#[non_exhaustive]pub struct RotateSecretInput {
pub secret_id: Option<String>,
pub client_request_token: Option<String>,
pub rotation_lambda_arn: Option<String>,
pub rotation_rules: Option<RotationRulesType>,
pub rotate_immediately: Option<bool>,
}
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.secret_id: Option<String>
The ARN or name of the secret to rotate.
For an ARN, we recommend that you specify a complete ARN rather than a partial ARN. See Finding a secret from a partial ARN.
client_request_token: Option<String>
A unique identifier for the new version of the secret. You only need to specify this value if you implement your own retry logic and you want to ensure that Secrets Manager doesn't attempt to create a secret version twice.
If you use the Amazon Web Services CLI or one of the Amazon Web Services SDKs to call this operation, then you can leave this parameter empty. The CLI or SDK generates a random UUID for you and includes it as the value for this parameter in the request.
If you generate a raw HTTP request to the Secrets Manager service endpoint, then you must generate a ClientRequestToken
and include it in the request.
This value helps ensure idempotency. Secrets Manager uses this value to prevent the accidental creation of duplicate versions if there are failures and retries during a rotation. We recommend that you generate a UUID-type value to ensure uniqueness of your versions within the specified secret.
rotation_lambda_arn: Option<String>
For secrets that use a Lambda rotation function to rotate, the ARN of the Lambda rotation function.
For secrets that use managed rotation, omit this field. For more information, see Managed rotation in the Secrets Manager User Guide.
rotation_rules: Option<RotationRulesType>
A structure that defines the rotation configuration for this secret.
rotate_immediately: Option<bool>
Specifies whether to rotate the secret immediately or wait until the next scheduled rotation window. The rotation schedule is defined in RotateSecretRequest$RotationRules
.
For secrets that use a Lambda rotation function to rotate, if you don't immediately rotate the secret, Secrets Manager tests the rotation configuration by running the testSecret
step of the Lambda rotation function. The test creates an AWSPENDING
version of the secret and then removes it.
By default, Secrets Manager rotates the secret immediately.
Implementations§
source§impl RotateSecretInput
impl RotateSecretInput
sourcepub fn secret_id(&self) -> Option<&str>
pub fn secret_id(&self) -> Option<&str>
The ARN or name of the secret to rotate.
For an ARN, we recommend that you specify a complete ARN rather than a partial ARN. See Finding a secret from a partial ARN.
sourcepub fn client_request_token(&self) -> Option<&str>
pub fn client_request_token(&self) -> Option<&str>
A unique identifier for the new version of the secret. You only need to specify this value if you implement your own retry logic and you want to ensure that Secrets Manager doesn't attempt to create a secret version twice.
If you use the Amazon Web Services CLI or one of the Amazon Web Services SDKs to call this operation, then you can leave this parameter empty. The CLI or SDK generates a random UUID for you and includes it as the value for this parameter in the request.
If you generate a raw HTTP request to the Secrets Manager service endpoint, then you must generate a ClientRequestToken
and include it in the request.
This value helps ensure idempotency. Secrets Manager uses this value to prevent the accidental creation of duplicate versions if there are failures and retries during a rotation. We recommend that you generate a UUID-type value to ensure uniqueness of your versions within the specified secret.
sourcepub fn rotation_lambda_arn(&self) -> Option<&str>
pub fn rotation_lambda_arn(&self) -> Option<&str>
For secrets that use a Lambda rotation function to rotate, the ARN of the Lambda rotation function.
For secrets that use managed rotation, omit this field. For more information, see Managed rotation in the Secrets Manager User Guide.
sourcepub fn rotation_rules(&self) -> Option<&RotationRulesType>
pub fn rotation_rules(&self) -> Option<&RotationRulesType>
A structure that defines the rotation configuration for this secret.
sourcepub fn rotate_immediately(&self) -> Option<bool>
pub fn rotate_immediately(&self) -> Option<bool>
Specifies whether to rotate the secret immediately or wait until the next scheduled rotation window. The rotation schedule is defined in RotateSecretRequest$RotationRules
.
For secrets that use a Lambda rotation function to rotate, if you don't immediately rotate the secret, Secrets Manager tests the rotation configuration by running the testSecret
step of the Lambda rotation function. The test creates an AWSPENDING
version of the secret and then removes it.
By default, Secrets Manager rotates the secret immediately.
source§impl RotateSecretInput
impl RotateSecretInput
sourcepub fn builder() -> RotateSecretInputBuilder
pub fn builder() -> RotateSecretInputBuilder
Creates a new builder-style object to manufacture RotateSecretInput
.
Trait Implementations§
source§impl Clone for RotateSecretInput
impl Clone for RotateSecretInput
source§fn clone(&self) -> RotateSecretInput
fn clone(&self) -> RotateSecretInput
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moresource§impl Debug for RotateSecretInput
impl Debug for RotateSecretInput
source§impl PartialEq for RotateSecretInput
impl PartialEq for RotateSecretInput
impl StructuralPartialEq for RotateSecretInput
Auto Trait Implementations§
impl Freeze for RotateSecretInput
impl RefUnwindSafe for RotateSecretInput
impl Send for RotateSecretInput
impl Sync for RotateSecretInput
impl Unpin for RotateSecretInput
impl UnwindSafe for RotateSecretInput
Blanket Implementations§
source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
source§default unsafe fn clone_to_uninit(&self, dst: *mut T)
default unsafe fn clone_to_uninit(&self, dst: *mut T)
clone_to_uninit
)