/** * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * SPDX-License-Identifier: Apache-2.0. */ #pragma once #include #include #include #include #include #include namespace Aws { namespace SecretsManager { namespace Model { /** */ class UpdateSecretRequest : public SecretsManagerRequest { public: AWS_SECRETSMANAGER_API UpdateSecretRequest(); // Service request name is the Operation name which will send this request out, // each operation should has unique request name, so that we can get operation's name from this request. // Note: this is not true for response, multiple operations may have the same response name, // so we can not get operation's name from response. inline virtual const char* GetServiceRequestName() const override { return "UpdateSecret"; } AWS_SECRETSMANAGER_API Aws::String SerializePayload() const override; AWS_SECRETSMANAGER_API Aws::Http::HeaderValueCollection GetRequestSpecificHeaders() const override; /** *

The ARN or name of the secret.

For an ARN, we recommend that you * specify a complete ARN rather than a partial ARN. See Finding * a secret from a partial ARN.

*/ inline const Aws::String& GetSecretId() const{ return m_secretId; } /** *

The ARN or name of the secret.

For an ARN, we recommend that you * specify a complete ARN rather than a partial ARN. See Finding * a secret from a partial ARN.

*/ inline bool SecretIdHasBeenSet() const { return m_secretIdHasBeenSet; } /** *

The ARN or name of the secret.

For an ARN, we recommend that you * specify a complete ARN rather than a partial ARN. See Finding * a secret from a partial ARN.

*/ inline void SetSecretId(const Aws::String& value) { m_secretIdHasBeenSet = true; m_secretId = value; } /** *

The ARN or name of the secret.

For an ARN, we recommend that you * specify a complete ARN rather than a partial ARN. See Finding * a secret from a partial ARN.

*/ inline void SetSecretId(Aws::String&& value) { m_secretIdHasBeenSet = true; m_secretId = std::move(value); } /** *

The ARN or name of the secret.

For an ARN, we recommend that you * specify a complete ARN rather than a partial ARN. See Finding * a secret from a partial ARN.

*/ inline void SetSecretId(const char* value) { m_secretIdHasBeenSet = true; m_secretId.assign(value); } /** *

The ARN or name of the secret.

For an ARN, we recommend that you * specify a complete ARN rather than a partial ARN. See Finding * a secret from a partial ARN.

*/ inline UpdateSecretRequest& WithSecretId(const Aws::String& value) { SetSecretId(value); return *this;} /** *

The ARN or name of the secret.

For an ARN, we recommend that you * specify a complete ARN rather than a partial ARN. See Finding * a secret from a partial ARN.

*/ inline UpdateSecretRequest& WithSecretId(Aws::String&& value) { SetSecretId(std::move(value)); return *this;} /** *

The ARN or name of the secret.

For an ARN, we recommend that you * specify a complete ARN rather than a partial ARN. See Finding * a secret from a partial ARN.

*/ inline UpdateSecretRequest& WithSecretId(const char* value) { SetSecretId(value); return *this;} /** *

If you include SecretString or SecretBinary, then * Secrets Manager creates a new version for the secret, and this parameter * specifies the unique identifier for the new version.

If you use * the Amazon Web Services CLI or one of the Amazon Web Services SDKs to call this * operation, then you can leave this parameter empty. The CLI or SDK generates a * random UUID for you and includes it as the value for this parameter in the * request. If you don't use the SDK and instead generate a raw HTTP request to the * Secrets Manager service endpoint, then you must generate a * ClientRequestToken yourself for the new version and include the * value in the request.

This value becomes the * VersionId of the new version.

*/ inline const Aws::String& GetClientRequestToken() const{ return m_clientRequestToken; } /** *

If you include SecretString or SecretBinary, then * Secrets Manager creates a new version for the secret, and this parameter * specifies the unique identifier for the new version.

If you use * the Amazon Web Services CLI or one of the Amazon Web Services SDKs to call this * operation, then you can leave this parameter empty. The CLI or SDK generates a * random UUID for you and includes it as the value for this parameter in the * request. If you don't use the SDK and instead generate a raw HTTP request to the * Secrets Manager service endpoint, then you must generate a * ClientRequestToken yourself for the new version and include the * value in the request.

This value becomes the * VersionId of the new version.

*/ inline bool ClientRequestTokenHasBeenSet() const { return m_clientRequestTokenHasBeenSet; } /** *

If you include SecretString or SecretBinary, then * Secrets Manager creates a new version for the secret, and this parameter * specifies the unique identifier for the new version.

If you use * the Amazon Web Services CLI or one of the Amazon Web Services SDKs to call this * operation, then you can leave this parameter empty. The CLI or SDK generates a * random UUID for you and includes it as the value for this parameter in the * request. If you don't use the SDK and instead generate a raw HTTP request to the * Secrets Manager service endpoint, then you must generate a * ClientRequestToken yourself for the new version and include the * value in the request.

This value becomes the * VersionId of the new version.

*/ inline void SetClientRequestToken(const Aws::String& value) { m_clientRequestTokenHasBeenSet = true; m_clientRequestToken = value; } /** *

If you include SecretString or SecretBinary, then * Secrets Manager creates a new version for the secret, and this parameter * specifies the unique identifier for the new version.

If you use * the Amazon Web Services CLI or one of the Amazon Web Services SDKs to call this * operation, then you can leave this parameter empty. The CLI or SDK generates a * random UUID for you and includes it as the value for this parameter in the * request. If you don't use the SDK and instead generate a raw HTTP request to the * Secrets Manager service endpoint, then you must generate a * ClientRequestToken yourself for the new version and include the * value in the request.

This value becomes the * VersionId of the new version.

*/ inline void SetClientRequestToken(Aws::String&& value) { m_clientRequestTokenHasBeenSet = true; m_clientRequestToken = std::move(value); } /** *

If you include SecretString or SecretBinary, then * Secrets Manager creates a new version for the secret, and this parameter * specifies the unique identifier for the new version.

If you use * the Amazon Web Services CLI or one of the Amazon Web Services SDKs to call this * operation, then you can leave this parameter empty. The CLI or SDK generates a * random UUID for you and includes it as the value for this parameter in the * request. If you don't use the SDK and instead generate a raw HTTP request to the * Secrets Manager service endpoint, then you must generate a * ClientRequestToken yourself for the new version and include the * value in the request.

This value becomes the * VersionId of the new version.

*/ inline void SetClientRequestToken(const char* value) { m_clientRequestTokenHasBeenSet = true; m_clientRequestToken.assign(value); } /** *

If you include SecretString or SecretBinary, then * Secrets Manager creates a new version for the secret, and this parameter * specifies the unique identifier for the new version.

If you use * the Amazon Web Services CLI or one of the Amazon Web Services SDKs to call this * operation, then you can leave this parameter empty. The CLI or SDK generates a * random UUID for you and includes it as the value for this parameter in the * request. If you don't use the SDK and instead generate a raw HTTP request to the * Secrets Manager service endpoint, then you must generate a * ClientRequestToken yourself for the new version and include the * value in the request.

This value becomes the * VersionId of the new version.

*/ inline UpdateSecretRequest& WithClientRequestToken(const Aws::String& value) { SetClientRequestToken(value); return *this;} /** *

If you include SecretString or SecretBinary, then * Secrets Manager creates a new version for the secret, and this parameter * specifies the unique identifier for the new version.

If you use * the Amazon Web Services CLI or one of the Amazon Web Services SDKs to call this * operation, then you can leave this parameter empty. The CLI or SDK generates a * random UUID for you and includes it as the value for this parameter in the * request. If you don't use the SDK and instead generate a raw HTTP request to the * Secrets Manager service endpoint, then you must generate a * ClientRequestToken yourself for the new version and include the * value in the request.

This value becomes the * VersionId of the new version.

*/ inline UpdateSecretRequest& WithClientRequestToken(Aws::String&& value) { SetClientRequestToken(std::move(value)); return *this;} /** *

If you include SecretString or SecretBinary, then * Secrets Manager creates a new version for the secret, and this parameter * specifies the unique identifier for the new version.

If you use * the Amazon Web Services CLI or one of the Amazon Web Services SDKs to call this * operation, then you can leave this parameter empty. The CLI or SDK generates a * random UUID for you and includes it as the value for this parameter in the * request. If you don't use the SDK and instead generate a raw HTTP request to the * Secrets Manager service endpoint, then you must generate a * ClientRequestToken yourself for the new version and include the * value in the request.

This value becomes the * VersionId of the new version.

*/ inline UpdateSecretRequest& WithClientRequestToken(const char* value) { SetClientRequestToken(value); return *this;} /** *

The description of the secret.

*/ inline const Aws::String& GetDescription() const{ return m_description; } /** *

The description of the secret.

*/ inline bool DescriptionHasBeenSet() const { return m_descriptionHasBeenSet; } /** *

The description of the secret.

*/ inline void SetDescription(const Aws::String& value) { m_descriptionHasBeenSet = true; m_description = value; } /** *

The description of the secret.

*/ inline void SetDescription(Aws::String&& value) { m_descriptionHasBeenSet = true; m_description = std::move(value); } /** *

The description of the secret.

*/ inline void SetDescription(const char* value) { m_descriptionHasBeenSet = true; m_description.assign(value); } /** *

The description of the secret.

*/ inline UpdateSecretRequest& WithDescription(const Aws::String& value) { SetDescription(value); return *this;} /** *

The description of the secret.

*/ inline UpdateSecretRequest& WithDescription(Aws::String&& value) { SetDescription(std::move(value)); return *this;} /** *

The description of the secret.

*/ inline UpdateSecretRequest& WithDescription(const char* value) { SetDescription(value); return *this;} /** *

The ARN, key ID, or alias of the KMS key that Secrets Manager uses to encrypt * new secret versions as well as any existing versions with the staging labels * AWSCURRENT, AWSPENDING, or AWSPREVIOUS. * If you don't have kms:Encrypt permission to the new key, Secrets * Manager does not re-ecrypt existing secret versions with the new key. For more * information about versions and staging labels, see Concepts: * Version.

A key alias is always prefixed by alias/, for * example alias/aws/secretsmanager. For more information, see About * aliases.

If you set this to an empty string, Secrets Manager uses the * Amazon Web Services managed key aws/secretsmanager. If this key * doesn't already exist in your account, then Secrets Manager creates it for you * automatically. All users and roles in the Amazon Web Services account * automatically have access to use aws/secretsmanager. Creating * aws/secretsmanager can result in a one-time significant delay in * returning the result.

You can only use the Amazon Web * Services managed key aws/secretsmanager if you call this operation * using credentials from the same Amazon Web Services account that owns the * secret. If the secret is in a different account, then you must use a customer * managed key and provide the ARN of that KMS key in this field. The user making * the call must have permissions to both the secret and the KMS key in their * respective accounts.

*/ inline const Aws::String& GetKmsKeyId() const{ return m_kmsKeyId; } /** *

The ARN, key ID, or alias of the KMS key that Secrets Manager uses to encrypt * new secret versions as well as any existing versions with the staging labels * AWSCURRENT, AWSPENDING, or AWSPREVIOUS. * If you don't have kms:Encrypt permission to the new key, Secrets * Manager does not re-ecrypt existing secret versions with the new key. For more * information about versions and staging labels, see Concepts: * Version.

A key alias is always prefixed by alias/, for * example alias/aws/secretsmanager. For more information, see About * aliases.

If you set this to an empty string, Secrets Manager uses the * Amazon Web Services managed key aws/secretsmanager. If this key * doesn't already exist in your account, then Secrets Manager creates it for you * automatically. All users and roles in the Amazon Web Services account * automatically have access to use aws/secretsmanager. Creating * aws/secretsmanager can result in a one-time significant delay in * returning the result.

You can only use the Amazon Web * Services managed key aws/secretsmanager if you call this operation * using credentials from the same Amazon Web Services account that owns the * secret. If the secret is in a different account, then you must use a customer * managed key and provide the ARN of that KMS key in this field. The user making * the call must have permissions to both the secret and the KMS key in their * respective accounts.

*/ inline bool KmsKeyIdHasBeenSet() const { return m_kmsKeyIdHasBeenSet; } /** *

The ARN, key ID, or alias of the KMS key that Secrets Manager uses to encrypt * new secret versions as well as any existing versions with the staging labels * AWSCURRENT, AWSPENDING, or AWSPREVIOUS. * If you don't have kms:Encrypt permission to the new key, Secrets * Manager does not re-ecrypt existing secret versions with the new key. For more * information about versions and staging labels, see Concepts: * Version.

A key alias is always prefixed by alias/, for * example alias/aws/secretsmanager. For more information, see About * aliases.

If you set this to an empty string, Secrets Manager uses the * Amazon Web Services managed key aws/secretsmanager. If this key * doesn't already exist in your account, then Secrets Manager creates it for you * automatically. All users and roles in the Amazon Web Services account * automatically have access to use aws/secretsmanager. Creating * aws/secretsmanager can result in a one-time significant delay in * returning the result.

You can only use the Amazon Web * Services managed key aws/secretsmanager if you call this operation * using credentials from the same Amazon Web Services account that owns the * secret. If the secret is in a different account, then you must use a customer * managed key and provide the ARN of that KMS key in this field. The user making * the call must have permissions to both the secret and the KMS key in their * respective accounts.

*/ inline void SetKmsKeyId(const Aws::String& value) { m_kmsKeyIdHasBeenSet = true; m_kmsKeyId = value; } /** *

The ARN, key ID, or alias of the KMS key that Secrets Manager uses to encrypt * new secret versions as well as any existing versions with the staging labels * AWSCURRENT, AWSPENDING, or AWSPREVIOUS. * If you don't have kms:Encrypt permission to the new key, Secrets * Manager does not re-ecrypt existing secret versions with the new key. For more * information about versions and staging labels, see Concepts: * Version.

A key alias is always prefixed by alias/, for * example alias/aws/secretsmanager. For more information, see About * aliases.

If you set this to an empty string, Secrets Manager uses the * Amazon Web Services managed key aws/secretsmanager. If this key * doesn't already exist in your account, then Secrets Manager creates it for you * automatically. All users and roles in the Amazon Web Services account * automatically have access to use aws/secretsmanager. Creating * aws/secretsmanager can result in a one-time significant delay in * returning the result.

You can only use the Amazon Web * Services managed key aws/secretsmanager if you call this operation * using credentials from the same Amazon Web Services account that owns the * secret. If the secret is in a different account, then you must use a customer * managed key and provide the ARN of that KMS key in this field. The user making * the call must have permissions to both the secret and the KMS key in their * respective accounts.

*/ inline void SetKmsKeyId(Aws::String&& value) { m_kmsKeyIdHasBeenSet = true; m_kmsKeyId = std::move(value); } /** *

The ARN, key ID, or alias of the KMS key that Secrets Manager uses to encrypt * new secret versions as well as any existing versions with the staging labels * AWSCURRENT, AWSPENDING, or AWSPREVIOUS. * If you don't have kms:Encrypt permission to the new key, Secrets * Manager does not re-ecrypt existing secret versions with the new key. For more * information about versions and staging labels, see Concepts: * Version.

A key alias is always prefixed by alias/, for * example alias/aws/secretsmanager. For more information, see About * aliases.

If you set this to an empty string, Secrets Manager uses the * Amazon Web Services managed key aws/secretsmanager. If this key * doesn't already exist in your account, then Secrets Manager creates it for you * automatically. All users and roles in the Amazon Web Services account * automatically have access to use aws/secretsmanager. Creating * aws/secretsmanager can result in a one-time significant delay in * returning the result.

You can only use the Amazon Web * Services managed key aws/secretsmanager if you call this operation * using credentials from the same Amazon Web Services account that owns the * secret. If the secret is in a different account, then you must use a customer * managed key and provide the ARN of that KMS key in this field. The user making * the call must have permissions to both the secret and the KMS key in their * respective accounts.

*/ inline void SetKmsKeyId(const char* value) { m_kmsKeyIdHasBeenSet = true; m_kmsKeyId.assign(value); } /** *

The ARN, key ID, or alias of the KMS key that Secrets Manager uses to encrypt * new secret versions as well as any existing versions with the staging labels * AWSCURRENT, AWSPENDING, or AWSPREVIOUS. * If you don't have kms:Encrypt permission to the new key, Secrets * Manager does not re-ecrypt existing secret versions with the new key. For more * information about versions and staging labels, see Concepts: * Version.

A key alias is always prefixed by alias/, for * example alias/aws/secretsmanager. For more information, see About * aliases.

If you set this to an empty string, Secrets Manager uses the * Amazon Web Services managed key aws/secretsmanager. If this key * doesn't already exist in your account, then Secrets Manager creates it for you * automatically. All users and roles in the Amazon Web Services account * automatically have access to use aws/secretsmanager. Creating * aws/secretsmanager can result in a one-time significant delay in * returning the result.

You can only use the Amazon Web * Services managed key aws/secretsmanager if you call this operation * using credentials from the same Amazon Web Services account that owns the * secret. If the secret is in a different account, then you must use a customer * managed key and provide the ARN of that KMS key in this field. The user making * the call must have permissions to both the secret and the KMS key in their * respective accounts.

*/ inline UpdateSecretRequest& WithKmsKeyId(const Aws::String& value) { SetKmsKeyId(value); return *this;} /** *

The ARN, key ID, or alias of the KMS key that Secrets Manager uses to encrypt * new secret versions as well as any existing versions with the staging labels * AWSCURRENT, AWSPENDING, or AWSPREVIOUS. * If you don't have kms:Encrypt permission to the new key, Secrets * Manager does not re-ecrypt existing secret versions with the new key. For more * information about versions and staging labels, see Concepts: * Version.

A key alias is always prefixed by alias/, for * example alias/aws/secretsmanager. For more information, see About * aliases.

If you set this to an empty string, Secrets Manager uses the * Amazon Web Services managed key aws/secretsmanager. If this key * doesn't already exist in your account, then Secrets Manager creates it for you * automatically. All users and roles in the Amazon Web Services account * automatically have access to use aws/secretsmanager. Creating * aws/secretsmanager can result in a one-time significant delay in * returning the result.

You can only use the Amazon Web * Services managed key aws/secretsmanager if you call this operation * using credentials from the same Amazon Web Services account that owns the * secret. If the secret is in a different account, then you must use a customer * managed key and provide the ARN of that KMS key in this field. The user making * the call must have permissions to both the secret and the KMS key in their * respective accounts.

*/ inline UpdateSecretRequest& WithKmsKeyId(Aws::String&& value) { SetKmsKeyId(std::move(value)); return *this;} /** *

The ARN, key ID, or alias of the KMS key that Secrets Manager uses to encrypt * new secret versions as well as any existing versions with the staging labels * AWSCURRENT, AWSPENDING, or AWSPREVIOUS. * If you don't have kms:Encrypt permission to the new key, Secrets * Manager does not re-ecrypt existing secret versions with the new key. For more * information about versions and staging labels, see Concepts: * Version.

A key alias is always prefixed by alias/, for * example alias/aws/secretsmanager. For more information, see About * aliases.

If you set this to an empty string, Secrets Manager uses the * Amazon Web Services managed key aws/secretsmanager. If this key * doesn't already exist in your account, then Secrets Manager creates it for you * automatically. All users and roles in the Amazon Web Services account * automatically have access to use aws/secretsmanager. Creating * aws/secretsmanager can result in a one-time significant delay in * returning the result.

You can only use the Amazon Web * Services managed key aws/secretsmanager if you call this operation * using credentials from the same Amazon Web Services account that owns the * secret. If the secret is in a different account, then you must use a customer * managed key and provide the ARN of that KMS key in this field. The user making * the call must have permissions to both the secret and the KMS key in their * respective accounts.

*/ inline UpdateSecretRequest& WithKmsKeyId(const char* value) { SetKmsKeyId(value); return *this;} /** *

The binary data to encrypt and store in the new version of the secret. We * recommend that you store your binary data in a file and then pass the contents * of the file as a parameter.

Either SecretBinary or * SecretString must have a value, but not both.

You can't * access this parameter in the Secrets Manager console.

*/ inline const Aws::Utils::CryptoBuffer& GetSecretBinary() const{ return m_secretBinary; } /** *

The binary data to encrypt and store in the new version of the secret. We * recommend that you store your binary data in a file and then pass the contents * of the file as a parameter.

Either SecretBinary or * SecretString must have a value, but not both.

You can't * access this parameter in the Secrets Manager console.

*/ inline bool SecretBinaryHasBeenSet() const { return m_secretBinaryHasBeenSet; } /** *

The binary data to encrypt and store in the new version of the secret. We * recommend that you store your binary data in a file and then pass the contents * of the file as a parameter.

Either SecretBinary or * SecretString must have a value, but not both.

You can't * access this parameter in the Secrets Manager console.

*/ inline void SetSecretBinary(const Aws::Utils::CryptoBuffer& value) { m_secretBinaryHasBeenSet = true; m_secretBinary = value; } /** *

The binary data to encrypt and store in the new version of the secret. We * recommend that you store your binary data in a file and then pass the contents * of the file as a parameter.

Either SecretBinary or * SecretString must have a value, but not both.

You can't * access this parameter in the Secrets Manager console.

*/ inline void SetSecretBinary(Aws::Utils::CryptoBuffer&& value) { m_secretBinaryHasBeenSet = true; m_secretBinary = std::move(value); } /** *

The binary data to encrypt and store in the new version of the secret. We * recommend that you store your binary data in a file and then pass the contents * of the file as a parameter.

Either SecretBinary or * SecretString must have a value, but not both.

You can't * access this parameter in the Secrets Manager console.

*/ inline UpdateSecretRequest& WithSecretBinary(const Aws::Utils::CryptoBuffer& value) { SetSecretBinary(value); return *this;} /** *

The binary data to encrypt and store in the new version of the secret. We * recommend that you store your binary data in a file and then pass the contents * of the file as a parameter.

Either SecretBinary or * SecretString must have a value, but not both.

You can't * access this parameter in the Secrets Manager console.

*/ inline UpdateSecretRequest& WithSecretBinary(Aws::Utils::CryptoBuffer&& value) { SetSecretBinary(std::move(value)); return *this;} /** *

The text data to encrypt and store in the new version of the secret. We * recommend you use a JSON structure of key/value pairs for your secret value. *

Either SecretBinary or SecretString must have * a value, but not both.

*/ inline const Aws::String& GetSecretString() const{ return m_secretString; } /** *

The text data to encrypt and store in the new version of the secret. We * recommend you use a JSON structure of key/value pairs for your secret value. *

Either SecretBinary or SecretString must have * a value, but not both.

*/ inline bool SecretStringHasBeenSet() const { return m_secretStringHasBeenSet; } /** *

The text data to encrypt and store in the new version of the secret. We * recommend you use a JSON structure of key/value pairs for your secret value. *

Either SecretBinary or SecretString must have * a value, but not both.

*/ inline void SetSecretString(const Aws::String& value) { m_secretStringHasBeenSet = true; m_secretString = value; } /** *

The text data to encrypt and store in the new version of the secret. We * recommend you use a JSON structure of key/value pairs for your secret value. *

Either SecretBinary or SecretString must have * a value, but not both.

*/ inline void SetSecretString(Aws::String&& value) { m_secretStringHasBeenSet = true; m_secretString = std::move(value); } /** *

The text data to encrypt and store in the new version of the secret. We * recommend you use a JSON structure of key/value pairs for your secret value. *

Either SecretBinary or SecretString must have * a value, but not both.

*/ inline void SetSecretString(const char* value) { m_secretStringHasBeenSet = true; m_secretString.assign(value); } /** *

The text data to encrypt and store in the new version of the secret. We * recommend you use a JSON structure of key/value pairs for your secret value. *

Either SecretBinary or SecretString must have * a value, but not both.

*/ inline UpdateSecretRequest& WithSecretString(const Aws::String& value) { SetSecretString(value); return *this;} /** *

The text data to encrypt and store in the new version of the secret. We * recommend you use a JSON structure of key/value pairs for your secret value. *

Either SecretBinary or SecretString must have * a value, but not both.

*/ inline UpdateSecretRequest& WithSecretString(Aws::String&& value) { SetSecretString(std::move(value)); return *this;} /** *

The text data to encrypt and store in the new version of the secret. We * recommend you use a JSON structure of key/value pairs for your secret value. *

Either SecretBinary or SecretString must have * a value, but not both.

*/ inline UpdateSecretRequest& WithSecretString(const char* value) { SetSecretString(value); return *this;} private: Aws::String m_secretId; bool m_secretIdHasBeenSet = false; Aws::String m_clientRequestToken; bool m_clientRequestTokenHasBeenSet = false; Aws::String m_description; bool m_descriptionHasBeenSet = false; Aws::String m_kmsKeyId; bool m_kmsKeyIdHasBeenSet = false; Aws::Utils::CryptoBuffer m_secretBinary; bool m_secretBinaryHasBeenSet = false; Aws::String m_secretString; bool m_secretStringHasBeenSet = false; }; } // namespace Model } // namespace SecretsManager } // namespace Aws