aws-sdk-core 2.11.75 → 2.11.76

Sign up to get free protection for your applications and to get access to all the features.
@@ -1,508 +1,508 @@
1
1
  {
2
- "version": "1.0",
3
- "examples": {
4
- "CancelRotateSecret": [
2
+ "version":"1.0",
3
+ "examples":{
4
+ "CancelRotateSecret":[
5
5
  {
6
- "input": {
7
- "SecretId": "MyTestDatabaseSecret"
6
+ "input":{
7
+ "SecretId":"MyTestDatabaseSecret"
8
8
  },
9
- "output": {
10
- "ARN": "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
11
- "Name": "Name"
9
+ "output":{
10
+ "ARN":"arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
11
+ "Name":"Name"
12
12
  },
13
- "comments": {
14
- "input": {
13
+ "comments":{
14
+ "input":{
15
15
  },
16
- "output": {
16
+ "output":{
17
17
  }
18
18
  },
19
- "description": "The following example shows how to cancel rotation for a secret. The operation sets the RotationEnabled field to false and cancels all scheduled rotations. To resume scheduled rotations, you must re-enable rotation by calling the rotate-secret operation.",
20
- "id": "to-cancel-scheduled-rotation-for-a-secret-1523996016032",
21
- "title": "To cancel scheduled rotation for a secret"
19
+ "description":"The following example shows how to cancel rotation for a secret. The operation sets the RotationEnabled field to false and cancels all scheduled rotations. To resume scheduled rotations, you must re-enable rotation by calling the rotate-secret operation.",
20
+ "id":"to-cancel-scheduled-rotation-for-a-secret-1523996016032",
21
+ "title":"To cancel scheduled rotation for a secret"
22
22
  }
23
23
  ],
24
- "CreateSecret": [
24
+ "CreateSecret":[
25
25
  {
26
- "input": {
27
- "ClientRequestToken": "EXAMPLE1-90ab-cdef-fedc-ba987SECRET1",
28
- "Description": "My test database secret created with the CLI",
29
- "Name": "MyTestDatabaseSecret",
30
- "SecretString": "{\"username\":\"david\",\"password\":\"BnQw!XDWgaEeT9XGTT29\"}"
31
- },
32
- "output": {
33
- "ARN": "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
34
- "Name": "MyTestDatabaseSecret",
35
- "VersionId": "EXAMPLE1-90ab-cdef-fedc-ba987SECRET1"
36
- },
37
- "comments": {
38
- "input": {
26
+ "input":{
27
+ "ClientRequestToken":"EXAMPLE1-90ab-cdef-fedc-ba987SECRET1",
28
+ "Description":"My test database secret created with the CLI",
29
+ "Name":"MyTestDatabaseSecret",
30
+ "SecretString":"{\"username\":\"david\",\"password\":\"BnQw!XDWgaEeT9XGTT29\"}"
31
+ },
32
+ "output":{
33
+ "ARN":"arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
34
+ "Name":"MyTestDatabaseSecret",
35
+ "VersionId":"EXAMPLE1-90ab-cdef-fedc-ba987SECRET1"
36
+ },
37
+ "comments":{
38
+ "input":{
39
39
  },
40
- "output": {
40
+ "output":{
41
41
  }
42
42
  },
43
- "description": "The following example shows how to create a secret. The credentials stored in the encrypted secret value are retrieved from a file on disk named mycreds.json.",
44
- "id": "to-create-a-basic-secret-1523996473658",
45
- "title": "To create a basic secret"
43
+ "description":"The following example shows how to create a secret. The credentials stored in the encrypted secret value are retrieved from a file on disk named mycreds.json.",
44
+ "id":"to-create-a-basic-secret-1523996473658",
45
+ "title":"To create a basic secret"
46
46
  }
47
47
  ],
48
- "DeleteSecret": [
48
+ "DeleteSecret":[
49
49
  {
50
- "input": {
51
- "RecoveryWindowInDays": 7,
52
- "SecretId": "MyTestDatabaseSecret1"
50
+ "input":{
51
+ "RecoveryWindowInDays":7,
52
+ "SecretId":"MyTestDatabaseSecret1"
53
53
  },
54
- "output": {
55
- "ARN": "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
56
- "DeletionDate": "1524085349.095",
57
- "Name": "MyTestDatabaseSecret"
54
+ "output":{
55
+ "ARN":"arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
56
+ "DeletionDate":"1524085349.095",
57
+ "Name":"MyTestDatabaseSecret"
58
58
  },
59
- "comments": {
60
- "input": {
59
+ "comments":{
60
+ "input":{
61
61
  },
62
- "output": {
62
+ "output":{
63
63
  }
64
64
  },
65
- "description": "The following example shows how to delete a secret. The secret stays in your account in a deprecated and inaccessible state until the recovery window ends. After the date and time in the DeletionDate response field has passed, you can no longer recover this secret with restore-secret.",
66
- "id": "to-delete-a-secret-1523996905092",
67
- "title": "To delete a secret"
65
+ "description":"The following example shows how to delete a secret. The secret stays in your account in a deprecated and inaccessible state until the recovery window ends. After the date and time in the DeletionDate response field has passed, you can no longer recover this secret with restore-secret.",
66
+ "id":"to-delete-a-secret-1523996905092",
67
+ "title":"To delete a secret"
68
68
  }
69
69
  ],
70
- "DescribeSecret": [
70
+ "DescribeSecret":[
71
71
  {
72
- "input": {
73
- "SecretId": "MyTestDatabaseSecret"
74
- },
75
- "output": {
76
- "ARN": "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
77
- "Description": "My test database secret",
78
- "KmsKeyId": "arn:aws:kms:us-west-2:123456789012:key/EXAMPLE1-90ab-cdef-fedc-ba987KMSKEY1",
79
- "LastAccessedDate": "1523923200",
80
- "LastChangedDate": 1523477145.729,
81
- "LastRotatedDate": 1525747253.72,
82
- "Name": "MyTestDatabaseSecret",
83
- "RotationEnabled": true,
84
- "RotationLambdaARN": "arn:aws:lambda:us-west-2:123456789012:function:MyTestRotationLambda",
85
- "RotationRules": {
86
- "AutomaticallyAfterDays": 30
72
+ "input":{
73
+ "SecretId":"MyTestDatabaseSecret"
74
+ },
75
+ "output":{
76
+ "ARN":"arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
77
+ "Description":"My test database secret",
78
+ "KmsKeyId":"arn:aws:kms:us-west-2:123456789012:key/EXAMPLE1-90ab-cdef-fedc-ba987KMSKEY1",
79
+ "LastAccessedDate":"1523923200",
80
+ "LastChangedDate":1523477145.729,
81
+ "LastRotatedDate":1525747253.72,
82
+ "Name":"MyTestDatabaseSecret",
83
+ "RotationEnabled":true,
84
+ "RotationLambdaARN":"arn:aws:lambda:us-west-2:123456789012:function:MyTestRotationLambda",
85
+ "RotationRules":{
86
+ "AutomaticallyAfterDays":30
87
87
  },
88
- "Tags": [
88
+ "Tags":[
89
89
  {
90
- "Key": "SecondTag",
91
- "Value": "AnotherValue"
90
+ "Key":"SecondTag",
91
+ "Value":"AnotherValue"
92
92
  },
93
93
  {
94
- "Key": "FirstTag",
95
- "Value": "SomeValue"
94
+ "Key":"FirstTag",
95
+ "Value":"SomeValue"
96
96
  }
97
97
  ],
98
- "VersionIdsToStages": {
99
- "EXAMPLE1-90ab-cdef-fedc-ba987EXAMPLE": [
98
+ "VersionIdsToStages":{
99
+ "EXAMPLE1-90ab-cdef-fedc-ba987EXAMPLE":[
100
100
  "AWSPREVIOUS"
101
101
  ],
102
- "EXAMPLE2-90ab-cdef-fedc-ba987EXAMPLE": [
102
+ "EXAMPLE2-90ab-cdef-fedc-ba987EXAMPLE":[
103
103
  "AWSCURRENT"
104
104
  ]
105
105
  }
106
106
  },
107
- "comments": {
108
- "input": {
107
+ "comments":{
108
+ "input":{
109
109
  },
110
- "output": {
110
+ "output":{
111
111
  }
112
112
  },
113
- "description": "The following example shows how to get the details about a secret.",
114
- "id": "to-retrieve-the-details-of-a-secret-1524000138629",
115
- "title": "To retrieve the details of a secret"
113
+ "description":"The following example shows how to get the details about a secret.",
114
+ "id":"to-retrieve-the-details-of-a-secret-1524000138629",
115
+ "title":"To retrieve the details of a secret"
116
116
  }
117
117
  ],
118
- "GetRandomPassword": [
118
+ "GetRandomPassword":[
119
119
  {
120
- "input": {
121
- "IncludeSpace": true,
122
- "PasswordLength": 20,
123
- "RequireEachIncludedType": true
120
+ "input":{
121
+ "IncludeSpace":true,
122
+ "PasswordLength":20,
123
+ "RequireEachIncludedType":true
124
124
  },
125
- "output": {
126
- "RandomPassword": "N+Z43a,>vx7j O8^*<8i3"
125
+ "output":{
126
+ "RandomPassword":"N+Z43a,>vx7j O8^*<8i3"
127
127
  },
128
- "comments": {
129
- "input": {
128
+ "comments":{
129
+ "input":{
130
130
  },
131
- "output": {
131
+ "output":{
132
132
  }
133
133
  },
134
- "description": "The following example shows how to request a randomly generated password. This example includes the optional flags to require spaces and at least one character of each included type. It specifies a length of 20 characters.",
135
- "id": "to-generate-a-random-password-1524000546092",
136
- "title": "To generate a random password"
134
+ "description":"The following example shows how to request a randomly generated password. This example includes the optional flags to require spaces and at least one character of each included type. It specifies a length of 20 characters.",
135
+ "id":"to-generate-a-random-password-1524000546092",
136
+ "title":"To generate a random password"
137
137
  }
138
138
  ],
139
- "GetSecretValue": [
139
+ "GetSecretValue":[
140
140
  {
141
- "input": {
142
- "SecretId": "MyTestDatabaseSecret",
143
- "VersionStage": "AWSPREVIOUS"
144
- },
145
- "output": {
146
- "ARN": "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
147
- "CreatedDate": 1523477145.713,
148
- "Name": "MyTestDatabaseSecret",
149
- "SecretString": "{\n \"username\":\"david\",\n \"password\":\"BnQw&XDWgaEeT9XGTT29\"\n}\n",
150
- "VersionId": "EXAMPLE1-90ab-cdef-fedc-ba987SECRET1",
151
- "VersionStages": [
141
+ "input":{
142
+ "SecretId":"MyTestDatabaseSecret",
143
+ "VersionStage":"AWSPREVIOUS"
144
+ },
145
+ "output":{
146
+ "ARN":"arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
147
+ "CreatedDate":1523477145.713,
148
+ "Name":"MyTestDatabaseSecret",
149
+ "SecretString":"{\n \"username\":\"david\",\n \"password\":\"BnQw&XDWgaEeT9XGTT29\"\n}\n",
150
+ "VersionId":"EXAMPLE1-90ab-cdef-fedc-ba987SECRET1",
151
+ "VersionStages":[
152
152
  "AWSPREVIOUS"
153
153
  ]
154
154
  },
155
- "comments": {
156
- "input": {
155
+ "comments":{
156
+ "input":{
157
157
  },
158
- "output": {
158
+ "output":{
159
159
  }
160
160
  },
161
- "description": "The following example shows how to retrieve the secret string value from the version of the secret that has the AWSPREVIOUS staging label attached. If you want to retrieve the AWSCURRENT version of the secret, then you can omit the VersionStage parameter because it defaults to AWSCURRENT.",
162
- "id": "to-retrieve-the-encrypted-secret-value-of-a-secret-1524000702484",
163
- "title": "To retrieve the encrypted secret value of a secret"
161
+ "description":"The following example shows how to retrieve the secret string value from the version of the secret that has the AWSPREVIOUS staging label attached. If you want to retrieve the AWSCURRENT version of the secret, then you can omit the VersionStage parameter because it defaults to AWSCURRENT.",
162
+ "id":"to-retrieve-the-encrypted-secret-value-of-a-secret-1524000702484",
163
+ "title":"To retrieve the encrypted secret value of a secret"
164
164
  }
165
165
  ],
166
- "ListSecretVersionIds": [
166
+ "ListSecretVersionIds":[
167
167
  {
168
- "input": {
169
- "IncludeDeprecated": true,
170
- "SecretId": "MyTestDatabaseSecret"
171
- },
172
- "output": {
173
- "ARN": "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
174
- "Name": "MyTestDatabaseSecret",
175
- "Versions": [
168
+ "input":{
169
+ "IncludeDeprecated":true,
170
+ "SecretId":"MyTestDatabaseSecret"
171
+ },
172
+ "output":{
173
+ "ARN":"arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
174
+ "Name":"MyTestDatabaseSecret",
175
+ "Versions":[
176
176
  {
177
- "CreatedDate": 1523477145.713,
178
- "VersionId": "EXAMPLE1-90ab-cdef-fedc-ba987EXAMPLE",
179
- "VersionStages": [
177
+ "CreatedDate":1523477145.713,
178
+ "VersionId":"EXAMPLE1-90ab-cdef-fedc-ba987EXAMPLE",
179
+ "VersionStages":[
180
180
  "AWSPREVIOUS"
181
181
  ]
182
182
  },
183
183
  {
184
- "CreatedDate": 1523486221.391,
185
- "VersionId": "EXAMPLE2-90ab-cdef-fedc-ba987EXAMPLE",
186
- "VersionStages": [
184
+ "CreatedDate":1523486221.391,
185
+ "VersionId":"EXAMPLE2-90ab-cdef-fedc-ba987EXAMPLE",
186
+ "VersionStages":[
187
187
  "AWSCURRENT"
188
188
  ]
189
189
  },
190
190
  {
191
- "CreatedDate": 1511974462.36,
192
- "VersionId": "EXAMPLE3-90ab-cdef-fedc-ba987EXAMPLE;"
191
+ "CreatedDate":1511974462.36,
192
+ "VersionId":"EXAMPLE3-90ab-cdef-fedc-ba987EXAMPLE;"
193
193
  }
194
194
  ]
195
195
  },
196
- "comments": {
197
- "input": {
196
+ "comments":{
197
+ "input":{
198
198
  },
199
- "output": {
199
+ "output":{
200
200
  }
201
201
  },
202
- "description": "The following example shows how to retrieve a list of all of the versions of a secret, including those without any staging labels.",
203
- "id": "to-list-all-of-the-secret-versions-associated-with-a-secret-1524000999164",
204
- "title": "To list all of the secret versions associated with a secret"
202
+ "description":"The following example shows how to retrieve a list of all of the versions of a secret, including those without any staging labels.",
203
+ "id":"to-list-all-of-the-secret-versions-associated-with-a-secret-1524000999164",
204
+ "title":"To list all of the secret versions associated with a secret"
205
205
  }
206
206
  ],
207
- "ListSecrets": [
207
+ "ListSecrets":[
208
208
  {
209
- "input": {
209
+ "input":{
210
210
  },
211
- "output": {
212
- "SecretList": [
211
+ "output":{
212
+ "SecretList":[
213
213
  {
214
- "ARN": "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
215
- "Description": "My test database secret",
216
- "LastChangedDate": 1523477145.729,
217
- "Name": "MyTestDatabaseSecret",
218
- "SecretVersionsToStages": {
219
- "EXAMPLE1-90ab-cdef-fedc-ba987EXAMPLE": [
214
+ "ARN":"arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
215
+ "Description":"My test database secret",
216
+ "LastChangedDate":1523477145.729,
217
+ "Name":"MyTestDatabaseSecret",
218
+ "SecretVersionsToStages":{
219
+ "EXAMPLE1-90ab-cdef-fedc-ba987EXAMPLE":[
220
220
  "AWSCURRENT"
221
221
  ]
222
222
  }
223
223
  },
224
224
  {
225
- "ARN": "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret1-d4e5f6",
226
- "Description": "Another secret created for a different database",
227
- "LastChangedDate": 1523482025.685,
228
- "Name": "MyTestDatabaseSecret1",
229
- "SecretVersionsToStages": {
230
- "EXAMPLE2-90ab-cdef-fedc-ba987EXAMPLE": [
225
+ "ARN":"arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret1-d4e5f6",
226
+ "Description":"Another secret created for a different database",
227
+ "LastChangedDate":1523482025.685,
228
+ "Name":"MyTestDatabaseSecret1",
229
+ "SecretVersionsToStages":{
230
+ "EXAMPLE2-90ab-cdef-fedc-ba987EXAMPLE":[
231
231
  "AWSCURRENT"
232
232
  ]
233
233
  }
234
234
  }
235
235
  ]
236
236
  },
237
- "comments": {
238
- "input": {
237
+ "comments":{
238
+ "input":{
239
239
  },
240
- "output": {
240
+ "output":{
241
241
  }
242
242
  },
243
- "description": "The following example shows how to list all of the secrets in your account.",
244
- "id": "to-list-the-secrets-in-your-account-1524001246087",
245
- "title": "To list the secrets in your account"
243
+ "description":"The following example shows how to list all of the secrets in your account.",
244
+ "id":"to-list-the-secrets-in-your-account-1524001246087",
245
+ "title":"To list the secrets in your account"
246
246
  }
247
247
  ],
248
- "PutSecretValue": [
248
+ "PutSecretValue":[
249
249
  {
250
- "input": {
251
- "ClientRequestToken": "EXAMPLE2-90ab-cdef-fedc-ba987EXAMPLE",
252
- "SecretId": "MyTestDatabaseSecret",
253
- "SecretString": "{\"username\":\"david\",\"password\":\"BnQw!XDWgaEeT9XGTT29\"}"
254
- },
255
- "output": {
256
- "ARN": "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
257
- "Name": "MyTestDatabaseSecret",
258
- "VersionId": "EXAMPLE2-90ab-cdef-fedc-ba987EXAMPLE",
259
- "VersionStages": [
250
+ "input":{
251
+ "ClientRequestToken":"EXAMPLE2-90ab-cdef-fedc-ba987EXAMPLE",
252
+ "SecretId":"MyTestDatabaseSecret",
253
+ "SecretString":"{\"username\":\"david\",\"password\":\"BnQw!XDWgaEeT9XGTT29\"}"
254
+ },
255
+ "output":{
256
+ "ARN":"arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
257
+ "Name":"MyTestDatabaseSecret",
258
+ "VersionId":"EXAMPLE2-90ab-cdef-fedc-ba987EXAMPLE",
259
+ "VersionStages":[
260
260
  "AWSCURRENT"
261
261
  ]
262
262
  },
263
- "comments": {
264
- "input": {
263
+ "comments":{
264
+ "input":{
265
265
  },
266
- "output": {
266
+ "output":{
267
267
  }
268
268
  },
269
- "description": "The following example shows how to create a new version of the secret. Alternatively, you can use the update-secret command.",
270
- "id": "to-store-a-secret-value-in-a-new-version-of-a-secret-1524001393971",
271
- "title": "To store a secret value in a new version of a secret"
269
+ "description":"The following example shows how to create a new version of the secret. Alternatively, you can use the update-secret command.",
270
+ "id":"to-store-a-secret-value-in-a-new-version-of-a-secret-1524001393971",
271
+ "title":"To store a secret value in a new version of a secret"
272
272
  }
273
273
  ],
274
- "RestoreSecret": [
274
+ "RestoreSecret":[
275
275
  {
276
- "input": {
277
- "SecretId": "MyTestDatabaseSecret"
276
+ "input":{
277
+ "SecretId":"MyTestDatabaseSecret"
278
278
  },
279
- "output": {
280
- "ARN": "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
281
- "Name": "MyTestDatabaseSecret"
279
+ "output":{
280
+ "ARN":"arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
281
+ "Name":"MyTestDatabaseSecret"
282
282
  },
283
- "comments": {
284
- "input": {
283
+ "comments":{
284
+ "input":{
285
285
  },
286
- "output": {
286
+ "output":{
287
287
  }
288
288
  },
289
- "description": "The following example shows how to restore a secret that you previously scheduled for deletion.",
290
- "id": "to-restore-a-previously-deleted-secret-1524001513930",
291
- "title": "To restore a previously deleted secret"
289
+ "description":"The following example shows how to restore a secret that you previously scheduled for deletion.",
290
+ "id":"to-restore-a-previously-deleted-secret-1524001513930",
291
+ "title":"To restore a previously deleted secret"
292
292
  }
293
293
  ],
294
- "RotateSecret": [
294
+ "RotateSecret":[
295
295
  {
296
- "input": {
297
- "RotationLambdaARN": "arn:aws:lambda:us-west-2:123456789012:function:MyTestDatabaseRotationLambda",
298
- "RotationRules": {
299
- "AutomaticallyAfterDays": 30
296
+ "input":{
297
+ "RotationLambdaARN":"arn:aws:lambda:us-west-2:123456789012:function:MyTestDatabaseRotationLambda",
298
+ "RotationRules":{
299
+ "AutomaticallyAfterDays":30
300
300
  },
301
- "SecretId": "MyTestDatabaseSecret"
301
+ "SecretId":"MyTestDatabaseSecret"
302
302
  },
303
- "output": {
304
- "ARN": "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
305
- "Name": "MyTestDatabaseSecret",
306
- "VersionId": "EXAMPLE2-90ab-cdef-fedc-ba987SECRET2"
303
+ "output":{
304
+ "ARN":"arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
305
+ "Name":"MyTestDatabaseSecret",
306
+ "VersionId":"EXAMPLE2-90ab-cdef-fedc-ba987SECRET2"
307
307
  },
308
- "comments": {
309
- "input": {
308
+ "comments":{
309
+ "input":{
310
310
  },
311
- "output": {
311
+ "output":{
312
312
  }
313
313
  },
314
- "description": "The following example configures rotation for a secret by providing the ARN of a Lambda rotation function (which must already exist) and the number of days between rotation. The first rotation happens immediately upon completion of this command. The rotation function runs asynchronously in the background.",
315
- "id": "to-configure-rotation-for-a-secret-1524001629475",
316
- "title": "To configure rotation for a secret"
314
+ "description":"The following example configures rotation for a secret by providing the ARN of a Lambda rotation function (which must already exist) and the number of days between rotation. The first rotation happens immediately upon completion of this command. The rotation function runs asynchronously in the background.",
315
+ "id":"to-configure-rotation-for-a-secret-1524001629475",
316
+ "title":"To configure rotation for a secret"
317
317
  },
318
318
  {
319
- "input": {
320
- "SecretId": "MyTestDatabaseSecret"
319
+ "input":{
320
+ "SecretId":"MyTestDatabaseSecret"
321
321
  },
322
- "output": {
323
- "SecretARN": "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
324
- "SecretName": "MyTestDatabaseSecret",
325
- "SecretVersionId": "EXAMPLE2-90ab-cdef-fedc-ba987SECRET2"
322
+ "output":{
323
+ "SecretARN":"arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
324
+ "SecretName":"MyTestDatabaseSecret",
325
+ "SecretVersionId":"EXAMPLE2-90ab-cdef-fedc-ba987SECRET2"
326
326
  },
327
- "comments": {
328
- "input": {
327
+ "comments":{
328
+ "input":{
329
329
  },
330
- "output": {
330
+ "output":{
331
331
  }
332
332
  },
333
- "description": "The following example requests an immediate invocation of the secret's Lambda rotation function. It assumes that the specified secret already has rotation configured. The rotation function runs asynchronously in the background.",
334
- "id": "to-request-an-immediate-rotation-for-a-secret-1524001949004",
335
- "title": "To request an immediate rotation for a secret"
333
+ "description":"The following example requests an immediate invocation of the secret's Lambda rotation function. It assumes that the specified secret already has rotation configured. The rotation function runs asynchronously in the background.",
334
+ "id":"to-request-an-immediate-rotation-for-a-secret-1524001949004",
335
+ "title":"To request an immediate rotation for a secret"
336
336
  }
337
337
  ],
338
- "TagResource": [
338
+ "TagResource":[
339
339
  {
340
- "input": {
341
- "SecretId": "MyExampleSecret",
342
- "Tags": [
340
+ "input":{
341
+ "SecretId":"MyExampleSecret",
342
+ "Tags":[
343
343
  {
344
- "Key": "FirstTag",
345
- "Value": "SomeValue"
344
+ "Key":"FirstTag",
345
+ "Value":"SomeValue"
346
346
  },
347
347
  {
348
- "Key": "SecondTag",
349
- "Value": "AnotherValue"
348
+ "Key":"SecondTag",
349
+ "Value":"AnotherValue"
350
350
  }
351
351
  ]
352
352
  },
353
- "comments": {
354
- "input": {
353
+ "comments":{
354
+ "input":{
355
355
  },
356
- "output": {
356
+ "output":{
357
357
  }
358
358
  },
359
- "description": "The following example shows how to attach two tags each with a Key and Value to a secret. There is no output from this API. To see the result, use the DescribeSecret operation.",
360
- "id": "to-add-tags-to-a-secret-1524002106718",
361
- "title": "To add tags to a secret"
359
+ "description":"The following example shows how to attach two tags each with a Key and Value to a secret. There is no output from this API. To see the result, use the DescribeSecret operation.",
360
+ "id":"to-add-tags-to-a-secret-1524002106718",
361
+ "title":"To add tags to a secret"
362
362
  }
363
363
  ],
364
- "UntagResource": [
364
+ "UntagResource":[
365
365
  {
366
- "input": {
367
- "SecretId": "MyTestDatabaseSecret",
368
- "TagKeys": [
366
+ "input":{
367
+ "SecretId":"MyTestDatabaseSecret",
368
+ "TagKeys":[
369
369
  "FirstTag",
370
370
  "SecondTag"
371
371
  ]
372
372
  },
373
- "comments": {
374
- "input": {
373
+ "comments":{
374
+ "input":{
375
375
  },
376
- "output": {
376
+ "output":{
377
377
  }
378
378
  },
379
- "description": "The following example shows how to remove two tags from a secret's metadata. For each, both the tag and the associated value are removed. There is no output from this API. To see the result, use the DescribeSecret operation.",
380
- "id": "to-remove-tags-from-a-secret-1524002239065",
381
- "title": "To remove tags from a secret"
379
+ "description":"The following example shows how to remove two tags from a secret's metadata. For each, both the tag and the associated value are removed. There is no output from this API. To see the result, use the DescribeSecret operation.",
380
+ "id":"to-remove-tags-from-a-secret-1524002239065",
381
+ "title":"To remove tags from a secret"
382
382
  }
383
383
  ],
384
- "UpdateSecret": [
384
+ "UpdateSecret":[
385
385
  {
386
- "input": {
387
- "ClientRequestToken": "EXAMPLE1-90ab-cdef-fedc-ba987EXAMPLE",
388
- "Description": "This is a new description for the secret.",
389
- "SecretId": "MyTestDatabaseSecret"
386
+ "input":{
387
+ "ClientRequestToken":"EXAMPLE1-90ab-cdef-fedc-ba987EXAMPLE",
388
+ "Description":"This is a new description for the secret.",
389
+ "SecretId":"MyTestDatabaseSecret"
390
390
  },
391
- "output": {
392
- "ARN": "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
393
- "Name": "MyTestDatabaseSecret"
391
+ "output":{
392
+ "ARN":"arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
393
+ "Name":"MyTestDatabaseSecret"
394
394
  },
395
- "comments": {
396
- "input": {
395
+ "comments":{
396
+ "input":{
397
397
  },
398
- "output": {
398
+ "output":{
399
399
  }
400
400
  },
401
- "description": "The following example shows how to modify the description of a secret.",
402
- "id": "to-update-the-description-of-a-secret-1524002349094",
403
- "title": "To update the description of a secret"
401
+ "description":"The following example shows how to modify the description of a secret.",
402
+ "id":"to-update-the-description-of-a-secret-1524002349094",
403
+ "title":"To update the description of a secret"
404
404
  },
405
405
  {
406
- "input": {
407
- "KmsKeyId": "arn:aws:kms:us-west-2:123456789012:key/EXAMPLE2-90ab-cdef-fedc-ba987EXAMPLE",
408
- "SecretId": "MyTestDatabaseSecret"
406
+ "input":{
407
+ "KmsKeyId":"arn:aws:kms:us-west-2:123456789012:key/EXAMPLE2-90ab-cdef-fedc-ba987EXAMPLE",
408
+ "SecretId":"MyTestDatabaseSecret"
409
409
  },
410
- "output": {
411
- "ARN": "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
412
- "Name": "MyTestDatabaseSecret"
410
+ "output":{
411
+ "ARN":"arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
412
+ "Name":"MyTestDatabaseSecret"
413
413
  },
414
- "comments": {
415
- "input": {
414
+ "comments":{
415
+ "input":{
416
416
  },
417
- "output": {
417
+ "output":{
418
418
  }
419
419
  },
420
- "description": "This example shows how to update the KMS customer managed key (CMK) used to encrypt the secret value. The KMS CMK must be in the same region as the secret.",
421
- "id": "to-update-the-kms-key-associated-with-a-secret-1524002421563",
422
- "title": "To update the KMS key associated with a secret"
420
+ "description":"This example shows how to update the KMS customer managed key (CMK) used to encrypt the secret value. The KMS CMK must be in the same region as the secret.",
421
+ "id":"to-update-the-kms-key-associated-with-a-secret-1524002421563",
422
+ "title":"To update the KMS key associated with a secret"
423
423
  },
424
424
  {
425
- "input": {
426
- "SecretId": "MyTestDatabaseSecret",
427
- "SecretString": "{JSON STRING WITH CREDENTIALS}"
425
+ "input":{
426
+ "SecretId":"MyTestDatabaseSecret",
427
+ "SecretString":"{JSON STRING WITH CREDENTIALS}"
428
428
  },
429
- "output": {
430
- "ARN": "aws:arn:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
431
- "Name": "MyTestDatabaseSecret",
432
- "VersionId": "EXAMPLE1-90ab-cdef-fedc-ba987EXAMPLE"
429
+ "output":{
430
+ "ARN":"aws:arn:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
431
+ "Name":"MyTestDatabaseSecret",
432
+ "VersionId":"EXAMPLE1-90ab-cdef-fedc-ba987EXAMPLE"
433
433
  },
434
- "comments": {
435
- "input": {
434
+ "comments":{
435
+ "input":{
436
436
  },
437
- "output": {
437
+ "output":{
438
438
  }
439
439
  },
440
- "description": "The following example shows how to create a new version of the secret by updating the SecretString field. Alternatively, you can use the put-secret-value operation.",
441
- "id": "to-create-a-new-version-of-the-encrypted-secret-value-1524004651836",
442
- "title": "To create a new version of the encrypted secret value"
440
+ "description":"The following example shows how to create a new version of the secret by updating the SecretString field. Alternatively, you can use the put-secret-value operation.",
441
+ "id":"to-create-a-new-version-of-the-encrypted-secret-value-1524004651836",
442
+ "title":"To create a new version of the encrypted secret value"
443
443
  }
444
444
  ],
445
- "UpdateSecretVersionStage": [
445
+ "UpdateSecretVersionStage":[
446
446
  {
447
- "input": {
448
- "MoveToVersionId": "EXAMPLE1-90ab-cdef-fedc-ba987SECRET1",
449
- "SecretId": "MyTestDatabaseSecret",
450
- "VersionStage": "STAGINGLABEL1"
447
+ "input":{
448
+ "MoveToVersionId":"EXAMPLE1-90ab-cdef-fedc-ba987SECRET1",
449
+ "SecretId":"MyTestDatabaseSecret",
450
+ "VersionStage":"STAGINGLABEL1"
451
451
  },
452
- "output": {
453
- "ARN": "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
454
- "Name": "MyTestDatabaseSecret"
452
+ "output":{
453
+ "ARN":"arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
454
+ "Name":"MyTestDatabaseSecret"
455
455
  },
456
- "comments": {
457
- "input": {
456
+ "comments":{
457
+ "input":{
458
458
  },
459
- "output": {
459
+ "output":{
460
460
  }
461
461
  },
462
- "description": "The following example shows you how to add a staging label to a version of a secret. You can review the results by running the operation ListSecretVersionIds and viewing the VersionStages response field for the affected version.",
463
- "id": "to-add-a-staging-label-attached-to-a-version-of-a-secret-1524004783841",
464
- "title": "To add a staging label attached to a version of a secret"
462
+ "description":"The following example shows you how to add a staging label to a version of a secret. You can review the results by running the operation ListSecretVersionIds and viewing the VersionStages response field for the affected version.",
463
+ "id":"to-add-a-staging-label-attached-to-a-version-of-a-secret-1524004783841",
464
+ "title":"To add a staging label attached to a version of a secret"
465
465
  },
466
466
  {
467
- "input": {
468
- "RemoveFromVersionId": "EXAMPLE1-90ab-cdef-fedc-ba987SECRET1",
469
- "SecretId": "MyTestDatabaseSecret",
470
- "VersionStage": "STAGINGLABEL1"
467
+ "input":{
468
+ "RemoveFromVersionId":"EXAMPLE1-90ab-cdef-fedc-ba987SECRET1",
469
+ "SecretId":"MyTestDatabaseSecret",
470
+ "VersionStage":"STAGINGLABEL1"
471
471
  },
472
- "output": {
473
- "ARN": "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
474
- "Name": "MyTestDatabaseSecret"
472
+ "output":{
473
+ "ARN":"arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
474
+ "Name":"MyTestDatabaseSecret"
475
475
  },
476
- "comments": {
477
- "input": {
476
+ "comments":{
477
+ "input":{
478
478
  },
479
- "output": {
479
+ "output":{
480
480
  }
481
481
  },
482
- "description": "The following example shows you how to delete a staging label that is attached to a version of a secret. You can review the results by running the operation ListSecretVersionIds and viewing the VersionStages response field for the affected version.",
483
- "id": "to-delete-a-staging-label-attached-to-a-version-of-a-secret-1524004862181",
484
- "title": "To delete a staging label attached to a version of a secret"
482
+ "description":"The following example shows you how to delete a staging label that is attached to a version of a secret. You can review the results by running the operation ListSecretVersionIds and viewing the VersionStages response field for the affected version.",
483
+ "id":"to-delete-a-staging-label-attached-to-a-version-of-a-secret-1524004862181",
484
+ "title":"To delete a staging label attached to a version of a secret"
485
485
  },
486
486
  {
487
- "input": {
488
- "MoveToVersionId": "EXAMPLE2-90ab-cdef-fedc-ba987SECRET2",
489
- "RemoveFromVersionId": "EXAMPLE1-90ab-cdef-fedc-ba987SECRET1",
490
- "SecretId": "MyTestDatabaseSecret",
491
- "VersionStage": "AWSCURRENT"
492
- },
493
- "output": {
494
- "ARN": "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
495
- "Name": "MyTestDatabaseSecret"
496
- },
497
- "comments": {
498
- "input": {
487
+ "input":{
488
+ "MoveToVersionId":"EXAMPLE2-90ab-cdef-fedc-ba987SECRET2",
489
+ "RemoveFromVersionId":"EXAMPLE1-90ab-cdef-fedc-ba987SECRET1",
490
+ "SecretId":"MyTestDatabaseSecret",
491
+ "VersionStage":"AWSCURRENT"
492
+ },
493
+ "output":{
494
+ "ARN":"arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
495
+ "Name":"MyTestDatabaseSecret"
496
+ },
497
+ "comments":{
498
+ "input":{
499
499
  },
500
- "output": {
500
+ "output":{
501
501
  }
502
502
  },
503
- "description": "The following example shows you how to move a staging label that is attached to one version of a secret to a different version. You can review the results by running the operation ListSecretVersionIds and viewing the VersionStages response field for the affected version.",
504
- "id": "to-move-a-staging-label-from-one-version-of-a-secret-to-another-1524004963841",
505
- "title": "To move a staging label from one version of a secret to another"
503
+ "description":"The following example shows you how to move a staging label that is attached to one version of a secret to a different version. You can review the results by running the operation ListSecretVersionIds and viewing the VersionStages response field for the affected version.",
504
+ "id":"to-move-a-staging-label-from-one-version-of-a-secret-to-another-1524004963841",
505
+ "title":"To move a staging label from one version of a secret to another"
506
506
  }
507
507
  ]
508
508
  }