@aws-sdk/client-secrets-manager 3.489.0 → 3.491.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
|
@@ -127,6 +127,58 @@ declare const BatchGetSecretValueCommand_base: {
|
|
|
127
127
|
* @throws {@link SecretsManagerServiceException}
|
|
128
128
|
* <p>Base exception class for all service exceptions from SecretsManager service.</p>
|
|
129
129
|
*
|
|
130
|
+
* @example To retrieve the secret values for a group of secrets listed by name
|
|
131
|
+
* ```javascript
|
|
132
|
+
* // The following example gets the values for three secrets.
|
|
133
|
+
* const input = {
|
|
134
|
+
* "SecretIdList": [
|
|
135
|
+
* "MySecret1",
|
|
136
|
+
* "MySecret2",
|
|
137
|
+
* "MySecret3"
|
|
138
|
+
* ]
|
|
139
|
+
* };
|
|
140
|
+
* const command = new BatchGetSecretValueCommand(input);
|
|
141
|
+
* const response = await client.send(command);
|
|
142
|
+
* /* response ==
|
|
143
|
+
* {
|
|
144
|
+
* "Errors": [],
|
|
145
|
+
* "SecretValues": [
|
|
146
|
+
* {
|
|
147
|
+
* "ARN": "®ion-arn;&asm-service-name;:us-west-2:&ExampleAccountId;:secret:MySecret1-a1b2c3",
|
|
148
|
+
* "CreatedDate": 1700591229.801,
|
|
149
|
+
* "Name": "MySecret1",
|
|
150
|
+
* "SecretString": "{\"username\":\"diego_ramirez\",\"password\":\"EXAMPLE-PASSWORD\",\"engine\":\"mysql\",\"host\":\"secretsmanagertutorial.cluster.us-west-2.rds.amazonaws.com\",\"port\":3306,\"dbClusterIdentifier\":\"secretsmanagertutorial\"}",
|
|
151
|
+
* "VersionId": "a1b2c3d4-5678-90ab-cdef-EXAMPLEaaaaa",
|
|
152
|
+
* "VersionStages": [
|
|
153
|
+
* "AWSCURRENT"
|
|
154
|
+
* ]
|
|
155
|
+
* },
|
|
156
|
+
* {
|
|
157
|
+
* "ARN": "®ion-arn;&asm-service-name;:us-west-2:&ExampleAccountId;:secret:MySecret2-a1b2c3",
|
|
158
|
+
* "CreatedDate": 1699911394.105,
|
|
159
|
+
* "Name": "MySecret2",
|
|
160
|
+
* "SecretString": "{\"username\":\"akua_mansa\",\"password\":\"EXAMPLE-PASSWORD\"",
|
|
161
|
+
* "VersionId": "a1b2c3d4-5678-90ab-cdef-EXAMPLEbbbbb",
|
|
162
|
+
* "VersionStages": [
|
|
163
|
+
* "AWSCURRENT"
|
|
164
|
+
* ]
|
|
165
|
+
* },
|
|
166
|
+
* {
|
|
167
|
+
* "ARN": "®ion-arn;&asm-service-name;:us-west-2:&ExampleAccountId;:secret:MySecret3-a1b2c3",
|
|
168
|
+
* "CreatedDate": 1699911394.105,
|
|
169
|
+
* "Name": "MySecret3",
|
|
170
|
+
* "SecretString": "{\"username\":\"jie_liu\",\"password\":\"EXAMPLE-PASSWORD\"",
|
|
171
|
+
* "VersionId": "a1b2c3d4-5678-90ab-cdef-EXAMPLEccccc",
|
|
172
|
+
* "VersionStages": [
|
|
173
|
+
* "AWSCURRENT"
|
|
174
|
+
* ]
|
|
175
|
+
* }
|
|
176
|
+
* ]
|
|
177
|
+
* }
|
|
178
|
+
* *\/
|
|
179
|
+
* // example id: to-retrieve-the-secret-values-for-a-group-of-secrets-listed-by-name-1704846593341
|
|
180
|
+
* ```
|
|
181
|
+
*
|
|
130
182
|
*/
|
|
131
183
|
export declare class BatchGetSecretValueCommand extends BatchGetSecretValueCommand_base {
|
|
132
184
|
}
|
|
@@ -28,7 +28,8 @@ declare const GetRandomPasswordCommand_base: {
|
|
|
28
28
|
* @public
|
|
29
29
|
* <p>Generates a random password. We recommend that you specify the
|
|
30
30
|
* maximum length and include every character type that the system you are generating a password
|
|
31
|
-
* for can support
|
|
31
|
+
* for can support. By default, Secrets Manager uses uppercase and lowercase letters, numbers, and the following characters in passwords: <code>!\"#$%&'()*+,-./:;<=>?@[\\]^_`\{|\}~</code>
|
|
32
|
+
* </p>
|
|
32
33
|
* <p>Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters because it might be logged. For more information, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html">Logging Secrets Manager events with CloudTrail</a>.</p>
|
|
33
34
|
* <p>
|
|
34
35
|
* <b>Required permissions: </b>
|
|
@@ -31,7 +31,7 @@ declare const ReplicateSecretToRegionsCommand_base: {
|
|
|
31
31
|
* <p>
|
|
32
32
|
* <b>Required permissions: </b>
|
|
33
33
|
* <code>secretsmanager:ReplicateSecretToRegions</code>.
|
|
34
|
-
* For more information, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions">
|
|
34
|
+
* If the primary secret is encrypted with a KMS key other than <code>aws/secretsmanager</code>, you also need <code>kms:Decrypt</code> permission to the key. To encrypt the replicated secret with a KMS key other than <code>aws/secretsmanager</code>, you need <code>kms:GenerateDataKey</code> and <code>kms:Encrypt</code> to the key. For more information, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions">
|
|
35
35
|
* IAM policy actions for Secrets Manager</a> and <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html">Authentication
|
|
36
36
|
* and access control in Secrets Manager</a>. </p>
|
|
37
37
|
* @example
|
|
@@ -820,7 +820,7 @@ export interface DescribeSecretResponse {
|
|
|
820
820
|
/**
|
|
821
821
|
* @public
|
|
822
822
|
* <p>The last date and time that Secrets Manager rotated the secret.
|
|
823
|
-
* If the secret isn't configured for rotation, Secrets Manager returns null.</p>
|
|
823
|
+
* If the secret isn't configured for rotation or rotation has been disabled, Secrets Manager returns null.</p>
|
|
824
824
|
*/
|
|
825
825
|
LastRotatedDate?: Date;
|
|
826
826
|
/**
|
|
@@ -845,7 +845,7 @@ export interface DescribeSecretResponse {
|
|
|
845
845
|
DeletedDate?: Date;
|
|
846
846
|
/**
|
|
847
847
|
* @public
|
|
848
|
-
* <p>The next rotation is scheduled to occur on or before this date. If the secret isn't configured for rotation, Secrets Manager returns null.</p>
|
|
848
|
+
* <p>The next rotation is scheduled to occur on or before this date. If the secret isn't configured for rotation or rotation has been disabled, Secrets Manager returns null.</p>
|
|
849
849
|
*/
|
|
850
850
|
NextRotationDate?: Date;
|
|
851
851
|
/**
|
|
@@ -1068,9 +1068,7 @@ export interface GetSecretValueResponse {
|
|
|
1068
1068
|
/**
|
|
1069
1069
|
* @public
|
|
1070
1070
|
* <p>The decrypted secret value, if the secret value was originally provided as
|
|
1071
|
-
* binary data in the form of a byte array.
|
|
1072
|
-
* a <a href="https://tools.ietf.org/html/rfc4648#section-4">base64-encoded</a>
|
|
1073
|
-
* string.</p>
|
|
1071
|
+
* binary data in the form of a byte array. When you retrieve a <code>SecretBinary</code> using the HTTP API, the Python SDK, or the Amazon Web Services CLI, the value is Base64-encoded. Otherwise, it is not encoded.</p>
|
|
1074
1072
|
* <p>If the secret was created by using the Secrets Manager console, or if the secret value was
|
|
1075
1073
|
* originally provided as a string, then this field is omitted. The secret value appears in
|
|
1076
1074
|
* <code>SecretString</code> instead.</p>
|
|
@@ -1218,7 +1216,7 @@ export interface SecretListEntry {
|
|
|
1218
1216
|
DeletedDate?: Date;
|
|
1219
1217
|
/**
|
|
1220
1218
|
* @public
|
|
1221
|
-
* <p>The next rotation is scheduled to occur on or before this date. If the secret isn't configured for rotation, Secrets Manager returns null.</p>
|
|
1219
|
+
* <p>The next rotation is scheduled to occur on or before this date. If the secret isn't configured for rotation or rotation has been disabled, Secrets Manager returns null.</p>
|
|
1222
1220
|
*/
|
|
1223
1221
|
NextRotationDate?: Date;
|
|
1224
1222
|
/**
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-secrets-manager",
|
|
3
3
|
"description": "AWS SDK for JavaScript Secrets Manager Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.491.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
|
|
7
7
|
"build:cjs": "tsc -p tsconfig.cjs.json",
|
|
@@ -20,9 +20,9 @@
|
|
|
20
20
|
"dependencies": {
|
|
21
21
|
"@aws-crypto/sha256-browser": "3.0.0",
|
|
22
22
|
"@aws-crypto/sha256-js": "3.0.0",
|
|
23
|
-
"@aws-sdk/client-sts": "3.
|
|
24
|
-
"@aws-sdk/core": "3.
|
|
25
|
-
"@aws-sdk/credential-provider-node": "3.
|
|
23
|
+
"@aws-sdk/client-sts": "3.490.0",
|
|
24
|
+
"@aws-sdk/core": "3.490.0",
|
|
25
|
+
"@aws-sdk/credential-provider-node": "3.490.0",
|
|
26
26
|
"@aws-sdk/middleware-host-header": "3.489.0",
|
|
27
27
|
"@aws-sdk/middleware-logger": "3.489.0",
|
|
28
28
|
"@aws-sdk/middleware-recursion-detection": "3.489.0",
|