@aws-sdk/client-secrets-manager 3.36.0 → 3.39.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (81) hide show
  1. package/CHANGELOG.md +42 -0
  2. package/dist-cjs/SecretsManager.js +0 -65
  3. package/dist-cjs/SecretsManagerClient.js +0 -70
  4. package/dist-cjs/commands/CancelRotateSecretCommand.js +0 -76
  5. package/dist-cjs/commands/CreateSecretCommand.js +0 -111
  6. package/dist-cjs/commands/DeleteResourcePolicyCommand.js +0 -47
  7. package/dist-cjs/commands/DeleteSecretCommand.js +0 -69
  8. package/dist-cjs/commands/DescribeSecretCommand.js +0 -51
  9. package/dist-cjs/commands/GetRandomPasswordCommand.js +0 -36
  10. package/dist-cjs/commands/GetResourcePolicyCommand.js +0 -50
  11. package/dist-cjs/commands/GetSecretValueCommand.js +0 -51
  12. package/dist-cjs/commands/ListSecretVersionIdsCommand.js +0 -52
  13. package/dist-cjs/commands/ListSecretsCommand.js +0 -53
  14. package/dist-cjs/commands/PutResourcePolicyCommand.js +0 -55
  15. package/dist-cjs/commands/PutSecretValueCommand.js +0 -111
  16. package/dist-cjs/commands/RemoveRegionsFromReplicationCommand.js +0 -24
  17. package/dist-cjs/commands/ReplicateSecretToRegionsCommand.js +0 -25
  18. package/dist-cjs/commands/RestoreSecretCommand.js +0 -42
  19. package/dist-cjs/commands/RotateSecretCommand.js +0 -85
  20. package/dist-cjs/commands/StopReplicationToReplicaCommand.js +0 -24
  21. package/dist-cjs/commands/TagResourceCommand.js +0 -79
  22. package/dist-cjs/commands/UntagResourceCommand.js +0 -52
  23. package/dist-cjs/commands/UpdateSecretCommand.js +0 -108
  24. package/dist-cjs/commands/UpdateSecretVersionStageCommand.js +0 -60
  25. package/dist-cjs/commands/ValidateResourcePolicyCommand.js +0 -58
  26. package/dist-cjs/commands/index.js +25 -0
  27. package/dist-cjs/endpoints.js +6 -1
  28. package/dist-cjs/index.js +4 -27
  29. package/dist-cjs/models/models_0.js +0 -186
  30. package/dist-cjs/pagination/ListSecretVersionIdsPaginator.js +0 -10
  31. package/dist-cjs/pagination/ListSecretsPaginator.js +0 -10
  32. package/dist-cjs/pagination/index.js +6 -0
  33. package/dist-cjs/protocols/Aws_json1_1.js +0 -5
  34. package/dist-cjs/runtimeConfig.browser.js +1 -5
  35. package/dist-cjs/runtimeConfig.js +1 -5
  36. package/dist-cjs/runtimeConfig.native.js +0 -3
  37. package/dist-cjs/runtimeConfig.shared.js +0 -3
  38. package/dist-es/commands/index.js +22 -0
  39. package/dist-es/endpoints.js +6 -1
  40. package/dist-es/index.js +4 -27
  41. package/dist-es/pagination/index.js +3 -0
  42. package/dist-types/SecretsManager.d.ts +16 -10
  43. package/dist-types/commands/PutSecretValueCommand.d.ts +6 -5
  44. package/dist-types/commands/UpdateSecretCommand.d.ts +10 -5
  45. package/dist-types/commands/index.d.ts +22 -0
  46. package/dist-types/index.d.ts +4 -27
  47. package/dist-types/models/models_0.d.ts +54 -268
  48. package/dist-types/pagination/index.d.ts +3 -0
  49. package/dist-types/ts3.4/SecretsManager.d.ts +23 -922
  50. package/dist-types/ts3.4/SecretsManagerClient.d.ts +24 -151
  51. package/dist-types/ts3.4/commands/CancelRotateSecretCommand.d.ts +2 -72
  52. package/dist-types/ts3.4/commands/CreateSecretCommand.d.ts +2 -107
  53. package/dist-types/ts3.4/commands/DeleteResourcePolicyCommand.d.ts +2 -43
  54. package/dist-types/ts3.4/commands/DeleteSecretCommand.d.ts +2 -65
  55. package/dist-types/ts3.4/commands/DescribeSecretCommand.d.ts +2 -47
  56. package/dist-types/ts3.4/commands/GetRandomPasswordCommand.d.ts +2 -32
  57. package/dist-types/ts3.4/commands/GetResourcePolicyCommand.d.ts +2 -46
  58. package/dist-types/ts3.4/commands/GetSecretValueCommand.d.ts +2 -47
  59. package/dist-types/ts3.4/commands/ListSecretVersionIdsCommand.d.ts +2 -48
  60. package/dist-types/ts3.4/commands/ListSecretsCommand.d.ts +2 -49
  61. package/dist-types/ts3.4/commands/PutResourcePolicyCommand.d.ts +2 -51
  62. package/dist-types/ts3.4/commands/PutSecretValueCommand.d.ts +2 -107
  63. package/dist-types/ts3.4/commands/RemoveRegionsFromReplicationCommand.d.ts +2 -20
  64. package/dist-types/ts3.4/commands/ReplicateSecretToRegionsCommand.d.ts +2 -21
  65. package/dist-types/ts3.4/commands/RestoreSecretCommand.d.ts +2 -38
  66. package/dist-types/ts3.4/commands/RotateSecretCommand.d.ts +2 -81
  67. package/dist-types/ts3.4/commands/StopReplicationToReplicaCommand.d.ts +2 -20
  68. package/dist-types/ts3.4/commands/TagResourceCommand.d.ts +2 -75
  69. package/dist-types/ts3.4/commands/UntagResourceCommand.d.ts +2 -48
  70. package/dist-types/ts3.4/commands/UpdateSecretCommand.d.ts +2 -104
  71. package/dist-types/ts3.4/commands/UpdateSecretVersionStageCommand.d.ts +2 -56
  72. package/dist-types/ts3.4/commands/ValidateResourcePolicyCommand.d.ts +2 -54
  73. package/dist-types/ts3.4/commands/index.d.ts +22 -0
  74. package/dist-types/ts3.4/index.d.ts +4 -27
  75. package/dist-types/ts3.4/models/models_0.d.ts +256 -1506
  76. package/dist-types/ts3.4/pagination/index.d.ts +3 -0
  77. package/dist-types/ts3.4/runtimeConfig.browser.d.ts +1 -3
  78. package/dist-types/ts3.4/runtimeConfig.d.ts +1 -3
  79. package/dist-types/ts3.4/runtimeConfig.native.d.ts +1 -3
  80. package/dist-types/ts3.4/runtimeConfig.shared.d.ts +1 -3
  81. package/package.json +32 -32
@@ -6,29 +6,11 @@ export interface StopReplicationToReplicaCommandInput extends StopReplicationToR
6
6
  }
7
7
  export interface StopReplicationToReplicaCommandOutput extends StopReplicationToReplicaResponse, __MetadataBearer {
8
8
  }
9
- /**
10
- * <p>Removes the secret from replication and promotes the secret to a regional secret in the replica Region.</p>
11
- * @example
12
- * Use a bare-bones client and the command you need to make an API call.
13
- * ```javascript
14
- * import { SecretsManagerClient, StopReplicationToReplicaCommand } from "@aws-sdk/client-secrets-manager"; // ES Modules import
15
- * // const { SecretsManagerClient, StopReplicationToReplicaCommand } = require("@aws-sdk/client-secrets-manager"); // CommonJS import
16
- * const client = new SecretsManagerClient(config);
17
- * const command = new StopReplicationToReplicaCommand(input);
18
- * const response = await client.send(command);
19
- * ```
20
- *
21
- * @see {@link StopReplicationToReplicaCommandInput} for command's `input` shape.
22
- * @see {@link StopReplicationToReplicaCommandOutput} for command's `response` shape.
23
- * @see {@link SecretsManagerClientResolvedConfig | config} for command's `input` shape.
24
- *
25
- */
9
+
26
10
  export declare class StopReplicationToReplicaCommand extends $Command<StopReplicationToReplicaCommandInput, StopReplicationToReplicaCommandOutput, SecretsManagerClientResolvedConfig> {
27
11
  readonly input: StopReplicationToReplicaCommandInput;
28
12
  constructor(input: StopReplicationToReplicaCommandInput);
29
- /**
30
- * @internal
31
- */
13
+
32
14
  resolveMiddleware(clientStack: MiddlewareStack<ServiceInputTypes, ServiceOutputTypes>, configuration: SecretsManagerClientResolvedConfig, options?: __HttpHandlerOptions): Handler<StopReplicationToReplicaCommandInput, StopReplicationToReplicaCommandOutput>;
33
15
  private serialize;
34
16
  private deserialize;
@@ -6,84 +6,11 @@ export interface TagResourceCommandInput extends TagResourceRequest {
6
6
  }
7
7
  export interface TagResourceCommandOutput extends __MetadataBearer {
8
8
  }
9
- /**
10
- * <p>Attaches one or more tags, each consisting of a key name and a value, to the specified
11
- * secret. Tags are part of the secret's overall metadata, and are not associated with any
12
- * specific version of the secret. This operation only appends tags to the existing list of tags.
13
- * To remove tags, you must use <a>UntagResource</a>.</p>
14
- * <p>The following basic restrictions apply to tags:</p>
15
- * <ul>
16
- * <li>
17
- * <p>Maximum number of tags per secret—50</p>
18
- * </li>
19
- * <li>
20
- * <p>Maximum key length—127 Unicode characters in UTF-8</p>
21
- * </li>
22
- * <li>
23
- * <p>Maximum value length—255 Unicode characters in UTF-8</p>
24
- * </li>
25
- * <li>
26
- * <p>Tag keys and values are case sensitive.</p>
27
- * </li>
28
- * <li>
29
- * <p>Do not use the <code>aws:</code> prefix in your tag names or values because Amazon Web Services reserves it
30
- * for Amazon Web Services use. You can't edit or delete tag names or values with this
31
- * prefix. Tags with this prefix do not count against your tags per secret limit.</p>
32
- * </li>
33
- * <li>
34
- * <p>If you use your tagging schema across multiple services and resources,
35
- * remember other services might have restrictions on allowed characters. Generally
36
- * allowed characters: letters, spaces, and numbers representable in UTF-8, plus the
37
- * following special characters: + - = . _ : / @.</p>
38
- * </li>
39
- * </ul>
40
- * <important>
41
- * <p>If you use tags as part of your security strategy, then adding or removing a tag can
42
- * change permissions. If successfully completing this operation would result in you losing
43
- * your permissions for this secret, then the operation is blocked and returns an Access Denied
44
- * error.</p>
45
- * </important>
46
- * <p>
47
- * <b>Minimum permissions</b>
48
- * </p>
49
- * <p>To run this command, you must have the following permissions:</p>
50
- * <ul>
51
- * <li>
52
- * <p>secretsmanager:TagResource</p>
53
- * </li>
54
- * </ul>
55
- * <p>
56
- * <b>Related operations</b>
57
- * </p>
58
- * <ul>
59
- * <li>
60
- * <p>To remove one or more tags from the collection attached to a secret, use <a>UntagResource</a>.</p>
61
- * </li>
62
- * <li>
63
- * <p>To view the list of tags attached to a secret, use <a>DescribeSecret</a>.</p>
64
- * </li>
65
- * </ul>
66
- * @example
67
- * Use a bare-bones client and the command you need to make an API call.
68
- * ```javascript
69
- * import { SecretsManagerClient, TagResourceCommand } from "@aws-sdk/client-secrets-manager"; // ES Modules import
70
- * // const { SecretsManagerClient, TagResourceCommand } = require("@aws-sdk/client-secrets-manager"); // CommonJS import
71
- * const client = new SecretsManagerClient(config);
72
- * const command = new TagResourceCommand(input);
73
- * const response = await client.send(command);
74
- * ```
75
- *
76
- * @see {@link TagResourceCommandInput} for command's `input` shape.
77
- * @see {@link TagResourceCommandOutput} for command's `response` shape.
78
- * @see {@link SecretsManagerClientResolvedConfig | config} for command's `input` shape.
79
- *
80
- */
9
+
81
10
  export declare class TagResourceCommand extends $Command<TagResourceCommandInput, TagResourceCommandOutput, SecretsManagerClientResolvedConfig> {
82
11
  readonly input: TagResourceCommandInput;
83
12
  constructor(input: TagResourceCommandInput);
84
- /**
85
- * @internal
86
- */
13
+
87
14
  resolveMiddleware(clientStack: MiddlewareStack<ServiceInputTypes, ServiceOutputTypes>, configuration: SecretsManagerClientResolvedConfig, options?: __HttpHandlerOptions): Handler<TagResourceCommandInput, TagResourceCommandOutput>;
88
15
  private serialize;
89
16
  private deserialize;
@@ -6,57 +6,11 @@ export interface UntagResourceCommandInput extends UntagResourceRequest {
6
6
  }
7
7
  export interface UntagResourceCommandOutput extends __MetadataBearer {
8
8
  }
9
- /**
10
- * <p>Removes one or more tags from the specified secret.</p>
11
- * <p>This operation is idempotent. If a requested tag is not attached to the secret, no error
12
- * is returned and the secret metadata is unchanged.</p>
13
- * <important>
14
- * <p>If you use tags as part of your security strategy, then removing a tag can change
15
- * permissions. If successfully completing this operation would result in you losing your
16
- * permissions for this secret, then the operation is blocked and returns an Access Denied
17
- * error.</p>
18
- * </important>
19
- * <p>
20
- * <b>Minimum permissions</b>
21
- * </p>
22
- * <p>To run this command, you must have the following permissions:</p>
23
- * <ul>
24
- * <li>
25
- * <p>secretsmanager:UntagResource</p>
26
- * </li>
27
- * </ul>
28
- * <p>
29
- * <b>Related operations</b>
30
- * </p>
31
- * <ul>
32
- * <li>
33
- * <p>To add one or more tags to the collection attached to a secret, use <a>TagResource</a>.</p>
34
- * </li>
35
- * <li>
36
- * <p>To view the list of tags attached to a secret, use <a>DescribeSecret</a>.</p>
37
- * </li>
38
- * </ul>
39
- * @example
40
- * Use a bare-bones client and the command you need to make an API call.
41
- * ```javascript
42
- * import { SecretsManagerClient, UntagResourceCommand } from "@aws-sdk/client-secrets-manager"; // ES Modules import
43
- * // const { SecretsManagerClient, UntagResourceCommand } = require("@aws-sdk/client-secrets-manager"); // CommonJS import
44
- * const client = new SecretsManagerClient(config);
45
- * const command = new UntagResourceCommand(input);
46
- * const response = await client.send(command);
47
- * ```
48
- *
49
- * @see {@link UntagResourceCommandInput} for command's `input` shape.
50
- * @see {@link UntagResourceCommandOutput} for command's `response` shape.
51
- * @see {@link SecretsManagerClientResolvedConfig | config} for command's `input` shape.
52
- *
53
- */
9
+
54
10
  export declare class UntagResourceCommand extends $Command<UntagResourceCommandInput, UntagResourceCommandOutput, SecretsManagerClientResolvedConfig> {
55
11
  readonly input: UntagResourceCommandInput;
56
12
  constructor(input: UntagResourceCommandInput);
57
- /**
58
- * @internal
59
- */
13
+
60
14
  resolveMiddleware(clientStack: MiddlewareStack<ServiceInputTypes, ServiceOutputTypes>, configuration: SecretsManagerClientResolvedConfig, options?: __HttpHandlerOptions): Handler<UntagResourceCommandInput, UntagResourceCommandOutput>;
61
15
  private serialize;
62
16
  private deserialize;
@@ -6,113 +6,11 @@ export interface UpdateSecretCommandInput extends UpdateSecretRequest {
6
6
  }
7
7
  export interface UpdateSecretCommandOutput extends UpdateSecretResponse, __MetadataBearer {
8
8
  }
9
- /**
10
- * <p>Modifies many of the details of the specified secret. If you include a
11
- * <code>ClientRequestToken</code> and <i>either</i>
12
- * <code>SecretString</code> or <code>SecretBinary</code> then it also creates a new version
13
- * attached to the secret.</p>
14
- * <p>To modify the rotation configuration of a secret, use <a>RotateSecret</a>
15
- * instead.</p>
16
- * <note>
17
- * <p>The Secrets Manager console uses only the <code>SecretString</code> parameter and therefore limits
18
- * you to encrypting and storing only a text string. To encrypt and store binary data as part
19
- * of the version of a secret, you must use either the Amazon Web Services CLI or one of the Amazon Web Services
20
- * SDKs.</p>
21
- * </note>
22
- * <ul>
23
- * <li>
24
- * <p>If a version with a <code>VersionId</code> with the same value as the
25
- * <code>ClientRequestToken</code> parameter already exists, the operation results in an
26
- * error. You cannot modify an existing version, you can only create a new version.</p>
27
- * </li>
28
- * <li>
29
- * <p>If you include <code>SecretString</code> or <code>SecretBinary</code> to create a new
30
- * secret version, Secrets Manager automatically attaches the staging label <code>AWSCURRENT</code> to the new
31
- * version. </p>
32
- * </li>
33
- * </ul>
34
- * <note>
35
- * <ul>
36
- * <li>
37
- * <p>If you call an operation to encrypt or decrypt the <code>SecretString</code>
38
- * or <code>SecretBinary</code> for a secret in the same account as the calling user and that
39
- * secret doesn't specify a Amazon Web Services KMS encryption key, Secrets Manager uses the account's default
40
- * Amazon Web Services managed customer master key (CMK) with the alias <code>aws/secretsmanager</code>. If this key
41
- * doesn't already exist in your account then Secrets Manager creates it for you automatically. All
42
- * users and roles in the same Amazon Web Services account automatically have access to use the default CMK.
43
- * Note that if an Secrets Manager API call results in Amazon Web Services creating the account's
44
- * Amazon Web Services-managed CMK, it can result in a one-time significant delay in returning the
45
- * result.</p>
46
- * </li>
47
- * <li>
48
- * <p>If the secret resides in a different Amazon Web Services account from the credentials calling an API that
49
- * requires encryption or decryption of the secret value then you must create and use a custom
50
- * Amazon Web Services KMS CMK because you can't access the default CMK for the account using credentials
51
- * from a different Amazon Web Services account. Store the ARN of the CMK in the secret when you create the
52
- * secret or when you update it by including it in the <code>KMSKeyId</code>. If you call an
53
- * API that must encrypt or decrypt <code>SecretString</code> or <code>SecretBinary</code>
54
- * using credentials from a different account then the Amazon Web Services KMS key policy must grant cross-account
55
- * access to that other account's user or role for both the kms:GenerateDataKey and
56
- * kms:Decrypt operations.</p>
57
- * </li>
58
- * </ul>
59
- * </note>
60
- * <p>
61
- * <b>Minimum permissions</b>
62
- * </p>
63
- * <p>To run this command, you must have the following permissions:</p>
64
- * <ul>
65
- * <li>
66
- * <p>secretsmanager:UpdateSecret</p>
67
- * </li>
68
- * <li>
69
- * <p>kms:GenerateDataKey - needed only if you use a custom Amazon Web Services KMS key to encrypt the secret.
70
- * You do not need this permission to use the account's Amazon Web Services managed CMK for
71
- * Secrets Manager.</p>
72
- * </li>
73
- * <li>
74
- * <p>kms:Decrypt - needed only if you use a custom Amazon Web Services KMS key to encrypt the secret. You do
75
- * not need this permission to use the account's Amazon Web Services managed CMK for Secrets Manager.</p>
76
- * </li>
77
- * </ul>
78
- * <p>
79
- * <b>Related operations</b>
80
- * </p>
81
- * <ul>
82
- * <li>
83
- * <p>To create a new secret, use <a>CreateSecret</a>.</p>
84
- * </li>
85
- * <li>
86
- * <p>To add only a new version to an existing secret, use <a>PutSecretValue</a>.</p>
87
- * </li>
88
- * <li>
89
- * <p>To get the details for a secret, use <a>DescribeSecret</a>.</p>
90
- * </li>
91
- * <li>
92
- * <p>To list the versions contained in a secret, use <a>ListSecretVersionIds</a>.</p>
93
- * </li>
94
- * </ul>
95
- * @example
96
- * Use a bare-bones client and the command you need to make an API call.
97
- * ```javascript
98
- * import { SecretsManagerClient, UpdateSecretCommand } from "@aws-sdk/client-secrets-manager"; // ES Modules import
99
- * // const { SecretsManagerClient, UpdateSecretCommand } = require("@aws-sdk/client-secrets-manager"); // CommonJS import
100
- * const client = new SecretsManagerClient(config);
101
- * const command = new UpdateSecretCommand(input);
102
- * const response = await client.send(command);
103
- * ```
104
- *
105
- * @see {@link UpdateSecretCommandInput} for command's `input` shape.
106
- * @see {@link UpdateSecretCommandOutput} for command's `response` shape.
107
- * @see {@link SecretsManagerClientResolvedConfig | config} for command's `input` shape.
108
- *
109
- */
9
+
110
10
  export declare class UpdateSecretCommand extends $Command<UpdateSecretCommandInput, UpdateSecretCommandOutput, SecretsManagerClientResolvedConfig> {
111
11
  readonly input: UpdateSecretCommandInput;
112
12
  constructor(input: UpdateSecretCommandInput);
113
- /**
114
- * @internal
115
- */
13
+
116
14
  resolveMiddleware(clientStack: MiddlewareStack<ServiceInputTypes, ServiceOutputTypes>, configuration: SecretsManagerClientResolvedConfig, options?: __HttpHandlerOptions): Handler<UpdateSecretCommandInput, UpdateSecretCommandOutput>;
117
15
  private serialize;
118
16
  private deserialize;
@@ -6,65 +6,11 @@ export interface UpdateSecretVersionStageCommandInput extends UpdateSecretVersio
6
6
  }
7
7
  export interface UpdateSecretVersionStageCommandOutput extends UpdateSecretVersionStageResponse, __MetadataBearer {
8
8
  }
9
- /**
10
- * <p>Modifies the staging labels attached to a version of a secret. Staging labels are used to
11
- * track a version as it progresses through the secret rotation process. You can attach a staging
12
- * label to only one version of a secret at a time. If a staging label to be added is already
13
- * attached to another version, then it is moved--removed from the other version first and
14
- * then attached to this one. For more information about staging labels, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/terms-concepts.html#term_staging-label">Staging
15
- * Labels</a> in the <i>Amazon Web Services Secrets Manager User Guide</i>. </p>
16
- * <p>The staging labels that you specify in the <code>VersionStage</code> parameter are added
17
- * to the existing list of staging labels--they don't replace it.</p>
18
- * <p>You can move the <code>AWSCURRENT</code> staging label to this version by including it in this
19
- * call.</p>
20
- * <note>
21
- * <p>Whenever you move <code>AWSCURRENT</code>, Secrets Manager automatically moves the label <code>AWSPREVIOUS</code>
22
- * to the version that <code>AWSCURRENT</code> was removed from.</p>
23
- * </note>
24
- * <p>If this action results in the last label being removed from a version, then the version is
25
- * considered to be 'deprecated' and can be deleted by Secrets Manager.</p>
26
- * <p>
27
- * <b>Minimum permissions</b>
28
- * </p>
29
- * <p>To run this command, you must have the following permissions:</p>
30
- * <ul>
31
- * <li>
32
- * <p>secretsmanager:UpdateSecretVersionStage</p>
33
- * </li>
34
- * </ul>
35
- * <p>
36
- * <b>Related operations</b>
37
- * </p>
38
- * <ul>
39
- * <li>
40
- * <p>To get the list of staging labels that are currently associated with a version of a
41
- * secret, use <code>
42
- * <a>DescribeSecret</a>
43
- * </code> and examine the
44
- * <code>SecretVersionsToStages</code> response value. </p>
45
- * </li>
46
- * </ul>
47
- * @example
48
- * Use a bare-bones client and the command you need to make an API call.
49
- * ```javascript
50
- * import { SecretsManagerClient, UpdateSecretVersionStageCommand } from "@aws-sdk/client-secrets-manager"; // ES Modules import
51
- * // const { SecretsManagerClient, UpdateSecretVersionStageCommand } = require("@aws-sdk/client-secrets-manager"); // CommonJS import
52
- * const client = new SecretsManagerClient(config);
53
- * const command = new UpdateSecretVersionStageCommand(input);
54
- * const response = await client.send(command);
55
- * ```
56
- *
57
- * @see {@link UpdateSecretVersionStageCommandInput} for command's `input` shape.
58
- * @see {@link UpdateSecretVersionStageCommandOutput} for command's `response` shape.
59
- * @see {@link SecretsManagerClientResolvedConfig | config} for command's `input` shape.
60
- *
61
- */
9
+
62
10
  export declare class UpdateSecretVersionStageCommand extends $Command<UpdateSecretVersionStageCommandInput, UpdateSecretVersionStageCommandOutput, SecretsManagerClientResolvedConfig> {
63
11
  readonly input: UpdateSecretVersionStageCommandInput;
64
12
  constructor(input: UpdateSecretVersionStageCommandInput);
65
- /**
66
- * @internal
67
- */
13
+
68
14
  resolveMiddleware(clientStack: MiddlewareStack<ServiceInputTypes, ServiceOutputTypes>, configuration: SecretsManagerClientResolvedConfig, options?: __HttpHandlerOptions): Handler<UpdateSecretVersionStageCommandInput, UpdateSecretVersionStageCommandOutput>;
69
15
  private serialize;
70
16
  private deserialize;
@@ -6,63 +6,11 @@ export interface ValidateResourcePolicyCommandInput extends ValidateResourcePoli
6
6
  }
7
7
  export interface ValidateResourcePolicyCommandOutput extends ValidateResourcePolicyResponse, __MetadataBearer {
8
8
  }
9
- /**
10
- * <p>Validates that the resource policy does not grant a wide range of IAM principals access to
11
- * your secret. The JSON request string input and response output displays formatted code
12
- * with white space and line breaks for better readability. Submit your input as a single line
13
- * JSON string. A resource-based policy is optional for secrets.</p>
14
- * <p>The API performs three checks when validating the secret:</p>
15
- * <ul>
16
- * <li>
17
- * <p>Sends a call to <a href="https://aws.amazon.com/blogs/security/protect-sensitive-data-in-the-cloud-with-automated-reasoning-zelkova/">Zelkova</a>, an automated reasoning engine, to ensure your Resource Policy does not
18
- * allow broad access to your secret.</p>
19
- * </li>
20
- * <li>
21
- * <p>Checks for correct syntax in a policy.</p>
22
- * </li>
23
- * <li>
24
- * <p>Verifies the policy does not lock out a caller.</p>
25
- * </li>
26
- * </ul>
27
- *
28
- *
29
- * <p>
30
- * <b>Minimum Permissions</b>
31
- * </p>
32
- * <p>You must have the permissions required to access the following APIs:</p>
33
- * <ul>
34
- * <li>
35
- * <p>
36
- * <code>secretsmanager:PutResourcePolicy</code>
37
- * </p>
38
- * </li>
39
- * <li>
40
- * <p>
41
- * <code>secretsmanager:ValidateResourcePolicy</code>
42
- * </p>
43
- * </li>
44
- * </ul>
45
- * @example
46
- * Use a bare-bones client and the command you need to make an API call.
47
- * ```javascript
48
- * import { SecretsManagerClient, ValidateResourcePolicyCommand } from "@aws-sdk/client-secrets-manager"; // ES Modules import
49
- * // const { SecretsManagerClient, ValidateResourcePolicyCommand } = require("@aws-sdk/client-secrets-manager"); // CommonJS import
50
- * const client = new SecretsManagerClient(config);
51
- * const command = new ValidateResourcePolicyCommand(input);
52
- * const response = await client.send(command);
53
- * ```
54
- *
55
- * @see {@link ValidateResourcePolicyCommandInput} for command's `input` shape.
56
- * @see {@link ValidateResourcePolicyCommandOutput} for command's `response` shape.
57
- * @see {@link SecretsManagerClientResolvedConfig | config} for command's `input` shape.
58
- *
59
- */
9
+
60
10
  export declare class ValidateResourcePolicyCommand extends $Command<ValidateResourcePolicyCommandInput, ValidateResourcePolicyCommandOutput, SecretsManagerClientResolvedConfig> {
61
11
  readonly input: ValidateResourcePolicyCommandInput;
62
12
  constructor(input: ValidateResourcePolicyCommandInput);
63
- /**
64
- * @internal
65
- */
13
+
66
14
  resolveMiddleware(clientStack: MiddlewareStack<ServiceInputTypes, ServiceOutputTypes>, configuration: SecretsManagerClientResolvedConfig, options?: __HttpHandlerOptions): Handler<ValidateResourcePolicyCommandInput, ValidateResourcePolicyCommandOutput>;
67
15
  private serialize;
68
16
  private deserialize;
@@ -0,0 +1,22 @@
1
+ export * from "./CancelRotateSecretCommand";
2
+ export * from "./CreateSecretCommand";
3
+ export * from "./DeleteResourcePolicyCommand";
4
+ export * from "./DeleteSecretCommand";
5
+ export * from "./DescribeSecretCommand";
6
+ export * from "./GetRandomPasswordCommand";
7
+ export * from "./GetResourcePolicyCommand";
8
+ export * from "./GetSecretValueCommand";
9
+ export * from "./ListSecretVersionIdsCommand";
10
+ export * from "./ListSecretsCommand";
11
+ export * from "./PutResourcePolicyCommand";
12
+ export * from "./PutSecretValueCommand";
13
+ export * from "./RemoveRegionsFromReplicationCommand";
14
+ export * from "./ReplicateSecretToRegionsCommand";
15
+ export * from "./RestoreSecretCommand";
16
+ export * from "./RotateSecretCommand";
17
+ export * from "./StopReplicationToReplicaCommand";
18
+ export * from "./TagResourceCommand";
19
+ export * from "./UntagResourceCommand";
20
+ export * from "./UpdateSecretCommand";
21
+ export * from "./UpdateSecretVersionStageCommand";
22
+ export * from "./ValidateResourcePolicyCommand";
@@ -1,28 +1,5 @@
1
- export * from "./SecretsManagerClient";
2
1
  export * from "./SecretsManager";
3
- export * from "./commands/CancelRotateSecretCommand";
4
- export * from "./commands/CreateSecretCommand";
5
- export * from "./commands/DeleteResourcePolicyCommand";
6
- export * from "./commands/DeleteSecretCommand";
7
- export * from "./commands/DescribeSecretCommand";
8
- export * from "./commands/GetRandomPasswordCommand";
9
- export * from "./commands/GetResourcePolicyCommand";
10
- export * from "./commands/GetSecretValueCommand";
11
- export * from "./commands/ListSecretsCommand";
12
- export * from "./pagination/ListSecretsPaginator";
13
- export * from "./commands/ListSecretVersionIdsCommand";
14
- export * from "./pagination/ListSecretVersionIdsPaginator";
15
- export * from "./commands/PutResourcePolicyCommand";
16
- export * from "./commands/PutSecretValueCommand";
17
- export * from "./commands/RemoveRegionsFromReplicationCommand";
18
- export * from "./commands/ReplicateSecretToRegionsCommand";
19
- export * from "./commands/RestoreSecretCommand";
20
- export * from "./commands/RotateSecretCommand";
21
- export * from "./commands/StopReplicationToReplicaCommand";
22
- export * from "./commands/TagResourceCommand";
23
- export * from "./commands/UntagResourceCommand";
24
- export * from "./commands/UpdateSecretCommand";
25
- export * from "./commands/UpdateSecretVersionStageCommand";
26
- export * from "./commands/ValidateResourcePolicyCommand";
27
- export * from "./pagination/Interfaces";
28
- export * from "./models/index";
2
+ export * from "./SecretsManagerClient";
3
+ export * from "./commands";
4
+ export * from "./models";
5
+ export * from "./pagination";