aws-sdk-secretsmanager 1.10.0 → 1.11.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 56df7596f171de9be5328c26a0317eaf9976801c
4
- data.tar.gz: 7e5a87c3519a5b9f3527cf773dc0722d0399ae97
3
+ metadata.gz: 8e190789f96d22fa81c71669cfd8ec7c404cdd95
4
+ data.tar.gz: ea781d00cc5fce6a6e82fc4c00cd6cf1f5c3f21a
5
5
  SHA512:
6
- metadata.gz: 92d17dd26a365cb854f44eae0fcac3138fccb2de31e7048cb86bbdc3a9fae907675bdb5bf17ee9db7e4b960a441ed88126929402afd569e84fb29c4d4d1df620
7
- data.tar.gz: f28dbee1cd9b9e6c80a9c451d0d027aff5823da9cea63fe9aa177aefceabffb01a80ff010f348a8b4902771c5fc267808b49a650c230f8b26ebf3885508322ba
6
+ metadata.gz: '09cae827bd2bb324f21b72d4b59afe7b5412d52812c44c11047f70fb0b04de51ba7036a531531fc595168d4fff32228ca35bd5c0a07a58fe8330ed61735e5eea'
7
+ data.tar.gz: 713e1f3549fd1ae5af8ee263d3c134426411ee535bc8401645d05b2fd744280ec43e366869e72851bb0c51587772ae5df42291a701e800b710b1d900c9e5c005
@@ -42,6 +42,6 @@ require_relative 'aws-sdk-secretsmanager/customizations'
42
42
  # @service
43
43
  module Aws::SecretsManager
44
44
 
45
- GEM_VERSION = '1.10.0'
45
+ GEM_VERSION = '1.11.0'
46
46
 
47
47
  end
@@ -690,6 +690,24 @@ module Aws::SecretsManager
690
690
  #
691
691
  # This value can range from 7 to 30 days. The default value is 30.
692
692
  #
693
+ # @option params [Boolean] :force_delete_without_recovery
694
+ # (Optional) Specifies that the secret is to be deleted immediately
695
+ # without any recovery window. You cannot use both this parameter and
696
+ # the `RecoveryWindowInDays` parameter in the same API call.
697
+ #
698
+ # An asynchronous background process performs the actual deletion, so
699
+ # there can be a short delay before the operation completes. If you
700
+ # write code to delete and then immediately recreate a secret with the
701
+ # same name, ensure that your code includes appropriate back off and
702
+ # retry logic.
703
+ #
704
+ # Use this parameter with caution. This parameter causes the operation
705
+ # to skip the normal waiting period before the permanent deletion that
706
+ # AWS would normally impose with the `RecoveryWindowInDays` parameter.
707
+ # If you delete a secret with the `ForceDeleteWithouRecovery` parameter,
708
+ # then you have no opportunity to recover the secret. It is permanently
709
+ # lost.
710
+ #
693
711
  # @return [Types::DeleteSecretResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
694
712
  #
695
713
  # * {Types::DeleteSecretResponse#arn #arn} => String
@@ -720,6 +738,7 @@ module Aws::SecretsManager
720
738
  # resp = client.delete_secret({
721
739
  # secret_id: "SecretIdType", # required
722
740
  # recovery_window_in_days: 1,
741
+ # force_delete_without_recovery: false,
723
742
  # })
724
743
  #
725
744
  # @example Response structure
@@ -2125,9 +2144,9 @@ module Aws::SecretsManager
2125
2144
  req.send_request(options)
2126
2145
  end
2127
2146
 
2128
- # Modifies many of the details of a secret. If you include a
2129
- # `ClientRequestToken` and either `SecretString` or `SecretBinary` then
2130
- # it also creates a new version attached to the secret.
2147
+ # Modifies many of the details of the specified secret. If you include a
2148
+ # `ClientRequestToken` and *either* `SecretString` or `SecretBinary`
2149
+ # then it also creates a new version attached to the secret.
2131
2150
  #
2132
2151
  # To modify the rotation configuration of a secret, use RotateSecret
2133
2152
  # instead.
@@ -2140,9 +2159,9 @@ module Aws::SecretsManager
2140
2159
  # </note>
2141
2160
  #
2142
2161
  # * If a version with a `SecretVersionId` with the same value as the
2143
- # `ClientRequestToken` parameter already exists, the operation
2144
- # generates an error. You cannot modify an existing version, you can
2145
- # only create new ones.
2162
+ # `ClientRequestToken` parameter already exists, the operation results
2163
+ # in an error. You cannot modify an existing version, you can only
2164
+ # create a new version.
2146
2165
  #
2147
2166
  # * If you include `SecretString` or `SecretBinary` to create a new
2148
2167
  # secret version, Secrets Manager automatically attaches the staging
@@ -2200,7 +2219,7 @@ module Aws::SecretsManager
2200
2219
  # ListSecretVersionIds.
2201
2220
  #
2202
2221
  # @option params [required, String] :secret_id
2203
- # Specifies the secret that you want to update or to which you want to
2222
+ # Specifies the secret that you want to modify or to which you want to
2204
2223
  # add a new version. You can specify either the Amazon Resource Name
2205
2224
  # (ARN) or the friendly name of the secret.
2206
2225
  #
@@ -2249,28 +2268,24 @@ module Aws::SecretsManager
2249
2268
  # [1]: https://wikipedia.org/wiki/Universally_unique_identifier
2250
2269
  #
2251
2270
  # @option params [String] :description
2252
- # (Optional) Specifies a user-provided description of the secret.
2271
+ # (Optional) Specifies an updated user-provided description of the
2272
+ # secret.
2253
2273
  #
2254
2274
  # @option params [String] :kms_key_id
2255
- # (Optional) Specifies the ARN or alias of the AWS KMS customer master
2256
- # key (CMK) to be used to encrypt the protected text in the versions of
2257
- # this secret.
2258
- #
2259
- # If you don't specify this value, then Secrets Manager defaults to
2260
- # using the default CMK in the account (the one named
2261
- # `aws/secretsmanager`). If a AWS KMS CMK with that name doesn't exist,
2262
- # then Secrets Manager creates it for you automatically the first time
2263
- # it needs to encrypt a version's `Plaintext` or `PlaintextString`
2264
- # fields.
2275
+ # (Optional) Specifies an updated ARN or alias of the AWS KMS customer
2276
+ # master key (CMK) to be used to encrypt the protected text in new
2277
+ # versions of this secret.
2265
2278
  #
2266
2279
  # You can only use the account's default CMK to encrypt and decrypt if
2267
2280
  # you call this operation using credentials from the same account that
2268
2281
  # owns the secret. If the secret is in a different account, then you
2269
- # must create a custom CMK and provide the ARN in this field.
2282
+ # must create a custom CMK and provide the ARN of that CMK in this
2283
+ # field. The user making the call must have permissions to both the
2284
+ # secret and the CMK in their respective accounts.
2270
2285
  #
2271
2286
  # @option params [String, IO] :secret_binary
2272
- # (Optional) Specifies binary data that you want to encrypt and store in
2273
- # the new version of the secret. To use this parameter in the
2287
+ # (Optional) Specifies updated binary data that you want to encrypt and
2288
+ # store in the new version of the secret. To use this parameter in the
2274
2289
  # command-line tools, we recommend that you store your binary data in a
2275
2290
  # file and then use the appropriate technique for your tool to pass the
2276
2291
  # contents of the file as a parameter. Either `SecretBinary` or
@@ -2280,8 +2295,8 @@ module Aws::SecretsManager
2280
2295
  # This parameter is not accessible using the Secrets Manager console.
2281
2296
  #
2282
2297
  # @option params [String] :secret_string
2283
- # (Optional) Specifies text data that you want to encrypt and store in
2284
- # this new version of the secret. Either `SecretBinary` or
2298
+ # (Optional) Specifies updated text data that you want to encrypt and
2299
+ # store in this new version of the secret. Either `SecretBinary` or
2285
2300
  # `SecretString` must have a value, but not both. They cannot both be
2286
2301
  # empty.
2287
2302
  #
@@ -2301,7 +2316,12 @@ module Aws::SecretsManager
2301
2316
  #
2302
2317
  # If your command-line tool or SDK requires quotation marks around the
2303
2318
  # parameter, you should use single quotes to avoid confusion with the
2304
- # double quotes required in the JSON text.
2319
+ # double quotes required in the JSON text. You can also 'escape' the
2320
+ # double quote character in the embedded JSON text by prefacing each
2321
+ # with a backslash. For example, the following string is surrounded by
2322
+ # double-quotes. All of the embedded double quotes are escaped:
2323
+ #
2324
+ # `"[\{"username":"bob"\},\{"password":"abc123xyz456"\}]"`
2305
2325
  #
2306
2326
  #
2307
2327
  #
@@ -2461,8 +2481,8 @@ module Aws::SecretsManager
2461
2481
  # labels to.
2462
2482
  #
2463
2483
  # If any of the staging labels are already attached to a different
2464
- # version of the secret, then they are removed from that version before
2465
- # adding them to this version.
2484
+ # version of the secret, then they are automatically removed from that
2485
+ # version before adding them to this version.
2466
2486
  #
2467
2487
  # @return [Types::UpdateSecretVersionStageResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
2468
2488
  #
@@ -2560,7 +2580,7 @@ module Aws::SecretsManager
2560
2580
  params: params,
2561
2581
  config: config)
2562
2582
  context[:gem_name] = 'aws-sdk-secretsmanager'
2563
- context[:gem_version] = '1.10.0'
2583
+ context[:gem_version] = '1.11.0'
2564
2584
  Seahorse::Client::Request.new(handlers, context)
2565
2585
  end
2566
2586
 
@@ -135,6 +135,7 @@ module Aws::SecretsManager
135
135
 
136
136
  DeleteSecretRequest.add_member(:secret_id, Shapes::ShapeRef.new(shape: SecretIdType, required: true, location_name: "SecretId"))
137
137
  DeleteSecretRequest.add_member(:recovery_window_in_days, Shapes::ShapeRef.new(shape: RecoveryWindowInDaysType, location_name: "RecoveryWindowInDays", metadata: {"box"=>true}))
138
+ DeleteSecretRequest.add_member(:force_delete_without_recovery, Shapes::ShapeRef.new(shape: BooleanType, location_name: "ForceDeleteWithoutRecovery", metadata: {"box"=>true}))
138
139
  DeleteSecretRequest.struct_class = Types::DeleteSecretRequest
139
140
 
140
141
  DeleteSecretResponse.add_member(:arn, Shapes::ShapeRef.new(shape: SecretARNType, location_name: "ARN"))
@@ -335,6 +335,7 @@ module Aws::SecretsManager
335
335
  # {
336
336
  # secret_id: "SecretIdType", # required
337
337
  # recovery_window_in_days: 1,
338
+ # force_delete_without_recovery: false,
338
339
  # }
339
340
  #
340
341
  # @!attribute [rw] secret_id
@@ -349,11 +350,31 @@ module Aws::SecretsManager
349
350
  # This value can range from 7 to 30 days. The default value is 30.
350
351
  # @return [Integer]
351
352
  #
353
+ # @!attribute [rw] force_delete_without_recovery
354
+ # (Optional) Specifies that the secret is to be deleted immediately
355
+ # without any recovery window. You cannot use both this parameter and
356
+ # the `RecoveryWindowInDays` parameter in the same API call.
357
+ #
358
+ # An asynchronous background process performs the actual deletion, so
359
+ # there can be a short delay before the operation completes. If you
360
+ # write code to delete and then immediately recreate a secret with the
361
+ # same name, ensure that your code includes appropriate back off and
362
+ # retry logic.
363
+ #
364
+ # Use this parameter with caution. This parameter causes the operation
365
+ # to skip the normal waiting period before the permanent deletion that
366
+ # AWS would normally impose with the `RecoveryWindowInDays` parameter.
367
+ # If you delete a secret with the `ForceDeleteWithouRecovery`
368
+ # parameter, then you have no opportunity to recover the secret. It is
369
+ # permanently lost.
370
+ # @return [Boolean]
371
+ #
352
372
  # @see http://docs.aws.amazon.com/goto/WebAPI/secretsmanager-2017-10-17/DeleteSecretRequest AWS API Documentation
353
373
  #
354
374
  class DeleteSecretRequest < Struct.new(
355
375
  :secret_id,
356
- :recovery_window_in_days)
376
+ :recovery_window_in_days,
377
+ :force_delete_without_recovery)
357
378
  include Aws::Structure
358
379
  end
359
380
 
@@ -1555,7 +1576,7 @@ module Aws::SecretsManager
1555
1576
  # }
1556
1577
  #
1557
1578
  # @!attribute [rw] secret_id
1558
- # Specifies the secret that you want to update or to which you want to
1579
+ # Specifies the secret that you want to modify or to which you want to
1559
1580
  # add a new version. You can specify either the Amazon Resource Name
1560
1581
  # (ARN) or the friendly name of the secret.
1561
1582
  # @return [String]
@@ -1606,42 +1627,38 @@ module Aws::SecretsManager
1606
1627
  # @return [String]
1607
1628
  #
1608
1629
  # @!attribute [rw] description
1609
- # (Optional) Specifies a user-provided description of the secret.
1630
+ # (Optional) Specifies an updated user-provided description of the
1631
+ # secret.
1610
1632
  # @return [String]
1611
1633
  #
1612
1634
  # @!attribute [rw] kms_key_id
1613
- # (Optional) Specifies the ARN or alias of the AWS KMS customer master
1614
- # key (CMK) to be used to encrypt the protected text in the versions
1615
- # of this secret.
1616
- #
1617
- # If you don't specify this value, then Secrets Manager defaults to
1618
- # using the default CMK in the account (the one named
1619
- # `aws/secretsmanager`). If a AWS KMS CMK with that name doesn't
1620
- # exist, then Secrets Manager creates it for you automatically the
1621
- # first time it needs to encrypt a version's `Plaintext` or
1622
- # `PlaintextString` fields.
1635
+ # (Optional) Specifies an updated ARN or alias of the AWS KMS customer
1636
+ # master key (CMK) to be used to encrypt the protected text in new
1637
+ # versions of this secret.
1623
1638
  #
1624
1639
  # You can only use the account's default CMK to encrypt and decrypt
1625
1640
  # if you call this operation using credentials from the same account
1626
1641
  # that owns the secret. If the secret is in a different account, then
1627
- # you must create a custom CMK and provide the ARN in this field.
1642
+ # you must create a custom CMK and provide the ARN of that CMK in this
1643
+ # field. The user making the call must have permissions to both the
1644
+ # secret and the CMK in their respective accounts.
1628
1645
  # @return [String]
1629
1646
  #
1630
1647
  # @!attribute [rw] secret_binary
1631
- # (Optional) Specifies binary data that you want to encrypt and store
1632
- # in the new version of the secret. To use this parameter in the
1633
- # command-line tools, we recommend that you store your binary data in
1634
- # a file and then use the appropriate technique for your tool to pass
1635
- # the contents of the file as a parameter. Either `SecretBinary` or
1636
- # `SecretString` must have a value, but not both. They cannot both be
1637
- # empty.
1648
+ # (Optional) Specifies updated binary data that you want to encrypt
1649
+ # and store in the new version of the secret. To use this parameter in
1650
+ # the command-line tools, we recommend that you store your binary data
1651
+ # in a file and then use the appropriate technique for your tool to
1652
+ # pass the contents of the file as a parameter. Either `SecretBinary`
1653
+ # or `SecretString` must have a value, but not both. They cannot both
1654
+ # be empty.
1638
1655
  #
1639
1656
  # This parameter is not accessible using the Secrets Manager console.
1640
1657
  # @return [String]
1641
1658
  #
1642
1659
  # @!attribute [rw] secret_string
1643
- # (Optional) Specifies text data that you want to encrypt and store in
1644
- # this new version of the secret. Either `SecretBinary` or
1660
+ # (Optional) Specifies updated text data that you want to encrypt and
1661
+ # store in this new version of the secret. Either `SecretBinary` or
1645
1662
  # `SecretString` must have a value, but not both. They cannot both be
1646
1663
  # empty.
1647
1664
  #
@@ -1661,7 +1678,12 @@ module Aws::SecretsManager
1661
1678
  #
1662
1679
  # If your command-line tool or SDK requires quotation marks around the
1663
1680
  # parameter, you should use single quotes to avoid confusion with the
1664
- # double quotes required in the JSON text.
1681
+ # double quotes required in the JSON text. You can also 'escape' the
1682
+ # double quote character in the embedded JSON text by prefacing each
1683
+ # with a backslash. For example, the following string is surrounded by
1684
+ # double-quotes. All of the embedded double quotes are escaped:
1685
+ #
1686
+ # `"[\{"username":"bob"\},\{"password":"abc123xyz456"\}]"`
1665
1687
  #
1666
1688
  #
1667
1689
  #
@@ -1681,7 +1703,7 @@ module Aws::SecretsManager
1681
1703
  end
1682
1704
 
1683
1705
  # @!attribute [rw] arn
1684
- # The ARN of this secret.
1706
+ # The ARN of the secret that was updated.
1685
1707
  #
1686
1708
  # <note markdown="1"> Secrets Manager automatically adds several random characters to the
1687
1709
  # name at the end of the ARN when you initially create a secret. This
@@ -1695,12 +1717,12 @@ module Aws::SecretsManager
1695
1717
  # @return [String]
1696
1718
  #
1697
1719
  # @!attribute [rw] name
1698
- # The friendly name of this secret.
1720
+ # The friendly name of the secret that was updated.
1699
1721
  # @return [String]
1700
1722
  #
1701
1723
  # @!attribute [rw] version_id
1702
- # If a version of the secret was created or updated by this operation,
1703
- # then its unique identifier is returned.
1724
+ # If a new version of the secret was created by this operation, then
1725
+ # `VersionId` contains the unique identifier of the new version.
1704
1726
  # @return [String]
1705
1727
  #
1706
1728
  # @see http://docs.aws.amazon.com/goto/WebAPI/secretsmanager-2017-10-17/UpdateSecretResponse AWS API Documentation
@@ -1751,8 +1773,8 @@ module Aws::SecretsManager
1751
1773
  # labels to.
1752
1774
  #
1753
1775
  # If any of the staging labels are already attached to a different
1754
- # version of the secret, then they are removed from that version
1755
- # before adding them to this version.
1776
+ # version of the secret, then they are automatically removed from that
1777
+ # version before adding them to this version.
1756
1778
  # @return [String]
1757
1779
  #
1758
1780
  # @see http://docs.aws.amazon.com/goto/WebAPI/secretsmanager-2017-10-17/UpdateSecretVersionStageRequest AWS API Documentation
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-secretsmanager
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.10.0
4
+ version: 1.11.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2018-06-29 00:00:00.000000000 Z
11
+ date: 2018-08-08 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core