aws-sdk-rds 1.166.0 → 1.168.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -114,6 +114,7 @@ module Aws::RDS
114
114
  CreateOptionGroupMessage = Shapes::StructureShape.new(name: 'CreateOptionGroupMessage')
115
115
  CreateOptionGroupResult = Shapes::StructureShape.new(name: 'CreateOptionGroupResult')
116
116
  CustomAvailabilityZoneNotFoundFault = Shapes::StructureShape.new(name: 'CustomAvailabilityZoneNotFoundFault')
117
+ CustomDBEngineVersionAMI = Shapes::StructureShape.new(name: 'CustomDBEngineVersionAMI')
117
118
  CustomDBEngineVersionAlreadyExistsFault = Shapes::StructureShape.new(name: 'CustomDBEngineVersionAlreadyExistsFault')
118
119
  CustomDBEngineVersionManifest = Shapes::StringShape.new(name: 'CustomDBEngineVersionManifest')
119
120
  CustomDBEngineVersionNotFoundFault = Shapes::StructureShape.new(name: 'CustomDBEngineVersionNotFoundFault')
@@ -337,6 +338,7 @@ module Aws::RDS
337
338
  DownloadDBLogFilePortionMessage = Shapes::StructureShape.new(name: 'DownloadDBLogFilePortionMessage')
338
339
  EC2SecurityGroup = Shapes::StructureShape.new(name: 'EC2SecurityGroup')
339
340
  EC2SecurityGroupList = Shapes::ListShape.new(name: 'EC2SecurityGroupList')
341
+ Ec2ImagePropertiesNotSupportedFault = Shapes::StructureShape.new(name: 'Ec2ImagePropertiesNotSupportedFault')
340
342
  Endpoint = Shapes::StructureShape.new(name: 'Endpoint')
341
343
  EngineDefaults = Shapes::StructureShape.new(name: 'EngineDefaults')
342
344
  EngineFamily = Shapes::StringShape.new(name: 'EngineFamily')
@@ -422,6 +424,7 @@ module Aws::RDS
422
424
  LogTypeList = Shapes::ListShape.new(name: 'LogTypeList')
423
425
  Long = Shapes::IntegerShape.new(name: 'Long')
424
426
  LongOptional = Shapes::IntegerShape.new(name: 'LongOptional')
427
+ MasterUserSecret = Shapes::StructureShape.new(name: 'MasterUserSecret')
425
428
  MaxRecords = Shapes::IntegerShape.new(name: 'MaxRecords')
426
429
  MinimumEngineVersionPerAllowedValue = Shapes::StructureShape.new(name: 'MinimumEngineVersionPerAllowedValue')
427
430
  MinimumEngineVersionPerAllowedValueList = Shapes::ListShape.new(name: 'MinimumEngineVersionPerAllowedValueList')
@@ -868,11 +871,12 @@ module Aws::RDS
868
871
 
869
872
  CreateCustomDBEngineVersionMessage.add_member(:engine, Shapes::ShapeRef.new(shape: CustomEngineName, required: true, location_name: "Engine"))
870
873
  CreateCustomDBEngineVersionMessage.add_member(:engine_version, Shapes::ShapeRef.new(shape: CustomEngineVersion, required: true, location_name: "EngineVersion"))
871
- CreateCustomDBEngineVersionMessage.add_member(:database_installation_files_s3_bucket_name, Shapes::ShapeRef.new(shape: BucketName, required: true, location_name: "DatabaseInstallationFilesS3BucketName"))
874
+ CreateCustomDBEngineVersionMessage.add_member(:database_installation_files_s3_bucket_name, Shapes::ShapeRef.new(shape: BucketName, location_name: "DatabaseInstallationFilesS3BucketName"))
872
875
  CreateCustomDBEngineVersionMessage.add_member(:database_installation_files_s3_prefix, Shapes::ShapeRef.new(shape: String255, location_name: "DatabaseInstallationFilesS3Prefix"))
873
- CreateCustomDBEngineVersionMessage.add_member(:kms_key_id, Shapes::ShapeRef.new(shape: KmsKeyIdOrArn, required: true, location_name: "KMSKeyId"))
876
+ CreateCustomDBEngineVersionMessage.add_member(:image_id, Shapes::ShapeRef.new(shape: String255, location_name: "ImageId"))
877
+ CreateCustomDBEngineVersionMessage.add_member(:kms_key_id, Shapes::ShapeRef.new(shape: KmsKeyIdOrArn, location_name: "KMSKeyId"))
874
878
  CreateCustomDBEngineVersionMessage.add_member(:description, Shapes::ShapeRef.new(shape: Description, location_name: "Description"))
875
- CreateCustomDBEngineVersionMessage.add_member(:manifest, Shapes::ShapeRef.new(shape: CustomDBEngineVersionManifest, required: true, location_name: "Manifest"))
879
+ CreateCustomDBEngineVersionMessage.add_member(:manifest, Shapes::ShapeRef.new(shape: CustomDBEngineVersionManifest, location_name: "Manifest"))
876
880
  CreateCustomDBEngineVersionMessage.add_member(:tags, Shapes::ShapeRef.new(shape: TagList, location_name: "Tags"))
877
881
  CreateCustomDBEngineVersionMessage.struct_class = Types::CreateCustomDBEngineVersionMessage
878
882
 
@@ -931,6 +935,8 @@ module Aws::RDS
931
935
  CreateDBClusterMessage.add_member(:serverless_v2_scaling_configuration, Shapes::ShapeRef.new(shape: ServerlessV2ScalingConfiguration, location_name: "ServerlessV2ScalingConfiguration"))
932
936
  CreateDBClusterMessage.add_member(:network_type, Shapes::ShapeRef.new(shape: String, location_name: "NetworkType"))
933
937
  CreateDBClusterMessage.add_member(:db_system_id, Shapes::ShapeRef.new(shape: String, location_name: "DBSystemId"))
938
+ CreateDBClusterMessage.add_member(:manage_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "ManageMasterUserPassword"))
939
+ CreateDBClusterMessage.add_member(:master_user_secret_kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "MasterUserSecretKmsKeyId"))
934
940
  CreateDBClusterMessage.add_member(:source_region, Shapes::ShapeRef.new(shape: String, location_name: "SourceRegion"))
935
941
  CreateDBClusterMessage.struct_class = Types::CreateDBClusterMessage
936
942
 
@@ -1006,6 +1012,8 @@ module Aws::RDS
1006
1012
  CreateDBInstanceMessage.add_member(:backup_target, Shapes::ShapeRef.new(shape: String, location_name: "BackupTarget"))
1007
1013
  CreateDBInstanceMessage.add_member(:network_type, Shapes::ShapeRef.new(shape: String, location_name: "NetworkType"))
1008
1014
  CreateDBInstanceMessage.add_member(:storage_throughput, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "StorageThroughput"))
1015
+ CreateDBInstanceMessage.add_member(:manage_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "ManageMasterUserPassword"))
1016
+ CreateDBInstanceMessage.add_member(:master_user_secret_kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "MasterUserSecretKmsKeyId"))
1009
1017
  CreateDBInstanceMessage.struct_class = Types::CreateDBInstanceMessage
1010
1018
 
1011
1019
  CreateDBInstanceReadReplicaMessage.add_member(:db_instance_identifier, Shapes::ShapeRef.new(shape: String, required: true, location_name: "DBInstanceIdentifier"))
@@ -1149,6 +1157,10 @@ module Aws::RDS
1149
1157
 
1150
1158
  CustomAvailabilityZoneNotFoundFault.struct_class = Types::CustomAvailabilityZoneNotFoundFault
1151
1159
 
1160
+ CustomDBEngineVersionAMI.add_member(:image_id, Shapes::ShapeRef.new(shape: String, location_name: "ImageId"))
1161
+ CustomDBEngineVersionAMI.add_member(:status, Shapes::ShapeRef.new(shape: String, location_name: "Status"))
1162
+ CustomDBEngineVersionAMI.struct_class = Types::CustomDBEngineVersionAMI
1163
+
1152
1164
  CustomDBEngineVersionAlreadyExistsFault.struct_class = Types::CustomDBEngineVersionAlreadyExistsFault
1153
1165
 
1154
1166
  CustomDBEngineVersionNotFoundFault.struct_class = Types::CustomDBEngineVersionNotFoundFault
@@ -1225,6 +1237,7 @@ module Aws::RDS
1225
1237
  DBCluster.add_member(:serverless_v2_scaling_configuration, Shapes::ShapeRef.new(shape: ServerlessV2ScalingConfigurationInfo, location_name: "ServerlessV2ScalingConfiguration"))
1226
1238
  DBCluster.add_member(:network_type, Shapes::ShapeRef.new(shape: String, location_name: "NetworkType"))
1227
1239
  DBCluster.add_member(:db_system_id, Shapes::ShapeRef.new(shape: String, location_name: "DBSystemId"))
1240
+ DBCluster.add_member(:master_user_secret, Shapes::ShapeRef.new(shape: MasterUserSecret, location_name: "MasterUserSecret"))
1228
1241
  DBCluster.struct_class = Types::DBCluster
1229
1242
 
1230
1243
  DBClusterAlreadyExistsFault.struct_class = Types::DBClusterAlreadyExistsFault
@@ -1385,6 +1398,8 @@ module Aws::RDS
1385
1398
  DBEngineVersion.add_member(:db_engine_description, Shapes::ShapeRef.new(shape: String, location_name: "DBEngineDescription"))
1386
1399
  DBEngineVersion.add_member(:db_engine_version_description, Shapes::ShapeRef.new(shape: String, location_name: "DBEngineVersionDescription"))
1387
1400
  DBEngineVersion.add_member(:default_character_set, Shapes::ShapeRef.new(shape: CharacterSet, location_name: "DefaultCharacterSet"))
1401
+ DBEngineVersion.add_member(:image, Shapes::ShapeRef.new(shape: CustomDBEngineVersionAMI, location_name: "Image"))
1402
+ DBEngineVersion.add_member(:db_engine_media_type, Shapes::ShapeRef.new(shape: String, location_name: "DBEngineMediaType"))
1388
1403
  DBEngineVersion.add_member(:supported_character_sets, Shapes::ShapeRef.new(shape: SupportedCharacterSetsList, location_name: "SupportedCharacterSets"))
1389
1404
  DBEngineVersion.add_member(:supported_nchar_character_sets, Shapes::ShapeRef.new(shape: SupportedCharacterSetsList, location_name: "SupportedNcharCharacterSets"))
1390
1405
  DBEngineVersion.add_member(:valid_upgrade_target, Shapes::ShapeRef.new(shape: ValidUpgradeTargetList, location_name: "ValidUpgradeTarget"))
@@ -1492,6 +1507,7 @@ module Aws::RDS
1492
1507
  DBInstance.add_member(:activity_stream_policy_status, Shapes::ShapeRef.new(shape: ActivityStreamPolicyStatus, location_name: "ActivityStreamPolicyStatus"))
1493
1508
  DBInstance.add_member(:storage_throughput, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "StorageThroughput"))
1494
1509
  DBInstance.add_member(:db_system_id, Shapes::ShapeRef.new(shape: String, location_name: "DBSystemId"))
1510
+ DBInstance.add_member(:master_user_secret, Shapes::ShapeRef.new(shape: MasterUserSecret, location_name: "MasterUserSecret"))
1495
1511
  DBInstance.struct_class = Types::DBInstance
1496
1512
 
1497
1513
  DBInstanceAlreadyExistsFault.struct_class = Types::DBInstanceAlreadyExistsFault
@@ -2242,6 +2258,8 @@ module Aws::RDS
2242
2258
 
2243
2259
  EC2SecurityGroupList.member = Shapes::ShapeRef.new(shape: EC2SecurityGroup, location_name: "EC2SecurityGroup")
2244
2260
 
2261
+ Ec2ImagePropertiesNotSupportedFault.struct_class = Types::Ec2ImagePropertiesNotSupportedFault
2262
+
2245
2263
  Endpoint.add_member(:address, Shapes::ShapeRef.new(shape: String, location_name: "Address"))
2246
2264
  Endpoint.add_member(:port, Shapes::ShapeRef.new(shape: Integer, location_name: "Port"))
2247
2265
  Endpoint.add_member(:hosted_zone_id, Shapes::ShapeRef.new(shape: String, location_name: "HostedZoneId"))
@@ -2471,6 +2489,11 @@ module Aws::RDS
2471
2489
 
2472
2490
  LogTypeList.member = Shapes::ShapeRef.new(shape: String)
2473
2491
 
2492
+ MasterUserSecret.add_member(:secret_arn, Shapes::ShapeRef.new(shape: String, location_name: "SecretArn"))
2493
+ MasterUserSecret.add_member(:secret_status, Shapes::ShapeRef.new(shape: String, location_name: "SecretStatus"))
2494
+ MasterUserSecret.add_member(:kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "KmsKeyId"))
2495
+ MasterUserSecret.struct_class = Types::MasterUserSecret
2496
+
2474
2497
  MinimumEngineVersionPerAllowedValue.add_member(:allowed_value, Shapes::ShapeRef.new(shape: String, location_name: "AllowedValue"))
2475
2498
  MinimumEngineVersionPerAllowedValue.add_member(:minimum_engine_version, Shapes::ShapeRef.new(shape: String, location_name: "MinimumEngineVersion"))
2476
2499
  MinimumEngineVersionPerAllowedValue.struct_class = Types::MinimumEngineVersionPerAllowedValue
@@ -2550,6 +2573,9 @@ module Aws::RDS
2550
2573
  ModifyDBClusterMessage.add_member(:performance_insights_retention_period, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "PerformanceInsightsRetentionPeriod"))
2551
2574
  ModifyDBClusterMessage.add_member(:serverless_v2_scaling_configuration, Shapes::ShapeRef.new(shape: ServerlessV2ScalingConfiguration, location_name: "ServerlessV2ScalingConfiguration"))
2552
2575
  ModifyDBClusterMessage.add_member(:network_type, Shapes::ShapeRef.new(shape: String, location_name: "NetworkType"))
2576
+ ModifyDBClusterMessage.add_member(:manage_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "ManageMasterUserPassword"))
2577
+ ModifyDBClusterMessage.add_member(:rotate_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "RotateMasterUserPassword"))
2578
+ ModifyDBClusterMessage.add_member(:master_user_secret_kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "MasterUserSecretKmsKeyId"))
2553
2579
  ModifyDBClusterMessage.struct_class = Types::ModifyDBClusterMessage
2554
2580
 
2555
2581
  ModifyDBClusterParameterGroupMessage.add_member(:db_cluster_parameter_group_name, Shapes::ShapeRef.new(shape: String, required: true, location_name: "DBClusterParameterGroupName"))
@@ -2617,6 +2643,9 @@ module Aws::RDS
2617
2643
  ModifyDBInstanceMessage.add_member(:resume_full_automation_mode_minutes, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "ResumeFullAutomationModeMinutes"))
2618
2644
  ModifyDBInstanceMessage.add_member(:network_type, Shapes::ShapeRef.new(shape: String, location_name: "NetworkType"))
2619
2645
  ModifyDBInstanceMessage.add_member(:storage_throughput, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "StorageThroughput"))
2646
+ ModifyDBInstanceMessage.add_member(:manage_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "ManageMasterUserPassword"))
2647
+ ModifyDBInstanceMessage.add_member(:rotate_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "RotateMasterUserPassword"))
2648
+ ModifyDBInstanceMessage.add_member(:master_user_secret_kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "MasterUserSecretKmsKeyId"))
2620
2649
  ModifyDBInstanceMessage.struct_class = Types::ModifyDBInstanceMessage
2621
2650
 
2622
2651
  ModifyDBInstanceResult.add_member(:db_instance, Shapes::ShapeRef.new(shape: DBInstance, location_name: "DBInstance"))
@@ -3114,7 +3143,7 @@ module Aws::RDS
3114
3143
  RestoreDBClusterFromS3Message.add_member(:engine_version, Shapes::ShapeRef.new(shape: String, location_name: "EngineVersion"))
3115
3144
  RestoreDBClusterFromS3Message.add_member(:port, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "Port"))
3116
3145
  RestoreDBClusterFromS3Message.add_member(:master_username, Shapes::ShapeRef.new(shape: String, required: true, location_name: "MasterUsername"))
3117
- RestoreDBClusterFromS3Message.add_member(:master_user_password, Shapes::ShapeRef.new(shape: String, required: true, location_name: "MasterUserPassword"))
3146
+ RestoreDBClusterFromS3Message.add_member(:master_user_password, Shapes::ShapeRef.new(shape: String, location_name: "MasterUserPassword"))
3118
3147
  RestoreDBClusterFromS3Message.add_member(:option_group_name, Shapes::ShapeRef.new(shape: String, location_name: "OptionGroupName"))
3119
3148
  RestoreDBClusterFromS3Message.add_member(:preferred_backup_window, Shapes::ShapeRef.new(shape: String, location_name: "PreferredBackupWindow"))
3120
3149
  RestoreDBClusterFromS3Message.add_member(:preferred_maintenance_window, Shapes::ShapeRef.new(shape: String, location_name: "PreferredMaintenanceWindow"))
@@ -3135,6 +3164,8 @@ module Aws::RDS
3135
3164
  RestoreDBClusterFromS3Message.add_member(:domain_iam_role_name, Shapes::ShapeRef.new(shape: String, location_name: "DomainIAMRoleName"))
3136
3165
  RestoreDBClusterFromS3Message.add_member(:serverless_v2_scaling_configuration, Shapes::ShapeRef.new(shape: ServerlessV2ScalingConfiguration, location_name: "ServerlessV2ScalingConfiguration"))
3137
3166
  RestoreDBClusterFromS3Message.add_member(:network_type, Shapes::ShapeRef.new(shape: String, location_name: "NetworkType"))
3167
+ RestoreDBClusterFromS3Message.add_member(:manage_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "ManageMasterUserPassword"))
3168
+ RestoreDBClusterFromS3Message.add_member(:master_user_secret_kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "MasterUserSecretKmsKeyId"))
3138
3169
  RestoreDBClusterFromS3Message.struct_class = Types::RestoreDBClusterFromS3Message
3139
3170
 
3140
3171
  RestoreDBClusterFromS3Result.add_member(:db_cluster, Shapes::ShapeRef.new(shape: DBCluster, location_name: "DBCluster"))
@@ -3290,6 +3321,8 @@ module Aws::RDS
3290
3321
  RestoreDBInstanceFromS3Message.add_member(:max_allocated_storage, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "MaxAllocatedStorage"))
3291
3322
  RestoreDBInstanceFromS3Message.add_member(:network_type, Shapes::ShapeRef.new(shape: String, location_name: "NetworkType"))
3292
3323
  RestoreDBInstanceFromS3Message.add_member(:storage_throughput, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "StorageThroughput"))
3324
+ RestoreDBInstanceFromS3Message.add_member(:manage_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "ManageMasterUserPassword"))
3325
+ RestoreDBInstanceFromS3Message.add_member(:master_user_secret_kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "MasterUserSecretKmsKeyId"))
3293
3326
  RestoreDBInstanceFromS3Message.struct_class = Types::RestoreDBInstanceFromS3Message
3294
3327
 
3295
3328
  RestoreDBInstanceFromS3Result.add_member(:db_instance, Shapes::ShapeRef.new(shape: DBInstance, location_name: "DBInstance"))
@@ -3802,6 +3835,7 @@ module Aws::RDS
3802
3835
  o.output = Shapes::ShapeRef.new(shape: DBEngineVersion)
3803
3836
  o.errors << Shapes::ShapeRef.new(shape: CustomDBEngineVersionAlreadyExistsFault)
3804
3837
  o.errors << Shapes::ShapeRef.new(shape: CustomDBEngineVersionQuotaExceededFault)
3838
+ o.errors << Shapes::ShapeRef.new(shape: Ec2ImagePropertiesNotSupportedFault)
3805
3839
  o.errors << Shapes::ShapeRef.new(shape: KMSKeyNotAccessibleFault)
3806
3840
  end)
3807
3841
 
@@ -649,6 +649,23 @@ module Aws::RDS
649
649
  data[:db_system_id]
650
650
  end
651
651
 
652
+ # Contains the secret managed by RDS in Amazon Web Services Secrets
653
+ # Manager for the master user password.
654
+ #
655
+ # For more information, see [Password management with Amazon Web
656
+ # Services Secrets Manager][1] in the *Amazon RDS User Guide* and
657
+ # [Password management with Amazon Web Services Secrets Manager][2] in
658
+ # the *Amazon Aurora User Guide.*
659
+ #
660
+ #
661
+ #
662
+ # [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
663
+ # [2]: https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html
664
+ # @return [Types::MasterUserSecret]
665
+ def master_user_secret
666
+ data[:master_user_secret]
667
+ end
668
+
652
669
  # @!endgroup
653
670
 
654
671
  # @return [Client]
@@ -847,6 +864,8 @@ module Aws::RDS
847
864
  # },
848
865
  # network_type: "String",
849
866
  # db_system_id: "String",
867
+ # manage_master_user_password: false,
868
+ # master_user_secret_kms_key_id: "String",
850
869
  # source_region: "String",
851
870
  # })
852
871
  # @param [Hash] options ({})
@@ -1025,7 +1044,11 @@ module Aws::RDS
1025
1044
  # The password for the master database user. This password can contain
1026
1045
  # any printable ASCII character except "/", """, or "@".
1027
1046
  #
1028
- # Constraints: Must contain from 8 to 41 characters.
1047
+ # Constraints:
1048
+ #
1049
+ # * Must contain from 8 to 41 characters.
1050
+ #
1051
+ # * Can't be specified if `ManageMasterUserPassword` is turned on.
1029
1052
  #
1030
1053
  # Valid for: Aurora DB clusters and Multi-AZ DB clusters
1031
1054
  # @option options [String] :option_group_name
@@ -1558,6 +1581,52 @@ module Aws::RDS
1558
1581
  # [1]: https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/USER_VPC.WorkingWithRDSInstanceinaVPC.html
1559
1582
  # @option options [String] :db_system_id
1560
1583
  # Reserved for future use.
1584
+ # @option options [Boolean] :manage_master_user_password
1585
+ # A value that indicates whether to manage the master user password with
1586
+ # Amazon Web Services Secrets Manager.
1587
+ #
1588
+ # For more information, see [Password management with Amazon Web
1589
+ # Services Secrets Manager][1] in the *Amazon RDS User Guide* and
1590
+ # [Password management with Amazon Web Services Secrets Manager][2] in
1591
+ # the *Amazon Aurora User Guide.*
1592
+ #
1593
+ # Constraints:
1594
+ #
1595
+ # * Can't manage the master user password with Amazon Web Services
1596
+ # Secrets Manager if `MasterUserPassword` is specified.
1597
+ #
1598
+ # ^
1599
+ #
1600
+ # Valid for: Aurora DB clusters and Multi-AZ DB clusters
1601
+ #
1602
+ #
1603
+ #
1604
+ # [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
1605
+ # [2]: https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html
1606
+ # @option options [String] :master_user_secret_kms_key_id
1607
+ # The Amazon Web Services KMS key identifier to encrypt a secret that is
1608
+ # automatically generated and managed in Amazon Web Services Secrets
1609
+ # Manager.
1610
+ #
1611
+ # This setting is valid only if the master user password is managed by
1612
+ # RDS in Amazon Web Services Secrets Manager for the DB cluster.
1613
+ #
1614
+ # The Amazon Web Services KMS key identifier is the key ARN, key ID,
1615
+ # alias ARN, or alias name for the KMS key. To use a KMS key in a
1616
+ # different Amazon Web Services account, specify the key ARN or alias
1617
+ # ARN.
1618
+ #
1619
+ # If you don't specify `MasterUserSecretKmsKeyId`, then the
1620
+ # `aws/secretsmanager` KMS key is used to encrypt the secret. If the
1621
+ # secret is in a different Amazon Web Services account, then you can't
1622
+ # use the `aws/secretsmanager` KMS key to encrypt the secret, and you
1623
+ # must use a customer managed KMS key.
1624
+ #
1625
+ # There is a default KMS key for your Amazon Web Services account. Your
1626
+ # Amazon Web Services account has a different default KMS key for each
1627
+ # Amazon Web Services Region.
1628
+ #
1629
+ # Valid for: Aurora DB clusters and Multi-AZ DB clusters
1561
1630
  # @option options [String] :source_region
1562
1631
  # The source region of the snapshot. This is only needed when the
1563
1632
  # shapshot is encrypted and in a different region.
@@ -1734,6 +1803,9 @@ module Aws::RDS
1734
1803
  # max_capacity: 1.0,
1735
1804
  # },
1736
1805
  # network_type: "String",
1806
+ # manage_master_user_password: false,
1807
+ # rotate_master_user_password: false,
1808
+ # master_user_secret_kms_key_id: "String",
1737
1809
  # })
1738
1810
  # @param [Hash] options ({})
1739
1811
  # @option options [String] :new_db_cluster_identifier
@@ -1803,7 +1875,11 @@ module Aws::RDS
1803
1875
  # The new password for the master database user. This password can
1804
1876
  # contain any printable ASCII character except "/", """, or "@".
1805
1877
  #
1806
- # Constraints: Must contain from 8 to 41 characters.
1878
+ # Constraints:
1879
+ #
1880
+ # * Must contain from 8 to 41 characters.
1881
+ #
1882
+ # * Can't be specified if `ManageMasterUserPassword` is turned on.
1807
1883
  #
1808
1884
  # Valid for: Aurora DB clusters and Multi-AZ DB clusters
1809
1885
  # @option options [String] :option_group_name
@@ -2215,6 +2291,93 @@ module Aws::RDS
2215
2291
  #
2216
2292
  #
2217
2293
  # [1]: https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/USER_VPC.WorkingWithRDSInstanceinaVPC.html
2294
+ # @option options [Boolean] :manage_master_user_password
2295
+ # A value that indicates whether to manage the master user password with
2296
+ # Amazon Web Services Secrets Manager.
2297
+ #
2298
+ # If the DB cluster doesn't manage the master user password with Amazon
2299
+ # Web Services Secrets Manager, you can turn on this management. In this
2300
+ # case, you can't specify `MasterUserPassword`.
2301
+ #
2302
+ # If the DB cluster already manages the master user password with Amazon
2303
+ # Web Services Secrets Manager, and you specify that the master user
2304
+ # password is not managed with Amazon Web Services Secrets Manager, then
2305
+ # you must specify `MasterUserPassword`. In this case, RDS deletes the
2306
+ # secret and uses the new password for the master user specified by
2307
+ # `MasterUserPassword`.
2308
+ #
2309
+ # For more information, see [Password management with Amazon Web
2310
+ # Services Secrets Manager][1] in the *Amazon RDS User Guide* and
2311
+ # [Password management with Amazon Web Services Secrets Manager][2] in
2312
+ # the *Amazon Aurora User Guide.*
2313
+ #
2314
+ # Valid for: Aurora DB clusters and Multi-AZ DB clusters
2315
+ #
2316
+ #
2317
+ #
2318
+ # [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
2319
+ # [2]: https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html
2320
+ # @option options [Boolean] :rotate_master_user_password
2321
+ # A value that indicates whether to rotate the secret managed by Amazon
2322
+ # Web Services Secrets Manager for the master user password.
2323
+ #
2324
+ # This setting is valid only if the master user password is managed by
2325
+ # RDS in Amazon Web Services Secrets Manager for the DB cluster. The
2326
+ # secret value contains the updated password.
2327
+ #
2328
+ # For more information, see [Password management with Amazon Web
2329
+ # Services Secrets Manager][1] in the *Amazon RDS User Guide* and
2330
+ # [Password management with Amazon Web Services Secrets Manager][2] in
2331
+ # the *Amazon Aurora User Guide.*
2332
+ #
2333
+ # Constraints:
2334
+ #
2335
+ # * You must apply the change immediately when rotating the master user
2336
+ # password.
2337
+ #
2338
+ # ^
2339
+ #
2340
+ # Valid for: Aurora DB clusters and Multi-AZ DB clusters
2341
+ #
2342
+ #
2343
+ #
2344
+ # [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
2345
+ # [2]: https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html
2346
+ # @option options [String] :master_user_secret_kms_key_id
2347
+ # The Amazon Web Services KMS key identifier to encrypt a secret that is
2348
+ # automatically generated and managed in Amazon Web Services Secrets
2349
+ # Manager.
2350
+ #
2351
+ # This setting is valid only if both of the following conditions are
2352
+ # met:
2353
+ #
2354
+ # * The DB cluster doesn't manage the master user password in Amazon
2355
+ # Web Services Secrets Manager.
2356
+ #
2357
+ # If the DB cluster already manages the master user password in Amazon
2358
+ # Web Services Secrets Manager, you can't change the KMS key that is
2359
+ # used to encrypt the secret.
2360
+ #
2361
+ # * You are turning on `ManageMasterUserPassword` to manage the master
2362
+ # user password in Amazon Web Services Secrets Manager.
2363
+ #
2364
+ # If you are turning on `ManageMasterUserPassword` and don't specify
2365
+ # `MasterUserSecretKmsKeyId`, then the `aws/secretsmanager` KMS key is
2366
+ # used to encrypt the secret. If the secret is in a different Amazon
2367
+ # Web Services account, then you can't use the `aws/secretsmanager`
2368
+ # KMS key to encrypt the secret, and you must use a customer managed
2369
+ # KMS key.
2370
+ #
2371
+ # The Amazon Web Services KMS key identifier is the key ARN, key ID,
2372
+ # alias ARN, or alias name for the KMS key. To use a KMS key in a
2373
+ # different Amazon Web Services account, specify the key ARN or alias
2374
+ # ARN.
2375
+ #
2376
+ # There is a default KMS key for your Amazon Web Services account. Your
2377
+ # Amazon Web Services account has a different default KMS key for each
2378
+ # Amazon Web Services Region.
2379
+ #
2380
+ # Valid for: Aurora DB clusters and Multi-AZ DB clusters
2218
2381
  # @return [DBCluster]
2219
2382
  def modify(options = {})
2220
2383
  options = options.merge(db_cluster_identifier: @id)
@@ -70,6 +70,19 @@ module Aws::RDS
70
70
  data[:default_character_set]
71
71
  end
72
72
 
73
+ # The EC2 image
74
+ # @return [Types::CustomDBEngineVersionAMI]
75
+ def image
76
+ data[:image]
77
+ end
78
+
79
+ # A value that indicates the source media provider of the AMI based on
80
+ # the usage operation. Applicable for RDS Custom for SQL Server.
81
+ # @return [String]
82
+ def db_engine_media_type
83
+ data[:db_engine_media_type]
84
+ end
85
+
73
86
  # A list of the character sets supported by this engine for the
74
87
  # `CharacterSetName` parameter of the `CreateDBInstance` operation.
75
88
  # @return [Array<Types::CharacterSet>]
@@ -741,6 +741,20 @@ module Aws::RDS
741
741
  data[:db_system_id]
742
742
  end
743
743
 
744
+ # Contains the secret managed by RDS in Amazon Web Services Secrets
745
+ # Manager for the master user password.
746
+ #
747
+ # For more information, see [Password management with Amazon Web
748
+ # Services Secrets Manager][1] in the *Amazon RDS User Guide.*
749
+ #
750
+ #
751
+ #
752
+ # [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
753
+ # @return [Types::MasterUserSecret]
754
+ def master_user_secret
755
+ data[:master_user_secret]
756
+ end
757
+
744
758
  # @!endgroup
745
759
 
746
760
  # @return [Client]
@@ -939,6 +953,8 @@ module Aws::RDS
939
953
  # backup_target: "String",
940
954
  # network_type: "String",
941
955
  # storage_throughput: 1,
956
+ # manage_master_user_password: false,
957
+ # master_user_secret_kms_key_id: "String",
942
958
  # })
943
959
  # @param [Hash] options ({})
944
960
  # @option options [String] :db_name
@@ -1240,6 +1256,9 @@ module Aws::RDS
1240
1256
  # Not applicable. The password for the master user is managed by the DB
1241
1257
  # cluster.
1242
1258
  #
1259
+ # Constraints: Can't be specified if `ManageMasterUserPassword` is
1260
+ # turned on.
1261
+ #
1243
1262
  # **MariaDB**
1244
1263
  #
1245
1264
  # Constraints: Must contain from 8 to 41 characters.
@@ -1981,6 +2000,45 @@ module Aws::RDS
1981
2000
  # This setting applies only to the `gp3` storage type.
1982
2001
  #
1983
2002
  # This setting doesn't apply to RDS Custom or Amazon Aurora.
2003
+ # @option options [Boolean] :manage_master_user_password
2004
+ # A value that indicates whether to manage the master user password with
2005
+ # Amazon Web Services Secrets Manager.
2006
+ #
2007
+ # For more information, see [Password management with Amazon Web
2008
+ # Services Secrets Manager][1] in the *Amazon RDS User Guide.*
2009
+ #
2010
+ # Constraints:
2011
+ #
2012
+ # * Can't manage the master user password with Amazon Web Services
2013
+ # Secrets Manager if `MasterUserPassword` is specified.
2014
+ #
2015
+ # ^
2016
+ #
2017
+ #
2018
+ #
2019
+ # [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
2020
+ # @option options [String] :master_user_secret_kms_key_id
2021
+ # The Amazon Web Services KMS key identifier to encrypt a secret that is
2022
+ # automatically generated and managed in Amazon Web Services Secrets
2023
+ # Manager.
2024
+ #
2025
+ # This setting is valid only if the master user password is managed by
2026
+ # RDS in Amazon Web Services Secrets Manager for the DB instance.
2027
+ #
2028
+ # The Amazon Web Services KMS key identifier is the key ARN, key ID,
2029
+ # alias ARN, or alias name for the KMS key. To use a KMS key in a
2030
+ # different Amazon Web Services account, specify the key ARN or alias
2031
+ # ARN.
2032
+ #
2033
+ # If you don't specify `MasterUserSecretKmsKeyId`, then the
2034
+ # `aws/secretsmanager` KMS key is used to encrypt the secret. If the
2035
+ # secret is in a different Amazon Web Services account, then you can't
2036
+ # use the `aws/secretsmanager` KMS key to encrypt the secret, and you
2037
+ # must use a customer managed KMS key.
2038
+ #
2039
+ # There is a default KMS key for your Amazon Web Services account. Your
2040
+ # Amazon Web Services account has a different default KMS key for each
2041
+ # Amazon Web Services Region.
1984
2042
  # @return [DBInstance]
1985
2043
  def create(options = {})
1986
2044
  options = options.merge(db_instance_identifier: @id)
@@ -2709,6 +2767,9 @@ module Aws::RDS
2709
2767
  # resume_full_automation_mode_minutes: 1,
2710
2768
  # network_type: "String",
2711
2769
  # storage_throughput: 1,
2770
+ # manage_master_user_password: false,
2771
+ # rotate_master_user_password: false,
2772
+ # master_user_secret_kms_key_id: "String",
2712
2773
  # })
2713
2774
  # @param [Hash] options ({})
2714
2775
  # @option options [Integer] :allocated_storage
@@ -2830,6 +2891,9 @@ module Aws::RDS
2830
2891
  #
2831
2892
  # Default: Uses existing setting
2832
2893
  #
2894
+ # Constraints: Can't be specified if `ManageMasterUserPassword` is
2895
+ # turned on.
2896
+ #
2833
2897
  # **MariaDB**
2834
2898
  #
2835
2899
  # Constraints: Must contain from 8 to 41 characters.
@@ -3483,6 +3547,88 @@ module Aws::RDS
3483
3547
  # This setting applies only to the `gp3` storage type.
3484
3548
  #
3485
3549
  # This setting doesn't apply to RDS Custom or Amazon Aurora.
3550
+ # @option options [Boolean] :manage_master_user_password
3551
+ # A value that indicates whether to manage the master user password with
3552
+ # Amazon Web Services Secrets Manager.
3553
+ #
3554
+ # If the DB cluster doesn't manage the master user password with Amazon
3555
+ # Web Services Secrets Manager, you can turn on this management. In this
3556
+ # case, you can't specify `MasterUserPassword`.
3557
+ #
3558
+ # If the DB cluster already manages the master user password with Amazon
3559
+ # Web Services Secrets Manager, and you specify that the master user
3560
+ # password is not managed with Amazon Web Services Secrets Manager, then
3561
+ # you must specify `MasterUserPassword`. In this case, RDS deletes the
3562
+ # secret and uses the new password for the master user specified by
3563
+ # `MasterUserPassword`.
3564
+ #
3565
+ # For more information, see [Password management with Amazon Web
3566
+ # Services Secrets Manager][1] in the *Amazon RDS User Guide.*
3567
+ #
3568
+ # Constraints:
3569
+ #
3570
+ # * Can't manage the master user password with Amazon Web Services
3571
+ # Secrets Manager if `MasterUserPassword` is specified.
3572
+ #
3573
+ # ^
3574
+ #
3575
+ #
3576
+ #
3577
+ # [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
3578
+ # @option options [Boolean] :rotate_master_user_password
3579
+ # A value that indicates whether to rotate the secret managed by Amazon
3580
+ # Web Services Secrets Manager for the master user password.
3581
+ #
3582
+ # This setting is valid only if the master user password is managed by
3583
+ # RDS in Amazon Web Services Secrets Manager for the DB cluster. The
3584
+ # secret value contains the updated password.
3585
+ #
3586
+ # For more information, see [Password management with Amazon Web
3587
+ # Services Secrets Manager][1] in the *Amazon RDS User Guide.*
3588
+ #
3589
+ # Constraints:
3590
+ #
3591
+ # * You must apply the change immediately when rotating the master user
3592
+ # password.
3593
+ #
3594
+ # ^
3595
+ #
3596
+ #
3597
+ #
3598
+ # [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
3599
+ # @option options [String] :master_user_secret_kms_key_id
3600
+ # The Amazon Web Services KMS key identifier to encrypt a secret that is
3601
+ # automatically generated and managed in Amazon Web Services Secrets
3602
+ # Manager.
3603
+ #
3604
+ # This setting is valid only if both of the following conditions are
3605
+ # met:
3606
+ #
3607
+ # * The DB instance doesn't manage the master user password in Amazon
3608
+ # Web Services Secrets Manager.
3609
+ #
3610
+ # If the DB instance already manages the master user password in
3611
+ # Amazon Web Services Secrets Manager, you can't change the KMS key
3612
+ # used to encrypt the secret.
3613
+ #
3614
+ # * You are turning on `ManageMasterUserPassword` to manage the master
3615
+ # user password in Amazon Web Services Secrets Manager.
3616
+ #
3617
+ # If you are turning on `ManageMasterUserPassword` and don't specify
3618
+ # `MasterUserSecretKmsKeyId`, then the `aws/secretsmanager` KMS key is
3619
+ # used to encrypt the secret. If the secret is in a different Amazon
3620
+ # Web Services account, then you can't use the `aws/secretsmanager`
3621
+ # KMS key to encrypt the secret, and you must use a customer managed
3622
+ # KMS key.
3623
+ #
3624
+ # The Amazon Web Services KMS key identifier is the key ARN, key ID,
3625
+ # alias ARN, or alias name for the KMS key. To use a KMS key in a
3626
+ # different Amazon Web Services account, specify the key ARN or alias
3627
+ # ARN.
3628
+ #
3629
+ # There is a default KMS key for your Amazon Web Services account. Your
3630
+ # Amazon Web Services account has a different default KMS key for each
3631
+ # Amazon Web Services Region.
3486
3632
  # @return [DBInstance]
3487
3633
  def modify(options = {})
3488
3634
  options = options.merge(db_instance_identifier: @id)
@@ -85,6 +85,7 @@ module Aws::RDS
85
85
  # * {DBSubnetQuotaExceededFault}
86
86
  # * {DBUpgradeDependencyFailureFault}
87
87
  # * {DomainNotFoundFault}
88
+ # * {Ec2ImagePropertiesNotSupportedFault}
88
89
  # * {EventSubscriptionQuotaExceededFault}
89
90
  # * {ExportTaskAlreadyExistsFault}
90
91
  # * {ExportTaskNotFoundFault}
@@ -737,6 +738,16 @@ module Aws::RDS
737
738
  end
738
739
  end
739
740
 
741
+ class Ec2ImagePropertiesNotSupportedFault < ServiceError
742
+
743
+ # @param [Seahorse::Client::RequestContext] context
744
+ # @param [String] message
745
+ # @param [Aws::RDS::Types::Ec2ImagePropertiesNotSupportedFault] data
746
+ def initialize(context, message, data = Aws::EmptyStructure.new)
747
+ super(context, message, data)
748
+ end
749
+ end
750
+
740
751
  class EventSubscriptionQuotaExceededFault < ServiceError
741
752
 
742
753
  # @param [Seahorse::Client::RequestContext] context