aws-sdk-secretsmanager 1.100.0 → 1.102.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 38fb7475b0441ce17e120fa6c7c0eb487135f865163e5ed457179845a2ef8031
4
- data.tar.gz: 4fa1a07ae1fba7606b808ac0a2d36a39b5913b39e014122c094ba3dbb6d9bc4a
3
+ metadata.gz: 50f7a307d3cf7e170b14c7c82003a213df54c39cb4ef1362439c98b1bb8975fb
4
+ data.tar.gz: f582e643ce4cedebc497bf2d4b5dbe1df20e1e46093eb7acff75202bcd351e0f
5
5
  SHA512:
6
- metadata.gz: f7b51c716baee7e3bc54657cb949e935363dccb5ff2854cbfd92d23cf6f661009d59b5fa5c58a366ac9b04d1759f9c131857eaf564ed465e3f7d9aef315ebdef
7
- data.tar.gz: 6c7987592b17c7c9a77dbd4b81e3395c5d4b99ed71a42fcc33bc7a35716b63c857f4a3f6591d9f4c557b9c3f41f1ef215e4789b56440786388f68b9d76d6dcc6
6
+ metadata.gz: b2090771993d6af8f722c35db483af31fe92513907c358a2faddedfcde98d52e017df49d29550a36da745b3943d98273c5ab72e86fc3e2fa05a66fcf7d06d296
7
+ data.tar.gz: f921d379077a4522b8982ae7e0328fdadb73909152cfc0c681a442a766fe7e6214ded88dd8903918cf23f50dca640782b3dc73c63ca5026b85fc9f4b65b8614e
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.102.0 (2024-07-18)
5
+ ------------------
6
+
7
+ * Feature - Doc only update for Secrets Manager
8
+
9
+ 1.101.0 (2024-07-02)
10
+ ------------------
11
+
12
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
13
+
4
14
  1.100.0 (2024-06-25)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.100.0
1
+ 1.102.0
@@ -312,6 +312,15 @@ module Aws::SecretsManager
312
312
  #
313
313
  # @option options [String] :session_token
314
314
  #
315
+ # @option options [Array] :sigv4a_signing_region_set
316
+ # A list of regions that should be signed with SigV4a signing. When
317
+ # not passed, a default `:sigv4a_signing_region_set` is searched for
318
+ # in the following locations:
319
+ #
320
+ # * `Aws.config[:sigv4a_signing_region_set]`
321
+ # * `ENV['AWS_SIGV4A_SIGNING_REGION_SET']`
322
+ # * `~/.aws/config`
323
+ #
315
324
  # @option options [Boolean] :simple_json (false)
316
325
  # Disables request parameter conversion, validation, and formatting.
317
326
  # Also disables response data type conversions. The request parameters
@@ -715,6 +724,12 @@ module Aws::SecretsManager
715
724
  # you need `kms:GenerateDataKey` and `kms:Decrypt` permission to the
716
725
  # key.
717
726
  #
727
+ # When you enter commands in a command shell, there is a risk of the
728
+ # command history being accessed or utilities having access to your
729
+ # command parameters. This is a concern if the command includes the
730
+ # value of a secret. Learn how to [Mitigate the risks of using
731
+ # command-line tools to store Secrets Manager secrets][7].
732
+ #
718
733
  #
719
734
  #
720
735
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/service-linked-secrets.html
@@ -723,6 +738,7 @@ module Aws::SecretsManager
723
738
  # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
724
739
  # [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
725
740
  # [6]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
741
+ # [7]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
726
742
  #
727
743
  # @option params [required, String] :name
728
744
  # The name of the new secret.
@@ -2029,11 +2045,18 @@ module Aws::SecretsManager
2029
2045
  # more information, see [ IAM policy actions for Secrets Manager][2] and
2030
2046
  # [Authentication and access control in Secrets Manager][3].
2031
2047
  #
2048
+ # When you enter commands in a command shell, there is a risk of the
2049
+ # command history being accessed or utilities having access to your
2050
+ # command parameters. This is a concern if the command includes the
2051
+ # value of a secret. Learn how to [Mitigate the risks of using
2052
+ # command-line tools to store Secrets Manager secrets][4].
2053
+ #
2032
2054
  #
2033
2055
  #
2034
2056
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
2035
2057
  # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2036
2058
  # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2059
+ # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
2037
2060
  #
2038
2061
  # @option params [required, String] :secret_id
2039
2062
  # The ARN or name of the secret to add a new version to.
@@ -2882,10 +2905,16 @@ module Aws::SecretsManager
2882
2905
  # a customer managed key, you must also have `kms:GenerateDataKey`,
2883
2906
  # `kms:Encrypt`, and `kms:Decrypt` permissions on the key. If you change
2884
2907
  # the KMS key and you don't have `kms:Encrypt` permission to the new
2885
- # key, Secrets Manager does not re-ecrypt existing secret versions with
2908
+ # key, Secrets Manager does not re-encrypt existing secret versions with
2886
2909
  # the new key. For more information, see [ Secret encryption and
2887
2910
  # decryption][5].
2888
2911
  #
2912
+ # When you enter commands in a command shell, there is a risk of the
2913
+ # command history being accessed or utilities having access to your
2914
+ # command parameters. This is a concern if the command includes the
2915
+ # value of a secret. Learn how to [Mitigate the risks of using
2916
+ # command-line tools to store Secrets Manager secrets][6].
2917
+ #
2889
2918
  #
2890
2919
  #
2891
2920
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/service-linked-secrets.html
@@ -2893,6 +2922,7 @@ module Aws::SecretsManager
2893
2922
  # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2894
2923
  # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2895
2924
  # [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security-encryption.html
2925
+ # [6]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
2896
2926
  #
2897
2927
  # @option params [required, String] :secret_id
2898
2928
  # The ARN or name of the secret.
@@ -2941,8 +2971,8 @@ module Aws::SecretsManager
2941
2971
  # encrypt new secret versions as well as any existing versions with the
2942
2972
  # staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. If you
2943
2973
  # don't have `kms:Encrypt` permission to the new key, Secrets Manager
2944
- # does not re-ecrypt existing secret versions with the new key. For more
2945
- # information about versions and staging labels, see [Concepts:
2974
+ # does not re-encrypt existing secret versions with the new key. For
2975
+ # more information about versions and staging labels, see [Concepts:
2946
2976
  # Version][1].
2947
2977
  #
2948
2978
  # A key alias is always prefixed by `alias/`, for example
@@ -3338,7 +3368,7 @@ module Aws::SecretsManager
3338
3368
  params: params,
3339
3369
  config: config)
3340
3370
  context[:gem_name] = 'aws-sdk-secretsmanager'
3341
- context[:gem_version] = '1.100.0'
3371
+ context[:gem_version] = '1.102.0'
3342
3372
  Seahorse::Client::Request.new(handlers, context)
3343
3373
  end
3344
3374
 
@@ -2266,7 +2266,7 @@ module Aws::SecretsManager
2266
2266
  # to encrypt new secret versions as well as any existing versions with
2267
2267
  # the staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. If
2268
2268
  # you don't have `kms:Encrypt` permission to the new key, Secrets
2269
- # Manager does not re-ecrypt existing secret versions with the new
2269
+ # Manager does not re-encrypt existing secret versions with the new
2270
2270
  # key. For more information about versions and staging labels, see
2271
2271
  # [Concepts: Version][1].
2272
2272
  #
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-secretsmanager/customizations'
52
52
  # @!group service
53
53
  module Aws::SecretsManager
54
54
 
55
- GEM_VERSION = '1.100.0'
55
+ GEM_VERSION = '1.102.0'
56
56
 
57
57
  end
data/sig/client.rbs CHANGED
@@ -48,6 +48,7 @@ module Aws
48
48
  ?sdk_ua_app_id: String,
49
49
  ?secret_access_key: String,
50
50
  ?session_token: String,
51
+ ?sigv4a_signing_region_set: Array[String],
51
52
  ?simple_json: bool,
52
53
  ?stub_responses: untyped,
53
54
  ?token_provider: untyped,
data/sig/resource.rbs CHANGED
@@ -48,6 +48,7 @@ module Aws
48
48
  ?sdk_ua_app_id: String,
49
49
  ?secret_access_key: String,
50
50
  ?session_token: String,
51
+ ?sigv4a_signing_region_set: Array[String],
51
52
  ?simple_json: bool,
52
53
  ?stub_responses: untyped,
53
54
  ?token_provider: untyped,
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-secretsmanager
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.100.0
4
+ version: 1.102.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-06-25 00:00:00.000000000 Z
11
+ date: 2024-07-18 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -19,7 +19,7 @@ dependencies:
19
19
  version: '3'
20
20
  - - ">="
21
21
  - !ruby/object:Gem::Version
22
- version: 3.199.0
22
+ version: 3.201.0
23
23
  type: :runtime
24
24
  prerelease: false
25
25
  version_requirements: !ruby/object:Gem::Requirement
@@ -29,21 +29,21 @@ dependencies:
29
29
  version: '3'
30
30
  - - ">="
31
31
  - !ruby/object:Gem::Version
32
- version: 3.199.0
32
+ version: 3.201.0
33
33
  - !ruby/object:Gem::Dependency
34
34
  name: aws-sigv4
35
35
  requirement: !ruby/object:Gem::Requirement
36
36
  requirements:
37
37
  - - "~>"
38
38
  - !ruby/object:Gem::Version
39
- version: '1.1'
39
+ version: '1.5'
40
40
  type: :runtime
41
41
  prerelease: false
42
42
  version_requirements: !ruby/object:Gem::Requirement
43
43
  requirements:
44
44
  - - "~>"
45
45
  - !ruby/object:Gem::Version
46
- version: '1.1'
46
+ version: '1.5'
47
47
  description: Official AWS Ruby gem for AWS Secrets Manager. This gem is part of the
48
48
  AWS SDK for Ruby.
49
49
  email: