/*******************************************************************************
* Copyright 2012-2019 Amazon.com, Inc. or its affiliates. All Rights Reserved.
* Licensed under the Apache License, Version 2.0 (the "License"). You may not use
* this file except in compliance with the License. A copy of the License is located at
*
* http://aws.amazon.com/apache2.0
*
* or in the "license" file accompanying this file.
* This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
* CONDITIONS OF ANY KIND, either express or implied. See the License for the
* specific language governing permissions and limitations under the License.
* *****************************************************************************
*
* AWS Tools for Windows (TM) PowerShell (TM)
*
*/
using System;
using System.Collections.Generic;
using System.Linq;
using System.Management.Automation;
using System.Text;
using Amazon.PowerShell.Common;
using Amazon.Runtime;
using Amazon.SecretsManager;
using Amazon.SecretsManager.Model;
namespace Amazon.PowerShell.Cmdlets.SEC
{
///
/// Creates a new secret. A secret can be a password, a set of credentials such
/// as a user name and password, an OAuth token, or other secret information that you
/// store in an encrypted form in Secrets Manager. The secret also includes the connection
/// information to access a database or other service, which Secrets Manager doesn't encrypt.
/// A secret in Secrets Manager consists of both the protected secret data and the important
/// information needed to manage the secret.
///
///
///
/// For secrets that use managed rotation, you need to create the secret through
/// the managing service. For more information, see Secrets
/// Manager secrets managed by other Amazon Web Services services.
///
/// For information about creating a secret in the console, see Create
/// a secret.
///
/// To create a secret, you can provide the secret value to be encrypted in either the
/// SecretString
parameter or the SecretBinary
parameter, but
/// not both. If you include SecretString
or SecretBinary
then
/// Secrets Manager creates an initial secret version and automatically attaches the staging
/// label AWSCURRENT
to it.
///
/// For database credentials you want to rotate, for Secrets Manager to be able to rotate
/// the secret, you must make sure the JSON you store in the SecretString
/// matches the JSON
/// structure of a database secret.
///
/// If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services
/// managed key aws/secretsmanager
. If this key doesn't already exist in
/// your account, then Secrets Manager creates it for you automatically. All users and
/// roles in the Amazon Web Services account automatically have access to use aws/secretsmanager
.
/// Creating aws/secretsmanager
can result in a one-time significant delay
/// in returning the result.
///
/// If the secret is in a different Amazon Web Services account from the credentials calling
/// the API, then you can't use aws/secretsmanager
to encrypt the secret,
/// and you must create and use a customer managed KMS key.
///
/// Secrets Manager generates a CloudTrail log entry when you call this action. Do not
/// include sensitive information in request parameters except SecretBinary
/// or SecretString
because it might be logged. For more information, see
/// Logging
/// Secrets Manager events with CloudTrail.
/// Required permissions: secretsmanager:CreateSecret
. If you include
/// tags in the secret, you also need secretsmanager:TagResource
. For more
/// information, see
/// IAM policy actions for Secrets Manager and Authentication
/// and access control in Secrets Manager.
///
/// To encrypt the secret with a KMS key other than aws/secretsmanager
, you
/// need kms:GenerateDataKey
and kms:Decrypt
permission to the
/// key.
///
///
[Cmdlet("New", "SECSecret", SupportsShouldProcess = true, ConfirmImpact = ConfirmImpact.Medium)]
[OutputType("Amazon.SecretsManager.Model.CreateSecretResponse")]
[AWSCmdlet("Calls the AWS Secrets Manager CreateSecret API operation.", Operation = new[] {"CreateSecret"}, SelectReturnType = typeof(Amazon.SecretsManager.Model.CreateSecretResponse))]
[AWSCmdletOutput("Amazon.SecretsManager.Model.CreateSecretResponse",
"This cmdlet returns an Amazon.SecretsManager.Model.CreateSecretResponse object containing multiple properties. The object can also be referenced from properties attached to the cmdlet entry in the $AWSHistory stack."
)]
public partial class NewSECSecretCmdlet : AmazonSecretsManagerClientCmdlet, IExecutor
{
protected override bool IsSensitiveRequest { get; set; } = true;
#region Parameter AddReplicaRegion
///
///
/// A list of Regions and KMS keys to replicate secrets.
///
///
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
[Alias("AddReplicaRegions")]
public Amazon.SecretsManager.Model.ReplicaRegionType[] AddReplicaRegion { get; set; }
#endregion
#region Parameter ClientRequestToken
///
///
/// If you include SecretString
or SecretBinary
, then Secrets
/// Manager creates an initial version for the secret, and this parameter specifies the
/// unique identifier for the new version. If you use the Amazon Web Services CLI or one of the Amazon Web Services SDKs to call
/// this operation, then you can leave this parameter empty. The CLI or SDK generates
/// a random UUID for you and includes it as the value for this parameter in the request.
/// If you don't use the SDK and instead generate a raw HTTP request to the Secrets Manager
/// service endpoint, then you must generate a ClientRequestToken
yourself
/// for the new version and include the value in the request.This value helps ensure idempotency. Secrets Manager uses this value to prevent the
/// accidental creation of duplicate versions if there are failures and retries during
/// a rotation. We recommend that you generate a UUID-type
/// value to ensure uniqueness of your versions within the specified secret. - If the
ClientRequestToken
value isn't already associated with a version
/// of the secret then a new version of the secret is created. - If a version with this value already exists and the version
SecretString
/// and SecretBinary
values are the same as those in the request, then the
/// request is ignored. - If a version with this value already exists and that version's
SecretString
/// and SecretBinary
values are different from those in the request, then
/// the request fails because you cannot modify an existing version. Instead, use PutSecretValue
/// to create a new version.
This value becomes the VersionId
of the new version.
///
///
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
public System.String ClientRequestToken { get; set; }
#endregion
#region Parameter Description
///
///
/// The description of the secret.
///
///
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
public System.String Description { get; set; }
#endregion
#region Parameter ForceOverwriteReplicaSecret
///
///
/// Specifies whether to overwrite a secret with the same name in the destination Region.
/// By default, secrets aren't overwritten.
///
///
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
public System.Boolean? ForceOverwriteReplicaSecret { get; set; }
#endregion
#region Parameter KmsKeyId
///
///
/// The ARN, key ID, or alias of the KMS key that Secrets Manager uses to encrypt the
/// secret value in the secret. An alias is always prefixed by alias/
, for
/// example alias/aws/secretsmanager
. For more information, see About
/// aliases.To use a KMS key in a different account, use the key ARN or the alias ARN.If you don't specify this value, then Secrets Manager uses the key aws/secretsmanager
.
/// If that key doesn't yet exist, then Secrets Manager creates it for you automatically
/// the first time it encrypts the secret value.If the secret is in a different Amazon Web Services account from the credentials calling
/// the API, then you can't use aws/secretsmanager
to encrypt the secret,
/// and you must create and use a customer managed KMS key.
///
///
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
public System.String KmsKeyId { get; set; }
#endregion
#region Parameter Name
///
///
/// The name of the new secret.The secret name can contain ASCII letters, numbers, and the following characters:
/// /_+=.@-Do not end your secret name with a hyphen followed by six characters. If you do so,
/// you risk confusion and unexpected results when searching for a secret by partial ARN.
/// Secrets Manager automatically adds a hyphen and six random characters after the secret
/// name at the end of the ARN.
///
///
#if !MODULAR
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
#else
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true, Mandatory = true)]
[System.Management.Automation.AllowEmptyString]
[System.Management.Automation.AllowNull]
#endif
[Amazon.PowerShell.Common.AWSRequiredParameter]
public System.String Name { get; set; }
#endregion
#region Parameter SecretBinary
///
///
/// The binary data to encrypt and store in the new version of the secret. We recommend
/// that you store your binary data in a file and then pass the contents of the file as
/// a parameter.Either SecretString
or SecretBinary
must have a value, but
/// not both.This parameter is not available in the Secrets Manager console.
///
/// The cmdlet will automatically convert the supplied parameter of type string, string[], System.IO.FileInfo or System.IO.Stream to byte[] before supplying it to the service.
///
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
[Amazon.PowerShell.Common.MemoryStreamParameterConverter]
public byte[] SecretBinary { get; set; }
#endregion
#region Parameter SecretString
///
///
/// The text data to encrypt and store in this new version of the secret. We recommend
/// you use a JSON structure of key/value pairs for your secret value.Either SecretString
or SecretBinary
must have a value, but
/// not both.If you create a secret by using the Secrets Manager console then Secrets Manager puts
/// the protected secret text in only the SecretString
parameter. The Secrets
/// Manager console stores the information as a JSON structure of key/value pairs that
/// a Lambda rotation function can parse.
///
///
[System.Management.Automation.Parameter(Position = 0, ValueFromPipelineByPropertyName = true, ValueFromPipeline = true)]
public System.String SecretString { get; set; }
#endregion
#region Parameter Tag
///
///
/// A list of tags to attach to the secret. Each tag is a key and value pair of strings
/// in a JSON text string, for example:[{"Key":"CostCenter","Value":"12345"},{"Key":"environment","Value":"production"}]
Secrets Manager tag key names are case sensitive. A tag with the key "ABC" is a different
/// tag from one with key "abc".If you check tags in permissions policies as part of your security strategy, then
/// adding or removing a tag can change permissions. If the completion of this operation
/// would result in you losing your permissions for this secret, then Secrets Manager
/// blocks the operation and returns an Access Denied
error. For more information,
/// see Control
/// access to secrets using tags and Limit
/// access to identities with tags that match secrets' tags.For information about how to format a JSON parameter for the various command line
/// tool environments, see Using
/// JSON for Parameters. If your command-line tool or SDK requires quotation marks
/// around the parameter, you should use single quotes to avoid confusion with the double
/// quotes required in the JSON text.The following restrictions apply to tags:- Maximum number of tags per secret: 50
- Maximum key length: 127 Unicode characters in UTF-8
- Maximum value length: 255 Unicode characters in UTF-8
- Tag keys and values are case sensitive.
- Do not use the
aws:
prefix in your tag names or values because Amazon
/// Web Services reserves it for Amazon Web Services use. You can't edit or delete tag
/// names or values with this prefix. Tags with this prefix do not count against your
/// tags per secret limit. - If you use your tagging schema across multiple services and resources, other services
/// might have restrictions on allowed characters. Generally allowed characters: letters,
/// spaces, and numbers representable in UTF-8, plus the following special characters:
/// + - = . _ : / @.
///
///
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
[Alias("Tags")]
public Amazon.SecretsManager.Model.Tag[] Tag { get; set; }
#endregion
#region Parameter Select
///
/// Use the -Select parameter to control the cmdlet output. The default value is '*'.
/// Specifying -Select '*' will result in the cmdlet returning the whole service response (Amazon.SecretsManager.Model.CreateSecretResponse).
/// Specifying the name of a property of type Amazon.SecretsManager.Model.CreateSecretResponse will result in that property being returned.
/// Specifying -Select '^ParameterName' will result in the cmdlet returning the selected cmdlet parameter value.
///
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
public string Select { get; set; } = "*";
#endregion
#region Parameter PassThru
///
/// Changes the cmdlet behavior to return the value passed to the SecretString parameter.
/// The -PassThru parameter is deprecated, use -Select '^SecretString' instead. This parameter will be removed in a future version.
///
[System.Obsolete("The -PassThru parameter is deprecated, use -Select '^SecretString' instead. This parameter will be removed in a future version.")]
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
public SwitchParameter PassThru { get; set; }
#endregion
#region Parameter Force
///
/// This parameter overrides confirmation prompts to force
/// the cmdlet to continue its operation. This parameter should always
/// be used with caution.
///
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
public SwitchParameter Force { get; set; }
#endregion
protected override void ProcessRecord()
{
this._AWSSignerType = "v4";
base.ProcessRecord();
var resourceIdentifiersText = FormatParameterValuesForConfirmationMsg(nameof(this.Name), MyInvocation.BoundParameters);
if (!ConfirmShouldProceed(this.Force.IsPresent, resourceIdentifiersText, "New-SECSecret (CreateSecret)"))
{
return;
}
var context = new CmdletContext();
// allow for manipulation of parameters prior to loading into context
PreExecutionContextLoad(context);
#pragma warning disable CS0618, CS0612 //A class member was marked with the Obsolete attribute
if (ParameterWasBound(nameof(this.Select)))
{
context.Select = CreateSelectDelegate(Select) ??
throw new System.ArgumentException("Invalid value for -Select parameter.", nameof(this.Select));
if (this.PassThru.IsPresent)
{
throw new System.ArgumentException("-PassThru cannot be used when -Select is specified.", nameof(this.Select));
}
}
else if (this.PassThru.IsPresent)
{
context.Select = (response, cmdlet) => this.SecretString;
}
#pragma warning restore CS0618, CS0612 //A class member was marked with the Obsolete attribute
if (this.AddReplicaRegion != null)
{
context.AddReplicaRegion = new List(this.AddReplicaRegion);
}
context.ClientRequestToken = this.ClientRequestToken;
context.Description = this.Description;
context.ForceOverwriteReplicaSecret = this.ForceOverwriteReplicaSecret;
context.KmsKeyId = this.KmsKeyId;
context.Name = this.Name;
#if MODULAR
if (this.Name == null && ParameterWasBound(nameof(this.Name)))
{
WriteWarning("You are passing $null as a value for parameter Name which is marked as required. In case you believe this parameter was incorrectly marked as required, report this by opening an issue at https://github.com/aws/aws-tools-for-powershell/issues.");
}
#endif
context.SecretBinary = this.SecretBinary;
context.SecretString = this.SecretString;
if (this.Tag != null)
{
context.Tag = new List(this.Tag);
}
// allow further manipulation of loaded context prior to processing
PostExecutionContextLoad(context);
var output = Execute(context) as CmdletOutput;
ProcessOutput(output);
}
#region IExecutor Members
public object Execute(ExecutorContext context)
{
System.IO.MemoryStream _SecretBinaryStream = null;
try
{
var cmdletContext = context as CmdletContext;
// create request
var request = new Amazon.SecretsManager.Model.CreateSecretRequest();
if (cmdletContext.AddReplicaRegion != null)
{
request.AddReplicaRegions = cmdletContext.AddReplicaRegion;
}
if (cmdletContext.ClientRequestToken != null)
{
request.ClientRequestToken = cmdletContext.ClientRequestToken;
}
if (cmdletContext.Description != null)
{
request.Description = cmdletContext.Description;
}
if (cmdletContext.ForceOverwriteReplicaSecret != null)
{
request.ForceOverwriteReplicaSecret = cmdletContext.ForceOverwriteReplicaSecret.Value;
}
if (cmdletContext.KmsKeyId != null)
{
request.KmsKeyId = cmdletContext.KmsKeyId;
}
if (cmdletContext.Name != null)
{
request.Name = cmdletContext.Name;
}
if (cmdletContext.SecretBinary != null)
{
_SecretBinaryStream = new System.IO.MemoryStream(cmdletContext.SecretBinary);
request.SecretBinary = _SecretBinaryStream;
}
if (cmdletContext.SecretString != null)
{
request.SecretString = cmdletContext.SecretString;
}
if (cmdletContext.Tag != null)
{
request.Tags = cmdletContext.Tag;
}
CmdletOutput output;
// issue call
var client = Client ?? CreateClient(_CurrentCredentials, _RegionEndpoint);
try
{
var response = CallAWSServiceOperation(client, request);
object pipelineOutput = null;
pipelineOutput = cmdletContext.Select(response, this);
output = new CmdletOutput
{
PipelineOutput = pipelineOutput,
ServiceResponse = response
};
}
catch (Exception e)
{
output = new CmdletOutput { ErrorResponse = e };
}
return output;
}
finally
{
if( _SecretBinaryStream != null)
{
_SecretBinaryStream.Dispose();
}
}
}
public ExecutorContext CreateContext()
{
return new CmdletContext();
}
#endregion
#region AWS Service Operation Call
private Amazon.SecretsManager.Model.CreateSecretResponse CallAWSServiceOperation(IAmazonSecretsManager client, Amazon.SecretsManager.Model.CreateSecretRequest request)
{
Utils.Common.WriteVerboseEndpointMessage(this, client.Config, "AWS Secrets Manager", "CreateSecret");
try
{
#if DESKTOP
return client.CreateSecret(request);
#elif CORECLR
return client.CreateSecretAsync(request).GetAwaiter().GetResult();
#else
#error "Unknown build edition"
#endif
}
catch (AmazonServiceException exc)
{
var webException = exc.InnerException as System.Net.WebException;
if (webException != null)
{
throw new Exception(Utils.Common.FormatNameResolutionFailureMessage(client.Config, webException.Message), webException);
}
throw;
}
}
#endregion
internal partial class CmdletContext : ExecutorContext
{
public List AddReplicaRegion { get; set; }
public System.String ClientRequestToken { get; set; }
public System.String Description { get; set; }
public System.Boolean? ForceOverwriteReplicaSecret { get; set; }
public System.String KmsKeyId { get; set; }
public System.String Name { get; set; }
public byte[] SecretBinary { get; set; }
public System.String SecretString { get; set; }
public List Tag { get; set; }
public System.Func Select { get; set; } =
(response, cmdlet) => response;
}
}
}