aws-sdk-rds 1.166.0 → 1.168.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -100,6 +100,8 @@ module Aws::RDS
100
100
  # },
101
101
  # network_type: "String",
102
102
  # db_system_id: "String",
103
+ # manage_master_user_password: false,
104
+ # master_user_secret_kms_key_id: "String",
103
105
  # source_region: "String",
104
106
  # })
105
107
  # @param [Hash] options ({})
@@ -293,7 +295,11 @@ module Aws::RDS
293
295
  # The password for the master database user. This password can contain
294
296
  # any printable ASCII character except "/", """, or "@".
295
297
  #
296
- # Constraints: Must contain from 8 to 41 characters.
298
+ # Constraints:
299
+ #
300
+ # * Must contain from 8 to 41 characters.
301
+ #
302
+ # * Can't be specified if `ManageMasterUserPassword` is turned on.
297
303
  #
298
304
  # Valid for: Aurora DB clusters and Multi-AZ DB clusters
299
305
  # @option options [String] :option_group_name
@@ -826,6 +832,52 @@ module Aws::RDS
826
832
  # [1]: https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/USER_VPC.WorkingWithRDSInstanceinaVPC.html
827
833
  # @option options [String] :db_system_id
828
834
  # Reserved for future use.
835
+ # @option options [Boolean] :manage_master_user_password
836
+ # A value that indicates whether to manage the master user password with
837
+ # Amazon Web Services Secrets Manager.
838
+ #
839
+ # For more information, see [Password management with Amazon Web
840
+ # Services Secrets Manager][1] in the *Amazon RDS User Guide* and
841
+ # [Password management with Amazon Web Services Secrets Manager][2] in
842
+ # the *Amazon Aurora User Guide.*
843
+ #
844
+ # Constraints:
845
+ #
846
+ # * Can't manage the master user password with Amazon Web Services
847
+ # Secrets Manager if `MasterUserPassword` is specified.
848
+ #
849
+ # ^
850
+ #
851
+ # Valid for: Aurora DB clusters and Multi-AZ DB clusters
852
+ #
853
+ #
854
+ #
855
+ # [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
856
+ # [2]: https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html
857
+ # @option options [String] :master_user_secret_kms_key_id
858
+ # The Amazon Web Services KMS key identifier to encrypt a secret that is
859
+ # automatically generated and managed in Amazon Web Services Secrets
860
+ # Manager.
861
+ #
862
+ # This setting is valid only if the master user password is managed by
863
+ # RDS in Amazon Web Services Secrets Manager for the DB cluster.
864
+ #
865
+ # The Amazon Web Services KMS key identifier is the key ARN, key ID,
866
+ # alias ARN, or alias name for the KMS key. To use a KMS key in a
867
+ # different Amazon Web Services account, specify the key ARN or alias
868
+ # ARN.
869
+ #
870
+ # If you don't specify `MasterUserSecretKmsKeyId`, then the
871
+ # `aws/secretsmanager` KMS key is used to encrypt the secret. If the
872
+ # secret is in a different Amazon Web Services account, then you can't
873
+ # use the `aws/secretsmanager` KMS key to encrypt the secret, and you
874
+ # must use a customer managed KMS key.
875
+ #
876
+ # There is a default KMS key for your Amazon Web Services account. Your
877
+ # Amazon Web Services account has a different default KMS key for each
878
+ # Amazon Web Services Region.
879
+ #
880
+ # Valid for: Aurora DB clusters and Multi-AZ DB clusters
829
881
  # @option options [String] :source_region
830
882
  # The source region of the snapshot. This is only needed when the
831
883
  # shapshot is encrypted and in a different region.
@@ -996,6 +1048,8 @@ module Aws::RDS
996
1048
  # backup_target: "String",
997
1049
  # network_type: "String",
998
1050
  # storage_throughput: 1,
1051
+ # manage_master_user_password: false,
1052
+ # master_user_secret_kms_key_id: "String",
999
1053
  # })
1000
1054
  # @param [Hash] options ({})
1001
1055
  # @option options [String] :db_name
@@ -1310,6 +1364,9 @@ module Aws::RDS
1310
1364
  # Not applicable. The password for the master user is managed by the DB
1311
1365
  # cluster.
1312
1366
  #
1367
+ # Constraints: Can't be specified if `ManageMasterUserPassword` is
1368
+ # turned on.
1369
+ #
1313
1370
  # **MariaDB**
1314
1371
  #
1315
1372
  # Constraints: Must contain from 8 to 41 characters.
@@ -2051,6 +2108,45 @@ module Aws::RDS
2051
2108
  # This setting applies only to the `gp3` storage type.
2052
2109
  #
2053
2110
  # This setting doesn't apply to RDS Custom or Amazon Aurora.
2111
+ # @option options [Boolean] :manage_master_user_password
2112
+ # A value that indicates whether to manage the master user password with
2113
+ # Amazon Web Services Secrets Manager.
2114
+ #
2115
+ # For more information, see [Password management with Amazon Web
2116
+ # Services Secrets Manager][1] in the *Amazon RDS User Guide.*
2117
+ #
2118
+ # Constraints:
2119
+ #
2120
+ # * Can't manage the master user password with Amazon Web Services
2121
+ # Secrets Manager if `MasterUserPassword` is specified.
2122
+ #
2123
+ # ^
2124
+ #
2125
+ #
2126
+ #
2127
+ # [1]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
2128
+ # @option options [String] :master_user_secret_kms_key_id
2129
+ # The Amazon Web Services KMS key identifier to encrypt a secret that is
2130
+ # automatically generated and managed in Amazon Web Services Secrets
2131
+ # Manager.
2132
+ #
2133
+ # This setting is valid only if the master user password is managed by
2134
+ # RDS in Amazon Web Services Secrets Manager for the DB instance.
2135
+ #
2136
+ # The Amazon Web Services KMS key identifier is the key ARN, key ID,
2137
+ # alias ARN, or alias name for the KMS key. To use a KMS key in a
2138
+ # different Amazon Web Services account, specify the key ARN or alias
2139
+ # ARN.
2140
+ #
2141
+ # If you don't specify `MasterUserSecretKmsKeyId`, then the
2142
+ # `aws/secretsmanager` KMS key is used to encrypt the secret. If the
2143
+ # secret is in a different Amazon Web Services account, then you can't
2144
+ # use the `aws/secretsmanager` KMS key to encrypt the secret, and you
2145
+ # must use a customer managed KMS key.
2146
+ #
2147
+ # There is a default KMS key for your Amazon Web Services account. Your
2148
+ # Amazon Web Services account has a different default KMS key for each
2149
+ # Amazon Web Services Region.
2054
2150
  # @return [DBInstance]
2055
2151
  def create_db_instance(options = {})
2056
2152
  resp = @client.create_db_instance(options)