aws-sdk-secretsmanager 1.65.0 → 1.67.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -30,7 +30,7 @@ require 'aws-sdk-core/plugins/http_checksum.rb'
30
30
  require 'aws-sdk-core/plugins/checksum_algorithm.rb'
31
31
  require 'aws-sdk-core/plugins/defaults_mode.rb'
32
32
  require 'aws-sdk-core/plugins/recursion_detection.rb'
33
- require 'aws-sdk-core/plugins/signature_v4.rb'
33
+ require 'aws-sdk-core/plugins/sign.rb'
34
34
  require 'aws-sdk-core/plugins/protocols/json_rpc.rb'
35
35
 
36
36
  Aws::Plugins::GlobalConfiguration.add_identifier(:secretsmanager)
@@ -79,8 +79,9 @@ module Aws::SecretsManager
79
79
  add_plugin(Aws::Plugins::ChecksumAlgorithm)
80
80
  add_plugin(Aws::Plugins::DefaultsMode)
81
81
  add_plugin(Aws::Plugins::RecursionDetection)
82
- add_plugin(Aws::Plugins::SignatureV4)
82
+ add_plugin(Aws::Plugins::Sign)
83
83
  add_plugin(Aws::Plugins::Protocols::JsonRpc)
84
+ add_plugin(Aws::SecretsManager::Plugins::Endpoints)
84
85
 
85
86
  # @overload initialize(options)
86
87
  # @param [Hash] options
@@ -297,6 +298,19 @@ module Aws::SecretsManager
297
298
  # ** Please note ** When response stubbing is enabled, no HTTP
298
299
  # requests are made, and retries are disabled.
299
300
  #
301
+ # @option options [Aws::TokenProvider] :token_provider
302
+ # A Bearer Token Provider. This can be an instance of any one of the
303
+ # following classes:
304
+ #
305
+ # * `Aws::StaticTokenProvider` - Used for configuring static, non-refreshing
306
+ # tokens.
307
+ #
308
+ # * `Aws::SSOTokenProvider` - Used for loading tokens from AWS SSO using an
309
+ # access token generated from `aws login`.
310
+ #
311
+ # When `:token_provider` is not configured directly, the `Aws::TokenProviderChain`
312
+ # will be used to search for tokens configured for your profile in shared configuration files.
313
+ #
300
314
  # @option options [Boolean] :use_dualstack_endpoint
301
315
  # When set to `true`, dualstack enabled endpoints (with `.aws` TLD)
302
316
  # will be used if available.
@@ -310,6 +324,9 @@ module Aws::SecretsManager
310
324
  # When `true`, request parameters are validated before
311
325
  # sending the request.
312
326
  #
327
+ # @option options [Aws::SecretsManager::EndpointProvider] :endpoint_provider
328
+ # The endpoint provider used to resolve endpoints. Any object that responds to `#resolve_endpoint(parameters)` where `parameters` is a Struct similar to `Aws::SecretsManager::EndpointParameters`
329
+ #
313
330
  # @option options [URI::HTTP,String] :http_proxy A proxy to send
314
331
  # requests through. Formatted like 'http://proxy.com:123'.
315
332
  #
@@ -376,15 +393,21 @@ module Aws::SecretsManager
376
393
  #
377
394
  # To turn on automatic rotation again, call RotateSecret.
378
395
  #
396
+ # Secrets Manager generates a CloudTrail log entry when you call this
397
+ # action. Do not include sensitive information in request parameters
398
+ # because it might be logged. For more information, see [Logging Secrets
399
+ # Manager events with CloudTrail][2].
400
+ #
379
401
  # <b>Required permissions: </b> `secretsmanager:CancelRotateSecret`. For
380
- # more information, see [ IAM policy actions for Secrets Manager][2] and
381
- # [Authentication and access control in Secrets Manager][3].
402
+ # more information, see [ IAM policy actions for Secrets Manager][3] and
403
+ # [Authentication and access control in Secrets Manager][4].
382
404
  #
383
405
  #
384
406
  #
385
407
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/rotate-secrets_how.html
386
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
387
- # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
408
+ # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
409
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
410
+ # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
388
411
  #
389
412
  # @option params [required, String] :secret_id
390
413
  # The ARN or name of the secret.
@@ -475,11 +498,17 @@ module Aws::SecretsManager
475
498
  # to encrypt the secret, and you must create and use a customer managed
476
499
  # KMS key.
477
500
  #
501
+ # Secrets Manager generates a CloudTrail log entry when you call this
502
+ # action. Do not include sensitive information in request parameters
503
+ # except `SecretBinary` or `SecretString` because it might be logged.
504
+ # For more information, see [Logging Secrets Manager events with
505
+ # CloudTrail][3].
506
+ #
478
507
  # <b>Required permissions: </b> `secretsmanager:CreateSecret`. If you
479
508
  # include tags in the secret, you also need
480
509
  # `secretsmanager:TagResource`. For more information, see [ IAM policy
481
- # actions for Secrets Manager][3] and [Authentication and access control
482
- # in Secrets Manager][4].
510
+ # actions for Secrets Manager][4] and [Authentication and access control
511
+ # in Secrets Manager][5].
483
512
  #
484
513
  # To encrypt the secret with a KMS key other than `aws/secretsmanager`,
485
514
  # you need `kms:GenerateDataKey` and `kms:Decrypt` permission to the
@@ -489,8 +518,9 @@ module Aws::SecretsManager
489
518
  #
490
519
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/manage_create-basic-secret.html
491
520
  # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_secret_json_structure.html
492
- # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
493
- # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
521
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
522
+ # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
523
+ # [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
494
524
  #
495
525
  # @option params [required, String] :name
496
526
  # The name of the new secret.
@@ -730,14 +760,20 @@ module Aws::SecretsManager
730
760
  # Deletes the resource-based permission policy attached to the secret.
731
761
  # To attach a policy to a secret, use PutResourcePolicy.
732
762
  #
763
+ # Secrets Manager generates a CloudTrail log entry when you call this
764
+ # action. Do not include sensitive information in request parameters
765
+ # because it might be logged. For more information, see [Logging Secrets
766
+ # Manager events with CloudTrail][1].
767
+ #
733
768
  # <b>Required permissions: </b> `secretsmanager:DeleteResourcePolicy`.
734
- # For more information, see [ IAM policy actions for Secrets Manager][1]
735
- # and [Authentication and access control in Secrets Manager][2].
769
+ # For more information, see [ IAM policy actions for Secrets Manager][2]
770
+ # and [Authentication and access control in Secrets Manager][3].
736
771
  #
737
772
  #
738
773
  #
739
- # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
740
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
774
+ # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
775
+ # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
776
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
741
777
  #
742
778
  # @option params [required, String] :secret_id
743
779
  # The ARN or name of the secret to delete the attached resource-based
@@ -824,15 +860,21 @@ module Aws::SecretsManager
824
860
  # secret value. You must first cancel the deletion with RestoreSecret
825
861
  # and then you can retrieve the secret.
826
862
  #
863
+ # Secrets Manager generates a CloudTrail log entry when you call this
864
+ # action. Do not include sensitive information in request parameters
865
+ # because it might be logged. For more information, see [Logging Secrets
866
+ # Manager events with CloudTrail][2].
867
+ #
827
868
  # <b>Required permissions: </b> `secretsmanager:DeleteSecret`. For more
828
- # information, see [ IAM policy actions for Secrets Manager][2] and
829
- # [Authentication and access control in Secrets Manager][3].
869
+ # information, see [ IAM policy actions for Secrets Manager][3] and
870
+ # [Authentication and access control in Secrets Manager][4].
830
871
  #
831
872
  #
832
873
  #
833
874
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/monitoring_cloudwatch_deleted-secrets.html
834
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
835
- # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
875
+ # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
876
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
877
+ # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
836
878
  #
837
879
  # @option params [required, String] :secret_id
838
880
  # The ARN or name of the secret to delete.
@@ -921,14 +963,20 @@ module Aws::SecretsManager
921
963
  # secret value. Secrets Manager only returns fields that have a value in
922
964
  # the response.
923
965
  #
966
+ # Secrets Manager generates a CloudTrail log entry when you call this
967
+ # action. Do not include sensitive information in request parameters
968
+ # because it might be logged. For more information, see [Logging Secrets
969
+ # Manager events with CloudTrail][1].
970
+ #
924
971
  # <b>Required permissions: </b> `secretsmanager:DescribeSecret`. For
925
- # more information, see [ IAM policy actions for Secrets Manager][1] and
926
- # [Authentication and access control in Secrets Manager][2].
972
+ # more information, see [ IAM policy actions for Secrets Manager][2] and
973
+ # [Authentication and access control in Secrets Manager][3].
927
974
  #
928
975
  #
929
976
  #
930
- # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
931
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
977
+ # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
978
+ # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
979
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
932
980
  #
933
981
  # @option params [required, String] :secret_id
934
982
  # The ARN or name of the secret.
@@ -1055,14 +1103,20 @@ module Aws::SecretsManager
1055
1103
  # length and include every character type that the system you are
1056
1104
  # generating a password for can support.
1057
1105
  #
1106
+ # Secrets Manager generates a CloudTrail log entry when you call this
1107
+ # action. Do not include sensitive information in request parameters
1108
+ # because it might be logged. For more information, see [Logging Secrets
1109
+ # Manager events with CloudTrail][1].
1110
+ #
1058
1111
  # <b>Required permissions: </b> `secretsmanager:GetRandomPassword`. For
1059
- # more information, see [ IAM policy actions for Secrets Manager][1] and
1060
- # [Authentication and access control in Secrets Manager][2].
1112
+ # more information, see [ IAM policy actions for Secrets Manager][2] and
1113
+ # [Authentication and access control in Secrets Manager][3].
1061
1114
  #
1062
1115
  #
1063
1116
  #
1064
- # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1065
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1117
+ # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
1118
+ # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1119
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1066
1120
  #
1067
1121
  # @option params [Integer] :password_length
1068
1122
  # The length of the password. If you don't include this parameter, the
@@ -1152,15 +1206,21 @@ module Aws::SecretsManager
1152
1206
  # attached to a secret, see [Permissions policies attached to a
1153
1207
  # secret][1].
1154
1208
  #
1209
+ # Secrets Manager generates a CloudTrail log entry when you call this
1210
+ # action. Do not include sensitive information in request parameters
1211
+ # because it might be logged. For more information, see [Logging Secrets
1212
+ # Manager events with CloudTrail][2].
1213
+ #
1155
1214
  # <b>Required permissions: </b> `secretsmanager:GetResourcePolicy`. For
1156
- # more information, see [ IAM policy actions for Secrets Manager][2] and
1157
- # [Authentication and access control in Secrets Manager][3].
1215
+ # more information, see [ IAM policy actions for Secrets Manager][3] and
1216
+ # [Authentication and access control in Secrets Manager][4].
1158
1217
  #
1159
1218
  #
1160
1219
  #
1161
1220
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access_resource-policies.html
1162
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1163
- # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1221
+ # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
1222
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1223
+ # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1164
1224
  #
1165
1225
  # @option params [required, String] :secret_id
1166
1226
  # The ARN or name of the secret to retrieve the attached resource-based
@@ -1228,19 +1288,25 @@ module Aws::SecretsManager
1228
1288
  # specify AWSPREVIOUS. To revert to the previous version of a secret,
1229
1289
  # call [UpdateSecretVersionStage][2].
1230
1290
  #
1291
+ # Secrets Manager generates a CloudTrail log entry when you call this
1292
+ # action. Do not include sensitive information in request parameters
1293
+ # because it might be logged. For more information, see [Logging Secrets
1294
+ # Manager events with CloudTrail][3].
1295
+ #
1231
1296
  # <b>Required permissions: </b> `secretsmanager:GetSecretValue`. If the
1232
1297
  # secret is encrypted using a customer-managed key instead of the Amazon
1233
1298
  # Web Services managed key `aws/secretsmanager`, then you also need
1234
1299
  # `kms:Decrypt` permissions for that key. For more information, see [
1235
- # IAM policy actions for Secrets Manager][3] and [Authentication and
1236
- # access control in Secrets Manager][4].
1300
+ # IAM policy actions for Secrets Manager][4] and [Authentication and
1301
+ # access control in Secrets Manager][5].
1237
1302
  #
1238
1303
  #
1239
1304
  #
1240
1305
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieving-secrets.html
1241
1306
  # [2]: https://docs.aws.amazon.com/cli/latest/reference/secretsmanager/update-secret-version-stage.html
1242
- # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1243
- # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1307
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
1308
+ # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1309
+ # [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1244
1310
  #
1245
1311
  # @option params [required, String] :secret_id
1246
1312
  # The ARN or name of the secret to retrieve.
@@ -1340,15 +1406,21 @@ module Aws::SecretsManager
1340
1406
  #
1341
1407
  # To list the secrets in the account, use ListSecrets.
1342
1408
  #
1409
+ # Secrets Manager generates a CloudTrail log entry when you call this
1410
+ # action. Do not include sensitive information in request parameters
1411
+ # because it might be logged. For more information, see [Logging Secrets
1412
+ # Manager events with CloudTrail][2].
1413
+ #
1343
1414
  # <b>Required permissions: </b> `secretsmanager:ListSecretVersionIds`.
1344
- # For more information, see [ IAM policy actions for Secrets Manager][2]
1345
- # and [Authentication and access control in Secrets Manager][3].
1415
+ # For more information, see [ IAM policy actions for Secrets Manager][3]
1416
+ # and [Authentication and access control in Secrets Manager][4].
1346
1417
  #
1347
1418
  #
1348
1419
  #
1349
1420
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/getting-started.html#term_version
1350
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1351
- # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1421
+ # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
1422
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1423
+ # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1352
1424
  #
1353
1425
  # @option params [required, String] :secret_id
1354
1426
  # The ARN or name of the secret whose versions you want to list.
@@ -1471,15 +1543,21 @@ module Aws::SecretsManager
1471
1543
  # For information about finding secrets in the console, see [Find
1472
1544
  # secrets in Secrets Manager][1].
1473
1545
  #
1546
+ # Secrets Manager generates a CloudTrail log entry when you call this
1547
+ # action. Do not include sensitive information in request parameters
1548
+ # because it might be logged. For more information, see [Logging Secrets
1549
+ # Manager events with CloudTrail][2].
1550
+ #
1474
1551
  # <b>Required permissions: </b> `secretsmanager:ListSecrets`. For more
1475
- # information, see [ IAM policy actions for Secrets Manager][2] and
1476
- # [Authentication and access control in Secrets Manager][3].
1552
+ # information, see [ IAM policy actions for Secrets Manager][3] and
1553
+ # [Authentication and access control in Secrets Manager][4].
1477
1554
  #
1478
1555
  #
1479
1556
  #
1480
1557
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/manage_search-secret.html
1481
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1482
- # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1558
+ # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
1559
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1560
+ # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1483
1561
  #
1484
1562
  # @option params [Integer] :max_results
1485
1563
  # The number of results to include in the response.
@@ -1599,15 +1677,21 @@ module Aws::SecretsManager
1599
1677
  # For information about attaching a policy in the console, see [Attach a
1600
1678
  # permissions policy to a secret][2].
1601
1679
  #
1680
+ # Secrets Manager generates a CloudTrail log entry when you call this
1681
+ # action. Do not include sensitive information in request parameters
1682
+ # because it might be logged. For more information, see [Logging Secrets
1683
+ # Manager events with CloudTrail][3].
1684
+ #
1602
1685
  # <b>Required permissions: </b> `secretsmanager:PutResourcePolicy`. For
1603
- # more information, see [ IAM policy actions for Secrets Manager][3] and
1686
+ # more information, see [ IAM policy actions for Secrets Manager][4] and
1604
1687
  # [Authentication and access control in Secrets Manager][1].
1605
1688
  #
1606
1689
  #
1607
1690
  #
1608
1691
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1609
1692
  # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access_resource-based-policies.html
1610
- # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1693
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
1694
+ # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1611
1695
  #
1612
1696
  # @option params [required, String] :secret_id
1613
1697
  # The ARN or name of the secret to attach the resource-based policy.
@@ -1693,12 +1777,10 @@ module Aws::SecretsManager
1693
1777
  # Manager automatically moves the staging label `AWSCURRENT` to this
1694
1778
  # version. If this operation creates the first version for the secret,
1695
1779
  # then Secrets Manager automatically attaches the staging label
1696
- # `AWSCURRENT` to it .
1697
- #
1698
- # If this operation moves the staging label `AWSCURRENT` from another
1699
- # version to this version, then Secrets Manager also automatically moves
1700
- # the staging label `AWSPREVIOUS` to the version that `AWSCURRENT` was
1701
- # removed from.
1780
+ # `AWSCURRENT` to it. If this operation moves the staging label
1781
+ # `AWSCURRENT` from another version to this version, then Secrets
1782
+ # Manager also automatically moves the staging label `AWSPREVIOUS` to
1783
+ # the version that `AWSCURRENT` was removed from.
1702
1784
  #
1703
1785
  # This operation is idempotent. If you call this operation with a
1704
1786
  # `ClientRequestToken` that matches an existing version's VersionId,
@@ -1707,14 +1789,21 @@ module Aws::SecretsManager
1707
1789
  # fails because you can't modify an existing version; you can only
1708
1790
  # create new ones.
1709
1791
  #
1792
+ # Secrets Manager generates a CloudTrail log entry when you call this
1793
+ # action. Do not include sensitive information in request parameters
1794
+ # except `SecretBinary` or `SecretString` because it might be logged.
1795
+ # For more information, see [Logging Secrets Manager events with
1796
+ # CloudTrail][1].
1797
+ #
1710
1798
  # <b>Required permissions: </b> `secretsmanager:PutSecretValue`. For
1711
- # more information, see [ IAM policy actions for Secrets Manager][1] and
1712
- # [Authentication and access control in Secrets Manager][2].
1799
+ # more information, see [ IAM policy actions for Secrets Manager][2] and
1800
+ # [Authentication and access control in Secrets Manager][3].
1713
1801
  #
1714
1802
  #
1715
1803
  #
1716
- # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1717
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1804
+ # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
1805
+ # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1806
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1718
1807
  #
1719
1808
  # @option params [required, String] :secret_id
1720
1809
  # The ARN or name of the secret to add a new version to.
@@ -1861,15 +1950,21 @@ module Aws::SecretsManager
1861
1950
  # For a secret that is replicated to other Regions, deletes the secret
1862
1951
  # replicas from the Regions you specify.
1863
1952
  #
1953
+ # Secrets Manager generates a CloudTrail log entry when you call this
1954
+ # action. Do not include sensitive information in request parameters
1955
+ # because it might be logged. For more information, see [Logging Secrets
1956
+ # Manager events with CloudTrail][1].
1957
+ #
1864
1958
  # <b>Required permissions: </b>
1865
1959
  # `secretsmanager:RemoveRegionsFromReplication`. For more information,
1866
- # see [ IAM policy actions for Secrets Manager][1] and [Authentication
1867
- # and access control in Secrets Manager][2].
1960
+ # see [ IAM policy actions for Secrets Manager][2] and [Authentication
1961
+ # and access control in Secrets Manager][3].
1868
1962
  #
1869
1963
  #
1870
1964
  #
1871
- # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1872
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1965
+ # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
1966
+ # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1967
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1873
1968
  #
1874
1969
  # @option params [required, String] :secret_id
1875
1970
  # The ARN or name of the secret.
@@ -1910,16 +2005,22 @@ module Aws::SecretsManager
1910
2005
 
1911
2006
  # Replicates the secret to a new Regions. See [Multi-Region secrets][1].
1912
2007
  #
2008
+ # Secrets Manager generates a CloudTrail log entry when you call this
2009
+ # action. Do not include sensitive information in request parameters
2010
+ # because it might be logged. For more information, see [Logging Secrets
2011
+ # Manager events with CloudTrail][2].
2012
+ #
1913
2013
  # <b>Required permissions: </b>
1914
2014
  # `secretsmanager:ReplicateSecretToRegions`. For more information, see [
1915
- # IAM policy actions for Secrets Manager][2] and [Authentication and
1916
- # access control in Secrets Manager][3].
2015
+ # IAM policy actions for Secrets Manager][3] and [Authentication and
2016
+ # access control in Secrets Manager][4].
1917
2017
  #
1918
2018
  #
1919
2019
  #
1920
2020
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/create-manage-multi-region-secrets.html
1921
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1922
- # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2021
+ # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
2022
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2023
+ # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1923
2024
  #
1924
2025
  # @option params [required, String] :secret_id
1925
2026
  # The ARN or name of the secret to replicate.
@@ -1972,14 +2073,20 @@ module Aws::SecretsManager
1972
2073
  # `DeletedDate` time stamp. You can access a secret again after it has
1973
2074
  # been restored.
1974
2075
  #
2076
+ # Secrets Manager generates a CloudTrail log entry when you call this
2077
+ # action. Do not include sensitive information in request parameters
2078
+ # because it might be logged. For more information, see [Logging Secrets
2079
+ # Manager events with CloudTrail][1].
2080
+ #
1975
2081
  # <b>Required permissions: </b> `secretsmanager:RestoreSecret`. For more
1976
- # information, see [ IAM policy actions for Secrets Manager][1] and
1977
- # [Authentication and access control in Secrets Manager][2].
2082
+ # information, see [ IAM policy actions for Secrets Manager][2] and
2083
+ # [Authentication and access control in Secrets Manager][3].
1978
2084
  #
1979
2085
  #
1980
2086
  #
1981
- # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1982
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2087
+ # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
2088
+ # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2089
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1983
2090
  #
1984
2091
  # @option params [required, String] :secret_id
1985
2092
  # The ARN or name of the secret to restore.
@@ -2064,11 +2171,16 @@ module Aws::SecretsManager
2064
2171
  # later invocation of `RotateSecret` assumes that a previous rotation
2065
2172
  # request is still in progress and returns an error.
2066
2173
  #
2174
+ # Secrets Manager generates a CloudTrail log entry when you call this
2175
+ # action. Do not include sensitive information in request parameters
2176
+ # because it might be logged. For more information, see [Logging Secrets
2177
+ # Manager events with CloudTrail][7].
2178
+ #
2067
2179
  # <b>Required permissions: </b> `secretsmanager:RotateSecret`. For more
2068
- # information, see [ IAM policy actions for Secrets Manager][7] and
2069
- # [Authentication and access control in Secrets Manager][8]. You also
2180
+ # information, see [ IAM policy actions for Secrets Manager][8] and
2181
+ # [Authentication and access control in Secrets Manager][9]. You also
2070
2182
  # need `lambda:InvokeFunction` permissions on the rotation function. For
2071
- # more information, see [ Permissions for rotation][9].
2183
+ # more information, see [ Permissions for rotation][10].
2072
2184
  #
2073
2185
  #
2074
2186
  #
@@ -2078,9 +2190,10 @@ module Aws::SecretsManager
2078
2190
  # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/rotate-secrets_how.html
2079
2191
  # [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_available-rotation-templates.html
2080
2192
  # [6]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/rotating-secrets_strategies.html
2081
- # [7]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2082
- # [8]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2083
- # [9]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/rotating-secrets-required-permissions-function.html
2193
+ # [7]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
2194
+ # [8]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2195
+ # [9]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2196
+ # [10]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/rotating-secrets-required-permissions-function.html
2084
2197
  #
2085
2198
  # @option params [required, String] :secret_id
2086
2199
  # The ARN or name of the secret to rotate.
@@ -2222,15 +2335,21 @@ module Aws::SecretsManager
2222
2335
  # You must call this operation from the Region in which you want to
2223
2336
  # promote the replica to a primary secret.
2224
2337
  #
2338
+ # Secrets Manager generates a CloudTrail log entry when you call this
2339
+ # action. Do not include sensitive information in request parameters
2340
+ # because it might be logged. For more information, see [Logging Secrets
2341
+ # Manager events with CloudTrail][1].
2342
+ #
2225
2343
  # <b>Required permissions: </b>
2226
2344
  # `secretsmanager:StopReplicationToReplica`. For more information, see [
2227
- # IAM policy actions for Secrets Manager][1] and [Authentication and
2228
- # access control in Secrets Manager][2].
2345
+ # IAM policy actions for Secrets Manager][2] and [Authentication and
2346
+ # access control in Secrets Manager][3].
2229
2347
  #
2230
2348
  #
2231
2349
  #
2232
- # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2233
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2350
+ # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
2351
+ # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2352
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2234
2353
  #
2235
2354
  # @option params [required, String] :secret_id
2236
2355
  # The ARN of the primary secret.
@@ -2289,14 +2408,20 @@ module Aws::SecretsManager
2289
2408
  # operation would result in you losing your permissions for this secret,
2290
2409
  # then the operation is blocked and returns an Access Denied error.
2291
2410
  #
2411
+ # Secrets Manager generates a CloudTrail log entry when you call this
2412
+ # action. Do not include sensitive information in request parameters
2413
+ # because it might be logged. For more information, see [Logging Secrets
2414
+ # Manager events with CloudTrail][1].
2415
+ #
2292
2416
  # <b>Required permissions: </b> `secretsmanager:TagResource`. For more
2293
- # information, see [ IAM policy actions for Secrets Manager][1] and
2294
- # [Authentication and access control in Secrets Manager][2].
2417
+ # information, see [ IAM policy actions for Secrets Manager][2] and
2418
+ # [Authentication and access control in Secrets Manager][3].
2295
2419
  #
2296
2420
  #
2297
2421
  #
2298
- # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2299
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2422
+ # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
2423
+ # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2424
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2300
2425
  #
2301
2426
  # @option params [required, String] :secret_id
2302
2427
  # The identifier for the secret to attach tags to. You can specify
@@ -2376,14 +2501,20 @@ module Aws::SecretsManager
2376
2501
  # would result in you losing your permissions for this secret, then the
2377
2502
  # operation is blocked and returns an Access Denied error.
2378
2503
  #
2504
+ # Secrets Manager generates a CloudTrail log entry when you call this
2505
+ # action. Do not include sensitive information in request parameters
2506
+ # because it might be logged. For more information, see [Logging Secrets
2507
+ # Manager events with CloudTrail][1].
2508
+ #
2379
2509
  # <b>Required permissions: </b> `secretsmanager:UntagResource`. For more
2380
- # information, see [ IAM policy actions for Secrets Manager][1] and
2381
- # [Authentication and access control in Secrets Manager][2].
2510
+ # information, see [ IAM policy actions for Secrets Manager][2] and
2511
+ # [Authentication and access control in Secrets Manager][3].
2382
2512
  #
2383
2513
  #
2384
2514
  #
2385
- # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2386
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2515
+ # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
2516
+ # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2517
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2387
2518
  #
2388
2519
  # @option params [required, String] :secret_id
2389
2520
  # The ARN or name of the secret.
@@ -2458,8 +2589,9 @@ module Aws::SecretsManager
2458
2589
  # reach the quota for secret versions.
2459
2590
  #
2460
2591
  # If you include `SecretString` or `SecretBinary` to create a new secret
2461
- # version, Secrets Manager automatically attaches the staging label
2462
- # `AWSCURRENT` to the new version.
2592
+ # version, Secrets Manager automatically moves the staging label
2593
+ # `AWSCURRENT` to the new version. Then it attaches the label
2594
+ # `AWSPREVIOUS` to the version that `AWSCURRENT` was removed from.
2463
2595
  #
2464
2596
  # If you call this operation with a `ClientRequestToken` that matches an
2465
2597
  # existing version's `VersionId`, the operation results in an error.
@@ -2467,18 +2599,25 @@ module Aws::SecretsManager
2467
2599
  # version. To remove a version, remove all staging labels from it. See
2468
2600
  # UpdateSecretVersionStage.
2469
2601
  #
2602
+ # Secrets Manager generates a CloudTrail log entry when you call this
2603
+ # action. Do not include sensitive information in request parameters
2604
+ # except `SecretBinary` or `SecretString` because it might be logged.
2605
+ # For more information, see [Logging Secrets Manager events with
2606
+ # CloudTrail][1].
2607
+ #
2470
2608
  # <b>Required permissions: </b> `secretsmanager:UpdateSecret`. For more
2471
- # information, see [ IAM policy actions for Secrets Manager][1] and
2472
- # [Authentication and access control in Secrets Manager][2]. If you use
2609
+ # information, see [ IAM policy actions for Secrets Manager][2] and
2610
+ # [Authentication and access control in Secrets Manager][3]. If you use
2473
2611
  # a customer managed key, you must also have `kms:GenerateDataKey` and
2474
2612
  # `kms:Decrypt` permissions on the key. For more information, see [
2475
- # Secret encryption and decryption][3].
2613
+ # Secret encryption and decryption][4].
2476
2614
  #
2477
2615
  #
2478
2616
  #
2479
- # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2480
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2481
- # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security-encryption.html
2617
+ # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
2618
+ # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2619
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2620
+ # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security-encryption.html
2482
2621
  #
2483
2622
  # @option params [required, String] :secret_id
2484
2623
  # The ARN or name of the secret.
@@ -2671,16 +2810,22 @@ module Aws::SecretsManager
2671
2810
  # then the version is considered to be 'deprecated' and can be deleted
2672
2811
  # by Secrets Manager.
2673
2812
  #
2813
+ # Secrets Manager generates a CloudTrail log entry when you call this
2814
+ # action. Do not include sensitive information in request parameters
2815
+ # because it might be logged. For more information, see [Logging Secrets
2816
+ # Manager events with CloudTrail][2].
2817
+ #
2674
2818
  # <b>Required permissions: </b>
2675
2819
  # `secretsmanager:UpdateSecretVersionStage`. For more information, see [
2676
- # IAM policy actions for Secrets Manager][2] and [Authentication and
2677
- # access control in Secrets Manager][3].
2820
+ # IAM policy actions for Secrets Manager][3] and [Authentication and
2821
+ # access control in Secrets Manager][4].
2678
2822
  #
2679
2823
  #
2680
2824
  #
2681
2825
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/getting-started.html#term_version
2682
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2683
- # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2826
+ # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
2827
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2828
+ # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2684
2829
  #
2685
2830
  # @option params [required, String] :secret_id
2686
2831
  # The ARN or the name of the secret with the version and staging
@@ -2809,15 +2954,21 @@ module Aws::SecretsManager
2809
2954
  #
2810
2955
  # * Verifies the policy does not lock out a caller.
2811
2956
  #
2957
+ # Secrets Manager generates a CloudTrail log entry when you call this
2958
+ # action. Do not include sensitive information in request parameters
2959
+ # because it might be logged. For more information, see [Logging Secrets
2960
+ # Manager events with CloudTrail][2].
2961
+ #
2812
2962
  # <b>Required permissions: </b> `secretsmanager:ValidateResourcePolicy`.
2813
- # For more information, see [ IAM policy actions for Secrets Manager][2]
2814
- # and [Authentication and access control in Secrets Manager][3].
2963
+ # For more information, see [ IAM policy actions for Secrets Manager][3]
2964
+ # and [Authentication and access control in Secrets Manager][4].
2815
2965
  #
2816
2966
  #
2817
2967
  #
2818
2968
  # [1]: https://aws.amazon.com/blogs/security/protect-sensitive-data-in-the-cloud-with-automated-reasoning-zelkova/
2819
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2820
- # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2969
+ # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
2970
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2971
+ # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2821
2972
  #
2822
2973
  # @option params [String] :secret_id
2823
2974
  # This field is reserved for internal use.
@@ -2890,7 +3041,7 @@ module Aws::SecretsManager
2890
3041
  params: params,
2891
3042
  config: config)
2892
3043
  context[:gem_name] = 'aws-sdk-secretsmanager'
2893
- context[:gem_version] = '1.65.0'
3044
+ context[:gem_version] = '1.67.0'
2894
3045
  Seahorse::Client::Request.new(handlers, context)
2895
3046
  end
2896
3047