aws-cdk-lib 2.216.0__py3-none-any.whl → 2.217.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

Files changed (58) hide show
  1. aws_cdk/__init__.py +60 -28
  2. aws_cdk/_jsii/__init__.py +1 -1
  3. aws_cdk/_jsii/{aws-cdk-lib@2.216.0.jsii.tgz → aws-cdk-lib@2.217.0.jsii.tgz} +0 -0
  4. aws_cdk/aws_acmpca/__init__.py +1 -1
  5. aws_cdk/aws_amplify/__init__.py +8 -8
  6. aws_cdk/aws_apigateway/__init__.py +26 -6
  7. aws_cdk/aws_apigatewayv2/__init__.py +2 -2
  8. aws_cdk/aws_appmesh/__init__.py +12 -12
  9. aws_cdk/aws_appstream/__init__.py +14 -4
  10. aws_cdk/aws_appsync/__init__.py +3 -3
  11. aws_cdk/aws_aps/__init__.py +459 -0
  12. aws_cdk/aws_batch/__init__.py +6 -2
  13. aws_cdk/aws_bedrock/__init__.py +132 -0
  14. aws_cdk/aws_bedrockagentcore/__init__.py +3178 -0
  15. aws_cdk/aws_certificatemanager/__init__.py +9 -10
  16. aws_cdk/aws_cleanrooms/__init__.py +163 -0
  17. aws_cdk/aws_cloudformation/__init__.py +14 -14
  18. aws_cdk/aws_cloudfront/__init__.py +12 -8
  19. aws_cdk/aws_cognito/__init__.py +2 -2
  20. aws_cdk/aws_connect/__init__.py +138 -10
  21. aws_cdk/aws_cur/__init__.py +57 -3
  22. aws_cdk/aws_datasync/__init__.py +351 -0
  23. aws_cdk/aws_datazone/__init__.py +675 -2
  24. aws_cdk/aws_dynamodb/__init__.py +123 -0
  25. aws_cdk/aws_ec2/__init__.py +55 -10
  26. aws_cdk/aws_ecs/__init__.py +55 -12
  27. aws_cdk/aws_elasticloadbalancingv2/__init__.py +48 -0
  28. aws_cdk/aws_elasticsearch/__init__.py +2 -2
  29. aws_cdk/aws_evs/__init__.py +58 -4
  30. aws_cdk/aws_gamelift/__init__.py +72 -56
  31. aws_cdk/aws_iam/__init__.py +1 -1
  32. aws_cdk/aws_iotcoredeviceadvisor/__init__.py +35 -38
  33. aws_cdk/aws_iotsitewise/__init__.py +75 -111
  34. aws_cdk/aws_kms/__init__.py +10 -2
  35. aws_cdk/aws_lambda/__init__.py +46 -0
  36. aws_cdk/aws_medialive/__init__.py +127 -0
  37. aws_cdk/aws_mediapackage/__init__.py +2 -2
  38. aws_cdk/aws_networkfirewall/__init__.py +10 -10
  39. aws_cdk/aws_networkmanager/__init__.py +63 -0
  40. aws_cdk/aws_odb/__init__.py +2082 -195
  41. aws_cdk/aws_omics/__init__.py +1414 -171
  42. aws_cdk/aws_opensearchserverless/__init__.py +164 -21
  43. aws_cdk/aws_opensearchservice/__init__.py +5 -4
  44. aws_cdk/aws_pcs/__init__.py +9 -9
  45. aws_cdk/aws_quicksight/__init__.py +295 -3
  46. aws_cdk/aws_rds/__init__.py +338 -58
  47. aws_cdk/aws_sagemaker/__init__.py +251 -1
  48. aws_cdk/aws_servicecatalog/__init__.py +162 -154
  49. aws_cdk/aws_smsvoice/__init__.py +5218 -0
  50. aws_cdk/aws_transfer/__init__.py +13 -12
  51. aws_cdk/aws_verifiedpermissions/__init__.py +1 -1
  52. aws_cdk/aws_workspacesinstances/__init__.py +641 -2
  53. {aws_cdk_lib-2.216.0.dist-info → aws_cdk_lib-2.217.0.dist-info}/METADATA +1 -1
  54. {aws_cdk_lib-2.216.0.dist-info → aws_cdk_lib-2.217.0.dist-info}/RECORD +58 -56
  55. {aws_cdk_lib-2.216.0.dist-info → aws_cdk_lib-2.217.0.dist-info}/LICENSE +0 -0
  56. {aws_cdk_lib-2.216.0.dist-info → aws_cdk_lib-2.217.0.dist-info}/NOTICE +0 -0
  57. {aws_cdk_lib-2.216.0.dist-info → aws_cdk_lib-2.217.0.dist-info}/WHEEL +0 -0
  58. {aws_cdk_lib-2.216.0.dist-info → aws_cdk_lib-2.217.0.dist-info}/top_level.txt +0 -0
@@ -5272,6 +5272,7 @@ class CfnDBClusterParameterGroupProps:
5272
5272
  "iops": "iops",
5273
5273
  "kms_key_id": "kmsKeyId",
5274
5274
  "manage_master_user_password": "manageMasterUserPassword",
5275
+ "master_user_authentication_type": "masterUserAuthenticationType",
5275
5276
  "master_username": "masterUsername",
5276
5277
  "master_user_password": "masterUserPassword",
5277
5278
  "master_user_secret": "masterUserSecret",
@@ -5338,6 +5339,7 @@ class CfnDBClusterProps:
5338
5339
  iops: typing.Optional[jsii.Number] = None,
5339
5340
  kms_key_id: typing.Optional[builtins.str] = None,
5340
5341
  manage_master_user_password: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
5342
+ master_user_authentication_type: typing.Optional[builtins.str] = None,
5341
5343
  master_username: typing.Optional[builtins.str] = None,
5342
5344
  master_user_password: typing.Optional[builtins.str] = None,
5343
5345
  master_user_secret: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnDBCluster.MasterUserSecretProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
@@ -5401,6 +5403,7 @@ class CfnDBClusterProps:
5401
5403
  :param iops: The amount of Provisioned IOPS (input/output operations per second) to be initially allocated for each DB instance in the Multi-AZ DB cluster. For information about valid IOPS values, see `Provisioned IOPS storage <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Storage.html#USER_PIOPS>`_ in the *Amazon RDS User Guide* . This setting is required to create a Multi-AZ DB cluster. Valid for Cluster Type: Multi-AZ DB clusters only Constraints: - Must be a multiple between .5 and 50 of the storage amount for the DB cluster.
5402
5404
  :param kms_key_id: The Amazon Resource Name (ARN) of the AWS KMS key that is used to encrypt the database instances in the DB cluster, such as ``arn:aws:kms:us-east-1:012345678910:key/abcd1234-a123-456a-a12b-a123b4cd56ef`` . If you enable the ``StorageEncrypted`` property but don't specify this property, the default KMS key is used. If you specify this property, you must set the ``StorageEncrypted`` property to ``true`` . If you specify the ``SnapshotIdentifier`` property, the ``StorageEncrypted`` property value is inherited from the snapshot, and if the DB cluster is encrypted, the specified ``KmsKeyId`` property is used. If you create a read replica of an encrypted DB cluster in another AWS Region, make sure to set ``KmsKeyId`` to a KMS key identifier that is valid in the destination AWS Region. This KMS key is used to encrypt the read replica in that AWS Region. Valid for: Aurora DB clusters and Multi-AZ DB clusters
5403
5405
  :param manage_master_user_password: Specifies whether to manage the master user password with AWS Secrets Manager. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide* and `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html>`_ in the *Amazon Aurora User Guide.* Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters Constraints: - Can't manage the master user password with AWS Secrets Manager if ``MasterUserPassword`` is specified.
5406
+ :param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB cluster. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters This option is only valid for RDS for PostgreSQL and Aurora PostgreSQL engines.
5404
5407
  :param master_username: The name of the master user for the DB cluster. .. epigraph:: If you specify the ``SourceDBClusterIdentifier`` , ``SnapshotIdentifier`` , or ``GlobalClusterIdentifier`` property, don't specify this property. The value is inherited from the source DB cluster, the snapshot, or the primary DB cluster for the global database cluster, respectively. Valid for: Aurora DB clusters and Multi-AZ DB clusters
5405
5408
  :param master_user_password: The master password for the DB instance. .. epigraph:: If you specify the ``SourceDBClusterIdentifier`` , ``SnapshotIdentifier`` , or ``GlobalClusterIdentifier`` property, don't specify this property. The value is inherited from the source DB cluster, the snapshot, or the primary DB cluster for the global database cluster, respectively. Valid for: Aurora DB clusters and Multi-AZ DB clusters
5406
5409
  :param master_user_secret: The secret managed by RDS in AWS Secrets Manager for the master user password. .. epigraph:: When you restore a DB cluster from a snapshot, Amazon RDS generates a new secret instead of reusing the secret specified in the ``SecretArn`` property. This ensures that the restored DB cluster is securely managed with a dedicated secret. To maintain consistent integration with your application, you might need to update resource configurations to reference the newly created secret. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide* and `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html>`_ in the *Amazon Aurora User Guide.*
@@ -5477,6 +5480,7 @@ class CfnDBClusterProps:
5477
5480
  iops=123,
5478
5481
  kms_key_id="kmsKeyId",
5479
5482
  manage_master_user_password=False,
5483
+ master_user_authentication_type="masterUserAuthenticationType",
5480
5484
  master_username="masterUsername",
5481
5485
  master_user_password="masterUserPassword",
5482
5486
  master_user_secret=rds.CfnDBCluster.MasterUserSecretProperty(
@@ -5558,6 +5562,7 @@ class CfnDBClusterProps:
5558
5562
  check_type(argname="argument iops", value=iops, expected_type=type_hints["iops"])
5559
5563
  check_type(argname="argument kms_key_id", value=kms_key_id, expected_type=type_hints["kms_key_id"])
5560
5564
  check_type(argname="argument manage_master_user_password", value=manage_master_user_password, expected_type=type_hints["manage_master_user_password"])
5565
+ check_type(argname="argument master_user_authentication_type", value=master_user_authentication_type, expected_type=type_hints["master_user_authentication_type"])
5561
5566
  check_type(argname="argument master_username", value=master_username, expected_type=type_hints["master_username"])
5562
5567
  check_type(argname="argument master_user_password", value=master_user_password, expected_type=type_hints["master_user_password"])
5563
5568
  check_type(argname="argument master_user_secret", value=master_user_secret, expected_type=type_hints["master_user_secret"])
@@ -5652,6 +5657,8 @@ class CfnDBClusterProps:
5652
5657
  self._values["kms_key_id"] = kms_key_id
5653
5658
  if manage_master_user_password is not None:
5654
5659
  self._values["manage_master_user_password"] = manage_master_user_password
5660
+ if master_user_authentication_type is not None:
5661
+ self._values["master_user_authentication_type"] = master_user_authentication_type
5655
5662
  if master_username is not None:
5656
5663
  self._values["master_username"] = master_username
5657
5664
  if master_user_password is not None:
@@ -6277,6 +6284,26 @@ class CfnDBClusterProps:
6277
6284
  result = self._values.get("manage_master_user_password")
6278
6285
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
6279
6286
 
6287
+ @builtins.property
6288
+ def master_user_authentication_type(self) -> typing.Optional[builtins.str]:
6289
+ '''Specifies the authentication type for the master user.
6290
+
6291
+ With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB cluster.
6292
+
6293
+ You can specify one of the following values:
6294
+
6295
+ - ``password`` - Use standard database authentication with a password.
6296
+ - ``iam-db-auth`` - Use IAM database authentication for the master user.
6297
+
6298
+ Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters
6299
+
6300
+ This option is only valid for RDS for PostgreSQL and Aurora PostgreSQL engines.
6301
+
6302
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbcluster.html#cfn-rds-dbcluster-masteruserauthenticationtype
6303
+ '''
6304
+ result = self._values.get("master_user_authentication_type")
6305
+ return typing.cast(typing.Optional[builtins.str], result)
6306
+
6280
6307
  @builtins.property
6281
6308
  def master_username(self) -> typing.Optional[builtins.str]:
6282
6309
  '''The name of the master user for the DB cluster.
@@ -6825,6 +6852,7 @@ class CfnDBClusterProps:
6825
6852
  "kms_key_id": "kmsKeyId",
6826
6853
  "license_model": "licenseModel",
6827
6854
  "manage_master_user_password": "manageMasterUserPassword",
6855
+ "master_user_authentication_type": "masterUserAuthenticationType",
6828
6856
  "master_username": "masterUsername",
6829
6857
  "master_user_password": "masterUserPassword",
6830
6858
  "master_user_secret": "masterUserSecret",
@@ -6912,6 +6940,7 @@ class CfnDBInstanceProps:
6912
6940
  kms_key_id: typing.Optional[builtins.str] = None,
6913
6941
  license_model: typing.Optional[builtins.str] = None,
6914
6942
  manage_master_user_password: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
6943
+ master_user_authentication_type: typing.Optional[builtins.str] = None,
6915
6944
  master_username: typing.Optional[builtins.str] = None,
6916
6945
  master_user_password: typing.Optional[builtins.str] = None,
6917
6946
  master_user_secret: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnDBInstance.MasterUserSecretProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
@@ -6996,6 +7025,7 @@ class CfnDBInstanceProps:
6996
7025
  :param kms_key_id: The ARN of the AWS KMS key that's used to encrypt the DB instance, such as ``arn:aws:kms:us-east-1:012345678910:key/abcd1234-a123-456a-a12b-a123b4cd56ef`` . If you enable the StorageEncrypted property but don't specify this property, AWS CloudFormation uses the default KMS key. If you specify this property, you must set the StorageEncrypted property to true. If you specify the ``SourceDBInstanceIdentifier`` or ``SourceDbiResourceId`` property, don't specify this property. The value is inherited from the source DB instance, and if the DB instance is encrypted, the specified ``KmsKeyId`` property is used. However, if the source DB instance is in a different AWS Region, you must specify a KMS key ID. If you specify the ``SourceDBInstanceAutomatedBackupsArn`` property, don't specify this property. The value is inherited from the source DB instance automated backup, and if the automated backup is encrypted, the specified ``KmsKeyId`` property is used. If you create an encrypted read replica in a different AWS Region, then you must specify a KMS key for the destination AWS Region. KMS encryption keys are specific to the region that they're created in, and you can't use encryption keys from one region in another region. If you specify the ``DBSnapshotIdentifier`` property, don't specify this property. The ``StorageEncrypted`` property value is inherited from the snapshot. If the DB instance is encrypted, the specified ``KmsKeyId`` property is also inherited from the snapshot. If you specify ``DBSecurityGroups`` , AWS CloudFormation ignores this property. To specify both a security group and this property, you must use a VPC security group. For more information about Amazon RDS and VPC, see `Using Amazon RDS with Amazon VPC <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_VPC.html>`_ in the *Amazon RDS User Guide* . *Amazon Aurora* Not applicable. The KMS key identifier is managed by the DB cluster.
6997
7026
  :param license_model: License model information for this DB instance. Valid Values: - Aurora MySQL - ``general-public-license`` - Aurora PostgreSQL - ``postgresql-license`` - RDS for Db2 - ``bring-your-own-license`` . For more information about RDS for Db2 licensing, see ` <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/db2-licensing.html>`_ in the *Amazon RDS User Guide.* - RDS for MariaDB - ``general-public-license`` - RDS for Microsoft SQL Server - ``license-included`` - RDS for MySQL - ``general-public-license`` - RDS for Oracle - ``bring-your-own-license`` or ``license-included`` - RDS for PostgreSQL - ``postgresql-license`` .. epigraph:: If you've specified ``DBSecurityGroups`` and then you update the license model, AWS CloudFormation replaces the underlying DB instance. This will incur some interruptions to database availability.
6998
7027
  :param manage_master_user_password: Specifies whether to manage the master user password with AWS Secrets Manager. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide.* Constraints: - Can't manage the master user password with AWS Secrets Manager if ``MasterUserPassword`` is specified.
7028
+ :param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB instance. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. This option is only valid for RDS for PostgreSQL and Aurora PostgreSQL engines.
6999
7029
  :param master_username: The master user name for the DB instance. .. epigraph:: If you specify the ``SourceDBInstanceIdentifier`` or ``DBSnapshotIdentifier`` property, don't specify this property. The value is inherited from the source DB instance or snapshot. When migrating a self-managed Db2 database, we recommend that you use the same master username as your self-managed Db2 instance name. *Amazon Aurora* Not applicable. The name for the master user is managed by the DB cluster. *RDS for Db2* Constraints: - Must be 1 to 16 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for MariaDB* Constraints: - Must be 1 to 16 letters or numbers. - Can't be a reserved word for the chosen database engine. *RDS for Microsoft SQL Server* Constraints: - Must be 1 to 128 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for MySQL* Constraints: - Must be 1 to 16 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for Oracle* Constraints: - Must be 1 to 30 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for PostgreSQL* Constraints: - Must be 1 to 63 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine.
7000
7030
  :param master_user_password: The password for the master user. The password can include any printable ASCII character except "/", """, or "@". *Amazon Aurora* Not applicable. The password for the master user is managed by the DB cluster. *RDS for Db2* Must contain from 8 to 255 characters. *RDS for MariaDB* Constraints: Must contain from 8 to 41 characters. *RDS for Microsoft SQL Server* Constraints: Must contain from 8 to 128 characters. *RDS for MySQL* Constraints: Must contain from 8 to 41 characters. *RDS for Oracle* Constraints: Must contain from 8 to 30 characters. *RDS for PostgreSQL* Constraints: Must contain from 8 to 128 characters.
7001
7031
  :param master_user_secret: The secret managed by RDS in AWS Secrets Manager for the master user password. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide.*
@@ -7091,6 +7121,7 @@ class CfnDBInstanceProps:
7091
7121
  kms_key_id="kmsKeyId",
7092
7122
  license_model="licenseModel",
7093
7123
  manage_master_user_password=False,
7124
+ master_user_authentication_type="masterUserAuthenticationType",
7094
7125
  master_username="masterUsername",
7095
7126
  master_user_password="masterUserPassword",
7096
7127
  master_user_secret=rds.CfnDBInstance.MasterUserSecretProperty(
@@ -7185,6 +7216,7 @@ class CfnDBInstanceProps:
7185
7216
  check_type(argname="argument kms_key_id", value=kms_key_id, expected_type=type_hints["kms_key_id"])
7186
7217
  check_type(argname="argument license_model", value=license_model, expected_type=type_hints["license_model"])
7187
7218
  check_type(argname="argument manage_master_user_password", value=manage_master_user_password, expected_type=type_hints["manage_master_user_password"])
7219
+ check_type(argname="argument master_user_authentication_type", value=master_user_authentication_type, expected_type=type_hints["master_user_authentication_type"])
7188
7220
  check_type(argname="argument master_username", value=master_username, expected_type=type_hints["master_username"])
7189
7221
  check_type(argname="argument master_user_password", value=master_user_password, expected_type=type_hints["master_user_password"])
7190
7222
  check_type(argname="argument master_user_secret", value=master_user_secret, expected_type=type_hints["master_user_secret"])
@@ -7313,6 +7345,8 @@ class CfnDBInstanceProps:
7313
7345
  self._values["license_model"] = license_model
7314
7346
  if manage_master_user_password is not None:
7315
7347
  self._values["manage_master_user_password"] = manage_master_user_password
7348
+ if master_user_authentication_type is not None:
7349
+ self._values["master_user_authentication_type"] = master_user_authentication_type
7316
7350
  if master_username is not None:
7317
7351
  self._values["master_username"] = master_username
7318
7352
  if master_user_password is not None:
@@ -8340,6 +8374,24 @@ class CfnDBInstanceProps:
8340
8374
  result = self._values.get("manage_master_user_password")
8341
8375
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
8342
8376
 
8377
+ @builtins.property
8378
+ def master_user_authentication_type(self) -> typing.Optional[builtins.str]:
8379
+ '''Specifies the authentication type for the master user.
8380
+
8381
+ With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB instance.
8382
+
8383
+ You can specify one of the following values:
8384
+
8385
+ - ``password`` - Use standard database authentication with a password.
8386
+ - ``iam-db-auth`` - Use IAM database authentication for the master user.
8387
+
8388
+ This option is only valid for RDS for PostgreSQL and Aurora PostgreSQL engines.
8389
+
8390
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbinstance.html#cfn-rds-dbinstance-masteruserauthenticationtype
8391
+ '''
8392
+ result = self._values.get("master_user_authentication_type")
8393
+ return typing.cast(typing.Optional[builtins.str], result)
8394
+
8343
8395
  @builtins.property
8344
8396
  def master_username(self) -> typing.Optional[builtins.str]:
8345
8397
  '''The master user name for the DB instance.
@@ -9168,6 +9220,7 @@ class CfnDBParameterGroupProps:
9168
9220
  "db_proxy_endpoint_name": "dbProxyEndpointName",
9169
9221
  "db_proxy_name": "dbProxyName",
9170
9222
  "vpc_subnet_ids": "vpcSubnetIds",
9223
+ "endpoint_network_type": "endpointNetworkType",
9171
9224
  "tags": "tags",
9172
9225
  "target_role": "targetRole",
9173
9226
  "vpc_security_group_ids": "vpcSecurityGroupIds",
@@ -9180,6 +9233,7 @@ class CfnDBProxyEndpointProps:
9180
9233
  db_proxy_endpoint_name: builtins.str,
9181
9234
  db_proxy_name: builtins.str,
9182
9235
  vpc_subnet_ids: typing.Sequence[builtins.str],
9236
+ endpoint_network_type: typing.Optional[builtins.str] = None,
9183
9237
  tags: typing.Optional[typing.Sequence[typing.Union["CfnDBProxyEndpoint.TagFormatProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
9184
9238
  target_role: typing.Optional[builtins.str] = None,
9185
9239
  vpc_security_group_ids: typing.Optional[typing.Sequence[builtins.str]] = None,
@@ -9189,6 +9243,7 @@ class CfnDBProxyEndpointProps:
9189
9243
  :param db_proxy_endpoint_name: The name of the DB proxy endpoint to create.
9190
9244
  :param db_proxy_name: The name of the DB proxy associated with the DB proxy endpoint that you create.
9191
9245
  :param vpc_subnet_ids: The VPC subnet IDs for the DB proxy endpoint that you create. You can specify a different set of subnet IDs than for the original DB proxy.
9246
+ :param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports.
9192
9247
  :param tags: An optional set of key-value pairs to associate arbitrary data of your choosing with the proxy.
9193
9248
  :param target_role: A value that indicates whether the DB proxy endpoint can be used for read/write or read-only operations.
9194
9249
  :param vpc_security_group_ids: The VPC security group IDs for the DB proxy endpoint that you create. You can specify a different set of security group IDs than for the original DB proxy. The default is the default security group for the VPC.
@@ -9208,6 +9263,7 @@ class CfnDBProxyEndpointProps:
9208
9263
  vpc_subnet_ids=["vpcSubnetIds"],
9209
9264
 
9210
9265
  # the properties below are optional
9266
+ endpoint_network_type="endpointNetworkType",
9211
9267
  tags=[rds.CfnDBProxyEndpoint.TagFormatProperty(
9212
9268
  key="key",
9213
9269
  value="value"
@@ -9221,6 +9277,7 @@ class CfnDBProxyEndpointProps:
9221
9277
  check_type(argname="argument db_proxy_endpoint_name", value=db_proxy_endpoint_name, expected_type=type_hints["db_proxy_endpoint_name"])
9222
9278
  check_type(argname="argument db_proxy_name", value=db_proxy_name, expected_type=type_hints["db_proxy_name"])
9223
9279
  check_type(argname="argument vpc_subnet_ids", value=vpc_subnet_ids, expected_type=type_hints["vpc_subnet_ids"])
9280
+ check_type(argname="argument endpoint_network_type", value=endpoint_network_type, expected_type=type_hints["endpoint_network_type"])
9224
9281
  check_type(argname="argument tags", value=tags, expected_type=type_hints["tags"])
9225
9282
  check_type(argname="argument target_role", value=target_role, expected_type=type_hints["target_role"])
9226
9283
  check_type(argname="argument vpc_security_group_ids", value=vpc_security_group_ids, expected_type=type_hints["vpc_security_group_ids"])
@@ -9229,6 +9286,8 @@ class CfnDBProxyEndpointProps:
9229
9286
  "db_proxy_name": db_proxy_name,
9230
9287
  "vpc_subnet_ids": vpc_subnet_ids,
9231
9288
  }
9289
+ if endpoint_network_type is not None:
9290
+ self._values["endpoint_network_type"] = endpoint_network_type
9232
9291
  if tags is not None:
9233
9292
  self._values["tags"] = tags
9234
9293
  if target_role is not None:
@@ -9268,6 +9327,17 @@ class CfnDBProxyEndpointProps:
9268
9327
  assert result is not None, "Required property 'vpc_subnet_ids' is missing"
9269
9328
  return typing.cast(typing.List[builtins.str], result)
9270
9329
 
9330
+ @builtins.property
9331
+ def endpoint_network_type(self) -> typing.Optional[builtins.str]:
9332
+ '''The network type of the DB proxy endpoint.
9333
+
9334
+ The network type determines the IP version that the proxy endpoint supports.
9335
+
9336
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbproxyendpoint.html#cfn-rds-dbproxyendpoint-endpointnetworktype
9337
+ '''
9338
+ result = self._values.get("endpoint_network_type")
9339
+ return typing.cast(typing.Optional[builtins.str], result)
9340
+
9271
9341
  @builtins.property
9272
9342
  def tags(
9273
9343
  self,
@@ -9315,15 +9385,18 @@ class CfnDBProxyEndpointProps:
9315
9385
  jsii_type="aws-cdk-lib.aws_rds.CfnDBProxyProps",
9316
9386
  jsii_struct_bases=[],
9317
9387
  name_mapping={
9318
- "auth": "auth",
9319
9388
  "db_proxy_name": "dbProxyName",
9320
9389
  "engine_family": "engineFamily",
9321
9390
  "role_arn": "roleArn",
9322
9391
  "vpc_subnet_ids": "vpcSubnetIds",
9392
+ "auth": "auth",
9323
9393
  "debug_logging": "debugLogging",
9394
+ "default_auth_scheme": "defaultAuthScheme",
9395
+ "endpoint_network_type": "endpointNetworkType",
9324
9396
  "idle_client_timeout": "idleClientTimeout",
9325
9397
  "require_tls": "requireTls",
9326
9398
  "tags": "tags",
9399
+ "target_connection_network_type": "targetConnectionNetworkType",
9327
9400
  "vpc_security_group_ids": "vpcSecurityGroupIds",
9328
9401
  },
9329
9402
  )
@@ -9331,28 +9404,34 @@ class CfnDBProxyProps:
9331
9404
  def __init__(
9332
9405
  self,
9333
9406
  *,
9334
- auth: typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnDBProxy.AuthFormatProperty", typing.Dict[builtins.str, typing.Any]]]]],
9335
9407
  db_proxy_name: builtins.str,
9336
9408
  engine_family: builtins.str,
9337
9409
  role_arn: builtins.str,
9338
9410
  vpc_subnet_ids: typing.Sequence[builtins.str],
9411
+ auth: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnDBProxy.AuthFormatProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
9339
9412
  debug_logging: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
9413
+ default_auth_scheme: typing.Optional[builtins.str] = None,
9414
+ endpoint_network_type: typing.Optional[builtins.str] = None,
9340
9415
  idle_client_timeout: typing.Optional[jsii.Number] = None,
9341
9416
  require_tls: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
9342
9417
  tags: typing.Optional[typing.Sequence[typing.Union["CfnDBProxy.TagFormatProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
9418
+ target_connection_network_type: typing.Optional[builtins.str] = None,
9343
9419
  vpc_security_group_ids: typing.Optional[typing.Sequence[builtins.str]] = None,
9344
9420
  ) -> None:
9345
9421
  '''Properties for defining a ``CfnDBProxy``.
9346
9422
 
9347
- :param auth: The authorization mechanism that the proxy uses.
9348
9423
  :param db_proxy_name: The identifier for the proxy. This name must be unique for all proxies owned by your AWS account in the specified AWS Region . An identifier must begin with a letter and must contain only ASCII letters, digits, and hyphens; it can't end with a hyphen or contain two consecutive hyphens.
9349
9424
  :param engine_family: The kinds of databases that the proxy can connect to. This value determines which database network protocol the proxy recognizes when it interprets network traffic to and from the database. For Aurora MySQL, RDS for MariaDB, and RDS for MySQL databases, specify ``MYSQL`` . For Aurora PostgreSQL and RDS for PostgreSQL databases, specify ``POSTGRESQL`` . For RDS for Microsoft SQL Server, specify ``SQLSERVER`` .
9350
9425
  :param role_arn: The Amazon Resource Name (ARN) of the IAM role that the proxy uses to access secrets in AWS Secrets Manager.
9351
9426
  :param vpc_subnet_ids: One or more VPC subnet IDs to associate with the new proxy.
9427
+ :param auth: The authorization mechanism that the proxy uses.
9352
9428
  :param debug_logging: Specifies whether the proxy logs detailed connection and query information. When you enable ``DebugLogging`` , the proxy captures connection details and connection pool behavior from your queries. Debug logging increases CloudWatch costs and can impact proxy performance. Enable this option only when you need to troubleshoot connection or performance issues.
9429
+ :param default_auth_scheme: The default authentication scheme that the proxy uses for client connections to the proxy and connections from the proxy to the underlying database.
9430
+ :param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports.
9353
9431
  :param idle_client_timeout: The number of seconds that a connection to the proxy can be inactive before the proxy disconnects it. You can set this value higher or lower than the connection timeout limit for the associated database.
9354
9432
  :param require_tls: Specifies whether Transport Layer Security (TLS) encryption is required for connections to the proxy. By enabling this setting, you can enforce encrypted TLS connections to the proxy.
9355
9433
  :param tags: An optional set of key-value pairs to associate arbitrary data of your choosing with the proxy.
9434
+ :param target_connection_network_type: The network type that the proxy uses to connect to the target database. The network type determines the IP version that the proxy uses for connections to the database.
9356
9435
  :param vpc_security_group_ids: One or more VPC security group IDs to associate with the new proxy. If you plan to update the resource, don't specify VPC security groups in a shared VPC.
9357
9436
 
9358
9437
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbproxy.html
@@ -9365,6 +9444,12 @@ class CfnDBProxyProps:
9365
9444
  from aws_cdk import aws_rds as rds
9366
9445
 
9367
9446
  cfn_dBProxy_props = rds.CfnDBProxyProps(
9447
+ db_proxy_name="dbProxyName",
9448
+ engine_family="engineFamily",
9449
+ role_arn="roleArn",
9450
+ vpc_subnet_ids=["vpcSubnetIds"],
9451
+
9452
+ # the properties below are optional
9368
9453
  auth=[rds.CfnDBProxy.AuthFormatProperty(
9369
9454
  auth_scheme="authScheme",
9370
9455
  client_password_auth_type="clientPasswordAuthType",
@@ -9372,64 +9457,59 @@ class CfnDBProxyProps:
9372
9457
  iam_auth="iamAuth",
9373
9458
  secret_arn="secretArn"
9374
9459
  )],
9375
- db_proxy_name="dbProxyName",
9376
- engine_family="engineFamily",
9377
- role_arn="roleArn",
9378
- vpc_subnet_ids=["vpcSubnetIds"],
9379
-
9380
- # the properties below are optional
9381
9460
  debug_logging=False,
9461
+ default_auth_scheme="defaultAuthScheme",
9462
+ endpoint_network_type="endpointNetworkType",
9382
9463
  idle_client_timeout=123,
9383
9464
  require_tls=False,
9384
9465
  tags=[rds.CfnDBProxy.TagFormatProperty(
9385
9466
  key="key",
9386
9467
  value="value"
9387
9468
  )],
9469
+ target_connection_network_type="targetConnectionNetworkType",
9388
9470
  vpc_security_group_ids=["vpcSecurityGroupIds"]
9389
9471
  )
9390
9472
  '''
9391
9473
  if __debug__:
9392
9474
  type_hints = typing.get_type_hints(_typecheckingstub__331ec6568969c058d2fc6c0482e8c31b8cc3af661d01d569ed27059f5a683e34)
9393
- check_type(argname="argument auth", value=auth, expected_type=type_hints["auth"])
9394
9475
  check_type(argname="argument db_proxy_name", value=db_proxy_name, expected_type=type_hints["db_proxy_name"])
9395
9476
  check_type(argname="argument engine_family", value=engine_family, expected_type=type_hints["engine_family"])
9396
9477
  check_type(argname="argument role_arn", value=role_arn, expected_type=type_hints["role_arn"])
9397
9478
  check_type(argname="argument vpc_subnet_ids", value=vpc_subnet_ids, expected_type=type_hints["vpc_subnet_ids"])
9479
+ check_type(argname="argument auth", value=auth, expected_type=type_hints["auth"])
9398
9480
  check_type(argname="argument debug_logging", value=debug_logging, expected_type=type_hints["debug_logging"])
9481
+ check_type(argname="argument default_auth_scheme", value=default_auth_scheme, expected_type=type_hints["default_auth_scheme"])
9482
+ check_type(argname="argument endpoint_network_type", value=endpoint_network_type, expected_type=type_hints["endpoint_network_type"])
9399
9483
  check_type(argname="argument idle_client_timeout", value=idle_client_timeout, expected_type=type_hints["idle_client_timeout"])
9400
9484
  check_type(argname="argument require_tls", value=require_tls, expected_type=type_hints["require_tls"])
9401
9485
  check_type(argname="argument tags", value=tags, expected_type=type_hints["tags"])
9486
+ check_type(argname="argument target_connection_network_type", value=target_connection_network_type, expected_type=type_hints["target_connection_network_type"])
9402
9487
  check_type(argname="argument vpc_security_group_ids", value=vpc_security_group_ids, expected_type=type_hints["vpc_security_group_ids"])
9403
9488
  self._values: typing.Dict[builtins.str, typing.Any] = {
9404
- "auth": auth,
9405
9489
  "db_proxy_name": db_proxy_name,
9406
9490
  "engine_family": engine_family,
9407
9491
  "role_arn": role_arn,
9408
9492
  "vpc_subnet_ids": vpc_subnet_ids,
9409
9493
  }
9494
+ if auth is not None:
9495
+ self._values["auth"] = auth
9410
9496
  if debug_logging is not None:
9411
9497
  self._values["debug_logging"] = debug_logging
9498
+ if default_auth_scheme is not None:
9499
+ self._values["default_auth_scheme"] = default_auth_scheme
9500
+ if endpoint_network_type is not None:
9501
+ self._values["endpoint_network_type"] = endpoint_network_type
9412
9502
  if idle_client_timeout is not None:
9413
9503
  self._values["idle_client_timeout"] = idle_client_timeout
9414
9504
  if require_tls is not None:
9415
9505
  self._values["require_tls"] = require_tls
9416
9506
  if tags is not None:
9417
9507
  self._values["tags"] = tags
9508
+ if target_connection_network_type is not None:
9509
+ self._values["target_connection_network_type"] = target_connection_network_type
9418
9510
  if vpc_security_group_ids is not None:
9419
9511
  self._values["vpc_security_group_ids"] = vpc_security_group_ids
9420
9512
 
9421
- @builtins.property
9422
- def auth(
9423
- self,
9424
- ) -> typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnDBProxy.AuthFormatProperty"]]]:
9425
- '''The authorization mechanism that the proxy uses.
9426
-
9427
- :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbproxy.html#cfn-rds-dbproxy-auth
9428
- '''
9429
- result = self._values.get("auth")
9430
- assert result is not None, "Required property 'auth' is missing"
9431
- return typing.cast(typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnDBProxy.AuthFormatProperty"]]], result)
9432
-
9433
9513
  @builtins.property
9434
9514
  def db_proxy_name(self) -> builtins.str:
9435
9515
  '''The identifier for the proxy.
@@ -9474,6 +9554,17 @@ class CfnDBProxyProps:
9474
9554
  assert result is not None, "Required property 'vpc_subnet_ids' is missing"
9475
9555
  return typing.cast(typing.List[builtins.str], result)
9476
9556
 
9557
+ @builtins.property
9558
+ def auth(
9559
+ self,
9560
+ ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnDBProxy.AuthFormatProperty"]]]]:
9561
+ '''The authorization mechanism that the proxy uses.
9562
+
9563
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbproxy.html#cfn-rds-dbproxy-auth
9564
+ '''
9565
+ result = self._values.get("auth")
9566
+ return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnDBProxy.AuthFormatProperty"]]]], result)
9567
+
9477
9568
  @builtins.property
9478
9569
  def debug_logging(
9479
9570
  self,
@@ -9487,6 +9578,26 @@ class CfnDBProxyProps:
9487
9578
  result = self._values.get("debug_logging")
9488
9579
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
9489
9580
 
9581
+ @builtins.property
9582
+ def default_auth_scheme(self) -> typing.Optional[builtins.str]:
9583
+ '''The default authentication scheme that the proxy uses for client connections to the proxy and connections from the proxy to the underlying database.
9584
+
9585
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbproxy.html#cfn-rds-dbproxy-defaultauthscheme
9586
+ '''
9587
+ result = self._values.get("default_auth_scheme")
9588
+ return typing.cast(typing.Optional[builtins.str], result)
9589
+
9590
+ @builtins.property
9591
+ def endpoint_network_type(self) -> typing.Optional[builtins.str]:
9592
+ '''The network type of the DB proxy endpoint.
9593
+
9594
+ The network type determines the IP version that the proxy endpoint supports.
9595
+
9596
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbproxy.html#cfn-rds-dbproxy-endpointnetworktype
9597
+ '''
9598
+ result = self._values.get("endpoint_network_type")
9599
+ return typing.cast(typing.Optional[builtins.str], result)
9600
+
9490
9601
  @builtins.property
9491
9602
  def idle_client_timeout(self) -> typing.Optional[jsii.Number]:
9492
9603
  '''The number of seconds that a connection to the proxy can be inactive before the proxy disconnects it.
@@ -9520,6 +9631,17 @@ class CfnDBProxyProps:
9520
9631
  result = self._values.get("tags")
9521
9632
  return typing.cast(typing.Optional[typing.List["CfnDBProxy.TagFormatProperty"]], result)
9522
9633
 
9634
+ @builtins.property
9635
+ def target_connection_network_type(self) -> typing.Optional[builtins.str]:
9636
+ '''The network type that the proxy uses to connect to the target database.
9637
+
9638
+ The network type determines the IP version that the proxy uses for connections to the database.
9639
+
9640
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbproxy.html#cfn-rds-dbproxy-targetconnectionnetworktype
9641
+ '''
9642
+ result = self._values.get("target_connection_network_type")
9643
+ return typing.cast(typing.Optional[builtins.str], result)
9644
+
9523
9645
  @builtins.property
9524
9646
  def vpc_security_group_ids(self) -> typing.Optional[typing.List[builtins.str]]:
9525
9647
  '''One or more VPC security group IDs to associate with the new proxy.
@@ -36683,6 +36805,7 @@ class CfnDBCluster(
36683
36805
  iops=123,
36684
36806
  kms_key_id="kmsKeyId",
36685
36807
  manage_master_user_password=False,
36808
+ master_user_authentication_type="masterUserAuthenticationType",
36686
36809
  master_username="masterUsername",
36687
36810
  master_user_password="masterUserPassword",
36688
36811
  master_user_secret=rds.CfnDBCluster.MasterUserSecretProperty(
@@ -36768,6 +36891,7 @@ class CfnDBCluster(
36768
36891
  iops: typing.Optional[jsii.Number] = None,
36769
36892
  kms_key_id: typing.Optional[builtins.str] = None,
36770
36893
  manage_master_user_password: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
36894
+ master_user_authentication_type: typing.Optional[builtins.str] = None,
36771
36895
  master_username: typing.Optional[builtins.str] = None,
36772
36896
  master_user_password: typing.Optional[builtins.str] = None,
36773
36897
  master_user_secret: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnDBCluster.MasterUserSecretProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
@@ -36832,6 +36956,7 @@ class CfnDBCluster(
36832
36956
  :param iops: The amount of Provisioned IOPS (input/output operations per second) to be initially allocated for each DB instance in the Multi-AZ DB cluster. For information about valid IOPS values, see `Provisioned IOPS storage <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Storage.html#USER_PIOPS>`_ in the *Amazon RDS User Guide* . This setting is required to create a Multi-AZ DB cluster. Valid for Cluster Type: Multi-AZ DB clusters only Constraints: - Must be a multiple between .5 and 50 of the storage amount for the DB cluster.
36833
36957
  :param kms_key_id: The Amazon Resource Name (ARN) of the AWS KMS key that is used to encrypt the database instances in the DB cluster, such as ``arn:aws:kms:us-east-1:012345678910:key/abcd1234-a123-456a-a12b-a123b4cd56ef`` . If you enable the ``StorageEncrypted`` property but don't specify this property, the default KMS key is used. If you specify this property, you must set the ``StorageEncrypted`` property to ``true`` . If you specify the ``SnapshotIdentifier`` property, the ``StorageEncrypted`` property value is inherited from the snapshot, and if the DB cluster is encrypted, the specified ``KmsKeyId`` property is used. If you create a read replica of an encrypted DB cluster in another AWS Region, make sure to set ``KmsKeyId`` to a KMS key identifier that is valid in the destination AWS Region. This KMS key is used to encrypt the read replica in that AWS Region. Valid for: Aurora DB clusters and Multi-AZ DB clusters
36834
36958
  :param manage_master_user_password: Specifies whether to manage the master user password with AWS Secrets Manager. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide* and `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html>`_ in the *Amazon Aurora User Guide.* Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters Constraints: - Can't manage the master user password with AWS Secrets Manager if ``MasterUserPassword`` is specified.
36959
+ :param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB cluster. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters This option is only valid for RDS for PostgreSQL and Aurora PostgreSQL engines.
36835
36960
  :param master_username: The name of the master user for the DB cluster. .. epigraph:: If you specify the ``SourceDBClusterIdentifier`` , ``SnapshotIdentifier`` , or ``GlobalClusterIdentifier`` property, don't specify this property. The value is inherited from the source DB cluster, the snapshot, or the primary DB cluster for the global database cluster, respectively. Valid for: Aurora DB clusters and Multi-AZ DB clusters
36836
36961
  :param master_user_password: The master password for the DB instance. .. epigraph:: If you specify the ``SourceDBClusterIdentifier`` , ``SnapshotIdentifier`` , or ``GlobalClusterIdentifier`` property, don't specify this property. The value is inherited from the source DB cluster, the snapshot, or the primary DB cluster for the global database cluster, respectively. Valid for: Aurora DB clusters and Multi-AZ DB clusters
36837
36962
  :param master_user_secret: The secret managed by RDS in AWS Secrets Manager for the master user password. .. epigraph:: When you restore a DB cluster from a snapshot, Amazon RDS generates a new secret instead of reusing the secret specified in the ``SecretArn`` property. This ensures that the restored DB cluster is securely managed with a dedicated secret. To maintain consistent integration with your application, you might need to update resource configurations to reference the newly created secret. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide* and `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html>`_ in the *Amazon Aurora User Guide.*
@@ -36898,6 +37023,7 @@ class CfnDBCluster(
36898
37023
  iops=iops,
36899
37024
  kms_key_id=kms_key_id,
36900
37025
  manage_master_user_password=manage_master_user_password,
37026
+ master_user_authentication_type=master_user_authentication_type,
36901
37027
  master_username=master_username,
36902
37028
  master_user_password=master_user_password,
36903
37029
  master_user_secret=master_user_secret,
@@ -37575,6 +37701,22 @@ class CfnDBCluster(
37575
37701
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
37576
37702
  jsii.set(self, "manageMasterUserPassword", value) # pyright: ignore[reportArgumentType]
37577
37703
 
37704
+ @builtins.property
37705
+ @jsii.member(jsii_name="masterUserAuthenticationType")
37706
+ def master_user_authentication_type(self) -> typing.Optional[builtins.str]:
37707
+ '''Specifies the authentication type for the master user.'''
37708
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "masterUserAuthenticationType"))
37709
+
37710
+ @master_user_authentication_type.setter
37711
+ def master_user_authentication_type(
37712
+ self,
37713
+ value: typing.Optional[builtins.str],
37714
+ ) -> None:
37715
+ if __debug__:
37716
+ type_hints = typing.get_type_hints(_typecheckingstub__910a49e316ebe92edf4e4f3c3db84de89812fb192f5741dd59271a8ec7200008)
37717
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
37718
+ jsii.set(self, "masterUserAuthenticationType", value) # pyright: ignore[reportArgumentType]
37719
+
37578
37720
  @builtins.property
37579
37721
  @jsii.member(jsii_name="masterUsername")
37580
37722
  def master_username(self) -> typing.Optional[builtins.str]:
@@ -38871,6 +39013,7 @@ class CfnDBInstance(
38871
39013
  kms_key_id: typing.Optional[builtins.str] = None,
38872
39014
  license_model: typing.Optional[builtins.str] = None,
38873
39015
  manage_master_user_password: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
39016
+ master_user_authentication_type: typing.Optional[builtins.str] = None,
38874
39017
  master_username: typing.Optional[builtins.str] = None,
38875
39018
  master_user_password: typing.Optional[builtins.str] = None,
38876
39019
  master_user_secret: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnDBInstance.MasterUserSecretProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
@@ -38956,6 +39099,7 @@ class CfnDBInstance(
38956
39099
  :param kms_key_id: The ARN of the AWS KMS key that's used to encrypt the DB instance, such as ``arn:aws:kms:us-east-1:012345678910:key/abcd1234-a123-456a-a12b-a123b4cd56ef`` . If you enable the StorageEncrypted property but don't specify this property, AWS CloudFormation uses the default KMS key. If you specify this property, you must set the StorageEncrypted property to true. If you specify the ``SourceDBInstanceIdentifier`` or ``SourceDbiResourceId`` property, don't specify this property. The value is inherited from the source DB instance, and if the DB instance is encrypted, the specified ``KmsKeyId`` property is used. However, if the source DB instance is in a different AWS Region, you must specify a KMS key ID. If you specify the ``SourceDBInstanceAutomatedBackupsArn`` property, don't specify this property. The value is inherited from the source DB instance automated backup, and if the automated backup is encrypted, the specified ``KmsKeyId`` property is used. If you create an encrypted read replica in a different AWS Region, then you must specify a KMS key for the destination AWS Region. KMS encryption keys are specific to the region that they're created in, and you can't use encryption keys from one region in another region. If you specify the ``DBSnapshotIdentifier`` property, don't specify this property. The ``StorageEncrypted`` property value is inherited from the snapshot. If the DB instance is encrypted, the specified ``KmsKeyId`` property is also inherited from the snapshot. If you specify ``DBSecurityGroups`` , AWS CloudFormation ignores this property. To specify both a security group and this property, you must use a VPC security group. For more information about Amazon RDS and VPC, see `Using Amazon RDS with Amazon VPC <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_VPC.html>`_ in the *Amazon RDS User Guide* . *Amazon Aurora* Not applicable. The KMS key identifier is managed by the DB cluster.
38957
39100
  :param license_model: License model information for this DB instance. Valid Values: - Aurora MySQL - ``general-public-license`` - Aurora PostgreSQL - ``postgresql-license`` - RDS for Db2 - ``bring-your-own-license`` . For more information about RDS for Db2 licensing, see ` <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/db2-licensing.html>`_ in the *Amazon RDS User Guide.* - RDS for MariaDB - ``general-public-license`` - RDS for Microsoft SQL Server - ``license-included`` - RDS for MySQL - ``general-public-license`` - RDS for Oracle - ``bring-your-own-license`` or ``license-included`` - RDS for PostgreSQL - ``postgresql-license`` .. epigraph:: If you've specified ``DBSecurityGroups`` and then you update the license model, AWS CloudFormation replaces the underlying DB instance. This will incur some interruptions to database availability.
38958
39101
  :param manage_master_user_password: Specifies whether to manage the master user password with AWS Secrets Manager. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide.* Constraints: - Can't manage the master user password with AWS Secrets Manager if ``MasterUserPassword`` is specified.
39102
+ :param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB instance. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. This option is only valid for RDS for PostgreSQL and Aurora PostgreSQL engines.
38959
39103
  :param master_username: The master user name for the DB instance. .. epigraph:: If you specify the ``SourceDBInstanceIdentifier`` or ``DBSnapshotIdentifier`` property, don't specify this property. The value is inherited from the source DB instance or snapshot. When migrating a self-managed Db2 database, we recommend that you use the same master username as your self-managed Db2 instance name. *Amazon Aurora* Not applicable. The name for the master user is managed by the DB cluster. *RDS for Db2* Constraints: - Must be 1 to 16 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for MariaDB* Constraints: - Must be 1 to 16 letters or numbers. - Can't be a reserved word for the chosen database engine. *RDS for Microsoft SQL Server* Constraints: - Must be 1 to 128 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for MySQL* Constraints: - Must be 1 to 16 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for Oracle* Constraints: - Must be 1 to 30 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for PostgreSQL* Constraints: - Must be 1 to 63 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine.
38960
39104
  :param master_user_password: The password for the master user. The password can include any printable ASCII character except "/", """, or "@". *Amazon Aurora* Not applicable. The password for the master user is managed by the DB cluster. *RDS for Db2* Must contain from 8 to 255 characters. *RDS for MariaDB* Constraints: Must contain from 8 to 41 characters. *RDS for Microsoft SQL Server* Constraints: Must contain from 8 to 128 characters. *RDS for MySQL* Constraints: Must contain from 8 to 41 characters. *RDS for Oracle* Constraints: Must contain from 8 to 30 characters. *RDS for PostgreSQL* Constraints: Must contain from 8 to 128 characters.
38961
39105
  :param master_user_secret: The secret managed by RDS in AWS Secrets Manager for the master user password. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide.*
@@ -39043,6 +39187,7 @@ class CfnDBInstance(
39043
39187
  kms_key_id=kms_key_id,
39044
39188
  license_model=license_model,
39045
39189
  manage_master_user_password=manage_master_user_password,
39190
+ master_user_authentication_type=master_user_authentication_type,
39046
39191
  master_username=master_username,
39047
39192
  master_user_password=master_user_password,
39048
39193
  master_user_secret=master_user_secret,
@@ -40077,6 +40222,22 @@ class CfnDBInstance(
40077
40222
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
40078
40223
  jsii.set(self, "manageMasterUserPassword", value) # pyright: ignore[reportArgumentType]
40079
40224
 
40225
+ @builtins.property
40226
+ @jsii.member(jsii_name="masterUserAuthenticationType")
40227
+ def master_user_authentication_type(self) -> typing.Optional[builtins.str]:
40228
+ '''Specifies the authentication type for the master user.'''
40229
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "masterUserAuthenticationType"))
40230
+
40231
+ @master_user_authentication_type.setter
40232
+ def master_user_authentication_type(
40233
+ self,
40234
+ value: typing.Optional[builtins.str],
40235
+ ) -> None:
40236
+ if __debug__:
40237
+ type_hints = typing.get_type_hints(_typecheckingstub__619116fe6142881faa76cfea60c3ef852326ec74e01502e52b5f4e5f78feb598)
40238
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
40239
+ jsii.set(self, "masterUserAuthenticationType", value) # pyright: ignore[reportArgumentType]
40240
+
40080
40241
  @builtins.property
40081
40242
  @jsii.member(jsii_name="masterUsername")
40082
40243
  def master_username(self) -> typing.Optional[builtins.str]:
@@ -41331,6 +41492,12 @@ class CfnDBProxy(
41331
41492
  from aws_cdk import aws_rds as rds
41332
41493
 
41333
41494
  cfn_dBProxy = rds.CfnDBProxy(self, "MyCfnDBProxy",
41495
+ db_proxy_name="dbProxyName",
41496
+ engine_family="engineFamily",
41497
+ role_arn="roleArn",
41498
+ vpc_subnet_ids=["vpcSubnetIds"],
41499
+
41500
+ # the properties below are optional
41334
41501
  auth=[rds.CfnDBProxy.AuthFormatProperty(
41335
41502
  auth_scheme="authScheme",
41336
41503
  client_password_auth_type="clientPasswordAuthType",
@@ -41338,19 +41505,16 @@ class CfnDBProxy(
41338
41505
  iam_auth="iamAuth",
41339
41506
  secret_arn="secretArn"
41340
41507
  )],
41341
- db_proxy_name="dbProxyName",
41342
- engine_family="engineFamily",
41343
- role_arn="roleArn",
41344
- vpc_subnet_ids=["vpcSubnetIds"],
41345
-
41346
- # the properties below are optional
41347
41508
  debug_logging=False,
41509
+ default_auth_scheme="defaultAuthScheme",
41510
+ endpoint_network_type="endpointNetworkType",
41348
41511
  idle_client_timeout=123,
41349
41512
  require_tls=False,
41350
41513
  tags=[rds.CfnDBProxy.TagFormatProperty(
41351
41514
  key="key",
41352
41515
  value="value"
41353
41516
  )],
41517
+ target_connection_network_type="targetConnectionNetworkType",
41354
41518
  vpc_security_group_ids=["vpcSecurityGroupIds"]
41355
41519
  )
41356
41520
  '''
@@ -41360,29 +41524,35 @@ class CfnDBProxy(
41360
41524
  scope: _constructs_77d1e7e8.Construct,
41361
41525
  id: builtins.str,
41362
41526
  *,
41363
- auth: typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnDBProxy.AuthFormatProperty", typing.Dict[builtins.str, typing.Any]]]]],
41364
41527
  db_proxy_name: builtins.str,
41365
41528
  engine_family: builtins.str,
41366
41529
  role_arn: builtins.str,
41367
41530
  vpc_subnet_ids: typing.Sequence[builtins.str],
41531
+ auth: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnDBProxy.AuthFormatProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
41368
41532
  debug_logging: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
41533
+ default_auth_scheme: typing.Optional[builtins.str] = None,
41534
+ endpoint_network_type: typing.Optional[builtins.str] = None,
41369
41535
  idle_client_timeout: typing.Optional[jsii.Number] = None,
41370
41536
  require_tls: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
41371
41537
  tags: typing.Optional[typing.Sequence[typing.Union["CfnDBProxy.TagFormatProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
41538
+ target_connection_network_type: typing.Optional[builtins.str] = None,
41372
41539
  vpc_security_group_ids: typing.Optional[typing.Sequence[builtins.str]] = None,
41373
41540
  ) -> None:
41374
41541
  '''
41375
41542
  :param scope: Scope in which this resource is defined.
41376
41543
  :param id: Construct identifier for this resource (unique in its scope).
41377
- :param auth: The authorization mechanism that the proxy uses.
41378
41544
  :param db_proxy_name: The identifier for the proxy. This name must be unique for all proxies owned by your AWS account in the specified AWS Region . An identifier must begin with a letter and must contain only ASCII letters, digits, and hyphens; it can't end with a hyphen or contain two consecutive hyphens.
41379
41545
  :param engine_family: The kinds of databases that the proxy can connect to. This value determines which database network protocol the proxy recognizes when it interprets network traffic to and from the database. For Aurora MySQL, RDS for MariaDB, and RDS for MySQL databases, specify ``MYSQL`` . For Aurora PostgreSQL and RDS for PostgreSQL databases, specify ``POSTGRESQL`` . For RDS for Microsoft SQL Server, specify ``SQLSERVER`` .
41380
41546
  :param role_arn: The Amazon Resource Name (ARN) of the IAM role that the proxy uses to access secrets in AWS Secrets Manager.
41381
41547
  :param vpc_subnet_ids: One or more VPC subnet IDs to associate with the new proxy.
41548
+ :param auth: The authorization mechanism that the proxy uses.
41382
41549
  :param debug_logging: Specifies whether the proxy logs detailed connection and query information. When you enable ``DebugLogging`` , the proxy captures connection details and connection pool behavior from your queries. Debug logging increases CloudWatch costs and can impact proxy performance. Enable this option only when you need to troubleshoot connection or performance issues.
41550
+ :param default_auth_scheme: The default authentication scheme that the proxy uses for client connections to the proxy and connections from the proxy to the underlying database.
41551
+ :param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports.
41383
41552
  :param idle_client_timeout: The number of seconds that a connection to the proxy can be inactive before the proxy disconnects it. You can set this value higher or lower than the connection timeout limit for the associated database.
41384
41553
  :param require_tls: Specifies whether Transport Layer Security (TLS) encryption is required for connections to the proxy. By enabling this setting, you can enforce encrypted TLS connections to the proxy.
41385
41554
  :param tags: An optional set of key-value pairs to associate arbitrary data of your choosing with the proxy.
41555
+ :param target_connection_network_type: The network type that the proxy uses to connect to the target database. The network type determines the IP version that the proxy uses for connections to the database.
41386
41556
  :param vpc_security_group_ids: One or more VPC security group IDs to associate with the new proxy. If you plan to update the resource, don't specify VPC security groups in a shared VPC.
41387
41557
  '''
41388
41558
  if __debug__:
@@ -41390,15 +41560,18 @@ class CfnDBProxy(
41390
41560
  check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
41391
41561
  check_type(argname="argument id", value=id, expected_type=type_hints["id"])
41392
41562
  props = CfnDBProxyProps(
41393
- auth=auth,
41394
41563
  db_proxy_name=db_proxy_name,
41395
41564
  engine_family=engine_family,
41396
41565
  role_arn=role_arn,
41397
41566
  vpc_subnet_ids=vpc_subnet_ids,
41567
+ auth=auth,
41398
41568
  debug_logging=debug_logging,
41569
+ default_auth_scheme=default_auth_scheme,
41570
+ endpoint_network_type=endpoint_network_type,
41399
41571
  idle_client_timeout=idle_client_timeout,
41400
41572
  require_tls=require_tls,
41401
41573
  tags=tags,
41574
+ target_connection_network_type=target_connection_network_type,
41402
41575
  vpc_security_group_ids=vpc_security_group_ids,
41403
41576
  )
41404
41577
 
@@ -41480,24 +41653,6 @@ class CfnDBProxy(
41480
41653
  '''A reference to a DBProxy resource.'''
41481
41654
  return typing.cast(DBProxyReference, jsii.get(self, "dbProxyRef"))
41482
41655
 
41483
- @builtins.property
41484
- @jsii.member(jsii_name="auth")
41485
- def auth(
41486
- self,
41487
- ) -> typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnDBProxy.AuthFormatProperty"]]]:
41488
- '''The authorization mechanism that the proxy uses.'''
41489
- return typing.cast(typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnDBProxy.AuthFormatProperty"]]], jsii.get(self, "auth"))
41490
-
41491
- @auth.setter
41492
- def auth(
41493
- self,
41494
- value: typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnDBProxy.AuthFormatProperty"]]],
41495
- ) -> None:
41496
- if __debug__:
41497
- type_hints = typing.get_type_hints(_typecheckingstub__869ef0e6807a044fbcf1b07244e827164f63faefbf4f14d0b5f86f685fd1c949)
41498
- check_type(argname="argument value", value=value, expected_type=type_hints["value"])
41499
- jsii.set(self, "auth", value) # pyright: ignore[reportArgumentType]
41500
-
41501
41656
  @builtins.property
41502
41657
  @jsii.member(jsii_name="dbProxyName")
41503
41658
  def db_proxy_name(self) -> builtins.str:
@@ -41550,6 +41705,24 @@ class CfnDBProxy(
41550
41705
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
41551
41706
  jsii.set(self, "vpcSubnetIds", value) # pyright: ignore[reportArgumentType]
41552
41707
 
41708
+ @builtins.property
41709
+ @jsii.member(jsii_name="auth")
41710
+ def auth(
41711
+ self,
41712
+ ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnDBProxy.AuthFormatProperty"]]]]:
41713
+ '''The authorization mechanism that the proxy uses.'''
41714
+ return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnDBProxy.AuthFormatProperty"]]]], jsii.get(self, "auth"))
41715
+
41716
+ @auth.setter
41717
+ def auth(
41718
+ self,
41719
+ value: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnDBProxy.AuthFormatProperty"]]]],
41720
+ ) -> None:
41721
+ if __debug__:
41722
+ type_hints = typing.get_type_hints(_typecheckingstub__869ef0e6807a044fbcf1b07244e827164f63faefbf4f14d0b5f86f685fd1c949)
41723
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
41724
+ jsii.set(self, "auth", value) # pyright: ignore[reportArgumentType]
41725
+
41553
41726
  @builtins.property
41554
41727
  @jsii.member(jsii_name="debugLogging")
41555
41728
  def debug_logging(
@@ -41568,6 +41741,32 @@ class CfnDBProxy(
41568
41741
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
41569
41742
  jsii.set(self, "debugLogging", value) # pyright: ignore[reportArgumentType]
41570
41743
 
41744
+ @builtins.property
41745
+ @jsii.member(jsii_name="defaultAuthScheme")
41746
+ def default_auth_scheme(self) -> typing.Optional[builtins.str]:
41747
+ '''The default authentication scheme that the proxy uses for client connections to the proxy and connections from the proxy to the underlying database.'''
41748
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "defaultAuthScheme"))
41749
+
41750
+ @default_auth_scheme.setter
41751
+ def default_auth_scheme(self, value: typing.Optional[builtins.str]) -> None:
41752
+ if __debug__:
41753
+ type_hints = typing.get_type_hints(_typecheckingstub__18dc20cb6c7198c733585aea9169142348f96482c7091e5ff56866cefa172b68)
41754
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
41755
+ jsii.set(self, "defaultAuthScheme", value) # pyright: ignore[reportArgumentType]
41756
+
41757
+ @builtins.property
41758
+ @jsii.member(jsii_name="endpointNetworkType")
41759
+ def endpoint_network_type(self) -> typing.Optional[builtins.str]:
41760
+ '''The network type of the DB proxy endpoint.'''
41761
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "endpointNetworkType"))
41762
+
41763
+ @endpoint_network_type.setter
41764
+ def endpoint_network_type(self, value: typing.Optional[builtins.str]) -> None:
41765
+ if __debug__:
41766
+ type_hints = typing.get_type_hints(_typecheckingstub__4b7b706fa2b81a42f739d93aa1586cfc3f9c177800bd27f17441dd2628140627)
41767
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
41768
+ jsii.set(self, "endpointNetworkType", value) # pyright: ignore[reportArgumentType]
41769
+
41571
41770
  @builtins.property
41572
41771
  @jsii.member(jsii_name="idleClientTimeout")
41573
41772
  def idle_client_timeout(self) -> typing.Optional[jsii.Number]:
@@ -41615,6 +41814,22 @@ class CfnDBProxy(
41615
41814
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
41616
41815
  jsii.set(self, "tags", value) # pyright: ignore[reportArgumentType]
41617
41816
 
41817
+ @builtins.property
41818
+ @jsii.member(jsii_name="targetConnectionNetworkType")
41819
+ def target_connection_network_type(self) -> typing.Optional[builtins.str]:
41820
+ '''The network type that the proxy uses to connect to the target database.'''
41821
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "targetConnectionNetworkType"))
41822
+
41823
+ @target_connection_network_type.setter
41824
+ def target_connection_network_type(
41825
+ self,
41826
+ value: typing.Optional[builtins.str],
41827
+ ) -> None:
41828
+ if __debug__:
41829
+ type_hints = typing.get_type_hints(_typecheckingstub__5b826621bdca40a58dfea5c6aa2d64059dae2f19860bb147be23851703e84180)
41830
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
41831
+ jsii.set(self, "targetConnectionNetworkType", value) # pyright: ignore[reportArgumentType]
41832
+
41618
41833
  @builtins.property
41619
41834
  @jsii.member(jsii_name="vpcSecurityGroupIds")
41620
41835
  def vpc_security_group_ids(self) -> typing.Optional[typing.List[builtins.str]]:
@@ -41861,6 +42076,7 @@ class CfnDBProxyEndpoint(
41861
42076
  vpc_subnet_ids=["vpcSubnetIds"],
41862
42077
 
41863
42078
  # the properties below are optional
42079
+ endpoint_network_type="endpointNetworkType",
41864
42080
  tags=[rds.CfnDBProxyEndpoint.TagFormatProperty(
41865
42081
  key="key",
41866
42082
  value="value"
@@ -41878,6 +42094,7 @@ class CfnDBProxyEndpoint(
41878
42094
  db_proxy_endpoint_name: builtins.str,
41879
42095
  db_proxy_name: builtins.str,
41880
42096
  vpc_subnet_ids: typing.Sequence[builtins.str],
42097
+ endpoint_network_type: typing.Optional[builtins.str] = None,
41881
42098
  tags: typing.Optional[typing.Sequence[typing.Union["CfnDBProxyEndpoint.TagFormatProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
41882
42099
  target_role: typing.Optional[builtins.str] = None,
41883
42100
  vpc_security_group_ids: typing.Optional[typing.Sequence[builtins.str]] = None,
@@ -41888,6 +42105,7 @@ class CfnDBProxyEndpoint(
41888
42105
  :param db_proxy_endpoint_name: The name of the DB proxy endpoint to create.
41889
42106
  :param db_proxy_name: The name of the DB proxy associated with the DB proxy endpoint that you create.
41890
42107
  :param vpc_subnet_ids: The VPC subnet IDs for the DB proxy endpoint that you create. You can specify a different set of subnet IDs than for the original DB proxy.
42108
+ :param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports.
41891
42109
  :param tags: An optional set of key-value pairs to associate arbitrary data of your choosing with the proxy.
41892
42110
  :param target_role: A value that indicates whether the DB proxy endpoint can be used for read/write or read-only operations.
41893
42111
  :param vpc_security_group_ids: The VPC security group IDs for the DB proxy endpoint that you create. You can specify a different set of security group IDs than for the original DB proxy. The default is the default security group for the VPC.
@@ -41900,6 +42118,7 @@ class CfnDBProxyEndpoint(
41900
42118
  db_proxy_endpoint_name=db_proxy_endpoint_name,
41901
42119
  db_proxy_name=db_proxy_name,
41902
42120
  vpc_subnet_ids=vpc_subnet_ids,
42121
+ endpoint_network_type=endpoint_network_type,
41903
42122
  tags=tags,
41904
42123
  target_role=target_role,
41905
42124
  vpc_security_group_ids=vpc_security_group_ids,
@@ -42033,6 +42252,19 @@ class CfnDBProxyEndpoint(
42033
42252
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
42034
42253
  jsii.set(self, "vpcSubnetIds", value) # pyright: ignore[reportArgumentType]
42035
42254
 
42255
+ @builtins.property
42256
+ @jsii.member(jsii_name="endpointNetworkType")
42257
+ def endpoint_network_type(self) -> typing.Optional[builtins.str]:
42258
+ '''The network type of the DB proxy endpoint.'''
42259
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "endpointNetworkType"))
42260
+
42261
+ @endpoint_network_type.setter
42262
+ def endpoint_network_type(self, value: typing.Optional[builtins.str]) -> None:
42263
+ if __debug__:
42264
+ type_hints = typing.get_type_hints(_typecheckingstub__7c98a9244985299acd378ba6ec6338a555d6cbfb215e627bdcfcfc077fea704e)
42265
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
42266
+ jsii.set(self, "endpointNetworkType", value) # pyright: ignore[reportArgumentType]
42267
+
42036
42268
  @builtins.property
42037
42269
  @jsii.member(jsii_name="tags")
42038
42270
  def tags(
@@ -51910,6 +52142,7 @@ def _typecheckingstub__aaf089104646bb0ea95e48cd2107d642585c3eb3785a21112fc029b15
51910
52142
  iops: typing.Optional[jsii.Number] = None,
51911
52143
  kms_key_id: typing.Optional[builtins.str] = None,
51912
52144
  manage_master_user_password: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
52145
+ master_user_authentication_type: typing.Optional[builtins.str] = None,
51913
52146
  master_username: typing.Optional[builtins.str] = None,
51914
52147
  master_user_password: typing.Optional[builtins.str] = None,
51915
52148
  master_user_secret: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnDBCluster.MasterUserSecretProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
@@ -51989,6 +52222,7 @@ def _typecheckingstub__3bddb1be0bd1f1699e3a084c5859d94d8879ff15011f2f2eaac29ec16
51989
52222
  kms_key_id: typing.Optional[builtins.str] = None,
51990
52223
  license_model: typing.Optional[builtins.str] = None,
51991
52224
  manage_master_user_password: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
52225
+ master_user_authentication_type: typing.Optional[builtins.str] = None,
51992
52226
  master_username: typing.Optional[builtins.str] = None,
51993
52227
  master_user_password: typing.Optional[builtins.str] = None,
51994
52228
  master_user_secret: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnDBInstance.MasterUserSecretProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
@@ -52044,6 +52278,7 @@ def _typecheckingstub__3a9b3c0e1e94a5b7b563dceb2d99b8e9a70c4025e99ff97121a4d04a0
52044
52278
  db_proxy_endpoint_name: builtins.str,
52045
52279
  db_proxy_name: builtins.str,
52046
52280
  vpc_subnet_ids: typing.Sequence[builtins.str],
52281
+ endpoint_network_type: typing.Optional[builtins.str] = None,
52047
52282
  tags: typing.Optional[typing.Sequence[typing.Union[CfnDBProxyEndpoint.TagFormatProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
52048
52283
  target_role: typing.Optional[builtins.str] = None,
52049
52284
  vpc_security_group_ids: typing.Optional[typing.Sequence[builtins.str]] = None,
@@ -52053,15 +52288,18 @@ def _typecheckingstub__3a9b3c0e1e94a5b7b563dceb2d99b8e9a70c4025e99ff97121a4d04a0
52053
52288
 
52054
52289
  def _typecheckingstub__331ec6568969c058d2fc6c0482e8c31b8cc3af661d01d569ed27059f5a683e34(
52055
52290
  *,
52056
- auth: typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnDBProxy.AuthFormatProperty, typing.Dict[builtins.str, typing.Any]]]]],
52057
52291
  db_proxy_name: builtins.str,
52058
52292
  engine_family: builtins.str,
52059
52293
  role_arn: builtins.str,
52060
52294
  vpc_subnet_ids: typing.Sequence[builtins.str],
52295
+ auth: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnDBProxy.AuthFormatProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
52061
52296
  debug_logging: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
52297
+ default_auth_scheme: typing.Optional[builtins.str] = None,
52298
+ endpoint_network_type: typing.Optional[builtins.str] = None,
52062
52299
  idle_client_timeout: typing.Optional[jsii.Number] = None,
52063
52300
  require_tls: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
52064
52301
  tags: typing.Optional[typing.Sequence[typing.Union[CfnDBProxy.TagFormatProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
52302
+ target_connection_network_type: typing.Optional[builtins.str] = None,
52065
52303
  vpc_security_group_ids: typing.Optional[typing.Sequence[builtins.str]] = None,
52066
52304
  ) -> None:
52067
52305
  """Type checking stubs"""
@@ -53830,6 +54068,7 @@ def _typecheckingstub__1eb14b9dcc306eabcc2963c7b6ef9b87bf8d616bb5691dbc6656242be
53830
54068
  iops: typing.Optional[jsii.Number] = None,
53831
54069
  kms_key_id: typing.Optional[builtins.str] = None,
53832
54070
  manage_master_user_password: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
54071
+ master_user_authentication_type: typing.Optional[builtins.str] = None,
53833
54072
  master_username: typing.Optional[builtins.str] = None,
53834
54073
  master_user_password: typing.Optional[builtins.str] = None,
53835
54074
  master_user_secret: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnDBCluster.MasterUserSecretProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
@@ -54071,6 +54310,12 @@ def _typecheckingstub__7ca876954b5556832b0c941ce0f6ef94a61eb0cd960bb6e8a0106369c
54071
54310
  """Type checking stubs"""
54072
54311
  pass
54073
54312
 
54313
+ def _typecheckingstub__910a49e316ebe92edf4e4f3c3db84de89812fb192f5741dd59271a8ec7200008(
54314
+ value: typing.Optional[builtins.str],
54315
+ ) -> None:
54316
+ """Type checking stubs"""
54317
+ pass
54318
+
54074
54319
  def _typecheckingstub__0dd3cba91c2c8db72b7eb5eeec9e8fbd7f06d277b876e3e89834d03071aaf6d8(
54075
54320
  value: typing.Optional[builtins.str],
54076
54321
  ) -> None:
@@ -54390,6 +54635,7 @@ def _typecheckingstub__255b0779ca741853674876540bf77279f6293bea05de2cd18724d2b92
54390
54635
  kms_key_id: typing.Optional[builtins.str] = None,
54391
54636
  license_model: typing.Optional[builtins.str] = None,
54392
54637
  manage_master_user_password: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
54638
+ master_user_authentication_type: typing.Optional[builtins.str] = None,
54393
54639
  master_username: typing.Optional[builtins.str] = None,
54394
54640
  master_user_password: typing.Optional[builtins.str] = None,
54395
54641
  master_user_secret: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnDBInstance.MasterUserSecretProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
@@ -54717,6 +54963,12 @@ def _typecheckingstub__8ecef20f6921c76abf800f6b708fec7f9adf740c5601480addc60f0e3
54717
54963
  """Type checking stubs"""
54718
54964
  pass
54719
54965
 
54966
+ def _typecheckingstub__619116fe6142881faa76cfea60c3ef852326ec74e01502e52b5f4e5f78feb598(
54967
+ value: typing.Optional[builtins.str],
54968
+ ) -> None:
54969
+ """Type checking stubs"""
54970
+ pass
54971
+
54720
54972
  def _typecheckingstub__e4f4f227c9a762f25ad0222448fd600edf7e310cc003e4a2fed9244a343499d9(
54721
54973
  value: typing.Optional[builtins.str],
54722
54974
  ) -> None:
@@ -55037,15 +55289,18 @@ def _typecheckingstub__4d94f4b32c99ad047b3a29dd2b83cad728335675f9397ef40b6355d8a
55037
55289
  scope: _constructs_77d1e7e8.Construct,
55038
55290
  id: builtins.str,
55039
55291
  *,
55040
- auth: typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnDBProxy.AuthFormatProperty, typing.Dict[builtins.str, typing.Any]]]]],
55041
55292
  db_proxy_name: builtins.str,
55042
55293
  engine_family: builtins.str,
55043
55294
  role_arn: builtins.str,
55044
55295
  vpc_subnet_ids: typing.Sequence[builtins.str],
55296
+ auth: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnDBProxy.AuthFormatProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
55045
55297
  debug_logging: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
55298
+ default_auth_scheme: typing.Optional[builtins.str] = None,
55299
+ endpoint_network_type: typing.Optional[builtins.str] = None,
55046
55300
  idle_client_timeout: typing.Optional[jsii.Number] = None,
55047
55301
  require_tls: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
55048
55302
  tags: typing.Optional[typing.Sequence[typing.Union[CfnDBProxy.TagFormatProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
55303
+ target_connection_network_type: typing.Optional[builtins.str] = None,
55049
55304
  vpc_security_group_ids: typing.Optional[typing.Sequence[builtins.str]] = None,
55050
55305
  ) -> None:
55051
55306
  """Type checking stubs"""
@@ -55063,12 +55318,6 @@ def _typecheckingstub__069f114e3593f89959ab0180ffc2c341744b96a557ca447e885c4c7a4
55063
55318
  """Type checking stubs"""
55064
55319
  pass
55065
55320
 
55066
- def _typecheckingstub__869ef0e6807a044fbcf1b07244e827164f63faefbf4f14d0b5f86f685fd1c949(
55067
- value: typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnDBProxy.AuthFormatProperty]]],
55068
- ) -> None:
55069
- """Type checking stubs"""
55070
- pass
55071
-
55072
55321
  def _typecheckingstub__b3a9e7095215a0a9bdb8ab44b83362bbd101299c63fc799b2a6ff66bca4e33e1(
55073
55322
  value: builtins.str,
55074
55323
  ) -> None:
@@ -55093,12 +55342,30 @@ def _typecheckingstub__41d92774518120032be7c505a800af682ea1962c565406683dc31aa33
55093
55342
  """Type checking stubs"""
55094
55343
  pass
55095
55344
 
55345
+ def _typecheckingstub__869ef0e6807a044fbcf1b07244e827164f63faefbf4f14d0b5f86f685fd1c949(
55346
+ value: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnDBProxy.AuthFormatProperty]]]],
55347
+ ) -> None:
55348
+ """Type checking stubs"""
55349
+ pass
55350
+
55096
55351
  def _typecheckingstub__74bf8fd129aa7db6aa8cbe4c31cc1e5c4cc49092cdf5e1df037dc0169913f027(
55097
55352
  value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
55098
55353
  ) -> None:
55099
55354
  """Type checking stubs"""
55100
55355
  pass
55101
55356
 
55357
+ def _typecheckingstub__18dc20cb6c7198c733585aea9169142348f96482c7091e5ff56866cefa172b68(
55358
+ value: typing.Optional[builtins.str],
55359
+ ) -> None:
55360
+ """Type checking stubs"""
55361
+ pass
55362
+
55363
+ def _typecheckingstub__4b7b706fa2b81a42f739d93aa1586cfc3f9c177800bd27f17441dd2628140627(
55364
+ value: typing.Optional[builtins.str],
55365
+ ) -> None:
55366
+ """Type checking stubs"""
55367
+ pass
55368
+
55102
55369
  def _typecheckingstub__20d24f3922bd4d273f50d9ca90e005b2b8fc4e91024a96337ec2377ca188b833(
55103
55370
  value: typing.Optional[jsii.Number],
55104
55371
  ) -> None:
@@ -55117,6 +55384,12 @@ def _typecheckingstub__40e4176c733c58b29a8f2c935c044c4a11574a0150e5b0cfa2bfd50ca
55117
55384
  """Type checking stubs"""
55118
55385
  pass
55119
55386
 
55387
+ def _typecheckingstub__5b826621bdca40a58dfea5c6aa2d64059dae2f19860bb147be23851703e84180(
55388
+ value: typing.Optional[builtins.str],
55389
+ ) -> None:
55390
+ """Type checking stubs"""
55391
+ pass
55392
+
55120
55393
  def _typecheckingstub__0e3b5046d5f0ce58c561c6efda61644df88a6d63ab0ce20e5ce3314ed37dba62(
55121
55394
  value: typing.Optional[typing.List[builtins.str]],
55122
55395
  ) -> None:
@@ -55149,6 +55422,7 @@ def _typecheckingstub__54411dbda583caaf4997925cbfd0ea949cf7e685dcde3cdc9e9e301dc
55149
55422
  db_proxy_endpoint_name: builtins.str,
55150
55423
  db_proxy_name: builtins.str,
55151
55424
  vpc_subnet_ids: typing.Sequence[builtins.str],
55425
+ endpoint_network_type: typing.Optional[builtins.str] = None,
55152
55426
  tags: typing.Optional[typing.Sequence[typing.Union[CfnDBProxyEndpoint.TagFormatProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
55153
55427
  target_role: typing.Optional[builtins.str] = None,
55154
55428
  vpc_security_group_ids: typing.Optional[typing.Sequence[builtins.str]] = None,
@@ -55186,6 +55460,12 @@ def _typecheckingstub__46c2bdfcac6804daeebeae78f3431ef98a8d5656ee2fedd5f51ebf734
55186
55460
  """Type checking stubs"""
55187
55461
  pass
55188
55462
 
55463
+ def _typecheckingstub__7c98a9244985299acd378ba6ec6338a555d6cbfb215e627bdcfcfc077fea704e(
55464
+ value: typing.Optional[builtins.str],
55465
+ ) -> None:
55466
+ """Type checking stubs"""
55467
+ pass
55468
+
55189
55469
  def _typecheckingstub__f6a5dc208e5f863d586ec1e35a3b9362d553db4adbb0ff7cc43308284678c640(
55190
55470
  value: typing.Optional[typing.List[CfnDBProxyEndpoint.TagFormatProperty]],
55191
55471
  ) -> None: