aws-sdk-rds 1.166.0 → 1.168.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -114,6 +114,7 @@ module Aws::RDS
114
114
  CreateOptionGroupMessage = Shapes::StructureShape.new(name: 'CreateOptionGroupMessage')
115
115
  CreateOptionGroupResult = Shapes::StructureShape.new(name: 'CreateOptionGroupResult')
116
116
  CustomAvailabilityZoneNotFoundFault = Shapes::StructureShape.new(name: 'CustomAvailabilityZoneNotFoundFault')
117
+ CustomDBEngineVersionAMI = Shapes::StructureShape.new(name: 'CustomDBEngineVersionAMI')
117
118
  CustomDBEngineVersionAlreadyExistsFault = Shapes::StructureShape.new(name: 'CustomDBEngineVersionAlreadyExistsFault')
118
119
  CustomDBEngineVersionManifest = Shapes::StringShape.new(name: 'CustomDBEngineVersionManifest')
119
120
  CustomDBEngineVersionNotFoundFault = Shapes::StructureShape.new(name: 'CustomDBEngineVersionNotFoundFault')
@@ -337,6 +338,7 @@ module Aws::RDS
337
338
  DownloadDBLogFilePortionMessage = Shapes::StructureShape.new(name: 'DownloadDBLogFilePortionMessage')
338
339
  EC2SecurityGroup = Shapes::StructureShape.new(name: 'EC2SecurityGroup')
339
340
  EC2SecurityGroupList = Shapes::ListShape.new(name: 'EC2SecurityGroupList')
341
+ Ec2ImagePropertiesNotSupportedFault = Shapes::StructureShape.new(name: 'Ec2ImagePropertiesNotSupportedFault')
340
342
  Endpoint = Shapes::StructureShape.new(name: 'Endpoint')
341
343
  EngineDefaults = Shapes::StructureShape.new(name: 'EngineDefaults')
342
344
  EngineFamily = Shapes::StringShape.new(name: 'EngineFamily')
@@ -422,6 +424,7 @@ module Aws::RDS
422
424
  LogTypeList = Shapes::ListShape.new(name: 'LogTypeList')
423
425
  Long = Shapes::IntegerShape.new(name: 'Long')
424
426
  LongOptional = Shapes::IntegerShape.new(name: 'LongOptional')
427
+ MasterUserSecret = Shapes::StructureShape.new(name: 'MasterUserSecret')
425
428
  MaxRecords = Shapes::IntegerShape.new(name: 'MaxRecords')
426
429
  MinimumEngineVersionPerAllowedValue = Shapes::StructureShape.new(name: 'MinimumEngineVersionPerAllowedValue')
427
430
  MinimumEngineVersionPerAllowedValueList = Shapes::ListShape.new(name: 'MinimumEngineVersionPerAllowedValueList')
@@ -868,11 +871,12 @@ module Aws::RDS
868
871
 
869
872
  CreateCustomDBEngineVersionMessage.add_member(:engine, Shapes::ShapeRef.new(shape: CustomEngineName, required: true, location_name: "Engine"))
870
873
  CreateCustomDBEngineVersionMessage.add_member(:engine_version, Shapes::ShapeRef.new(shape: CustomEngineVersion, required: true, location_name: "EngineVersion"))
871
- CreateCustomDBEngineVersionMessage.add_member(:database_installation_files_s3_bucket_name, Shapes::ShapeRef.new(shape: BucketName, required: true, location_name: "DatabaseInstallationFilesS3BucketName"))
874
+ CreateCustomDBEngineVersionMessage.add_member(:database_installation_files_s3_bucket_name, Shapes::ShapeRef.new(shape: BucketName, location_name: "DatabaseInstallationFilesS3BucketName"))
872
875
  CreateCustomDBEngineVersionMessage.add_member(:database_installation_files_s3_prefix, Shapes::ShapeRef.new(shape: String255, location_name: "DatabaseInstallationFilesS3Prefix"))
873
- CreateCustomDBEngineVersionMessage.add_member(:kms_key_id, Shapes::ShapeRef.new(shape: KmsKeyIdOrArn, required: true, location_name: "KMSKeyId"))
876
+ CreateCustomDBEngineVersionMessage.add_member(:image_id, Shapes::ShapeRef.new(shape: String255, location_name: "ImageId"))
877
+ CreateCustomDBEngineVersionMessage.add_member(:kms_key_id, Shapes::ShapeRef.new(shape: KmsKeyIdOrArn, location_name: "KMSKeyId"))
874
878
  CreateCustomDBEngineVersionMessage.add_member(:description, Shapes::ShapeRef.new(shape: Description, location_name: "Description"))
875
- CreateCustomDBEngineVersionMessage.add_member(:manifest, Shapes::ShapeRef.new(shape: CustomDBEngineVersionManifest, required: true, location_name: "Manifest"))
879
+ CreateCustomDBEngineVersionMessage.add_member(:manifest, Shapes::ShapeRef.new(shape: CustomDBEngineVersionManifest, location_name: "Manifest"))
876
880
  CreateCustomDBEngineVersionMessage.add_member(:tags, Shapes::ShapeRef.new(shape: TagList, location_name: "Tags"))
877
881
  CreateCustomDBEngineVersionMessage.struct_class = Types::CreateCustomDBEngineVersionMessage
878
882
 
@@ -931,6 +935,8 @@ module Aws::RDS
931
935
  CreateDBClusterMessage.add_member(:serverless_v2_scaling_configuration, Shapes::ShapeRef.new(shape: ServerlessV2ScalingConfiguration, location_name: "ServerlessV2ScalingConfiguration"))
932
936
  CreateDBClusterMessage.add_member(:network_type, Shapes::ShapeRef.new(shape: String, location_name: "NetworkType"))
933
937
  CreateDBClusterMessage.add_member(:db_system_id, Shapes::ShapeRef.new(shape: String, location_name: "DBSystemId"))
938
+ CreateDBClusterMessage.add_member(:manage_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "ManageMasterUserPassword"))
939
+ CreateDBClusterMessage.add_member(:master_user_secret_kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "MasterUserSecretKmsKeyId"))
934
940
  CreateDBClusterMessage.add_member(:source_region, Shapes::ShapeRef.new(shape: String, location_name: "SourceRegion"))
935
941
  CreateDBClusterMessage.struct_class = Types::CreateDBClusterMessage
936
942
 
@@ -1006,6 +1012,8 @@ module Aws::RDS
1006
1012
  CreateDBInstanceMessage.add_member(:backup_target, Shapes::ShapeRef.new(shape: String, location_name: "BackupTarget"))
1007
1013
  CreateDBInstanceMessage.add_member(:network_type, Shapes::ShapeRef.new(shape: String, location_name: "NetworkType"))
1008
1014
  CreateDBInstanceMessage.add_member(:storage_throughput, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "StorageThroughput"))
1015
+ CreateDBInstanceMessage.add_member(:manage_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "ManageMasterUserPassword"))
1016
+ CreateDBInstanceMessage.add_member(:master_user_secret_kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "MasterUserSecretKmsKeyId"))
1009
1017
  CreateDBInstanceMessage.struct_class = Types::CreateDBInstanceMessage
1010
1018
 
1011
1019
  CreateDBInstanceReadReplicaMessage.add_member(:db_instance_identifier, Shapes::ShapeRef.new(shape: String, required: true, location_name: "DBInstanceIdentifier"))
@@ -1149,6 +1157,10 @@ module Aws::RDS
1149
1157
 
1150
1158
  CustomAvailabilityZoneNotFoundFault.struct_class = Types::CustomAvailabilityZoneNotFoundFault
1151
1159
 
1160
+ CustomDBEngineVersionAMI.add_member(:image_id, Shapes::ShapeRef.new(shape: String, location_name: "ImageId"))
1161
+ CustomDBEngineVersionAMI.add_member(:status, Shapes::ShapeRef.new(shape: String, location_name: "Status"))
1162
+ CustomDBEngineVersionAMI.struct_class = Types::CustomDBEngineVersionAMI
1163
+
1152
1164
  CustomDBEngineVersionAlreadyExistsFault.struct_class = Types::CustomDBEngineVersionAlreadyExistsFault
1153
1165
 
1154
1166
  CustomDBEngineVersionNotFoundFault.struct_class = Types::CustomDBEngineVersionNotFoundFault
@@ -1225,6 +1237,7 @@ module Aws::RDS
1225
1237
  DBCluster.add_member(:serverless_v2_scaling_configuration, Shapes::ShapeRef.new(shape: ServerlessV2ScalingConfigurationInfo, location_name: "ServerlessV2ScalingConfiguration"))
1226
1238
  DBCluster.add_member(:network_type, Shapes::ShapeRef.new(shape: String, location_name: "NetworkType"))
1227
1239
  DBCluster.add_member(:db_system_id, Shapes::ShapeRef.new(shape: String, location_name: "DBSystemId"))
1240
+ DBCluster.add_member(:master_user_secret, Shapes::ShapeRef.new(shape: MasterUserSecret, location_name: "MasterUserSecret"))
1228
1241
  DBCluster.struct_class = Types::DBCluster
1229
1242
 
1230
1243
  DBClusterAlreadyExistsFault.struct_class = Types::DBClusterAlreadyExistsFault
@@ -1385,6 +1398,8 @@ module Aws::RDS
1385
1398
  DBEngineVersion.add_member(:db_engine_description, Shapes::ShapeRef.new(shape: String, location_name: "DBEngineDescription"))
1386
1399
  DBEngineVersion.add_member(:db_engine_version_description, Shapes::ShapeRef.new(shape: String, location_name: "DBEngineVersionDescription"))
1387
1400
  DBEngineVersion.add_member(:default_character_set, Shapes::ShapeRef.new(shape: CharacterSet, location_name: "DefaultCharacterSet"))
1401
+ DBEngineVersion.add_member(:image, Shapes::ShapeRef.new(shape: CustomDBEngineVersionAMI, location_name: "Image"))
1402
+ DBEngineVersion.add_member(:db_engine_media_type, Shapes::ShapeRef.new(shape: String, location_name: "DBEngineMediaType"))
1388
1403
  DBEngineVersion.add_member(:supported_character_sets, Shapes::ShapeRef.new(shape: SupportedCharacterSetsList, location_name: "SupportedCharacterSets"))
1389
1404
  DBEngineVersion.add_member(:supported_nchar_character_sets, Shapes::ShapeRef.new(shape: SupportedCharacterSetsList, location_name: "SupportedNcharCharacterSets"))
1390
1405
  DBEngineVersion.add_member(:valid_upgrade_target, Shapes::ShapeRef.new(shape: ValidUpgradeTargetList, location_name: "ValidUpgradeTarget"))
@@ -1492,6 +1507,7 @@ module Aws::RDS
1492
1507
  DBInstance.add_member(:activity_stream_policy_status, Shapes::ShapeRef.new(shape: ActivityStreamPolicyStatus, location_name: "ActivityStreamPolicyStatus"))
1493
1508
  DBInstance.add_member(:storage_throughput, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "StorageThroughput"))
1494
1509
  DBInstance.add_member(:db_system_id, Shapes::ShapeRef.new(shape: String, location_name: "DBSystemId"))
1510
+ DBInstance.add_member(:master_user_secret, Shapes::ShapeRef.new(shape: MasterUserSecret, location_name: "MasterUserSecret"))
1495
1511
  DBInstance.struct_class = Types::DBInstance
1496
1512
 
1497
1513
  DBInstanceAlreadyExistsFault.struct_class = Types::DBInstanceAlreadyExistsFault
@@ -2242,6 +2258,8 @@ module Aws::RDS
2242
2258
 
2243
2259
  EC2SecurityGroupList.member = Shapes::ShapeRef.new(shape: EC2SecurityGroup, location_name: "EC2SecurityGroup")
2244
2260
 
2261
+ Ec2ImagePropertiesNotSupportedFault.struct_class = Types::Ec2ImagePropertiesNotSupportedFault
2262
+
2245
2263
  Endpoint.add_member(:address, Shapes::ShapeRef.new(shape: String, location_name: "Address"))
2246
2264
  Endpoint.add_member(:port, Shapes::ShapeRef.new(shape: Integer, location_name: "Port"))
2247
2265
  Endpoint.add_member(:hosted_zone_id, Shapes::ShapeRef.new(shape: String, location_name: "HostedZoneId"))
@@ -2471,6 +2489,11 @@ module Aws::RDS
2471
2489
 
2472
2490
  LogTypeList.member = Shapes::ShapeRef.new(shape: String)
2473
2491
 
2492
+ MasterUserSecret.add_member(:secret_arn, Shapes::ShapeRef.new(shape: String, location_name: "SecretArn"))
2493
+ MasterUserSecret.add_member(:secret_status, Shapes::ShapeRef.new(shape: String, location_name: "SecretStatus"))
2494
+ MasterUserSecret.add_member(:kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "KmsKeyId"))
2495
+ MasterUserSecret.struct_class = Types::MasterUserSecret
2496
+
2474
2497
  MinimumEngineVersionPerAllowedValue.add_member(:allowed_value, Shapes::ShapeRef.new(shape: String, location_name: "AllowedValue"))
2475
2498
  MinimumEngineVersionPerAllowedValue.add_member(:minimum_engine_version, Shapes::ShapeRef.new(shape: String, location_name: "MinimumEngineVersion"))
2476
2499
  MinimumEngineVersionPerAllowedValue.struct_class = Types::MinimumEngineVersionPerAllowedValue
@@ -2550,6 +2573,9 @@ module Aws::RDS
2550
2573
  ModifyDBClusterMessage.add_member(:performance_insights_retention_period, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "PerformanceInsightsRetentionPeriod"))
2551
2574
  ModifyDBClusterMessage.add_member(:serverless_v2_scaling_configuration, Shapes::ShapeRef.new(shape: ServerlessV2ScalingConfiguration, location_name: "ServerlessV2ScalingConfiguration"))
2552
2575
  ModifyDBClusterMessage.add_member(:network_type, Shapes::ShapeRef.new(shape: String, location_name: "NetworkType"))
2576
+ ModifyDBClusterMessage.add_member(:manage_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "ManageMasterUserPassword"))
2577
+ ModifyDBClusterMessage.add_member(:rotate_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "RotateMasterUserPassword"))
2578
+ ModifyDBClusterMessage.add_member(:master_user_secret_kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "MasterUserSecretKmsKeyId"))
2553
2579
  ModifyDBClusterMessage.struct_class = Types::ModifyDBClusterMessage
2554
2580
 
2555
2581
  ModifyDBClusterParameterGroupMessage.add_member(:db_cluster_parameter_group_name, Shapes::ShapeRef.new(shape: String, required: true, location_name: "DBClusterParameterGroupName"))
@@ -2617,6 +2643,9 @@ module Aws::RDS
2617
2643
  ModifyDBInstanceMessage.add_member(:resume_full_automation_mode_minutes, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "ResumeFullAutomationModeMinutes"))
2618
2644
  ModifyDBInstanceMessage.add_member(:network_type, Shapes::ShapeRef.new(shape: String, location_name: "NetworkType"))
2619
2645
  ModifyDBInstanceMessage.add_member(:storage_throughput, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "StorageThroughput"))
2646
+ ModifyDBInstanceMessage.add_member(:manage_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "ManageMasterUserPassword"))
2647
+ ModifyDBInstanceMessage.add_member(:rotate_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "RotateMasterUserPassword"))
2648
+ ModifyDBInstanceMessage.add_member(:master_user_secret_kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "MasterUserSecretKmsKeyId"))
2620
2649
  ModifyDBInstanceMessage.struct_class = Types::ModifyDBInstanceMessage
2621
2650
 
2622
2651
  ModifyDBInstanceResult.add_member(:db_instance, Shapes::ShapeRef.new(shape: DBInstance, location_name: "DBInstance"))
@@ -3114,7 +3143,7 @@ module Aws::RDS
3114
3143
  RestoreDBClusterFromS3Message.add_member(:engine_version, Shapes::ShapeRef.new(shape: String, location_name: "EngineVersion"))
3115
3144
  RestoreDBClusterFromS3Message.add_member(:port, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "Port"))
3116
3145
  RestoreDBClusterFromS3Message.add_member(:master_username, Shapes::ShapeRef.new(shape: String, required: true, location_name: "MasterUsername"))
3117
- RestoreDBClusterFromS3Message.add_member(:master_user_password, Shapes::ShapeRef.new(shape: String, required: true, location_name: "MasterUserPassword"))
3146
+ RestoreDBClusterFromS3Message.add_member(:master_user_password, Shapes::ShapeRef.new(shape: String, location_name: "MasterUserPassword"))
3118
3147
  RestoreDBClusterFromS3Message.add_member(:option_group_name, Shapes::ShapeRef.new(shape: String, location_name: "OptionGroupName"))
3119
3148
  RestoreDBClusterFromS3Message.add_member(:preferred_backup_window, Shapes::ShapeRef.new(shape: String, location_name: "PreferredBackupWindow"))
3120
3149
  RestoreDBClusterFromS3Message.add_member(:preferred_maintenance_window, Shapes::ShapeRef.new(shape: String, location_name: "PreferredMaintenanceWindow"))
@@ -3135,6 +3164,8 @@ module Aws::RDS
3135
3164
  RestoreDBClusterFromS3Message.add_member(:domain_iam_role_name, Shapes::ShapeRef.new(shape: String, location_name: "DomainIAMRoleName"))
3136
3165
  RestoreDBClusterFromS3Message.add_member(:serverless_v2_scaling_configuration, Shapes::ShapeRef.new(shape: ServerlessV2ScalingConfiguration, location_name: "ServerlessV2ScalingConfiguration"))
3137
3166
  RestoreDBClusterFromS3Message.add_member(:network_type, Shapes::ShapeRef.new(shape: String, location_name: "NetworkType"))
3167
+ RestoreDBClusterFromS3Message.add_member(:manage_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "ManageMasterUserPassword"))
3168
+ RestoreDBClusterFromS3Message.add_member(:master_user_secret_kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "MasterUserSecretKmsKeyId"))
3138
3169
  RestoreDBClusterFromS3Message.struct_class = Types::RestoreDBClusterFromS3Message
3139
3170
 
3140
3171
  RestoreDBClusterFromS3Result.add_member(:db_cluster, Shapes::ShapeRef.new(shape: DBCluster, location_name: "DBCluster"))
@@ -3290,6 +3321,8 @@ module Aws::RDS
3290
3321
  RestoreDBInstanceFromS3Message.add_member(:max_allocated_storage, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "MaxAllocatedStorage"))
3291
3322
  RestoreDBInstanceFromS3Message.add_member(:network_type, Shapes::ShapeRef.new(shape: String, location_name: "NetworkType"))
3292
3323
  RestoreDBInstanceFromS3Message.add_member(:storage_throughput, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "StorageThroughput"))
3324
+ RestoreDBInstanceFromS3Message.add_member(:manage_master_user_password, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "ManageMasterUserPassword"))
3325
+ RestoreDBInstanceFromS3Message.add_member(:master_user_secret_kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "MasterUserSecretKmsKeyId"))
3293
3326
  RestoreDBInstanceFromS3Message.struct_class = Types::RestoreDBInstanceFromS3Message
3294
3327
 
3295
3328
  RestoreDBInstanceFromS3Result.add_member(:db_instance, Shapes::ShapeRef.new(shape: DBInstance, location_name: "DBInstance"))
@@ -3802,6 +3835,7 @@ module Aws::RDS
3802
3835
  o.output = Shapes::ShapeRef.new(shape: DBEngineVersion)
3803
3836
  o.errors << Shapes::ShapeRef.new(shape: CustomDBEngineVersionAlreadyExistsFault)
3804
3837
  o.errors << Shapes::ShapeRef.new(shape: CustomDBEngineVersionQuotaExceededFault)
3838
+ o.errors << Shapes::ShapeRef.new(shape: Ec2ImagePropertiesNotSupportedFault)
3805
3839
  o.errors << Shapes::ShapeRef.new(shape: KMSKeyNotAccessibleFault)
3806
3840
  end)
3807
3841
 
@@ -649,6 +649,23 @@ module Aws::RDS
649
649
  data[:db_system_id]
650
650
  end
651
651
 
652
+ # Contains the secret managed by RDS in Amazon Web Services Secrets
653
+ # Manager for the master user password.
654
+ #
655
+ # For more information, see [Password management with Amazon Web
656
+ # Services Secrets Manager][1] in the *Amazon RDS User Guide* and
657
+ # [Password management with Amazon Web Services Secrets Manager][2] in
658
+ # the *Amazon Aurora User Guide.*
659
+ #
660
+ #
661
+ #
662
+ # [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
663
+ # [2]: https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html
664
+ # @return [Types::MasterUserSecret]
665
+ def master_user_secret
666
+ data[:master_user_secret]
667
+ end
668
+
652
669
  # @!endgroup
653
670
 
654
671
  # @return [Client]
@@ -847,6 +864,8 @@ module Aws::RDS
847
864
  # },
848
865
  # network_type: "String",
849
866
  # db_system_id: "String",
867
+ # manage_master_user_password: false,
868
+ # master_user_secret_kms_key_id: "String",
850
869
  # source_region: "String",
851
870
  # })
852
871
  # @param [Hash] options ({})
@@ -1025,7 +1044,11 @@ module Aws::RDS
1025
1044
  # The password for the master database user. This password can contain
1026
1045
  # any printable ASCII character except "/", """, or "@".
1027
1046
  #
1028
- # Constraints: Must contain from 8 to 41 characters.
1047
+ # Constraints:
1048
+ #
1049
+ # * Must contain from 8 to 41 characters.
1050
+ #
1051
+ # * Can't be specified if `ManageMasterUserPassword` is turned on.
1029
1052
  #
1030
1053
  # Valid for: Aurora DB clusters and Multi-AZ DB clusters
1031
1054
  # @option options [String] :option_group_name
@@ -1558,6 +1581,52 @@ module Aws::RDS
1558
1581
  # [1]: https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/USER_VPC.WorkingWithRDSInstanceinaVPC.html
1559
1582
  # @option options [String] :db_system_id
1560
1583
  # Reserved for future use.
1584
+ # @option options [Boolean] :manage_master_user_password
1585
+ # A value that indicates whether to manage the master user password with
1586
+ # Amazon Web Services Secrets Manager.
1587
+ #
1588
+ # For more information, see [Password management with Amazon Web
1589
+ # Services Secrets Manager][1] in the *Amazon RDS User Guide* and
1590
+ # [Password management with Amazon Web Services Secrets Manager][2] in
1591
+ # the *Amazon Aurora User Guide.*
1592
+ #
1593
+ # Constraints:
1594
+ #
1595
+ # * Can't manage the master user password with Amazon Web Services
1596
+ # Secrets Manager if `MasterUserPassword` is specified.
1597
+ #
1598
+ # ^
1599
+ #
1600
+ # Valid for: Aurora DB clusters and Multi-AZ DB clusters
1601
+ #
1602
+ #
1603
+ #
1604
+ # [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
1605
+ # [2]: https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html
1606
+ # @option options [String] :master_user_secret_kms_key_id
1607
+ # The Amazon Web Services KMS key identifier to encrypt a secret that is
1608
+ # automatically generated and managed in Amazon Web Services Secrets
1609
+ # Manager.
1610
+ #
1611
+ # This setting is valid only if the master user password is managed by
1612
+ # RDS in Amazon Web Services Secrets Manager for the DB cluster.
1613
+ #
1614
+ # The Amazon Web Services KMS key identifier is the key ARN, key ID,
1615
+ # alias ARN, or alias name for the KMS key. To use a KMS key in a
1616
+ # different Amazon Web Services account, specify the key ARN or alias
1617
+ # ARN.
1618
+ #
1619
+ # If you don't specify `MasterUserSecretKmsKeyId`, then the
1620
+ # `aws/secretsmanager` KMS key is used to encrypt the secret. If the
1621
+ # secret is in a different Amazon Web Services account, then you can't
1622
+ # use the `aws/secretsmanager` KMS key to encrypt the secret, and you
1623
+ # must use a customer managed KMS key.
1624
+ #
1625
+ # There is a default KMS key for your Amazon Web Services account. Your
1626
+ # Amazon Web Services account has a different default KMS key for each
1627
+ # Amazon Web Services Region.
1628
+ #
1629
+ # Valid for: Aurora DB clusters and Multi-AZ DB clusters
1561
1630
  # @option options [String] :source_region
1562
1631
  # The source region of the snapshot. This is only needed when the
1563
1632
  # shapshot is encrypted and in a different region.
@@ -1734,6 +1803,9 @@ module Aws::RDS
1734
1803
  # max_capacity: 1.0,
1735
1804
  # },
1736
1805
  # network_type: "String",
1806
+ # manage_master_user_password: false,
1807
+ # rotate_master_user_password: false,
1808
+ # master_user_secret_kms_key_id: "String",
1737
1809
  # })
1738
1810
  # @param [Hash] options ({})
1739
1811
  # @option options [String] :new_db_cluster_identifier
@@ -1803,7 +1875,11 @@ module Aws::RDS
1803
1875
  # The new password for the master database user. This password can
1804
1876
  # contain any printable ASCII character except "/", """, or "@".
1805
1877
  #
1806
- # Constraints: Must contain from 8 to 41 characters.
1878
+ # Constraints:
1879
+ #
1880
+ # * Must contain from 8 to 41 characters.
1881
+ #
1882
+ # * Can't be specified if `ManageMasterUserPassword` is turned on.
1807
1883
  #
1808
1884
  # Valid for: Aurora DB clusters and Multi-AZ DB clusters
1809
1885
  # @option options [String] :option_group_name
@@ -2215,6 +2291,93 @@ module Aws::RDS
2215
2291
  #
2216
2292
  #
2217
2293
  # [1]: https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/USER_VPC.WorkingWithRDSInstanceinaVPC.html
2294
+ # @option options [Boolean] :manage_master_user_password
2295
+ # A value that indicates whether to manage the master user password with
2296
+ # Amazon Web Services Secrets Manager.
2297
+ #
2298
+ # If the DB cluster doesn't manage the master user password with Amazon
2299
+ # Web Services Secrets Manager, you can turn on this management. In this
2300
+ # case, you can't specify `MasterUserPassword`.
2301
+ #
2302
+ # If the DB cluster already manages the master user password with Amazon
2303
+ # Web Services Secrets Manager, and you specify that the master user
2304
+ # password is not managed with Amazon Web Services Secrets Manager, then
2305
+ # you must specify `MasterUserPassword`. In this case, RDS deletes the
2306
+ # secret and uses the new password for the master user specified by
2307
+ # `MasterUserPassword`.
2308
+ #
2309
+ # For more information, see [Password management with Amazon Web
2310
+ # Services Secrets Manager][1] in the *Amazon RDS User Guide* and
2311
+ # [Password management with Amazon Web Services Secrets Manager][2] in
2312
+ # the *Amazon Aurora User Guide.*
2313
+ #
2314
+ # Valid for: Aurora DB clusters and Multi-AZ DB clusters
2315
+ #
2316
+ #
2317
+ #
2318
+ # [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
2319
+ # [2]: https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html
2320
+ # @option options [Boolean] :rotate_master_user_password
2321
+ # A value that indicates whether to rotate the secret managed by Amazon
2322
+ # Web Services Secrets Manager for the master user password.
2323
+ #
2324
+ # This setting is valid only if the master user password is managed by
2325
+ # RDS in Amazon Web Services Secrets Manager for the DB cluster. The
2326
+ # secret value contains the updated password.
2327
+ #
2328
+ # For more information, see [Password management with Amazon Web
2329
+ # Services Secrets Manager][1] in the *Amazon RDS User Guide* and
2330
+ # [Password management with Amazon Web Services Secrets Manager][2] in
2331
+ # the *Amazon Aurora User Guide.*
2332
+ #
2333
+ # Constraints:
2334
+ #
2335
+ # * You must apply the change immediately when rotating the master user
2336
+ # password.
2337
+ #
2338
+ # ^
2339
+ #
2340
+ # Valid for: Aurora DB clusters and Multi-AZ DB clusters
2341
+ #
2342
+ #
2343
+ #
2344
+ # [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
2345
+ # [2]: https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html
2346
+ # @option options [String] :master_user_secret_kms_key_id
2347
+ # The Amazon Web Services KMS key identifier to encrypt a secret that is
2348
+ # automatically generated and managed in Amazon Web Services Secrets
2349
+ # Manager.
2350
+ #
2351
+ # This setting is valid only if both of the following conditions are
2352
+ # met:
2353
+ #
2354
+ # * The DB cluster doesn't manage the master user password in Amazon
2355
+ # Web Services Secrets Manager.
2356
+ #
2357
+ # If the DB cluster already manages the master user password in Amazon
2358
+ # Web Services Secrets Manager, you can't change the KMS key that is
2359
+ # used to encrypt the secret.
2360
+ #
2361
+ # * You are turning on `ManageMasterUserPassword` to manage the master
2362
+ # user password in Amazon Web Services Secrets Manager.
2363
+ #
2364
+ # If you are turning on `ManageMasterUserPassword` and don't specify
2365
+ # `MasterUserSecretKmsKeyId`, then the `aws/secretsmanager` KMS key is
2366
+ # used to encrypt the secret. If the secret is in a different Amazon
2367
+ # Web Services account, then you can't use the `aws/secretsmanager`
2368
+ # KMS key to encrypt the secret, and you must use a customer managed
2369
+ # KMS key.
2370
+ #
2371
+ # The Amazon Web Services KMS key identifier is the key ARN, key ID,
2372
+ # alias ARN, or alias name for the KMS key. To use a KMS key in a
2373
+ # different Amazon Web Services account, specify the key ARN or alias
2374
+ # ARN.
2375
+ #
2376
+ # There is a default KMS key for your Amazon Web Services account. Your
2377
+ # Amazon Web Services account has a different default KMS key for each
2378
+ # Amazon Web Services Region.
2379
+ #
2380
+ # Valid for: Aurora DB clusters and Multi-AZ DB clusters
2218
2381
  # @return [DBCluster]
2219
2382
  def modify(options = {})
2220
2383
  options = options.merge(db_cluster_identifier: @id)
@@ -70,6 +70,19 @@ module Aws::RDS
70
70
  data[:default_character_set]
71
71
  end
72
72
 
73
+ # The EC2 image
74
+ # @return [Types::CustomDBEngineVersionAMI]
75
+ def image
76
+ data[:image]
77
+ end
78
+
79
+ # A value that indicates the source media provider of the AMI based on
80
+ # the usage operation. Applicable for RDS Custom for SQL Server.
81
+ # @return [String]
82
+ def db_engine_media_type
83
+ data[:db_engine_media_type]
84
+ end
85
+
73
86
  # A list of the character sets supported by this engine for the
74
87
  # `CharacterSetName` parameter of the `CreateDBInstance` operation.
75
88
  # @return [Array<Types::CharacterSet>]
@@ -741,6 +741,20 @@ module Aws::RDS
741
741
  data[:db_system_id]
742
742
  end
743
743
 
744
+ # Contains the secret managed by RDS in Amazon Web Services Secrets
745
+ # Manager for the master user password.
746
+ #
747
+ # For more information, see [Password management with Amazon Web
748
+ # Services Secrets Manager][1] in the *Amazon RDS User Guide.*
749
+ #
750
+ #
751
+ #
752
+ # [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
753
+ # @return [Types::MasterUserSecret]
754
+ def master_user_secret
755
+ data[:master_user_secret]
756
+ end
757
+
744
758
  # @!endgroup
745
759
 
746
760
  # @return [Client]
@@ -939,6 +953,8 @@ module Aws::RDS
939
953
  # backup_target: "String",
940
954
  # network_type: "String",
941
955
  # storage_throughput: 1,
956
+ # manage_master_user_password: false,
957
+ # master_user_secret_kms_key_id: "String",
942
958
  # })
943
959
  # @param [Hash] options ({})
944
960
  # @option options [String] :db_name
@@ -1240,6 +1256,9 @@ module Aws::RDS
1240
1256
  # Not applicable. The password for the master user is managed by the DB
1241
1257
  # cluster.
1242
1258
  #
1259
+ # Constraints: Can't be specified if `ManageMasterUserPassword` is
1260
+ # turned on.
1261
+ #
1243
1262
  # **MariaDB**
1244
1263
  #
1245
1264
  # Constraints: Must contain from 8 to 41 characters.
@@ -1981,6 +2000,45 @@ module Aws::RDS
1981
2000
  # This setting applies only to the `gp3` storage type.
1982
2001
  #
1983
2002
  # This setting doesn't apply to RDS Custom or Amazon Aurora.
2003
+ # @option options [Boolean] :manage_master_user_password
2004
+ # A value that indicates whether to manage the master user password with
2005
+ # Amazon Web Services Secrets Manager.
2006
+ #
2007
+ # For more information, see [Password management with Amazon Web
2008
+ # Services Secrets Manager][1] in the *Amazon RDS User Guide.*
2009
+ #
2010
+ # Constraints:
2011
+ #
2012
+ # * Can't manage the master user password with Amazon Web Services
2013
+ # Secrets Manager if `MasterUserPassword` is specified.
2014
+ #
2015
+ # ^
2016
+ #
2017
+ #
2018
+ #
2019
+ # [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
2020
+ # @option options [String] :master_user_secret_kms_key_id
2021
+ # The Amazon Web Services KMS key identifier to encrypt a secret that is
2022
+ # automatically generated and managed in Amazon Web Services Secrets
2023
+ # Manager.
2024
+ #
2025
+ # This setting is valid only if the master user password is managed by
2026
+ # RDS in Amazon Web Services Secrets Manager for the DB instance.
2027
+ #
2028
+ # The Amazon Web Services KMS key identifier is the key ARN, key ID,
2029
+ # alias ARN, or alias name for the KMS key. To use a KMS key in a
2030
+ # different Amazon Web Services account, specify the key ARN or alias
2031
+ # ARN.
2032
+ #
2033
+ # If you don't specify `MasterUserSecretKmsKeyId`, then the
2034
+ # `aws/secretsmanager` KMS key is used to encrypt the secret. If the
2035
+ # secret is in a different Amazon Web Services account, then you can't
2036
+ # use the `aws/secretsmanager` KMS key to encrypt the secret, and you
2037
+ # must use a customer managed KMS key.
2038
+ #
2039
+ # There is a default KMS key for your Amazon Web Services account. Your
2040
+ # Amazon Web Services account has a different default KMS key for each
2041
+ # Amazon Web Services Region.
1984
2042
  # @return [DBInstance]
1985
2043
  def create(options = {})
1986
2044
  options = options.merge(db_instance_identifier: @id)
@@ -2709,6 +2767,9 @@ module Aws::RDS
2709
2767
  # resume_full_automation_mode_minutes: 1,
2710
2768
  # network_type: "String",
2711
2769
  # storage_throughput: 1,
2770
+ # manage_master_user_password: false,
2771
+ # rotate_master_user_password: false,
2772
+ # master_user_secret_kms_key_id: "String",
2712
2773
  # })
2713
2774
  # @param [Hash] options ({})
2714
2775
  # @option options [Integer] :allocated_storage
@@ -2830,6 +2891,9 @@ module Aws::RDS
2830
2891
  #
2831
2892
  # Default: Uses existing setting
2832
2893
  #
2894
+ # Constraints: Can't be specified if `ManageMasterUserPassword` is
2895
+ # turned on.
2896
+ #
2833
2897
  # **MariaDB**
2834
2898
  #
2835
2899
  # Constraints: Must contain from 8 to 41 characters.
@@ -3483,6 +3547,88 @@ module Aws::RDS
3483
3547
  # This setting applies only to the `gp3` storage type.
3484
3548
  #
3485
3549
  # This setting doesn't apply to RDS Custom or Amazon Aurora.
3550
+ # @option options [Boolean] :manage_master_user_password
3551
+ # A value that indicates whether to manage the master user password with
3552
+ # Amazon Web Services Secrets Manager.
3553
+ #
3554
+ # If the DB cluster doesn't manage the master user password with Amazon
3555
+ # Web Services Secrets Manager, you can turn on this management. In this
3556
+ # case, you can't specify `MasterUserPassword`.
3557
+ #
3558
+ # If the DB cluster already manages the master user password with Amazon
3559
+ # Web Services Secrets Manager, and you specify that the master user
3560
+ # password is not managed with Amazon Web Services Secrets Manager, then
3561
+ # you must specify `MasterUserPassword`. In this case, RDS deletes the
3562
+ # secret and uses the new password for the master user specified by
3563
+ # `MasterUserPassword`.
3564
+ #
3565
+ # For more information, see [Password management with Amazon Web
3566
+ # Services Secrets Manager][1] in the *Amazon RDS User Guide.*
3567
+ #
3568
+ # Constraints:
3569
+ #
3570
+ # * Can't manage the master user password with Amazon Web Services
3571
+ # Secrets Manager if `MasterUserPassword` is specified.
3572
+ #
3573
+ # ^
3574
+ #
3575
+ #
3576
+ #
3577
+ # [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
3578
+ # @option options [Boolean] :rotate_master_user_password
3579
+ # A value that indicates whether to rotate the secret managed by Amazon
3580
+ # Web Services Secrets Manager for the master user password.
3581
+ #
3582
+ # This setting is valid only if the master user password is managed by
3583
+ # RDS in Amazon Web Services Secrets Manager for the DB cluster. The
3584
+ # secret value contains the updated password.
3585
+ #
3586
+ # For more information, see [Password management with Amazon Web
3587
+ # Services Secrets Manager][1] in the *Amazon RDS User Guide.*
3588
+ #
3589
+ # Constraints:
3590
+ #
3591
+ # * You must apply the change immediately when rotating the master user
3592
+ # password.
3593
+ #
3594
+ # ^
3595
+ #
3596
+ #
3597
+ #
3598
+ # [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
3599
+ # @option options [String] :master_user_secret_kms_key_id
3600
+ # The Amazon Web Services KMS key identifier to encrypt a secret that is
3601
+ # automatically generated and managed in Amazon Web Services Secrets
3602
+ # Manager.
3603
+ #
3604
+ # This setting is valid only if both of the following conditions are
3605
+ # met:
3606
+ #
3607
+ # * The DB instance doesn't manage the master user password in Amazon
3608
+ # Web Services Secrets Manager.
3609
+ #
3610
+ # If the DB instance already manages the master user password in
3611
+ # Amazon Web Services Secrets Manager, you can't change the KMS key
3612
+ # used to encrypt the secret.
3613
+ #
3614
+ # * You are turning on `ManageMasterUserPassword` to manage the master
3615
+ # user password in Amazon Web Services Secrets Manager.
3616
+ #
3617
+ # If you are turning on `ManageMasterUserPassword` and don't specify
3618
+ # `MasterUserSecretKmsKeyId`, then the `aws/secretsmanager` KMS key is
3619
+ # used to encrypt the secret. If the secret is in a different Amazon
3620
+ # Web Services account, then you can't use the `aws/secretsmanager`
3621
+ # KMS key to encrypt the secret, and you must use a customer managed
3622
+ # KMS key.
3623
+ #
3624
+ # The Amazon Web Services KMS key identifier is the key ARN, key ID,
3625
+ # alias ARN, or alias name for the KMS key. To use a KMS key in a
3626
+ # different Amazon Web Services account, specify the key ARN or alias
3627
+ # ARN.
3628
+ #
3629
+ # There is a default KMS key for your Amazon Web Services account. Your
3630
+ # Amazon Web Services account has a different default KMS key for each
3631
+ # Amazon Web Services Region.
3486
3632
  # @return [DBInstance]
3487
3633
  def modify(options = {})
3488
3634
  options = options.merge(db_instance_identifier: @id)
@@ -85,6 +85,7 @@ module Aws::RDS
85
85
  # * {DBSubnetQuotaExceededFault}
86
86
  # * {DBUpgradeDependencyFailureFault}
87
87
  # * {DomainNotFoundFault}
88
+ # * {Ec2ImagePropertiesNotSupportedFault}
88
89
  # * {EventSubscriptionQuotaExceededFault}
89
90
  # * {ExportTaskAlreadyExistsFault}
90
91
  # * {ExportTaskNotFoundFault}
@@ -737,6 +738,16 @@ module Aws::RDS
737
738
  end
738
739
  end
739
740
 
741
+ class Ec2ImagePropertiesNotSupportedFault < ServiceError
742
+
743
+ # @param [Seahorse::Client::RequestContext] context
744
+ # @param [String] message
745
+ # @param [Aws::RDS::Types::Ec2ImagePropertiesNotSupportedFault] data
746
+ def initialize(context, message, data = Aws::EmptyStructure.new)
747
+ super(context, message, data)
748
+ end
749
+ end
750
+
740
751
  class EventSubscriptionQuotaExceededFault < ServiceError
741
752
 
742
753
  # @param [Seahorse::Client::RequestContext] context