/* * Copyright 2018-2023 Amazon.com, Inc. or its affiliates. All Rights Reserved. * * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with * the License. A copy of the License is located at * * http://aws.amazon.com/apache2.0 * * or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR * CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions * and limitations under the License. */ package com.amazonaws.services.secretsmanager.model; import java.io.Serializable; import javax.annotation.Generated; import com.amazonaws.AmazonWebServiceRequest; /** * * @see AWS API * Documentation */ @Generated("com.amazonaws:aws-java-sdk-code-generator") public class CreateSecretRequest extends com.amazonaws.AmazonWebServiceRequest implements Serializable, Cloneable { /** *

* The name of the new secret. *

*

* The secret name can contain ASCII letters, numbers, and the following characters: /_+=.@- *

*

* Do not end your secret name with a hyphen followed by six characters. If you do so, you risk confusion and * unexpected results when searching for a secret by partial ARN. Secrets Manager automatically adds a hyphen and * six random characters after the secret name at the end of the ARN. *

*/ private String name; /** *

* If you include SecretString or SecretBinary, then Secrets Manager creates an initial * version for the secret, and this parameter specifies the unique identifier for the new version. *

* *

* If you use the Amazon Web Services CLI or one of the Amazon Web Services SDKs to call this operation, then you * can leave this parameter empty. The CLI or SDK generates a random UUID for you and includes it as the value for * this parameter in the request. If you don't use the SDK and instead generate a raw HTTP request to the Secrets * Manager service endpoint, then you must generate a ClientRequestToken yourself for the new version * and include the value in the request. *

*
*

* This value helps ensure idempotency. Secrets Manager uses this value to prevent the accidental creation of * duplicate versions if there are failures and retries during a rotation. We recommend that you generate a UUID-type value to ensure uniqueness of your * versions within the specified secret. *

* *

* This value becomes the VersionId of the new version. *

*/ private String clientRequestToken; /** *

* The description of the secret. *

*/ private String description; /** *

* The ARN, key ID, or alias of the KMS key that Secrets Manager uses to encrypt the secret value in the secret. An * alias is always prefixed by alias/, for example alias/aws/secretsmanager. For more * information, see About * aliases. *

*

* To use a KMS key in a different account, use the key ARN or the alias ARN. *

*

* If you don't specify this value, then Secrets Manager uses the key aws/secretsmanager. If that key * doesn't yet exist, then Secrets Manager creates it for you automatically the first time it encrypts the secret * value. *

*

* If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't * use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS * key. *

*/ private String kmsKeyId; /** *

* The binary data to encrypt and store in the new version of the secret. We recommend that you store your binary * data in a file and then pass the contents of the file as a parameter. *

*

* Either SecretString or SecretBinary must have a value, but not both. *

*

* This parameter is not available in the Secrets Manager console. *

*/ private java.nio.ByteBuffer secretBinary; /** *

* The text data to encrypt and store in this new version of the secret. We recommend you use a JSON structure of * key/value pairs for your secret value. *

*

* Either SecretString or SecretBinary must have a value, but not both. *

*

* If you create a secret by using the Secrets Manager console then Secrets Manager puts the protected secret text * in only the SecretString parameter. The Secrets Manager console stores the information as a JSON * structure of key/value pairs that a Lambda rotation function can parse. *

*/ private String secretString; /** *

* A list of tags to attach to the secret. Each tag is a key and value pair of strings in a JSON text string, for * example: *

*

* [{"Key":"CostCenter","Value":"12345"},{"Key":"environment","Value":"production"}] *

*

* Secrets Manager tag key names are case sensitive. A tag with the key "ABC" is a different tag from one with key * "abc". *

*

* If you check tags in permissions policies as part of your security strategy, then adding or removing a tag can * change permissions. If the completion of this operation would result in you losing your permissions for this * secret, then Secrets Manager blocks the operation and returns an Access Denied error. For more * information, see Control access to secrets using tags and Limit access to identities with tags that match secrets' tags. *

*

* For information about how to format a JSON parameter for the various command line tool environments, see Using JSON for * Parameters. If your command-line tool or SDK requires quotation marks around the parameter, you should use * single quotes to avoid confusion with the double quotes required in the JSON text. *

*

* The following restrictions apply to tags: *

* */ private java.util.List tags; /** *

* A list of Regions and KMS keys to replicate secrets. *

*/ private java.util.List addReplicaRegions; /** *

* Specifies whether to overwrite a secret with the same name in the destination Region. By default, secrets aren't * overwritten. *

*/ private Boolean forceOverwriteReplicaSecret; /** *

* The name of the new secret. *

*

* The secret name can contain ASCII letters, numbers, and the following characters: /_+=.@- *

*

* Do not end your secret name with a hyphen followed by six characters. If you do so, you risk confusion and * unexpected results when searching for a secret by partial ARN. Secrets Manager automatically adds a hyphen and * six random characters after the secret name at the end of the ARN. *

* * @param name * The name of the new secret.

*

* The secret name can contain ASCII letters, numbers, and the following characters: /_+=.@- *

*

* Do not end your secret name with a hyphen followed by six characters. If you do so, you risk confusion and * unexpected results when searching for a secret by partial ARN. Secrets Manager automatically adds a hyphen * and six random characters after the secret name at the end of the ARN. */ public void setName(String name) { this.name = name; } /** *

* The name of the new secret. *

*

* The secret name can contain ASCII letters, numbers, and the following characters: /_+=.@- *

*

* Do not end your secret name with a hyphen followed by six characters. If you do so, you risk confusion and * unexpected results when searching for a secret by partial ARN. Secrets Manager automatically adds a hyphen and * six random characters after the secret name at the end of the ARN. *

* * @return The name of the new secret.

*

* The secret name can contain ASCII letters, numbers, and the following characters: /_+=.@- *

*

* Do not end your secret name with a hyphen followed by six characters. If you do so, you risk confusion * and unexpected results when searching for a secret by partial ARN. Secrets Manager automatically adds a * hyphen and six random characters after the secret name at the end of the ARN. */ public String getName() { return this.name; } /** *

* The name of the new secret. *

*

* The secret name can contain ASCII letters, numbers, and the following characters: /_+=.@- *

*

* Do not end your secret name with a hyphen followed by six characters. If you do so, you risk confusion and * unexpected results when searching for a secret by partial ARN. Secrets Manager automatically adds a hyphen and * six random characters after the secret name at the end of the ARN. *

* * @param name * The name of the new secret.

*

* The secret name can contain ASCII letters, numbers, and the following characters: /_+=.@- *

*

* Do not end your secret name with a hyphen followed by six characters. If you do so, you risk confusion and * unexpected results when searching for a secret by partial ARN. Secrets Manager automatically adds a hyphen * and six random characters after the secret name at the end of the ARN. * @return Returns a reference to this object so that method calls can be chained together. */ public CreateSecretRequest withName(String name) { setName(name); return this; } /** *

* If you include SecretString or SecretBinary, then Secrets Manager creates an initial * version for the secret, and this parameter specifies the unique identifier for the new version. *

* *

* If you use the Amazon Web Services CLI or one of the Amazon Web Services SDKs to call this operation, then you * can leave this parameter empty. The CLI or SDK generates a random UUID for you and includes it as the value for * this parameter in the request. If you don't use the SDK and instead generate a raw HTTP request to the Secrets * Manager service endpoint, then you must generate a ClientRequestToken yourself for the new version * and include the value in the request. *

*
*

* This value helps ensure idempotency. Secrets Manager uses this value to prevent the accidental creation of * duplicate versions if there are failures and retries during a rotation. We recommend that you generate a UUID-type value to ensure uniqueness of your * versions within the specified secret. *

* *

* This value becomes the VersionId of the new version. *

* * @param clientRequestToken * If you include SecretString or SecretBinary, then Secrets Manager creates an * initial version for the secret, and this parameter specifies the unique identifier for the new version. *

*

* If you use the Amazon Web Services CLI or one of the Amazon Web Services SDKs to call this operation, then * you can leave this parameter empty. The CLI or SDK generates a random UUID for you and includes it as the * value for this parameter in the request. If you don't use the SDK and instead generate a raw HTTP request * to the Secrets Manager service endpoint, then you must generate a ClientRequestToken yourself * for the new version and include the value in the request. *

*
*

* This value helps ensure idempotency. Secrets Manager uses this value to prevent the accidental creation of * duplicate versions if there are failures and retries during a rotation. We recommend that you generate a * UUID-type value to ensure * uniqueness of your versions within the specified secret. *

* *

* This value becomes the VersionId of the new version. */ public void setClientRequestToken(String clientRequestToken) { this.clientRequestToken = clientRequestToken; } /** *

* If you include SecretString or SecretBinary, then Secrets Manager creates an initial * version for the secret, and this parameter specifies the unique identifier for the new version. *

* *

* If you use the Amazon Web Services CLI or one of the Amazon Web Services SDKs to call this operation, then you * can leave this parameter empty. The CLI or SDK generates a random UUID for you and includes it as the value for * this parameter in the request. If you don't use the SDK and instead generate a raw HTTP request to the Secrets * Manager service endpoint, then you must generate a ClientRequestToken yourself for the new version * and include the value in the request. *

*
*

* This value helps ensure idempotency. Secrets Manager uses this value to prevent the accidental creation of * duplicate versions if there are failures and retries during a rotation. We recommend that you generate a UUID-type value to ensure uniqueness of your * versions within the specified secret. *

* *

* This value becomes the VersionId of the new version. *

* * @return If you include SecretString or SecretBinary, then Secrets Manager creates an * initial version for the secret, and this parameter specifies the unique identifier for the new version. *

*

* If you use the Amazon Web Services CLI or one of the Amazon Web Services SDKs to call this operation, * then you can leave this parameter empty. The CLI or SDK generates a random UUID for you and includes it * as the value for this parameter in the request. If you don't use the SDK and instead generate a raw HTTP * request to the Secrets Manager service endpoint, then you must generate a ClientRequestToken * yourself for the new version and include the value in the request. *

*
*

* This value helps ensure idempotency. Secrets Manager uses this value to prevent the accidental creation * of duplicate versions if there are failures and retries during a rotation. We recommend that you generate * a UUID-type value to ensure * uniqueness of your versions within the specified secret. *

* *

* This value becomes the VersionId of the new version. */ public String getClientRequestToken() { return this.clientRequestToken; } /** *

* If you include SecretString or SecretBinary, then Secrets Manager creates an initial * version for the secret, and this parameter specifies the unique identifier for the new version. *

* *

* If you use the Amazon Web Services CLI or one of the Amazon Web Services SDKs to call this operation, then you * can leave this parameter empty. The CLI or SDK generates a random UUID for you and includes it as the value for * this parameter in the request. If you don't use the SDK and instead generate a raw HTTP request to the Secrets * Manager service endpoint, then you must generate a ClientRequestToken yourself for the new version * and include the value in the request. *

*
*

* This value helps ensure idempotency. Secrets Manager uses this value to prevent the accidental creation of * duplicate versions if there are failures and retries during a rotation. We recommend that you generate a UUID-type value to ensure uniqueness of your * versions within the specified secret. *

* *

* This value becomes the VersionId of the new version. *

* * @param clientRequestToken * If you include SecretString or SecretBinary, then Secrets Manager creates an * initial version for the secret, and this parameter specifies the unique identifier for the new version. *

*

* If you use the Amazon Web Services CLI or one of the Amazon Web Services SDKs to call this operation, then * you can leave this parameter empty. The CLI or SDK generates a random UUID for you and includes it as the * value for this parameter in the request. If you don't use the SDK and instead generate a raw HTTP request * to the Secrets Manager service endpoint, then you must generate a ClientRequestToken yourself * for the new version and include the value in the request. *

*
*

* This value helps ensure idempotency. Secrets Manager uses this value to prevent the accidental creation of * duplicate versions if there are failures and retries during a rotation. We recommend that you generate a * UUID-type value to ensure * uniqueness of your versions within the specified secret. *

* *

* This value becomes the VersionId of the new version. * @return Returns a reference to this object so that method calls can be chained together. */ public CreateSecretRequest withClientRequestToken(String clientRequestToken) { setClientRequestToken(clientRequestToken); return this; } /** *

* The description of the secret. *

* * @param description * The description of the secret. */ public void setDescription(String description) { this.description = description; } /** *

* The description of the secret. *

* * @return The description of the secret. */ public String getDescription() { return this.description; } /** *

* The description of the secret. *

* * @param description * The description of the secret. * @return Returns a reference to this object so that method calls can be chained together. */ public CreateSecretRequest withDescription(String description) { setDescription(description); return this; } /** *

* The ARN, key ID, or alias of the KMS key that Secrets Manager uses to encrypt the secret value in the secret. An * alias is always prefixed by alias/, for example alias/aws/secretsmanager. For more * information, see About * aliases. *

*

* To use a KMS key in a different account, use the key ARN or the alias ARN. *

*

* If you don't specify this value, then Secrets Manager uses the key aws/secretsmanager. If that key * doesn't yet exist, then Secrets Manager creates it for you automatically the first time it encrypts the secret * value. *

*

* If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't * use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS * key. *

* * @param kmsKeyId * The ARN, key ID, or alias of the KMS key that Secrets Manager uses to encrypt the secret value in the * secret. An alias is always prefixed by alias/, for example * alias/aws/secretsmanager. For more information, see About aliases.

*

* To use a KMS key in a different account, use the key ARN or the alias ARN. *

*

* If you don't specify this value, then Secrets Manager uses the key aws/secretsmanager. If * that key doesn't yet exist, then Secrets Manager creates it for you automatically the first time it * encrypts the secret value. *

*

* If the secret is in a different Amazon Web Services account from the credentials calling the API, then you * can't use aws/secretsmanager to encrypt the secret, and you must create and use a customer * managed KMS key. */ public void setKmsKeyId(String kmsKeyId) { this.kmsKeyId = kmsKeyId; } /** *

* The ARN, key ID, or alias of the KMS key that Secrets Manager uses to encrypt the secret value in the secret. An * alias is always prefixed by alias/, for example alias/aws/secretsmanager. For more * information, see About * aliases. *

*

* To use a KMS key in a different account, use the key ARN or the alias ARN. *

*

* If you don't specify this value, then Secrets Manager uses the key aws/secretsmanager. If that key * doesn't yet exist, then Secrets Manager creates it for you automatically the first time it encrypts the secret * value. *

*

* If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't * use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS * key. *

* * @return The ARN, key ID, or alias of the KMS key that Secrets Manager uses to encrypt the secret value in the * secret. An alias is always prefixed by alias/, for example * alias/aws/secretsmanager. For more information, see About aliases.

*

* To use a KMS key in a different account, use the key ARN or the alias ARN. *

*

* If you don't specify this value, then Secrets Manager uses the key aws/secretsmanager. If * that key doesn't yet exist, then Secrets Manager creates it for you automatically the first time it * encrypts the secret value. *

*

* If the secret is in a different Amazon Web Services account from the credentials calling the API, then * you can't use aws/secretsmanager to encrypt the secret, and you must create and use a * customer managed KMS key. */ public String getKmsKeyId() { return this.kmsKeyId; } /** *

* The ARN, key ID, or alias of the KMS key that Secrets Manager uses to encrypt the secret value in the secret. An * alias is always prefixed by alias/, for example alias/aws/secretsmanager. For more * information, see About * aliases. *

*

* To use a KMS key in a different account, use the key ARN or the alias ARN. *

*

* If you don't specify this value, then Secrets Manager uses the key aws/secretsmanager. If that key * doesn't yet exist, then Secrets Manager creates it for you automatically the first time it encrypts the secret * value. *

*

* If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't * use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS * key. *

* * @param kmsKeyId * The ARN, key ID, or alias of the KMS key that Secrets Manager uses to encrypt the secret value in the * secret. An alias is always prefixed by alias/, for example * alias/aws/secretsmanager. For more information, see About aliases.

*

* To use a KMS key in a different account, use the key ARN or the alias ARN. *

*

* If you don't specify this value, then Secrets Manager uses the key aws/secretsmanager. If * that key doesn't yet exist, then Secrets Manager creates it for you automatically the first time it * encrypts the secret value. *

*

* If the secret is in a different Amazon Web Services account from the credentials calling the API, then you * can't use aws/secretsmanager to encrypt the secret, and you must create and use a customer * managed KMS key. * @return Returns a reference to this object so that method calls can be chained together. */ public CreateSecretRequest withKmsKeyId(String kmsKeyId) { setKmsKeyId(kmsKeyId); return this; } /** *

* The binary data to encrypt and store in the new version of the secret. We recommend that you store your binary * data in a file and then pass the contents of the file as a parameter. *

*

* Either SecretString or SecretBinary must have a value, but not both. *

*

* This parameter is not available in the Secrets Manager console. *

*

* The AWS SDK for Java performs a Base64 encoding on this field before sending this request to the AWS service. * Users of the SDK should not perform Base64 encoding on this field. *

*

* Warning: ByteBuffers returned by the SDK are mutable. Changes to the content or position of the byte buffer will * be seen by all objects that have a reference to this object. It is recommended to call ByteBuffer.duplicate() or * ByteBuffer.asReadOnlyBuffer() before using or reading from the buffer. This behavior will be changed in a future * major version of the SDK. *

* * @param secretBinary * The binary data to encrypt and store in the new version of the secret. We recommend that you store your * binary data in a file and then pass the contents of the file as a parameter.

*

* Either SecretString or SecretBinary must have a value, but not both. *

*

* This parameter is not available in the Secrets Manager console. */ public void setSecretBinary(java.nio.ByteBuffer secretBinary) { this.secretBinary = secretBinary; } /** *

* The binary data to encrypt and store in the new version of the secret. We recommend that you store your binary * data in a file and then pass the contents of the file as a parameter. *

*

* Either SecretString or SecretBinary must have a value, but not both. *

*

* This parameter is not available in the Secrets Manager console. *

*

* {@code ByteBuffer}s are stateful. Calling their {@code get} methods changes their {@code position}. We recommend * using {@link java.nio.ByteBuffer#asReadOnlyBuffer()} to create a read-only view of the buffer with an independent * {@code position}, and calling {@code get} methods on this rather than directly on the returned {@code ByteBuffer}. * Doing so will ensure that anyone else using the {@code ByteBuffer} will not be affected by changes to the * {@code position}. *

* * @return The binary data to encrypt and store in the new version of the secret. We recommend that you store your * binary data in a file and then pass the contents of the file as a parameter.

*

* Either SecretString or SecretBinary must have a value, but not both. *

*

* This parameter is not available in the Secrets Manager console. */ public java.nio.ByteBuffer getSecretBinary() { return this.secretBinary; } /** *

* The binary data to encrypt and store in the new version of the secret. We recommend that you store your binary * data in a file and then pass the contents of the file as a parameter. *

*

* Either SecretString or SecretBinary must have a value, but not both. *

*

* This parameter is not available in the Secrets Manager console. *

*

* The AWS SDK for Java performs a Base64 encoding on this field before sending this request to the AWS service. * Users of the SDK should not perform Base64 encoding on this field. *

*

* Warning: ByteBuffers returned by the SDK are mutable. Changes to the content or position of the byte buffer will * be seen by all objects that have a reference to this object. It is recommended to call ByteBuffer.duplicate() or * ByteBuffer.asReadOnlyBuffer() before using or reading from the buffer. This behavior will be changed in a future * major version of the SDK. *

* * @param secretBinary * The binary data to encrypt and store in the new version of the secret. We recommend that you store your * binary data in a file and then pass the contents of the file as a parameter.

*

* Either SecretString or SecretBinary must have a value, but not both. *

*

* This parameter is not available in the Secrets Manager console. * @return Returns a reference to this object so that method calls can be chained together. */ public CreateSecretRequest withSecretBinary(java.nio.ByteBuffer secretBinary) { setSecretBinary(secretBinary); return this; } /** *

* The text data to encrypt and store in this new version of the secret. We recommend you use a JSON structure of * key/value pairs for your secret value. *

*

* Either SecretString or SecretBinary must have a value, but not both. *

*

* If you create a secret by using the Secrets Manager console then Secrets Manager puts the protected secret text * in only the SecretString parameter. The Secrets Manager console stores the information as a JSON * structure of key/value pairs that a Lambda rotation function can parse. *

* * @param secretString * The text data to encrypt and store in this new version of the secret. We recommend you use a JSON * structure of key/value pairs for your secret value.

*

* Either SecretString or SecretBinary must have a value, but not both. *

*

* If you create a secret by using the Secrets Manager console then Secrets Manager puts the protected secret * text in only the SecretString parameter. The Secrets Manager console stores the information * as a JSON structure of key/value pairs that a Lambda rotation function can parse. */ public void setSecretString(String secretString) { this.secretString = secretString; } /** *

* The text data to encrypt and store in this new version of the secret. We recommend you use a JSON structure of * key/value pairs for your secret value. *

*

* Either SecretString or SecretBinary must have a value, but not both. *

*

* If you create a secret by using the Secrets Manager console then Secrets Manager puts the protected secret text * in only the SecretString parameter. The Secrets Manager console stores the information as a JSON * structure of key/value pairs that a Lambda rotation function can parse. *

* * @return The text data to encrypt and store in this new version of the secret. We recommend you use a JSON * structure of key/value pairs for your secret value.

*

* Either SecretString or SecretBinary must have a value, but not both. *

*

* If you create a secret by using the Secrets Manager console then Secrets Manager puts the protected * secret text in only the SecretString parameter. The Secrets Manager console stores the * information as a JSON structure of key/value pairs that a Lambda rotation function can parse. */ public String getSecretString() { return this.secretString; } /** *

* The text data to encrypt and store in this new version of the secret. We recommend you use a JSON structure of * key/value pairs for your secret value. *

*

* Either SecretString or SecretBinary must have a value, but not both. *

*

* If you create a secret by using the Secrets Manager console then Secrets Manager puts the protected secret text * in only the SecretString parameter. The Secrets Manager console stores the information as a JSON * structure of key/value pairs that a Lambda rotation function can parse. *

* * @param secretString * The text data to encrypt and store in this new version of the secret. We recommend you use a JSON * structure of key/value pairs for your secret value.

*

* Either SecretString or SecretBinary must have a value, but not both. *

*

* If you create a secret by using the Secrets Manager console then Secrets Manager puts the protected secret * text in only the SecretString parameter. The Secrets Manager console stores the information * as a JSON structure of key/value pairs that a Lambda rotation function can parse. * @return Returns a reference to this object so that method calls can be chained together. */ public CreateSecretRequest withSecretString(String secretString) { setSecretString(secretString); return this; } /** *

* A list of tags to attach to the secret. Each tag is a key and value pair of strings in a JSON text string, for * example: *

*

* [{"Key":"CostCenter","Value":"12345"},{"Key":"environment","Value":"production"}] *

*

* Secrets Manager tag key names are case sensitive. A tag with the key "ABC" is a different tag from one with key * "abc". *

*

* If you check tags in permissions policies as part of your security strategy, then adding or removing a tag can * change permissions. If the completion of this operation would result in you losing your permissions for this * secret, then Secrets Manager blocks the operation and returns an Access Denied error. For more * information, see Control access to secrets using tags and Limit access to identities with tags that match secrets' tags. *

*

* For information about how to format a JSON parameter for the various command line tool environments, see Using JSON for * Parameters. If your command-line tool or SDK requires quotation marks around the parameter, you should use * single quotes to avoid confusion with the double quotes required in the JSON text. *

*

* The following restrictions apply to tags: *

* * * @return A list of tags to attach to the secret. Each tag is a key and value pair of strings in a JSON text * string, for example:

*

* [{"Key":"CostCenter","Value":"12345"},{"Key":"environment","Value":"production"}] *

*

* Secrets Manager tag key names are case sensitive. A tag with the key "ABC" is a different tag from one * with key "abc". *

*

* If you check tags in permissions policies as part of your security strategy, then adding or removing a * tag can change permissions. If the completion of this operation would result in you losing your * permissions for this secret, then Secrets Manager blocks the operation and returns an * Access Denied error. For more information, see Control access to secrets using tags and Limit access to identities with tags that match secrets' tags. *

*

* For information about how to format a JSON parameter for the various command line tool environments, see * Using * JSON for Parameters. If your command-line tool or SDK requires quotation marks around the parameter, * you should use single quotes to avoid confusion with the double quotes required in the JSON text. *

*

* The following restrictions apply to tags: *

*