aws-sdk-secretsmanager 1.45.0 → 1.49.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -3,7 +3,7 @@
3
3
  # WARNING ABOUT GENERATED CODE
4
4
  #
5
5
  # This file is generated. See the contributing guide for more information:
6
- # https://github.com/aws/aws-sdk-ruby/blob/master/CONTRIBUTING.md
6
+ # https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
7
7
  #
8
8
  # WARNING ABOUT GENERATED CODE
9
9
 
@@ -55,6 +55,7 @@ module Aws::SecretsManager
55
55
  InvalidNextTokenException = Shapes::StructureShape.new(name: 'InvalidNextTokenException')
56
56
  InvalidParameterException = Shapes::StructureShape.new(name: 'InvalidParameterException')
57
57
  InvalidRequestException = Shapes::StructureShape.new(name: 'InvalidRequestException')
58
+ KmsKeyIdListType = Shapes::ListShape.new(name: 'KmsKeyIdListType')
58
59
  KmsKeyIdType = Shapes::StringShape.new(name: 'KmsKeyIdType')
59
60
  LastAccessedDateType = Shapes::TimestampShape.new(name: 'LastAccessedDateType')
60
61
  LastChangedDateType = Shapes::TimestampShape.new(name: 'LastChangedDateType')
@@ -260,6 +261,8 @@ module Aws::SecretsManager
260
261
  InvalidRequestException.add_member(:message, Shapes::ShapeRef.new(shape: ErrorMessage, location_name: "Message"))
261
262
  InvalidRequestException.struct_class = Types::InvalidRequestException
262
263
 
264
+ KmsKeyIdListType.member = Shapes::ShapeRef.new(shape: KmsKeyIdType)
265
+
263
266
  LimitExceededException.add_member(:message, Shapes::ShapeRef.new(shape: ErrorMessage, location_name: "Message"))
264
267
  LimitExceededException.struct_class = Types::LimitExceededException
265
268
 
@@ -401,6 +404,7 @@ module Aws::SecretsManager
401
404
  SecretVersionsListEntry.add_member(:version_stages, Shapes::ShapeRef.new(shape: SecretVersionStagesType, location_name: "VersionStages"))
402
405
  SecretVersionsListEntry.add_member(:last_accessed_date, Shapes::ShapeRef.new(shape: LastAccessedDateType, location_name: "LastAccessedDate", metadata: {"box"=>true}))
403
406
  SecretVersionsListEntry.add_member(:created_date, Shapes::ShapeRef.new(shape: CreatedDateType, location_name: "CreatedDate", metadata: {"box"=>true}))
407
+ SecretVersionsListEntry.add_member(:kms_key_ids, Shapes::ShapeRef.new(shape: KmsKeyIdListType, location_name: "KmsKeyIds"))
404
408
  SecretVersionsListEntry.struct_class = Types::SecretVersionsListEntry
405
409
 
406
410
  SecretVersionsListType.member = Shapes::ShapeRef.new(shape: SecretVersionsListEntry)
@@ -547,6 +551,7 @@ module Aws::SecretsManager
547
551
  o.output = Shapes::ShapeRef.new(shape: DescribeSecretResponse)
548
552
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
549
553
  o.errors << Shapes::ShapeRef.new(shape: InternalServiceError)
554
+ o.errors << Shapes::ShapeRef.new(shape: InvalidParameterException)
550
555
  end)
551
556
 
552
557
  api.add_operation(:get_random_password, Seahorse::Model::Operation.new.tap do |o|
@@ -569,6 +574,7 @@ module Aws::SecretsManager
569
574
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
570
575
  o.errors << Shapes::ShapeRef.new(shape: InternalServiceError)
571
576
  o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
577
+ o.errors << Shapes::ShapeRef.new(shape: InvalidParameterException)
572
578
  end)
573
579
 
574
580
  api.add_operation(:get_secret_value, Seahorse::Model::Operation.new.tap do |o|
@@ -593,6 +599,7 @@ module Aws::SecretsManager
593
599
  o.errors << Shapes::ShapeRef.new(shape: InvalidNextTokenException)
594
600
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
595
601
  o.errors << Shapes::ShapeRef.new(shape: InternalServiceError)
602
+ o.errors << Shapes::ShapeRef.new(shape: InvalidParameterException)
596
603
  o[:pager] = Aws::Pager.new(
597
604
  limit_key: "max_results",
598
605
  tokens: {
@@ -3,7 +3,7 @@
3
3
  # WARNING ABOUT GENERATED CODE
4
4
  #
5
5
  # This file is generated. See the contributing guide for more information:
6
- # https://github.com/aws/aws-sdk-ruby/blob/master/CONTRIBUTING.md
6
+ # https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
7
7
  #
8
8
  # WARNING ABOUT GENERATED CODE
9
9
 
@@ -3,7 +3,7 @@
3
3
  # WARNING ABOUT GENERATED CODE
4
4
  #
5
5
  # This file is generated. See the contributing guide for more information:
6
- # https://github.com/aws/aws-sdk-ruby/blob/master/CONTRIBUTING.md
6
+ # https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
7
7
  #
8
8
  # WARNING ABOUT GENERATED CODE
9
9
 
@@ -3,7 +3,7 @@
3
3
  # WARNING ABOUT GENERATED CODE
4
4
  #
5
5
  # This file is generated. See the contributing guide for more information:
6
- # https://github.com/aws/aws-sdk-ruby/blob/master/CONTRIBUTING.md
6
+ # https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
7
7
  #
8
8
  # WARNING ABOUT GENERATED CODE
9
9
 
@@ -125,13 +125,14 @@ module Aws::SecretsManager
125
125
  # initial version is created as part of the secret, and this parameter
126
126
  # specifies a unique identifier for the new version.
127
127
  #
128
- # <note markdown="1"> If you use the AWS CLI or one of the AWS SDK to call this operation,
129
- # then you can leave this parameter empty. The CLI or SDK generates a
130
- # random UUID for you and includes it as the value for this parameter
131
- # in the request. If you don't use the SDK and instead generate a raw
132
- # HTTP request to the Secrets Manager service endpoint, then you must
133
- # generate a `ClientRequestToken` yourself for the new version and
134
- # include the value in the request.
128
+ # <note markdown="1"> If you use the Amazon Web Services CLI or one of the Amazon Web
129
+ # Services SDK to call this operation, then you can leave this
130
+ # parameter empty. The CLI or SDK generates a random UUID for you and
131
+ # includes it as the value for this parameter in the request. If you
132
+ # don't use the SDK and instead generate a raw HTTP request to the
133
+ # Secrets Manager service endpoint, then you must generate a
134
+ # `ClientRequestToken` yourself for the new version and include the
135
+ # value in the request.
135
136
  #
136
137
  # </note>
137
138
  #
@@ -169,20 +170,21 @@ module Aws::SecretsManager
169
170
  # @return [String]
170
171
  #
171
172
  # @!attribute [rw] kms_key_id
172
- # (Optional) Specifies the ARN, Key ID, or alias of the AWS KMS
173
- # customer master key (CMK) to be used to encrypt the `SecretString`
174
- # or `SecretBinary` values in the versions stored in this secret.
173
+ # (Optional) Specifies the ARN, Key ID, or alias of the Amazon Web
174
+ # Services KMS customer master key (CMK) to be used to encrypt the
175
+ # `SecretString` or `SecretBinary` values in the versions stored in
176
+ # this secret.
175
177
  #
176
- # You can specify any of the supported ways to identify a AWS KMS key
177
- # ID. If you need to reference a CMK in a different account, you can
178
- # use only the key ARN or the alias ARN.
178
+ # You can specify any of the supported ways to identify a Amazon Web
179
+ # Services KMS key ID. If you need to reference a CMK in a different
180
+ # account, you can use only the key ARN or the alias ARN.
179
181
  #
180
182
  # If you don't specify this value, then Secrets Manager defaults to
181
- # using the AWS account's default CMK (the one named
182
- # `aws/secretsmanager`). If a AWS KMS CMK with that name doesn't yet
183
- # exist, then Secrets Manager creates it for you automatically the
184
- # first time it needs to encrypt a version's `SecretString` or
185
- # `SecretBinary` fields.
183
+ # using the Amazon Web Services account's default CMK (the one named
184
+ # `aws/secretsmanager`). If a Amazon Web Services KMS CMK with that
185
+ # name doesn't yet exist, then Secrets Manager creates it for you
186
+ # automatically the first time it needs to encrypt a version's
187
+ # `SecretString` or `SecretBinary` fields.
186
188
  #
187
189
  # You can use the account default CMK to encrypt and decrypt only if
188
190
  # you call this operation using credentials from the same account that
@@ -201,7 +203,8 @@ module Aws::SecretsManager
201
203
  # both. They cannot both be empty.
202
204
  #
203
205
  # This parameter is not available using the Secrets Manager console.
204
- # It can be accessed only by using the AWS CLI or one of the AWS SDKs.
206
+ # It can be accessed only by using the Amazon Web Services CLI or one
207
+ # of the Amazon Web Services SDKs.
205
208
  # @return [String]
206
209
  #
207
210
  # @!attribute [rw] secret_string
@@ -220,8 +223,8 @@ module Aws::SecretsManager
220
223
  # For storing multiple values, we recommend that you use a JSON text
221
224
  # string argument and specify key/value pairs. For information on how
222
225
  # to format a JSON parameter for the various command line tool
223
- # environments, see [Using JSON for Parameters][1] in the *AWS CLI
224
- # User Guide*. For example:
226
+ # environments, see [Using JSON for Parameters][1] in the *CLI User
227
+ # Guide*. For example:
225
228
  #
226
229
  # `\{"username":"bob","password":"abc123xyz456"\}`
227
230
  #
@@ -251,8 +254,8 @@ module Aws::SecretsManager
251
254
  #
252
255
  # This parameter requires a JSON text string argument. For information
253
256
  # on how to format a JSON parameter for the various command line tool
254
- # environments, see [Using JSON for Parameters][1] in the *AWS CLI
255
- # User Guide*. For example:
257
+ # environments, see [Using JSON for Parameters][1] in the *CLI User
258
+ # Guide*. For example:
256
259
  #
257
260
  # `[\{"Key":"CostCenter","Value":"12345"\},\{"Key":"environment","Value":"production"\}]`
258
261
  #
@@ -271,9 +274,9 @@ module Aws::SecretsManager
271
274
  # * Tag keys and values are case sensitive.
272
275
  #
273
276
  # * Do not use the `aws:` prefix in your tag names or values because
274
- # AWS reserves it for AWS use. You can't edit or delete tag names
275
- # or values with this prefix. Tags with this prefix do not count
276
- # against your tags per secret limit.
277
+ # Amazon Web Services reserves it for Amazon Web Services use. You
278
+ # can't edit or delete tag names or values with this prefix. Tags
279
+ # with this prefix do not count against your tags per secret limit.
277
280
  #
278
281
  # * If you use your tagging schema across multiple services and
279
282
  # resources, remember other services might have restrictions on
@@ -486,10 +489,10 @@ module Aws::SecretsManager
486
489
  #
487
490
  # Use this parameter with caution. This parameter causes the operation
488
491
  # to skip the normal waiting period before the permanent deletion that
489
- # AWS would normally impose with the `RecoveryWindowInDays` parameter.
490
- # If you delete a secret with the `ForceDeleteWithouRecovery`
491
- # parameter, then you have no opportunity to recover the secret. You
492
- # lose the secret permanently.
492
+ # Amazon Web Services would normally impose with the
493
+ # `RecoveryWindowInDays` parameter. If you delete a secret with the
494
+ # `ForceDeleteWithouRecovery` parameter, then you have no opportunity
495
+ # to recover the secret. You lose the secret permanently.
493
496
  #
494
497
  # If you use this parameter and include a previously deleted or
495
498
  # nonexistent secret, the operation does not return the error
@@ -587,11 +590,12 @@ module Aws::SecretsManager
587
590
  # @return [String]
588
591
  #
589
592
  # @!attribute [rw] kms_key_id
590
- # The ARN or alias of the AWS KMS customer master key (CMK) that's
591
- # used to encrypt the `SecretString` or `SecretBinary` fields in each
592
- # version of the secret. If you don't provide a key, then Secrets
593
- # Manager defaults to encrypting the secret fields with the default
594
- # AWS KMS CMK (the one named `awssecretsmanager`) for this account.
593
+ # The ARN or alias of the Amazon Web Services KMS customer master key
594
+ # (CMK) that's used to encrypt the `SecretString` or `SecretBinary`
595
+ # fields in each version of the secret. If you don't provide a key,
596
+ # then Secrets Manager defaults to encrypting the secret fields with
597
+ # the default Amazon Web Services KMS CMK (the one named
598
+ # `awssecretsmanager`) for this account.
595
599
  # @return [String]
596
600
  #
597
601
  # @!attribute [rw] rotation_enabled
@@ -907,8 +911,9 @@ module Aws::SecretsManager
907
911
  # with any permissions that are associated with the user or role that
908
912
  # attempts to access this secret. The combined permissions specify who
909
913
  # can access the secret and what actions they can perform. For more
910
- # information, see [Authentication and Access Control for AWS Secrets
911
- # Manager][1] in the *AWS Secrets Manager User Guide*.
914
+ # information, see [Authentication and Access Control for Amazon Web
915
+ # Services Secrets Manager][1] in the *Amazon Web Services Secrets
916
+ # Manager User Guide*.
912
917
  #
913
918
  #
914
919
  #
@@ -1426,11 +1431,11 @@ module Aws::SecretsManager
1426
1431
  #
1427
1432
  # @!attribute [rw] resource_policy
1428
1433
  # A JSON-formatted string constructed according to the grammar and
1429
- # syntax for an AWS resource-based policy. The policy in the string
1430
- # identifies who can access or manage this secret and its versions.
1431
- # For information on how to format a JSON parameter for the various
1432
- # command line tool environments, see [Using JSON for Parameters][1]
1433
- # in the *AWS CLI User Guide*.
1434
+ # syntax for an Amazon Web Services resource-based policy. The policy
1435
+ # in the string identifies who can access or manage this secret and
1436
+ # its versions. For information on how to format a JSON parameter for
1437
+ # the various command line tool environments, see [Using JSON for
1438
+ # Parameters][1] in the *CLI User Guide*.
1434
1439
  #
1435
1440
  #
1436
1441
  #
@@ -1514,13 +1519,13 @@ module Aws::SecretsManager
1514
1519
  # (Optional) Specifies a unique identifier for the new version of the
1515
1520
  # secret.
1516
1521
  #
1517
- # <note markdown="1"> If you use the AWS CLI or one of the AWS SDK to call this operation,
1518
- # then you can leave this parameter empty. The CLI or SDK generates a
1519
- # random UUID for you and includes that in the request. If you don't
1520
- # use the SDK and instead generate a raw HTTP request to the Secrets
1521
- # Manager service endpoint, then you must generate a
1522
- # `ClientRequestToken` yourself for new versions and include that
1523
- # value in the request.
1522
+ # <note markdown="1"> If you use the Amazon Web Services CLI or one of the Amazon Web
1523
+ # Services SDK to call this operation, then you can leave this
1524
+ # parameter empty. The CLI or SDK generates a random UUID for you and
1525
+ # includes that in the request. If you don't use the SDK and instead
1526
+ # generate a raw HTTP request to the Secrets Manager service endpoint,
1527
+ # then you must generate a `ClientRequestToken` yourself for new
1528
+ # versions and include that value in the request.
1524
1529
  #
1525
1530
  # </note>
1526
1531
  #
@@ -1582,8 +1587,8 @@ module Aws::SecretsManager
1582
1587
  # For storing multiple values, we recommend that you use a JSON text
1583
1588
  # string argument and specify key/value pairs. For information on how
1584
1589
  # to format a JSON parameter for the various command line tool
1585
- # environments, see [Using JSON for Parameters][1] in the *AWS CLI
1586
- # User Guide*.
1590
+ # environments, see [Using JSON for Parameters][1] in the *CLI User
1591
+ # Guide*.
1587
1592
  #
1588
1593
  # For example:
1589
1594
  #
@@ -1952,13 +1957,14 @@ module Aws::SecretsManager
1952
1957
  # (Optional) Specifies a unique identifier for the new version of the
1953
1958
  # secret that helps ensure idempotency.
1954
1959
  #
1955
- # If you use the AWS CLI or one of the AWS SDK to call this operation,
1956
- # then you can leave this parameter empty. The CLI or SDK generates a
1957
- # random UUID for you and includes that in the request for this
1958
- # parameter. If you don't use the SDK and instead generate a raw HTTP
1959
- # request to the Secrets Manager service endpoint, then you must
1960
- # generate a `ClientRequestToken` yourself for new versions and
1961
- # include that value in the request.
1960
+ # If you use the Amazon Web Services CLI or one of the Amazon Web
1961
+ # Services SDK to call this operation, then you can leave this
1962
+ # parameter empty. The CLI or SDK generates a random UUID for you and
1963
+ # includes that in the request for this parameter. If you don't use
1964
+ # the SDK and instead generate a raw HTTP request to the Secrets
1965
+ # Manager service endpoint, then you must generate a
1966
+ # `ClientRequestToken` yourself for new versions and include that
1967
+ # value in the request.
1962
1968
  #
1963
1969
  # You only need to specify your own value if you implement your own
1964
1970
  # retry logic and want to ensure that a given secret is not created
@@ -2059,7 +2065,8 @@ module Aws::SecretsManager
2059
2065
  # The Amazon Resource Name (ARN) of the secret.
2060
2066
  #
2061
2067
  # For more information about ARNs in Secrets Manager, see [Policy
2062
- # Resources][1] in the *AWS Secrets Manager User Guide*.
2068
+ # Resources][1] in the *Amazon Web Services Secrets Manager User
2069
+ # Guide*.
2063
2070
  #
2064
2071
  #
2065
2072
  #
@@ -2078,11 +2085,12 @@ module Aws::SecretsManager
2078
2085
  # @return [String]
2079
2086
  #
2080
2087
  # @!attribute [rw] kms_key_id
2081
- # The ARN or alias of the AWS KMS customer master key (CMK) used to
2082
- # encrypt the `SecretString` and `SecretBinary` fields in each version
2083
- # of the secret. If you don't provide a key, then Secrets Manager
2084
- # defaults to encrypting the secret fields with the default KMS CMK,
2085
- # the key named `awssecretsmanager`, for this account.
2088
+ # The ARN or alias of the Amazon Web Services KMS customer master key
2089
+ # (CMK) used to encrypt the `SecretString` and `SecretBinary` fields
2090
+ # in each version of the secret. If you don't provide a key, then
2091
+ # Secrets Manager defaults to encrypting the secret fields with the
2092
+ # default KMS CMK, the key named `awssecretsmanager`, for this
2093
+ # account.
2086
2094
  # @return [String]
2087
2095
  #
2088
2096
  # @!attribute [rw] rotation_enabled
@@ -2091,9 +2099,9 @@ module Aws::SecretsManager
2091
2099
  # @return [Boolean]
2092
2100
  #
2093
2101
  # @!attribute [rw] rotation_lambda_arn
2094
- # The ARN of an AWS Lambda function invoked by Secrets Manager to
2095
- # rotate and expire the secret either automatically per the schedule
2096
- # or manually by a call to RotateSecret.
2102
+ # The ARN of an Amazon Web Services Lambda function invoked by Secrets
2103
+ # Manager to rotate and expire the secret either automatically per the
2104
+ # schedule or manually by a call to RotateSecret.
2097
2105
  # @return [String]
2098
2106
  #
2099
2107
  # @!attribute [rw] rotation_rules
@@ -2198,13 +2206,18 @@ module Aws::SecretsManager
2198
2206
  # The date and time this version of the secret was created.
2199
2207
  # @return [Time]
2200
2208
  #
2209
+ # @!attribute [rw] kms_key_ids
2210
+ # The KMS keys used to encrypt the secret version.
2211
+ # @return [Array<String>]
2212
+ #
2201
2213
  # @see http://docs.aws.amazon.com/goto/WebAPI/secretsmanager-2017-10-17/SecretVersionsListEntry AWS API Documentation
2202
2214
  #
2203
2215
  class SecretVersionsListEntry < Struct.new(
2204
2216
  :version_id,
2205
2217
  :version_stages,
2206
2218
  :last_accessed_date,
2207
- :created_date)
2219
+ :created_date,
2220
+ :kms_key_ids)
2208
2221
  SENSITIVE = []
2209
2222
  include Aws::Structure
2210
2223
  end
@@ -2317,9 +2330,8 @@ module Aws::SecretsManager
2317
2330
  # This parameter to the API requires a JSON text string argument. For
2318
2331
  # information on how to format a JSON parameter for the various
2319
2332
  # command line tool environments, see [Using JSON for Parameters][1]
2320
- # in the *AWS CLI User Guide*. For the AWS CLI, you can also use the
2321
- # syntax: `--Tags Key="Key1",Value="Value1"
2322
- # Key="Key2",Value="Value2"[,…]`
2333
+ # in the *CLI User Guide*. For the CLI, you can also use the syntax:
2334
+ # `--Tags Key="Key1",Value="Value1" Key="Key2",Value="Value2"[,…]`
2323
2335
  #
2324
2336
  #
2325
2337
  #
@@ -2379,7 +2391,7 @@ module Aws::SecretsManager
2379
2391
  # This parameter to the API requires a JSON text string argument. For
2380
2392
  # information on how to format a JSON parameter for the various
2381
2393
  # command line tool environments, see [Using JSON for Parameters][1]
2382
- # in the *AWS CLI User Guide*.
2394
+ # in the *CLI User Guide*.
2383
2395
  #
2384
2396
  #
2385
2397
  #
@@ -2440,13 +2452,13 @@ module Aws::SecretsManager
2440
2452
  # parameter specifies a unique identifier for the new version that
2441
2453
  # helps ensure idempotency.
2442
2454
  #
2443
- # If you use the AWS CLI or one of the AWS SDK to call this operation,
2444
- # then you can leave this parameter empty. The CLI or SDK generates a
2445
- # random UUID for you and includes that in the request. If you don't
2446
- # use the SDK and instead generate a raw HTTP request to the Secrets
2447
- # Manager service endpoint, then you must generate a
2448
- # `ClientRequestToken` yourself for new versions and include that
2449
- # value in the request.
2455
+ # If you use the Amazon Web Services CLI or one of the Amazon Web
2456
+ # Services SDK to call this operation, then you can leave this
2457
+ # parameter empty. The CLI or SDK generates a random UUID for you and
2458
+ # includes that in the request. If you don't use the SDK and instead
2459
+ # generate a raw HTTP request to the Secrets Manager service endpoint,
2460
+ # then you must generate a `ClientRequestToken` yourself for new
2461
+ # versions and include that value in the request.
2450
2462
  #
2451
2463
  # You typically only need to interact with this value if you implement
2452
2464
  # your own retry logic and want to ensure that a given secret is not
@@ -2486,9 +2498,9 @@ module Aws::SecretsManager
2486
2498
  # @return [String]
2487
2499
  #
2488
2500
  # @!attribute [rw] kms_key_id
2489
- # (Optional) Specifies an updated ARN or alias of the AWS KMS customer
2490
- # master key (CMK) to be used to encrypt the protected text in new
2491
- # versions of this secret.
2501
+ # (Optional) Specifies an updated ARN or alias of the Amazon Web
2502
+ # Services KMS customer master key (CMK) to be used to encrypt the
2503
+ # protected text in new versions of this secret.
2492
2504
  #
2493
2505
  # You can only use the account's default CMK to encrypt and decrypt
2494
2506
  # if you call this operation using credentials from the same account
@@ -2525,8 +2537,8 @@ module Aws::SecretsManager
2525
2537
  # For storing multiple values, we recommend that you use a JSON text
2526
2538
  # string argument and specify key/value pairs. For information on how
2527
2539
  # to format a JSON parameter for the various command line tool
2528
- # environments, see [Using JSON for Parameters][1] in the *AWS CLI
2529
- # User Guide*. For example:
2540
+ # environments, see [Using JSON for Parameters][1] in the *CLI User
2541
+ # Guide*. For example:
2530
2542
  #
2531
2543
  # `[\{"username":"bob"\},\{"password":"abc123xyz456"\}]`
2532
2544
  #
@@ -2718,11 +2730,11 @@ module Aws::SecretsManager
2718
2730
  #
2719
2731
  # @!attribute [rw] resource_policy
2720
2732
  # A JSON-formatted string constructed according to the grammar and
2721
- # syntax for an AWS resource-based policy. The policy in the string
2722
- # identifies who can access or manage this secret and its versions.
2723
- # For information on how to format a JSON parameter for the various
2724
- # command line tool environments, see [Using JSON for Parameters][1]
2725
- # in the *AWS CLI User Guide*.publi
2733
+ # syntax for an Amazon Web Services resource-based policy. The policy
2734
+ # in the string identifies who can access or manage this secret and
2735
+ # its versions. For information on how to format a JSON parameter for
2736
+ # the various command line tool environments, see [Using JSON for
2737
+ # Parameters][1] in the *CLI User Guide*.publi
2726
2738
  #
2727
2739
  #
2728
2740
  #
@@ -3,7 +3,7 @@
3
3
  # WARNING ABOUT GENERATED CODE
4
4
  #
5
5
  # This file is generated. See the contributing guide for more information:
6
- # https://github.com/aws/aws-sdk-ruby/blob/master/CONTRIBUTING.md
6
+ # https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
7
7
  #
8
8
  # WARNING ABOUT GENERATED CODE
9
9
 
@@ -48,6 +48,6 @@ require_relative 'aws-sdk-secretsmanager/customizations'
48
48
  # @!group service
49
49
  module Aws::SecretsManager
50
50
 
51
- GEM_VERSION = '1.45.0'
51
+ GEM_VERSION = '1.49.0'
52
52
 
53
53
  end