aws-sdk-secretsmanager 1.84.0 → 1.110.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +130 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-secretsmanager/client.rb +400 -91
- data/lib/aws-sdk-secretsmanager/client_api.rb +65 -0
- data/lib/aws-sdk-secretsmanager/endpoint_parameters.rb +9 -6
- data/lib/aws-sdk-secretsmanager/endpoint_provider.rb +15 -0
- data/lib/aws-sdk-secretsmanager/endpoints.rb +2 -306
- data/lib/aws-sdk-secretsmanager/plugins/endpoints.rb +23 -58
- data/lib/aws-sdk-secretsmanager/types.rb +255 -24
- data/lib/aws-sdk-secretsmanager.rb +16 -12
- data/sig/client.rbs +443 -0
- data/sig/errors.rbs +52 -0
- data/sig/resource.rbs +83 -0
- data/sig/types.rbs +485 -0
- data/sig/waiters.rbs +13 -0
- metadata +16 -11
@@ -22,6 +22,7 @@ require 'aws-sdk-core/plugins/endpoint_pattern.rb'
|
|
22
22
|
require 'aws-sdk-core/plugins/response_paging.rb'
|
23
23
|
require 'aws-sdk-core/plugins/stub_responses.rb'
|
24
24
|
require 'aws-sdk-core/plugins/idempotency_token.rb'
|
25
|
+
require 'aws-sdk-core/plugins/invocation_id.rb'
|
25
26
|
require 'aws-sdk-core/plugins/jsonvalue_converter.rb'
|
26
27
|
require 'aws-sdk-core/plugins/client_metrics_plugin.rb'
|
27
28
|
require 'aws-sdk-core/plugins/client_metrics_send_plugin.rb'
|
@@ -31,11 +32,10 @@ require 'aws-sdk-core/plugins/checksum_algorithm.rb'
|
|
31
32
|
require 'aws-sdk-core/plugins/request_compression.rb'
|
32
33
|
require 'aws-sdk-core/plugins/defaults_mode.rb'
|
33
34
|
require 'aws-sdk-core/plugins/recursion_detection.rb'
|
35
|
+
require 'aws-sdk-core/plugins/telemetry.rb'
|
34
36
|
require 'aws-sdk-core/plugins/sign.rb'
|
35
37
|
require 'aws-sdk-core/plugins/protocols/json_rpc.rb'
|
36
38
|
|
37
|
-
Aws::Plugins::GlobalConfiguration.add_identifier(:secretsmanager)
|
38
|
-
|
39
39
|
module Aws::SecretsManager
|
40
40
|
# An API client for SecretsManager. To construct a client, you need to configure a `:region` and `:credentials`.
|
41
41
|
#
|
@@ -72,6 +72,7 @@ module Aws::SecretsManager
|
|
72
72
|
add_plugin(Aws::Plugins::ResponsePaging)
|
73
73
|
add_plugin(Aws::Plugins::StubResponses)
|
74
74
|
add_plugin(Aws::Plugins::IdempotencyToken)
|
75
|
+
add_plugin(Aws::Plugins::InvocationId)
|
75
76
|
add_plugin(Aws::Plugins::JsonvalueConverter)
|
76
77
|
add_plugin(Aws::Plugins::ClientMetricsPlugin)
|
77
78
|
add_plugin(Aws::Plugins::ClientMetricsSendPlugin)
|
@@ -81,12 +82,18 @@ module Aws::SecretsManager
|
|
81
82
|
add_plugin(Aws::Plugins::RequestCompression)
|
82
83
|
add_plugin(Aws::Plugins::DefaultsMode)
|
83
84
|
add_plugin(Aws::Plugins::RecursionDetection)
|
85
|
+
add_plugin(Aws::Plugins::Telemetry)
|
84
86
|
add_plugin(Aws::Plugins::Sign)
|
85
87
|
add_plugin(Aws::Plugins::Protocols::JsonRpc)
|
86
88
|
add_plugin(Aws::SecretsManager::Plugins::Endpoints)
|
87
89
|
|
88
90
|
# @overload initialize(options)
|
89
91
|
# @param [Hash] options
|
92
|
+
#
|
93
|
+
# @option options [Array<Seahorse::Client::Plugin>] :plugins ([]])
|
94
|
+
# A list of plugins to apply to the client. Each plugin is either a
|
95
|
+
# class name or an instance of a plugin class.
|
96
|
+
#
|
90
97
|
# @option options [required, Aws::CredentialProvider] :credentials
|
91
98
|
# Your AWS credentials. This can be an instance of any one of the
|
92
99
|
# following classes:
|
@@ -121,13 +128,15 @@ module Aws::SecretsManager
|
|
121
128
|
# locations will be searched for credentials:
|
122
129
|
#
|
123
130
|
# * `Aws.config[:credentials]`
|
124
|
-
# * The `:access_key_id`, `:secret_access_key`,
|
125
|
-
#
|
131
|
+
# * The `:access_key_id`, `:secret_access_key`, `:session_token`, and
|
132
|
+
# `:account_id` options.
|
133
|
+
# * ENV['AWS_ACCESS_KEY_ID'], ENV['AWS_SECRET_ACCESS_KEY'],
|
134
|
+
# ENV['AWS_SESSION_TOKEN'], and ENV['AWS_ACCOUNT_ID']
|
126
135
|
# * `~/.aws/credentials`
|
127
136
|
# * `~/.aws/config`
|
128
137
|
# * EC2/ECS IMDS instance profile - When used by default, the timeouts
|
129
138
|
# are very aggressive. Construct and pass an instance of
|
130
|
-
# `Aws::
|
139
|
+
# `Aws::InstanceProfileCredentials` or `Aws::ECSCredentials` to
|
131
140
|
# enable retries and extended timeouts. Instance profile credential
|
132
141
|
# fetching can be disabled by setting ENV['AWS_EC2_METADATA_DISABLED']
|
133
142
|
# to true.
|
@@ -146,6 +155,8 @@ module Aws::SecretsManager
|
|
146
155
|
#
|
147
156
|
# @option options [String] :access_key_id
|
148
157
|
#
|
158
|
+
# @option options [String] :account_id
|
159
|
+
#
|
149
160
|
# @option options [Boolean] :active_endpoint_cache (false)
|
150
161
|
# When set to `true`, a thread polling for endpoints will be running in
|
151
162
|
# the background every 60 secs (default). Defaults to `false`.
|
@@ -196,10 +207,16 @@ module Aws::SecretsManager
|
|
196
207
|
# When set to 'true' the request body will not be compressed
|
197
208
|
# for supported operations.
|
198
209
|
#
|
199
|
-
# @option options [String] :endpoint
|
200
|
-
#
|
201
|
-
#
|
202
|
-
#
|
210
|
+
# @option options [String, URI::HTTPS, URI::HTTP] :endpoint
|
211
|
+
# Normally you should not configure the `:endpoint` option
|
212
|
+
# directly. This is normally constructed from the `:region`
|
213
|
+
# option. Configuring `:endpoint` is normally reserved for
|
214
|
+
# connecting to test or custom endpoints. The endpoint should
|
215
|
+
# be a URI formatted like:
|
216
|
+
#
|
217
|
+
# 'http://example.com'
|
218
|
+
# 'https://example.com'
|
219
|
+
# 'http://example.com:123'
|
203
220
|
#
|
204
221
|
# @option options [Integer] :endpoint_cache_max_entries (1000)
|
205
222
|
# Used for the maximum size limit of the LRU cache storing endpoints data
|
@@ -289,25 +306,31 @@ module Aws::SecretsManager
|
|
289
306
|
# throttling. This is a provisional mode that may change behavior
|
290
307
|
# in the future.
|
291
308
|
#
|
292
|
-
#
|
293
309
|
# @option options [String] :sdk_ua_app_id
|
294
310
|
# A unique and opaque application ID that is appended to the
|
295
|
-
# User-Agent header as app
|
296
|
-
# maximum length of 50.
|
311
|
+
# User-Agent header as app/sdk_ua_app_id. It should have a
|
312
|
+
# maximum length of 50. This variable is sourced from environment
|
313
|
+
# variable AWS_SDK_UA_APP_ID or the shared config profile attribute sdk_ua_app_id.
|
297
314
|
#
|
298
315
|
# @option options [String] :secret_access_key
|
299
316
|
#
|
300
317
|
# @option options [String] :session_token
|
301
318
|
#
|
319
|
+
# @option options [Array] :sigv4a_signing_region_set
|
320
|
+
# A list of regions that should be signed with SigV4a signing. When
|
321
|
+
# not passed, a default `:sigv4a_signing_region_set` is searched for
|
322
|
+
# in the following locations:
|
323
|
+
#
|
324
|
+
# * `Aws.config[:sigv4a_signing_region_set]`
|
325
|
+
# * `ENV['AWS_SIGV4A_SIGNING_REGION_SET']`
|
326
|
+
# * `~/.aws/config`
|
327
|
+
#
|
302
328
|
# @option options [Boolean] :simple_json (false)
|
303
329
|
# Disables request parameter conversion, validation, and formatting.
|
304
|
-
# Also
|
305
|
-
#
|
306
|
-
#
|
307
|
-
# structures.
|
308
|
-
#
|
309
|
-
# When `:simple_json` is enabled, the request parameters hash must
|
310
|
-
# be formatted exactly as the DynamoDB API expects.
|
330
|
+
# Also disables response data type conversions. The request parameters
|
331
|
+
# hash must be formatted exactly as the API expects.This option is useful
|
332
|
+
# when you want to ensure the highest level of performance by avoiding
|
333
|
+
# overhead of walking request parameters and response data structures.
|
311
334
|
#
|
312
335
|
# @option options [Boolean] :stub_responses (false)
|
313
336
|
# Causes the client to return stubbed responses. By default
|
@@ -318,6 +341,16 @@ module Aws::SecretsManager
|
|
318
341
|
# ** Please note ** When response stubbing is enabled, no HTTP
|
319
342
|
# requests are made, and retries are disabled.
|
320
343
|
#
|
344
|
+
# @option options [Aws::Telemetry::TelemetryProviderBase] :telemetry_provider (Aws::Telemetry::NoOpTelemetryProvider)
|
345
|
+
# Allows you to provide a telemetry provider, which is used to
|
346
|
+
# emit telemetry data. By default, uses `NoOpTelemetryProvider` which
|
347
|
+
# will not record or emit any telemetry data. The SDK supports the
|
348
|
+
# following telemetry providers:
|
349
|
+
#
|
350
|
+
# * OpenTelemetry (OTel) - To use the OTel provider, install and require the
|
351
|
+
# `opentelemetry-sdk` gem and then, pass in an instance of a
|
352
|
+
# `Aws::Telemetry::OTelProvider` for telemetry provider.
|
353
|
+
#
|
321
354
|
# @option options [Aws::TokenProvider] :token_provider
|
322
355
|
# A Bearer Token Provider. This can be an instance of any one of the
|
323
356
|
# following classes:
|
@@ -345,59 +378,233 @@ module Aws::SecretsManager
|
|
345
378
|
# sending the request.
|
346
379
|
#
|
347
380
|
# @option options [Aws::SecretsManager::EndpointProvider] :endpoint_provider
|
348
|
-
# The endpoint provider used to resolve endpoints. Any object that responds to
|
381
|
+
# The endpoint provider used to resolve endpoints. Any object that responds to
|
382
|
+
# `#resolve_endpoint(parameters)` where `parameters` is a Struct similar to
|
383
|
+
# `Aws::SecretsManager::EndpointParameters`.
|
384
|
+
#
|
385
|
+
# @option options [Float] :http_continue_timeout (1)
|
386
|
+
# The number of seconds to wait for a 100-continue response before sending the
|
387
|
+
# request body. This option has no effect unless the request has "Expect"
|
388
|
+
# header set to "100-continue". Defaults to `nil` which disables this
|
389
|
+
# behaviour. This value can safely be set per request on the session.
|
390
|
+
#
|
391
|
+
# @option options [Float] :http_idle_timeout (5)
|
392
|
+
# The number of seconds a connection is allowed to sit idle before it
|
393
|
+
# is considered stale. Stale connections are closed and removed from the
|
394
|
+
# pool before making a request.
|
395
|
+
#
|
396
|
+
# @option options [Float] :http_open_timeout (15)
|
397
|
+
# The default number of seconds to wait for response data.
|
398
|
+
# This value can safely be set per-request on the session.
|
399
|
+
#
|
400
|
+
# @option options [URI::HTTP,String] :http_proxy
|
401
|
+
# A proxy to send requests through. Formatted like 'http://proxy.com:123'.
|
402
|
+
#
|
403
|
+
# @option options [Float] :http_read_timeout (60)
|
404
|
+
# The default number of seconds to wait for response data.
|
405
|
+
# This value can safely be set per-request on the session.
|
406
|
+
#
|
407
|
+
# @option options [Boolean] :http_wire_trace (false)
|
408
|
+
# When `true`, HTTP debug output will be sent to the `:logger`.
|
409
|
+
#
|
410
|
+
# @option options [Proc] :on_chunk_received
|
411
|
+
# When a Proc object is provided, it will be used as callback when each chunk
|
412
|
+
# of the response body is received. It provides three arguments: the chunk,
|
413
|
+
# the number of bytes received, and the total number of
|
414
|
+
# bytes in the response (or nil if the server did not send a `content-length`).
|
415
|
+
#
|
416
|
+
# @option options [Proc] :on_chunk_sent
|
417
|
+
# When a Proc object is provided, it will be used as callback when each chunk
|
418
|
+
# of the request body is sent. It provides three arguments: the chunk,
|
419
|
+
# the number of bytes read from the body, and the total number of
|
420
|
+
# bytes in the body.
|
421
|
+
#
|
422
|
+
# @option options [Boolean] :raise_response_errors (true)
|
423
|
+
# When `true`, response errors are raised.
|
424
|
+
#
|
425
|
+
# @option options [String] :ssl_ca_bundle
|
426
|
+
# Full path to the SSL certificate authority bundle file that should be used when
|
427
|
+
# verifying peer certificates. If you do not pass `:ssl_ca_bundle` or
|
428
|
+
# `:ssl_ca_directory` the the system default will be used if available.
|
429
|
+
#
|
430
|
+
# @option options [String] :ssl_ca_directory
|
431
|
+
# Full path of the directory that contains the unbundled SSL certificate
|
432
|
+
# authority files for verifying peer certificates. If you do
|
433
|
+
# not pass `:ssl_ca_bundle` or `:ssl_ca_directory` the the system
|
434
|
+
# default will be used if available.
|
349
435
|
#
|
350
|
-
# @option options [
|
351
|
-
#
|
436
|
+
# @option options [String] :ssl_ca_store
|
437
|
+
# Sets the X509::Store to verify peer certificate.
|
352
438
|
#
|
353
|
-
# @option options [
|
354
|
-
#
|
355
|
-
# `Timeout::Error`.
|
439
|
+
# @option options [OpenSSL::X509::Certificate] :ssl_cert
|
440
|
+
# Sets a client certificate when creating http connections.
|
356
441
|
#
|
357
|
-
# @option options [
|
358
|
-
#
|
359
|
-
#
|
442
|
+
# @option options [OpenSSL::PKey] :ssl_key
|
443
|
+
# Sets a client key when creating http connections.
|
444
|
+
#
|
445
|
+
# @option options [Float] :ssl_timeout
|
446
|
+
# Sets the SSL timeout in seconds
|
447
|
+
#
|
448
|
+
# @option options [Boolean] :ssl_verify_peer (true)
|
449
|
+
# When `true`, SSL peer certificates are verified when establishing a connection.
|
450
|
+
#
|
451
|
+
def initialize(*args)
|
452
|
+
super
|
453
|
+
end
|
454
|
+
|
455
|
+
# @!group API Operations
|
456
|
+
|
457
|
+
# Retrieves the contents of the encrypted fields `SecretString` or
|
458
|
+
# `SecretBinary` for up to 20 secrets. To retrieve a single secret, call
|
459
|
+
# GetSecretValue.
|
360
460
|
#
|
361
|
-
#
|
362
|
-
#
|
363
|
-
#
|
364
|
-
#
|
461
|
+
# To choose which secrets to retrieve, you can specify a list of secrets
|
462
|
+
# by name or ARN, or you can use filters. If Secrets Manager encounters
|
463
|
+
# errors such as `AccessDeniedException` while attempting to retrieve
|
464
|
+
# any of the secrets, you can see the errors in `Errors` in the
|
465
|
+
# response.
|
365
466
|
#
|
366
|
-
#
|
367
|
-
#
|
368
|
-
#
|
369
|
-
#
|
370
|
-
#
|
371
|
-
# request on the session.
|
467
|
+
# Secrets Manager generates CloudTrail `GetSecretValue` log entries for
|
468
|
+
# each secret you request when you call this action. Do not include
|
469
|
+
# sensitive information in request parameters because it might be
|
470
|
+
# logged. For more information, see [Logging Secrets Manager events with
|
471
|
+
# CloudTrail][1].
|
372
472
|
#
|
373
|
-
#
|
374
|
-
#
|
473
|
+
# <b>Required permissions: </b> `secretsmanager:BatchGetSecretValue`,
|
474
|
+
# and you must have `secretsmanager:GetSecretValue` for each secret. If
|
475
|
+
# you use filters, you must also have `secretsmanager:ListSecrets`. If
|
476
|
+
# the secrets are encrypted using customer-managed keys instead of the
|
477
|
+
# Amazon Web Services managed key `aws/secretsmanager`, then you also
|
478
|
+
# need `kms:Decrypt` permissions for the keys. For more information, see
|
479
|
+
# [ IAM policy actions for Secrets Manager][2] and [Authentication and
|
480
|
+
# access control in Secrets Manager][3].
|
375
481
|
#
|
376
|
-
# @option options [Boolean] :http_wire_trace (false) When `true`,
|
377
|
-
# HTTP debug output will be sent to the `:logger`.
|
378
482
|
#
|
379
|
-
# @option options [Boolean] :ssl_verify_peer (true) When `true`,
|
380
|
-
# SSL peer certificates are verified when establishing a
|
381
|
-
# connection.
|
382
483
|
#
|
383
|
-
#
|
384
|
-
#
|
385
|
-
#
|
386
|
-
# `:ssl_ca_bundle` or `:ssl_ca_directory` the the system default
|
387
|
-
# will be used if available.
|
484
|
+
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
485
|
+
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
486
|
+
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
388
487
|
#
|
389
|
-
#
|
390
|
-
#
|
391
|
-
#
|
392
|
-
# not pass `:ssl_ca_bundle` or `:ssl_ca_directory` the the
|
393
|
-
# system default will be used if available.
|
488
|
+
# @option params [Array<String>] :secret_id_list
|
489
|
+
# The ARN or names of the secrets to retrieve. You must include
|
490
|
+
# `Filters` or `SecretIdList`, but not both.
|
394
491
|
#
|
395
|
-
|
396
|
-
|
492
|
+
# @option params [Array<Types::Filter>] :filters
|
493
|
+
# The filters to choose which secrets to retrieve. You must include
|
494
|
+
# `Filters` or `SecretIdList`, but not both.
|
495
|
+
#
|
496
|
+
# @option params [Integer] :max_results
|
497
|
+
# The number of results to include in the response.
|
498
|
+
#
|
499
|
+
# If there are more results available, in the response, Secrets Manager
|
500
|
+
# includes `NextToken`. To get the next results, call
|
501
|
+
# `BatchGetSecretValue` again with the value from `NextToken`. To use
|
502
|
+
# this parameter, you must also use the `Filters` parameter.
|
503
|
+
#
|
504
|
+
# @option params [String] :next_token
|
505
|
+
# A token that indicates where the output should continue from, if a
|
506
|
+
# previous call did not show all results. To get the next results, call
|
507
|
+
# `BatchGetSecretValue` again with this value.
|
508
|
+
#
|
509
|
+
# @return [Types::BatchGetSecretValueResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
510
|
+
#
|
511
|
+
# * {Types::BatchGetSecretValueResponse#secret_values #secret_values} => Array<Types::SecretValueEntry>
|
512
|
+
# * {Types::BatchGetSecretValueResponse#next_token #next_token} => String
|
513
|
+
# * {Types::BatchGetSecretValueResponse#errors #errors} => Array<Types::APIErrorType>
|
514
|
+
#
|
515
|
+
# The returned {Seahorse::Client::Response response} is a pageable response and is Enumerable. For details on usage see {Aws::PageableResponse PageableResponse}.
|
516
|
+
#
|
517
|
+
#
|
518
|
+
# @example Example: To retrieve the secret values for a group of secrets listed by name
|
519
|
+
#
|
520
|
+
# # The following example gets the values for three secrets.
|
521
|
+
#
|
522
|
+
# resp = client.batch_get_secret_value({
|
523
|
+
# secret_id_list: [
|
524
|
+
# "MySecret1",
|
525
|
+
# "MySecret2",
|
526
|
+
# "MySecret3",
|
527
|
+
# ],
|
528
|
+
# })
|
529
|
+
#
|
530
|
+
# resp.to_h outputs the following:
|
531
|
+
# {
|
532
|
+
# errors: [
|
533
|
+
# ],
|
534
|
+
# secret_values: [
|
535
|
+
# {
|
536
|
+
# arn: "®ion-arn;&asm-service-name;:us-west-2:&ExampleAccountId;:secret:MySecret1-a1b2c3",
|
537
|
+
# created_date: Time.parse(1700591229.801),
|
538
|
+
# name: "MySecret1",
|
539
|
+
# secret_string: "{\"username\":\"diego_ramirez\",\"password\":\"EXAMPLE-PASSWORD\",\"engine\":\"mysql\",\"host\":\"secretsmanagertutorial.cluster.us-west-2.rds.amazonaws.com\",\"port\":3306,\"dbClusterIdentifier\":\"secretsmanagertutorial\"}",
|
540
|
+
# version_id: "a1b2c3d4-5678-90ab-cdef-EXAMPLEaaaaa",
|
541
|
+
# version_stages: [
|
542
|
+
# "AWSCURRENT",
|
543
|
+
# ],
|
544
|
+
# },
|
545
|
+
# {
|
546
|
+
# arn: "®ion-arn;&asm-service-name;:us-west-2:&ExampleAccountId;:secret:MySecret2-a1b2c3",
|
547
|
+
# created_date: Time.parse(1699911394.105),
|
548
|
+
# name: "MySecret2",
|
549
|
+
# secret_string: "{\"username\":\"akua_mansa\",\"password\":\"EXAMPLE-PASSWORD\"",
|
550
|
+
# version_id: "a1b2c3d4-5678-90ab-cdef-EXAMPLEbbbbb",
|
551
|
+
# version_stages: [
|
552
|
+
# "AWSCURRENT",
|
553
|
+
# ],
|
554
|
+
# },
|
555
|
+
# {
|
556
|
+
# arn: "®ion-arn;&asm-service-name;:us-west-2:&ExampleAccountId;:secret:MySecret3-a1b2c3",
|
557
|
+
# created_date: Time.parse(1699911394.105),
|
558
|
+
# name: "MySecret3",
|
559
|
+
# secret_string: "{\"username\":\"jie_liu\",\"password\":\"EXAMPLE-PASSWORD\"",
|
560
|
+
# version_id: "a1b2c3d4-5678-90ab-cdef-EXAMPLEccccc",
|
561
|
+
# version_stages: [
|
562
|
+
# "AWSCURRENT",
|
563
|
+
# ],
|
564
|
+
# },
|
565
|
+
# ],
|
566
|
+
# }
|
567
|
+
#
|
568
|
+
# @example Request syntax with placeholder values
|
569
|
+
#
|
570
|
+
# resp = client.batch_get_secret_value({
|
571
|
+
# secret_id_list: ["SecretIdType"],
|
572
|
+
# filters: [
|
573
|
+
# {
|
574
|
+
# key: "description", # accepts description, name, tag-key, tag-value, primary-region, owning-service, all
|
575
|
+
# values: ["FilterValueStringType"],
|
576
|
+
# },
|
577
|
+
# ],
|
578
|
+
# max_results: 1,
|
579
|
+
# next_token: "NextTokenType",
|
580
|
+
# })
|
581
|
+
#
|
582
|
+
# @example Response structure
|
583
|
+
#
|
584
|
+
# resp.secret_values #=> Array
|
585
|
+
# resp.secret_values[0].arn #=> String
|
586
|
+
# resp.secret_values[0].name #=> String
|
587
|
+
# resp.secret_values[0].version_id #=> String
|
588
|
+
# resp.secret_values[0].secret_binary #=> String
|
589
|
+
# resp.secret_values[0].secret_string #=> String
|
590
|
+
# resp.secret_values[0].version_stages #=> Array
|
591
|
+
# resp.secret_values[0].version_stages[0] #=> String
|
592
|
+
# resp.secret_values[0].created_date #=> Time
|
593
|
+
# resp.next_token #=> String
|
594
|
+
# resp.errors #=> Array
|
595
|
+
# resp.errors[0].secret_id #=> String
|
596
|
+
# resp.errors[0].error_code #=> String
|
597
|
+
# resp.errors[0].message #=> String
|
598
|
+
#
|
599
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/secretsmanager-2017-10-17/BatchGetSecretValue AWS API Documentation
|
600
|
+
#
|
601
|
+
# @overload batch_get_secret_value(params = {})
|
602
|
+
# @param [Hash] params ({})
|
603
|
+
def batch_get_secret_value(params = {}, options = {})
|
604
|
+
req = build_request(:batch_get_secret_value, params)
|
605
|
+
req.send_request(options)
|
397
606
|
end
|
398
607
|
|
399
|
-
# @!group API Operations
|
400
|
-
|
401
608
|
# Turns off automatic rotation, and if a rotation is currently in
|
402
609
|
# progress, cancels the rotation.
|
403
610
|
#
|
@@ -530,14 +737,21 @@ module Aws::SecretsManager
|
|
530
737
|
#
|
531
738
|
# <b>Required permissions: </b> `secretsmanager:CreateSecret`. If you
|
532
739
|
# include tags in the secret, you also need
|
533
|
-
# `secretsmanager:TagResource`.
|
534
|
-
#
|
535
|
-
#
|
740
|
+
# `secretsmanager:TagResource`. To add replica Regions, you must also
|
741
|
+
# have `secretsmanager:ReplicateSecretToRegions`. For more information,
|
742
|
+
# see [ IAM policy actions for Secrets Manager][5] and [Authentication
|
743
|
+
# and access control in Secrets Manager][6].
|
536
744
|
#
|
537
745
|
# To encrypt the secret with a KMS key other than `aws/secretsmanager`,
|
538
746
|
# you need `kms:GenerateDataKey` and `kms:Decrypt` permission to the
|
539
747
|
# key.
|
540
748
|
#
|
749
|
+
# When you enter commands in a command shell, there is a risk of the
|
750
|
+
# command history being accessed or utilities having access to your
|
751
|
+
# command parameters. This is a concern if the command includes the
|
752
|
+
# value of a secret. Learn how to [Mitigate the risks of using
|
753
|
+
# command-line tools to store Secrets Manager secrets][7].
|
754
|
+
#
|
541
755
|
#
|
542
756
|
#
|
543
757
|
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/service-linked-secrets.html
|
@@ -546,6 +760,7 @@ module Aws::SecretsManager
|
|
546
760
|
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
547
761
|
# [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
548
762
|
# [6]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
763
|
+
# [7]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
|
549
764
|
#
|
550
765
|
# @option params [required, String] :name
|
551
766
|
# The name of the new secret.
|
@@ -639,6 +854,11 @@ module Aws::SecretsManager
|
|
639
854
|
#
|
640
855
|
# This parameter is not available in the Secrets Manager console.
|
641
856
|
#
|
857
|
+
# Sensitive: This field contains sensitive information, so the service
|
858
|
+
# does not include it in CloudTrail log entries. If you create your own
|
859
|
+
# log entries, you must also avoid logging the information in this
|
860
|
+
# field.
|
861
|
+
#
|
642
862
|
# @option params [String] :secret_string
|
643
863
|
# The text data to encrypt and store in this new version of the secret.
|
644
864
|
# We recommend you use a JSON structure of key/value pairs for your
|
@@ -653,11 +873,16 @@ module Aws::SecretsManager
|
|
653
873
|
# information as a JSON structure of key/value pairs that a Lambda
|
654
874
|
# rotation function can parse.
|
655
875
|
#
|
876
|
+
# Sensitive: This field contains sensitive information, so the service
|
877
|
+
# does not include it in CloudTrail log entries. If you create your own
|
878
|
+
# log entries, you must also avoid logging the information in this
|
879
|
+
# field.
|
880
|
+
#
|
656
881
|
# @option params [Array<Types::Tag>] :tags
|
657
882
|
# A list of tags to attach to the secret. Each tag is a key and value
|
658
883
|
# pair of strings in a JSON text string, for example:
|
659
884
|
#
|
660
|
-
# `[
|
885
|
+
# `[{"Key":"CostCenter","Value":"12345"},{"Key":"environment","Value":"production"}]`
|
661
886
|
#
|
662
887
|
# Secrets Manager tag key names are case sensitive. A tag with the key
|
663
888
|
# "ABC" is a different tag from one with key "abc".
|
@@ -1115,22 +1340,21 @@ module Aws::SecretsManager
|
|
1115
1340
|
|
1116
1341
|
# Generates a random password. We recommend that you specify the maximum
|
1117
1342
|
# length and include every character type that the system you are
|
1118
|
-
# generating a password for can support.
|
1343
|
+
# generating a password for can support. By default, Secrets Manager
|
1344
|
+
# uses uppercase and lowercase letters, numbers, and the following
|
1345
|
+
# characters in passwords: `` !"#$%&'()*+,-./:;<=>?@[\\]^_`{|}~ ``
|
1119
1346
|
#
|
1120
1347
|
# Secrets Manager generates a CloudTrail log entry when you call this
|
1121
|
-
# action.
|
1122
|
-
# because it might be logged. For more information, see [Logging Secrets
|
1123
|
-
# Manager events with CloudTrail][1].
|
1348
|
+
# action.
|
1124
1349
|
#
|
1125
1350
|
# <b>Required permissions: </b> `secretsmanager:GetRandomPassword`. For
|
1126
|
-
# more information, see [ IAM policy actions for Secrets Manager][
|
1127
|
-
# [Authentication and access control in Secrets Manager][
|
1351
|
+
# more information, see [ IAM policy actions for Secrets Manager][1] and
|
1352
|
+
# [Authentication and access control in Secrets Manager][2].
|
1128
1353
|
#
|
1129
1354
|
#
|
1130
1355
|
#
|
1131
|
-
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
1132
|
-
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
1133
|
-
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
1356
|
+
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
1357
|
+
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
1134
1358
|
#
|
1135
1359
|
# @option params [Integer] :password_length
|
1136
1360
|
# The length of the password. If you don't include this parameter, the
|
@@ -1146,7 +1370,7 @@ module Aws::SecretsManager
|
|
1146
1370
|
# @option params [Boolean] :exclude_punctuation
|
1147
1371
|
# Specifies whether to exclude the following punctuation characters from
|
1148
1372
|
# the password: `` ! " # $ % & ' ( ) * + , - . / : ; < = > ? @ [ \ ] ^ _
|
1149
|
-
# `
|
1373
|
+
# ` { | } ~ ``. If you don't include this switch, the password can
|
1150
1374
|
# contain punctuation.
|
1151
1375
|
#
|
1152
1376
|
# @option params [Boolean] :exclude_uppercase
|
@@ -1294,6 +1518,9 @@ module Aws::SecretsManager
|
|
1294
1518
|
# `SecretBinary` from the specified version of a secret, whichever
|
1295
1519
|
# contains content.
|
1296
1520
|
#
|
1521
|
+
# To retrieve the values for a group of secrets, call
|
1522
|
+
# BatchGetSecretValue.
|
1523
|
+
#
|
1297
1524
|
# We recommend that you cache your secret values by using client-side
|
1298
1525
|
# caching. Caching secrets improves speed and reduces your costs. For
|
1299
1526
|
# more information, see [Cache secrets for your applications][1].
|
@@ -1323,7 +1550,8 @@ module Aws::SecretsManager
|
|
1323
1550
|
# [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
1324
1551
|
#
|
1325
1552
|
# @option params [required, String] :secret_id
|
1326
|
-
# The ARN or name of the secret to retrieve.
|
1553
|
+
# The ARN or name of the secret to retrieve. To retrieve a secret from
|
1554
|
+
# another account, you must use an ARN.
|
1327
1555
|
#
|
1328
1556
|
# For an ARN, we recommend that you specify a complete ARN rather than a
|
1329
1557
|
# partial ARN. See [Finding a secret from a partial ARN][1].
|
@@ -1546,13 +1774,13 @@ module Aws::SecretsManager
|
|
1546
1774
|
# Services account, not including secrets that are marked for deletion.
|
1547
1775
|
# To see secrets marked for deletion, use the Secrets Manager console.
|
1548
1776
|
#
|
1549
|
-
#
|
1550
|
-
# changes from the last five minutes.
|
1551
|
-
# a specific secret
|
1777
|
+
# All Secrets Manager operations are eventually consistent. ListSecrets
|
1778
|
+
# might not reflect changes from the last five minutes. You can get more
|
1779
|
+
# recent information for a specific secret by calling DescribeSecret.
|
1552
1780
|
#
|
1553
1781
|
# To list the versions of a secret, use ListSecretVersionIds.
|
1554
1782
|
#
|
1555
|
-
# To
|
1783
|
+
# To retrieve the values for the secrets, call BatchGetSecretValue or
|
1556
1784
|
# GetSecretValue.
|
1557
1785
|
#
|
1558
1786
|
# For information about finding secrets in the console, see [Find
|
@@ -1737,6 +1965,25 @@ module Aws::SecretsManager
|
|
1737
1965
|
# access to the secret, for example those that use a wildcard for the
|
1738
1966
|
# principal. By default, public policies aren't blocked.
|
1739
1967
|
#
|
1968
|
+
# Resource policy validation and the BlockPublicPolicy parameter help
|
1969
|
+
# protect your resources by preventing public access from being granted
|
1970
|
+
# through the resource policies that are directly attached to your
|
1971
|
+
# secrets. In addition to using these features, carefully inspect the
|
1972
|
+
# following policies to confirm that they do not grant public access:
|
1973
|
+
#
|
1974
|
+
# * Identity-based policies attached to associated Amazon Web Services
|
1975
|
+
# principals (for example, IAM roles)
|
1976
|
+
#
|
1977
|
+
# * Resource-based policies attached to associated Amazon Web Services
|
1978
|
+
# resources (for example, Key Management Service (KMS) keys)
|
1979
|
+
#
|
1980
|
+
# To review permissions to your secrets, see [Determine who has
|
1981
|
+
# permissions to your secrets][1].
|
1982
|
+
#
|
1983
|
+
#
|
1984
|
+
#
|
1985
|
+
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/determine-acccess_examine-iam-policies.html
|
1986
|
+
#
|
1740
1987
|
# @return [Types::PutResourcePolicyResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1741
1988
|
#
|
1742
1989
|
# * {Types::PutResourcePolicyResponse#arn #arn} => String
|
@@ -1812,19 +2059,26 @@ module Aws::SecretsManager
|
|
1812
2059
|
#
|
1813
2060
|
# Secrets Manager generates a CloudTrail log entry when you call this
|
1814
2061
|
# action. Do not include sensitive information in request parameters
|
1815
|
-
# except `SecretBinary` or `
|
1816
|
-
# For more information, see [Logging Secrets Manager
|
1817
|
-
# CloudTrail][1].
|
2062
|
+
# except `SecretBinary`, `SecretString`, or `RotationToken` because it
|
2063
|
+
# might be logged. For more information, see [Logging Secrets Manager
|
2064
|
+
# events with CloudTrail][1].
|
1818
2065
|
#
|
1819
2066
|
# <b>Required permissions: </b> `secretsmanager:PutSecretValue`. For
|
1820
2067
|
# more information, see [ IAM policy actions for Secrets Manager][2] and
|
1821
2068
|
# [Authentication and access control in Secrets Manager][3].
|
1822
2069
|
#
|
2070
|
+
# When you enter commands in a command shell, there is a risk of the
|
2071
|
+
# command history being accessed or utilities having access to your
|
2072
|
+
# command parameters. This is a concern if the command includes the
|
2073
|
+
# value of a secret. Learn how to [Mitigate the risks of using
|
2074
|
+
# command-line tools to store Secrets Manager secrets][4].
|
2075
|
+
#
|
1823
2076
|
#
|
1824
2077
|
#
|
1825
2078
|
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
1826
2079
|
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
1827
2080
|
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
2081
|
+
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
|
1828
2082
|
#
|
1829
2083
|
# @option params [required, String] :secret_id
|
1830
2084
|
# The ARN or name of the secret to add a new version to.
|
@@ -1890,6 +2144,11 @@ module Aws::SecretsManager
|
|
1890
2144
|
#
|
1891
2145
|
# You can't access this value from the Secrets Manager console.
|
1892
2146
|
#
|
2147
|
+
# Sensitive: This field contains sensitive information, so the service
|
2148
|
+
# does not include it in CloudTrail log entries. If you create your own
|
2149
|
+
# log entries, you must also avoid logging the information in this
|
2150
|
+
# field.
|
2151
|
+
#
|
1893
2152
|
# @option params [String] :secret_string
|
1894
2153
|
# The text to encrypt and store in the new version of the secret.
|
1895
2154
|
#
|
@@ -1898,6 +2157,11 @@ module Aws::SecretsManager
|
|
1898
2157
|
# We recommend you create the secret string as JSON key/value pairs, as
|
1899
2158
|
# shown in the example.
|
1900
2159
|
#
|
2160
|
+
# Sensitive: This field contains sensitive information, so the service
|
2161
|
+
# does not include it in CloudTrail log entries. If you create your own
|
2162
|
+
# log entries, you must also avoid logging the information in this
|
2163
|
+
# field.
|
2164
|
+
#
|
1901
2165
|
# @option params [Array<String>] :version_stages
|
1902
2166
|
# A list of staging labels to attach to this version of the secret.
|
1903
2167
|
# Secrets Manager uses staging labels to track versions of a secret
|
@@ -1913,6 +2177,23 @@ module Aws::SecretsManager
|
|
1913
2177
|
# If you don't include `VersionStages`, then Secrets Manager
|
1914
2178
|
# automatically moves the staging label `AWSCURRENT` to this version.
|
1915
2179
|
#
|
2180
|
+
# @option params [String] :rotation_token
|
2181
|
+
# A unique identifier that indicates the source of the request. For
|
2182
|
+
# cross-account rotation (when you rotate a secret in one account by
|
2183
|
+
# using a Lambda rotation function in another account) and the Lambda
|
2184
|
+
# rotation function assumes an IAM role to call Secrets Manager, Secrets
|
2185
|
+
# Manager validates the identity with the rotation token. For more
|
2186
|
+
# information, see [How rotation works][1].
|
2187
|
+
#
|
2188
|
+
# Sensitive: This field contains sensitive information, so the service
|
2189
|
+
# does not include it in CloudTrail log entries. If you create your own
|
2190
|
+
# log entries, you must also avoid logging the information in this
|
2191
|
+
# field.
|
2192
|
+
#
|
2193
|
+
#
|
2194
|
+
#
|
2195
|
+
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/rotating-secrets.html
|
2196
|
+
#
|
1916
2197
|
# @return [Types::PutSecretValueResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1917
2198
|
#
|
1918
2199
|
# * {Types::PutSecretValueResponse#arn #arn} => String
|
@@ -1950,6 +2231,7 @@ module Aws::SecretsManager
|
|
1950
2231
|
# secret_binary: "data",
|
1951
2232
|
# secret_string: "SecretStringType",
|
1952
2233
|
# version_stages: ["SecretVersionStageType"],
|
2234
|
+
# rotation_token: "RotationTokenType",
|
1953
2235
|
# })
|
1954
2236
|
#
|
1955
2237
|
# @example Response structure
|
@@ -2033,9 +2315,13 @@ module Aws::SecretsManager
|
|
2033
2315
|
# Manager events with CloudTrail][2].
|
2034
2316
|
#
|
2035
2317
|
# <b>Required permissions: </b>
|
2036
|
-
# `secretsmanager:ReplicateSecretToRegions`.
|
2037
|
-
#
|
2038
|
-
#
|
2318
|
+
# `secretsmanager:ReplicateSecretToRegions`. If the primary secret is
|
2319
|
+
# encrypted with a KMS key other than `aws/secretsmanager`, you also
|
2320
|
+
# need `kms:Decrypt` permission to the key. To encrypt the replicated
|
2321
|
+
# secret with a KMS key other than `aws/secretsmanager`, you need
|
2322
|
+
# `kms:GenerateDataKey` and `kms:Encrypt` to the key. For more
|
2323
|
+
# information, see [ IAM policy actions for Secrets Manager][3] and
|
2324
|
+
# [Authentication and access control in Secrets Manager][4].
|
2039
2325
|
#
|
2040
2326
|
#
|
2041
2327
|
#
|
@@ -2296,7 +2582,7 @@ module Aws::SecretsManager
|
|
2296
2582
|
#
|
2297
2583
|
#
|
2298
2584
|
#
|
2299
|
-
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/rotate-
|
2585
|
+
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/rotate-secrets_lambda-functions.html#rotate-secrets_lambda-functions-code
|
2300
2586
|
#
|
2301
2587
|
# @return [Types::RotateSecretResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
2302
2588
|
#
|
@@ -2641,10 +2927,16 @@ module Aws::SecretsManager
|
|
2641
2927
|
# a customer managed key, you must also have `kms:GenerateDataKey`,
|
2642
2928
|
# `kms:Encrypt`, and `kms:Decrypt` permissions on the key. If you change
|
2643
2929
|
# the KMS key and you don't have `kms:Encrypt` permission to the new
|
2644
|
-
# key, Secrets Manager does not re-
|
2930
|
+
# key, Secrets Manager does not re-encrypt existing secret versions with
|
2645
2931
|
# the new key. For more information, see [ Secret encryption and
|
2646
2932
|
# decryption][5].
|
2647
2933
|
#
|
2934
|
+
# When you enter commands in a command shell, there is a risk of the
|
2935
|
+
# command history being accessed or utilities having access to your
|
2936
|
+
# command parameters. This is a concern if the command includes the
|
2937
|
+
# value of a secret. Learn how to [Mitigate the risks of using
|
2938
|
+
# command-line tools to store Secrets Manager secrets][6].
|
2939
|
+
#
|
2648
2940
|
#
|
2649
2941
|
#
|
2650
2942
|
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/service-linked-secrets.html
|
@@ -2652,6 +2944,7 @@ module Aws::SecretsManager
|
|
2652
2944
|
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
2653
2945
|
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
2654
2946
|
# [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security-encryption.html
|
2947
|
+
# [6]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
|
2655
2948
|
#
|
2656
2949
|
# @option params [required, String] :secret_id
|
2657
2950
|
# The ARN or name of the secret.
|
@@ -2700,8 +2993,8 @@ module Aws::SecretsManager
|
|
2700
2993
|
# encrypt new secret versions as well as any existing versions with the
|
2701
2994
|
# staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. If you
|
2702
2995
|
# don't have `kms:Encrypt` permission to the new key, Secrets Manager
|
2703
|
-
# does not re-
|
2704
|
-
# information about versions and staging labels, see [Concepts:
|
2996
|
+
# does not re-encrypt existing secret versions with the new key. For
|
2997
|
+
# more information about versions and staging labels, see [Concepts:
|
2705
2998
|
# Version][1].
|
2706
2999
|
#
|
2707
3000
|
# A key alias is always prefixed by `alias/`, for example
|
@@ -2739,6 +3032,11 @@ module Aws::SecretsManager
|
|
2739
3032
|
#
|
2740
3033
|
# You can't access this parameter in the Secrets Manager console.
|
2741
3034
|
#
|
3035
|
+
# Sensitive: This field contains sensitive information, so the service
|
3036
|
+
# does not include it in CloudTrail log entries. If you create your own
|
3037
|
+
# log entries, you must also avoid logging the information in this
|
3038
|
+
# field.
|
3039
|
+
#
|
2742
3040
|
# @option params [String] :secret_string
|
2743
3041
|
# The text data to encrypt and store in the new version of the secret.
|
2744
3042
|
# We recommend you use a JSON structure of key/value pairs for your
|
@@ -2747,6 +3045,11 @@ module Aws::SecretsManager
|
|
2747
3045
|
# Either `SecretBinary` or `SecretString` must have a value, but not
|
2748
3046
|
# both.
|
2749
3047
|
#
|
3048
|
+
# Sensitive: This field contains sensitive information, so the service
|
3049
|
+
# does not include it in CloudTrail log entries. If you create your own
|
3050
|
+
# log entries, you must also avoid logging the information in this
|
3051
|
+
# field.
|
3052
|
+
#
|
2750
3053
|
# @return [Types::UpdateSecretResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
2751
3054
|
#
|
2752
3055
|
# * {Types::UpdateSecretResponse#arn #arn} => String
|
@@ -3016,7 +3319,8 @@ module Aws::SecretsManager
|
|
3016
3319
|
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
3017
3320
|
#
|
3018
3321
|
# @option params [String] :secret_id
|
3019
|
-
#
|
3322
|
+
# The ARN or name of the secret with the resource-based policy you want
|
3323
|
+
# to validate.
|
3020
3324
|
#
|
3021
3325
|
# @option params [required, String] :resource_policy
|
3022
3326
|
# A JSON-formatted string that contains an Amazon Web Services
|
@@ -3079,14 +3383,19 @@ module Aws::SecretsManager
|
|
3079
3383
|
# @api private
|
3080
3384
|
def build_request(operation_name, params = {})
|
3081
3385
|
handlers = @handlers.for(operation_name)
|
3386
|
+
tracer = config.telemetry_provider.tracer_provider.tracer(
|
3387
|
+
Aws::Telemetry.module_to_tracer_name('Aws::SecretsManager')
|
3388
|
+
)
|
3082
3389
|
context = Seahorse::Client::RequestContext.new(
|
3083
3390
|
operation_name: operation_name,
|
3084
3391
|
operation: config.api.operation(operation_name),
|
3085
3392
|
client: self,
|
3086
3393
|
params: params,
|
3087
|
-
config: config
|
3394
|
+
config: config,
|
3395
|
+
tracer: tracer
|
3396
|
+
)
|
3088
3397
|
context[:gem_name] = 'aws-sdk-secretsmanager'
|
3089
|
-
context[:gem_version] = '1.
|
3398
|
+
context[:gem_version] = '1.110.0'
|
3090
3399
|
Seahorse::Client::Request.new(handlers, context)
|
3091
3400
|
end
|
3092
3401
|
|