aws-sdk-secretsmanager 1.45.0 → 1.49.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +258 -0
- data/LICENSE.txt +202 -0
- data/VERSION +1 -0
- data/lib/aws-sdk-secretsmanager/client.rb +189 -170
- data/lib/aws-sdk-secretsmanager/client_api.rb +8 -1
- data/lib/aws-sdk-secretsmanager/errors.rb +1 -1
- data/lib/aws-sdk-secretsmanager/resource.rb +1 -1
- data/lib/aws-sdk-secretsmanager/types.rb +102 -90
- data/lib/aws-sdk-secretsmanager.rb +2 -2
- metadata +12 -10
@@ -3,7 +3,7 @@
|
|
3
3
|
# WARNING ABOUT GENERATED CODE
|
4
4
|
#
|
5
5
|
# This file is generated. See the contributing guide for more information:
|
6
|
-
# https://github.com/aws/aws-sdk-ruby/blob/
|
6
|
+
# https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
|
7
7
|
#
|
8
8
|
# WARNING ABOUT GENERATED CODE
|
9
9
|
|
@@ -55,6 +55,7 @@ module Aws::SecretsManager
|
|
55
55
|
InvalidNextTokenException = Shapes::StructureShape.new(name: 'InvalidNextTokenException')
|
56
56
|
InvalidParameterException = Shapes::StructureShape.new(name: 'InvalidParameterException')
|
57
57
|
InvalidRequestException = Shapes::StructureShape.new(name: 'InvalidRequestException')
|
58
|
+
KmsKeyIdListType = Shapes::ListShape.new(name: 'KmsKeyIdListType')
|
58
59
|
KmsKeyIdType = Shapes::StringShape.new(name: 'KmsKeyIdType')
|
59
60
|
LastAccessedDateType = Shapes::TimestampShape.new(name: 'LastAccessedDateType')
|
60
61
|
LastChangedDateType = Shapes::TimestampShape.new(name: 'LastChangedDateType')
|
@@ -260,6 +261,8 @@ module Aws::SecretsManager
|
|
260
261
|
InvalidRequestException.add_member(:message, Shapes::ShapeRef.new(shape: ErrorMessage, location_name: "Message"))
|
261
262
|
InvalidRequestException.struct_class = Types::InvalidRequestException
|
262
263
|
|
264
|
+
KmsKeyIdListType.member = Shapes::ShapeRef.new(shape: KmsKeyIdType)
|
265
|
+
|
263
266
|
LimitExceededException.add_member(:message, Shapes::ShapeRef.new(shape: ErrorMessage, location_name: "Message"))
|
264
267
|
LimitExceededException.struct_class = Types::LimitExceededException
|
265
268
|
|
@@ -401,6 +404,7 @@ module Aws::SecretsManager
|
|
401
404
|
SecretVersionsListEntry.add_member(:version_stages, Shapes::ShapeRef.new(shape: SecretVersionStagesType, location_name: "VersionStages"))
|
402
405
|
SecretVersionsListEntry.add_member(:last_accessed_date, Shapes::ShapeRef.new(shape: LastAccessedDateType, location_name: "LastAccessedDate", metadata: {"box"=>true}))
|
403
406
|
SecretVersionsListEntry.add_member(:created_date, Shapes::ShapeRef.new(shape: CreatedDateType, location_name: "CreatedDate", metadata: {"box"=>true}))
|
407
|
+
SecretVersionsListEntry.add_member(:kms_key_ids, Shapes::ShapeRef.new(shape: KmsKeyIdListType, location_name: "KmsKeyIds"))
|
404
408
|
SecretVersionsListEntry.struct_class = Types::SecretVersionsListEntry
|
405
409
|
|
406
410
|
SecretVersionsListType.member = Shapes::ShapeRef.new(shape: SecretVersionsListEntry)
|
@@ -547,6 +551,7 @@ module Aws::SecretsManager
|
|
547
551
|
o.output = Shapes::ShapeRef.new(shape: DescribeSecretResponse)
|
548
552
|
o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
|
549
553
|
o.errors << Shapes::ShapeRef.new(shape: InternalServiceError)
|
554
|
+
o.errors << Shapes::ShapeRef.new(shape: InvalidParameterException)
|
550
555
|
end)
|
551
556
|
|
552
557
|
api.add_operation(:get_random_password, Seahorse::Model::Operation.new.tap do |o|
|
@@ -569,6 +574,7 @@ module Aws::SecretsManager
|
|
569
574
|
o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
|
570
575
|
o.errors << Shapes::ShapeRef.new(shape: InternalServiceError)
|
571
576
|
o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
|
577
|
+
o.errors << Shapes::ShapeRef.new(shape: InvalidParameterException)
|
572
578
|
end)
|
573
579
|
|
574
580
|
api.add_operation(:get_secret_value, Seahorse::Model::Operation.new.tap do |o|
|
@@ -593,6 +599,7 @@ module Aws::SecretsManager
|
|
593
599
|
o.errors << Shapes::ShapeRef.new(shape: InvalidNextTokenException)
|
594
600
|
o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
|
595
601
|
o.errors << Shapes::ShapeRef.new(shape: InternalServiceError)
|
602
|
+
o.errors << Shapes::ShapeRef.new(shape: InvalidParameterException)
|
596
603
|
o[:pager] = Aws::Pager.new(
|
597
604
|
limit_key: "max_results",
|
598
605
|
tokens: {
|
@@ -3,7 +3,7 @@
|
|
3
3
|
# WARNING ABOUT GENERATED CODE
|
4
4
|
#
|
5
5
|
# This file is generated. See the contributing guide for more information:
|
6
|
-
# https://github.com/aws/aws-sdk-ruby/blob/
|
6
|
+
# https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
|
7
7
|
#
|
8
8
|
# WARNING ABOUT GENERATED CODE
|
9
9
|
|
@@ -3,7 +3,7 @@
|
|
3
3
|
# WARNING ABOUT GENERATED CODE
|
4
4
|
#
|
5
5
|
# This file is generated. See the contributing guide for more information:
|
6
|
-
# https://github.com/aws/aws-sdk-ruby/blob/
|
6
|
+
# https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
|
7
7
|
#
|
8
8
|
# WARNING ABOUT GENERATED CODE
|
9
9
|
|
@@ -3,7 +3,7 @@
|
|
3
3
|
# WARNING ABOUT GENERATED CODE
|
4
4
|
#
|
5
5
|
# This file is generated. See the contributing guide for more information:
|
6
|
-
# https://github.com/aws/aws-sdk-ruby/blob/
|
6
|
+
# https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
|
7
7
|
#
|
8
8
|
# WARNING ABOUT GENERATED CODE
|
9
9
|
|
@@ -125,13 +125,14 @@ module Aws::SecretsManager
|
|
125
125
|
# initial version is created as part of the secret, and this parameter
|
126
126
|
# specifies a unique identifier for the new version.
|
127
127
|
#
|
128
|
-
# <note markdown="1"> If you use the
|
129
|
-
#
|
130
|
-
#
|
131
|
-
#
|
132
|
-
#
|
133
|
-
#
|
134
|
-
#
|
128
|
+
# <note markdown="1"> If you use the Amazon Web Services CLI or one of the Amazon Web
|
129
|
+
# Services SDK to call this operation, then you can leave this
|
130
|
+
# parameter empty. The CLI or SDK generates a random UUID for you and
|
131
|
+
# includes it as the value for this parameter in the request. If you
|
132
|
+
# don't use the SDK and instead generate a raw HTTP request to the
|
133
|
+
# Secrets Manager service endpoint, then you must generate a
|
134
|
+
# `ClientRequestToken` yourself for the new version and include the
|
135
|
+
# value in the request.
|
135
136
|
#
|
136
137
|
# </note>
|
137
138
|
#
|
@@ -169,20 +170,21 @@ module Aws::SecretsManager
|
|
169
170
|
# @return [String]
|
170
171
|
#
|
171
172
|
# @!attribute [rw] kms_key_id
|
172
|
-
# (Optional) Specifies the ARN, Key ID, or alias of the
|
173
|
-
# customer master key (CMK) to be used to encrypt the
|
174
|
-
# or `SecretBinary` values in the versions stored in
|
173
|
+
# (Optional) Specifies the ARN, Key ID, or alias of the Amazon Web
|
174
|
+
# Services KMS customer master key (CMK) to be used to encrypt the
|
175
|
+
# `SecretString` or `SecretBinary` values in the versions stored in
|
176
|
+
# this secret.
|
175
177
|
#
|
176
|
-
# You can specify any of the supported ways to identify a
|
177
|
-
# ID. If you need to reference a CMK in a different
|
178
|
-
# use only the key ARN or the alias ARN.
|
178
|
+
# You can specify any of the supported ways to identify a Amazon Web
|
179
|
+
# Services KMS key ID. If you need to reference a CMK in a different
|
180
|
+
# account, you can use only the key ARN or the alias ARN.
|
179
181
|
#
|
180
182
|
# If you don't specify this value, then Secrets Manager defaults to
|
181
|
-
# using the
|
182
|
-
# `aws/secretsmanager`). If a
|
183
|
-
# exist, then Secrets Manager creates it for you
|
184
|
-
# first time it needs to encrypt a version's
|
185
|
-
# `SecretBinary` fields.
|
183
|
+
# using the Amazon Web Services account's default CMK (the one named
|
184
|
+
# `aws/secretsmanager`). If a Amazon Web Services KMS CMK with that
|
185
|
+
# name doesn't yet exist, then Secrets Manager creates it for you
|
186
|
+
# automatically the first time it needs to encrypt a version's
|
187
|
+
# `SecretString` or `SecretBinary` fields.
|
186
188
|
#
|
187
189
|
# You can use the account default CMK to encrypt and decrypt only if
|
188
190
|
# you call this operation using credentials from the same account that
|
@@ -201,7 +203,8 @@ module Aws::SecretsManager
|
|
201
203
|
# both. They cannot both be empty.
|
202
204
|
#
|
203
205
|
# This parameter is not available using the Secrets Manager console.
|
204
|
-
# It can be accessed only by using the
|
206
|
+
# It can be accessed only by using the Amazon Web Services CLI or one
|
207
|
+
# of the Amazon Web Services SDKs.
|
205
208
|
# @return [String]
|
206
209
|
#
|
207
210
|
# @!attribute [rw] secret_string
|
@@ -220,8 +223,8 @@ module Aws::SecretsManager
|
|
220
223
|
# For storing multiple values, we recommend that you use a JSON text
|
221
224
|
# string argument and specify key/value pairs. For information on how
|
222
225
|
# to format a JSON parameter for the various command line tool
|
223
|
-
# environments, see [Using JSON for Parameters][1] in the *
|
224
|
-
#
|
226
|
+
# environments, see [Using JSON for Parameters][1] in the *CLI User
|
227
|
+
# Guide*. For example:
|
225
228
|
#
|
226
229
|
# `\{"username":"bob","password":"abc123xyz456"\}`
|
227
230
|
#
|
@@ -251,8 +254,8 @@ module Aws::SecretsManager
|
|
251
254
|
#
|
252
255
|
# This parameter requires a JSON text string argument. For information
|
253
256
|
# on how to format a JSON parameter for the various command line tool
|
254
|
-
# environments, see [Using JSON for Parameters][1] in the *
|
255
|
-
#
|
257
|
+
# environments, see [Using JSON for Parameters][1] in the *CLI User
|
258
|
+
# Guide*. For example:
|
256
259
|
#
|
257
260
|
# `[\{"Key":"CostCenter","Value":"12345"\},\{"Key":"environment","Value":"production"\}]`
|
258
261
|
#
|
@@ -271,9 +274,9 @@ module Aws::SecretsManager
|
|
271
274
|
# * Tag keys and values are case sensitive.
|
272
275
|
#
|
273
276
|
# * Do not use the `aws:` prefix in your tag names or values because
|
274
|
-
#
|
275
|
-
# or
|
276
|
-
# against your tags per secret limit.
|
277
|
+
# Amazon Web Services reserves it for Amazon Web Services use. You
|
278
|
+
# can't edit or delete tag names or values with this prefix. Tags
|
279
|
+
# with this prefix do not count against your tags per secret limit.
|
277
280
|
#
|
278
281
|
# * If you use your tagging schema across multiple services and
|
279
282
|
# resources, remember other services might have restrictions on
|
@@ -486,10 +489,10 @@ module Aws::SecretsManager
|
|
486
489
|
#
|
487
490
|
# Use this parameter with caution. This parameter causes the operation
|
488
491
|
# to skip the normal waiting period before the permanent deletion that
|
489
|
-
#
|
490
|
-
# If you delete a secret with the
|
491
|
-
# parameter, then you have no opportunity
|
492
|
-
# lose the secret permanently.
|
492
|
+
# Amazon Web Services would normally impose with the
|
493
|
+
# `RecoveryWindowInDays` parameter. If you delete a secret with the
|
494
|
+
# `ForceDeleteWithouRecovery` parameter, then you have no opportunity
|
495
|
+
# to recover the secret. You lose the secret permanently.
|
493
496
|
#
|
494
497
|
# If you use this parameter and include a previously deleted or
|
495
498
|
# nonexistent secret, the operation does not return the error
|
@@ -587,11 +590,12 @@ module Aws::SecretsManager
|
|
587
590
|
# @return [String]
|
588
591
|
#
|
589
592
|
# @!attribute [rw] kms_key_id
|
590
|
-
# The ARN or alias of the
|
591
|
-
# used to encrypt the `SecretString` or `SecretBinary`
|
592
|
-
# version of the secret. If you don't provide a key,
|
593
|
-
# Manager defaults to encrypting the secret fields with
|
594
|
-
#
|
593
|
+
# The ARN or alias of the Amazon Web Services KMS customer master key
|
594
|
+
# (CMK) that's used to encrypt the `SecretString` or `SecretBinary`
|
595
|
+
# fields in each version of the secret. If you don't provide a key,
|
596
|
+
# then Secrets Manager defaults to encrypting the secret fields with
|
597
|
+
# the default Amazon Web Services KMS CMK (the one named
|
598
|
+
# `awssecretsmanager`) for this account.
|
595
599
|
# @return [String]
|
596
600
|
#
|
597
601
|
# @!attribute [rw] rotation_enabled
|
@@ -907,8 +911,9 @@ module Aws::SecretsManager
|
|
907
911
|
# with any permissions that are associated with the user or role that
|
908
912
|
# attempts to access this secret. The combined permissions specify who
|
909
913
|
# can access the secret and what actions they can perform. For more
|
910
|
-
# information, see [Authentication and Access Control for
|
911
|
-
# Manager][1] in the *
|
914
|
+
# information, see [Authentication and Access Control for Amazon Web
|
915
|
+
# Services Secrets Manager][1] in the *Amazon Web Services Secrets
|
916
|
+
# Manager User Guide*.
|
912
917
|
#
|
913
918
|
#
|
914
919
|
#
|
@@ -1426,11 +1431,11 @@ module Aws::SecretsManager
|
|
1426
1431
|
#
|
1427
1432
|
# @!attribute [rw] resource_policy
|
1428
1433
|
# A JSON-formatted string constructed according to the grammar and
|
1429
|
-
# syntax for an
|
1430
|
-
# identifies who can access or manage this secret and
|
1431
|
-
# For information on how to format a JSON parameter for
|
1432
|
-
# command line tool environments, see [Using JSON for
|
1433
|
-
# in the *
|
1434
|
+
# syntax for an Amazon Web Services resource-based policy. The policy
|
1435
|
+
# in the string identifies who can access or manage this secret and
|
1436
|
+
# its versions. For information on how to format a JSON parameter for
|
1437
|
+
# the various command line tool environments, see [Using JSON for
|
1438
|
+
# Parameters][1] in the *CLI User Guide*.
|
1434
1439
|
#
|
1435
1440
|
#
|
1436
1441
|
#
|
@@ -1514,13 +1519,13 @@ module Aws::SecretsManager
|
|
1514
1519
|
# (Optional) Specifies a unique identifier for the new version of the
|
1515
1520
|
# secret.
|
1516
1521
|
#
|
1517
|
-
# <note markdown="1"> If you use the
|
1518
|
-
#
|
1519
|
-
#
|
1520
|
-
#
|
1521
|
-
#
|
1522
|
-
# `ClientRequestToken` yourself for new
|
1523
|
-
# value in the request.
|
1522
|
+
# <note markdown="1"> If you use the Amazon Web Services CLI or one of the Amazon Web
|
1523
|
+
# Services SDK to call this operation, then you can leave this
|
1524
|
+
# parameter empty. The CLI or SDK generates a random UUID for you and
|
1525
|
+
# includes that in the request. If you don't use the SDK and instead
|
1526
|
+
# generate a raw HTTP request to the Secrets Manager service endpoint,
|
1527
|
+
# then you must generate a `ClientRequestToken` yourself for new
|
1528
|
+
# versions and include that value in the request.
|
1524
1529
|
#
|
1525
1530
|
# </note>
|
1526
1531
|
#
|
@@ -1582,8 +1587,8 @@ module Aws::SecretsManager
|
|
1582
1587
|
# For storing multiple values, we recommend that you use a JSON text
|
1583
1588
|
# string argument and specify key/value pairs. For information on how
|
1584
1589
|
# to format a JSON parameter for the various command line tool
|
1585
|
-
# environments, see [Using JSON for Parameters][1] in the *
|
1586
|
-
#
|
1590
|
+
# environments, see [Using JSON for Parameters][1] in the *CLI User
|
1591
|
+
# Guide*.
|
1587
1592
|
#
|
1588
1593
|
# For example:
|
1589
1594
|
#
|
@@ -1952,13 +1957,14 @@ module Aws::SecretsManager
|
|
1952
1957
|
# (Optional) Specifies a unique identifier for the new version of the
|
1953
1958
|
# secret that helps ensure idempotency.
|
1954
1959
|
#
|
1955
|
-
# If you use the
|
1956
|
-
#
|
1957
|
-
#
|
1958
|
-
# parameter. If you don't use
|
1959
|
-
#
|
1960
|
-
#
|
1961
|
-
#
|
1960
|
+
# If you use the Amazon Web Services CLI or one of the Amazon Web
|
1961
|
+
# Services SDK to call this operation, then you can leave this
|
1962
|
+
# parameter empty. The CLI or SDK generates a random UUID for you and
|
1963
|
+
# includes that in the request for this parameter. If you don't use
|
1964
|
+
# the SDK and instead generate a raw HTTP request to the Secrets
|
1965
|
+
# Manager service endpoint, then you must generate a
|
1966
|
+
# `ClientRequestToken` yourself for new versions and include that
|
1967
|
+
# value in the request.
|
1962
1968
|
#
|
1963
1969
|
# You only need to specify your own value if you implement your own
|
1964
1970
|
# retry logic and want to ensure that a given secret is not created
|
@@ -2059,7 +2065,8 @@ module Aws::SecretsManager
|
|
2059
2065
|
# The Amazon Resource Name (ARN) of the secret.
|
2060
2066
|
#
|
2061
2067
|
# For more information about ARNs in Secrets Manager, see [Policy
|
2062
|
-
# Resources][1] in the *
|
2068
|
+
# Resources][1] in the *Amazon Web Services Secrets Manager User
|
2069
|
+
# Guide*.
|
2063
2070
|
#
|
2064
2071
|
#
|
2065
2072
|
#
|
@@ -2078,11 +2085,12 @@ module Aws::SecretsManager
|
|
2078
2085
|
# @return [String]
|
2079
2086
|
#
|
2080
2087
|
# @!attribute [rw] kms_key_id
|
2081
|
-
# The ARN or alias of the
|
2082
|
-
# encrypt the `SecretString` and `SecretBinary` fields
|
2083
|
-
# of the secret. If you don't provide a key, then
|
2084
|
-
# defaults to encrypting the secret fields with the
|
2085
|
-
# the key named `awssecretsmanager`, for this
|
2088
|
+
# The ARN or alias of the Amazon Web Services KMS customer master key
|
2089
|
+
# (CMK) used to encrypt the `SecretString` and `SecretBinary` fields
|
2090
|
+
# in each version of the secret. If you don't provide a key, then
|
2091
|
+
# Secrets Manager defaults to encrypting the secret fields with the
|
2092
|
+
# default KMS CMK, the key named `awssecretsmanager`, for this
|
2093
|
+
# account.
|
2086
2094
|
# @return [String]
|
2087
2095
|
#
|
2088
2096
|
# @!attribute [rw] rotation_enabled
|
@@ -2091,9 +2099,9 @@ module Aws::SecretsManager
|
|
2091
2099
|
# @return [Boolean]
|
2092
2100
|
#
|
2093
2101
|
# @!attribute [rw] rotation_lambda_arn
|
2094
|
-
# The ARN of an
|
2095
|
-
# rotate and expire the secret either automatically per the
|
2096
|
-
# or manually by a call to RotateSecret.
|
2102
|
+
# The ARN of an Amazon Web Services Lambda function invoked by Secrets
|
2103
|
+
# Manager to rotate and expire the secret either automatically per the
|
2104
|
+
# schedule or manually by a call to RotateSecret.
|
2097
2105
|
# @return [String]
|
2098
2106
|
#
|
2099
2107
|
# @!attribute [rw] rotation_rules
|
@@ -2198,13 +2206,18 @@ module Aws::SecretsManager
|
|
2198
2206
|
# The date and time this version of the secret was created.
|
2199
2207
|
# @return [Time]
|
2200
2208
|
#
|
2209
|
+
# @!attribute [rw] kms_key_ids
|
2210
|
+
# The KMS keys used to encrypt the secret version.
|
2211
|
+
# @return [Array<String>]
|
2212
|
+
#
|
2201
2213
|
# @see http://docs.aws.amazon.com/goto/WebAPI/secretsmanager-2017-10-17/SecretVersionsListEntry AWS API Documentation
|
2202
2214
|
#
|
2203
2215
|
class SecretVersionsListEntry < Struct.new(
|
2204
2216
|
:version_id,
|
2205
2217
|
:version_stages,
|
2206
2218
|
:last_accessed_date,
|
2207
|
-
:created_date
|
2219
|
+
:created_date,
|
2220
|
+
:kms_key_ids)
|
2208
2221
|
SENSITIVE = []
|
2209
2222
|
include Aws::Structure
|
2210
2223
|
end
|
@@ -2317,9 +2330,8 @@ module Aws::SecretsManager
|
|
2317
2330
|
# This parameter to the API requires a JSON text string argument. For
|
2318
2331
|
# information on how to format a JSON parameter for the various
|
2319
2332
|
# command line tool environments, see [Using JSON for Parameters][1]
|
2320
|
-
# in the *
|
2321
|
-
#
|
2322
|
-
# Key="Key2",Value="Value2"[,…]`
|
2333
|
+
# in the *CLI User Guide*. For the CLI, you can also use the syntax:
|
2334
|
+
# `--Tags Key="Key1",Value="Value1" Key="Key2",Value="Value2"[,…]`
|
2323
2335
|
#
|
2324
2336
|
#
|
2325
2337
|
#
|
@@ -2379,7 +2391,7 @@ module Aws::SecretsManager
|
|
2379
2391
|
# This parameter to the API requires a JSON text string argument. For
|
2380
2392
|
# information on how to format a JSON parameter for the various
|
2381
2393
|
# command line tool environments, see [Using JSON for Parameters][1]
|
2382
|
-
# in the *
|
2394
|
+
# in the *CLI User Guide*.
|
2383
2395
|
#
|
2384
2396
|
#
|
2385
2397
|
#
|
@@ -2440,13 +2452,13 @@ module Aws::SecretsManager
|
|
2440
2452
|
# parameter specifies a unique identifier for the new version that
|
2441
2453
|
# helps ensure idempotency.
|
2442
2454
|
#
|
2443
|
-
# If you use the
|
2444
|
-
#
|
2445
|
-
#
|
2446
|
-
#
|
2447
|
-
#
|
2448
|
-
# `ClientRequestToken` yourself for new
|
2449
|
-
# value in the request.
|
2455
|
+
# If you use the Amazon Web Services CLI or one of the Amazon Web
|
2456
|
+
# Services SDK to call this operation, then you can leave this
|
2457
|
+
# parameter empty. The CLI or SDK generates a random UUID for you and
|
2458
|
+
# includes that in the request. If you don't use the SDK and instead
|
2459
|
+
# generate a raw HTTP request to the Secrets Manager service endpoint,
|
2460
|
+
# then you must generate a `ClientRequestToken` yourself for new
|
2461
|
+
# versions and include that value in the request.
|
2450
2462
|
#
|
2451
2463
|
# You typically only need to interact with this value if you implement
|
2452
2464
|
# your own retry logic and want to ensure that a given secret is not
|
@@ -2486,9 +2498,9 @@ module Aws::SecretsManager
|
|
2486
2498
|
# @return [String]
|
2487
2499
|
#
|
2488
2500
|
# @!attribute [rw] kms_key_id
|
2489
|
-
# (Optional) Specifies an updated ARN or alias of the
|
2490
|
-
# master key (CMK) to be used to encrypt the
|
2491
|
-
# versions of this secret.
|
2501
|
+
# (Optional) Specifies an updated ARN or alias of the Amazon Web
|
2502
|
+
# Services KMS customer master key (CMK) to be used to encrypt the
|
2503
|
+
# protected text in new versions of this secret.
|
2492
2504
|
#
|
2493
2505
|
# You can only use the account's default CMK to encrypt and decrypt
|
2494
2506
|
# if you call this operation using credentials from the same account
|
@@ -2525,8 +2537,8 @@ module Aws::SecretsManager
|
|
2525
2537
|
# For storing multiple values, we recommend that you use a JSON text
|
2526
2538
|
# string argument and specify key/value pairs. For information on how
|
2527
2539
|
# to format a JSON parameter for the various command line tool
|
2528
|
-
# environments, see [Using JSON for Parameters][1] in the *
|
2529
|
-
#
|
2540
|
+
# environments, see [Using JSON for Parameters][1] in the *CLI User
|
2541
|
+
# Guide*. For example:
|
2530
2542
|
#
|
2531
2543
|
# `[\{"username":"bob"\},\{"password":"abc123xyz456"\}]`
|
2532
2544
|
#
|
@@ -2718,11 +2730,11 @@ module Aws::SecretsManager
|
|
2718
2730
|
#
|
2719
2731
|
# @!attribute [rw] resource_policy
|
2720
2732
|
# A JSON-formatted string constructed according to the grammar and
|
2721
|
-
# syntax for an
|
2722
|
-
# identifies who can access or manage this secret and
|
2723
|
-
# For information on how to format a JSON parameter for
|
2724
|
-
# command line tool environments, see [Using JSON for
|
2725
|
-
# in the *
|
2733
|
+
# syntax for an Amazon Web Services resource-based policy. The policy
|
2734
|
+
# in the string identifies who can access or manage this secret and
|
2735
|
+
# its versions. For information on how to format a JSON parameter for
|
2736
|
+
# the various command line tool environments, see [Using JSON for
|
2737
|
+
# Parameters][1] in the *CLI User Guide*.publi
|
2726
2738
|
#
|
2727
2739
|
#
|
2728
2740
|
#
|
@@ -3,7 +3,7 @@
|
|
3
3
|
# WARNING ABOUT GENERATED CODE
|
4
4
|
#
|
5
5
|
# This file is generated. See the contributing guide for more information:
|
6
|
-
# https://github.com/aws/aws-sdk-ruby/blob/
|
6
|
+
# https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
|
7
7
|
#
|
8
8
|
# WARNING ABOUT GENERATED CODE
|
9
9
|
|
@@ -48,6 +48,6 @@ require_relative 'aws-sdk-secretsmanager/customizations'
|
|
48
48
|
# @!group service
|
49
49
|
module Aws::SecretsManager
|
50
50
|
|
51
|
-
GEM_VERSION = '1.
|
51
|
+
GEM_VERSION = '1.49.0'
|
52
52
|
|
53
53
|
end
|