aws-sdk-secretsmanager 1.65.0 → 1.67.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-secretsmanager/client.rb +252 -101
- data/lib/aws-sdk-secretsmanager/endpoint_parameters.rb +66 -0
- data/lib/aws-sdk-secretsmanager/endpoint_provider.rb +112 -0
- data/lib/aws-sdk-secretsmanager/endpoints.rb +323 -0
- data/lib/aws-sdk-secretsmanager/plugins/endpoints.rb +112 -0
- data/lib/aws-sdk-secretsmanager.rb +5 -1
- metadata +8 -4
@@ -30,7 +30,7 @@ require 'aws-sdk-core/plugins/http_checksum.rb'
|
|
30
30
|
require 'aws-sdk-core/plugins/checksum_algorithm.rb'
|
31
31
|
require 'aws-sdk-core/plugins/defaults_mode.rb'
|
32
32
|
require 'aws-sdk-core/plugins/recursion_detection.rb'
|
33
|
-
require 'aws-sdk-core/plugins/
|
33
|
+
require 'aws-sdk-core/plugins/sign.rb'
|
34
34
|
require 'aws-sdk-core/plugins/protocols/json_rpc.rb'
|
35
35
|
|
36
36
|
Aws::Plugins::GlobalConfiguration.add_identifier(:secretsmanager)
|
@@ -79,8 +79,9 @@ module Aws::SecretsManager
|
|
79
79
|
add_plugin(Aws::Plugins::ChecksumAlgorithm)
|
80
80
|
add_plugin(Aws::Plugins::DefaultsMode)
|
81
81
|
add_plugin(Aws::Plugins::RecursionDetection)
|
82
|
-
add_plugin(Aws::Plugins::
|
82
|
+
add_plugin(Aws::Plugins::Sign)
|
83
83
|
add_plugin(Aws::Plugins::Protocols::JsonRpc)
|
84
|
+
add_plugin(Aws::SecretsManager::Plugins::Endpoints)
|
84
85
|
|
85
86
|
# @overload initialize(options)
|
86
87
|
# @param [Hash] options
|
@@ -297,6 +298,19 @@ module Aws::SecretsManager
|
|
297
298
|
# ** Please note ** When response stubbing is enabled, no HTTP
|
298
299
|
# requests are made, and retries are disabled.
|
299
300
|
#
|
301
|
+
# @option options [Aws::TokenProvider] :token_provider
|
302
|
+
# A Bearer Token Provider. This can be an instance of any one of the
|
303
|
+
# following classes:
|
304
|
+
#
|
305
|
+
# * `Aws::StaticTokenProvider` - Used for configuring static, non-refreshing
|
306
|
+
# tokens.
|
307
|
+
#
|
308
|
+
# * `Aws::SSOTokenProvider` - Used for loading tokens from AWS SSO using an
|
309
|
+
# access token generated from `aws login`.
|
310
|
+
#
|
311
|
+
# When `:token_provider` is not configured directly, the `Aws::TokenProviderChain`
|
312
|
+
# will be used to search for tokens configured for your profile in shared configuration files.
|
313
|
+
#
|
300
314
|
# @option options [Boolean] :use_dualstack_endpoint
|
301
315
|
# When set to `true`, dualstack enabled endpoints (with `.aws` TLD)
|
302
316
|
# will be used if available.
|
@@ -310,6 +324,9 @@ module Aws::SecretsManager
|
|
310
324
|
# When `true`, request parameters are validated before
|
311
325
|
# sending the request.
|
312
326
|
#
|
327
|
+
# @option options [Aws::SecretsManager::EndpointProvider] :endpoint_provider
|
328
|
+
# The endpoint provider used to resolve endpoints. Any object that responds to `#resolve_endpoint(parameters)` where `parameters` is a Struct similar to `Aws::SecretsManager::EndpointParameters`
|
329
|
+
#
|
313
330
|
# @option options [URI::HTTP,String] :http_proxy A proxy to send
|
314
331
|
# requests through. Formatted like 'http://proxy.com:123'.
|
315
332
|
#
|
@@ -376,15 +393,21 @@ module Aws::SecretsManager
|
|
376
393
|
#
|
377
394
|
# To turn on automatic rotation again, call RotateSecret.
|
378
395
|
#
|
396
|
+
# Secrets Manager generates a CloudTrail log entry when you call this
|
397
|
+
# action. Do not include sensitive information in request parameters
|
398
|
+
# because it might be logged. For more information, see [Logging Secrets
|
399
|
+
# Manager events with CloudTrail][2].
|
400
|
+
#
|
379
401
|
# <b>Required permissions: </b> `secretsmanager:CancelRotateSecret`. For
|
380
|
-
# more information, see [ IAM policy actions for Secrets Manager][
|
381
|
-
# [Authentication and access control in Secrets Manager][
|
402
|
+
# more information, see [ IAM policy actions for Secrets Manager][3] and
|
403
|
+
# [Authentication and access control in Secrets Manager][4].
|
382
404
|
#
|
383
405
|
#
|
384
406
|
#
|
385
407
|
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/rotate-secrets_how.html
|
386
|
-
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
387
|
-
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
408
|
+
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
409
|
+
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
410
|
+
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
388
411
|
#
|
389
412
|
# @option params [required, String] :secret_id
|
390
413
|
# The ARN or name of the secret.
|
@@ -475,11 +498,17 @@ module Aws::SecretsManager
|
|
475
498
|
# to encrypt the secret, and you must create and use a customer managed
|
476
499
|
# KMS key.
|
477
500
|
#
|
501
|
+
# Secrets Manager generates a CloudTrail log entry when you call this
|
502
|
+
# action. Do not include sensitive information in request parameters
|
503
|
+
# except `SecretBinary` or `SecretString` because it might be logged.
|
504
|
+
# For more information, see [Logging Secrets Manager events with
|
505
|
+
# CloudTrail][3].
|
506
|
+
#
|
478
507
|
# <b>Required permissions: </b> `secretsmanager:CreateSecret`. If you
|
479
508
|
# include tags in the secret, you also need
|
480
509
|
# `secretsmanager:TagResource`. For more information, see [ IAM policy
|
481
|
-
# actions for Secrets Manager][
|
482
|
-
# in Secrets Manager][
|
510
|
+
# actions for Secrets Manager][4] and [Authentication and access control
|
511
|
+
# in Secrets Manager][5].
|
483
512
|
#
|
484
513
|
# To encrypt the secret with a KMS key other than `aws/secretsmanager`,
|
485
514
|
# you need `kms:GenerateDataKey` and `kms:Decrypt` permission to the
|
@@ -489,8 +518,9 @@ module Aws::SecretsManager
|
|
489
518
|
#
|
490
519
|
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/manage_create-basic-secret.html
|
491
520
|
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_secret_json_structure.html
|
492
|
-
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
493
|
-
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
521
|
+
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
522
|
+
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
523
|
+
# [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
494
524
|
#
|
495
525
|
# @option params [required, String] :name
|
496
526
|
# The name of the new secret.
|
@@ -730,14 +760,20 @@ module Aws::SecretsManager
|
|
730
760
|
# Deletes the resource-based permission policy attached to the secret.
|
731
761
|
# To attach a policy to a secret, use PutResourcePolicy.
|
732
762
|
#
|
763
|
+
# Secrets Manager generates a CloudTrail log entry when you call this
|
764
|
+
# action. Do not include sensitive information in request parameters
|
765
|
+
# because it might be logged. For more information, see [Logging Secrets
|
766
|
+
# Manager events with CloudTrail][1].
|
767
|
+
#
|
733
768
|
# <b>Required permissions: </b> `secretsmanager:DeleteResourcePolicy`.
|
734
|
-
# For more information, see [ IAM policy actions for Secrets Manager][
|
735
|
-
# and [Authentication and access control in Secrets Manager][
|
769
|
+
# For more information, see [ IAM policy actions for Secrets Manager][2]
|
770
|
+
# and [Authentication and access control in Secrets Manager][3].
|
736
771
|
#
|
737
772
|
#
|
738
773
|
#
|
739
|
-
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
740
|
-
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
774
|
+
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
775
|
+
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
776
|
+
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
741
777
|
#
|
742
778
|
# @option params [required, String] :secret_id
|
743
779
|
# The ARN or name of the secret to delete the attached resource-based
|
@@ -824,15 +860,21 @@ module Aws::SecretsManager
|
|
824
860
|
# secret value. You must first cancel the deletion with RestoreSecret
|
825
861
|
# and then you can retrieve the secret.
|
826
862
|
#
|
863
|
+
# Secrets Manager generates a CloudTrail log entry when you call this
|
864
|
+
# action. Do not include sensitive information in request parameters
|
865
|
+
# because it might be logged. For more information, see [Logging Secrets
|
866
|
+
# Manager events with CloudTrail][2].
|
867
|
+
#
|
827
868
|
# <b>Required permissions: </b> `secretsmanager:DeleteSecret`. For more
|
828
|
-
# information, see [ IAM policy actions for Secrets Manager][
|
829
|
-
# [Authentication and access control in Secrets Manager][
|
869
|
+
# information, see [ IAM policy actions for Secrets Manager][3] and
|
870
|
+
# [Authentication and access control in Secrets Manager][4].
|
830
871
|
#
|
831
872
|
#
|
832
873
|
#
|
833
874
|
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/monitoring_cloudwatch_deleted-secrets.html
|
834
|
-
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
835
|
-
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
875
|
+
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
876
|
+
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
877
|
+
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
836
878
|
#
|
837
879
|
# @option params [required, String] :secret_id
|
838
880
|
# The ARN or name of the secret to delete.
|
@@ -921,14 +963,20 @@ module Aws::SecretsManager
|
|
921
963
|
# secret value. Secrets Manager only returns fields that have a value in
|
922
964
|
# the response.
|
923
965
|
#
|
966
|
+
# Secrets Manager generates a CloudTrail log entry when you call this
|
967
|
+
# action. Do not include sensitive information in request parameters
|
968
|
+
# because it might be logged. For more information, see [Logging Secrets
|
969
|
+
# Manager events with CloudTrail][1].
|
970
|
+
#
|
924
971
|
# <b>Required permissions: </b> `secretsmanager:DescribeSecret`. For
|
925
|
-
# more information, see [ IAM policy actions for Secrets Manager][
|
926
|
-
# [Authentication and access control in Secrets Manager][
|
972
|
+
# more information, see [ IAM policy actions for Secrets Manager][2] and
|
973
|
+
# [Authentication and access control in Secrets Manager][3].
|
927
974
|
#
|
928
975
|
#
|
929
976
|
#
|
930
|
-
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
931
|
-
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
977
|
+
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
978
|
+
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
979
|
+
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
932
980
|
#
|
933
981
|
# @option params [required, String] :secret_id
|
934
982
|
# The ARN or name of the secret.
|
@@ -1055,14 +1103,20 @@ module Aws::SecretsManager
|
|
1055
1103
|
# length and include every character type that the system you are
|
1056
1104
|
# generating a password for can support.
|
1057
1105
|
#
|
1106
|
+
# Secrets Manager generates a CloudTrail log entry when you call this
|
1107
|
+
# action. Do not include sensitive information in request parameters
|
1108
|
+
# because it might be logged. For more information, see [Logging Secrets
|
1109
|
+
# Manager events with CloudTrail][1].
|
1110
|
+
#
|
1058
1111
|
# <b>Required permissions: </b> `secretsmanager:GetRandomPassword`. For
|
1059
|
-
# more information, see [ IAM policy actions for Secrets Manager][
|
1060
|
-
# [Authentication and access control in Secrets Manager][
|
1112
|
+
# more information, see [ IAM policy actions for Secrets Manager][2] and
|
1113
|
+
# [Authentication and access control in Secrets Manager][3].
|
1061
1114
|
#
|
1062
1115
|
#
|
1063
1116
|
#
|
1064
|
-
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
1065
|
-
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
1117
|
+
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
1118
|
+
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
1119
|
+
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
1066
1120
|
#
|
1067
1121
|
# @option params [Integer] :password_length
|
1068
1122
|
# The length of the password. If you don't include this parameter, the
|
@@ -1152,15 +1206,21 @@ module Aws::SecretsManager
|
|
1152
1206
|
# attached to a secret, see [Permissions policies attached to a
|
1153
1207
|
# secret][1].
|
1154
1208
|
#
|
1209
|
+
# Secrets Manager generates a CloudTrail log entry when you call this
|
1210
|
+
# action. Do not include sensitive information in request parameters
|
1211
|
+
# because it might be logged. For more information, see [Logging Secrets
|
1212
|
+
# Manager events with CloudTrail][2].
|
1213
|
+
#
|
1155
1214
|
# <b>Required permissions: </b> `secretsmanager:GetResourcePolicy`. For
|
1156
|
-
# more information, see [ IAM policy actions for Secrets Manager][
|
1157
|
-
# [Authentication and access control in Secrets Manager][
|
1215
|
+
# more information, see [ IAM policy actions for Secrets Manager][3] and
|
1216
|
+
# [Authentication and access control in Secrets Manager][4].
|
1158
1217
|
#
|
1159
1218
|
#
|
1160
1219
|
#
|
1161
1220
|
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access_resource-policies.html
|
1162
|
-
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
1163
|
-
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
1221
|
+
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
1222
|
+
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
1223
|
+
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
1164
1224
|
#
|
1165
1225
|
# @option params [required, String] :secret_id
|
1166
1226
|
# The ARN or name of the secret to retrieve the attached resource-based
|
@@ -1228,19 +1288,25 @@ module Aws::SecretsManager
|
|
1228
1288
|
# specify AWSPREVIOUS. To revert to the previous version of a secret,
|
1229
1289
|
# call [UpdateSecretVersionStage][2].
|
1230
1290
|
#
|
1291
|
+
# Secrets Manager generates a CloudTrail log entry when you call this
|
1292
|
+
# action. Do not include sensitive information in request parameters
|
1293
|
+
# because it might be logged. For more information, see [Logging Secrets
|
1294
|
+
# Manager events with CloudTrail][3].
|
1295
|
+
#
|
1231
1296
|
# <b>Required permissions: </b> `secretsmanager:GetSecretValue`. If the
|
1232
1297
|
# secret is encrypted using a customer-managed key instead of the Amazon
|
1233
1298
|
# Web Services managed key `aws/secretsmanager`, then you also need
|
1234
1299
|
# `kms:Decrypt` permissions for that key. For more information, see [
|
1235
|
-
# IAM policy actions for Secrets Manager][
|
1236
|
-
# access control in Secrets Manager][
|
1300
|
+
# IAM policy actions for Secrets Manager][4] and [Authentication and
|
1301
|
+
# access control in Secrets Manager][5].
|
1237
1302
|
#
|
1238
1303
|
#
|
1239
1304
|
#
|
1240
1305
|
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieving-secrets.html
|
1241
1306
|
# [2]: https://docs.aws.amazon.com/cli/latest/reference/secretsmanager/update-secret-version-stage.html
|
1242
|
-
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
1243
|
-
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
1307
|
+
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
1308
|
+
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
1309
|
+
# [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
1244
1310
|
#
|
1245
1311
|
# @option params [required, String] :secret_id
|
1246
1312
|
# The ARN or name of the secret to retrieve.
|
@@ -1340,15 +1406,21 @@ module Aws::SecretsManager
|
|
1340
1406
|
#
|
1341
1407
|
# To list the secrets in the account, use ListSecrets.
|
1342
1408
|
#
|
1409
|
+
# Secrets Manager generates a CloudTrail log entry when you call this
|
1410
|
+
# action. Do not include sensitive information in request parameters
|
1411
|
+
# because it might be logged. For more information, see [Logging Secrets
|
1412
|
+
# Manager events with CloudTrail][2].
|
1413
|
+
#
|
1343
1414
|
# <b>Required permissions: </b> `secretsmanager:ListSecretVersionIds`.
|
1344
|
-
# For more information, see [ IAM policy actions for Secrets Manager][
|
1345
|
-
# and [Authentication and access control in Secrets Manager][
|
1415
|
+
# For more information, see [ IAM policy actions for Secrets Manager][3]
|
1416
|
+
# and [Authentication and access control in Secrets Manager][4].
|
1346
1417
|
#
|
1347
1418
|
#
|
1348
1419
|
#
|
1349
1420
|
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/getting-started.html#term_version
|
1350
|
-
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
1351
|
-
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
1421
|
+
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
1422
|
+
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
1423
|
+
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
1352
1424
|
#
|
1353
1425
|
# @option params [required, String] :secret_id
|
1354
1426
|
# The ARN or name of the secret whose versions you want to list.
|
@@ -1471,15 +1543,21 @@ module Aws::SecretsManager
|
|
1471
1543
|
# For information about finding secrets in the console, see [Find
|
1472
1544
|
# secrets in Secrets Manager][1].
|
1473
1545
|
#
|
1546
|
+
# Secrets Manager generates a CloudTrail log entry when you call this
|
1547
|
+
# action. Do not include sensitive information in request parameters
|
1548
|
+
# because it might be logged. For more information, see [Logging Secrets
|
1549
|
+
# Manager events with CloudTrail][2].
|
1550
|
+
#
|
1474
1551
|
# <b>Required permissions: </b> `secretsmanager:ListSecrets`. For more
|
1475
|
-
# information, see [ IAM policy actions for Secrets Manager][
|
1476
|
-
# [Authentication and access control in Secrets Manager][
|
1552
|
+
# information, see [ IAM policy actions for Secrets Manager][3] and
|
1553
|
+
# [Authentication and access control in Secrets Manager][4].
|
1477
1554
|
#
|
1478
1555
|
#
|
1479
1556
|
#
|
1480
1557
|
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/manage_search-secret.html
|
1481
|
-
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
1482
|
-
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
1558
|
+
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
1559
|
+
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
1560
|
+
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
1483
1561
|
#
|
1484
1562
|
# @option params [Integer] :max_results
|
1485
1563
|
# The number of results to include in the response.
|
@@ -1599,15 +1677,21 @@ module Aws::SecretsManager
|
|
1599
1677
|
# For information about attaching a policy in the console, see [Attach a
|
1600
1678
|
# permissions policy to a secret][2].
|
1601
1679
|
#
|
1680
|
+
# Secrets Manager generates a CloudTrail log entry when you call this
|
1681
|
+
# action. Do not include sensitive information in request parameters
|
1682
|
+
# because it might be logged. For more information, see [Logging Secrets
|
1683
|
+
# Manager events with CloudTrail][3].
|
1684
|
+
#
|
1602
1685
|
# <b>Required permissions: </b> `secretsmanager:PutResourcePolicy`. For
|
1603
|
-
# more information, see [ IAM policy actions for Secrets Manager][
|
1686
|
+
# more information, see [ IAM policy actions for Secrets Manager][4] and
|
1604
1687
|
# [Authentication and access control in Secrets Manager][1].
|
1605
1688
|
#
|
1606
1689
|
#
|
1607
1690
|
#
|
1608
1691
|
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
1609
1692
|
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access_resource-based-policies.html
|
1610
|
-
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
1693
|
+
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
1694
|
+
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
1611
1695
|
#
|
1612
1696
|
# @option params [required, String] :secret_id
|
1613
1697
|
# The ARN or name of the secret to attach the resource-based policy.
|
@@ -1693,12 +1777,10 @@ module Aws::SecretsManager
|
|
1693
1777
|
# Manager automatically moves the staging label `AWSCURRENT` to this
|
1694
1778
|
# version. If this operation creates the first version for the secret,
|
1695
1779
|
# then Secrets Manager automatically attaches the staging label
|
1696
|
-
# `AWSCURRENT` to it
|
1697
|
-
#
|
1698
|
-
#
|
1699
|
-
#
|
1700
|
-
# the staging label `AWSPREVIOUS` to the version that `AWSCURRENT` was
|
1701
|
-
# removed from.
|
1780
|
+
# `AWSCURRENT` to it. If this operation moves the staging label
|
1781
|
+
# `AWSCURRENT` from another version to this version, then Secrets
|
1782
|
+
# Manager also automatically moves the staging label `AWSPREVIOUS` to
|
1783
|
+
# the version that `AWSCURRENT` was removed from.
|
1702
1784
|
#
|
1703
1785
|
# This operation is idempotent. If you call this operation with a
|
1704
1786
|
# `ClientRequestToken` that matches an existing version's VersionId,
|
@@ -1707,14 +1789,21 @@ module Aws::SecretsManager
|
|
1707
1789
|
# fails because you can't modify an existing version; you can only
|
1708
1790
|
# create new ones.
|
1709
1791
|
#
|
1792
|
+
# Secrets Manager generates a CloudTrail log entry when you call this
|
1793
|
+
# action. Do not include sensitive information in request parameters
|
1794
|
+
# except `SecretBinary` or `SecretString` because it might be logged.
|
1795
|
+
# For more information, see [Logging Secrets Manager events with
|
1796
|
+
# CloudTrail][1].
|
1797
|
+
#
|
1710
1798
|
# <b>Required permissions: </b> `secretsmanager:PutSecretValue`. For
|
1711
|
-
# more information, see [ IAM policy actions for Secrets Manager][
|
1712
|
-
# [Authentication and access control in Secrets Manager][
|
1799
|
+
# more information, see [ IAM policy actions for Secrets Manager][2] and
|
1800
|
+
# [Authentication and access control in Secrets Manager][3].
|
1713
1801
|
#
|
1714
1802
|
#
|
1715
1803
|
#
|
1716
|
-
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
1717
|
-
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
1804
|
+
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
1805
|
+
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
1806
|
+
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
1718
1807
|
#
|
1719
1808
|
# @option params [required, String] :secret_id
|
1720
1809
|
# The ARN or name of the secret to add a new version to.
|
@@ -1861,15 +1950,21 @@ module Aws::SecretsManager
|
|
1861
1950
|
# For a secret that is replicated to other Regions, deletes the secret
|
1862
1951
|
# replicas from the Regions you specify.
|
1863
1952
|
#
|
1953
|
+
# Secrets Manager generates a CloudTrail log entry when you call this
|
1954
|
+
# action. Do not include sensitive information in request parameters
|
1955
|
+
# because it might be logged. For more information, see [Logging Secrets
|
1956
|
+
# Manager events with CloudTrail][1].
|
1957
|
+
#
|
1864
1958
|
# <b>Required permissions: </b>
|
1865
1959
|
# `secretsmanager:RemoveRegionsFromReplication`. For more information,
|
1866
|
-
# see [ IAM policy actions for Secrets Manager][
|
1867
|
-
# and access control in Secrets Manager][
|
1960
|
+
# see [ IAM policy actions for Secrets Manager][2] and [Authentication
|
1961
|
+
# and access control in Secrets Manager][3].
|
1868
1962
|
#
|
1869
1963
|
#
|
1870
1964
|
#
|
1871
|
-
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
1872
|
-
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
1965
|
+
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
1966
|
+
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
1967
|
+
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
1873
1968
|
#
|
1874
1969
|
# @option params [required, String] :secret_id
|
1875
1970
|
# The ARN or name of the secret.
|
@@ -1910,16 +2005,22 @@ module Aws::SecretsManager
|
|
1910
2005
|
|
1911
2006
|
# Replicates the secret to a new Regions. See [Multi-Region secrets][1].
|
1912
2007
|
#
|
2008
|
+
# Secrets Manager generates a CloudTrail log entry when you call this
|
2009
|
+
# action. Do not include sensitive information in request parameters
|
2010
|
+
# because it might be logged. For more information, see [Logging Secrets
|
2011
|
+
# Manager events with CloudTrail][2].
|
2012
|
+
#
|
1913
2013
|
# <b>Required permissions: </b>
|
1914
2014
|
# `secretsmanager:ReplicateSecretToRegions`. For more information, see [
|
1915
|
-
# IAM policy actions for Secrets Manager][
|
1916
|
-
# access control in Secrets Manager][
|
2015
|
+
# IAM policy actions for Secrets Manager][3] and [Authentication and
|
2016
|
+
# access control in Secrets Manager][4].
|
1917
2017
|
#
|
1918
2018
|
#
|
1919
2019
|
#
|
1920
2020
|
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/create-manage-multi-region-secrets.html
|
1921
|
-
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
1922
|
-
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
2021
|
+
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
2022
|
+
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
2023
|
+
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
1923
2024
|
#
|
1924
2025
|
# @option params [required, String] :secret_id
|
1925
2026
|
# The ARN or name of the secret to replicate.
|
@@ -1972,14 +2073,20 @@ module Aws::SecretsManager
|
|
1972
2073
|
# `DeletedDate` time stamp. You can access a secret again after it has
|
1973
2074
|
# been restored.
|
1974
2075
|
#
|
2076
|
+
# Secrets Manager generates a CloudTrail log entry when you call this
|
2077
|
+
# action. Do not include sensitive information in request parameters
|
2078
|
+
# because it might be logged. For more information, see [Logging Secrets
|
2079
|
+
# Manager events with CloudTrail][1].
|
2080
|
+
#
|
1975
2081
|
# <b>Required permissions: </b> `secretsmanager:RestoreSecret`. For more
|
1976
|
-
# information, see [ IAM policy actions for Secrets Manager][
|
1977
|
-
# [Authentication and access control in Secrets Manager][
|
2082
|
+
# information, see [ IAM policy actions for Secrets Manager][2] and
|
2083
|
+
# [Authentication and access control in Secrets Manager][3].
|
1978
2084
|
#
|
1979
2085
|
#
|
1980
2086
|
#
|
1981
|
-
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
1982
|
-
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
2087
|
+
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
2088
|
+
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
2089
|
+
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
1983
2090
|
#
|
1984
2091
|
# @option params [required, String] :secret_id
|
1985
2092
|
# The ARN or name of the secret to restore.
|
@@ -2064,11 +2171,16 @@ module Aws::SecretsManager
|
|
2064
2171
|
# later invocation of `RotateSecret` assumes that a previous rotation
|
2065
2172
|
# request is still in progress and returns an error.
|
2066
2173
|
#
|
2174
|
+
# Secrets Manager generates a CloudTrail log entry when you call this
|
2175
|
+
# action. Do not include sensitive information in request parameters
|
2176
|
+
# because it might be logged. For more information, see [Logging Secrets
|
2177
|
+
# Manager events with CloudTrail][7].
|
2178
|
+
#
|
2067
2179
|
# <b>Required permissions: </b> `secretsmanager:RotateSecret`. For more
|
2068
|
-
# information, see [ IAM policy actions for Secrets Manager][
|
2069
|
-
# [Authentication and access control in Secrets Manager][
|
2180
|
+
# information, see [ IAM policy actions for Secrets Manager][8] and
|
2181
|
+
# [Authentication and access control in Secrets Manager][9]. You also
|
2070
2182
|
# need `lambda:InvokeFunction` permissions on the rotation function. For
|
2071
|
-
# more information, see [ Permissions for rotation][
|
2183
|
+
# more information, see [ Permissions for rotation][10].
|
2072
2184
|
#
|
2073
2185
|
#
|
2074
2186
|
#
|
@@ -2078,9 +2190,10 @@ module Aws::SecretsManager
|
|
2078
2190
|
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/rotate-secrets_how.html
|
2079
2191
|
# [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_available-rotation-templates.html
|
2080
2192
|
# [6]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/rotating-secrets_strategies.html
|
2081
|
-
# [7]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
2082
|
-
# [8]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
2083
|
-
# [9]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
2193
|
+
# [7]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
2194
|
+
# [8]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
2195
|
+
# [9]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
2196
|
+
# [10]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/rotating-secrets-required-permissions-function.html
|
2084
2197
|
#
|
2085
2198
|
# @option params [required, String] :secret_id
|
2086
2199
|
# The ARN or name of the secret to rotate.
|
@@ -2222,15 +2335,21 @@ module Aws::SecretsManager
|
|
2222
2335
|
# You must call this operation from the Region in which you want to
|
2223
2336
|
# promote the replica to a primary secret.
|
2224
2337
|
#
|
2338
|
+
# Secrets Manager generates a CloudTrail log entry when you call this
|
2339
|
+
# action. Do not include sensitive information in request parameters
|
2340
|
+
# because it might be logged. For more information, see [Logging Secrets
|
2341
|
+
# Manager events with CloudTrail][1].
|
2342
|
+
#
|
2225
2343
|
# <b>Required permissions: </b>
|
2226
2344
|
# `secretsmanager:StopReplicationToReplica`. For more information, see [
|
2227
|
-
# IAM policy actions for Secrets Manager][
|
2228
|
-
# access control in Secrets Manager][
|
2345
|
+
# IAM policy actions for Secrets Manager][2] and [Authentication and
|
2346
|
+
# access control in Secrets Manager][3].
|
2229
2347
|
#
|
2230
2348
|
#
|
2231
2349
|
#
|
2232
|
-
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
2233
|
-
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
2350
|
+
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
2351
|
+
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
2352
|
+
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
2234
2353
|
#
|
2235
2354
|
# @option params [required, String] :secret_id
|
2236
2355
|
# The ARN of the primary secret.
|
@@ -2289,14 +2408,20 @@ module Aws::SecretsManager
|
|
2289
2408
|
# operation would result in you losing your permissions for this secret,
|
2290
2409
|
# then the operation is blocked and returns an Access Denied error.
|
2291
2410
|
#
|
2411
|
+
# Secrets Manager generates a CloudTrail log entry when you call this
|
2412
|
+
# action. Do not include sensitive information in request parameters
|
2413
|
+
# because it might be logged. For more information, see [Logging Secrets
|
2414
|
+
# Manager events with CloudTrail][1].
|
2415
|
+
#
|
2292
2416
|
# <b>Required permissions: </b> `secretsmanager:TagResource`. For more
|
2293
|
-
# information, see [ IAM policy actions for Secrets Manager][
|
2294
|
-
# [Authentication and access control in Secrets Manager][
|
2417
|
+
# information, see [ IAM policy actions for Secrets Manager][2] and
|
2418
|
+
# [Authentication and access control in Secrets Manager][3].
|
2295
2419
|
#
|
2296
2420
|
#
|
2297
2421
|
#
|
2298
|
-
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
2299
|
-
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
2422
|
+
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
2423
|
+
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
2424
|
+
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
2300
2425
|
#
|
2301
2426
|
# @option params [required, String] :secret_id
|
2302
2427
|
# The identifier for the secret to attach tags to. You can specify
|
@@ -2376,14 +2501,20 @@ module Aws::SecretsManager
|
|
2376
2501
|
# would result in you losing your permissions for this secret, then the
|
2377
2502
|
# operation is blocked and returns an Access Denied error.
|
2378
2503
|
#
|
2504
|
+
# Secrets Manager generates a CloudTrail log entry when you call this
|
2505
|
+
# action. Do not include sensitive information in request parameters
|
2506
|
+
# because it might be logged. For more information, see [Logging Secrets
|
2507
|
+
# Manager events with CloudTrail][1].
|
2508
|
+
#
|
2379
2509
|
# <b>Required permissions: </b> `secretsmanager:UntagResource`. For more
|
2380
|
-
# information, see [ IAM policy actions for Secrets Manager][
|
2381
|
-
# [Authentication and access control in Secrets Manager][
|
2510
|
+
# information, see [ IAM policy actions for Secrets Manager][2] and
|
2511
|
+
# [Authentication and access control in Secrets Manager][3].
|
2382
2512
|
#
|
2383
2513
|
#
|
2384
2514
|
#
|
2385
|
-
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
2386
|
-
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
2515
|
+
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
2516
|
+
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
2517
|
+
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
2387
2518
|
#
|
2388
2519
|
# @option params [required, String] :secret_id
|
2389
2520
|
# The ARN or name of the secret.
|
@@ -2458,8 +2589,9 @@ module Aws::SecretsManager
|
|
2458
2589
|
# reach the quota for secret versions.
|
2459
2590
|
#
|
2460
2591
|
# If you include `SecretString` or `SecretBinary` to create a new secret
|
2461
|
-
# version, Secrets Manager automatically
|
2462
|
-
# `AWSCURRENT` to the new version.
|
2592
|
+
# version, Secrets Manager automatically moves the staging label
|
2593
|
+
# `AWSCURRENT` to the new version. Then it attaches the label
|
2594
|
+
# `AWSPREVIOUS` to the version that `AWSCURRENT` was removed from.
|
2463
2595
|
#
|
2464
2596
|
# If you call this operation with a `ClientRequestToken` that matches an
|
2465
2597
|
# existing version's `VersionId`, the operation results in an error.
|
@@ -2467,18 +2599,25 @@ module Aws::SecretsManager
|
|
2467
2599
|
# version. To remove a version, remove all staging labels from it. See
|
2468
2600
|
# UpdateSecretVersionStage.
|
2469
2601
|
#
|
2602
|
+
# Secrets Manager generates a CloudTrail log entry when you call this
|
2603
|
+
# action. Do not include sensitive information in request parameters
|
2604
|
+
# except `SecretBinary` or `SecretString` because it might be logged.
|
2605
|
+
# For more information, see [Logging Secrets Manager events with
|
2606
|
+
# CloudTrail][1].
|
2607
|
+
#
|
2470
2608
|
# <b>Required permissions: </b> `secretsmanager:UpdateSecret`. For more
|
2471
|
-
# information, see [ IAM policy actions for Secrets Manager][
|
2472
|
-
# [Authentication and access control in Secrets Manager][
|
2609
|
+
# information, see [ IAM policy actions for Secrets Manager][2] and
|
2610
|
+
# [Authentication and access control in Secrets Manager][3]. If you use
|
2473
2611
|
# a customer managed key, you must also have `kms:GenerateDataKey` and
|
2474
2612
|
# `kms:Decrypt` permissions on the key. For more information, see [
|
2475
|
-
# Secret encryption and decryption][
|
2613
|
+
# Secret encryption and decryption][4].
|
2476
2614
|
#
|
2477
2615
|
#
|
2478
2616
|
#
|
2479
|
-
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
2480
|
-
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
2481
|
-
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
2617
|
+
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
2618
|
+
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
2619
|
+
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
2620
|
+
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security-encryption.html
|
2482
2621
|
#
|
2483
2622
|
# @option params [required, String] :secret_id
|
2484
2623
|
# The ARN or name of the secret.
|
@@ -2671,16 +2810,22 @@ module Aws::SecretsManager
|
|
2671
2810
|
# then the version is considered to be 'deprecated' and can be deleted
|
2672
2811
|
# by Secrets Manager.
|
2673
2812
|
#
|
2813
|
+
# Secrets Manager generates a CloudTrail log entry when you call this
|
2814
|
+
# action. Do not include sensitive information in request parameters
|
2815
|
+
# because it might be logged. For more information, see [Logging Secrets
|
2816
|
+
# Manager events with CloudTrail][2].
|
2817
|
+
#
|
2674
2818
|
# <b>Required permissions: </b>
|
2675
2819
|
# `secretsmanager:UpdateSecretVersionStage`. For more information, see [
|
2676
|
-
# IAM policy actions for Secrets Manager][
|
2677
|
-
# access control in Secrets Manager][
|
2820
|
+
# IAM policy actions for Secrets Manager][3] and [Authentication and
|
2821
|
+
# access control in Secrets Manager][4].
|
2678
2822
|
#
|
2679
2823
|
#
|
2680
2824
|
#
|
2681
2825
|
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/getting-started.html#term_version
|
2682
|
-
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
2683
|
-
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
2826
|
+
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
2827
|
+
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
2828
|
+
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
2684
2829
|
#
|
2685
2830
|
# @option params [required, String] :secret_id
|
2686
2831
|
# The ARN or the name of the secret with the version and staging
|
@@ -2809,15 +2954,21 @@ module Aws::SecretsManager
|
|
2809
2954
|
#
|
2810
2955
|
# * Verifies the policy does not lock out a caller.
|
2811
2956
|
#
|
2957
|
+
# Secrets Manager generates a CloudTrail log entry when you call this
|
2958
|
+
# action. Do not include sensitive information in request parameters
|
2959
|
+
# because it might be logged. For more information, see [Logging Secrets
|
2960
|
+
# Manager events with CloudTrail][2].
|
2961
|
+
#
|
2812
2962
|
# <b>Required permissions: </b> `secretsmanager:ValidateResourcePolicy`.
|
2813
|
-
# For more information, see [ IAM policy actions for Secrets Manager][
|
2814
|
-
# and [Authentication and access control in Secrets Manager][
|
2963
|
+
# For more information, see [ IAM policy actions for Secrets Manager][3]
|
2964
|
+
# and [Authentication and access control in Secrets Manager][4].
|
2815
2965
|
#
|
2816
2966
|
#
|
2817
2967
|
#
|
2818
2968
|
# [1]: https://aws.amazon.com/blogs/security/protect-sensitive-data-in-the-cloud-with-automated-reasoning-zelkova/
|
2819
|
-
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
2820
|
-
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
2969
|
+
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
2970
|
+
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
2971
|
+
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
2821
2972
|
#
|
2822
2973
|
# @option params [String] :secret_id
|
2823
2974
|
# This field is reserved for internal use.
|
@@ -2890,7 +3041,7 @@ module Aws::SecretsManager
|
|
2890
3041
|
params: params,
|
2891
3042
|
config: config)
|
2892
3043
|
context[:gem_name] = 'aws-sdk-secretsmanager'
|
2893
|
-
context[:gem_version] = '1.
|
3044
|
+
context[:gem_version] = '1.67.0'
|
2894
3045
|
Seahorse::Client::Request.new(handlers, context)
|
2895
3046
|
end
|
2896
3047
|
|