@aws-sdk/client-secrets-manager 3.379.1 → 3.385.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -6,10 +6,12 @@ import { SecretsManagerServiceException as __BaseException } from "./SecretsMana
6
6
  */
7
7
  export interface ReplicaRegionType {
8
8
  /**
9
+ * @public
9
10
  * <p>A Region code. For a list of Region codes, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#regional-endpoints">Name and code of Regions</a>.</p>
10
11
  */
11
12
  Region?: string;
12
13
  /**
14
+ * @public
13
15
  * <p>The ARN, key ID, or alias of the KMS key to encrypt the secret. If you don't include this field, Secrets Manager uses <code>aws/secretsmanager</code>.</p>
14
16
  */
15
17
  KmsKeyId?: string;
@@ -19,6 +21,7 @@ export interface ReplicaRegionType {
19
21
  */
20
22
  export interface CancelRotateSecretRequest {
21
23
  /**
24
+ * @public
22
25
  * <p>The ARN or name of the secret.</p>
23
26
  * <p>For an ARN, we recommend that you specify a complete ARN rather
24
27
  * than a partial ARN. See <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/troubleshoot.html#ARN_secretnamehyphen">Finding a secret from a partial ARN</a>.</p>
@@ -30,14 +33,17 @@ export interface CancelRotateSecretRequest {
30
33
  */
31
34
  export interface CancelRotateSecretResponse {
32
35
  /**
36
+ * @public
33
37
  * <p>The ARN of the secret.</p>
34
38
  */
35
39
  ARN?: string;
36
40
  /**
41
+ * @public
37
42
  * <p>The name of the secret.</p>
38
43
  */
39
44
  Name?: string;
40
45
  /**
46
+ * @public
41
47
  * <p>The unique identifier of the version of the secret created during the rotation. This
42
48
  * version might not be complete, and should be evaluated for possible deletion. We recommend
43
49
  * that you remove the <code>VersionStage</code> value <code>AWSPENDING</code> from this version so that
@@ -119,10 +125,12 @@ export declare class ResourceNotFoundException extends __BaseException {
119
125
  */
120
126
  export interface Tag {
121
127
  /**
128
+ * @public
122
129
  * <p>The key identifier, or name, of the tag.</p>
123
130
  */
124
131
  Key?: string;
125
132
  /**
133
+ * @public
126
134
  * <p>The string value associated with the key of the tag.</p>
127
135
  */
128
136
  Value?: string;
@@ -132,6 +140,7 @@ export interface Tag {
132
140
  */
133
141
  export interface CreateSecretRequest {
134
142
  /**
143
+ * @public
135
144
  * <p>The name of the new secret.</p>
136
145
  * <p>The secret name can contain ASCII letters, numbers, and the following characters:
137
146
  * /_+=.@-</p>
@@ -141,6 +150,7 @@ export interface CreateSecretRequest {
141
150
  */
142
151
  Name: string | undefined;
143
152
  /**
153
+ * @public
144
154
  * <p>If you include <code>SecretString</code> or <code>SecretBinary</code>, then
145
155
  * Secrets Manager creates an initial version for the secret, and this parameter specifies the unique
146
156
  * identifier for the new version. </p>
@@ -177,10 +187,12 @@ export interface CreateSecretRequest {
177
187
  */
178
188
  ClientRequestToken?: string;
179
189
  /**
190
+ * @public
180
191
  * <p>The description of the secret.</p>
181
192
  */
182
193
  Description?: string;
183
194
  /**
195
+ * @public
184
196
  * <p>The ARN, key ID, or alias of the KMS key that Secrets Manager uses to
185
197
  * encrypt the secret value in the secret. An alias is always prefixed by <code>alias/</code>,
186
198
  * for example <code>alias/aws/secretsmanager</code>. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/alias-about.html">About aliases</a>.</p>
@@ -194,6 +206,7 @@ export interface CreateSecretRequest {
194
206
  */
195
207
  KmsKeyId?: string;
196
208
  /**
209
+ * @public
197
210
  * <p>The binary data to encrypt and store in the new version of
198
211
  * the secret. We recommend that you store your binary data in a file and then pass the
199
212
  * contents of the file as a parameter.</p>
@@ -203,6 +216,7 @@ export interface CreateSecretRequest {
203
216
  */
204
217
  SecretBinary?: Uint8Array;
205
218
  /**
219
+ * @public
206
220
  * <p>The text data to encrypt and store in this new version of
207
221
  * the secret. We recommend you use a JSON structure of key/value pairs for your secret value.</p>
208
222
  * <p>Either <code>SecretString</code> or <code>SecretBinary</code> must have a value, but not
@@ -213,6 +227,7 @@ export interface CreateSecretRequest {
213
227
  */
214
228
  SecretString?: string;
215
229
  /**
230
+ * @public
216
231
  * <p>A list of tags to attach to the secret. Each tag
217
232
  * is a key and value pair of strings in a JSON text string, for example:</p>
218
233
  * <p>
@@ -259,10 +274,12 @@ export interface CreateSecretRequest {
259
274
  */
260
275
  Tags?: Tag[];
261
276
  /**
277
+ * @public
262
278
  * <p>A list of Regions and KMS keys to replicate secrets.</p>
263
279
  */
264
280
  AddReplicaRegions?: ReplicaRegionType[];
265
281
  /**
282
+ * @public
266
283
  * <p>Specifies whether to overwrite a secret with the same name in the
267
284
  * destination Region. By default, secrets aren't overwritten.</p>
268
285
  */
@@ -287,23 +304,28 @@ export type StatusType = (typeof StatusType)[keyof typeof StatusType];
287
304
  */
288
305
  export interface ReplicationStatusType {
289
306
  /**
307
+ * @public
290
308
  * <p>The Region where replication occurs.</p>
291
309
  */
292
310
  Region?: string;
293
311
  /**
312
+ * @public
294
313
  * <p>Can be an <code>ARN</code>, <code>Key ID</code>, or <code>Alias</code>. </p>
295
314
  */
296
315
  KmsKeyId?: string;
297
316
  /**
317
+ * @public
298
318
  * <p>The status can be <code>InProgress</code>, <code>Failed</code>, or <code>InSync</code>.</p>
299
319
  */
300
320
  Status?: StatusType | string;
301
321
  /**
322
+ * @public
302
323
  * <p>Status message such as "<i>Secret with this name already exists in this
303
324
  * region</i>".</p>
304
325
  */
305
326
  StatusMessage?: string;
306
327
  /**
328
+ * @public
307
329
  * <p>The date that the secret was last accessed in the Region. This field is omitted if the secret has never been retrieved in the Region.</p>
308
330
  */
309
331
  LastAccessedDate?: Date;
@@ -313,6 +335,7 @@ export interface ReplicationStatusType {
313
335
  */
314
336
  export interface CreateSecretResponse {
315
337
  /**
338
+ * @public
316
339
  * <p>The ARN of the new secret. The ARN includes the name of the secret followed by six random
317
340
  * characters. This ensures that if you create a new secret with the same name as a deleted secret,
318
341
  * then users with access to the old secret don't get access to the new secret because the ARNs
@@ -320,14 +343,17 @@ export interface CreateSecretResponse {
320
343
  */
321
344
  ARN?: string;
322
345
  /**
346
+ * @public
323
347
  * <p>The name of the new secret.</p>
324
348
  */
325
349
  Name?: string;
326
350
  /**
351
+ * @public
327
352
  * <p>The unique identifier associated with the version of the new secret.</p>
328
353
  */
329
354
  VersionId?: string;
330
355
  /**
356
+ * @public
331
357
  * <p>A list of the replicas of this secret and their status:</p>
332
358
  * <ul>
333
359
  * <li>
@@ -431,6 +457,7 @@ export declare class ResourceExistsException extends __BaseException {
431
457
  */
432
458
  export interface DeleteResourcePolicyRequest {
433
459
  /**
460
+ * @public
434
461
  * <p>The ARN or name of the secret to delete the attached resource-based policy for.</p>
435
462
  * <p>For an ARN, we recommend that you specify a complete ARN rather
436
463
  * than a partial ARN. See <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/troubleshoot.html#ARN_secretnamehyphen">Finding a secret from a partial ARN</a>.</p>
@@ -442,10 +469,12 @@ export interface DeleteResourcePolicyRequest {
442
469
  */
443
470
  export interface DeleteResourcePolicyResponse {
444
471
  /**
472
+ * @public
445
473
  * <p>The ARN of the secret that the resource-based policy was deleted for.</p>
446
474
  */
447
475
  ARN?: string;
448
476
  /**
477
+ * @public
449
478
  * <p>The name of the secret that the resource-based policy was deleted for.</p>
450
479
  */
451
480
  Name?: string;
@@ -455,18 +484,21 @@ export interface DeleteResourcePolicyResponse {
455
484
  */
456
485
  export interface DeleteSecretRequest {
457
486
  /**
487
+ * @public
458
488
  * <p>The ARN or name of the secret to delete.</p>
459
489
  * <p>For an ARN, we recommend that you specify a complete ARN rather
460
490
  * than a partial ARN. See <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/troubleshoot.html#ARN_secretnamehyphen">Finding a secret from a partial ARN</a>.</p>
461
491
  */
462
492
  SecretId: string | undefined;
463
493
  /**
494
+ * @public
464
495
  * <p>The number of days from 7 to 30 that Secrets Manager waits before permanently deleting the
465
496
  * secret. You can't use both this parameter and <code>ForceDeleteWithoutRecovery</code>
466
497
  * in the same call. If you don't use either, then by default Secrets Manager uses a 30 day recovery window.</p>
467
498
  */
468
499
  RecoveryWindowInDays?: number;
469
500
  /**
501
+ * @public
470
502
  * <p>Specifies whether to delete the secret without any recovery window. You
471
503
  * can't use both this parameter and <code>RecoveryWindowInDays</code> in the same
472
504
  * call. If you don't use either, then by default Secrets Manager uses a 30 day recovery window.</p>
@@ -489,14 +521,17 @@ export interface DeleteSecretRequest {
489
521
  */
490
522
  export interface DeleteSecretResponse {
491
523
  /**
524
+ * @public
492
525
  * <p>The ARN of the secret.</p>
493
526
  */
494
527
  ARN?: string;
495
528
  /**
529
+ * @public
496
530
  * <p>The name of the secret.</p>
497
531
  */
498
532
  Name?: string;
499
533
  /**
534
+ * @public
500
535
  * <p>The date and time after which this secret Secrets Manager can permanently delete this secret,
501
536
  * and it can no longer be restored. This value is the date and time of the delete request
502
537
  * plus the number of days in <code>RecoveryWindowInDays</code>.</p>
@@ -508,6 +543,7 @@ export interface DeleteSecretResponse {
508
543
  */
509
544
  export interface DescribeSecretRequest {
510
545
  /**
546
+ * @public
511
547
  * <p>The ARN or name of the secret. </p>
512
548
  * <p>For an ARN, we recommend that you specify a complete ARN rather
513
549
  * than a partial ARN. See <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/troubleshoot.html#ARN_secretnamehyphen">Finding a secret from a partial ARN</a>.</p>
@@ -520,6 +556,7 @@ export interface DescribeSecretRequest {
520
556
  */
521
557
  export interface RotationRulesType {
522
558
  /**
559
+ * @public
523
560
  * <p>The number of days between rotations of the secret. You can use this
524
561
  * value to check that your secret meets your compliance guidelines for how often secrets must
525
562
  * be rotated. If you use this field to set the rotation schedule, Secrets Manager calculates the next rotation
@@ -533,6 +570,7 @@ export interface RotationRulesType {
533
570
  */
534
571
  AutomaticallyAfterDays?: number;
535
572
  /**
573
+ * @public
536
574
  * <p>The length of the rotation window in hours, for example <code>3h</code> for a three
537
575
  * hour window. Secrets Manager rotates your secret at any time during this window. The window must not
538
576
  * extend into the next rotation window or the next UTC day. The window starts according to the <code>ScheduleExpression</code>. If you don't specify a <code>Duration</code>,
@@ -544,6 +582,7 @@ export interface RotationRulesType {
544
582
  */
545
583
  Duration?: string;
546
584
  /**
585
+ * @public
547
586
  * <p>A <code>cron()</code> or <code>rate()</code> expression that defines the schedule for
548
587
  * rotating your secret. Secrets Manager rotation schedules use UTC time zone. Secrets Manager rotates your secret any time during a rotation window.</p>
549
588
  * <p>Secrets Manager <code>rate()</code> expressions represent the interval in hours or days that you
@@ -570,54 +609,65 @@ export interface RotationRulesType {
570
609
  */
571
610
  export interface DescribeSecretResponse {
572
611
  /**
612
+ * @public
573
613
  * <p>The ARN of the secret.</p>
574
614
  */
575
615
  ARN?: string;
576
616
  /**
617
+ * @public
577
618
  * <p>The name of the secret.</p>
578
619
  */
579
620
  Name?: string;
580
621
  /**
622
+ * @public
581
623
  * <p>The description of the secret.</p>
582
624
  */
583
625
  Description?: string;
584
626
  /**
627
+ * @public
585
628
  * <p>The key ID or alias ARN of the KMS key that Secrets Manager uses to encrypt the secret value.
586
629
  * If the secret is encrypted with the Amazon Web Services managed key <code>aws/secretsmanager</code>,
587
630
  * this field is omitted. Secrets created using the console use an KMS key ID.</p>
588
631
  */
589
632
  KmsKeyId?: string;
590
633
  /**
634
+ * @public
591
635
  * <p>Specifies whether automatic rotation is turned on for this secret.</p>
592
636
  * <p>To turn on rotation, use <a>RotateSecret</a>. To turn off
593
637
  * rotation, use <a>CancelRotateSecret</a>.</p>
594
638
  */
595
639
  RotationEnabled?: boolean;
596
640
  /**
641
+ * @public
597
642
  * <p>The ARN of the Lambda function that Secrets Manager invokes to rotate the
598
643
  * secret. </p>
599
644
  */
600
645
  RotationLambdaARN?: string;
601
646
  /**
647
+ * @public
602
648
  * <p>The rotation schedule and Lambda function for this secret. If the secret previously had rotation turned on, but
603
649
  * it is now turned off, this field shows the previous rotation schedule and rotation function. If the secret never had
604
650
  * rotation turned on, this field is omitted.</p>
605
651
  */
606
652
  RotationRules?: RotationRulesType;
607
653
  /**
654
+ * @public
608
655
  * <p>The last date and time that Secrets Manager rotated the secret.
609
656
  * If the secret isn't configured for rotation, Secrets Manager returns null.</p>
610
657
  */
611
658
  LastRotatedDate?: Date;
612
659
  /**
660
+ * @public
613
661
  * <p>The last date and time that this secret was modified in any way.</p>
614
662
  */
615
663
  LastChangedDate?: Date;
616
664
  /**
665
+ * @public
617
666
  * <p>The date that the secret was last accessed in the Region. This field is omitted if the secret has never been retrieved in the Region.</p>
618
667
  */
619
668
  LastAccessedDate?: Date;
620
669
  /**
670
+ * @public
621
671
  * <p>The date the secret is scheduled for deletion. If it is not scheduled for deletion, this
622
672
  * field is omitted. When you delete a secret, Secrets Manager requires a
623
673
  * recovery window of at least 7 days before deleting the secret. Some time after the deleted date,
@@ -627,15 +677,18 @@ export interface DescribeSecretResponse {
627
677
  */
628
678
  DeletedDate?: Date;
629
679
  /**
680
+ * @public
630
681
  * <p>The next rotation is scheduled to occur on or before this date. If the secret isn't configured for rotation, Secrets Manager returns null.</p>
631
682
  */
632
683
  NextRotationDate?: Date;
633
684
  /**
685
+ * @public
634
686
  * <p>The list of tags attached to the secret. To add tags to a
635
687
  * secret, use <a>TagResource</a>. To remove tags, use <a>UntagResource</a>.</p>
636
688
  */
637
689
  Tags?: Tag[];
638
690
  /**
691
+ * @public
639
692
  * <p>A list of the versions of the secret that have staging labels attached.
640
693
  * Versions that don't have staging labels are considered deprecated and Secrets Manager
641
694
  * can delete them.</p>
@@ -664,18 +717,22 @@ export interface DescribeSecretResponse {
664
717
  */
665
718
  VersionIdsToStages?: Record<string, string[]>;
666
719
  /**
720
+ * @public
667
721
  * <p>The ID of the service that created this secret. For more information, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/service-linked-secrets.html">Secrets managed by other Amazon Web Services services</a>.</p>
668
722
  */
669
723
  OwningService?: string;
670
724
  /**
725
+ * @public
671
726
  * <p>The date the secret was created.</p>
672
727
  */
673
728
  CreatedDate?: Date;
674
729
  /**
730
+ * @public
675
731
  * <p>The Region the secret is in. If a secret is replicated to other Regions, the replicas are listed in <code>ReplicationStatus</code>. </p>
676
732
  */
677
733
  PrimaryRegion?: string;
678
734
  /**
735
+ * @public
679
736
  * <p>A list of the replicas of this secret and their status: </p>
680
737
  * <ul>
681
738
  * <li>
@@ -717,6 +774,7 @@ export type FilterNameStringType = (typeof FilterNameStringType)[keyof typeof Fi
717
774
  */
718
775
  export interface Filter {
719
776
  /**
777
+ * @public
720
778
  * <p>The following are keys you can use:</p>
721
779
  * <ul>
722
780
  * <li>
@@ -751,6 +809,7 @@ export interface Filter {
751
809
  */
752
810
  Key?: FilterNameStringType | string;
753
811
  /**
812
+ * @public
754
813
  * <p>The keyword to filter for.</p>
755
814
  * <p>You can prefix your search value with an exclamation mark (<code>!</code>) in order to perform negation filters. </p>
756
815
  */
@@ -761,41 +820,49 @@ export interface Filter {
761
820
  */
762
821
  export interface GetRandomPasswordRequest {
763
822
  /**
823
+ * @public
764
824
  * <p>The length of the password. If you don't include this parameter, the
765
825
  * default length is 32 characters.</p>
766
826
  */
767
827
  PasswordLength?: number;
768
828
  /**
829
+ * @public
769
830
  * <p>A string of the characters that you don't want in the password.</p>
770
831
  */
771
832
  ExcludeCharacters?: string;
772
833
  /**
834
+ * @public
773
835
  * <p>Specifies whether to exclude numbers from the password. If you don't
774
836
  * include this switch, the password can contain numbers.</p>
775
837
  */
776
838
  ExcludeNumbers?: boolean;
777
839
  /**
840
+ * @public
778
841
  * <p>Specifies whether to exclude the following punctuation characters from the password:
779
842
  * <code>! " # $ % & ' ( ) * + , - . / : ; < = > ? @ [ \ ] ^ _ ` \{ | \} ~</code>.
780
843
  * If you don't include this switch, the password can contain punctuation.</p>
781
844
  */
782
845
  ExcludePunctuation?: boolean;
783
846
  /**
847
+ * @public
784
848
  * <p>Specifies whether to exclude uppercase letters from the password. If you
785
849
  * don't include this switch, the password can contain uppercase letters.</p>
786
850
  */
787
851
  ExcludeUppercase?: boolean;
788
852
  /**
853
+ * @public
789
854
  * <p>Specifies whether to exclude lowercase letters from the password. If
790
855
  * you don't include this switch, the password can contain lowercase letters.</p>
791
856
  */
792
857
  ExcludeLowercase?: boolean;
793
858
  /**
859
+ * @public
794
860
  * <p>Specifies whether to include the space character. If you
795
861
  * include this switch, the password can contain space characters.</p>
796
862
  */
797
863
  IncludeSpace?: boolean;
798
864
  /**
865
+ * @public
799
866
  * <p>Specifies whether to include at least one upper and lowercase letter, one number, and one punctuation.
800
867
  * If you don't include this switch, the password contains at least one of every character type.</p>
801
868
  */
@@ -806,6 +873,7 @@ export interface GetRandomPasswordRequest {
806
873
  */
807
874
  export interface GetRandomPasswordResponse {
808
875
  /**
876
+ * @public
809
877
  * <p>A string with the password.</p>
810
878
  */
811
879
  RandomPassword?: string;
@@ -815,6 +883,7 @@ export interface GetRandomPasswordResponse {
815
883
  */
816
884
  export interface GetResourcePolicyRequest {
817
885
  /**
886
+ * @public
818
887
  * <p>The ARN or name of the secret to retrieve the attached resource-based policy for.</p>
819
888
  * <p>For an ARN, we recommend that you specify a complete ARN rather
820
889
  * than a partial ARN. See <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/troubleshoot.html#ARN_secretnamehyphen">Finding a secret from a partial ARN</a>.</p>
@@ -826,14 +895,17 @@ export interface GetResourcePolicyRequest {
826
895
  */
827
896
  export interface GetResourcePolicyResponse {
828
897
  /**
898
+ * @public
829
899
  * <p>The ARN of the secret that the resource-based policy was retrieved for.</p>
830
900
  */
831
901
  ARN?: string;
832
902
  /**
903
+ * @public
833
904
  * <p>The name of the secret that the resource-based policy was retrieved for.</p>
834
905
  */
835
906
  Name?: string;
836
907
  /**
908
+ * @public
837
909
  * <p>A JSON-formatted string that contains the permissions policy
838
910
  * attached to the secret. For more information about permissions policies, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html">Authentication and access control for
839
911
  * Secrets Manager</a>.</p>
@@ -845,12 +917,14 @@ export interface GetResourcePolicyResponse {
845
917
  */
846
918
  export interface GetSecretValueRequest {
847
919
  /**
920
+ * @public
848
921
  * <p>The ARN or name of the secret to retrieve.</p>
849
922
  * <p>For an ARN, we recommend that you specify a complete ARN rather
850
923
  * than a partial ARN. See <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/troubleshoot.html#ARN_secretnamehyphen">Finding a secret from a partial ARN</a>.</p>
851
924
  */
852
925
  SecretId: string | undefined;
853
926
  /**
927
+ * @public
854
928
  * <p>The unique identifier of the version of the secret to retrieve. If
855
929
  * you include both this parameter and <code>VersionStage</code>, the two parameters must refer
856
930
  * to the same secret version. If you don't specify either a <code>VersionStage</code> or
@@ -860,6 +934,7 @@ export interface GetSecretValueRequest {
860
934
  */
861
935
  VersionId?: string;
862
936
  /**
937
+ * @public
863
938
  * <p>The staging label of the version of the secret to retrieve. </p>
864
939
  * <p>Secrets Manager uses staging labels to keep track of different versions during the rotation process.
865
940
  * If you include both this parameter and <code>VersionId</code>, the two parameters must refer
@@ -873,18 +948,22 @@ export interface GetSecretValueRequest {
873
948
  */
874
949
  export interface GetSecretValueResponse {
875
950
  /**
951
+ * @public
876
952
  * <p>The ARN of the secret.</p>
877
953
  */
878
954
  ARN?: string;
879
955
  /**
956
+ * @public
880
957
  * <p>The friendly name of the secret.</p>
881
958
  */
882
959
  Name?: string;
883
960
  /**
961
+ * @public
884
962
  * <p>The unique identifier of this version of the secret.</p>
885
963
  */
886
964
  VersionId?: string;
887
965
  /**
966
+ * @public
888
967
  * <p>The decrypted secret value, if the secret value was originally provided as
889
968
  * binary data in the form of a byte array. The response parameter represents the binary data as
890
969
  * a <a href="https://tools.ietf.org/html/rfc4648#section-4">base64-encoded</a>
@@ -895,6 +974,7 @@ export interface GetSecretValueResponse {
895
974
  */
896
975
  SecretBinary?: Uint8Array;
897
976
  /**
977
+ * @public
898
978
  * <p>The decrypted secret value, if the secret value was originally provided as a string or
899
979
  * through the Secrets Manager console.</p>
900
980
  * <p>If this secret was created by using the console, then Secrets Manager stores the information as a
@@ -902,11 +982,13 @@ export interface GetSecretValueResponse {
902
982
  */
903
983
  SecretString?: string;
904
984
  /**
985
+ * @public
905
986
  * <p>A list of all of the staging labels currently attached to this version of the
906
987
  * secret.</p>
907
988
  */
908
989
  VersionStages?: string[];
909
990
  /**
991
+ * @public
910
992
  * <p>The date and time that this version of the secret was created. If you don't specify
911
993
  * which version in <code>VersionId</code> or <code>VersionStage</code>, then Secrets Manager uses the
912
994
  * <code>AWSCURRENT</code> version.</p>
@@ -943,10 +1025,12 @@ export type SortOrderType = (typeof SortOrderType)[keyof typeof SortOrderType];
943
1025
  */
944
1026
  export interface ListSecretsRequest {
945
1027
  /**
1028
+ * @public
946
1029
  * <p>Specifies whether to include secrets scheduled for deletion. By default, secrets scheduled for deletion aren't included.</p>
947
1030
  */
948
1031
  IncludePlannedDeletion?: boolean;
949
1032
  /**
1033
+ * @public
950
1034
  * <p>The number of results to include in the response.</p>
951
1035
  * <p>If there are more results available, in the response, Secrets Manager includes <code>NextToken</code>.
952
1036
  * To get the next results, call <code>ListSecrets</code> again with the value from
@@ -954,16 +1038,19 @@ export interface ListSecretsRequest {
954
1038
  */
955
1039
  MaxResults?: number;
956
1040
  /**
1041
+ * @public
957
1042
  * <p>A token that indicates where the output should continue from, if a
958
1043
  * previous call did not show all results. To get the next results, call <code>ListSecrets</code> again
959
1044
  * with this value.</p>
960
1045
  */
961
1046
  NextToken?: string;
962
1047
  /**
1048
+ * @public
963
1049
  * <p>The filters to apply to the list of secrets.</p>
964
1050
  */
965
1051
  Filters?: Filter[];
966
1052
  /**
1053
+ * @public
967
1054
  * <p>Secrets are listed by <code>CreatedDate</code>. </p>
968
1055
  */
969
1056
  SortOrder?: SortOrderType | string;
@@ -977,10 +1064,12 @@ export interface ListSecretsRequest {
977
1064
  */
978
1065
  export interface SecretListEntry {
979
1066
  /**
1067
+ * @public
980
1068
  * <p>The Amazon Resource Name (ARN) of the secret.</p>
981
1069
  */
982
1070
  ARN?: string;
983
1071
  /**
1072
+ * @public
984
1073
  * <p>The friendly name of the secret. You can use forward slashes in the name to represent a
985
1074
  * path hierarchy. For example, <code>/prod/databases/dbserver1</code> could represent the secret
986
1075
  * for a server named <code>dbserver1</code> in the folder <code>databases</code> in the folder
@@ -988,19 +1077,23 @@ export interface SecretListEntry {
988
1077
  */
989
1078
  Name?: string;
990
1079
  /**
1080
+ * @public
991
1081
  * <p>The user-provided description of the secret.</p>
992
1082
  */
993
1083
  Description?: string;
994
1084
  /**
1085
+ * @public
995
1086
  * <p>The ARN of the KMS key that Secrets Manager uses to encrypt the secret value. If the secret is encrypted with
996
1087
  * the Amazon Web Services managed key <code>aws/secretsmanager</code>, this field is omitted.</p>
997
1088
  */
998
1089
  KmsKeyId?: string;
999
1090
  /**
1091
+ * @public
1000
1092
  * <p>Indicates whether automatic, scheduled rotation is enabled for this secret.</p>
1001
1093
  */
1002
1094
  RotationEnabled?: boolean;
1003
1095
  /**
1096
+ * @public
1004
1097
  * <p>The ARN of an Amazon Web Services Lambda function invoked by Secrets Manager to rotate and expire the
1005
1098
  * secret either automatically per the schedule or manually by a call to <a href="https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_RotateSecret.html">
1006
1099
  * <code>RotateSecret</code>
@@ -1008,22 +1101,27 @@ export interface SecretListEntry {
1008
1101
  */
1009
1102
  RotationLambdaARN?: string;
1010
1103
  /**
1104
+ * @public
1011
1105
  * <p>A structure that defines the rotation configuration for the secret.</p>
1012
1106
  */
1013
1107
  RotationRules?: RotationRulesType;
1014
1108
  /**
1109
+ * @public
1015
1110
  * <p>The most recent date and time that the Secrets Manager rotation process was successfully completed. This value is null if the secret hasn't ever rotated.</p>
1016
1111
  */
1017
1112
  LastRotatedDate?: Date;
1018
1113
  /**
1114
+ * @public
1019
1115
  * <p>The last date and time that this secret was modified in any way.</p>
1020
1116
  */
1021
1117
  LastChangedDate?: Date;
1022
1118
  /**
1119
+ * @public
1023
1120
  * <p>The date that the secret was last accessed in the Region. This field is omitted if the secret has never been retrieved in the Region.</p>
1024
1121
  */
1025
1122
  LastAccessedDate?: Date;
1026
1123
  /**
1124
+ * @public
1027
1125
  * <p>The date and time the deletion of the secret occurred. Not present on active secrets. The
1028
1126
  * secret can be recovered until the number of days in the recovery window has passed, as
1029
1127
  * specified in the <code>RecoveryWindowInDays</code> parameter of the <a href="https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_DeleteSecret.html">
@@ -1032,10 +1130,12 @@ export interface SecretListEntry {
1032
1130
  */
1033
1131
  DeletedDate?: Date;
1034
1132
  /**
1133
+ * @public
1035
1134
  * <p>The next rotation is scheduled to occur on or before this date. If the secret isn't configured for rotation, Secrets Manager returns null.</p>
1036
1135
  */
1037
1136
  NextRotationDate?: Date;
1038
1137
  /**
1138
+ * @public
1039
1139
  * <p>The list of user-defined tags associated with the secret. To add tags to a
1040
1140
  * secret, use <a href="https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_TagResource.html">
1041
1141
  * <code>TagResource</code>
@@ -1046,6 +1146,7 @@ export interface SecretListEntry {
1046
1146
  */
1047
1147
  Tags?: Tag[];
1048
1148
  /**
1149
+ * @public
1049
1150
  * <p>A list of all of the currently assigned <code>SecretVersionStage</code> staging labels and
1050
1151
  * the <code>SecretVersionId</code> attached to each one. Staging labels are used to keep
1051
1152
  * track of the different versions during the rotation process.</p>
@@ -1056,14 +1157,17 @@ export interface SecretListEntry {
1056
1157
  */
1057
1158
  SecretVersionsToStages?: Record<string, string[]>;
1058
1159
  /**
1160
+ * @public
1059
1161
  * <p>Returns the name of the service that created the secret.</p>
1060
1162
  */
1061
1163
  OwningService?: string;
1062
1164
  /**
1165
+ * @public
1063
1166
  * <p>The date and time when a secret was created.</p>
1064
1167
  */
1065
1168
  CreatedDate?: Date;
1066
1169
  /**
1170
+ * @public
1067
1171
  * <p>The Region where Secrets Manager originated the secret.</p>
1068
1172
  */
1069
1173
  PrimaryRegion?: string;
@@ -1073,10 +1177,12 @@ export interface SecretListEntry {
1073
1177
  */
1074
1178
  export interface ListSecretsResponse {
1075
1179
  /**
1180
+ * @public
1076
1181
  * <p>A list of the secrets in the account.</p>
1077
1182
  */
1078
1183
  SecretList?: SecretListEntry[];
1079
1184
  /**
1185
+ * @public
1080
1186
  * <p>Secrets Manager includes this value if
1081
1187
  * there's more output available than what is included in the current response. This can
1082
1188
  * occur even when the response includes no values at all, such as when you ask for a filtered view
@@ -1090,24 +1196,28 @@ export interface ListSecretsResponse {
1090
1196
  */
1091
1197
  export interface ListSecretVersionIdsRequest {
1092
1198
  /**
1199
+ * @public
1093
1200
  * <p>The ARN or name of the secret whose versions you want to list.</p>
1094
1201
  * <p>For an ARN, we recommend that you specify a complete ARN rather
1095
1202
  * than a partial ARN. See <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/troubleshoot.html#ARN_secretnamehyphen">Finding a secret from a partial ARN</a>.</p>
1096
1203
  */
1097
1204
  SecretId: string | undefined;
1098
1205
  /**
1206
+ * @public
1099
1207
  * <p>The number of results to include in the response.</p>
1100
1208
  * <p>If there are more results available, in the response, Secrets Manager includes <code>NextToken</code>.
1101
1209
  * To get the next results, call <code>ListSecretVersionIds</code> again with the value from <code>NextToken</code>. </p>
1102
1210
  */
1103
1211
  MaxResults?: number;
1104
1212
  /**
1213
+ * @public
1105
1214
  * <p>A token that indicates where the output should continue from, if a previous call
1106
1215
  * did not show all results. To get the next results, call <code>ListSecretVersionIds</code> again with
1107
1216
  * this value.</p>
1108
1217
  */
1109
1218
  NextToken?: string;
1110
1219
  /**
1220
+ * @public
1111
1221
  * <p>Specifies whether to include versions of secrets that don't have any
1112
1222
  * staging labels attached to them. Versions without staging labels are considered deprecated and are subject to
1113
1223
  * deletion by Secrets Manager. By default, versions without staging labels aren't included.</p>
@@ -1120,24 +1230,29 @@ export interface ListSecretVersionIdsRequest {
1120
1230
  */
1121
1231
  export interface SecretVersionsListEntry {
1122
1232
  /**
1233
+ * @public
1123
1234
  * <p>The unique version identifier of this version of the secret.</p>
1124
1235
  */
1125
1236
  VersionId?: string;
1126
1237
  /**
1238
+ * @public
1127
1239
  * <p>An array of staging labels that are currently associated with this version of the
1128
1240
  * secret.</p>
1129
1241
  */
1130
1242
  VersionStages?: string[];
1131
1243
  /**
1244
+ * @public
1132
1245
  * <p>The date that this version of the secret was last accessed. Note that the resolution of
1133
1246
  * this field is at the date level and does not include the time.</p>
1134
1247
  */
1135
1248
  LastAccessedDate?: Date;
1136
1249
  /**
1250
+ * @public
1137
1251
  * <p>The date and time this version of the secret was created.</p>
1138
1252
  */
1139
1253
  CreatedDate?: Date;
1140
1254
  /**
1255
+ * @public
1141
1256
  * <p>The KMS keys used to encrypt the secret version.</p>
1142
1257
  */
1143
1258
  KmsKeyIds?: string[];
@@ -1147,10 +1262,12 @@ export interface SecretVersionsListEntry {
1147
1262
  */
1148
1263
  export interface ListSecretVersionIdsResponse {
1149
1264
  /**
1265
+ * @public
1150
1266
  * <p>A list of the versions of the secret.</p>
1151
1267
  */
1152
1268
  Versions?: SecretVersionsListEntry[];
1153
1269
  /**
1270
+ * @public
1154
1271
  * <p>Secrets Manager includes this value if there's more output available than what is included
1155
1272
  * in the current response. This can occur even when the response includes no values at all,
1156
1273
  * such as when you ask for a filtered view of a long list. To get the next results,
@@ -1158,10 +1275,12 @@ export interface ListSecretVersionIdsResponse {
1158
1275
  */
1159
1276
  NextToken?: string;
1160
1277
  /**
1278
+ * @public
1161
1279
  * <p>The ARN of the secret.</p>
1162
1280
  */
1163
1281
  ARN?: string;
1164
1282
  /**
1283
+ * @public
1165
1284
  * <p>The name of the secret.</p>
1166
1285
  */
1167
1286
  Name?: string;
@@ -1184,18 +1303,21 @@ export declare class PublicPolicyException extends __BaseException {
1184
1303
  */
1185
1304
  export interface PutResourcePolicyRequest {
1186
1305
  /**
1306
+ * @public
1187
1307
  * <p>The ARN or name of the secret to attach the resource-based policy.</p>
1188
1308
  * <p>For an ARN, we recommend that you specify a complete ARN rather
1189
1309
  * than a partial ARN. See <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/troubleshoot.html#ARN_secretnamehyphen">Finding a secret from a partial ARN</a>.</p>
1190
1310
  */
1191
1311
  SecretId: string | undefined;
1192
1312
  /**
1313
+ * @public
1193
1314
  * <p>A JSON-formatted string for an Amazon Web Services
1194
1315
  * resource-based policy. For example policies, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access_examples.html">Permissions
1195
1316
  * policy examples</a>.</p>
1196
1317
  */
1197
1318
  ResourcePolicy: string | undefined;
1198
1319
  /**
1320
+ * @public
1199
1321
  * <p>Specifies whether to block resource-based policies that allow broad access to the secret, for example those that use a wildcard for the principal. By default, public policies aren't blocked.</p>
1200
1322
  */
1201
1323
  BlockPublicPolicy?: boolean;
@@ -1205,10 +1327,12 @@ export interface PutResourcePolicyRequest {
1205
1327
  */
1206
1328
  export interface PutResourcePolicyResponse {
1207
1329
  /**
1330
+ * @public
1208
1331
  * <p>The ARN of the secret.</p>
1209
1332
  */
1210
1333
  ARN?: string;
1211
1334
  /**
1335
+ * @public
1212
1336
  * <p>The name of the secret.</p>
1213
1337
  */
1214
1338
  Name?: string;
@@ -1218,6 +1342,7 @@ export interface PutResourcePolicyResponse {
1218
1342
  */
1219
1343
  export interface PutSecretValueRequest {
1220
1344
  /**
1345
+ * @public
1221
1346
  * <p>The ARN or name of the secret to add a new version to.</p>
1222
1347
  * <p>For an ARN, we recommend that you specify a complete ARN rather
1223
1348
  * than a partial ARN. See <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/troubleshoot.html#ARN_secretnamehyphen">Finding a secret from a partial ARN</a>.</p>
@@ -1225,6 +1350,7 @@ export interface PutSecretValueRequest {
1225
1350
  */
1226
1351
  SecretId: string | undefined;
1227
1352
  /**
1353
+ * @public
1228
1354
  * <p>A unique identifier for the new version of the secret. </p>
1229
1355
  * <note>
1230
1356
  * <p>If you use the Amazon Web Services CLI or one of the Amazon Web Services SDKs to call this operation, then you can
@@ -1258,6 +1384,7 @@ export interface PutSecretValueRequest {
1258
1384
  */
1259
1385
  ClientRequestToken?: string;
1260
1386
  /**
1387
+ * @public
1261
1388
  * <p>The binary data to encrypt and store in the new version of
1262
1389
  * the secret. To use this parameter in the command-line tools, we recommend that you store your
1263
1390
  * binary data in a file and then pass the
@@ -1267,12 +1394,14 @@ export interface PutSecretValueRequest {
1267
1394
  */
1268
1395
  SecretBinary?: Uint8Array;
1269
1396
  /**
1397
+ * @public
1270
1398
  * <p>The text to encrypt and store in the new version of the secret. </p>
1271
1399
  * <p>You must include <code>SecretBinary</code> or <code>SecretString</code>, but not both.</p>
1272
1400
  * <p>We recommend you create the secret string as JSON key/value pairs, as shown in the example.</p>
1273
1401
  */
1274
1402
  SecretString?: string;
1275
1403
  /**
1404
+ * @public
1276
1405
  * <p>A list of staging labels to attach to this version of the
1277
1406
  * secret. Secrets Manager uses staging labels to track versions of a secret through the rotation process.</p>
1278
1407
  * <p>If you specify a staging
@@ -1291,18 +1420,22 @@ export interface PutSecretValueRequest {
1291
1420
  */
1292
1421
  export interface PutSecretValueResponse {
1293
1422
  /**
1423
+ * @public
1294
1424
  * <p>The ARN of the secret.</p>
1295
1425
  */
1296
1426
  ARN?: string;
1297
1427
  /**
1428
+ * @public
1298
1429
  * <p>The name of the secret.</p>
1299
1430
  */
1300
1431
  Name?: string;
1301
1432
  /**
1433
+ * @public
1302
1434
  * <p>The unique identifier of the version of the secret.</p>
1303
1435
  */
1304
1436
  VersionId?: string;
1305
1437
  /**
1438
+ * @public
1306
1439
  * <p>The list of staging labels that are currently attached to this version of the secret.
1307
1440
  * Secrets Manager uses staging labels to track a version as it progresses through the secret rotation
1308
1441
  * process.</p>
@@ -1314,10 +1447,12 @@ export interface PutSecretValueResponse {
1314
1447
  */
1315
1448
  export interface RemoveRegionsFromReplicationRequest {
1316
1449
  /**
1450
+ * @public
1317
1451
  * <p>The ARN or name of the secret.</p>
1318
1452
  */
1319
1453
  SecretId: string | undefined;
1320
1454
  /**
1455
+ * @public
1321
1456
  * <p>The Regions of the replicas to remove.</p>
1322
1457
  */
1323
1458
  RemoveReplicaRegions: string[] | undefined;
@@ -1327,10 +1462,12 @@ export interface RemoveRegionsFromReplicationRequest {
1327
1462
  */
1328
1463
  export interface RemoveRegionsFromReplicationResponse {
1329
1464
  /**
1465
+ * @public
1330
1466
  * <p>The ARN of the primary secret.</p>
1331
1467
  */
1332
1468
  ARN?: string;
1333
1469
  /**
1470
+ * @public
1334
1471
  * <p>The status of replicas for this secret after you remove Regions.</p>
1335
1472
  */
1336
1473
  ReplicationStatus?: ReplicationStatusType[];
@@ -1340,14 +1477,17 @@ export interface RemoveRegionsFromReplicationResponse {
1340
1477
  */
1341
1478
  export interface ReplicateSecretToRegionsRequest {
1342
1479
  /**
1480
+ * @public
1343
1481
  * <p>The ARN or name of the secret to replicate.</p>
1344
1482
  */
1345
1483
  SecretId: string | undefined;
1346
1484
  /**
1485
+ * @public
1347
1486
  * <p>A list of Regions in which to replicate the secret.</p>
1348
1487
  */
1349
1488
  AddReplicaRegions: ReplicaRegionType[] | undefined;
1350
1489
  /**
1490
+ * @public
1351
1491
  * <p>Specifies whether to overwrite a secret with the same name in the destination Region. By default, secrets aren't overwritten.</p>
1352
1492
  */
1353
1493
  ForceOverwriteReplicaSecret?: boolean;
@@ -1357,10 +1497,12 @@ export interface ReplicateSecretToRegionsRequest {
1357
1497
  */
1358
1498
  export interface ReplicateSecretToRegionsResponse {
1359
1499
  /**
1500
+ * @public
1360
1501
  * <p>The ARN of the primary secret.</p>
1361
1502
  */
1362
1503
  ARN?: string;
1363
1504
  /**
1505
+ * @public
1364
1506
  * <p>The status of replication.</p>
1365
1507
  */
1366
1508
  ReplicationStatus?: ReplicationStatusType[];
@@ -1370,6 +1512,7 @@ export interface ReplicateSecretToRegionsResponse {
1370
1512
  */
1371
1513
  export interface RestoreSecretRequest {
1372
1514
  /**
1515
+ * @public
1373
1516
  * <p>The ARN or name of the secret to restore.</p>
1374
1517
  * <p>For an ARN, we recommend that you specify a complete ARN rather
1375
1518
  * than a partial ARN. See <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/troubleshoot.html#ARN_secretnamehyphen">Finding a secret from a partial ARN</a>.</p>
@@ -1381,10 +1524,12 @@ export interface RestoreSecretRequest {
1381
1524
  */
1382
1525
  export interface RestoreSecretResponse {
1383
1526
  /**
1527
+ * @public
1384
1528
  * <p>The ARN of the secret that was restored.</p>
1385
1529
  */
1386
1530
  ARN?: string;
1387
1531
  /**
1532
+ * @public
1388
1533
  * <p>The name of the secret that was restored.</p>
1389
1534
  */
1390
1535
  Name?: string;
@@ -1394,12 +1539,14 @@ export interface RestoreSecretResponse {
1394
1539
  */
1395
1540
  export interface RotateSecretRequest {
1396
1541
  /**
1542
+ * @public
1397
1543
  * <p>The ARN or name of the secret to rotate.</p>
1398
1544
  * <p>For an ARN, we recommend that you specify a complete ARN rather
1399
1545
  * than a partial ARN. See <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/troubleshoot.html#ARN_secretnamehyphen">Finding a secret from a partial ARN</a>.</p>
1400
1546
  */
1401
1547
  SecretId: string | undefined;
1402
1548
  /**
1549
+ * @public
1403
1550
  * <p>A unique identifier for the new version of the secret that helps
1404
1551
  * ensure idempotency. Secrets Manager uses this value to prevent the accidental creation of duplicate versions if
1405
1552
  * there are failures and retries during rotation. This value becomes the
@@ -1416,15 +1563,18 @@ export interface RotateSecretRequest {
1416
1563
  */
1417
1564
  ClientRequestToken?: string;
1418
1565
  /**
1566
+ * @public
1419
1567
  * <p>For secrets that use a Lambda rotation function to rotate, the ARN of the Lambda rotation function. </p>
1420
1568
  * <p>For secrets that use <i>managed rotation</i>, omit this field. For more information, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/rotate-secrets_managed.html">Managed rotation</a> in the <i>Secrets Manager User Guide</i>.</p>
1421
1569
  */
1422
1570
  RotationLambdaARN?: string;
1423
1571
  /**
1572
+ * @public
1424
1573
  * <p>A structure that defines the rotation configuration for this secret.</p>
1425
1574
  */
1426
1575
  RotationRules?: RotationRulesType;
1427
1576
  /**
1577
+ * @public
1428
1578
  * <p>Specifies whether to rotate the secret immediately or wait until the next scheduled rotation window.
1429
1579
  * The rotation schedule is defined in <a>RotateSecretRequest$RotationRules</a>.</p>
1430
1580
  * <p>For secrets that use a Lambda rotation function to rotate, if you don't immediately rotate the secret, Secrets Manager tests the rotation configuration by running the
@@ -1440,14 +1590,17 @@ export interface RotateSecretRequest {
1440
1590
  */
1441
1591
  export interface RotateSecretResponse {
1442
1592
  /**
1593
+ * @public
1443
1594
  * <p>The ARN of the secret.</p>
1444
1595
  */
1445
1596
  ARN?: string;
1446
1597
  /**
1598
+ * @public
1447
1599
  * <p>The name of the secret.</p>
1448
1600
  */
1449
1601
  Name?: string;
1450
1602
  /**
1603
+ * @public
1451
1604
  * <p>The ID of the new version of the secret.</p>
1452
1605
  */
1453
1606
  VersionId?: string;
@@ -1457,6 +1610,7 @@ export interface RotateSecretResponse {
1457
1610
  */
1458
1611
  export interface StopReplicationToReplicaRequest {
1459
1612
  /**
1613
+ * @public
1460
1614
  * <p>The ARN of the primary secret. </p>
1461
1615
  */
1462
1616
  SecretId: string | undefined;
@@ -1466,6 +1620,7 @@ export interface StopReplicationToReplicaRequest {
1466
1620
  */
1467
1621
  export interface StopReplicationToReplicaResponse {
1468
1622
  /**
1623
+ * @public
1469
1624
  * <p>The ARN of the promoted secret. The ARN is the same as the original primary secret except the Region is changed.</p>
1470
1625
  */
1471
1626
  ARN?: string;
@@ -1475,6 +1630,7 @@ export interface StopReplicationToReplicaResponse {
1475
1630
  */
1476
1631
  export interface TagResourceRequest {
1477
1632
  /**
1633
+ * @public
1478
1634
  * <p>The identifier for the secret to attach tags to. You can specify either the
1479
1635
  * Amazon Resource Name (ARN) or the friendly name of the secret.</p>
1480
1636
  * <p>For an ARN, we recommend that you specify a complete ARN rather
@@ -1482,6 +1638,7 @@ export interface TagResourceRequest {
1482
1638
  */
1483
1639
  SecretId: string | undefined;
1484
1640
  /**
1641
+ * @public
1485
1642
  * <p>The tags to attach to the secret as a JSON text string argument. Each element in the list consists of a <code>Key</code>
1486
1643
  * and a <code>Value</code>.</p>
1487
1644
  * <p>For storing multiple values, we recommend that you use a JSON text
@@ -1495,12 +1652,14 @@ export interface TagResourceRequest {
1495
1652
  */
1496
1653
  export interface UntagResourceRequest {
1497
1654
  /**
1655
+ * @public
1498
1656
  * <p>The ARN or name of the secret.</p>
1499
1657
  * <p>For an ARN, we recommend that you specify a complete ARN rather
1500
1658
  * than a partial ARN. See <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/troubleshoot.html#ARN_secretnamehyphen">Finding a secret from a partial ARN</a>.</p>
1501
1659
  */
1502
1660
  SecretId: string | undefined;
1503
1661
  /**
1662
+ * @public
1504
1663
  * <p>A list of tag key names to remove from the secret. You don't specify the value. Both the
1505
1664
  * key and its associated value are removed.</p>
1506
1665
  * <p>This parameter requires a JSON text string argument.</p>
@@ -1515,12 +1674,14 @@ export interface UntagResourceRequest {
1515
1674
  */
1516
1675
  export interface UpdateSecretRequest {
1517
1676
  /**
1677
+ * @public
1518
1678
  * <p>The ARN or name of the secret.</p>
1519
1679
  * <p>For an ARN, we recommend that you specify a complete ARN rather
1520
1680
  * than a partial ARN. See <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/troubleshoot.html#ARN_secretnamehyphen">Finding a secret from a partial ARN</a>.</p>
1521
1681
  */
1522
1682
  SecretId: string | undefined;
1523
1683
  /**
1684
+ * @public
1524
1685
  * <p>If you include <code>SecretString</code> or <code>SecretBinary</code>, then Secrets Manager creates
1525
1686
  * a new version for the secret, and this parameter specifies the unique identifier for the new
1526
1687
  * version.</p>
@@ -1536,10 +1697,12 @@ export interface UpdateSecretRequest {
1536
1697
  */
1537
1698
  ClientRequestToken?: string;
1538
1699
  /**
1700
+ * @public
1539
1701
  * <p>The description of the secret.</p>
1540
1702
  */
1541
1703
  Description?: string;
1542
1704
  /**
1705
+ * @public
1543
1706
  * <p>The ARN, key ID, or alias of the KMS key that Secrets Manager
1544
1707
  * uses to encrypt new secret versions as well as any existing versions with the staging labels
1545
1708
  * <code>AWSCURRENT</code>, <code>AWSPENDING</code>, or <code>AWSPREVIOUS</code>. If you don't have <code>kms:Encrypt</code> permission to the new key, Secrets Manager does not re-ecrypt existing secret versions with the new key. For more information about versions and staging labels, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/getting-started.html#term_version">Concepts: Version</a>.</p>
@@ -1560,6 +1723,7 @@ export interface UpdateSecretRequest {
1560
1723
  */
1561
1724
  KmsKeyId?: string;
1562
1725
  /**
1726
+ * @public
1563
1727
  * <p>The binary data to encrypt and store in the new
1564
1728
  * version of the secret. We recommend that you
1565
1729
  * store your binary data in a file and then pass
@@ -1570,6 +1734,7 @@ export interface UpdateSecretRequest {
1570
1734
  */
1571
1735
  SecretBinary?: Uint8Array;
1572
1736
  /**
1737
+ * @public
1573
1738
  * <p>The text data to encrypt and store in the new
1574
1739
  * version of the secret. We recommend you use a JSON structure of key/value pairs for your secret value. </p>
1575
1740
  * <p>Either <code>SecretBinary</code> or <code>SecretString</code> must have
@@ -1582,14 +1747,17 @@ export interface UpdateSecretRequest {
1582
1747
  */
1583
1748
  export interface UpdateSecretResponse {
1584
1749
  /**
1750
+ * @public
1585
1751
  * <p>The ARN of the secret that was updated.</p>
1586
1752
  */
1587
1753
  ARN?: string;
1588
1754
  /**
1755
+ * @public
1589
1756
  * <p>The name of the secret that was updated.</p>
1590
1757
  */
1591
1758
  Name?: string;
1592
1759
  /**
1760
+ * @public
1593
1761
  * <p>If Secrets Manager created a new version of the secret during this operation, then <code>VersionId</code>
1594
1762
  * contains the unique identifier of the new version.</p>
1595
1763
  */
@@ -1600,16 +1768,19 @@ export interface UpdateSecretResponse {
1600
1768
  */
1601
1769
  export interface UpdateSecretVersionStageRequest {
1602
1770
  /**
1771
+ * @public
1603
1772
  * <p>The ARN or the name of the secret with the version and staging labelsto modify.</p>
1604
1773
  * <p>For an ARN, we recommend that you specify a complete ARN rather
1605
1774
  * than a partial ARN. See <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/troubleshoot.html#ARN_secretnamehyphen">Finding a secret from a partial ARN</a>.</p>
1606
1775
  */
1607
1776
  SecretId: string | undefined;
1608
1777
  /**
1778
+ * @public
1609
1779
  * <p>The staging label to add to this version.</p>
1610
1780
  */
1611
1781
  VersionStage: string | undefined;
1612
1782
  /**
1783
+ * @public
1613
1784
  * <p>The ID of the version that the staging label is to be removed
1614
1785
  * from. If the staging label you are trying to attach to one version is already attached to a
1615
1786
  * different version, then you must include this parameter and specify the version that the label
@@ -1618,6 +1789,7 @@ export interface UpdateSecretVersionStageRequest {
1618
1789
  */
1619
1790
  RemoveFromVersionId?: string;
1620
1791
  /**
1792
+ * @public
1621
1793
  * <p>The ID of the version to add the staging label to. To
1622
1794
  * remove a label from a version, then do not specify this parameter.</p>
1623
1795
  * <p>If the staging label is already attached to a different version of the secret, then you
@@ -1630,10 +1802,12 @@ export interface UpdateSecretVersionStageRequest {
1630
1802
  */
1631
1803
  export interface UpdateSecretVersionStageResponse {
1632
1804
  /**
1805
+ * @public
1633
1806
  * <p>The ARN of the secret that was updated.</p>
1634
1807
  */
1635
1808
  ARN?: string;
1636
1809
  /**
1810
+ * @public
1637
1811
  * <p>The name of the secret that was updated.</p>
1638
1812
  */
1639
1813
  Name?: string;
@@ -1643,10 +1817,12 @@ export interface UpdateSecretVersionStageResponse {
1643
1817
  */
1644
1818
  export interface ValidateResourcePolicyRequest {
1645
1819
  /**
1820
+ * @public
1646
1821
  * <p>This field is reserved for internal use.</p>
1647
1822
  */
1648
1823
  SecretId?: string;
1649
1824
  /**
1825
+ * @public
1650
1826
  * <p>A JSON-formatted string that contains an Amazon Web Services
1651
1827
  * resource-based policy. The policy in the string identifies who can access or manage this
1652
1828
  * secret and its versions. For example policies, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access_examples.html">Permissions policy examples</a>.</p>
@@ -1659,10 +1835,12 @@ export interface ValidateResourcePolicyRequest {
1659
1835
  */
1660
1836
  export interface ValidationErrorsEntry {
1661
1837
  /**
1838
+ * @public
1662
1839
  * <p>Checks the name of the policy.</p>
1663
1840
  */
1664
1841
  CheckName?: string;
1665
1842
  /**
1843
+ * @public
1666
1844
  * <p>Displays error messages if validation encounters problems during validation of the resource policy.</p>
1667
1845
  */
1668
1846
  ErrorMessage?: string;
@@ -1672,10 +1850,12 @@ export interface ValidationErrorsEntry {
1672
1850
  */
1673
1851
  export interface ValidateResourcePolicyResponse {
1674
1852
  /**
1853
+ * @public
1675
1854
  * <p>True if your policy passes validation, otherwise false.</p>
1676
1855
  */
1677
1856
  PolicyValidationPassed?: boolean;
1678
1857
  /**
1858
+ * @public
1679
1859
  * <p>Validation errors if your policy didn't pass validation.</p>
1680
1860
  */
1681
1861
  ValidationErrors?: ValidationErrorsEntry[];
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-secrets-manager",
3
3
  "description": "AWS SDK for JavaScript Secrets Manager Client for Node.js, Browser and React Native",
4
- "version": "3.379.1",
4
+ "version": "3.385.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "tsc -p tsconfig.cjs.json",
@@ -21,15 +21,15 @@
21
21
  "dependencies": {
22
22
  "@aws-crypto/sha256-browser": "3.0.0",
23
23
  "@aws-crypto/sha256-js": "3.0.0",
24
- "@aws-sdk/client-sts": "3.379.1",
25
- "@aws-sdk/credential-provider-node": "3.379.1",
24
+ "@aws-sdk/client-sts": "3.385.0",
25
+ "@aws-sdk/credential-provider-node": "3.385.0",
26
26
  "@aws-sdk/middleware-host-header": "3.379.1",
27
27
  "@aws-sdk/middleware-logger": "3.378.0",
28
28
  "@aws-sdk/middleware-recursion-detection": "3.378.0",
29
29
  "@aws-sdk/middleware-signing": "3.379.1",
30
- "@aws-sdk/middleware-user-agent": "3.379.1",
30
+ "@aws-sdk/middleware-user-agent": "3.382.0",
31
31
  "@aws-sdk/types": "3.378.0",
32
- "@aws-sdk/util-endpoints": "3.378.0",
32
+ "@aws-sdk/util-endpoints": "3.382.0",
33
33
  "@aws-sdk/util-user-agent-browser": "3.378.0",
34
34
  "@aws-sdk/util-user-agent-node": "3.378.0",
35
35
  "@smithy/config-resolver": "^2.0.1",