KMS key. The Amazon Web Services KMS key identifier is the key ARN, key ID, alias ARN, or alias name for the KMS key. To use a KMS key in a different Amazon Web Services account, specify the key ARN or alias ARN. There is a default KMS key for your Amazon Web Services account. Your Amazon Web Services account has a different default KMS key for each Amazon Web Services Region. Valid for: Aurora DB clusters and Multi-AZ DB clusters
6258
+ */
6259
+ MasterUserSecretKmsKeyId?: String;
6210
6260
  }
6211
6261
  export interface ModifyDBClusterParameterGroupMessage {
6212
6262
  /**
@@ -6252,7 +6302,7 @@ declare namespace RDS {
6252
6302
  */
6253
6303
  AllocatedStorage?: IntegerOptional;
6254
6304
  /**
6255
- * The new compute and memory capacity of the DB instance, for example db.m4.large. Not all DB instance classes are available in all Amazon Web Services Regions, or for all database engines. For the full list of DB instance classes, and availability for your engine, see DB Instance Class in the Amazon RDS User Guide or Aurora DB instance classes in the Amazon Aurora User Guide. For RDS Custom, see DB instance class support for RDS Custom for Oracle and DB instance class support for RDS Custom for SQL Server. If you modify the DB instance class, an outage occurs during the change. The change is applied during the next maintenance window, unless you specify ApplyImmediately in your request. Default: Uses existing setting
6305
+ * The new compute and memory capacity of the DB instance, for example db.m4.large. Not all DB instance classes are available in all Amazon Web Services Regions, or for all database engines. For the full list of DB instance classes, and availability for your engine, see DB Instance Class in the Amazon RDS User Guide or Aurora DB instance classes in the Amazon Aurora User Guide. For RDS Custom, see DB instance class support for RDS Custom for Oracle and DB instance class support for RDS Custom for SQL Server. If you modify the DB instance class, an outage occurs during the change. The change is applied during the next maintenance window, unless you specify ApplyImmediately in your request. Default: Uses existing setting
6256
6306
  */
6257
6307
  DBInstanceClass?: String;
6258
6308
  /**
@@ -6272,7 +6322,7 @@ declare namespace RDS {
6272
6322
  */
6273
6323
  ApplyImmediately?: Boolean;
6274
6324
  /**
6275
- * The new password for the master user. The password can include any printable ASCII character except "/", """, or "@". Changing this parameter doesn't result in an outage and the change is asynchronously applied as soon as possible. Between the time of the request and the completion of the request, the MasterUserPassword element exists in the PendingModifiedValues element of the operation response. This setting doesn't apply to RDS Custom. Amazon Aurora Not applicable. The password for the master user is managed by the DB cluster. For more information, see ModifyDBCluster. Default: Uses existing setting MariaDB Constraints: Must contain from 8 to 41 characters. Microsoft SQL Server Constraints: Must contain from 8 to 128 characters. MySQL Constraints: Must contain from 8 to 41 characters. Oracle Constraints: Must contain from 8 to 30 characters. PostgreSQL Constraints: Must contain from 8 to 128 characters. Amazon RDS API operations never return the password, so this action provides a way to regain access to a primary instance user if the password is lost. This includes restoring privileges that might have been accidentally revoked.
6325
+ * The new password for the master user. The password can include any printable ASCII character except "/", """, or "@". Changing this parameter doesn't result in an outage and the change is asynchronously applied as soon as possible. Between the time of the request and the completion of the request, the MasterUserPassword element exists in the PendingModifiedValues element of the operation response. This setting doesn't apply to RDS Custom. Amazon Aurora Not applicable. The password for the master user is managed by the DB cluster. For more information, see ModifyDBCluster. Default: Uses existing setting Constraints: Can't be specified if ManageMasterUserPassword is turned on. MariaDB Constraints: Must contain from 8 to 41 characters. Microsoft SQL Server Constraints: Must contain from 8 to 128 characters. MySQL Constraints: Must contain from 8 to 41 characters. Oracle Constraints: Must contain from 8 to 30 characters. PostgreSQL Constraints: Must contain from 8 to 128 characters. Amazon RDS API operations never return the password, so this action provides a way to regain access to a primary instance user if the password is lost. This includes restoring privileges that might have been accidentally revoked.
6276
6326
  */
6277
6327
  MasterUserPassword?: String;
6278
6328
  /**
@@ -6439,6 +6489,18 @@ declare namespace RDS {
6439
6489
  * Specifies the storage throughput value for the DB instance. This setting applies only to the gp3 storage type. This setting doesn't apply to RDS Custom or Amazon Aurora.
6440
6490
  */
6441
6491
  StorageThroughput?: IntegerOptional;
6492
+ /**
6493
+ * A value that indicates whether to manage the master user password with Amazon Web Services Secrets Manager. If the DB cluster doesn't manage the master user password with Amazon Web Services Secrets Manager, you can turn on this management. In this case, you can't specify MasterUserPassword. If the DB cluster already manages the master user password with Amazon Web Services Secrets Manager, and you specify that the master user password is not managed with Amazon Web Services Secrets Manager, then you must specify MasterUserPassword. In this case, RDS deletes the secret and uses the new password for the master user specified by MasterUserPassword. For more information, see Password management with Amazon Web Services Secrets Manager in the Amazon RDS User Guide. Constraints: Can't manage the master user password with Amazon Web Services Secrets Manager if MasterUserPassword is specified.
6494
+ */
6495
+ ManageMasterUserPassword?: BooleanOptional;
6496
+ /**
6497
+ * A value that indicates whether to rotate the secret managed by Amazon Web Services Secrets Manager for the master user password. This setting is valid only if the master user password is managed by RDS in Amazon Web Services Secrets Manager for the DB cluster. The secret value contains the updated password. For more information, see Password management with Amazon Web Services Secrets Manager in the Amazon RDS User Guide. Constraints: You must apply the change immediately when rotating the master user password.
6498
+ */
6499
+ RotateMasterUserPassword?: BooleanOptional;
6500
+ /**
6501
+ * The Amazon Web Services KMS key identifier to encrypt a secret that is automatically generated and managed in Amazon Web Services Secrets Manager. This setting is valid only if both of the following conditions are met: The DB instance doesn't manage the master user password in Amazon Web Services Secrets Manager. If the DB instance already manages the master user password in Amazon Web Services Secrets Manager, you can't change the KMS key used to encrypt the secret. You are turning on ManageMasterUserPassword to manage the master user password in Amazon Web Services Secrets Manager. If you are turning on ManageMasterUserPassword and don't specify MasterUserSecretKmsKeyId, then the aws/secretsmanager KMS key is used to encrypt the secret. If the secret is in a different Amazon Web Services account, then you can't use the aws/secretsmanager KMS key to encrypt the secret, and you must use a customer managed KMS key. The Amazon Web Services KMS key identifier is the key ARN, key ID, alias ARN, or alias name for the KMS key. To use a KMS key in a different Amazon Web Services account, specify the key ARN or alias ARN. There is a default KMS key for your Amazon Web Services account. Your Amazon Web Services account has a different default KMS key for each Amazon Web Services Region.
6502
+ */
6503
+ MasterUserSecretKmsKeyId?: String;
6442
6504
  }
6443
6505
  export interface ModifyDBInstanceResult {
6444
6506
  DBInstance?: DBInstance;
@@ -7707,9 +7769,9 @@ declare namespace RDS {
7707
7769
  */
7708
7770
  MasterUsername: String;
7709
7771
  /**
7710
- * The password for the master database user. This password can contain any printable ASCII character except "/", """, or "@". Constraints: Must contain from 8 to 41 characters.
7772
+ * The password for the master database user. This password can contain any printable ASCII character except "/", """, or "@". Constraints: Must contain from 8 to 41 characters. Can't be specified if ManageMasterUserPassword is turned on.
7711
7773
  */
7712
- MasterUserPassword: String;
7774
+ MasterUserPassword?: String;
7713
7775
  /**
7714
7776
  * A value that indicates that the restored DB cluster should be associated with the specified option group. Permanent options can't be removed from an option group. An option group can't be removed from a DB cluster once it is associated with a DB cluster.
7715
7777
  */
@@ -7784,6 +7846,14 @@ declare namespace RDS {
7784
7846
  * The network type of the DB cluster. Valid values: IPV4 DUAL The network type is determined by the DBSubnetGroup specified for the DB cluster. A DBSubnetGroup can support only the IPv4 protocol or the IPv4 and the IPv6 protocols (DUAL). For more information, see Working with a DB instance in a VPC in the Amazon Aurora User Guide.
7785
7847
  */
7786
7848
  NetworkType?: String;
7849
+ /**
7850
+ * A value that indicates whether to manage the master user password with Amazon Web Services Secrets Manager. For more information, see Password management with Amazon Web Services Secrets Manager in the Amazon RDS User Guide and Password management with Amazon Web Services Secrets Manager in the Amazon Aurora User Guide. Constraints: Can't manage the master user password with Amazon Web Services Secrets Manager if MasterUserPassword is specified.
7851
+ */
7852
+ ManageMasterUserPassword?: BooleanOptional;
7853
+ /**
7854
+ * The Amazon Web Services KMS key identifier to encrypt a secret that is automatically generated and managed in Amazon Web Services Secrets Manager. This setting is valid only if the master user password is managed by RDS in Amazon Web Services Secrets Manager for the DB cluster. The Amazon Web Services KMS key identifier is the key ARN, key ID, alias ARN, or alias name for the KMS key. To use a KMS key in a different Amazon Web Services account, specify the key ARN or alias ARN. If you don't specify MasterUserSecretKmsKeyId, then the aws/secretsmanager KMS key is used to encrypt the secret. If the secret is in a different Amazon Web Services account, then you can't use the aws/secretsmanager KMS key to encrypt the secret, and you must use a customer managed KMS key. There is a default KMS key for your Amazon Web Services account. Your Amazon Web Services account has a different default KMS key for each Amazon Web Services Region.
7855
+ */
7856
+ MasterUserSecretKmsKeyId?: String;
7787
7857
  }
7788
7858
  export interface RestoreDBClusterFromS3Result {
7789
7859
  DBCluster?: DBCluster;
@@ -8173,7 +8243,7 @@ declare namespace RDS {
8173
8243
  */
8174
8244
  MasterUsername?: String;
8175
8245
  /**
8176
- * The password for the master user. The password can include any printable ASCII character except "/", """, or "@". Constraints: Must contain from 8 to 41 characters.
8246
+ * The password for the master user. The password can include any printable ASCII character except "/", """, or "@". Constraints: Can't be specified if ManageMasterUserPassword is turned on. MariaDB Constraints: Must contain from 8 to 41 characters. Microsoft SQL Server Constraints: Must contain from 8 to 128 characters. MySQL Constraints: Must contain from 8 to 41 characters. Oracle Constraints: Must contain from 8 to 30 characters. PostgreSQL Constraints: Must contain from 8 to 128 characters.
8177
8247
  */
8178
8248
  MasterUserPassword?: String;
8179
8249
  /**
@@ -8332,6 +8402,14 @@ declare namespace RDS {
8332
8402
  * Specifies the storage throughput value for the DB instance. This setting doesn't apply to RDS Custom or Amazon Aurora.
8333
8403
  */
8334
8404
  StorageThroughput?: IntegerOptional;
8405
+ /**
8406
+ * A value that indicates whether to manage the master user password with Amazon Web Services Secrets Manager. For more information, see Password management with Amazon Web Services Secrets Manager in the Amazon RDS User Guide. Constraints: Can't manage the master user password with Amazon Web Services Secrets Manager if MasterUserPassword is specified.
8407
+ */
8408
+ ManageMasterUserPassword?: BooleanOptional;
8409
+ /**
8410
+ * The Amazon Web Services KMS key identifier to encrypt a secret that is automatically generated and managed in Amazon Web Services Secrets Manager. This setting is valid only if the master user password is managed by RDS in Amazon Web Services Secrets Manager for the DB instance. The Amazon Web Services KMS key identifier is the key ARN, key ID, alias ARN, or alias name for the KMS key. To use a KMS key in a different Amazon Web Services account, specify the key ARN or alias ARN. If you don't specify MasterUserSecretKmsKeyId, then the aws/secretsmanager KMS key is used to encrypt the secret. If the secret is in a different Amazon Web Services account, then you can't use the aws/secretsmanager KMS key to encrypt the secret, and you must use a customer managed KMS key. There is a default KMS key for your Amazon Web Services account. Your Amazon Web Services account has a different default KMS key for each Amazon Web Services Region.
8411
+ */
8412
+ MasterUserSecretKmsKeyId?: String;
8335
8413
  }
8336
8414
  export interface RestoreDBInstanceFromS3Result {
8337
8415
  DBInstance?: DBInstance;
@@ -20,11 +20,11 @@ declare class SecretsManager extends Service {
20
20
  */
21
21
  cancelRotateSecret(callback?: (err: AWSError, data: SecretsManager.Types.CancelRotateSecretResponse) => void): Request<SecretsManager.Types.CancelRotateSecretResponse, AWSError>;
22
22
  /**
23
- * Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret. For information about creating a secret in the console, see Create a secret. To create a secret, you can provide the secret value to be encrypted in either the SecretString parameter or the SecretBinary parameter, but not both. If you include SecretString or SecretBinary then Secrets Manager creates an initial secret version and automatically attaches the staging label AWSCURRENT to it. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the JSON you store in the SecretString matches the JSON structure of a database secret. If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS key. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:CreateSecret. If you include tags in the secret, you also need secretsmanager:TagResource. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. To encrypt the secret with a KMS key other than aws/secretsmanager, you need kms:GenerateDataKey and kms:Decrypt permission to the key.
23
+ * Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret. For secrets that use managed rotation, you need to create the secret through the managing service. For more information, see Secrets Manager secrets managed by other Amazon Web Services services. For information about creating a secret in the console, see Create a secret. To create a secret, you can provide the secret value to be encrypted in either the SecretString parameter or the SecretBinary parameter, but not both. If you include SecretString or SecretBinary then Secrets Manager creates an initial secret version and automatically attaches the staging label AWSCURRENT to it. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the JSON you store in the SecretString matches the JSON structure of a database secret. If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS key. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:CreateSecret. If you include tags in the secret, you also need secretsmanager:TagResource. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. To encrypt the secret with a KMS key other than aws/secretsmanager, you need kms:GenerateDataKey and kms:Decrypt permission to the key.
24
24
  */
25
25
  createSecret(params: SecretsManager.Types.CreateSecretRequest, callback?: (err: AWSError, data: SecretsManager.Types.CreateSecretResponse) => void): Request<SecretsManager.Types.CreateSecretResponse, AWSError>;
26
26
  /**
27
- * Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret. For information about creating a secret in the console, see Create a secret. To create a secret, you can provide the secret value to be encrypted in either the SecretString parameter or the SecretBinary parameter, but not both. If you include SecretString or SecretBinary then Secrets Manager creates an initial secret version and automatically attaches the staging label AWSCURRENT to it. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the JSON you store in the SecretString matches the JSON structure of a database secret. If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS key. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:CreateSecret. If you include tags in the secret, you also need secretsmanager:TagResource. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. To encrypt the secret with a KMS key other than aws/secretsmanager, you need kms:GenerateDataKey and kms:Decrypt permission to the key.
27
+ * Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret. For secrets that use managed rotation, you need to create the secret through the managing service. For more information, see Secrets Manager secrets managed by other Amazon Web Services services. For information about creating a secret in the console, see Create a secret. To create a secret, you can provide the secret value to be encrypted in either the SecretString parameter or the SecretBinary parameter, but not both. If you include SecretString or SecretBinary then Secrets Manager creates an initial secret version and automatically attaches the staging label AWSCURRENT to it. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the JSON you store in the SecretString matches the JSON structure of a database secret. If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS key. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:CreateSecret. If you include tags in the secret, you also need secretsmanager:TagResource. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. To encrypt the secret with a KMS key other than aws/secretsmanager, you need kms:GenerateDataKey and kms:Decrypt permission to the key.
28
28
  */
29
29
  createSecret(callback?: (err: AWSError, data: SecretsManager.Types.CreateSecretResponse) => void): Request<SecretsManager.Types.CreateSecretResponse, AWSError>;
30
30
  /**
@@ -132,11 +132,11 @@ declare class SecretsManager extends Service {
132
132
  */
133
133
  restoreSecret(callback?: (err: AWSError, data: SecretsManager.Types.RestoreSecretResponse) => void): Request<SecretsManager.Types.RestoreSecretResponse, AWSError>;
134
134
  /**
135
- * Configures and starts the asynchronous process of rotating the secret. For more information about rotation, see Rotate secrets. If you include the configuration parameters, the operation sets the values for the secret and then immediately starts a rotation. If you don't include the configuration parameters, the operation starts a rotation with the values already stored in the secret. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the secret value is in the JSON structure of a database secret. In particular, if you want to use the alternating users strategy, your secret must contain the ARN of a superuser secret. To configure rotation, you also need the ARN of an Amazon Web Services Lambda function and the schedule for the rotation. The Lambda rotation function creates a new version of the secret and creates or updates the credentials on the database or service to match. After testing the new credentials, the function marks the new secret version with the staging label AWSCURRENT. Then anyone who retrieves the secret gets the new version. For more information, see How rotation works. You can create the Lambda rotation function based on the rotation function templates that Secrets Manager provides. Choose a template that matches your Rotation strategy. When rotation is successful, the AWSPENDING staging label might be attached to the same version as the AWSCURRENT version, or it might not be attached to any version. If the AWSPENDING staging label is present but not attached to the same version as AWSCURRENT, then any later invocation of RotateSecret assumes that a previous rotation request is still in progress and returns an error. When rotation is unsuccessful, the AWSPENDING staging label might be attached to an empty secret version. For more information, see Troubleshoot rotation in the Secrets Manager User Guide. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:RotateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. You also need lambda:InvokeFunction permissions on the rotation function. For more information, see Permissions for rotation.
135
+ * Configures and starts the asynchronous process of rotating the secret. For information about rotation, see Rotate secrets in the Secrets Manager User Guide. If you include the configuration parameters, the operation sets the values for the secret and then immediately starts a rotation. If you don't include the configuration parameters, the operation starts a rotation with the values already stored in the secret. When rotation is successful, the AWSPENDING staging label might be attached to the same version as the AWSCURRENT version, or it might not be attached to any version. If the AWSPENDING staging label is present but not attached to the same version as AWSCURRENT, then any later invocation of RotateSecret assumes that a previous rotation request is still in progress and returns an error. When rotation is unsuccessful, the AWSPENDING staging label might be attached to an empty secret version. For more information, see Troubleshoot rotation in the Secrets Manager User Guide. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:RotateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. You also need lambda:InvokeFunction permissions on the rotation function. For more information, see Permissions for rotation.
136
136
  */
137
137
  rotateSecret(params: SecretsManager.Types.RotateSecretRequest, callback?: (err: AWSError, data: SecretsManager.Types.RotateSecretResponse) => void): Request<SecretsManager.Types.RotateSecretResponse, AWSError>;
138
138
  /**
139
- * Configures and starts the asynchronous process of rotating the secret. For more information about rotation, see Rotate secrets. If you include the configuration parameters, the operation sets the values for the secret and then immediately starts a rotation. If you don't include the configuration parameters, the operation starts a rotation with the values already stored in the secret. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the secret value is in the JSON structure of a database secret. In particular, if you want to use the alternating users strategy, your secret must contain the ARN of a superuser secret. To configure rotation, you also need the ARN of an Amazon Web Services Lambda function and the schedule for the rotation. The Lambda rotation function creates a new version of the secret and creates or updates the credentials on the database or service to match. After testing the new credentials, the function marks the new secret version with the staging label AWSCURRENT. Then anyone who retrieves the secret gets the new version. For more information, see How rotation works. You can create the Lambda rotation function based on the rotation function templates that Secrets Manager provides. Choose a template that matches your Rotation strategy. When rotation is successful, the AWSPENDING staging label might be attached to the same version as the AWSCURRENT version, or it might not be attached to any version. If the AWSPENDING staging label is present but not attached to the same version as AWSCURRENT, then any later invocation of RotateSecret assumes that a previous rotation request is still in progress and returns an error. When rotation is unsuccessful, the AWSPENDING staging label might be attached to an empty secret version. For more information, see Troubleshoot rotation in the Secrets Manager User Guide. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:RotateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. You also need lambda:InvokeFunction permissions on the rotation function. For more information, see Permissions for rotation.
139
+ * Configures and starts the asynchronous process of rotating the secret. For information about rotation, see Rotate secrets in the Secrets Manager User Guide. If you include the configuration parameters, the operation sets the values for the secret and then immediately starts a rotation. If you don't include the configuration parameters, the operation starts a rotation with the values already stored in the secret. When rotation is successful, the AWSPENDING staging label might be attached to the same version as the AWSCURRENT version, or it might not be attached to any version. If the AWSPENDING staging label is present but not attached to the same version as AWSCURRENT, then any later invocation of RotateSecret assumes that a previous rotation request is still in progress and returns an error. When rotation is unsuccessful, the AWSPENDING staging label might be attached to an empty secret version. For more information, see Troubleshoot rotation in the Secrets Manager User Guide. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:RotateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. You also need lambda:InvokeFunction permissions on the rotation function. For more information, see Permissions for rotation.
140
140
  */
141
141
  rotateSecret(callback?: (err: AWSError, data: SecretsManager.Types.RotateSecretResponse) => void): Request<SecretsManager.Types.RotateSecretResponse, AWSError>;
142
142
  /**
@@ -164,11 +164,11 @@ declare class SecretsManager extends Service {
164
164
  */
165
165
  untagResource(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
166
166
  /**
167
- * Modifies the details of a secret, including metadata and the secret value. To change the secret value, you can also use PutSecretValue. To change the rotation configuration of a secret, use RotateSecret instead. We recommend you avoid calling UpdateSecret at a sustained rate of more than once every 10 minutes. When you call UpdateSecret to update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you update the secret value more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. If you include SecretString or SecretBinary to create a new secret version, Secrets Manager automatically moves the staging label AWSCURRENT to the new version. Then it attaches the label AWSPREVIOUS to the version that AWSCURRENT was removed from. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, the operation results in an error. You can't modify an existing version, you can only create a new version. To remove a version, remove all staging labels from it. See UpdateSecretVersionStage. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:UpdateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. If you use a customer managed key, you must also have kms:GenerateDataKey and kms:Decrypt permissions on the key. For more information, see Secret encryption and decryption.
167
+ * Modifies the details of a secret, including metadata and the secret value. To change the secret value, you can also use PutSecretValue. To change the rotation configuration of a secret, use RotateSecret instead. To change a secret so that it is managed by another service, you need to recreate the secret in that service. See Secrets Manager secrets managed by other Amazon Web Services services. We recommend you avoid calling UpdateSecret at a sustained rate of more than once every 10 minutes. When you call UpdateSecret to update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you update the secret value more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. If you include SecretString or SecretBinary to create a new secret version, Secrets Manager automatically moves the staging label AWSCURRENT to the new version. Then it attaches the label AWSPREVIOUS to the version that AWSCURRENT was removed from. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, the operation results in an error. You can't modify an existing version, you can only create a new version. To remove a version, remove all staging labels from it. See UpdateSecretVersionStage. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:UpdateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. If you use a customer managed key, you must also have kms:GenerateDataKey and kms:Decrypt permissions on the key. For more information, see Secret encryption and decryption.
168
168
  */
169
169
  updateSecret(params: SecretsManager.Types.UpdateSecretRequest, callback?: (err: AWSError, data: SecretsManager.Types.UpdateSecretResponse) => void): Request<SecretsManager.Types.UpdateSecretResponse, AWSError>;
170
170
  /**
171
- * Modifies the details of a secret, including metadata and the secret value. To change the secret value, you can also use PutSecretValue. To change the rotation configuration of a secret, use RotateSecret instead. We recommend you avoid calling UpdateSecret at a sustained rate of more than once every 10 minutes. When you call UpdateSecret to update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you update the secret value more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. If you include SecretString or SecretBinary to create a new secret version, Secrets Manager automatically moves the staging label AWSCURRENT to the new version. Then it attaches the label AWSPREVIOUS to the version that AWSCURRENT was removed from. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, the operation results in an error. You can't modify an existing version, you can only create a new version. To remove a version, remove all staging labels from it. See UpdateSecretVersionStage. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:UpdateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. If you use a customer managed key, you must also have kms:GenerateDataKey and kms:Decrypt permissions on the key. For more information, see Secret encryption and decryption.
171
+ * Modifies the details of a secret, including metadata and the secret value. To change the secret value, you can also use PutSecretValue. To change the rotation configuration of a secret, use RotateSecret instead. To change a secret so that it is managed by another service, you need to recreate the secret in that service. See Secrets Manager secrets managed by other Amazon Web Services services. We recommend you avoid calling UpdateSecret at a sustained rate of more than once every 10 minutes. When you call UpdateSecret to update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you update the secret value more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. If you include SecretString or SecretBinary to create a new secret version, Secrets Manager automatically moves the staging label AWSCURRENT to the new version. Then it attaches the label AWSPREVIOUS to the version that AWSCURRENT was removed from. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, the operation results in an error. You can't modify an existing version, you can only create a new version. To remove a version, remove all staging labels from it. See UpdateSecretVersionStage. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:UpdateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. If you use a customer managed key, you must also have kms:GenerateDataKey and kms:Decrypt permissions on the key. For more information, see Secret encryption and decryption.
172
172
  */
173
173
  updateSecret(callback?: (err: AWSError, data: SecretsManager.Types.UpdateSecretResponse) => void): Request<SecretsManager.Types.UpdateSecretResponse, AWSError>;
174
174
  /**
@@ -766,7 +766,7 @@ declare namespace SecretsManager {
766
766
  */
767
767
  ClientRequestToken?: ClientRequestTokenType;
768
768
  /**
769
- * The ARN of the Lambda rotation function that can rotate the secret.
769
+ * For secrets that use a Lambda rotation function to rotate, the ARN of the Lambda rotation function. For secrets that use managed rotation, omit this field. For more information, see Managed rotation in the Secrets Manager User Guide.
770
770
  */
771
771
  RotationLambdaARN?: RotationLambdaARNType;
772
772
  /**
@@ -774,7 +774,7 @@ declare namespace SecretsManager {
774
774
  */
775
775
  RotationRules?: RotationRulesType;
776
776
  /**
777
- * Specifies whether to rotate the secret immediately or wait until the next scheduled rotation window. The rotation schedule is defined in RotateSecretRequest$RotationRules. If you don't immediately rotate the secret, Secrets Manager tests the rotation configuration by running the testSecret step of the Lambda rotation function. The test creates an AWSPENDING version of the secret and then removes it. If you don't specify this value, then by default, Secrets Manager rotates the secret immediately.
777
+ * Specifies whether to rotate the secret immediately or wait until the next scheduled rotation window. The rotation schedule is defined in RotateSecretRequest$RotationRules. For secrets that use a Lambda rotation function to rotate, if you don't immediately rotate the secret, Secrets Manager tests the rotation configuration by running the testSecret step of the Lambda rotation function. The test creates an AWSPENDING version of the secret and then removes it. If you don't specify this value, then by default, Secrets Manager rotates the secret immediately.
778
778
  */
779
779
  RotateImmediately?: BooleanType;
780
780
  }
@@ -83,7 +83,7 @@ return /******/ (function(modules) { // webpackBootstrap
83
83
  /**
84
84
  * @constant
85
85
  */
86
- VERSION: '2.1280.0',
86
+ VERSION: '2.1282.0',
87
87
 
88
88
  /**
89
89
  * @api private