aws-sdk-secretsmanager 1.100.0 → 1.102.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-secretsmanager/client.rb +34 -4
- data/lib/aws-sdk-secretsmanager/types.rb +1 -1
- data/lib/aws-sdk-secretsmanager.rb +1 -1
- data/sig/client.rbs +1 -0
- data/sig/resource.rbs +1 -0
- metadata +6 -6
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 50f7a307d3cf7e170b14c7c82003a213df54c39cb4ef1362439c98b1bb8975fb
|
|
4
|
+
data.tar.gz: f582e643ce4cedebc497bf2d4b5dbe1df20e1e46093eb7acff75202bcd351e0f
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: b2090771993d6af8f722c35db483af31fe92513907c358a2faddedfcde98d52e017df49d29550a36da745b3943d98273c5ab72e86fc3e2fa05a66fcf7d06d296
|
|
7
|
+
data.tar.gz: f921d379077a4522b8982ae7e0328fdadb73909152cfc0c681a442a766fe7e6214ded88dd8903918cf23f50dca640782b3dc73c63ca5026b85fc9f4b65b8614e
|
data/CHANGELOG.md
CHANGED
|
@@ -1,6 +1,16 @@
|
|
|
1
1
|
Unreleased Changes
|
|
2
2
|
------------------
|
|
3
3
|
|
|
4
|
+
1.102.0 (2024-07-18)
|
|
5
|
+
------------------
|
|
6
|
+
|
|
7
|
+
* Feature - Doc only update for Secrets Manager
|
|
8
|
+
|
|
9
|
+
1.101.0 (2024-07-02)
|
|
10
|
+
------------------
|
|
11
|
+
|
|
12
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
|
13
|
+
|
|
4
14
|
1.100.0 (2024-06-25)
|
|
5
15
|
------------------
|
|
6
16
|
|
data/VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.
|
|
1
|
+
1.102.0
|
|
@@ -312,6 +312,15 @@ module Aws::SecretsManager
|
|
|
312
312
|
#
|
|
313
313
|
# @option options [String] :session_token
|
|
314
314
|
#
|
|
315
|
+
# @option options [Array] :sigv4a_signing_region_set
|
|
316
|
+
# A list of regions that should be signed with SigV4a signing. When
|
|
317
|
+
# not passed, a default `:sigv4a_signing_region_set` is searched for
|
|
318
|
+
# in the following locations:
|
|
319
|
+
#
|
|
320
|
+
# * `Aws.config[:sigv4a_signing_region_set]`
|
|
321
|
+
# * `ENV['AWS_SIGV4A_SIGNING_REGION_SET']`
|
|
322
|
+
# * `~/.aws/config`
|
|
323
|
+
#
|
|
315
324
|
# @option options [Boolean] :simple_json (false)
|
|
316
325
|
# Disables request parameter conversion, validation, and formatting.
|
|
317
326
|
# Also disables response data type conversions. The request parameters
|
|
@@ -715,6 +724,12 @@ module Aws::SecretsManager
|
|
|
715
724
|
# you need `kms:GenerateDataKey` and `kms:Decrypt` permission to the
|
|
716
725
|
# key.
|
|
717
726
|
#
|
|
727
|
+
# When you enter commands in a command shell, there is a risk of the
|
|
728
|
+
# command history being accessed or utilities having access to your
|
|
729
|
+
# command parameters. This is a concern if the command includes the
|
|
730
|
+
# value of a secret. Learn how to [Mitigate the risks of using
|
|
731
|
+
# command-line tools to store Secrets Manager secrets][7].
|
|
732
|
+
#
|
|
718
733
|
#
|
|
719
734
|
#
|
|
720
735
|
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/service-linked-secrets.html
|
|
@@ -723,6 +738,7 @@ module Aws::SecretsManager
|
|
|
723
738
|
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
|
724
739
|
# [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
|
725
740
|
# [6]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
|
741
|
+
# [7]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
|
|
726
742
|
#
|
|
727
743
|
# @option params [required, String] :name
|
|
728
744
|
# The name of the new secret.
|
|
@@ -2029,11 +2045,18 @@ module Aws::SecretsManager
|
|
|
2029
2045
|
# more information, see [ IAM policy actions for Secrets Manager][2] and
|
|
2030
2046
|
# [Authentication and access control in Secrets Manager][3].
|
|
2031
2047
|
#
|
|
2048
|
+
# When you enter commands in a command shell, there is a risk of the
|
|
2049
|
+
# command history being accessed or utilities having access to your
|
|
2050
|
+
# command parameters. This is a concern if the command includes the
|
|
2051
|
+
# value of a secret. Learn how to [Mitigate the risks of using
|
|
2052
|
+
# command-line tools to store Secrets Manager secrets][4].
|
|
2053
|
+
#
|
|
2032
2054
|
#
|
|
2033
2055
|
#
|
|
2034
2056
|
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
|
2035
2057
|
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
|
2036
2058
|
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
|
2059
|
+
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
|
|
2037
2060
|
#
|
|
2038
2061
|
# @option params [required, String] :secret_id
|
|
2039
2062
|
# The ARN or name of the secret to add a new version to.
|
|
@@ -2882,10 +2905,16 @@ module Aws::SecretsManager
|
|
|
2882
2905
|
# a customer managed key, you must also have `kms:GenerateDataKey`,
|
|
2883
2906
|
# `kms:Encrypt`, and `kms:Decrypt` permissions on the key. If you change
|
|
2884
2907
|
# the KMS key and you don't have `kms:Encrypt` permission to the new
|
|
2885
|
-
# key, Secrets Manager does not re-
|
|
2908
|
+
# key, Secrets Manager does not re-encrypt existing secret versions with
|
|
2886
2909
|
# the new key. For more information, see [ Secret encryption and
|
|
2887
2910
|
# decryption][5].
|
|
2888
2911
|
#
|
|
2912
|
+
# When you enter commands in a command shell, there is a risk of the
|
|
2913
|
+
# command history being accessed or utilities having access to your
|
|
2914
|
+
# command parameters. This is a concern if the command includes the
|
|
2915
|
+
# value of a secret. Learn how to [Mitigate the risks of using
|
|
2916
|
+
# command-line tools to store Secrets Manager secrets][6].
|
|
2917
|
+
#
|
|
2889
2918
|
#
|
|
2890
2919
|
#
|
|
2891
2920
|
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/service-linked-secrets.html
|
|
@@ -2893,6 +2922,7 @@ module Aws::SecretsManager
|
|
|
2893
2922
|
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
|
2894
2923
|
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
|
2895
2924
|
# [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security-encryption.html
|
|
2925
|
+
# [6]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
|
|
2896
2926
|
#
|
|
2897
2927
|
# @option params [required, String] :secret_id
|
|
2898
2928
|
# The ARN or name of the secret.
|
|
@@ -2941,8 +2971,8 @@ module Aws::SecretsManager
|
|
|
2941
2971
|
# encrypt new secret versions as well as any existing versions with the
|
|
2942
2972
|
# staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. If you
|
|
2943
2973
|
# don't have `kms:Encrypt` permission to the new key, Secrets Manager
|
|
2944
|
-
# does not re-
|
|
2945
|
-
# information about versions and staging labels, see [Concepts:
|
|
2974
|
+
# does not re-encrypt existing secret versions with the new key. For
|
|
2975
|
+
# more information about versions and staging labels, see [Concepts:
|
|
2946
2976
|
# Version][1].
|
|
2947
2977
|
#
|
|
2948
2978
|
# A key alias is always prefixed by `alias/`, for example
|
|
@@ -3338,7 +3368,7 @@ module Aws::SecretsManager
|
|
|
3338
3368
|
params: params,
|
|
3339
3369
|
config: config)
|
|
3340
3370
|
context[:gem_name] = 'aws-sdk-secretsmanager'
|
|
3341
|
-
context[:gem_version] = '1.
|
|
3371
|
+
context[:gem_version] = '1.102.0'
|
|
3342
3372
|
Seahorse::Client::Request.new(handlers, context)
|
|
3343
3373
|
end
|
|
3344
3374
|
|
|
@@ -2266,7 +2266,7 @@ module Aws::SecretsManager
|
|
|
2266
2266
|
# to encrypt new secret versions as well as any existing versions with
|
|
2267
2267
|
# the staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. If
|
|
2268
2268
|
# you don't have `kms:Encrypt` permission to the new key, Secrets
|
|
2269
|
-
# Manager does not re-
|
|
2269
|
+
# Manager does not re-encrypt existing secret versions with the new
|
|
2270
2270
|
# key. For more information about versions and staging labels, see
|
|
2271
2271
|
# [Concepts: Version][1].
|
|
2272
2272
|
#
|
data/sig/client.rbs
CHANGED
data/sig/resource.rbs
CHANGED
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: aws-sdk-secretsmanager
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 1.
|
|
4
|
+
version: 1.102.0
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Amazon Web Services
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2024-
|
|
11
|
+
date: 2024-07-18 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: aws-sdk-core
|
|
@@ -19,7 +19,7 @@ dependencies:
|
|
|
19
19
|
version: '3'
|
|
20
20
|
- - ">="
|
|
21
21
|
- !ruby/object:Gem::Version
|
|
22
|
-
version: 3.
|
|
22
|
+
version: 3.201.0
|
|
23
23
|
type: :runtime
|
|
24
24
|
prerelease: false
|
|
25
25
|
version_requirements: !ruby/object:Gem::Requirement
|
|
@@ -29,21 +29,21 @@ dependencies:
|
|
|
29
29
|
version: '3'
|
|
30
30
|
- - ">="
|
|
31
31
|
- !ruby/object:Gem::Version
|
|
32
|
-
version: 3.
|
|
32
|
+
version: 3.201.0
|
|
33
33
|
- !ruby/object:Gem::Dependency
|
|
34
34
|
name: aws-sigv4
|
|
35
35
|
requirement: !ruby/object:Gem::Requirement
|
|
36
36
|
requirements:
|
|
37
37
|
- - "~>"
|
|
38
38
|
- !ruby/object:Gem::Version
|
|
39
|
-
version: '1.
|
|
39
|
+
version: '1.5'
|
|
40
40
|
type: :runtime
|
|
41
41
|
prerelease: false
|
|
42
42
|
version_requirements: !ruby/object:Gem::Requirement
|
|
43
43
|
requirements:
|
|
44
44
|
- - "~>"
|
|
45
45
|
- !ruby/object:Gem::Version
|
|
46
|
-
version: '1.
|
|
46
|
+
version: '1.5'
|
|
47
47
|
description: Official AWS Ruby gem for AWS Secrets Manager. This gem is part of the
|
|
48
48
|
AWS SDK for Ruby.
|
|
49
49
|
email:
|