All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.amazonaws.services.secretsmanager.AWSSecretsManagerAsync Maven / Gradle / Ivy

/*
 * Copyright 2017-2022 Amazon.com, Inc. or its affiliates. All Rights Reserved.
 * 
 * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with
 * the License. A copy of the License is located at
 * 
 * http://aws.amazon.com/apache2.0
 * 
 * or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
 * CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions
 * and limitations under the License.
 */
package com.amazonaws.services.secretsmanager;

import javax.annotation.Generated;

import com.amazonaws.services.secretsmanager.model.*;

/**
 * Interface for accessing AWS Secrets Manager asynchronously. Each asynchronous method will return a Java Future object
 * representing the asynchronous operation; overloads which accept an {@code AsyncHandler} can be used to receive
 * notification when an asynchronous operation completes.
 * 

* Note: Do not directly implement this interface, new methods are added to it regularly. Extend from * {@link com.amazonaws.services.secretsmanager.AbstractAWSSecretsManagerAsync} instead. *

*

* Amazon Web Services Secrets Manager *

* Amazon Web Services Secrets Manager provides a service to enable you to store, manage, and retrieve, secrets. *

*

* This guide provides descriptions of the Secrets Manager API. For more information about using this service, see the * Amazon Web Services Secrets * Manager User Guide. *

*

* API Version *

*

* This version of the Secrets Manager API Reference documents the Secrets Manager API version 2017-10-17. *

*

* Support and Feedback for Amazon Web Services Secrets Manager *

*

* We welcome your feedback. Send your comments to [email protected], or post your feedback * and questions in the Amazon Web Services Secrets * Manager Discussion Forum. For more information about the Amazon Web Services Discussion Forums, see Forums Help. *

*

* Logging API Requests *

*

* Amazon Web Services Secrets Manager supports Amazon Web Services CloudTrail, a service that records Amazon Web * Services API calls for your Amazon Web Services account and delivers log files to an Amazon S3 bucket. By using * information that's collected by Amazon Web Services CloudTrail, you can determine the requests successfully made to * Secrets Manager, who made the request, when it was made, and so on. For more about Amazon Web Services Secrets * Manager and support for Amazon Web Services CloudTrail, see Logging * Amazon Web Services Secrets Manager Events with Amazon Web Services CloudTrail in the Amazon Web Services * Secrets Manager User Guide. To learn more about CloudTrail, including enabling it and find your log files, see * the Amazon * Web Services CloudTrail User Guide. *

*/ @Generated("com.amazonaws:aws-java-sdk-code-generator") public interface AWSSecretsManagerAsync extends AWSSecretsManager { /** *

* Turns off automatic rotation, and if a rotation is currently in progress, cancels the rotation. *

*

* If you cancel a rotation in progress, it can leave the VersionStage labels in an unexpected state. * You might need to remove the staging label AWSPENDING from the partially created version. You also * need to determine whether to roll back to the previous version of the secret by moving the staging label * AWSCURRENT to the version that has AWSPENDING. To determine which version has a * specific staging label, call ListSecretVersionIds. Then use UpdateSecretVersionStage to change * staging labels. For more information, see How rotation * works. *

*

* To turn on automatic rotation again, call RotateSecret. *

*

* Required permissions: secretsmanager:CancelRotateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param cancelRotateSecretRequest * @return A Java Future containing the result of the CancelRotateSecret operation returned by the service. * @sample AWSSecretsManagerAsync.CancelRotateSecret * @see AWS API Documentation */ java.util.concurrent.Future cancelRotateSecretAsync(CancelRotateSecretRequest cancelRotateSecretRequest); /** *

* Turns off automatic rotation, and if a rotation is currently in progress, cancels the rotation. *

*

* If you cancel a rotation in progress, it can leave the VersionStage labels in an unexpected state. * You might need to remove the staging label AWSPENDING from the partially created version. You also * need to determine whether to roll back to the previous version of the secret by moving the staging label * AWSCURRENT to the version that has AWSPENDING. To determine which version has a * specific staging label, call ListSecretVersionIds. Then use UpdateSecretVersionStage to change * staging labels. For more information, see How rotation * works. *

*

* To turn on automatic rotation again, call RotateSecret. *

*

* Required permissions: secretsmanager:CancelRotateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param cancelRotateSecretRequest * @param asyncHandler * Asynchronous callback handler for events in the lifecycle of the request. Users can provide an * implementation of the callback methods in this interface to receive notification of successful or * unsuccessful completion of the operation. * @return A Java Future containing the result of the CancelRotateSecret operation returned by the service. * @sample AWSSecretsManagerAsyncHandler.CancelRotateSecret * @see AWS API Documentation */ java.util.concurrent.Future cancelRotateSecretAsync(CancelRotateSecretRequest cancelRotateSecretRequest, com.amazonaws.handlers.AsyncHandler asyncHandler); /** *

* Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, * an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret * also includes the connection information to access a database or other service, which Secrets Manager doesn't * encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information * needed to manage the secret. *

*

* For information about creating a secret in the console, see Create a * secret. *

*

* To create a secret, you can provide the secret value to be encrypted in either the SecretString * parameter or the SecretBinary parameter, but not both. If you include SecretString or * SecretBinary then Secrets Manager creates an initial secret version and automatically attaches the * staging label AWSCURRENT to it. *

*

* For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make * sure the JSON you store in the SecretString matches the JSON * structure of a database secret. *

*

* If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key * aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates * it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use * aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant * delay in returning the result. *

*

* If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't * use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS * key. *

*

* Required permissions: secretsmanager:CreateSecret. If you include tags in the secret, you * also need secretsmanager:TagResource. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

*

* To encrypt the secret with a KMS key other than aws/secretsmanager, you need * kms:GenerateDataKey and kms:Decrypt permission to the key. *

* * @param createSecretRequest * @return A Java Future containing the result of the CreateSecret operation returned by the service. * @sample AWSSecretsManagerAsync.CreateSecret * @see AWS * API Documentation */ java.util.concurrent.Future createSecretAsync(CreateSecretRequest createSecretRequest); /** *

* Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, * an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret * also includes the connection information to access a database or other service, which Secrets Manager doesn't * encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information * needed to manage the secret. *

*

* For information about creating a secret in the console, see Create a * secret. *

*

* To create a secret, you can provide the secret value to be encrypted in either the SecretString * parameter or the SecretBinary parameter, but not both. If you include SecretString or * SecretBinary then Secrets Manager creates an initial secret version and automatically attaches the * staging label AWSCURRENT to it. *

*

* For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make * sure the JSON you store in the SecretString matches the JSON * structure of a database secret. *

*

* If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key * aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates * it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use * aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant * delay in returning the result. *

*

* If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't * use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS * key. *

*

* Required permissions: secretsmanager:CreateSecret. If you include tags in the secret, you * also need secretsmanager:TagResource. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

*

* To encrypt the secret with a KMS key other than aws/secretsmanager, you need * kms:GenerateDataKey and kms:Decrypt permission to the key. *

* * @param createSecretRequest * @param asyncHandler * Asynchronous callback handler for events in the lifecycle of the request. Users can provide an * implementation of the callback methods in this interface to receive notification of successful or * unsuccessful completion of the operation. * @return A Java Future containing the result of the CreateSecret operation returned by the service. * @sample AWSSecretsManagerAsyncHandler.CreateSecret * @see AWS * API Documentation */ java.util.concurrent.Future createSecretAsync(CreateSecretRequest createSecretRequest, com.amazonaws.handlers.AsyncHandler asyncHandler); /** *

* Deletes the resource-based permission policy attached to the secret. To attach a policy to a secret, use * PutResourcePolicy. *

*

* Required permissions: secretsmanager:DeleteResourcePolicy. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param deleteResourcePolicyRequest * @return A Java Future containing the result of the DeleteResourcePolicy operation returned by the service. * @sample AWSSecretsManagerAsync.DeleteResourcePolicy * @see AWS API Documentation */ java.util.concurrent.Future deleteResourcePolicyAsync(DeleteResourcePolicyRequest deleteResourcePolicyRequest); /** *

* Deletes the resource-based permission policy attached to the secret. To attach a policy to a secret, use * PutResourcePolicy. *

*

* Required permissions: secretsmanager:DeleteResourcePolicy. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param deleteResourcePolicyRequest * @param asyncHandler * Asynchronous callback handler for events in the lifecycle of the request. Users can provide an * implementation of the callback methods in this interface to receive notification of successful or * unsuccessful completion of the operation. * @return A Java Future containing the result of the DeleteResourcePolicy operation returned by the service. * @sample AWSSecretsManagerAsyncHandler.DeleteResourcePolicy * @see AWS API Documentation */ java.util.concurrent.Future deleteResourcePolicyAsync(DeleteResourcePolicyRequest deleteResourcePolicyRequest, com.amazonaws.handlers.AsyncHandler asyncHandler); /** *

* Deletes a secret and all of its versions. You can specify a recovery window during which you can restore the * secret. The minimum recovery window is 7 days. The default recovery window is 30 days. Secrets Manager attaches a * DeletionDate stamp to the secret that specifies the end of the recovery window. At the end of the * recovery window, Secrets Manager deletes the secret permanently. *

*

* You can't delete a primary secret that is replicated to other Regions. You must first delete the replicas using * RemoveRegionsFromReplication, and then delete the primary secret. When you delete a replica, it is deleted * immediately. *

*

* You can't directly delete a version of a secret. Instead, you remove all staging labels from the version using * UpdateSecretVersionStage. This marks the version as deprecated, and then Secrets Manager can automatically * delete the version in the background. *

*

* To determine whether an application still uses a secret, you can create an Amazon CloudWatch alarm to alert you * to any attempts to access a secret during the recovery window. For more information, see * Monitor secrets scheduled for deletion. *

*

* Secrets Manager performs the permanent secret deletion at the end of the waiting period as a background task with * low priority. There is no guarantee of a specific time after the recovery window for the permanent delete to * occur. *

*

* At any time before recovery window ends, you can use RestoreSecret to remove the DeletionDate * and cancel the deletion of the secret. *

*

* When a secret is scheduled for deletion, you cannot retrieve the secret value. You must first cancel the deletion * with RestoreSecret and then you can retrieve the secret. *

*

* Required permissions: secretsmanager:DeleteSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param deleteSecretRequest * @return A Java Future containing the result of the DeleteSecret operation returned by the service. * @sample AWSSecretsManagerAsync.DeleteSecret * @see AWS * API Documentation */ java.util.concurrent.Future deleteSecretAsync(DeleteSecretRequest deleteSecretRequest); /** *

* Deletes a secret and all of its versions. You can specify a recovery window during which you can restore the * secret. The minimum recovery window is 7 days. The default recovery window is 30 days. Secrets Manager attaches a * DeletionDate stamp to the secret that specifies the end of the recovery window. At the end of the * recovery window, Secrets Manager deletes the secret permanently. *

*

* You can't delete a primary secret that is replicated to other Regions. You must first delete the replicas using * RemoveRegionsFromReplication, and then delete the primary secret. When you delete a replica, it is deleted * immediately. *

*

* You can't directly delete a version of a secret. Instead, you remove all staging labels from the version using * UpdateSecretVersionStage. This marks the version as deprecated, and then Secrets Manager can automatically * delete the version in the background. *

*

* To determine whether an application still uses a secret, you can create an Amazon CloudWatch alarm to alert you * to any attempts to access a secret during the recovery window. For more information, see * Monitor secrets scheduled for deletion. *

*

* Secrets Manager performs the permanent secret deletion at the end of the waiting period as a background task with * low priority. There is no guarantee of a specific time after the recovery window for the permanent delete to * occur. *

*

* At any time before recovery window ends, you can use RestoreSecret to remove the DeletionDate * and cancel the deletion of the secret. *

*

* When a secret is scheduled for deletion, you cannot retrieve the secret value. You must first cancel the deletion * with RestoreSecret and then you can retrieve the secret. *

*

* Required permissions: secretsmanager:DeleteSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param deleteSecretRequest * @param asyncHandler * Asynchronous callback handler for events in the lifecycle of the request. Users can provide an * implementation of the callback methods in this interface to receive notification of successful or * unsuccessful completion of the operation. * @return A Java Future containing the result of the DeleteSecret operation returned by the service. * @sample AWSSecretsManagerAsyncHandler.DeleteSecret * @see AWS * API Documentation */ java.util.concurrent.Future deleteSecretAsync(DeleteSecretRequest deleteSecretRequest, com.amazonaws.handlers.AsyncHandler asyncHandler); /** *

* Retrieves the details of a secret. It does not include the encrypted secret value. Secrets Manager only returns * fields that have a value in the response. *

*

* Required permissions: secretsmanager:DescribeSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param describeSecretRequest * @return A Java Future containing the result of the DescribeSecret operation returned by the service. * @sample AWSSecretsManagerAsync.DescribeSecret * @see AWS * API Documentation */ java.util.concurrent.Future describeSecretAsync(DescribeSecretRequest describeSecretRequest); /** *

* Retrieves the details of a secret. It does not include the encrypted secret value. Secrets Manager only returns * fields that have a value in the response. *

*

* Required permissions: secretsmanager:DescribeSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param describeSecretRequest * @param asyncHandler * Asynchronous callback handler for events in the lifecycle of the request. Users can provide an * implementation of the callback methods in this interface to receive notification of successful or * unsuccessful completion of the operation. * @return A Java Future containing the result of the DescribeSecret operation returned by the service. * @sample AWSSecretsManagerAsyncHandler.DescribeSecret * @see AWS * API Documentation */ java.util.concurrent.Future describeSecretAsync(DescribeSecretRequest describeSecretRequest, com.amazonaws.handlers.AsyncHandler asyncHandler); /** *

* Generates a random password. We recommend that you specify the maximum length and include every character type * that the system you are generating a password for can support. *

*

* Required permissions: secretsmanager:GetRandomPassword. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param getRandomPasswordRequest * @return A Java Future containing the result of the GetRandomPassword operation returned by the service. * @sample AWSSecretsManagerAsync.GetRandomPassword * @see AWS API Documentation */ java.util.concurrent.Future getRandomPasswordAsync(GetRandomPasswordRequest getRandomPasswordRequest); /** *

* Generates a random password. We recommend that you specify the maximum length and include every character type * that the system you are generating a password for can support. *

*

* Required permissions: secretsmanager:GetRandomPassword. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param getRandomPasswordRequest * @param asyncHandler * Asynchronous callback handler for events in the lifecycle of the request. Users can provide an * implementation of the callback methods in this interface to receive notification of successful or * unsuccessful completion of the operation. * @return A Java Future containing the result of the GetRandomPassword operation returned by the service. * @sample AWSSecretsManagerAsyncHandler.GetRandomPassword * @see AWS API Documentation */ java.util.concurrent.Future getRandomPasswordAsync(GetRandomPasswordRequest getRandomPasswordRequest, com.amazonaws.handlers.AsyncHandler asyncHandler); /** *

* Retrieves the JSON text of the resource-based policy document attached to the secret. For more information about * permissions policies attached to a secret, see Permissions policies attached to a secret. *

*

* Required permissions: secretsmanager:GetResourcePolicy. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param getResourcePolicyRequest * @return A Java Future containing the result of the GetResourcePolicy operation returned by the service. * @sample AWSSecretsManagerAsync.GetResourcePolicy * @see AWS API Documentation */ java.util.concurrent.Future getResourcePolicyAsync(GetResourcePolicyRequest getResourcePolicyRequest); /** *

* Retrieves the JSON text of the resource-based policy document attached to the secret. For more information about * permissions policies attached to a secret, see Permissions policies attached to a secret. *

*

* Required permissions: secretsmanager:GetResourcePolicy. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param getResourcePolicyRequest * @param asyncHandler * Asynchronous callback handler for events in the lifecycle of the request. Users can provide an * implementation of the callback methods in this interface to receive notification of successful or * unsuccessful completion of the operation. * @return A Java Future containing the result of the GetResourcePolicy operation returned by the service. * @sample AWSSecretsManagerAsyncHandler.GetResourcePolicy * @see AWS API Documentation */ java.util.concurrent.Future getResourcePolicyAsync(GetResourcePolicyRequest getResourcePolicyRequest, com.amazonaws.handlers.AsyncHandler asyncHandler); /** *

* Retrieves the contents of the encrypted fields SecretString or SecretBinary from the * specified version of a secret, whichever contains content. *

*

* We recommend that you cache your secret values by using client-side caching. Caching secrets improves speed and * reduces your costs. For more information, see Cache secrets for your * applications. *

*

* Required permissions: secretsmanager:GetSecretValue. If the secret is encrypted using a * customer-managed key instead of the Amazon Web Services managed key aws/secretsmanager, then you * also need kms:Decrypt permissions for that key. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param getSecretValueRequest * @return A Java Future containing the result of the GetSecretValue operation returned by the service. * @sample AWSSecretsManagerAsync.GetSecretValue * @see AWS * API Documentation */ java.util.concurrent.Future getSecretValueAsync(GetSecretValueRequest getSecretValueRequest); /** *

* Retrieves the contents of the encrypted fields SecretString or SecretBinary from the * specified version of a secret, whichever contains content. *

*

* We recommend that you cache your secret values by using client-side caching. Caching secrets improves speed and * reduces your costs. For more information, see Cache secrets for your * applications. *

*

* Required permissions: secretsmanager:GetSecretValue. If the secret is encrypted using a * customer-managed key instead of the Amazon Web Services managed key aws/secretsmanager, then you * also need kms:Decrypt permissions for that key. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param getSecretValueRequest * @param asyncHandler * Asynchronous callback handler for events in the lifecycle of the request. Users can provide an * implementation of the callback methods in this interface to receive notification of successful or * unsuccessful completion of the operation. * @return A Java Future containing the result of the GetSecretValue operation returned by the service. * @sample AWSSecretsManagerAsyncHandler.GetSecretValue * @see AWS * API Documentation */ java.util.concurrent.Future getSecretValueAsync(GetSecretValueRequest getSecretValueRequest, com.amazonaws.handlers.AsyncHandler asyncHandler); /** *

* Lists the versions of a secret. Secrets Manager uses staging labels to indicate the different versions of a * secret. For more information, see Secrets * Manager concepts: Versions. *

*

* To list the secrets in the account, use ListSecrets. *

*

* Required permissions: secretsmanager:ListSecretVersionIds. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param listSecretVersionIdsRequest * @return A Java Future containing the result of the ListSecretVersionIds operation returned by the service. * @sample AWSSecretsManagerAsync.ListSecretVersionIds * @see AWS API Documentation */ java.util.concurrent.Future listSecretVersionIdsAsync(ListSecretVersionIdsRequest listSecretVersionIdsRequest); /** *

* Lists the versions of a secret. Secrets Manager uses staging labels to indicate the different versions of a * secret. For more information, see Secrets * Manager concepts: Versions. *

*

* To list the secrets in the account, use ListSecrets. *

*

* Required permissions: secretsmanager:ListSecretVersionIds. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param listSecretVersionIdsRequest * @param asyncHandler * Asynchronous callback handler for events in the lifecycle of the request. Users can provide an * implementation of the callback methods in this interface to receive notification of successful or * unsuccessful completion of the operation. * @return A Java Future containing the result of the ListSecretVersionIds operation returned by the service. * @sample AWSSecretsManagerAsyncHandler.ListSecretVersionIds * @see AWS API Documentation */ java.util.concurrent.Future listSecretVersionIdsAsync(ListSecretVersionIdsRequest listSecretVersionIdsRequest, com.amazonaws.handlers.AsyncHandler asyncHandler); /** *

* Lists the secrets that are stored by Secrets Manager in the Amazon Web Services account, not including secrets * that are marked for deletion. To see secrets marked for deletion, use the Secrets Manager console. *

*

* To list the versions of a secret, use ListSecretVersionIds. *

*

* To get the secret value from SecretString or SecretBinary, call GetSecretValue. *

*

* For information about finding secrets in the console, see Find secrets in * Secrets Manager. *

*

* Required permissions: secretsmanager:ListSecrets. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param listSecretsRequest * @return A Java Future containing the result of the ListSecrets operation returned by the service. * @sample AWSSecretsManagerAsync.ListSecrets * @see AWS API * Documentation */ java.util.concurrent.Future listSecretsAsync(ListSecretsRequest listSecretsRequest); /** *

* Lists the secrets that are stored by Secrets Manager in the Amazon Web Services account, not including secrets * that are marked for deletion. To see secrets marked for deletion, use the Secrets Manager console. *

*

* To list the versions of a secret, use ListSecretVersionIds. *

*

* To get the secret value from SecretString or SecretBinary, call GetSecretValue. *

*

* For information about finding secrets in the console, see Find secrets in * Secrets Manager. *

*

* Required permissions: secretsmanager:ListSecrets. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param listSecretsRequest * @param asyncHandler * Asynchronous callback handler for events in the lifecycle of the request. Users can provide an * implementation of the callback methods in this interface to receive notification of successful or * unsuccessful completion of the operation. * @return A Java Future containing the result of the ListSecrets operation returned by the service. * @sample AWSSecretsManagerAsyncHandler.ListSecrets * @see AWS API * Documentation */ java.util.concurrent.Future listSecretsAsync(ListSecretsRequest listSecretsRequest, com.amazonaws.handlers.AsyncHandler asyncHandler); /** *

* Attaches a resource-based permission policy to a secret. A resource-based policy is optional. For more * information, see Authentication and access * control for Secrets Manager *

*

* For information about attaching a policy in the console, see Attach a permissions policy to a secret. *

*

* Required permissions: secretsmanager:PutResourcePolicy. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param putResourcePolicyRequest * @return A Java Future containing the result of the PutResourcePolicy operation returned by the service. * @sample AWSSecretsManagerAsync.PutResourcePolicy * @see AWS API Documentation */ java.util.concurrent.Future putResourcePolicyAsync(PutResourcePolicyRequest putResourcePolicyRequest); /** *

* Attaches a resource-based permission policy to a secret. A resource-based policy is optional. For more * information, see Authentication and access * control for Secrets Manager *

*

* For information about attaching a policy in the console, see Attach a permissions policy to a secret. *

*

* Required permissions: secretsmanager:PutResourcePolicy. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param putResourcePolicyRequest * @param asyncHandler * Asynchronous callback handler for events in the lifecycle of the request. Users can provide an * implementation of the callback methods in this interface to receive notification of successful or * unsuccessful completion of the operation. * @return A Java Future containing the result of the PutResourcePolicy operation returned by the service. * @sample AWSSecretsManagerAsyncHandler.PutResourcePolicy * @see AWS API Documentation */ java.util.concurrent.Future putResourcePolicyAsync(PutResourcePolicyRequest putResourcePolicyRequest, com.amazonaws.handlers.AsyncHandler asyncHandler); /** *

* Creates a new version with a new encrypted secret value and attaches it to the secret. The version can contain a * new SecretString value or a new SecretBinary value. *

*

* We recommend you avoid calling PutSecretValue at a sustained rate of more than once every 10 * minutes. When you update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager * removes outdated versions when there are more than 100, but it does not remove versions created less than 24 * hours ago. If you call PutSecretValue more than once every 10 minutes, you create more versions than * Secrets Manager removes, and you will reach the quota for secret versions. *

*

* You can specify the staging labels to attach to the new version in VersionStages. If you don't * include VersionStages, then Secrets Manager automatically moves the staging label * AWSCURRENT to this version. If this operation creates the first version for the secret, then Secrets * Manager automatically attaches the staging label AWSCURRENT to it . *

*

* If this operation moves the staging label AWSCURRENT from another version to this version, then * Secrets Manager also automatically moves the staging label AWSPREVIOUS to the version that * AWSCURRENT was removed from. *

*

* This operation is idempotent. If a version with a VersionId with the same value as the * ClientRequestToken parameter already exists, and you specify the same secret data, the operation * succeeds but does nothing. However, if the secret data is different, then the operation fails because you can't * modify an existing version; you can only create new ones. *

*

* Required permissions: secretsmanager:PutSecretValue. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param putSecretValueRequest * @return A Java Future containing the result of the PutSecretValue operation returned by the service. * @sample AWSSecretsManagerAsync.PutSecretValue * @see AWS * API Documentation */ java.util.concurrent.Future putSecretValueAsync(PutSecretValueRequest putSecretValueRequest); /** *

* Creates a new version with a new encrypted secret value and attaches it to the secret. The version can contain a * new SecretString value or a new SecretBinary value. *

*

* We recommend you avoid calling PutSecretValue at a sustained rate of more than once every 10 * minutes. When you update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager * removes outdated versions when there are more than 100, but it does not remove versions created less than 24 * hours ago. If you call PutSecretValue more than once every 10 minutes, you create more versions than * Secrets Manager removes, and you will reach the quota for secret versions. *

*

* You can specify the staging labels to attach to the new version in VersionStages. If you don't * include VersionStages, then Secrets Manager automatically moves the staging label * AWSCURRENT to this version. If this operation creates the first version for the secret, then Secrets * Manager automatically attaches the staging label AWSCURRENT to it . *

*

* If this operation moves the staging label AWSCURRENT from another version to this version, then * Secrets Manager also automatically moves the staging label AWSPREVIOUS to the version that * AWSCURRENT was removed from. *

*

* This operation is idempotent. If a version with a VersionId with the same value as the * ClientRequestToken parameter already exists, and you specify the same secret data, the operation * succeeds but does nothing. However, if the secret data is different, then the operation fails because you can't * modify an existing version; you can only create new ones. *

*

* Required permissions: secretsmanager:PutSecretValue. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param putSecretValueRequest * @param asyncHandler * Asynchronous callback handler for events in the lifecycle of the request. Users can provide an * implementation of the callback methods in this interface to receive notification of successful or * unsuccessful completion of the operation. * @return A Java Future containing the result of the PutSecretValue operation returned by the service. * @sample AWSSecretsManagerAsyncHandler.PutSecretValue * @see AWS * API Documentation */ java.util.concurrent.Future putSecretValueAsync(PutSecretValueRequest putSecretValueRequest, com.amazonaws.handlers.AsyncHandler asyncHandler); /** *

* For a secret that is replicated to other Regions, deletes the secret replicas from the Regions you specify. *

*

* Required permissions: secretsmanager:RemoveRegionsFromReplication. For more information, see * IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param removeRegionsFromReplicationRequest * @return A Java Future containing the result of the RemoveRegionsFromReplication operation returned by the * service. * @sample AWSSecretsManagerAsync.RemoveRegionsFromReplication * @see AWS API Documentation */ java.util.concurrent.Future removeRegionsFromReplicationAsync( RemoveRegionsFromReplicationRequest removeRegionsFromReplicationRequest); /** *

* For a secret that is replicated to other Regions, deletes the secret replicas from the Regions you specify. *

*

* Required permissions: secretsmanager:RemoveRegionsFromReplication. For more information, see * IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param removeRegionsFromReplicationRequest * @param asyncHandler * Asynchronous callback handler for events in the lifecycle of the request. Users can provide an * implementation of the callback methods in this interface to receive notification of successful or * unsuccessful completion of the operation. * @return A Java Future containing the result of the RemoveRegionsFromReplication operation returned by the * service. * @sample AWSSecretsManagerAsyncHandler.RemoveRegionsFromReplication * @see AWS API Documentation */ java.util.concurrent.Future removeRegionsFromReplicationAsync( RemoveRegionsFromReplicationRequest removeRegionsFromReplicationRequest, com.amazonaws.handlers.AsyncHandler asyncHandler); /** *

* Replicates the secret to a new Regions. See Multi-Region secrets. *

*

* Required permissions: secretsmanager:ReplicateSecretToRegions. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param replicateSecretToRegionsRequest * @return A Java Future containing the result of the ReplicateSecretToRegions operation returned by the service. * @sample AWSSecretsManagerAsync.ReplicateSecretToRegions * @see AWS API Documentation */ java.util.concurrent.Future replicateSecretToRegionsAsync(ReplicateSecretToRegionsRequest replicateSecretToRegionsRequest); /** *

* Replicates the secret to a new Regions. See Multi-Region secrets. *

*

* Required permissions: secretsmanager:ReplicateSecretToRegions. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param replicateSecretToRegionsRequest * @param asyncHandler * Asynchronous callback handler for events in the lifecycle of the request. Users can provide an * implementation of the callback methods in this interface to receive notification of successful or * unsuccessful completion of the operation. * @return A Java Future containing the result of the ReplicateSecretToRegions operation returned by the service. * @sample AWSSecretsManagerAsyncHandler.ReplicateSecretToRegions * @see AWS API Documentation */ java.util.concurrent.Future replicateSecretToRegionsAsync(ReplicateSecretToRegionsRequest replicateSecretToRegionsRequest, com.amazonaws.handlers.AsyncHandler asyncHandler); /** *

* Cancels the scheduled deletion of a secret by removing the DeletedDate time stamp. You can access a * secret again after it has been restored. *

*

* Required permissions: secretsmanager:RestoreSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param restoreSecretRequest * @return A Java Future containing the result of the RestoreSecret operation returned by the service. * @sample AWSSecretsManagerAsync.RestoreSecret * @see AWS * API Documentation */ java.util.concurrent.Future restoreSecretAsync(RestoreSecretRequest restoreSecretRequest); /** *

* Cancels the scheduled deletion of a secret by removing the DeletedDate time stamp. You can access a * secret again after it has been restored. *

*

* Required permissions: secretsmanager:RestoreSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param restoreSecretRequest * @param asyncHandler * Asynchronous callback handler for events in the lifecycle of the request. Users can provide an * implementation of the callback methods in this interface to receive notification of successful or * unsuccessful completion of the operation. * @return A Java Future containing the result of the RestoreSecret operation returned by the service. * @sample AWSSecretsManagerAsyncHandler.RestoreSecret * @see AWS * API Documentation */ java.util.concurrent.Future restoreSecretAsync(RestoreSecretRequest restoreSecretRequest, com.amazonaws.handlers.AsyncHandler asyncHandler); /** *

* Configures and starts the asynchronous process of rotating the secret. For more information about rotation, see * Rotate secrets. *

*

* If you include the configuration parameters, the operation sets the values for the secret and then immediately * starts a rotation. If you don't include the configuration parameters, the operation starts a rotation with the * values already stored in the secret. *

*

* For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make * sure the secret value is in the JSON * structure of a database secret. In particular, if you want to use the alternating users strategy, your secret must contain the ARN of a superuser secret. *

*

* To configure rotation, you also need the ARN of an Amazon Web Services Lambda function and the schedule for the * rotation. The Lambda rotation function creates a new version of the secret and creates or updates the credentials * on the database or service to match. After testing the new credentials, the function marks the new secret version * with the staging label AWSCURRENT. Then anyone who retrieves the secret gets the new version. For * more information, see How rotation * works. *

*

* You can create the Lambda rotation function based on the rotation function templates that Secrets Manager provides. Choose a template that matches your Rotation * strategy. *

*

* When rotation is successful, the AWSPENDING staging label might be attached to the same version as * the AWSCURRENT version, or it might not be attached to any version. If the AWSPENDING * staging label is present but not attached to the same version as AWSCURRENT, then any later * invocation of RotateSecret assumes that a previous rotation request is still in progress and returns * an error. *

*

* Required permissions: secretsmanager:RotateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. You also need lambda:InvokeFunction permissions on the rotation * function. For more information, see Permissions for rotation. *

* * @param rotateSecretRequest * @return A Java Future containing the result of the RotateSecret operation returned by the service. * @sample AWSSecretsManagerAsync.RotateSecret * @see AWS * API Documentation */ java.util.concurrent.Future rotateSecretAsync(RotateSecretRequest rotateSecretRequest); /** *

* Configures and starts the asynchronous process of rotating the secret. For more information about rotation, see * Rotate secrets. *

*

* If you include the configuration parameters, the operation sets the values for the secret and then immediately * starts a rotation. If you don't include the configuration parameters, the operation starts a rotation with the * values already stored in the secret. *

*

* For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make * sure the secret value is in the JSON * structure of a database secret. In particular, if you want to use the alternating users strategy, your secret must contain the ARN of a superuser secret. *

*

* To configure rotation, you also need the ARN of an Amazon Web Services Lambda function and the schedule for the * rotation. The Lambda rotation function creates a new version of the secret and creates or updates the credentials * on the database or service to match. After testing the new credentials, the function marks the new secret version * with the staging label AWSCURRENT. Then anyone who retrieves the secret gets the new version. For * more information, see How rotation * works. *

*

* You can create the Lambda rotation function based on the rotation function templates that Secrets Manager provides. Choose a template that matches your Rotation * strategy. *

*

* When rotation is successful, the AWSPENDING staging label might be attached to the same version as * the AWSCURRENT version, or it might not be attached to any version. If the AWSPENDING * staging label is present but not attached to the same version as AWSCURRENT, then any later * invocation of RotateSecret assumes that a previous rotation request is still in progress and returns * an error. *

*

* Required permissions: secretsmanager:RotateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. You also need lambda:InvokeFunction permissions on the rotation * function. For more information, see Permissions for rotation. *

* * @param rotateSecretRequest * @param asyncHandler * Asynchronous callback handler for events in the lifecycle of the request. Users can provide an * implementation of the callback methods in this interface to receive notification of successful or * unsuccessful completion of the operation. * @return A Java Future containing the result of the RotateSecret operation returned by the service. * @sample AWSSecretsManagerAsyncHandler.RotateSecret * @see AWS * API Documentation */ java.util.concurrent.Future rotateSecretAsync(RotateSecretRequest rotateSecretRequest, com.amazonaws.handlers.AsyncHandler asyncHandler); /** *

* Removes the link between the replica secret and the primary secret and promotes the replica to a primary secret * in the replica Region. *

*

* You must call this operation from the Region in which you want to promote the replica to a primary secret. *

*

* Required permissions: secretsmanager:StopReplicationToReplica. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param stopReplicationToReplicaRequest * @return A Java Future containing the result of the StopReplicationToReplica operation returned by the service. * @sample AWSSecretsManagerAsync.StopReplicationToReplica * @see AWS API Documentation */ java.util.concurrent.Future stopReplicationToReplicaAsync(StopReplicationToReplicaRequest stopReplicationToReplicaRequest); /** *

* Removes the link between the replica secret and the primary secret and promotes the replica to a primary secret * in the replica Region. *

*

* You must call this operation from the Region in which you want to promote the replica to a primary secret. *

*

* Required permissions: secretsmanager:StopReplicationToReplica. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param stopReplicationToReplicaRequest * @param asyncHandler * Asynchronous callback handler for events in the lifecycle of the request. Users can provide an * implementation of the callback methods in this interface to receive notification of successful or * unsuccessful completion of the operation. * @return A Java Future containing the result of the StopReplicationToReplica operation returned by the service. * @sample AWSSecretsManagerAsyncHandler.StopReplicationToReplica * @see AWS API Documentation */ java.util.concurrent.Future stopReplicationToReplicaAsync(StopReplicationToReplicaRequest stopReplicationToReplicaRequest, com.amazonaws.handlers.AsyncHandler asyncHandler); /** *

* Attaches tags to a secret. Tags consist of a key name and a value. Tags are part of the secret's metadata. They * are not associated with specific versions of the secret. This operation appends tags to the existing list of * tags. *

*

* The following restrictions apply to tags: *

*
    *
  • *

    * Maximum number of tags per secret: 50 *

    *
  • *
  • *

    * Maximum key length: 127 Unicode characters in UTF-8 *

    *
  • *
  • *

    * Maximum value length: 255 Unicode characters in UTF-8 *

    *
  • *
  • *

    * Tag keys and values are case sensitive. *

    *
  • *
  • *

    * Do not use the aws: prefix in your tag names or values because Amazon Web Services reserves it for * Amazon Web Services use. You can't edit or delete tag names or values with this prefix. Tags with this prefix do * not count against your tags per secret limit. *

    *
  • *
  • *

    * If you use your tagging schema across multiple services and resources, other services might have restrictions on * allowed characters. Generally allowed characters: letters, spaces, and numbers representable in UTF-8, plus the * following special characters: + - = . _ : / @. *

    *
  • *
* *

* If you use tags as part of your security strategy, then adding or removing a tag can change permissions. If * successfully completing this operation would result in you losing your permissions for this secret, then the * operation is blocked and returns an Access Denied error. *

*
*

* Required permissions: secretsmanager:TagResource. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param tagResourceRequest * @return A Java Future containing the result of the TagResource operation returned by the service. * @sample AWSSecretsManagerAsync.TagResource * @see AWS API * Documentation */ java.util.concurrent.Future tagResourceAsync(TagResourceRequest tagResourceRequest); /** *

* Attaches tags to a secret. Tags consist of a key name and a value. Tags are part of the secret's metadata. They * are not associated with specific versions of the secret. This operation appends tags to the existing list of * tags. *

*

* The following restrictions apply to tags: *

*
    *
  • *

    * Maximum number of tags per secret: 50 *

    *
  • *
  • *

    * Maximum key length: 127 Unicode characters in UTF-8 *

    *
  • *
  • *

    * Maximum value length: 255 Unicode characters in UTF-8 *

    *
  • *
  • *

    * Tag keys and values are case sensitive. *

    *
  • *
  • *

    * Do not use the aws: prefix in your tag names or values because Amazon Web Services reserves it for * Amazon Web Services use. You can't edit or delete tag names or values with this prefix. Tags with this prefix do * not count against your tags per secret limit. *

    *
  • *
  • *

    * If you use your tagging schema across multiple services and resources, other services might have restrictions on * allowed characters. Generally allowed characters: letters, spaces, and numbers representable in UTF-8, plus the * following special characters: + - = . _ : / @. *

    *
  • *
* *

* If you use tags as part of your security strategy, then adding or removing a tag can change permissions. If * successfully completing this operation would result in you losing your permissions for this secret, then the * operation is blocked and returns an Access Denied error. *

*
*

* Required permissions: secretsmanager:TagResource. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param tagResourceRequest * @param asyncHandler * Asynchronous callback handler for events in the lifecycle of the request. Users can provide an * implementation of the callback methods in this interface to receive notification of successful or * unsuccessful completion of the operation. * @return A Java Future containing the result of the TagResource operation returned by the service. * @sample AWSSecretsManagerAsyncHandler.TagResource * @see AWS API * Documentation */ java.util.concurrent.Future tagResourceAsync(TagResourceRequest tagResourceRequest, com.amazonaws.handlers.AsyncHandler asyncHandler); /** *

* Removes specific tags from a secret. *

*

* This operation is idempotent. If a requested tag is not attached to the secret, no error is returned and the * secret metadata is unchanged. *

* *

* If you use tags as part of your security strategy, then removing a tag can change permissions. If successfully * completing this operation would result in you losing your permissions for this secret, then the operation is * blocked and returns an Access Denied error. *

*
*

* Required permissions: secretsmanager:UntagResource. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param untagResourceRequest * @return A Java Future containing the result of the UntagResource operation returned by the service. * @sample AWSSecretsManagerAsync.UntagResource * @see AWS * API Documentation */ java.util.concurrent.Future untagResourceAsync(UntagResourceRequest untagResourceRequest); /** *

* Removes specific tags from a secret. *

*

* This operation is idempotent. If a requested tag is not attached to the secret, no error is returned and the * secret metadata is unchanged. *

* *

* If you use tags as part of your security strategy, then removing a tag can change permissions. If successfully * completing this operation would result in you losing your permissions for this secret, then the operation is * blocked and returns an Access Denied error. *

*
*

* Required permissions: secretsmanager:UntagResource. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param untagResourceRequest * @param asyncHandler * Asynchronous callback handler for events in the lifecycle of the request. Users can provide an * implementation of the callback methods in this interface to receive notification of successful or * unsuccessful completion of the operation. * @return A Java Future containing the result of the UntagResource operation returned by the service. * @sample AWSSecretsManagerAsyncHandler.UntagResource * @see AWS * API Documentation */ java.util.concurrent.Future untagResourceAsync(UntagResourceRequest untagResourceRequest, com.amazonaws.handlers.AsyncHandler asyncHandler); /** *

* Modifies the details of a secret, including metadata and the secret value. To change the secret value, you can * also use PutSecretValue. *

*

* To change the rotation configuration of a secret, use RotateSecret instead. *

*

* We recommend you avoid calling UpdateSecret at a sustained rate of more than once every 10 minutes. * When you call UpdateSecret to update the secret value, Secrets Manager creates a new version of the * secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions * created less than 24 hours ago. If you update the secret value more than once every 10 minutes, you create more * versions than Secrets Manager removes, and you will reach the quota for secret versions. *

*

* If you include SecretString or SecretBinary to create a new secret version, Secrets * Manager automatically attaches the staging label AWSCURRENT to the new version. *

*

* If you call this operation with a VersionId that matches an existing version's * ClientRequestToken, the operation results in an error. You can't modify an existing version, you can * only create a new version. To remove a version, remove all staging labels from it. See * UpdateSecretVersionStage. *

*

* If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key * aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates * it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use * aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant * delay in returning the result. *

*

* If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't * use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed key. *

*

* Required permissions: secretsmanager:UpdateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. If you use a customer managed key, you must also have * kms:GenerateDataKey and kms:Decrypt permissions on the key. For more information, see * Secret encryption * and decryption. *

* * @param updateSecretRequest * @return A Java Future containing the result of the UpdateSecret operation returned by the service. * @sample AWSSecretsManagerAsync.UpdateSecret * @see AWS * API Documentation */ java.util.concurrent.Future updateSecretAsync(UpdateSecretRequest updateSecretRequest); /** *

* Modifies the details of a secret, including metadata and the secret value. To change the secret value, you can * also use PutSecretValue. *

*

* To change the rotation configuration of a secret, use RotateSecret instead. *

*

* We recommend you avoid calling UpdateSecret at a sustained rate of more than once every 10 minutes. * When you call UpdateSecret to update the secret value, Secrets Manager creates a new version of the * secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions * created less than 24 hours ago. If you update the secret value more than once every 10 minutes, you create more * versions than Secrets Manager removes, and you will reach the quota for secret versions. *

*

* If you include SecretString or SecretBinary to create a new secret version, Secrets * Manager automatically attaches the staging label AWSCURRENT to the new version. *

*

* If you call this operation with a VersionId that matches an existing version's * ClientRequestToken, the operation results in an error. You can't modify an existing version, you can * only create a new version. To remove a version, remove all staging labels from it. See * UpdateSecretVersionStage. *

*

* If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key * aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates * it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use * aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant * delay in returning the result. *

*

* If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't * use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed key. *

*

* Required permissions: secretsmanager:UpdateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. If you use a customer managed key, you must also have * kms:GenerateDataKey and kms:Decrypt permissions on the key. For more information, see * Secret encryption * and decryption. *

* * @param updateSecretRequest * @param asyncHandler * Asynchronous callback handler for events in the lifecycle of the request. Users can provide an * implementation of the callback methods in this interface to receive notification of successful or * unsuccessful completion of the operation. * @return A Java Future containing the result of the UpdateSecret operation returned by the service. * @sample AWSSecretsManagerAsyncHandler.UpdateSecret * @see AWS * API Documentation */ java.util.concurrent.Future updateSecretAsync(UpdateSecretRequest updateSecretRequest, com.amazonaws.handlers.AsyncHandler asyncHandler); /** *

* Modifies the staging labels attached to a version of a secret. Secrets Manager uses staging labels to track a * version as it progresses through the secret rotation process. Each staging label can be attached to only one * version at a time. To add a staging label to a version when it is already attached to another version, Secrets * Manager first removes it from the other version first and then attaches it to this one. For more information * about versions and staging labels, see Concepts: * Version. *

*

* The staging labels that you specify in the VersionStage parameter are added to the existing list of * staging labels for the version. *

*

* You can move the AWSCURRENT staging label to this version by including it in this call. *

* *

* Whenever you move AWSCURRENT, Secrets Manager automatically moves the label AWSPREVIOUS * to the version that AWSCURRENT was removed from. *

*
*

* If this action results in the last label being removed from a version, then the version is considered to be * 'deprecated' and can be deleted by Secrets Manager. *

*

* Required permissions: secretsmanager:UpdateSecretVersionStage. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param updateSecretVersionStageRequest * @return A Java Future containing the result of the UpdateSecretVersionStage operation returned by the service. * @sample AWSSecretsManagerAsync.UpdateSecretVersionStage * @see AWS API Documentation */ java.util.concurrent.Future updateSecretVersionStageAsync(UpdateSecretVersionStageRequest updateSecretVersionStageRequest); /** *

* Modifies the staging labels attached to a version of a secret. Secrets Manager uses staging labels to track a * version as it progresses through the secret rotation process. Each staging label can be attached to only one * version at a time. To add a staging label to a version when it is already attached to another version, Secrets * Manager first removes it from the other version first and then attaches it to this one. For more information * about versions and staging labels, see Concepts: * Version. *

*

* The staging labels that you specify in the VersionStage parameter are added to the existing list of * staging labels for the version. *

*

* You can move the AWSCURRENT staging label to this version by including it in this call. *

* *

* Whenever you move AWSCURRENT, Secrets Manager automatically moves the label AWSPREVIOUS * to the version that AWSCURRENT was removed from. *

*
*

* If this action results in the last label being removed from a version, then the version is considered to be * 'deprecated' and can be deleted by Secrets Manager. *

*

* Required permissions: secretsmanager:UpdateSecretVersionStage. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param updateSecretVersionStageRequest * @param asyncHandler * Asynchronous callback handler for events in the lifecycle of the request. Users can provide an * implementation of the callback methods in this interface to receive notification of successful or * unsuccessful completion of the operation. * @return A Java Future containing the result of the UpdateSecretVersionStage operation returned by the service. * @sample AWSSecretsManagerAsyncHandler.UpdateSecretVersionStage * @see AWS API Documentation */ java.util.concurrent.Future updateSecretVersionStageAsync(UpdateSecretVersionStageRequest updateSecretVersionStageRequest, com.amazonaws.handlers.AsyncHandler asyncHandler); /** *

* Validates that a resource policy does not grant a wide range of principals access to your secret. A * resource-based policy is optional for secrets. *

*

* The API performs three checks when validating the policy: *

*
    *
  • *

    * Sends a call to Zelkova, an automated reasoning engine, to ensure your resource policy does not allow broad access to your * secret, for example policies that use a wildcard for the principal. *

    *
  • *
  • *

    * Checks for correct syntax in a policy. *

    *
  • *
  • *

    * Verifies the policy does not lock out a caller. *

    *
  • *
*

* Required permissions: secretsmanager:ValidateResourcePolicy. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param validateResourcePolicyRequest * @return A Java Future containing the result of the ValidateResourcePolicy operation returned by the service. * @sample AWSSecretsManagerAsync.ValidateResourcePolicy * @see AWS API Documentation */ java.util.concurrent.Future validateResourcePolicyAsync(ValidateResourcePolicyRequest validateResourcePolicyRequest); /** *

* Validates that a resource policy does not grant a wide range of principals access to your secret. A * resource-based policy is optional for secrets. *

*

* The API performs three checks when validating the policy: *

*
    *
  • *

    * Sends a call to Zelkova, an automated reasoning engine, to ensure your resource policy does not allow broad access to your * secret, for example policies that use a wildcard for the principal. *

    *
  • *
  • *

    * Checks for correct syntax in a policy. *

    *
  • *
  • *

    * Verifies the policy does not lock out a caller. *

    *
  • *
*

* Required permissions: secretsmanager:ValidateResourcePolicy. For more information, see IAM policy actions for Secrets Manager and Authentication and access * control in Secrets Manager. *

* * @param validateResourcePolicyRequest * @param asyncHandler * Asynchronous callback handler for events in the lifecycle of the request. Users can provide an * implementation of the callback methods in this interface to receive notification of successful or * unsuccessful completion of the operation. * @return A Java Future containing the result of the ValidateResourcePolicy operation returned by the service. * @sample AWSSecretsManagerAsyncHandler.ValidateResourcePolicy * @see AWS API Documentation */ java.util.concurrent.Future validateResourcePolicyAsync(ValidateResourcePolicyRequest validateResourcePolicyRequest, com.amazonaws.handlers.AsyncHandler asyncHandler); }




© 2015 - 2025 Weber Informatics LLC | Privacy Policy