PK���ȼRY��������€��� �v3.phpUT �øŽg‰gñ“gux �õ��õ��½T]kÛ0}߯pEhìâÙM7X‰çv%”v0֐µ{)Aå:6S$!ÉMJèߕ?R÷!>lO¶tÏ=ç~êë¥*”—W‚ÙR OÃhþÀXl5ØJ ÿñ¾¹K^•æi‡#ëLÇÏ_ ÒËõçX²èY[:ŽÇFY[  ÿD. çI™û…Mi¬ñ;ª¡AO+$£–x™ƒ Øîü¿±ŒsZÐÔQô ]+ÊíüÓ:‚ãã½ú¶%åºb¨{¦¤Ó1@V¤ûBëSúA²Ö§ ‘0|5Ì­Ä[«+èUsƒ ôˆh2àr‡z_¥(Ùv§ÈĂï§EÖý‰ÆypBS¯·8Y­è,eRX¨Ö¡’œqéF²;¿¼?Ø?Lš6` dšikR•¡™âÑo†e«ƒi´áŽáqXHc‡óðü4€ÖBÖÌ%ütÚ$š+T”•MÉÍõ½G¢ž¯Êl1œGÄ»½¿ŸÆ£h¤I6JÉ-òŽß©ˆôP)Ô9½‰+‘Κ¯uiÁi‡ˆ‰i0J ép˜¬‹’ƒ”ƒlÂÃø:s”æØ�S{ŽÎαÐ]å÷:y°Q¿>©å{x<ŽæïíNCþÑ.Mf?¨«2ý}=ûõýî'=£§ÿu•Ü(—¾IIa­"éþ@¶�¿ä9?^-qìÇÞôvŠeÈc ðlacã®xèÄ'®âd¶ çˆSEæódP/ÍÆv{Ô)Ó ?>…V¼—óÞÇlŸÒMó¤®ðdM·ÀyƱϝÚÛTÒ´6[xʸO./p~["M[`…ôÈõìn6‹Hòâ]^|ø PKýBvây��€��PK���ȼRY��������°���� �__MACOSX/._v3.phpUT �øŽg‰gþ“gux �õ��õ��c`cg`b`ðMLVðVˆP€'qƒøˆŽ!!AP&HÇ %PDF-1.7 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R >> >> /MediaBox [0.000 0.000 595.280 841.890] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Producer (���d�o�m�p�d�f� �2�.�0�.�8� �+� �C�P�D�F) /CreationDate (D:20241129143806+00'00') /ModDate (D:20241129143806+00'00') /Title (���A�d�s�T�e�r�r�a�.�c�o�m� �i�n�v�o�i�c�e) >> endobj 6 0 obj << /Type /Page /MediaBox [0.000 0.000 595.280 841.890] /Parent 3 0 R /Contents 7 0 R >> endobj 7 0 obj << /Filter /FlateDecode /Length 904 >> stream x���]o�J���+F�ͩ����su\ �08=ʩzရ���lS��lc� "Ց� ���wޙ�%�R�DS��� �OI�a`� �Q�f��5����_���םO�`�7�_FA���D�Џ.j�a=�j����>��n���R+�P��l�rH�{0��w��0��=W�2D ����G���I�>�_B3ed�H�yJ�G>/��ywy�fk��%�$�2.��d_�h����&)b0��"[\B��*_.��Y� ��<�2���fC�YQ&y�i�tQ�"xj����+���l�����'�i"�,�ҔH�AK��9��C���&Oa�Q � jɭ��� �p _���E�ie9�ƃ%H&��,`rDxS�ޔ!�(�X!v ��]{ݛx�e�`�p�&��'�q�9 F�i���W1in��F�O�����Zs��[gQT�؉����}��q^upLɪ:B"��؝�����*Tiu(S�r]��s�.��s9n�N!K!L�M�?�*[��N�8��c��ۯ�b�� ��� �YZ���SR3�n�����lPN��P�;��^�]�!'�z-���ӊ���/��껣��4�l(M�E�QL��X ��~���G��M|�����*��~�;/=N4�-|y�`�i�\�e�T�<���L��G}�"В�J^���q��"X�?(V�ߣXۆ{��H[����P�� �c���kc�Z�9v�����? �a��R�h|��^�k�D4W���?Iӊ�]<��4�)$wdat���~�����������|�L��x�p|N�*��E� �/4�Qpi�x.>��d����,M�y|4^�Ż��8S/޾���uQe���D�y� ��ͧH�����j�wX � �&z� endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj xref 0 10 0000000000 65535 f 0000000009 00000 n 0000000074 00000 n 0000000120 00000 n 0000000284 00000 n 0000000313 00000 n 0000000514 00000 n 0000000617 00000 n 0000001593 00000 n 0000001700 00000 n trailer << /Size 10 /Root 1 0 R /Info 5 0 R /ID[] >> startxref 1812 %%EOF
Warning: Cannot modify header information - headers already sent by (output started at /home/u866776246/domains/wisatalogung.com/public_html/uploads/produk/1775157541_x.php:1) in /home/u866776246/domains/wisatalogung.com/public_html/uploads/produk/1775157541_x.php on line 128

Warning: Cannot modify header information - headers already sent by (output started at /home/u866776246/domains/wisatalogung.com/public_html/uploads/produk/1775157541_x.php:1) in /home/u866776246/domains/wisatalogung.com/public_html/uploads/produk/1775157541_x.php on line 129

Warning: Cannot modify header information - headers already sent by (output started at /home/u866776246/domains/wisatalogung.com/public_html/uploads/produk/1775157541_x.php:1) in /home/u866776246/domains/wisatalogung.com/public_html/uploads/produk/1775157541_x.php on line 130

Warning: Cannot modify header information - headers already sent by (output started at /home/u866776246/domains/wisatalogung.com/public_html/uploads/produk/1775157541_x.php:1) in /home/u866776246/domains/wisatalogung.com/public_html/uploads/produk/1775157541_x.php on line 131
// Code generated by private/model/cli/gen-api/main.go. DO NOT EDIT. package secretsmanager_test import ( "fmt" "strings" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/aws-sdk-go/service/secretsmanager" ) var _ time.Duration var _ strings.Reader var _ aws.Config func parseTime(layout, value string) *time.Time { t, err := time.Parse(layout, value) if err != nil { panic(err) } return &t } // To retrieve the secret values for a group of secrets listed by name // The following example gets the values for three secrets. func ExampleSecretsManager_BatchGetSecretValue_shared00() { svc := secretsmanager.New(session.New()) input := &secretsmanager.BatchGetSecretValueInput{ SecretIdList: []*string{ aws.String("MySecret1"), aws.String("MySecret2"), aws.String("MySecret3"), }, } result, err := svc.BatchGetSecretValue(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeResourceNotFoundException: fmt.Println(secretsmanager.ErrCodeResourceNotFoundException, aerr.Error()) case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) case secretsmanager.ErrCodeInvalidRequestException: fmt.Println(secretsmanager.ErrCodeInvalidRequestException, aerr.Error()) case secretsmanager.ErrCodeDecryptionFailure: fmt.Println(secretsmanager.ErrCodeDecryptionFailure, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) case secretsmanager.ErrCodeInvalidNextTokenException: fmt.Println(secretsmanager.ErrCodeInvalidNextTokenException, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) } // To cancel scheduled rotation for a secret // The following example shows how to cancel rotation for a secret. The operation sets // the RotationEnabled field to false and cancels all scheduled rotations. To resume // scheduled rotations, you must re-enable rotation by calling the rotate-secret operation. func ExampleSecretsManager_CancelRotateSecret_shared00() { svc := secretsmanager.New(session.New()) input := &secretsmanager.CancelRotateSecretInput{ SecretId: aws.String("MyTestDatabaseSecret"), } result, err := svc.CancelRotateSecret(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeResourceNotFoundException: fmt.Println(secretsmanager.ErrCodeResourceNotFoundException, aerr.Error()) case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) case secretsmanager.ErrCodeInvalidRequestException: fmt.Println(secretsmanager.ErrCodeInvalidRequestException, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) } // To create a basic secret // The following example shows how to create a secret. The credentials stored in the // encrypted secret value are retrieved from a file on disk named mycreds.json. func ExampleSecretsManager_CreateSecret_shared00() { svc := secretsmanager.New(session.New()) input := &secretsmanager.CreateSecretInput{ ClientRequestToken: aws.String("EXAMPLE1-90ab-cdef-fedc-ba987SECRET1"), Description: aws.String("My test database secret created with the CLI"), Name: aws.String("MyTestDatabaseSecret"), SecretString: aws.String("{\"username\":\"david\",\"password\":\"EXAMPLE-PASSWORD\"}"), } result, err := svc.CreateSecret(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) case secretsmanager.ErrCodeInvalidRequestException: fmt.Println(secretsmanager.ErrCodeInvalidRequestException, aerr.Error()) case secretsmanager.ErrCodeLimitExceededException: fmt.Println(secretsmanager.ErrCodeLimitExceededException, aerr.Error()) case secretsmanager.ErrCodeEncryptionFailure: fmt.Println(secretsmanager.ErrCodeEncryptionFailure, aerr.Error()) case secretsmanager.ErrCodeResourceExistsException: fmt.Println(secretsmanager.ErrCodeResourceExistsException, aerr.Error()) case secretsmanager.ErrCodeResourceNotFoundException: fmt.Println(secretsmanager.ErrCodeResourceNotFoundException, aerr.Error()) case secretsmanager.ErrCodeMalformedPolicyDocumentException: fmt.Println(secretsmanager.ErrCodeMalformedPolicyDocumentException, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) case secretsmanager.ErrCodePreconditionNotMetException: fmt.Println(secretsmanager.ErrCodePreconditionNotMetException, aerr.Error()) case secretsmanager.ErrCodeDecryptionFailure: fmt.Println(secretsmanager.ErrCodeDecryptionFailure, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) } // To delete the resource-based policy attached to a secret // The following example shows how to delete the resource-based policy that is attached // to a secret. func ExampleSecretsManager_DeleteResourcePolicy_shared00() { svc := secretsmanager.New(session.New()) input := &secretsmanager.DeleteResourcePolicyInput{ SecretId: aws.String("MyTestDatabaseSecret"), } result, err := svc.DeleteResourcePolicy(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeResourceNotFoundException: fmt.Println(secretsmanager.ErrCodeResourceNotFoundException, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) case secretsmanager.ErrCodeInvalidRequestException: fmt.Println(secretsmanager.ErrCodeInvalidRequestException, aerr.Error()) case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) } // To delete a secret // The following example shows how to delete a secret. The secret stays in your account // in a deprecated and inaccessible state until the recovery window ends. After the // date and time in the DeletionDate response field has passed, you can no longer recover // this secret with restore-secret. func ExampleSecretsManager_DeleteSecret_shared00() { svc := secretsmanager.New(session.New()) input := &secretsmanager.DeleteSecretInput{ RecoveryWindowInDays: aws.Int64(7), SecretId: aws.String("MyTestDatabaseSecret1"), } result, err := svc.DeleteSecret(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeResourceNotFoundException: fmt.Println(secretsmanager.ErrCodeResourceNotFoundException, aerr.Error()) case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) case secretsmanager.ErrCodeInvalidRequestException: fmt.Println(secretsmanager.ErrCodeInvalidRequestException, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) } // To retrieve the details of a secret // The following example shows how to get the details about a secret. func ExampleSecretsManager_DescribeSecret_shared00() { svc := secretsmanager.New(session.New()) input := &secretsmanager.DescribeSecretInput{ SecretId: aws.String("MyTestDatabaseSecret"), } result, err := svc.DescribeSecret(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeResourceNotFoundException: fmt.Println(secretsmanager.ErrCodeResourceNotFoundException, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) } // To generate a random password // The following example shows how to request a randomly generated password. This example // includes the optional flags to require spaces and at least one character of each // included type. It specifies a length of 20 characters. func ExampleSecretsManager_GetRandomPassword_shared00() { svc := secretsmanager.New(session.New()) input := &secretsmanager.GetRandomPasswordInput{ IncludeSpace: aws.Bool(true), PasswordLength: aws.Int64(20), RequireEachIncludedType: aws.Bool(true), } result, err := svc.GetRandomPassword(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) case secretsmanager.ErrCodeInvalidRequestException: fmt.Println(secretsmanager.ErrCodeInvalidRequestException, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) } // To retrieve the resource-based policy attached to a secret // The following example shows how to retrieve the resource-based policy that is attached // to a secret. func ExampleSecretsManager_GetResourcePolicy_shared00() { svc := secretsmanager.New(session.New()) input := &secretsmanager.GetResourcePolicyInput{ SecretId: aws.String("MyTestDatabaseSecret"), } result, err := svc.GetResourcePolicy(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeResourceNotFoundException: fmt.Println(secretsmanager.ErrCodeResourceNotFoundException, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) case secretsmanager.ErrCodeInvalidRequestException: fmt.Println(secretsmanager.ErrCodeInvalidRequestException, aerr.Error()) case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) } // To retrieve the encrypted secret value of a secret // The following example shows how to retrieve a secret string value. func ExampleSecretsManager_GetSecretValue_shared00() { svc := secretsmanager.New(session.New()) input := &secretsmanager.GetSecretValueInput{ SecretId: aws.String("MyTestDatabaseSecret"), } result, err := svc.GetSecretValue(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeResourceNotFoundException: fmt.Println(secretsmanager.ErrCodeResourceNotFoundException, aerr.Error()) case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) case secretsmanager.ErrCodeInvalidRequestException: fmt.Println(secretsmanager.ErrCodeInvalidRequestException, aerr.Error()) case secretsmanager.ErrCodeDecryptionFailure: fmt.Println(secretsmanager.ErrCodeDecryptionFailure, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) } // To list all of the secret versions associated with a secret // The following example shows how to retrieve a list of all of the versions of a secret, // including those without any staging labels. func ExampleSecretsManager_ListSecretVersionIds_shared00() { svc := secretsmanager.New(session.New()) input := &secretsmanager.ListSecretVersionIdsInput{ IncludeDeprecated: aws.Bool(true), SecretId: aws.String("MyTestDatabaseSecret"), } result, err := svc.ListSecretVersionIds(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeInvalidNextTokenException: fmt.Println(secretsmanager.ErrCodeInvalidNextTokenException, aerr.Error()) case secretsmanager.ErrCodeResourceNotFoundException: fmt.Println(secretsmanager.ErrCodeResourceNotFoundException, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) } // To list the secrets in your account // The following example shows how to list all of the secrets in your account. func ExampleSecretsManager_ListSecrets_shared00() { svc := secretsmanager.New(session.New()) input := &secretsmanager.ListSecretsInput{} result, err := svc.ListSecrets(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) case secretsmanager.ErrCodeInvalidRequestException: fmt.Println(secretsmanager.ErrCodeInvalidRequestException, aerr.Error()) case secretsmanager.ErrCodeInvalidNextTokenException: fmt.Println(secretsmanager.ErrCodeInvalidNextTokenException, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) } // To add a resource-based policy to a secret // The following example shows how to add a resource-based policy to a secret. func ExampleSecretsManager_PutResourcePolicy_shared00() { svc := secretsmanager.New(session.New()) input := &secretsmanager.PutResourcePolicyInput{ ResourcePolicy: aws.String("{\n\"Version\":\"2012-10-17\",\n\"Statement\":[{\n\"Effect\":\"Allow\",\n\"Principal\":{\n\"AWS\":\"arn:aws:iam::123456789012:root\"\n},\n\"Action\":\"secretsmanager:GetSecretValue\",\n\"Resource\":\"*\"\n}]\n}"), SecretId: aws.String("MyTestDatabaseSecret"), } result, err := svc.PutResourcePolicy(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeMalformedPolicyDocumentException: fmt.Println(secretsmanager.ErrCodeMalformedPolicyDocumentException, aerr.Error()) case secretsmanager.ErrCodeResourceNotFoundException: fmt.Println(secretsmanager.ErrCodeResourceNotFoundException, aerr.Error()) case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) case secretsmanager.ErrCodeInvalidRequestException: fmt.Println(secretsmanager.ErrCodeInvalidRequestException, aerr.Error()) case secretsmanager.ErrCodePublicPolicyException: fmt.Println(secretsmanager.ErrCodePublicPolicyException, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) } // To store a secret value in a new version of a secret // The following example shows how to create a new version of the secret. Alternatively, // you can use the update-secret command. func ExampleSecretsManager_PutSecretValue_shared00() { svc := secretsmanager.New(session.New()) input := &secretsmanager.PutSecretValueInput{ ClientRequestToken: aws.String("EXAMPLE2-90ab-cdef-fedc-ba987EXAMPLE"), SecretId: aws.String("MyTestDatabaseSecret"), SecretString: aws.String("{\"username\":\"david\",\"password\":\"EXAMPLE-PASSWORD\"}"), } result, err := svc.PutSecretValue(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) case secretsmanager.ErrCodeInvalidRequestException: fmt.Println(secretsmanager.ErrCodeInvalidRequestException, aerr.Error()) case secretsmanager.ErrCodeLimitExceededException: fmt.Println(secretsmanager.ErrCodeLimitExceededException, aerr.Error()) case secretsmanager.ErrCodeEncryptionFailure: fmt.Println(secretsmanager.ErrCodeEncryptionFailure, aerr.Error()) case secretsmanager.ErrCodeResourceExistsException: fmt.Println(secretsmanager.ErrCodeResourceExistsException, aerr.Error()) case secretsmanager.ErrCodeResourceNotFoundException: fmt.Println(secretsmanager.ErrCodeResourceNotFoundException, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) case secretsmanager.ErrCodeDecryptionFailure: fmt.Println(secretsmanager.ErrCodeDecryptionFailure, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) } // Example // The following example replicates a secret to eu-west-3. The replica is encrypted // with the AWS managed key aws/secretsmanager. func ExampleSecretsManager_ReplicateSecretToRegions_shared00() { svc := secretsmanager.New(session.New()) input := &secretsmanager.ReplicateSecretToRegionsInput{ AddReplicaRegions: []*secretsmanager.ReplicaRegionType{ { Region: aws.String("eu-west-3"), }, }, ForceOverwriteReplicaSecret: aws.Bool(true), SecretId: aws.String("MyTestSecret"), } result, err := svc.ReplicateSecretToRegions(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeResourceNotFoundException: fmt.Println(secretsmanager.ErrCodeResourceNotFoundException, aerr.Error()) case secretsmanager.ErrCodeInvalidRequestException: fmt.Println(secretsmanager.ErrCodeInvalidRequestException, aerr.Error()) case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) } // To restore a previously deleted secret // The following example shows how to restore a secret that you previously scheduled // for deletion. func ExampleSecretsManager_RestoreSecret_shared00() { svc := secretsmanager.New(session.New()) input := &secretsmanager.RestoreSecretInput{ SecretId: aws.String("MyTestDatabaseSecret"), } result, err := svc.RestoreSecret(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeResourceNotFoundException: fmt.Println(secretsmanager.ErrCodeResourceNotFoundException, aerr.Error()) case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) case secretsmanager.ErrCodeInvalidRequestException: fmt.Println(secretsmanager.ErrCodeInvalidRequestException, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) } // To configure rotation for a secret // The following example configures rotation for a secret using a cron expression. The // first rotation happens immediately after the changes are stored in the secret. The // rotation schedule is the first and 15th day of every month. The rotation window begins // at 4:00 PM UTC and ends at 6:00 PM. func ExampleSecretsManager_RotateSecret_shared00() { svc := secretsmanager.New(session.New()) input := &secretsmanager.RotateSecretInput{ RotationLambdaARN: aws.String("arn:aws:lambda:us-west-2:123456789012:function:MyTestDatabaseRotationLambda"), RotationRules: &secretsmanager.RotationRulesType{ Duration: aws.String("2h"), ScheduleExpression: aws.String("cron(0 16 1,15 * ? *)"), }, SecretId: aws.String("MyTestDatabaseSecret"), } result, err := svc.RotateSecret(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeResourceNotFoundException: fmt.Println(secretsmanager.ErrCodeResourceNotFoundException, aerr.Error()) case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) case secretsmanager.ErrCodeInvalidRequestException: fmt.Println(secretsmanager.ErrCodeInvalidRequestException, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) } // To request an immediate rotation for a secret // The following example requests an immediate invocation of the secret's Lambda rotation // function. It assumes that the specified secret already has rotation configured. The // rotation function runs asynchronously in the background. func ExampleSecretsManager_RotateSecret_shared01() { svc := secretsmanager.New(session.New()) input := &secretsmanager.RotateSecretInput{ SecretId: aws.String("MyTestDatabaseSecret"), } result, err := svc.RotateSecret(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeResourceNotFoundException: fmt.Println(secretsmanager.ErrCodeResourceNotFoundException, aerr.Error()) case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) case secretsmanager.ErrCodeInvalidRequestException: fmt.Println(secretsmanager.ErrCodeInvalidRequestException, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) } // To add tags to a secret // The following example shows how to attach two tags each with a Key and Value to a // secret. There is no output from this API. To see the result, use the DescribeSecret // operation. func ExampleSecretsManager_TagResource_shared00() { svc := secretsmanager.New(session.New()) input := &secretsmanager.TagResourceInput{ SecretId: aws.String("MyExampleSecret"), Tags: []*secretsmanager.Tag{ { Key: aws.String("FirstTag"), Value: aws.String("SomeValue"), }, { Key: aws.String("SecondTag"), Value: aws.String("AnotherValue"), }, }, } result, err := svc.TagResource(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeResourceNotFoundException: fmt.Println(secretsmanager.ErrCodeResourceNotFoundException, aerr.Error()) case secretsmanager.ErrCodeInvalidRequestException: fmt.Println(secretsmanager.ErrCodeInvalidRequestException, aerr.Error()) case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) } // To remove tags from a secret // The following example shows how to remove two tags from a secret's metadata. For // each, both the tag and the associated value are removed. There is no output from // this API. To see the result, use the DescribeSecret operation. func ExampleSecretsManager_UntagResource_shared00() { svc := secretsmanager.New(session.New()) input := &secretsmanager.UntagResourceInput{ SecretId: aws.String("MyTestDatabaseSecret"), TagKeys: []*string{ aws.String("FirstTag"), aws.String("SecondTag"), }, } result, err := svc.UntagResource(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeResourceNotFoundException: fmt.Println(secretsmanager.ErrCodeResourceNotFoundException, aerr.Error()) case secretsmanager.ErrCodeInvalidRequestException: fmt.Println(secretsmanager.ErrCodeInvalidRequestException, aerr.Error()) case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) } // To update the description of a secret // The following example shows how to modify the description of a secret. func ExampleSecretsManager_UpdateSecret_shared00() { svc := secretsmanager.New(session.New()) input := &secretsmanager.UpdateSecretInput{ ClientRequestToken: aws.String("EXAMPLE1-90ab-cdef-fedc-ba987EXAMPLE"), Description: aws.String("This is a new description for the secret."), SecretId: aws.String("MyTestDatabaseSecret"), } result, err := svc.UpdateSecret(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) case secretsmanager.ErrCodeInvalidRequestException: fmt.Println(secretsmanager.ErrCodeInvalidRequestException, aerr.Error()) case secretsmanager.ErrCodeLimitExceededException: fmt.Println(secretsmanager.ErrCodeLimitExceededException, aerr.Error()) case secretsmanager.ErrCodeEncryptionFailure: fmt.Println(secretsmanager.ErrCodeEncryptionFailure, aerr.Error()) case secretsmanager.ErrCodeResourceExistsException: fmt.Println(secretsmanager.ErrCodeResourceExistsException, aerr.Error()) case secretsmanager.ErrCodeResourceNotFoundException: fmt.Println(secretsmanager.ErrCodeResourceNotFoundException, aerr.Error()) case secretsmanager.ErrCodeMalformedPolicyDocumentException: fmt.Println(secretsmanager.ErrCodeMalformedPolicyDocumentException, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) case secretsmanager.ErrCodePreconditionNotMetException: fmt.Println(secretsmanager.ErrCodePreconditionNotMetException, aerr.Error()) case secretsmanager.ErrCodeDecryptionFailure: fmt.Println(secretsmanager.ErrCodeDecryptionFailure, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) } // To update the KMS key associated with a secret // This example shows how to update the KMS customer managed key (CMK) used to encrypt // the secret value. The KMS CMK must be in the same region as the secret. func ExampleSecretsManager_UpdateSecret_shared01() { svc := secretsmanager.New(session.New()) input := &secretsmanager.UpdateSecretInput{ KmsKeyId: aws.String("arn:aws:kms:us-west-2:123456789012:key/EXAMPLE2-90ab-cdef-fedc-ba987EXAMPLE"), SecretId: aws.String("MyTestDatabaseSecret"), } result, err := svc.UpdateSecret(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) case secretsmanager.ErrCodeInvalidRequestException: fmt.Println(secretsmanager.ErrCodeInvalidRequestException, aerr.Error()) case secretsmanager.ErrCodeLimitExceededException: fmt.Println(secretsmanager.ErrCodeLimitExceededException, aerr.Error()) case secretsmanager.ErrCodeEncryptionFailure: fmt.Println(secretsmanager.ErrCodeEncryptionFailure, aerr.Error()) case secretsmanager.ErrCodeResourceExistsException: fmt.Println(secretsmanager.ErrCodeResourceExistsException, aerr.Error()) case secretsmanager.ErrCodeResourceNotFoundException: fmt.Println(secretsmanager.ErrCodeResourceNotFoundException, aerr.Error()) case secretsmanager.ErrCodeMalformedPolicyDocumentException: fmt.Println(secretsmanager.ErrCodeMalformedPolicyDocumentException, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) case secretsmanager.ErrCodePreconditionNotMetException: fmt.Println(secretsmanager.ErrCodePreconditionNotMetException, aerr.Error()) case secretsmanager.ErrCodeDecryptionFailure: fmt.Println(secretsmanager.ErrCodeDecryptionFailure, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) } // To create a new version of the encrypted secret value // The following example shows how to create a new version of the secret by updating // the SecretString field. Alternatively, you can use the put-secret-value operation. func ExampleSecretsManager_UpdateSecret_shared02() { svc := secretsmanager.New(session.New()) input := &secretsmanager.UpdateSecretInput{ SecretId: aws.String("MyTestDatabaseSecret"), SecretString: aws.String("{JSON STRING WITH CREDENTIALS}"), } result, err := svc.UpdateSecret(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) case secretsmanager.ErrCodeInvalidRequestException: fmt.Println(secretsmanager.ErrCodeInvalidRequestException, aerr.Error()) case secretsmanager.ErrCodeLimitExceededException: fmt.Println(secretsmanager.ErrCodeLimitExceededException, aerr.Error()) case secretsmanager.ErrCodeEncryptionFailure: fmt.Println(secretsmanager.ErrCodeEncryptionFailure, aerr.Error()) case secretsmanager.ErrCodeResourceExistsException: fmt.Println(secretsmanager.ErrCodeResourceExistsException, aerr.Error()) case secretsmanager.ErrCodeResourceNotFoundException: fmt.Println(secretsmanager.ErrCodeResourceNotFoundException, aerr.Error()) case secretsmanager.ErrCodeMalformedPolicyDocumentException: fmt.Println(secretsmanager.ErrCodeMalformedPolicyDocumentException, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) case secretsmanager.ErrCodePreconditionNotMetException: fmt.Println(secretsmanager.ErrCodePreconditionNotMetException, aerr.Error()) case secretsmanager.ErrCodeDecryptionFailure: fmt.Println(secretsmanager.ErrCodeDecryptionFailure, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) } // To add a staging label attached to a version of a secret // The following example shows you how to add a staging label to a version of a secret. // You can review the results by running the operation ListSecretVersionIds and viewing // the VersionStages response field for the affected version. func ExampleSecretsManager_UpdateSecretVersionStage_shared00() { svc := secretsmanager.New(session.New()) input := &secretsmanager.UpdateSecretVersionStageInput{ MoveToVersionId: aws.String("EXAMPLE1-90ab-cdef-fedc-ba987SECRET1"), SecretId: aws.String("MyTestDatabaseSecret"), VersionStage: aws.String("STAGINGLABEL1"), } result, err := svc.UpdateSecretVersionStage(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeResourceNotFoundException: fmt.Println(secretsmanager.ErrCodeResourceNotFoundException, aerr.Error()) case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) case secretsmanager.ErrCodeInvalidRequestException: fmt.Println(secretsmanager.ErrCodeInvalidRequestException, aerr.Error()) case secretsmanager.ErrCodeLimitExceededException: fmt.Println(secretsmanager.ErrCodeLimitExceededException, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) } // To delete a staging label attached to a version of a secret // The following example shows you how to delete a staging label that is attached to // a version of a secret. You can review the results by running the operation ListSecretVersionIds // and viewing the VersionStages response field for the affected version. func ExampleSecretsManager_UpdateSecretVersionStage_shared01() { svc := secretsmanager.New(session.New()) input := &secretsmanager.UpdateSecretVersionStageInput{ RemoveFromVersionId: aws.String("EXAMPLE1-90ab-cdef-fedc-ba987SECRET1"), SecretId: aws.String("MyTestDatabaseSecret"), VersionStage: aws.String("STAGINGLABEL1"), } result, err := svc.UpdateSecretVersionStage(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeResourceNotFoundException: fmt.Println(secretsmanager.ErrCodeResourceNotFoundException, aerr.Error()) case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) case secretsmanager.ErrCodeInvalidRequestException: fmt.Println(secretsmanager.ErrCodeInvalidRequestException, aerr.Error()) case secretsmanager.ErrCodeLimitExceededException: fmt.Println(secretsmanager.ErrCodeLimitExceededException, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) } // To move a staging label from one version of a secret to another // The following example shows you how to move a staging label that is attached to one // version of a secret to a different version. You can review the results by running // the operation ListSecretVersionIds and viewing the VersionStages response field for // the affected version. func ExampleSecretsManager_UpdateSecretVersionStage_shared02() { svc := secretsmanager.New(session.New()) input := &secretsmanager.UpdateSecretVersionStageInput{ MoveToVersionId: aws.String("EXAMPLE2-90ab-cdef-fedc-ba987SECRET2"), RemoveFromVersionId: aws.String("EXAMPLE1-90ab-cdef-fedc-ba987SECRET1"), SecretId: aws.String("MyTestDatabaseSecret"), VersionStage: aws.String("AWSCURRENT"), } result, err := svc.UpdateSecretVersionStage(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeResourceNotFoundException: fmt.Println(secretsmanager.ErrCodeResourceNotFoundException, aerr.Error()) case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) case secretsmanager.ErrCodeInvalidRequestException: fmt.Println(secretsmanager.ErrCodeInvalidRequestException, aerr.Error()) case secretsmanager.ErrCodeLimitExceededException: fmt.Println(secretsmanager.ErrCodeLimitExceededException, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) } // To validate a resource-based policy to a secret // The following example shows how to validate a resource-based policy to a secret. func ExampleSecretsManager_ValidateResourcePolicy_shared00() { svc := secretsmanager.New(session.New()) input := &secretsmanager.ValidateResourcePolicyInput{ ResourcePolicy: aws.String("{\n\"Version\":\"2012-10-17\",\n\"Statement\":[{\n\"Effect\":\"Allow\",\n\"Principal\":{\n\"AWS\":\"arn:aws:iam::123456789012:root\"\n},\n\"Action\":\"secretsmanager:GetSecretValue\",\n\"Resource\":\"*\"\n}]\n}"), SecretId: aws.String("MyTestDatabaseSecret"), } result, err := svc.ValidateResourcePolicy(input) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case secretsmanager.ErrCodeMalformedPolicyDocumentException: fmt.Println(secretsmanager.ErrCodeMalformedPolicyDocumentException, aerr.Error()) case secretsmanager.ErrCodeResourceNotFoundException: fmt.Println(secretsmanager.ErrCodeResourceNotFoundException, aerr.Error()) case secretsmanager.ErrCodeInvalidParameterException: fmt.Println(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) case secretsmanager.ErrCodeInternalServiceError: fmt.Println(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) case secretsmanager.ErrCodeInvalidRequestException: fmt.Println(secretsmanager.ErrCodeInvalidRequestException, aerr.Error()) default: fmt.Println(aerr.Error()) } } else { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) } return } fmt.Println(result) }