cdk-docker-image-deployment 0.0.577 → 0.0.579

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (482) hide show
  1. package/.jsii +5 -5
  2. package/lib/destination.js +1 -1
  3. package/lib/docker-image-deployment.js +1 -1
  4. package/lib/source.js +1 -1
  5. package/node_modules/@types/aws-lambda/README.md +2 -2
  6. package/node_modules/@types/aws-lambda/index.d.ts +1 -0
  7. package/node_modules/@types/aws-lambda/package.json +8 -3
  8. package/node_modules/@types/aws-lambda/trigger/api-gateway-authorizer.d.ts +3 -1
  9. package/node_modules/@types/aws-lambda/trigger/appsync-resolver.d.ts +5 -0
  10. package/node_modules/@types/aws-lambda/trigger/cdk-custom-resource.d.ts +133 -42
  11. package/node_modules/@types/aws-lambda/trigger/cloudformation-custom-resource.d.ts +196 -30
  12. package/node_modules/@types/aws-lambda/trigger/cognito-user-pool-trigger/define-auth-challenge.d.ts +1 -1
  13. package/node_modules/@types/aws-lambda/trigger/transfer-family-authorizer.d.ts +2 -1
  14. package/node_modules/aws-sdk/README.md +1 -1
  15. package/node_modules/aws-sdk/apis/accessanalyzer-2019-11-01.examples.json +196 -0
  16. package/node_modules/aws-sdk/apis/accessanalyzer-2019-11-01.min.json +254 -111
  17. package/node_modules/aws-sdk/apis/accessanalyzer-2019-11-01.paginators.json +6 -0
  18. package/node_modules/aws-sdk/apis/account-2021-02-01.min.json +101 -19
  19. package/node_modules/aws-sdk/apis/acm-2015-12-08.min.json +7 -1
  20. package/node_modules/aws-sdk/apis/acm-pca-2017-08-22.min.json +20 -13
  21. package/node_modules/aws-sdk/apis/acm-pca-2017-08-22.paginators.json +4 -4
  22. package/node_modules/aws-sdk/apis/acm-pca-2017-08-22.waiters2.json +15 -0
  23. package/node_modules/aws-sdk/apis/amplify-2017-07-25.min.json +79 -55
  24. package/node_modules/aws-sdk/apis/apigateway-2015-07-09.min.json +7 -1
  25. package/node_modules/aws-sdk/apis/appintegrations-2020-07-29.min.json +121 -11
  26. package/node_modules/aws-sdk/apis/application-autoscaling-2016-02-06.min.json +7 -1
  27. package/node_modules/aws-sdk/apis/application-signals-2024-04-15.min.json +990 -0
  28. package/node_modules/aws-sdk/apis/application-signals-2024-04-15.paginators.json +34 -0
  29. package/node_modules/aws-sdk/apis/appstream-2016-12-01.min.json +188 -45
  30. package/node_modules/aws-sdk/apis/appsync-2017-07-25.min.json +4 -1
  31. package/node_modules/aws-sdk/apis/appsync-2017-07-25.paginators.json +60 -0
  32. package/node_modules/aws-sdk/apis/apptest-2022-12-06.min.json +1917 -0
  33. package/node_modules/aws-sdk/apis/apptest-2022-12-06.paginators.json +40 -0
  34. package/node_modules/aws-sdk/apis/apptest-2022-12-06.waiters2.json +5 -0
  35. package/node_modules/aws-sdk/apis/arc-zonal-shift-2022-10-30.min.json +62 -10
  36. package/node_modules/aws-sdk/apis/artifact-2018-05-10.examples.json +113 -0
  37. package/node_modules/aws-sdk/apis/artifact-2018-05-10.min.json +47 -41
  38. package/node_modules/aws-sdk/apis/artifact-2018-05-10.waiters2.json +5 -0
  39. package/node_modules/aws-sdk/apis/athena-2017-05-18.min.json +7 -1
  40. package/node_modules/aws-sdk/apis/auditmanager-2017-07-25.min.json +57 -38
  41. package/node_modules/aws-sdk/apis/autoscaling-2011-01-01.min.json +40 -34
  42. package/node_modules/aws-sdk/apis/b2bi-2022-06-23.min.json +8 -1
  43. package/node_modules/aws-sdk/apis/batch-2016-08-10.min.json +115 -60
  44. package/node_modules/aws-sdk/apis/bedrock-2023-04-20.min.json +326 -88
  45. package/node_modules/aws-sdk/apis/bedrock-2023-04-20.paginators.json +6 -0
  46. package/node_modules/aws-sdk/apis/bedrock-agent-2023-06-05.min.json +2122 -231
  47. package/node_modules/aws-sdk/apis/bedrock-agent-2023-06-05.paginators.json +24 -0
  48. package/node_modules/aws-sdk/apis/bedrock-agent-runtime-2023-07-26.min.json +894 -243
  49. package/node_modules/aws-sdk/apis/bedrock-agent-runtime-2023-07-26.paginators.json +6 -0
  50. package/node_modules/aws-sdk/apis/bedrock-runtime-2023-09-30.min.json +921 -45
  51. package/node_modules/aws-sdk/apis/budgets-2016-10-20.min.json +102 -21
  52. package/node_modules/aws-sdk/apis/chatbot-2017-10-11.min.json +138 -24
  53. package/node_modules/aws-sdk/apis/chime-sdk-media-pipelines-2021-07-15.min.json +10 -1
  54. package/node_modules/aws-sdk/apis/chime-sdk-voice-2022-08-03.min.json +6 -2
  55. package/node_modules/aws-sdk/apis/cleanrooms-2022-02-17.min.json +1329 -202
  56. package/node_modules/aws-sdk/apis/cleanrooms-2022-02-17.paginators.json +18 -0
  57. package/node_modules/aws-sdk/apis/cleanroomsml-2023-09-06.min.json +305 -287
  58. package/node_modules/aws-sdk/apis/cleanroomsml-2023-09-06.waiters2.json +5 -0
  59. package/node_modules/aws-sdk/apis/cloudformation-2010-05-15.min.json +48 -43
  60. package/node_modules/aws-sdk/apis/cloudfront-2020-05-31.min.json +7 -1
  61. package/node_modules/aws-sdk/apis/cloudhsmv2-2017-04-28.min.json +79 -20
  62. package/node_modules/aws-sdk/apis/cloudtrail-2013-11-01.min.json +44 -24
  63. package/node_modules/aws-sdk/apis/codeartifact-2018-09-22.min.json +7 -1
  64. package/node_modules/aws-sdk/apis/codebuild-2016-10-06.min.json +80 -38
  65. package/node_modules/aws-sdk/apis/codecommit-2015-04-13.min.json +7 -1
  66. package/node_modules/aws-sdk/apis/codedeploy-2014-10-06.min.json +7 -1
  67. package/node_modules/aws-sdk/apis/codeguru-security-2018-05-10.min.json +6 -0
  68. package/node_modules/aws-sdk/apis/codepipeline-2015-07-09.min.json +446 -95
  69. package/node_modules/aws-sdk/apis/codepipeline-2015-07-09.paginators.json +6 -0
  70. package/node_modules/aws-sdk/apis/cognito-identity-2014-06-30.min.json +23 -5
  71. package/node_modules/aws-sdk/apis/cognito-idp-2016-04-18.min.json +292 -187
  72. package/node_modules/aws-sdk/apis/compute-optimizer-2019-11-01.min.json +447 -134
  73. package/node_modules/aws-sdk/apis/config-2014-11-12.min.json +7 -1
  74. package/node_modules/aws-sdk/apis/connect-2017-08-08.min.json +1537 -546
  75. package/node_modules/aws-sdk/apis/connect-2017-08-08.paginators.json +42 -0
  76. package/node_modules/aws-sdk/apis/connect-contact-lens-2020-08-21.min.json +18 -1
  77. package/node_modules/aws-sdk/apis/connectcases-2022-10-03.min.json +205 -63
  78. package/node_modules/aws-sdk/apis/controlcatalog-2018-05-10.min.json +134 -40
  79. package/node_modules/aws-sdk/apis/controlcatalog-2018-05-10.paginators.json +6 -0
  80. package/node_modules/aws-sdk/apis/controlcatalog-2018-05-10.waiters2.json +5 -0
  81. package/node_modules/aws-sdk/apis/controltower-2018-05-10.min.json +150 -5
  82. package/node_modules/aws-sdk/apis/controltower-2018-05-10.paginators.json +12 -0
  83. package/node_modules/aws-sdk/apis/cost-optimization-hub-2022-07-26.min.json +320 -262
  84. package/node_modules/aws-sdk/apis/cost-optimization-hub-2022-07-26.waiters2.json +5 -0
  85. package/node_modules/aws-sdk/apis/cur-2017-01-06.min.json +7 -1
  86. package/node_modules/aws-sdk/apis/customer-profiles-2020-08-15.min.json +52 -25
  87. package/node_modules/aws-sdk/apis/datasync-2018-11-09.min.json +3 -0
  88. package/node_modules/aws-sdk/apis/datazone-2018-05-10.min.json +2116 -480
  89. package/node_modules/aws-sdk/apis/datazone-2018-05-10.paginators.json +24 -0
  90. package/node_modules/aws-sdk/apis/devicefarm-2015-06-23.min.json +7 -1
  91. package/node_modules/aws-sdk/apis/directconnect-2012-10-25.min.json +7 -1
  92. package/node_modules/aws-sdk/apis/discovery-2015-11-01.min.json +3 -0
  93. package/node_modules/aws-sdk/apis/dms-2016-01-01.min.json +7 -1
  94. package/node_modules/aws-sdk/apis/docdb-2014-10-31.min.json +7 -1
  95. package/node_modules/aws-sdk/apis/ds-2015-04-16.min.json +7 -1
  96. package/node_modules/aws-sdk/apis/dynamodb-2011-12-05.min.json +7 -1
  97. package/node_modules/aws-sdk/apis/dynamodb-2012-08-10.min.json +256 -181
  98. package/node_modules/aws-sdk/apis/ec2-2016-11-15.min.json +1675 -1320
  99. package/node_modules/aws-sdk/apis/ecr-2015-09-21.examples.json +186 -0
  100. package/node_modules/aws-sdk/apis/ecr-2015-09-21.min.json +222 -21
  101. package/node_modules/aws-sdk/apis/ecr-2015-09-21.paginators.json +9 -0
  102. package/node_modules/aws-sdk/apis/ecs-2014-11-13.min.json +290 -256
  103. package/node_modules/aws-sdk/apis/eks-2017-11-01.min.json +169 -84
  104. package/node_modules/aws-sdk/apis/elasticache-2015-02-02.min.json +7 -1
  105. package/node_modules/aws-sdk/apis/elasticbeanstalk-2010-12-01.min.json +7 -1
  106. package/node_modules/aws-sdk/apis/elasticfilesystem-2015-02-01.min.json +7 -1
  107. package/node_modules/aws-sdk/apis/elasticloadbalancing-2012-06-01.min.json +7 -1
  108. package/node_modules/aws-sdk/apis/elasticloadbalancingv2-2015-12-01.examples.json +33 -0
  109. package/node_modules/aws-sdk/apis/elasticloadbalancingv2-2015-12-01.min.json +116 -73
  110. package/node_modules/aws-sdk/apis/elasticmapreduce-2009-03-31.min.json +15 -3
  111. package/node_modules/aws-sdk/apis/elastictranscoder-2012-09-25.min.json +7 -1
  112. package/node_modules/aws-sdk/apis/email-2010-12-01.min.json +7 -1
  113. package/node_modules/aws-sdk/apis/emr-serverless-2021-07-13.min.json +172 -14
  114. package/node_modules/aws-sdk/apis/emr-serverless-2021-07-13.paginators.json +6 -0
  115. package/node_modules/aws-sdk/apis/entityresolution-2018-05-10.min.json +162 -94
  116. package/node_modules/aws-sdk/apis/es-2015-01-01.min.json +7 -1
  117. package/node_modules/aws-sdk/apis/eventbridge-2015-10-07.min.json +91 -29
  118. package/node_modules/aws-sdk/apis/firehose-2015-08-04.min.json +361 -167
  119. package/node_modules/aws-sdk/apis/fis-2020-12-01.min.json +19 -5
  120. package/node_modules/aws-sdk/apis/fms-2018-01-01.min.json +63 -59
  121. package/node_modules/aws-sdk/apis/fsx-2018-03-01.min.json +206 -164
  122. package/node_modules/aws-sdk/apis/gamelift-2015-10-01.min.json +7 -1
  123. package/node_modules/aws-sdk/apis/globalaccelerator-2018-08-08.min.json +13 -1
  124. package/node_modules/aws-sdk/apis/glue-2017-03-31.min.json +1227 -583
  125. package/node_modules/aws-sdk/apis/glue-2017-03-31.paginators.json +22 -8
  126. package/node_modules/aws-sdk/apis/grafana-2020-08-18.min.json +317 -15
  127. package/node_modules/aws-sdk/apis/grafana-2020-08-18.paginators.json +12 -0
  128. package/node_modules/aws-sdk/apis/greengrassv2-2020-11-30.min.json +17 -3
  129. package/node_modules/aws-sdk/apis/groundstation-2019-05-23.min.json +7 -1
  130. package/node_modules/aws-sdk/apis/guardduty-2017-11-28.min.json +429 -124
  131. package/node_modules/aws-sdk/apis/iam-2010-05-08.min.json +7 -1
  132. package/node_modules/aws-sdk/apis/imagebuilder-2019-12-02.min.json +3 -0
  133. package/node_modules/aws-sdk/apis/inspector2-2020-06-08.min.json +122 -96
  134. package/node_modules/aws-sdk/apis/iotfleetwise-2021-06-17.min.json +18 -10
  135. package/node_modules/aws-sdk/apis/iotsitewise-2019-12-02.min.json +113 -98
  136. package/node_modules/aws-sdk/apis/iottwinmaker-2021-11-29.min.json +3 -1
  137. package/node_modules/aws-sdk/apis/iotwireless-2020-11-22.min.json +7 -1
  138. package/node_modules/aws-sdk/apis/ivs-2020-07-14.min.json +159 -154
  139. package/node_modules/aws-sdk/apis/ivs-realtime-2020-07-14.min.json +396 -242
  140. package/node_modules/aws-sdk/apis/ivs-realtime-2020-07-14.paginators.json +6 -0
  141. package/node_modules/aws-sdk/apis/ivs-realtime-2020-07-14.waiters2.json +5 -0
  142. package/node_modules/aws-sdk/apis/ivschat-2020-07-14.min.json +144 -139
  143. package/node_modules/aws-sdk/apis/ivschat-2020-07-14.waiters2.json +5 -0
  144. package/node_modules/aws-sdk/apis/kafka-2018-11-14.min.json +36 -6
  145. package/node_modules/aws-sdk/apis/kinesis-2013-12-02.min.json +7 -1
  146. package/node_modules/aws-sdk/apis/kinesis-video-webrtc-storage-2018-05-10.min.json +17 -0
  147. package/node_modules/aws-sdk/apis/kinesisanalyticsv2-2018-05-23.min.json +266 -110
  148. package/node_modules/aws-sdk/apis/kinesisanalyticsv2-2018-05-23.paginators.json +24 -0
  149. package/node_modules/aws-sdk/apis/kms-2014-11-01.examples.json +31 -0
  150. package/node_modules/aws-sdk/apis/kms-2014-11-01.min.json +79 -23
  151. package/node_modules/aws-sdk/apis/lakeformation-2017-03-31.min.json +43 -25
  152. package/node_modules/aws-sdk/apis/launch-wizard-2018-05-10.min.json +159 -0
  153. package/node_modules/aws-sdk/apis/license-manager-linux-subscriptions-2018-05-10.min.json +236 -16
  154. package/node_modules/aws-sdk/apis/license-manager-linux-subscriptions-2018-05-10.paginators.json +6 -0
  155. package/node_modules/aws-sdk/apis/lightsail-2016-11-28.min.json +11 -2
  156. package/node_modules/aws-sdk/apis/location-2020-11-19.min.json +1036 -754
  157. package/node_modules/aws-sdk/apis/location-2020-11-19.paginators.json +6 -0
  158. package/node_modules/aws-sdk/apis/logs-2014-03-28.min.json +7 -1
  159. package/node_modules/aws-sdk/apis/macie2-2020-01-01.min.json +254 -143
  160. package/node_modules/aws-sdk/apis/macie2-2020-01-01.paginators.json +6 -0
  161. package/node_modules/aws-sdk/apis/mailmanager-2023-10-17.min.json +1836 -0
  162. package/node_modules/aws-sdk/apis/mailmanager-2023-10-17.paginators.json +58 -0
  163. package/node_modules/aws-sdk/apis/managedblockchain-2018-09-24.min.json +3 -0
  164. package/node_modules/aws-sdk/apis/mediaconnect-2018-11-14.min.json +106 -94
  165. package/node_modules/aws-sdk/apis/mediaconvert-2017-08-29.min.json +208 -131
  166. package/node_modules/aws-sdk/apis/mediaconvert-2017-08-29.paginators.json +6 -0
  167. package/node_modules/aws-sdk/apis/medialive-2017-10-14.min.json +488 -364
  168. package/node_modules/aws-sdk/apis/mediapackagev2-2022-12-25.examples.json +1271 -0
  169. package/node_modules/aws-sdk/apis/mediapackagev2-2022-12-25.min.json +105 -71
  170. package/node_modules/aws-sdk/apis/medical-imaging-2023-07-19.min.json +80 -37
  171. package/node_modules/aws-sdk/apis/memorydb-2021-01-01.min.json +7 -1
  172. package/node_modules/aws-sdk/apis/metadata.json +24 -12
  173. package/node_modules/aws-sdk/apis/models.lex.v2-2020-08-07.min.json +374 -346
  174. package/node_modules/aws-sdk/apis/monitoring-2010-08-01.min.json +7 -1
  175. package/node_modules/aws-sdk/apis/mq-2017-11-27.min.json +4 -4
  176. package/node_modules/aws-sdk/apis/mwaa-2020-07-01.min.json +178 -158
  177. package/node_modules/aws-sdk/apis/network-firewall-2020-11-12.min.json +7 -1
  178. package/node_modules/aws-sdk/apis/networkmanager-2019-07-05.min.json +320 -176
  179. package/node_modules/aws-sdk/apis/omics-2022-11-28.min.json +36 -22
  180. package/node_modules/aws-sdk/apis/opensearch-2021-01-01.min.json +190 -115
  181. package/node_modules/aws-sdk/apis/opsworks-2013-02-18.min.json +3 -0
  182. package/node_modules/aws-sdk/apis/organizations-2016-11-28.min.json +7 -1
  183. package/node_modules/aws-sdk/apis/osis-2022-01-01.min.json +77 -28
  184. package/node_modules/aws-sdk/apis/outposts-2019-12-03.min.json +11 -2
  185. package/node_modules/aws-sdk/apis/payment-cryptography-2021-09-14.min.json +10 -1
  186. package/node_modules/aws-sdk/apis/payment-cryptography-data-2022-02-03.min.json +544 -383
  187. package/node_modules/aws-sdk/apis/payment-cryptography-data-2022-02-03.waiters2.json +5 -0
  188. package/node_modules/aws-sdk/apis/pca-connector-scep-2018-05-10.min.json +456 -0
  189. package/node_modules/aws-sdk/apis/pca-connector-scep-2018-05-10.paginators.json +16 -0
  190. package/node_modules/aws-sdk/apis/pca-connector-scep-2018-05-10.waiters2.json +5 -0
  191. package/node_modules/aws-sdk/apis/personalize-2018-05-22.min.json +153 -44
  192. package/node_modules/aws-sdk/apis/personalize-runtime-2018-05-22.min.json +9 -1
  193. package/node_modules/aws-sdk/apis/pi-2018-02-27.min.json +28 -18
  194. package/node_modules/aws-sdk/apis/pinpoint-2016-12-01.min.json +403 -378
  195. package/node_modules/aws-sdk/apis/pinpoint-sms-voice-v2-2022-03-31.min.json +527 -99
  196. package/node_modules/aws-sdk/apis/pinpoint-sms-voice-v2-2022-03-31.paginators.json +6 -0
  197. package/node_modules/aws-sdk/apis/pipes-2015-10-07.min.json +632 -555
  198. package/node_modules/aws-sdk/apis/pipes-2015-10-07.waiters2.json +5 -0
  199. package/node_modules/aws-sdk/apis/polly-2016-06-10.min.json +7 -1
  200. package/node_modules/aws-sdk/apis/qapps-2023-11-27.examples.json +583 -0
  201. package/node_modules/aws-sdk/apis/qapps-2023-11-27.min.json +1312 -0
  202. package/node_modules/aws-sdk/apis/{mobile-2017-07-01.paginators.json → qapps-2023-11-27.paginators.json} +6 -4
  203. package/node_modules/aws-sdk/apis/qapps-2023-11-27.waiters2.json +5 -0
  204. package/node_modules/aws-sdk/apis/qbusiness-2023-11-27.examples.json +2 -3
  205. package/node_modules/aws-sdk/apis/qbusiness-2023-11-27.min.json +813 -689
  206. package/node_modules/aws-sdk/apis/qbusiness-2023-11-27.paginators.json +1 -1
  207. package/node_modules/aws-sdk/apis/qbusiness-2023-11-27.waiters2.json +5 -0
  208. package/node_modules/aws-sdk/apis/qconnect-2020-10-19.min.json +335 -108
  209. package/node_modules/aws-sdk/apis/qconnect-2020-10-19.paginators.json +6 -0
  210. package/node_modules/aws-sdk/apis/quicksight-2018-04-01.min.json +2113 -1354
  211. package/node_modules/aws-sdk/apis/rds-2013-01-10.min.json +4 -1
  212. package/node_modules/aws-sdk/apis/rds-2013-02-12.min.json +4 -1
  213. package/node_modules/aws-sdk/apis/rds-2013-09-09.min.json +4 -1
  214. package/node_modules/aws-sdk/apis/rds-2014-09-01.min.json +4 -1
  215. package/node_modules/aws-sdk/apis/rds-2014-10-31.min.json +34 -10
  216. package/node_modules/aws-sdk/apis/redshift-2012-12-01.min.json +7 -1
  217. package/node_modules/aws-sdk/apis/redshift-serverless-2021-04-21.min.json +32 -22
  218. package/node_modules/aws-sdk/apis/rekognition-2016-06-27.min.json +15 -3
  219. package/node_modules/aws-sdk/apis/resiliencehub-2020-04-30.min.json +473 -144
  220. package/node_modules/aws-sdk/apis/resiliencehub-2020-04-30.paginators.json +12 -0
  221. package/node_modules/aws-sdk/apis/rolesanywhere-2018-05-10.min.json +16 -1
  222. package/node_modules/aws-sdk/apis/route53-2013-04-01.min.json +7 -1
  223. package/node_modules/aws-sdk/apis/route53domains-2014-05-15.min.json +7 -1
  224. package/node_modules/aws-sdk/apis/route53profiles-2018-05-10.min.json +3 -0
  225. package/node_modules/aws-sdk/apis/route53resolver-2018-04-01.min.json +62 -53
  226. package/node_modules/aws-sdk/apis/s3-2006-03-01.examples.json +76 -76
  227. package/node_modules/aws-sdk/apis/s3-2006-03-01.min.json +46 -5
  228. package/node_modules/aws-sdk/apis/sagemaker-2017-07-24.min.json +1993 -1207
  229. package/node_modules/aws-sdk/apis/sagemaker-2017-07-24.paginators.json +12 -0
  230. package/node_modules/aws-sdk/apis/secretsmanager-2017-10-17.min.json +11 -1
  231. package/node_modules/aws-sdk/apis/securityhub-2018-10-26.min.json +7 -1
  232. package/node_modules/aws-sdk/apis/securitylake-2018-05-10.min.json +7 -1
  233. package/node_modules/aws-sdk/apis/sesv2-2019-09-27.min.json +148 -136
  234. package/node_modules/aws-sdk/apis/shield-2016-06-02.min.json +7 -1
  235. package/node_modules/aws-sdk/apis/signer-2017-08-25.min.json +3 -0
  236. package/node_modules/aws-sdk/apis/snowball-2016-06-30.min.json +7 -1
  237. package/node_modules/aws-sdk/apis/sns-2010-03-31.min.json +7 -1
  238. package/node_modules/aws-sdk/apis/sqs-2012-11-05.min.json +24 -14
  239. package/node_modules/aws-sdk/apis/ssm-2014-11-06.min.json +14 -3
  240. package/node_modules/aws-sdk/apis/ssm-quicksetup-2018-05-10.examples.json +5 -0
  241. package/node_modules/aws-sdk/apis/ssm-quicksetup-2018-05-10.min.json +454 -0
  242. package/node_modules/aws-sdk/apis/ssm-quicksetup-2018-05-10.paginators.json +10 -0
  243. package/node_modules/aws-sdk/apis/ssm-sap-2018-05-10.min.json +95 -0
  244. package/node_modules/aws-sdk/apis/ssm-sap-2018-05-10.paginators.json +6 -0
  245. package/node_modules/aws-sdk/apis/sso-oidc-2019-06-10.examples.json +9 -0
  246. package/node_modules/aws-sdk/apis/sso-oidc-2019-06-10.min.json +32 -9
  247. package/node_modules/aws-sdk/apis/states-2016-11-23.min.json +167 -129
  248. package/node_modules/aws-sdk/apis/storagegateway-2013-06-30.min.json +30 -14
  249. package/node_modules/aws-sdk/apis/support-2013-04-15.min.json +4 -1
  250. package/node_modules/aws-sdk/apis/swf-2012-01-25.min.json +104 -68
  251. package/node_modules/aws-sdk/apis/taxsettings-2018-05-10.examples.json +5 -0
  252. package/node_modules/aws-sdk/apis/taxsettings-2018-05-10.min.json +661 -0
  253. package/node_modules/aws-sdk/apis/taxsettings-2018-05-10.paginators.json +10 -0
  254. package/node_modules/aws-sdk/apis/timestream-query-2018-11-01.min.json +75 -24
  255. package/node_modules/aws-sdk/apis/tnb-2008-10-21.min.json +90 -23
  256. package/node_modules/aws-sdk/apis/transcribe-2017-10-26.min.json +101 -76
  257. package/node_modules/aws-sdk/apis/transfer-2018-11-05.min.json +19 -8
  258. package/node_modules/aws-sdk/apis/trustedadvisor-2022-09-15.min.json +107 -46
  259. package/node_modules/aws-sdk/apis/verifiedpermissions-2021-12-01.min.json +345 -83
  260. package/node_modules/aws-sdk/apis/waf-2015-08-24.min.json +7 -1
  261. package/node_modules/aws-sdk/apis/waf-regional-2016-11-28.min.json +7 -1
  262. package/node_modules/aws-sdk/apis/wafv2-2019-07-29.min.json +46 -33
  263. package/node_modules/aws-sdk/apis/workspaces-2015-04-08.min.json +513 -76
  264. package/node_modules/aws-sdk/apis/workspaces-thin-client-2023-08-22.min.json +33 -13
  265. package/node_modules/aws-sdk/apis/workspaces-web-2020-07-08.min.json +8 -1
  266. package/node_modules/aws-sdk/clients/accessanalyzer.d.ts +162 -3
  267. package/node_modules/aws-sdk/clients/account.d.ts +84 -9
  268. package/node_modules/aws-sdk/clients/acm.d.ts +8 -8
  269. package/node_modules/aws-sdk/clients/acmpca.d.ts +28 -28
  270. package/node_modules/aws-sdk/clients/all.d.ts +7 -4
  271. package/node_modules/aws-sdk/clients/all.js +8 -5
  272. package/node_modules/aws-sdk/clients/amplify.d.ts +35 -15
  273. package/node_modules/aws-sdk/clients/appintegrations.d.ts +122 -13
  274. package/node_modules/aws-sdk/clients/applicationautoscaling.d.ts +43 -43
  275. package/node_modules/aws-sdk/clients/applicationsignals.d.ts +964 -0
  276. package/node_modules/aws-sdk/clients/applicationsignals.js +18 -0
  277. package/node_modules/aws-sdk/clients/appstream.d.ts +208 -9
  278. package/node_modules/aws-sdk/clients/apptest.d.ts +2019 -0
  279. package/node_modules/aws-sdk/clients/apptest.js +19 -0
  280. package/node_modules/aws-sdk/clients/arczonalshift.d.ts +66 -29
  281. package/node_modules/aws-sdk/clients/artifact.d.ts +68 -64
  282. package/node_modules/aws-sdk/clients/artifact.js +1 -0
  283. package/node_modules/aws-sdk/clients/athena.d.ts +5 -5
  284. package/node_modules/aws-sdk/clients/auditmanager.d.ts +45 -33
  285. package/node_modules/aws-sdk/clients/autoscaling.d.ts +71 -70
  286. package/node_modules/aws-sdk/clients/b2bi.d.ts +8 -8
  287. package/node_modules/aws-sdk/clients/batch.d.ts +54 -1
  288. package/node_modules/aws-sdk/clients/bedrock.d.ts +289 -26
  289. package/node_modules/aws-sdk/clients/bedrockagent.d.ts +2327 -211
  290. package/node_modules/aws-sdk/clients/bedrockagentruntime.d.ts +707 -29
  291. package/node_modules/aws-sdk/clients/bedrockruntime.d.ts +855 -7
  292. package/node_modules/aws-sdk/clients/budgets.d.ts +84 -1
  293. package/node_modules/aws-sdk/clients/chatbot.d.ts +100 -0
  294. package/node_modules/aws-sdk/clients/chimesdkmediapipelines.d.ts +19 -15
  295. package/node_modules/aws-sdk/clients/chimesdkvoice.d.ts +9 -9
  296. package/node_modules/aws-sdk/clients/cleanrooms.d.ts +1079 -16
  297. package/node_modules/aws-sdk/clients/cleanroomsml.d.ts +284 -257
  298. package/node_modules/aws-sdk/clients/cleanroomsml.js +1 -0
  299. package/node_modules/aws-sdk/clients/cloudformation.d.ts +11 -2
  300. package/node_modules/aws-sdk/clients/cloudfront.d.ts +7 -7
  301. package/node_modules/aws-sdk/clients/cloudhsmv2.d.ts +134 -34
  302. package/node_modules/aws-sdk/clients/cloudtrail.d.ts +29 -12
  303. package/node_modules/aws-sdk/clients/codeartifact.d.ts +28 -28
  304. package/node_modules/aws-sdk/clients/codebuild.d.ts +79 -32
  305. package/node_modules/aws-sdk/clients/codegurusecurity.d.ts +60 -55
  306. package/node_modules/aws-sdk/clients/codepipeline.d.ts +485 -5
  307. package/node_modules/aws-sdk/clients/cognitoidentityserviceprovider.d.ts +92 -55
  308. package/node_modules/aws-sdk/clients/computeoptimizer.d.ts +451 -49
  309. package/node_modules/aws-sdk/clients/connect.d.ts +1213 -69
  310. package/node_modules/aws-sdk/clients/connectcases.d.ts +124 -1
  311. package/node_modules/aws-sdk/clients/connectcontactlens.d.ts +24 -3
  312. package/node_modules/aws-sdk/clients/controlcatalog.d.ts +116 -24
  313. package/node_modules/aws-sdk/clients/controlcatalog.js +1 -0
  314. package/node_modules/aws-sdk/clients/controltower.d.ts +244 -44
  315. package/node_modules/aws-sdk/clients/costoptimizationhub.d.ts +398 -330
  316. package/node_modules/aws-sdk/clients/costoptimizationhub.js +1 -0
  317. package/node_modules/aws-sdk/clients/customerprofiles.d.ts +35 -5
  318. package/node_modules/aws-sdk/clients/datasync.d.ts +7 -7
  319. package/node_modules/aws-sdk/clients/datazone.d.ts +1917 -100
  320. package/node_modules/aws-sdk/clients/directconnect.d.ts +40 -25
  321. package/node_modules/aws-sdk/clients/dynamodb.d.ts +116 -47
  322. package/node_modules/aws-sdk/clients/ec2.d.ts +729 -308
  323. package/node_modules/aws-sdk/clients/ecr.d.ts +296 -8
  324. package/node_modules/aws-sdk/clients/ecs.d.ts +47 -5
  325. package/node_modules/aws-sdk/clients/eks.d.ts +127 -22
  326. package/node_modules/aws-sdk/clients/elasticache.d.ts +198 -198
  327. package/node_modules/aws-sdk/clients/elbv2.d.ts +59 -13
  328. package/node_modules/aws-sdk/clients/emr.d.ts +12 -4
  329. package/node_modules/aws-sdk/clients/emrserverless.d.ts +191 -0
  330. package/node_modules/aws-sdk/clients/entityresolution.d.ts +105 -22
  331. package/node_modules/aws-sdk/clients/eventbridge.d.ts +111 -20
  332. package/node_modules/aws-sdk/clients/firehose.d.ts +214 -10
  333. package/node_modules/aws-sdk/clients/fis.d.ts +21 -0
  334. package/node_modules/aws-sdk/clients/fms.d.ts +12 -7
  335. package/node_modules/aws-sdk/clients/fsx.d.ts +84 -36
  336. package/node_modules/aws-sdk/clients/globalaccelerator.d.ts +8 -0
  337. package/node_modules/aws-sdk/clients/glue.d.ts +981 -24
  338. package/node_modules/aws-sdk/clients/grafana.d.ts +297 -11
  339. package/node_modules/aws-sdk/clients/greengrassv2.d.ts +15 -5
  340. package/node_modules/aws-sdk/clients/guardduty.d.ts +277 -5
  341. package/node_modules/aws-sdk/clients/inspector2.d.ts +49 -3
  342. package/node_modules/aws-sdk/clients/iotfleetwise.d.ts +11 -1
  343. package/node_modules/aws-sdk/clients/iotsitewise.d.ts +37 -25
  344. package/node_modules/aws-sdk/clients/iottwinmaker.d.ts +1 -1
  345. package/node_modules/aws-sdk/clients/iotwireless.d.ts +2 -2
  346. package/node_modules/aws-sdk/clients/ivs.d.ts +229 -229
  347. package/node_modules/aws-sdk/clients/ivschat.d.ts +166 -166
  348. package/node_modules/aws-sdk/clients/ivschat.js +1 -0
  349. package/node_modules/aws-sdk/clients/ivsrealtime.d.ts +433 -235
  350. package/node_modules/aws-sdk/clients/ivsrealtime.js +1 -0
  351. package/node_modules/aws-sdk/clients/kafka.d.ts +35 -0
  352. package/node_modules/aws-sdk/clients/kinesisanalyticsv2.d.ts +147 -3
  353. package/node_modules/aws-sdk/clients/kinesisvideowebrtcstorage.d.ts +21 -2
  354. package/node_modules/aws-sdk/clients/kms.d.ts +78 -12
  355. package/node_modules/aws-sdk/clients/lakeformation.d.ts +17 -0
  356. package/node_modules/aws-sdk/clients/launchwizard.d.ts +181 -8
  357. package/node_modules/aws-sdk/clients/lexmodelsv2.d.ts +45 -5
  358. package/node_modules/aws-sdk/clients/licensemanagerlinuxsubscriptions.d.ts +249 -10
  359. package/node_modules/aws-sdk/clients/lightsail.d.ts +29 -25
  360. package/node_modules/aws-sdk/clients/location.d.ts +981 -677
  361. package/node_modules/aws-sdk/clients/macie2.d.ts +149 -44
  362. package/node_modules/aws-sdk/clients/mailmanager.d.ts +2320 -0
  363. package/node_modules/aws-sdk/clients/mailmanager.js +18 -0
  364. package/node_modules/aws-sdk/clients/managedblockchain.d.ts +4 -4
  365. package/node_modules/aws-sdk/clients/mediaconnect.d.ts +13 -0
  366. package/node_modules/aws-sdk/clients/mediaconvert.d.ts +77 -6
  367. package/node_modules/aws-sdk/clients/medialive.d.ts +114 -4
  368. package/node_modules/aws-sdk/clients/mediapackagev2.d.ts +58 -5
  369. package/node_modules/aws-sdk/clients/medicalimaging.d.ts +45 -2
  370. package/node_modules/aws-sdk/clients/memorydb.d.ts +9 -9
  371. package/node_modules/aws-sdk/clients/mq.d.ts +15 -15
  372. package/node_modules/aws-sdk/clients/mwaa.d.ts +215 -189
  373. package/node_modules/aws-sdk/clients/networkfirewall.d.ts +7 -7
  374. package/node_modules/aws-sdk/clients/networkmanager.d.ts +237 -11
  375. package/node_modules/aws-sdk/clients/omics.d.ts +89 -53
  376. package/node_modules/aws-sdk/clients/opensearch.d.ts +120 -3
  377. package/node_modules/aws-sdk/clients/opsworks.d.ts +117 -117
  378. package/node_modules/aws-sdk/clients/organizations.d.ts +2 -2
  379. package/node_modules/aws-sdk/clients/osis.d.ts +89 -5
  380. package/node_modules/aws-sdk/clients/outposts.d.ts +5 -0
  381. package/node_modules/aws-sdk/clients/paymentcryptography.d.ts +3 -3
  382. package/node_modules/aws-sdk/clients/paymentcryptographydata.d.ts +358 -311
  383. package/node_modules/aws-sdk/clients/paymentcryptographydata.js +1 -0
  384. package/node_modules/aws-sdk/clients/pcaconnectorscep.d.ts +486 -0
  385. package/node_modules/aws-sdk/clients/pcaconnectorscep.js +19 -0
  386. package/node_modules/aws-sdk/clients/personalize.d.ts +160 -1
  387. package/node_modules/aws-sdk/clients/personalizeruntime.d.ts +6 -0
  388. package/node_modules/aws-sdk/clients/pi.d.ts +18 -11
  389. package/node_modules/aws-sdk/clients/pinpoint.d.ts +27 -0
  390. package/node_modules/aws-sdk/clients/pinpointsmsvoicev2.d.ts +567 -61
  391. package/node_modules/aws-sdk/clients/pipes.d.ts +455 -348
  392. package/node_modules/aws-sdk/clients/pipes.js +1 -0
  393. package/node_modules/aws-sdk/clients/polly.d.ts +9 -9
  394. package/node_modules/aws-sdk/clients/qapps.d.ts +1442 -0
  395. package/node_modules/aws-sdk/clients/qapps.js +19 -0
  396. package/node_modules/aws-sdk/clients/qbusiness.d.ts +855 -699
  397. package/node_modules/aws-sdk/clients/qbusiness.js +1 -0
  398. package/node_modules/aws-sdk/clients/qconnect.d.ts +219 -1
  399. package/node_modules/aws-sdk/clients/quicksight.d.ts +901 -14
  400. package/node_modules/aws-sdk/clients/rds.d.ts +90 -30
  401. package/node_modules/aws-sdk/clients/redshift.d.ts +16 -16
  402. package/node_modules/aws-sdk/clients/redshiftserverless.d.ts +37 -10
  403. package/node_modules/aws-sdk/clients/rekognition.d.ts +11 -3
  404. package/node_modules/aws-sdk/clients/resiliencehub.d.ts +385 -29
  405. package/node_modules/aws-sdk/clients/rolesanywhere.d.ts +12 -0
  406. package/node_modules/aws-sdk/clients/route53profiles.d.ts +4 -4
  407. package/node_modules/aws-sdk/clients/route53resolver.d.ts +18 -5
  408. package/node_modules/aws-sdk/clients/s3.d.ts +34 -10
  409. package/node_modules/aws-sdk/clients/sagemaker.d.ts +1123 -67
  410. package/node_modules/aws-sdk/clients/secretsmanager.d.ts +23 -18
  411. package/node_modules/aws-sdk/clients/securityhub.d.ts +71 -71
  412. package/node_modules/aws-sdk/clients/securitylake.d.ts +3 -3
  413. package/node_modules/aws-sdk/clients/sesv2.d.ts +28 -10
  414. package/node_modules/aws-sdk/clients/signer.d.ts +3 -3
  415. package/node_modules/aws-sdk/clients/sns.d.ts +7 -7
  416. package/node_modules/aws-sdk/clients/sqs.d.ts +24 -19
  417. package/node_modules/aws-sdk/clients/ssm.d.ts +16 -16
  418. package/node_modules/aws-sdk/clients/ssmquicksetup.d.ts +495 -0
  419. package/node_modules/aws-sdk/clients/ssmquicksetup.js +18 -0
  420. package/node_modules/aws-sdk/clients/ssmsap.d.ts +121 -1
  421. package/node_modules/aws-sdk/clients/ssooidc.d.ts +32 -4
  422. package/node_modules/aws-sdk/clients/stepfunctions.d.ts +67 -9
  423. package/node_modules/aws-sdk/clients/storagegateway.d.ts +37 -22
  424. package/node_modules/aws-sdk/clients/support.d.ts +1 -1
  425. package/node_modules/aws-sdk/clients/swf.d.ts +38 -2
  426. package/node_modules/aws-sdk/clients/taxsettings.d.ts +809 -0
  427. package/node_modules/aws-sdk/clients/taxsettings.js +18 -0
  428. package/node_modules/aws-sdk/clients/timestreamquery.d.ts +54 -0
  429. package/node_modules/aws-sdk/clients/tnb.d.ts +95 -18
  430. package/node_modules/aws-sdk/clients/transcribeservice.d.ts +32 -0
  431. package/node_modules/aws-sdk/clients/transfer.d.ts +5 -5
  432. package/node_modules/aws-sdk/clients/trustedadvisor.d.ts +66 -2
  433. package/node_modules/aws-sdk/clients/verifiedpermissions.d.ts +300 -14
  434. package/node_modules/aws-sdk/clients/vpclattice.d.ts +81 -81
  435. package/node_modules/aws-sdk/clients/wafv2.d.ts +35 -5
  436. package/node_modules/aws-sdk/clients/workspaces.d.ts +603 -11
  437. package/node_modules/aws-sdk/clients/workspacesthinclient.d.ts +15 -0
  438. package/node_modules/aws-sdk/clients/workspacesweb.d.ts +21 -1
  439. package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +9 -5
  440. package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +2357 -2099
  441. package/node_modules/aws-sdk/dist/aws-sdk.js +7454 -4038
  442. package/node_modules/aws-sdk/dist/aws-sdk.min.js +108 -106
  443. package/node_modules/aws-sdk/lib/config_service_placeholders.d.ts +14 -8
  444. package/node_modules/aws-sdk/lib/core.js +1 -1
  445. package/node_modules/aws-sdk/lib/credentials/cognito_identity_credentials.js +9 -0
  446. package/node_modules/aws-sdk/lib/credentials/sso_credentials.js +1 -1
  447. package/node_modules/aws-sdk/lib/credentials/token_file_web_identity_credentials.d.ts +2 -2
  448. package/node_modules/aws-sdk/lib/dynamodb/document_client.d.ts +86 -17
  449. package/node_modules/aws-sdk/lib/metadata_service.d.ts +4 -0
  450. package/node_modules/aws-sdk/lib/metadata_service.js +1 -2
  451. package/node_modules/aws-sdk/lib/protocol/rest_json.js +2 -1
  452. package/node_modules/aws-sdk/lib/query/query_param_serializer.js +3 -1
  453. package/node_modules/aws-sdk/lib/region_config.js +2 -1
  454. package/node_modules/aws-sdk/lib/services/s3.js +56 -7
  455. package/node_modules/aws-sdk/lib/shared-ini/ini-loader.d.ts +24 -1
  456. package/node_modules/aws-sdk/lib/shared-ini/ini-loader.js +0 -6
  457. package/node_modules/aws-sdk/package.json +1 -1
  458. package/node_modules/aws-sdk/scripts/region-checker/allowlist.js +11 -10
  459. package/node_modules/xml2js/node_modules/sax/LICENSE +2 -2
  460. package/node_modules/xml2js/node_modules/sax/README.md +3 -0
  461. package/node_modules/xml2js/node_modules/sax/lib/sax.js +33 -10
  462. package/node_modules/xml2js/node_modules/sax/package.json +1 -1
  463. package/package.json +17 -11
  464. package/node_modules/aws-sdk/apis/alexaforbusiness-2017-11-09.min.json +0 -2905
  465. package/node_modules/aws-sdk/apis/alexaforbusiness-2017-11-09.paginators.json +0 -94
  466. package/node_modules/aws-sdk/apis/backupstorage-2018-04-10.min.json +0 -522
  467. package/node_modules/aws-sdk/apis/backupstorage-2018-04-10.paginators.json +0 -14
  468. package/node_modules/aws-sdk/apis/honeycode-2020-03-01.min.json +0 -962
  469. package/node_modules/aws-sdk/apis/honeycode-2020-03-01.paginators.json +0 -27
  470. package/node_modules/aws-sdk/apis/mobile-2017-07-01.min.json +0 -341
  471. package/node_modules/aws-sdk/clients/alexaforbusiness.d.ts +0 -3862
  472. package/node_modules/aws-sdk/clients/alexaforbusiness.js +0 -18
  473. package/node_modules/aws-sdk/clients/backupstorage.d.ts +0 -469
  474. package/node_modules/aws-sdk/clients/backupstorage.js +0 -18
  475. package/node_modules/aws-sdk/clients/honeycode.d.ts +0 -910
  476. package/node_modules/aws-sdk/clients/honeycode.js +0 -18
  477. package/node_modules/aws-sdk/clients/mobile.d.ts +0 -333
  478. package/node_modules/aws-sdk/clients/mobile.js +0 -18
  479. /package/node_modules/aws-sdk/apis/{alexaforbusiness-2017-11-09.examples.json → application-signals-2024-04-15.examples.json} +0 -0
  480. /package/node_modules/aws-sdk/apis/{backupstorage-2018-04-10.examples.json → apptest-2022-12-06.examples.json} +0 -0
  481. /package/node_modules/aws-sdk/apis/{honeycode-2020-03-01.examples.json → mailmanager-2023-10-17.examples.json} +0 -0
  482. /package/node_modules/aws-sdk/apis/{mobile-2017-07-01.examples.json → pca-connector-scep-2018-05-10.examples.json} +0 -0
@@ -28,11 +28,11 @@ declare class SecretsManager extends Service {
28
28
  */
29
29
  cancelRotateSecret(callback?: (err: AWSError, data: SecretsManager.Types.CancelRotateSecretResponse) => void): Request<SecretsManager.Types.CancelRotateSecretResponse, AWSError>;
30
30
  /**
31
- * Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret. For secrets that use managed rotation, you need to create the secret through the managing service. For more information, see Secrets Manager secrets managed by other Amazon Web Services services. For information about creating a secret in the console, see Create a secret. To create a secret, you can provide the secret value to be encrypted in either the SecretString parameter or the SecretBinary parameter, but not both. If you include SecretString or SecretBinary then Secrets Manager creates an initial secret version and automatically attaches the staging label AWSCURRENT to it. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the JSON you store in the SecretString matches the JSON structure of a database secret. If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS key. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:CreateSecret. If you include tags in the secret, you also need secretsmanager:TagResource. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. To encrypt the secret with a KMS key other than aws/secretsmanager, you need kms:GenerateDataKey and kms:Decrypt permission to the key.
31
+ * Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret. For secrets that use managed rotation, you need to create the secret through the managing service. For more information, see Secrets Manager secrets managed by other Amazon Web Services services. For information about creating a secret in the console, see Create a secret. To create a secret, you can provide the secret value to be encrypted in either the SecretString parameter or the SecretBinary parameter, but not both. If you include SecretString or SecretBinary then Secrets Manager creates an initial secret version and automatically attaches the staging label AWSCURRENT to it. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the JSON you store in the SecretString matches the JSON structure of a database secret. If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS key. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:CreateSecret. If you include tags in the secret, you also need secretsmanager:TagResource. To add replica Regions, you must also have secretsmanager:ReplicateSecretToRegions. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. To encrypt the secret with a KMS key other than aws/secretsmanager, you need kms:GenerateDataKey and kms:Decrypt permission to the key. When you enter commands in a command shell, there is a risk of the command history being accessed or utilities having access to your command parameters. This is a concern if the command includes the value of a secret. Learn how to Mitigate the risks of using command-line tools to store Secrets Manager secrets.
32
32
  */
33
33
  createSecret(params: SecretsManager.Types.CreateSecretRequest, callback?: (err: AWSError, data: SecretsManager.Types.CreateSecretResponse) => void): Request<SecretsManager.Types.CreateSecretResponse, AWSError>;
34
34
  /**
35
- * Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret. For secrets that use managed rotation, you need to create the secret through the managing service. For more information, see Secrets Manager secrets managed by other Amazon Web Services services. For information about creating a secret in the console, see Create a secret. To create a secret, you can provide the secret value to be encrypted in either the SecretString parameter or the SecretBinary parameter, but not both. If you include SecretString or SecretBinary then Secrets Manager creates an initial secret version and automatically attaches the staging label AWSCURRENT to it. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the JSON you store in the SecretString matches the JSON structure of a database secret. If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS key. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:CreateSecret. If you include tags in the secret, you also need secretsmanager:TagResource. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. To encrypt the secret with a KMS key other than aws/secretsmanager, you need kms:GenerateDataKey and kms:Decrypt permission to the key.
35
+ * Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret. For secrets that use managed rotation, you need to create the secret through the managing service. For more information, see Secrets Manager secrets managed by other Amazon Web Services services. For information about creating a secret in the console, see Create a secret. To create a secret, you can provide the secret value to be encrypted in either the SecretString parameter or the SecretBinary parameter, but not both. If you include SecretString or SecretBinary then Secrets Manager creates an initial secret version and automatically attaches the staging label AWSCURRENT to it. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the JSON you store in the SecretString matches the JSON structure of a database secret. If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS key. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:CreateSecret. If you include tags in the secret, you also need secretsmanager:TagResource. To add replica Regions, you must also have secretsmanager:ReplicateSecretToRegions. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. To encrypt the secret with a KMS key other than aws/secretsmanager, you need kms:GenerateDataKey and kms:Decrypt permission to the key. When you enter commands in a command shell, there is a risk of the command history being accessed or utilities having access to your command parameters. This is a concern if the command includes the value of a secret. Learn how to Mitigate the risks of using command-line tools to store Secrets Manager secrets.
36
36
  */
37
37
  createSecret(callback?: (err: AWSError, data: SecretsManager.Types.CreateSecretResponse) => void): Request<SecretsManager.Types.CreateSecretResponse, AWSError>;
38
38
  /**
@@ -108,11 +108,11 @@ declare class SecretsManager extends Service {
108
108
  */
109
109
  putResourcePolicy(callback?: (err: AWSError, data: SecretsManager.Types.PutResourcePolicyResponse) => void): Request<SecretsManager.Types.PutResourcePolicyResponse, AWSError>;
110
110
  /**
111
- * Creates a new version with a new encrypted secret value and attaches it to the secret. The version can contain a new SecretString value or a new SecretBinary value. We recommend you avoid calling PutSecretValue at a sustained rate of more than once every 10 minutes. When you update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you call PutSecretValue more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. You can specify the staging labels to attach to the new version in VersionStages. If you don't include VersionStages, then Secrets Manager automatically moves the staging label AWSCURRENT to this version. If this operation creates the first version for the secret, then Secrets Manager automatically attaches the staging label AWSCURRENT to it. If this operation moves the staging label AWSCURRENT from another version to this version, then Secrets Manager also automatically moves the staging label AWSPREVIOUS to the version that AWSCURRENT was removed from. This operation is idempotent. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, and you specify the same secret data, the operation succeeds but does nothing. However, if the secret data is different, then the operation fails because you can't modify an existing version; you can only create new ones. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:PutSecretValue. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager.
111
+ * Creates a new version with a new encrypted secret value and attaches it to the secret. The version can contain a new SecretString value or a new SecretBinary value. We recommend you avoid calling PutSecretValue at a sustained rate of more than once every 10 minutes. When you update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you call PutSecretValue more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. You can specify the staging labels to attach to the new version in VersionStages. If you don't include VersionStages, then Secrets Manager automatically moves the staging label AWSCURRENT to this version. If this operation creates the first version for the secret, then Secrets Manager automatically attaches the staging label AWSCURRENT to it. If this operation moves the staging label AWSCURRENT from another version to this version, then Secrets Manager also automatically moves the staging label AWSPREVIOUS to the version that AWSCURRENT was removed from. This operation is idempotent. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, and you specify the same secret data, the operation succeeds but does nothing. However, if the secret data is different, then the operation fails because you can't modify an existing version; you can only create new ones. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary, SecretString, or RotationToken because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:PutSecretValue. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. When you enter commands in a command shell, there is a risk of the command history being accessed or utilities having access to your command parameters. This is a concern if the command includes the value of a secret. Learn how to Mitigate the risks of using command-line tools to store Secrets Manager secrets.
112
112
  */
113
113
  putSecretValue(params: SecretsManager.Types.PutSecretValueRequest, callback?: (err: AWSError, data: SecretsManager.Types.PutSecretValueResponse) => void): Request<SecretsManager.Types.PutSecretValueResponse, AWSError>;
114
114
  /**
115
- * Creates a new version with a new encrypted secret value and attaches it to the secret. The version can contain a new SecretString value or a new SecretBinary value. We recommend you avoid calling PutSecretValue at a sustained rate of more than once every 10 minutes. When you update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you call PutSecretValue more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. You can specify the staging labels to attach to the new version in VersionStages. If you don't include VersionStages, then Secrets Manager automatically moves the staging label AWSCURRENT to this version. If this operation creates the first version for the secret, then Secrets Manager automatically attaches the staging label AWSCURRENT to it. If this operation moves the staging label AWSCURRENT from another version to this version, then Secrets Manager also automatically moves the staging label AWSPREVIOUS to the version that AWSCURRENT was removed from. This operation is idempotent. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, and you specify the same secret data, the operation succeeds but does nothing. However, if the secret data is different, then the operation fails because you can't modify an existing version; you can only create new ones. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:PutSecretValue. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager.
115
+ * Creates a new version with a new encrypted secret value and attaches it to the secret. The version can contain a new SecretString value or a new SecretBinary value. We recommend you avoid calling PutSecretValue at a sustained rate of more than once every 10 minutes. When you update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you call PutSecretValue more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. You can specify the staging labels to attach to the new version in VersionStages. If you don't include VersionStages, then Secrets Manager automatically moves the staging label AWSCURRENT to this version. If this operation creates the first version for the secret, then Secrets Manager automatically attaches the staging label AWSCURRENT to it. If this operation moves the staging label AWSCURRENT from another version to this version, then Secrets Manager also automatically moves the staging label AWSPREVIOUS to the version that AWSCURRENT was removed from. This operation is idempotent. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, and you specify the same secret data, the operation succeeds but does nothing. However, if the secret data is different, then the operation fails because you can't modify an existing version; you can only create new ones. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary, SecretString, or RotationToken because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:PutSecretValue. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. When you enter commands in a command shell, there is a risk of the command history being accessed or utilities having access to your command parameters. This is a concern if the command includes the value of a secret. Learn how to Mitigate the risks of using command-line tools to store Secrets Manager secrets.
116
116
  */
117
117
  putSecretValue(callback?: (err: AWSError, data: SecretsManager.Types.PutSecretValueResponse) => void): Request<SecretsManager.Types.PutSecretValueResponse, AWSError>;
118
118
  /**
@@ -172,11 +172,11 @@ declare class SecretsManager extends Service {
172
172
  */
173
173
  untagResource(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
174
174
  /**
175
- * Modifies the details of a secret, including metadata and the secret value. To change the secret value, you can also use PutSecretValue. To change the rotation configuration of a secret, use RotateSecret instead. To change a secret so that it is managed by another service, you need to recreate the secret in that service. See Secrets Manager secrets managed by other Amazon Web Services services. We recommend you avoid calling UpdateSecret at a sustained rate of more than once every 10 minutes. When you call UpdateSecret to update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you update the secret value more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. If you include SecretString or SecretBinary to create a new secret version, Secrets Manager automatically moves the staging label AWSCURRENT to the new version. Then it attaches the label AWSPREVIOUS to the version that AWSCURRENT was removed from. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, the operation results in an error. You can't modify an existing version, you can only create a new version. To remove a version, remove all staging labels from it. See UpdateSecretVersionStage. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:UpdateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. If you use a customer managed key, you must also have kms:GenerateDataKey, kms:Encrypt, and kms:Decrypt permissions on the key. If you change the KMS key and you don't have kms:Encrypt permission to the new key, Secrets Manager does not re-ecrypt existing secret versions with the new key. For more information, see Secret encryption and decryption.
175
+ * Modifies the details of a secret, including metadata and the secret value. To change the secret value, you can also use PutSecretValue. To change the rotation configuration of a secret, use RotateSecret instead. To change a secret so that it is managed by another service, you need to recreate the secret in that service. See Secrets Manager secrets managed by other Amazon Web Services services. We recommend you avoid calling UpdateSecret at a sustained rate of more than once every 10 minutes. When you call UpdateSecret to update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you update the secret value more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. If you include SecretString or SecretBinary to create a new secret version, Secrets Manager automatically moves the staging label AWSCURRENT to the new version. Then it attaches the label AWSPREVIOUS to the version that AWSCURRENT was removed from. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, the operation results in an error. You can't modify an existing version, you can only create a new version. To remove a version, remove all staging labels from it. See UpdateSecretVersionStage. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:UpdateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. If you use a customer managed key, you must also have kms:GenerateDataKey, kms:Encrypt, and kms:Decrypt permissions on the key. If you change the KMS key and you don't have kms:Encrypt permission to the new key, Secrets Manager does not re-encrypt existing secret versions with the new key. For more information, see Secret encryption and decryption. When you enter commands in a command shell, there is a risk of the command history being accessed or utilities having access to your command parameters. This is a concern if the command includes the value of a secret. Learn how to Mitigate the risks of using command-line tools to store Secrets Manager secrets.
176
176
  */
177
177
  updateSecret(params: SecretsManager.Types.UpdateSecretRequest, callback?: (err: AWSError, data: SecretsManager.Types.UpdateSecretResponse) => void): Request<SecretsManager.Types.UpdateSecretResponse, AWSError>;
178
178
  /**
179
- * Modifies the details of a secret, including metadata and the secret value. To change the secret value, you can also use PutSecretValue. To change the rotation configuration of a secret, use RotateSecret instead. To change a secret so that it is managed by another service, you need to recreate the secret in that service. See Secrets Manager secrets managed by other Amazon Web Services services. We recommend you avoid calling UpdateSecret at a sustained rate of more than once every 10 minutes. When you call UpdateSecret to update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you update the secret value more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. If you include SecretString or SecretBinary to create a new secret version, Secrets Manager automatically moves the staging label AWSCURRENT to the new version. Then it attaches the label AWSPREVIOUS to the version that AWSCURRENT was removed from. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, the operation results in an error. You can't modify an existing version, you can only create a new version. To remove a version, remove all staging labels from it. See UpdateSecretVersionStage. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:UpdateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. If you use a customer managed key, you must also have kms:GenerateDataKey, kms:Encrypt, and kms:Decrypt permissions on the key. If you change the KMS key and you don't have kms:Encrypt permission to the new key, Secrets Manager does not re-ecrypt existing secret versions with the new key. For more information, see Secret encryption and decryption.
179
+ * Modifies the details of a secret, including metadata and the secret value. To change the secret value, you can also use PutSecretValue. To change the rotation configuration of a secret, use RotateSecret instead. To change a secret so that it is managed by another service, you need to recreate the secret in that service. See Secrets Manager secrets managed by other Amazon Web Services services. We recommend you avoid calling UpdateSecret at a sustained rate of more than once every 10 minutes. When you call UpdateSecret to update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you update the secret value more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. If you include SecretString or SecretBinary to create a new secret version, Secrets Manager automatically moves the staging label AWSCURRENT to the new version. Then it attaches the label AWSPREVIOUS to the version that AWSCURRENT was removed from. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, the operation results in an error. You can't modify an existing version, you can only create a new version. To remove a version, remove all staging labels from it. See UpdateSecretVersionStage. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:UpdateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. If you use a customer managed key, you must also have kms:GenerateDataKey, kms:Encrypt, and kms:Decrypt permissions on the key. If you change the KMS key and you don't have kms:Encrypt permission to the new key, Secrets Manager does not re-encrypt existing secret versions with the new key. For more information, see Secret encryption and decryption. When you enter commands in a command shell, there is a risk of the command history being accessed or utilities having access to your command parameters. This is a concern if the command includes the value of a secret. Learn how to Mitigate the risks of using command-line tools to store Secrets Manager secrets.
180
180
  */
181
181
  updateSecret(callback?: (err: AWSError, data: SecretsManager.Types.UpdateSecretResponse) => void): Request<SecretsManager.Types.UpdateSecretResponse, AWSError>;
182
182
  /**
@@ -286,11 +286,11 @@ declare namespace SecretsManager {
286
286
  */
287
287
  KmsKeyId?: KmsKeyIdType;
288
288
  /**
289
- * The binary data to encrypt and store in the new version of the secret. We recommend that you store your binary data in a file and then pass the contents of the file as a parameter. Either SecretString or SecretBinary must have a value, but not both. This parameter is not available in the Secrets Manager console.
289
+ * The binary data to encrypt and store in the new version of the secret. We recommend that you store your binary data in a file and then pass the contents of the file as a parameter. Either SecretString or SecretBinary must have a value, but not both. This parameter is not available in the Secrets Manager console. Sensitive: This field contains sensitive information, so the service does not include it in CloudTrail log entries. If you create your own log entries, you must also avoid logging the information in this field.
290
290
  */
291
291
  SecretBinary?: SecretBinaryType;
292
292
  /**
293
- * The text data to encrypt and store in this new version of the secret. We recommend you use a JSON structure of key/value pairs for your secret value. Either SecretString or SecretBinary must have a value, but not both. If you create a secret by using the Secrets Manager console then Secrets Manager puts the protected secret text in only the SecretString parameter. The Secrets Manager console stores the information as a JSON structure of key/value pairs that a Lambda rotation function can parse.
293
+ * The text data to encrypt and store in this new version of the secret. We recommend you use a JSON structure of key/value pairs for your secret value. Either SecretString or SecretBinary must have a value, but not both. If you create a secret by using the Secrets Manager console then Secrets Manager puts the protected secret text in only the SecretString parameter. The Secrets Manager console stores the information as a JSON structure of key/value pairs that a Lambda rotation function can parse. Sensitive: This field contains sensitive information, so the service does not include it in CloudTrail log entries. If you create your own log entries, you must also avoid logging the information in this field.
294
294
  */
295
295
  SecretString?: SecretStringType;
296
296
  /**
@@ -395,7 +395,7 @@ declare namespace SecretsManager {
395
395
  */
396
396
  KmsKeyId?: KmsKeyIdType;
397
397
  /**
398
- * Specifies whether automatic rotation is turned on for this secret. To turn on rotation, use RotateSecret. To turn off rotation, use CancelRotateSecret.
398
+ * Specifies whether automatic rotation is turned on for this secret. If the secret has never been configured for rotation, Secrets Manager returns null. To turn on rotation, use RotateSecret. To turn off rotation, use CancelRotateSecret.
399
399
  */
400
400
  RotationEnabled?: RotationEnabledType;
401
401
  /**
@@ -536,7 +536,7 @@ declare namespace SecretsManager {
536
536
  }
537
537
  export interface GetSecretValueRequest {
538
538
  /**
539
- * The ARN or name of the secret to retrieve. For an ARN, we recommend that you specify a complete ARN rather than a partial ARN. See Finding a secret from a partial ARN.
539
+ * The ARN or name of the secret to retrieve. To retrieve a secret from another account, you must use an ARN. For an ARN, we recommend that you specify a complete ARN rather than a partial ARN. See Finding a secret from a partial ARN.
540
540
  */
541
541
  SecretId: SecretIdType;
542
542
  /**
@@ -562,11 +562,11 @@ declare namespace SecretsManager {
562
562
  */
563
563
  VersionId?: SecretVersionIdType;
564
564
  /**
565
- * The decrypted secret value, if the secret value was originally provided as binary data in the form of a byte array. When you retrieve a SecretBinary using the HTTP API, the Python SDK, or the Amazon Web Services CLI, the value is Base64-encoded. Otherwise, it is not encoded. If the secret was created by using the Secrets Manager console, or if the secret value was originally provided as a string, then this field is omitted. The secret value appears in SecretString instead.
565
+ * The decrypted secret value, if the secret value was originally provided as binary data in the form of a byte array. When you retrieve a SecretBinary using the HTTP API, the Python SDK, or the Amazon Web Services CLI, the value is Base64-encoded. Otherwise, it is not encoded. If the secret was created by using the Secrets Manager console, or if the secret value was originally provided as a string, then this field is omitted. The secret value appears in SecretString instead. Sensitive: This field contains sensitive information, so the service does not include it in CloudTrail log entries. If you create your own log entries, you must also avoid logging the information in this field.
566
566
  */
567
567
  SecretBinary?: SecretBinaryType;
568
568
  /**
569
- * The decrypted secret value, if the secret value was originally provided as a string or through the Secrets Manager console. If this secret was created by using the console, then Secrets Manager stores the information as a JSON structure of key/value pairs.
569
+ * The decrypted secret value, if the secret value was originally provided as a string or through the Secrets Manager console. If this secret was created by using the console, then Secrets Manager stores the information as a JSON structure of key/value pairs. Sensitive: This field contains sensitive information, so the service does not include it in CloudTrail log entries. If you create your own log entries, you must also avoid logging the information in this field.
570
570
  */
571
571
  SecretString?: SecretStringType;
572
572
  /**
@@ -694,17 +694,21 @@ declare namespace SecretsManager {
694
694
  */
695
695
  ClientRequestToken?: ClientRequestTokenType;
696
696
  /**
697
- * The binary data to encrypt and store in the new version of the secret. To use this parameter in the command-line tools, we recommend that you store your binary data in a file and then pass the contents of the file as a parameter. You must include SecretBinary or SecretString, but not both. You can't access this value from the Secrets Manager console.
697
+ * The binary data to encrypt and store in the new version of the secret. To use this parameter in the command-line tools, we recommend that you store your binary data in a file and then pass the contents of the file as a parameter. You must include SecretBinary or SecretString, but not both. You can't access this value from the Secrets Manager console. Sensitive: This field contains sensitive information, so the service does not include it in CloudTrail log entries. If you create your own log entries, you must also avoid logging the information in this field.
698
698
  */
699
699
  SecretBinary?: SecretBinaryType;
700
700
  /**
701
- * The text to encrypt and store in the new version of the secret. You must include SecretBinary or SecretString, but not both. We recommend you create the secret string as JSON key/value pairs, as shown in the example.
701
+ * The text to encrypt and store in the new version of the secret. You must include SecretBinary or SecretString, but not both. We recommend you create the secret string as JSON key/value pairs, as shown in the example. Sensitive: This field contains sensitive information, so the service does not include it in CloudTrail log entries. If you create your own log entries, you must also avoid logging the information in this field.
702
702
  */
703
703
  SecretString?: SecretStringType;
704
704
  /**
705
705
  * A list of staging labels to attach to this version of the secret. Secrets Manager uses staging labels to track versions of a secret through the rotation process. If you specify a staging label that's already associated with a different version of the same secret, then Secrets Manager removes the label from the other version and attaches it to this version. If you specify AWSCURRENT, and it is already attached to another version, then Secrets Manager also moves the staging label AWSPREVIOUS to the version that AWSCURRENT was removed from. If you don't include VersionStages, then Secrets Manager automatically moves the staging label AWSCURRENT to this version.
706
706
  */
707
707
  VersionStages?: SecretVersionStagesType;
708
+ /**
709
+ * A unique identifier that indicates the source of the request. For cross-account rotation (when you rotate a secret in one account by using a Lambda rotation function in another account) and the Lambda rotation function assumes an IAM role to call Secrets Manager, Secrets Manager validates the identity with the rotation token. For more information, see How rotation works. Sensitive: This field contains sensitive information, so the service does not include it in CloudTrail log entries. If you create your own log entries, you must also avoid logging the information in this field.
710
+ */
711
+ RotationToken?: RotationTokenType;
708
712
  }
709
713
  export interface PutSecretValueResponse {
710
714
  /**
@@ -874,6 +878,7 @@ declare namespace SecretsManager {
874
878
  */
875
879
  ScheduleExpression?: ScheduleExpressionType;
876
880
  }
881
+ export type RotationTokenType = string;
877
882
  export type ScheduleExpressionType = string;
878
883
  export type SecretARNType = string;
879
884
  export type SecretBinaryType = Buffer|Uint8Array|Blob|string;
@@ -1074,15 +1079,15 @@ declare namespace SecretsManager {
1074
1079
  */
1075
1080
  Description?: DescriptionType;
1076
1081
  /**
1077
- * The ARN, key ID, or alias of the KMS key that Secrets Manager uses to encrypt new secret versions as well as any existing versions with the staging labels AWSCURRENT, AWSPENDING, or AWSPREVIOUS. If you don't have kms:Encrypt permission to the new key, Secrets Manager does not re-ecrypt existing secret versions with the new key. For more information about versions and staging labels, see Concepts: Version. A key alias is always prefixed by alias/, for example alias/aws/secretsmanager. For more information, see About aliases. If you set this to an empty string, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. You can only use the Amazon Web Services managed key aws/secretsmanager if you call this operation using credentials from the same Amazon Web Services account that owns the secret. If the secret is in a different account, then you must use a customer managed key and provide the ARN of that KMS key in this field. The user making the call must have permissions to both the secret and the KMS key in their respective accounts.
1082
+ * The ARN, key ID, or alias of the KMS key that Secrets Manager uses to encrypt new secret versions as well as any existing versions with the staging labels AWSCURRENT, AWSPENDING, or AWSPREVIOUS. If you don't have kms:Encrypt permission to the new key, Secrets Manager does not re-encrypt existing secret versions with the new key. For more information about versions and staging labels, see Concepts: Version. A key alias is always prefixed by alias/, for example alias/aws/secretsmanager. For more information, see About aliases. If you set this to an empty string, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. You can only use the Amazon Web Services managed key aws/secretsmanager if you call this operation using credentials from the same Amazon Web Services account that owns the secret. If the secret is in a different account, then you must use a customer managed key and provide the ARN of that KMS key in this field. The user making the call must have permissions to both the secret and the KMS key in their respective accounts.
1078
1083
  */
1079
1084
  KmsKeyId?: KmsKeyIdType;
1080
1085
  /**
1081
- * The binary data to encrypt and store in the new version of the secret. We recommend that you store your binary data in a file and then pass the contents of the file as a parameter. Either SecretBinary or SecretString must have a value, but not both. You can't access this parameter in the Secrets Manager console.
1086
+ * The binary data to encrypt and store in the new version of the secret. We recommend that you store your binary data in a file and then pass the contents of the file as a parameter. Either SecretBinary or SecretString must have a value, but not both. You can't access this parameter in the Secrets Manager console. Sensitive: This field contains sensitive information, so the service does not include it in CloudTrail log entries. If you create your own log entries, you must also avoid logging the information in this field.
1082
1087
  */
1083
1088
  SecretBinary?: SecretBinaryType;
1084
1089
  /**
1085
- * The text data to encrypt and store in the new version of the secret. We recommend you use a JSON structure of key/value pairs for your secret value. Either SecretBinary or SecretString must have a value, but not both.
1090
+ * The text data to encrypt and store in the new version of the secret. We recommend you use a JSON structure of key/value pairs for your secret value. Either SecretBinary or SecretString must have a value, but not both. Sensitive: This field contains sensitive information, so the service does not include it in CloudTrail log entries. If you create your own log entries, you must also avoid logging the information in this field.
1086
1091
  */
1087
1092
  SecretString?: SecretStringType;
1088
1093
  }
@@ -1130,7 +1135,7 @@ declare namespace SecretsManager {
1130
1135
  }
1131
1136
  export interface ValidateResourcePolicyRequest {
1132
1137
  /**
1133
- * This field is reserved for internal use.
1138
+ * The ARN or name of the secret with the resource-based policy you want to validate.
1134
1139
  */
1135
1140
  SecretId?: SecretIdType;
1136
1141
  /**