aws-sdk-secretsmanager 1.45.0 → 1.49.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -3,7 +3,7 @@
3
3
  # WARNING ABOUT GENERATED CODE
4
4
  #
5
5
  # This file is generated. See the contributing guide for more information:
6
- # https://github.com/aws/aws-sdk-ruby/blob/master/CONTRIBUTING.md
6
+ # https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
7
7
  #
8
8
  # WARNING ABOUT GENERATED CODE
9
9
 
@@ -55,6 +55,7 @@ module Aws::SecretsManager
55
55
  InvalidNextTokenException = Shapes::StructureShape.new(name: 'InvalidNextTokenException')
56
56
  InvalidParameterException = Shapes::StructureShape.new(name: 'InvalidParameterException')
57
57
  InvalidRequestException = Shapes::StructureShape.new(name: 'InvalidRequestException')
58
+ KmsKeyIdListType = Shapes::ListShape.new(name: 'KmsKeyIdListType')
58
59
  KmsKeyIdType = Shapes::StringShape.new(name: 'KmsKeyIdType')
59
60
  LastAccessedDateType = Shapes::TimestampShape.new(name: 'LastAccessedDateType')
60
61
  LastChangedDateType = Shapes::TimestampShape.new(name: 'LastChangedDateType')
@@ -260,6 +261,8 @@ module Aws::SecretsManager
260
261
  InvalidRequestException.add_member(:message, Shapes::ShapeRef.new(shape: ErrorMessage, location_name: "Message"))
261
262
  InvalidRequestException.struct_class = Types::InvalidRequestException
262
263
 
264
+ KmsKeyIdListType.member = Shapes::ShapeRef.new(shape: KmsKeyIdType)
265
+
263
266
  LimitExceededException.add_member(:message, Shapes::ShapeRef.new(shape: ErrorMessage, location_name: "Message"))
264
267
  LimitExceededException.struct_class = Types::LimitExceededException
265
268
 
@@ -401,6 +404,7 @@ module Aws::SecretsManager
401
404
  SecretVersionsListEntry.add_member(:version_stages, Shapes::ShapeRef.new(shape: SecretVersionStagesType, location_name: "VersionStages"))
402
405
  SecretVersionsListEntry.add_member(:last_accessed_date, Shapes::ShapeRef.new(shape: LastAccessedDateType, location_name: "LastAccessedDate", metadata: {"box"=>true}))
403
406
  SecretVersionsListEntry.add_member(:created_date, Shapes::ShapeRef.new(shape: CreatedDateType, location_name: "CreatedDate", metadata: {"box"=>true}))
407
+ SecretVersionsListEntry.add_member(:kms_key_ids, Shapes::ShapeRef.new(shape: KmsKeyIdListType, location_name: "KmsKeyIds"))
404
408
  SecretVersionsListEntry.struct_class = Types::SecretVersionsListEntry
405
409
 
406
410
  SecretVersionsListType.member = Shapes::ShapeRef.new(shape: SecretVersionsListEntry)
@@ -547,6 +551,7 @@ module Aws::SecretsManager
547
551
  o.output = Shapes::ShapeRef.new(shape: DescribeSecretResponse)
548
552
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
549
553
  o.errors << Shapes::ShapeRef.new(shape: InternalServiceError)
554
+ o.errors << Shapes::ShapeRef.new(shape: InvalidParameterException)
550
555
  end)
551
556
 
552
557
  api.add_operation(:get_random_password, Seahorse::Model::Operation.new.tap do |o|
@@ -569,6 +574,7 @@ module Aws::SecretsManager
569
574
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
570
575
  o.errors << Shapes::ShapeRef.new(shape: InternalServiceError)
571
576
  o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
577
+ o.errors << Shapes::ShapeRef.new(shape: InvalidParameterException)
572
578
  end)
573
579
 
574
580
  api.add_operation(:get_secret_value, Seahorse::Model::Operation.new.tap do |o|
@@ -593,6 +599,7 @@ module Aws::SecretsManager
593
599
  o.errors << Shapes::ShapeRef.new(shape: InvalidNextTokenException)
594
600
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
595
601
  o.errors << Shapes::ShapeRef.new(shape: InternalServiceError)
602
+ o.errors << Shapes::ShapeRef.new(shape: InvalidParameterException)
596
603
  o[:pager] = Aws::Pager.new(
597
604
  limit_key: "max_results",
598
605
  tokens: {
@@ -3,7 +3,7 @@
3
3
  # WARNING ABOUT GENERATED CODE
4
4
  #
5
5
  # This file is generated. See the contributing guide for more information:
6
- # https://github.com/aws/aws-sdk-ruby/blob/master/CONTRIBUTING.md
6
+ # https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
7
7
  #
8
8
  # WARNING ABOUT GENERATED CODE
9
9
 
@@ -3,7 +3,7 @@
3
3
  # WARNING ABOUT GENERATED CODE
4
4
  #
5
5
  # This file is generated. See the contributing guide for more information:
6
- # https://github.com/aws/aws-sdk-ruby/blob/master/CONTRIBUTING.md
6
+ # https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
7
7
  #
8
8
  # WARNING ABOUT GENERATED CODE
9
9
 
@@ -3,7 +3,7 @@
3
3
  # WARNING ABOUT GENERATED CODE
4
4
  #
5
5
  # This file is generated. See the contributing guide for more information:
6
- # https://github.com/aws/aws-sdk-ruby/blob/master/CONTRIBUTING.md
6
+ # https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
7
7
  #
8
8
  # WARNING ABOUT GENERATED CODE
9
9
 
@@ -125,13 +125,14 @@ module Aws::SecretsManager
125
125
  # initial version is created as part of the secret, and this parameter
126
126
  # specifies a unique identifier for the new version.
127
127
  #
128
- # <note markdown="1"> If you use the AWS CLI or one of the AWS SDK to call this operation,
129
- # then you can leave this parameter empty. The CLI or SDK generates a
130
- # random UUID for you and includes it as the value for this parameter
131
- # in the request. If you don't use the SDK and instead generate a raw
132
- # HTTP request to the Secrets Manager service endpoint, then you must
133
- # generate a `ClientRequestToken` yourself for the new version and
134
- # include the value in the request.
128
+ # <note markdown="1"> If you use the Amazon Web Services CLI or one of the Amazon Web
129
+ # Services SDK to call this operation, then you can leave this
130
+ # parameter empty. The CLI or SDK generates a random UUID for you and
131
+ # includes it as the value for this parameter in the request. If you
132
+ # don't use the SDK and instead generate a raw HTTP request to the
133
+ # Secrets Manager service endpoint, then you must generate a
134
+ # `ClientRequestToken` yourself for the new version and include the
135
+ # value in the request.
135
136
  #
136
137
  # </note>
137
138
  #
@@ -169,20 +170,21 @@ module Aws::SecretsManager
169
170
  # @return [String]
170
171
  #
171
172
  # @!attribute [rw] kms_key_id
172
- # (Optional) Specifies the ARN, Key ID, or alias of the AWS KMS
173
- # customer master key (CMK) to be used to encrypt the `SecretString`
174
- # or `SecretBinary` values in the versions stored in this secret.
173
+ # (Optional) Specifies the ARN, Key ID, or alias of the Amazon Web
174
+ # Services KMS customer master key (CMK) to be used to encrypt the
175
+ # `SecretString` or `SecretBinary` values in the versions stored in
176
+ # this secret.
175
177
  #
176
- # You can specify any of the supported ways to identify a AWS KMS key
177
- # ID. If you need to reference a CMK in a different account, you can
178
- # use only the key ARN or the alias ARN.
178
+ # You can specify any of the supported ways to identify a Amazon Web
179
+ # Services KMS key ID. If you need to reference a CMK in a different
180
+ # account, you can use only the key ARN or the alias ARN.
179
181
  #
180
182
  # If you don't specify this value, then Secrets Manager defaults to
181
- # using the AWS account's default CMK (the one named
182
- # `aws/secretsmanager`). If a AWS KMS CMK with that name doesn't yet
183
- # exist, then Secrets Manager creates it for you automatically the
184
- # first time it needs to encrypt a version's `SecretString` or
185
- # `SecretBinary` fields.
183
+ # using the Amazon Web Services account's default CMK (the one named
184
+ # `aws/secretsmanager`). If a Amazon Web Services KMS CMK with that
185
+ # name doesn't yet exist, then Secrets Manager creates it for you
186
+ # automatically the first time it needs to encrypt a version's
187
+ # `SecretString` or `SecretBinary` fields.
186
188
  #
187
189
  # You can use the account default CMK to encrypt and decrypt only if
188
190
  # you call this operation using credentials from the same account that
@@ -201,7 +203,8 @@ module Aws::SecretsManager
201
203
  # both. They cannot both be empty.
202
204
  #
203
205
  # This parameter is not available using the Secrets Manager console.
204
- # It can be accessed only by using the AWS CLI or one of the AWS SDKs.
206
+ # It can be accessed only by using the Amazon Web Services CLI or one
207
+ # of the Amazon Web Services SDKs.
205
208
  # @return [String]
206
209
  #
207
210
  # @!attribute [rw] secret_string
@@ -220,8 +223,8 @@ module Aws::SecretsManager
220
223
  # For storing multiple values, we recommend that you use a JSON text
221
224
  # string argument and specify key/value pairs. For information on how
222
225
  # to format a JSON parameter for the various command line tool
223
- # environments, see [Using JSON for Parameters][1] in the *AWS CLI
224
- # User Guide*. For example:
226
+ # environments, see [Using JSON for Parameters][1] in the *CLI User
227
+ # Guide*. For example:
225
228
  #
226
229
  # `\{"username":"bob","password":"abc123xyz456"\}`
227
230
  #
@@ -251,8 +254,8 @@ module Aws::SecretsManager
251
254
  #
252
255
  # This parameter requires a JSON text string argument. For information
253
256
  # on how to format a JSON parameter for the various command line tool
254
- # environments, see [Using JSON for Parameters][1] in the *AWS CLI
255
- # User Guide*. For example:
257
+ # environments, see [Using JSON for Parameters][1] in the *CLI User
258
+ # Guide*. For example:
256
259
  #
257
260
  # `[\{"Key":"CostCenter","Value":"12345"\},\{"Key":"environment","Value":"production"\}]`
258
261
  #
@@ -271,9 +274,9 @@ module Aws::SecretsManager
271
274
  # * Tag keys and values are case sensitive.
272
275
  #
273
276
  # * Do not use the `aws:` prefix in your tag names or values because
274
- # AWS reserves it for AWS use. You can't edit or delete tag names
275
- # or values with this prefix. Tags with this prefix do not count
276
- # against your tags per secret limit.
277
+ # Amazon Web Services reserves it for Amazon Web Services use. You
278
+ # can't edit or delete tag names or values with this prefix. Tags
279
+ # with this prefix do not count against your tags per secret limit.
277
280
  #
278
281
  # * If you use your tagging schema across multiple services and
279
282
  # resources, remember other services might have restrictions on
@@ -486,10 +489,10 @@ module Aws::SecretsManager
486
489
  #
487
490
  # Use this parameter with caution. This parameter causes the operation
488
491
  # to skip the normal waiting period before the permanent deletion that
489
- # AWS would normally impose with the `RecoveryWindowInDays` parameter.
490
- # If you delete a secret with the `ForceDeleteWithouRecovery`
491
- # parameter, then you have no opportunity to recover the secret. You
492
- # lose the secret permanently.
492
+ # Amazon Web Services would normally impose with the
493
+ # `RecoveryWindowInDays` parameter. If you delete a secret with the
494
+ # `ForceDeleteWithouRecovery` parameter, then you have no opportunity
495
+ # to recover the secret. You lose the secret permanently.
493
496
  #
494
497
  # If you use this parameter and include a previously deleted or
495
498
  # nonexistent secret, the operation does not return the error
@@ -587,11 +590,12 @@ module Aws::SecretsManager
587
590
  # @return [String]
588
591
  #
589
592
  # @!attribute [rw] kms_key_id
590
- # The ARN or alias of the AWS KMS customer master key (CMK) that's
591
- # used to encrypt the `SecretString` or `SecretBinary` fields in each
592
- # version of the secret. If you don't provide a key, then Secrets
593
- # Manager defaults to encrypting the secret fields with the default
594
- # AWS KMS CMK (the one named `awssecretsmanager`) for this account.
593
+ # The ARN or alias of the Amazon Web Services KMS customer master key
594
+ # (CMK) that's used to encrypt the `SecretString` or `SecretBinary`
595
+ # fields in each version of the secret. If you don't provide a key,
596
+ # then Secrets Manager defaults to encrypting the secret fields with
597
+ # the default Amazon Web Services KMS CMK (the one named
598
+ # `awssecretsmanager`) for this account.
595
599
  # @return [String]
596
600
  #
597
601
  # @!attribute [rw] rotation_enabled
@@ -907,8 +911,9 @@ module Aws::SecretsManager
907
911
  # with any permissions that are associated with the user or role that
908
912
  # attempts to access this secret. The combined permissions specify who
909
913
  # can access the secret and what actions they can perform. For more
910
- # information, see [Authentication and Access Control for AWS Secrets
911
- # Manager][1] in the *AWS Secrets Manager User Guide*.
914
+ # information, see [Authentication and Access Control for Amazon Web
915
+ # Services Secrets Manager][1] in the *Amazon Web Services Secrets
916
+ # Manager User Guide*.
912
917
  #
913
918
  #
914
919
  #
@@ -1426,11 +1431,11 @@ module Aws::SecretsManager
1426
1431
  #
1427
1432
  # @!attribute [rw] resource_policy
1428
1433
  # A JSON-formatted string constructed according to the grammar and
1429
- # syntax for an AWS resource-based policy. The policy in the string
1430
- # identifies who can access or manage this secret and its versions.
1431
- # For information on how to format a JSON parameter for the various
1432
- # command line tool environments, see [Using JSON for Parameters][1]
1433
- # in the *AWS CLI User Guide*.
1434
+ # syntax for an Amazon Web Services resource-based policy. The policy
1435
+ # in the string identifies who can access or manage this secret and
1436
+ # its versions. For information on how to format a JSON parameter for
1437
+ # the various command line tool environments, see [Using JSON for
1438
+ # Parameters][1] in the *CLI User Guide*.
1434
1439
  #
1435
1440
  #
1436
1441
  #
@@ -1514,13 +1519,13 @@ module Aws::SecretsManager
1514
1519
  # (Optional) Specifies a unique identifier for the new version of the
1515
1520
  # secret.
1516
1521
  #
1517
- # <note markdown="1"> If you use the AWS CLI or one of the AWS SDK to call this operation,
1518
- # then you can leave this parameter empty. The CLI or SDK generates a
1519
- # random UUID for you and includes that in the request. If you don't
1520
- # use the SDK and instead generate a raw HTTP request to the Secrets
1521
- # Manager service endpoint, then you must generate a
1522
- # `ClientRequestToken` yourself for new versions and include that
1523
- # value in the request.
1522
+ # <note markdown="1"> If you use the Amazon Web Services CLI or one of the Amazon Web
1523
+ # Services SDK to call this operation, then you can leave this
1524
+ # parameter empty. The CLI or SDK generates a random UUID for you and
1525
+ # includes that in the request. If you don't use the SDK and instead
1526
+ # generate a raw HTTP request to the Secrets Manager service endpoint,
1527
+ # then you must generate a `ClientRequestToken` yourself for new
1528
+ # versions and include that value in the request.
1524
1529
  #
1525
1530
  # </note>
1526
1531
  #
@@ -1582,8 +1587,8 @@ module Aws::SecretsManager
1582
1587
  # For storing multiple values, we recommend that you use a JSON text
1583
1588
  # string argument and specify key/value pairs. For information on how
1584
1589
  # to format a JSON parameter for the various command line tool
1585
- # environments, see [Using JSON for Parameters][1] in the *AWS CLI
1586
- # User Guide*.
1590
+ # environments, see [Using JSON for Parameters][1] in the *CLI User
1591
+ # Guide*.
1587
1592
  #
1588
1593
  # For example:
1589
1594
  #
@@ -1952,13 +1957,14 @@ module Aws::SecretsManager
1952
1957
  # (Optional) Specifies a unique identifier for the new version of the
1953
1958
  # secret that helps ensure idempotency.
1954
1959
  #
1955
- # If you use the AWS CLI or one of the AWS SDK to call this operation,
1956
- # then you can leave this parameter empty. The CLI or SDK generates a
1957
- # random UUID for you and includes that in the request for this
1958
- # parameter. If you don't use the SDK and instead generate a raw HTTP
1959
- # request to the Secrets Manager service endpoint, then you must
1960
- # generate a `ClientRequestToken` yourself for new versions and
1961
- # include that value in the request.
1960
+ # If you use the Amazon Web Services CLI or one of the Amazon Web
1961
+ # Services SDK to call this operation, then you can leave this
1962
+ # parameter empty. The CLI or SDK generates a random UUID for you and
1963
+ # includes that in the request for this parameter. If you don't use
1964
+ # the SDK and instead generate a raw HTTP request to the Secrets
1965
+ # Manager service endpoint, then you must generate a
1966
+ # `ClientRequestToken` yourself for new versions and include that
1967
+ # value in the request.
1962
1968
  #
1963
1969
  # You only need to specify your own value if you implement your own
1964
1970
  # retry logic and want to ensure that a given secret is not created
@@ -2059,7 +2065,8 @@ module Aws::SecretsManager
2059
2065
  # The Amazon Resource Name (ARN) of the secret.
2060
2066
  #
2061
2067
  # For more information about ARNs in Secrets Manager, see [Policy
2062
- # Resources][1] in the *AWS Secrets Manager User Guide*.
2068
+ # Resources][1] in the *Amazon Web Services Secrets Manager User
2069
+ # Guide*.
2063
2070
  #
2064
2071
  #
2065
2072
  #
@@ -2078,11 +2085,12 @@ module Aws::SecretsManager
2078
2085
  # @return [String]
2079
2086
  #
2080
2087
  # @!attribute [rw] kms_key_id
2081
- # The ARN or alias of the AWS KMS customer master key (CMK) used to
2082
- # encrypt the `SecretString` and `SecretBinary` fields in each version
2083
- # of the secret. If you don't provide a key, then Secrets Manager
2084
- # defaults to encrypting the secret fields with the default KMS CMK,
2085
- # the key named `awssecretsmanager`, for this account.
2088
+ # The ARN or alias of the Amazon Web Services KMS customer master key
2089
+ # (CMK) used to encrypt the `SecretString` and `SecretBinary` fields
2090
+ # in each version of the secret. If you don't provide a key, then
2091
+ # Secrets Manager defaults to encrypting the secret fields with the
2092
+ # default KMS CMK, the key named `awssecretsmanager`, for this
2093
+ # account.
2086
2094
  # @return [String]
2087
2095
  #
2088
2096
  # @!attribute [rw] rotation_enabled
@@ -2091,9 +2099,9 @@ module Aws::SecretsManager
2091
2099
  # @return [Boolean]
2092
2100
  #
2093
2101
  # @!attribute [rw] rotation_lambda_arn
2094
- # The ARN of an AWS Lambda function invoked by Secrets Manager to
2095
- # rotate and expire the secret either automatically per the schedule
2096
- # or manually by a call to RotateSecret.
2102
+ # The ARN of an Amazon Web Services Lambda function invoked by Secrets
2103
+ # Manager to rotate and expire the secret either automatically per the
2104
+ # schedule or manually by a call to RotateSecret.
2097
2105
  # @return [String]
2098
2106
  #
2099
2107
  # @!attribute [rw] rotation_rules
@@ -2198,13 +2206,18 @@ module Aws::SecretsManager
2198
2206
  # The date and time this version of the secret was created.
2199
2207
  # @return [Time]
2200
2208
  #
2209
+ # @!attribute [rw] kms_key_ids
2210
+ # The KMS keys used to encrypt the secret version.
2211
+ # @return [Array<String>]
2212
+ #
2201
2213
  # @see http://docs.aws.amazon.com/goto/WebAPI/secretsmanager-2017-10-17/SecretVersionsListEntry AWS API Documentation
2202
2214
  #
2203
2215
  class SecretVersionsListEntry < Struct.new(
2204
2216
  :version_id,
2205
2217
  :version_stages,
2206
2218
  :last_accessed_date,
2207
- :created_date)
2219
+ :created_date,
2220
+ :kms_key_ids)
2208
2221
  SENSITIVE = []
2209
2222
  include Aws::Structure
2210
2223
  end
@@ -2317,9 +2330,8 @@ module Aws::SecretsManager
2317
2330
  # This parameter to the API requires a JSON text string argument. For
2318
2331
  # information on how to format a JSON parameter for the various
2319
2332
  # command line tool environments, see [Using JSON for Parameters][1]
2320
- # in the *AWS CLI User Guide*. For the AWS CLI, you can also use the
2321
- # syntax: `--Tags Key="Key1",Value="Value1"
2322
- # Key="Key2",Value="Value2"[,…]`
2333
+ # in the *CLI User Guide*. For the CLI, you can also use the syntax:
2334
+ # `--Tags Key="Key1",Value="Value1" Key="Key2",Value="Value2"[,…]`
2323
2335
  #
2324
2336
  #
2325
2337
  #
@@ -2379,7 +2391,7 @@ module Aws::SecretsManager
2379
2391
  # This parameter to the API requires a JSON text string argument. For
2380
2392
  # information on how to format a JSON parameter for the various
2381
2393
  # command line tool environments, see [Using JSON for Parameters][1]
2382
- # in the *AWS CLI User Guide*.
2394
+ # in the *CLI User Guide*.
2383
2395
  #
2384
2396
  #
2385
2397
  #
@@ -2440,13 +2452,13 @@ module Aws::SecretsManager
2440
2452
  # parameter specifies a unique identifier for the new version that
2441
2453
  # helps ensure idempotency.
2442
2454
  #
2443
- # If you use the AWS CLI or one of the AWS SDK to call this operation,
2444
- # then you can leave this parameter empty. The CLI or SDK generates a
2445
- # random UUID for you and includes that in the request. If you don't
2446
- # use the SDK and instead generate a raw HTTP request to the Secrets
2447
- # Manager service endpoint, then you must generate a
2448
- # `ClientRequestToken` yourself for new versions and include that
2449
- # value in the request.
2455
+ # If you use the Amazon Web Services CLI or one of the Amazon Web
2456
+ # Services SDK to call this operation, then you can leave this
2457
+ # parameter empty. The CLI or SDK generates a random UUID for you and
2458
+ # includes that in the request. If you don't use the SDK and instead
2459
+ # generate a raw HTTP request to the Secrets Manager service endpoint,
2460
+ # then you must generate a `ClientRequestToken` yourself for new
2461
+ # versions and include that value in the request.
2450
2462
  #
2451
2463
  # You typically only need to interact with this value if you implement
2452
2464
  # your own retry logic and want to ensure that a given secret is not
@@ -2486,9 +2498,9 @@ module Aws::SecretsManager
2486
2498
  # @return [String]
2487
2499
  #
2488
2500
  # @!attribute [rw] kms_key_id
2489
- # (Optional) Specifies an updated ARN or alias of the AWS KMS customer
2490
- # master key (CMK) to be used to encrypt the protected text in new
2491
- # versions of this secret.
2501
+ # (Optional) Specifies an updated ARN or alias of the Amazon Web
2502
+ # Services KMS customer master key (CMK) to be used to encrypt the
2503
+ # protected text in new versions of this secret.
2492
2504
  #
2493
2505
  # You can only use the account's default CMK to encrypt and decrypt
2494
2506
  # if you call this operation using credentials from the same account
@@ -2525,8 +2537,8 @@ module Aws::SecretsManager
2525
2537
  # For storing multiple values, we recommend that you use a JSON text
2526
2538
  # string argument and specify key/value pairs. For information on how
2527
2539
  # to format a JSON parameter for the various command line tool
2528
- # environments, see [Using JSON for Parameters][1] in the *AWS CLI
2529
- # User Guide*. For example:
2540
+ # environments, see [Using JSON for Parameters][1] in the *CLI User
2541
+ # Guide*. For example:
2530
2542
  #
2531
2543
  # `[\{"username":"bob"\},\{"password":"abc123xyz456"\}]`
2532
2544
  #
@@ -2718,11 +2730,11 @@ module Aws::SecretsManager
2718
2730
  #
2719
2731
  # @!attribute [rw] resource_policy
2720
2732
  # A JSON-formatted string constructed according to the grammar and
2721
- # syntax for an AWS resource-based policy. The policy in the string
2722
- # identifies who can access or manage this secret and its versions.
2723
- # For information on how to format a JSON parameter for the various
2724
- # command line tool environments, see [Using JSON for Parameters][1]
2725
- # in the *AWS CLI User Guide*.publi
2733
+ # syntax for an Amazon Web Services resource-based policy. The policy
2734
+ # in the string identifies who can access or manage this secret and
2735
+ # its versions. For information on how to format a JSON parameter for
2736
+ # the various command line tool environments, see [Using JSON for
2737
+ # Parameters][1] in the *CLI User Guide*.publi
2726
2738
  #
2727
2739
  #
2728
2740
  #
@@ -3,7 +3,7 @@
3
3
  # WARNING ABOUT GENERATED CODE
4
4
  #
5
5
  # This file is generated. See the contributing guide for more information:
6
- # https://github.com/aws/aws-sdk-ruby/blob/master/CONTRIBUTING.md
6
+ # https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
7
7
  #
8
8
  # WARNING ABOUT GENERATED CODE
9
9
 
@@ -48,6 +48,6 @@ require_relative 'aws-sdk-secretsmanager/customizations'
48
48
  # @!group service
49
49
  module Aws::SecretsManager
50
50
 
51
- GEM_VERSION = '1.45.0'
51
+ GEM_VERSION = '1.49.0'
52
52
 
53
53
  end