aws-sdk-secretsmanager 1.100.0 → 1.102.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-secretsmanager/client.rb +34 -4
- data/lib/aws-sdk-secretsmanager/types.rb +1 -1
- data/lib/aws-sdk-secretsmanager.rb +1 -1
- data/sig/client.rbs +1 -0
- data/sig/resource.rbs +1 -0
- metadata +6 -6
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 50f7a307d3cf7e170b14c7c82003a213df54c39cb4ef1362439c98b1bb8975fb
|
4
|
+
data.tar.gz: f582e643ce4cedebc497bf2d4b5dbe1df20e1e46093eb7acff75202bcd351e0f
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: b2090771993d6af8f722c35db483af31fe92513907c358a2faddedfcde98d52e017df49d29550a36da745b3943d98273c5ab72e86fc3e2fa05a66fcf7d06d296
|
7
|
+
data.tar.gz: f921d379077a4522b8982ae7e0328fdadb73909152cfc0c681a442a766fe7e6214ded88dd8903918cf23f50dca640782b3dc73c63ca5026b85fc9f4b65b8614e
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.102.0 (2024-07-18)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Doc only update for Secrets Manager
|
8
|
+
|
9
|
+
1.101.0 (2024-07-02)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
13
|
+
|
4
14
|
1.100.0 (2024-06-25)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.102.0
|
@@ -312,6 +312,15 @@ module Aws::SecretsManager
|
|
312
312
|
#
|
313
313
|
# @option options [String] :session_token
|
314
314
|
#
|
315
|
+
# @option options [Array] :sigv4a_signing_region_set
|
316
|
+
# A list of regions that should be signed with SigV4a signing. When
|
317
|
+
# not passed, a default `:sigv4a_signing_region_set` is searched for
|
318
|
+
# in the following locations:
|
319
|
+
#
|
320
|
+
# * `Aws.config[:sigv4a_signing_region_set]`
|
321
|
+
# * `ENV['AWS_SIGV4A_SIGNING_REGION_SET']`
|
322
|
+
# * `~/.aws/config`
|
323
|
+
#
|
315
324
|
# @option options [Boolean] :simple_json (false)
|
316
325
|
# Disables request parameter conversion, validation, and formatting.
|
317
326
|
# Also disables response data type conversions. The request parameters
|
@@ -715,6 +724,12 @@ module Aws::SecretsManager
|
|
715
724
|
# you need `kms:GenerateDataKey` and `kms:Decrypt` permission to the
|
716
725
|
# key.
|
717
726
|
#
|
727
|
+
# When you enter commands in a command shell, there is a risk of the
|
728
|
+
# command history being accessed or utilities having access to your
|
729
|
+
# command parameters. This is a concern if the command includes the
|
730
|
+
# value of a secret. Learn how to [Mitigate the risks of using
|
731
|
+
# command-line tools to store Secrets Manager secrets][7].
|
732
|
+
#
|
718
733
|
#
|
719
734
|
#
|
720
735
|
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/service-linked-secrets.html
|
@@ -723,6 +738,7 @@ module Aws::SecretsManager
|
|
723
738
|
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
724
739
|
# [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
725
740
|
# [6]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
741
|
+
# [7]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
|
726
742
|
#
|
727
743
|
# @option params [required, String] :name
|
728
744
|
# The name of the new secret.
|
@@ -2029,11 +2045,18 @@ module Aws::SecretsManager
|
|
2029
2045
|
# more information, see [ IAM policy actions for Secrets Manager][2] and
|
2030
2046
|
# [Authentication and access control in Secrets Manager][3].
|
2031
2047
|
#
|
2048
|
+
# When you enter commands in a command shell, there is a risk of the
|
2049
|
+
# command history being accessed or utilities having access to your
|
2050
|
+
# command parameters. This is a concern if the command includes the
|
2051
|
+
# value of a secret. Learn how to [Mitigate the risks of using
|
2052
|
+
# command-line tools to store Secrets Manager secrets][4].
|
2053
|
+
#
|
2032
2054
|
#
|
2033
2055
|
#
|
2034
2056
|
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
2035
2057
|
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
2036
2058
|
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
2059
|
+
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
|
2037
2060
|
#
|
2038
2061
|
# @option params [required, String] :secret_id
|
2039
2062
|
# The ARN or name of the secret to add a new version to.
|
@@ -2882,10 +2905,16 @@ module Aws::SecretsManager
|
|
2882
2905
|
# a customer managed key, you must also have `kms:GenerateDataKey`,
|
2883
2906
|
# `kms:Encrypt`, and `kms:Decrypt` permissions on the key. If you change
|
2884
2907
|
# the KMS key and you don't have `kms:Encrypt` permission to the new
|
2885
|
-
# key, Secrets Manager does not re-
|
2908
|
+
# key, Secrets Manager does not re-encrypt existing secret versions with
|
2886
2909
|
# the new key. For more information, see [ Secret encryption and
|
2887
2910
|
# decryption][5].
|
2888
2911
|
#
|
2912
|
+
# When you enter commands in a command shell, there is a risk of the
|
2913
|
+
# command history being accessed or utilities having access to your
|
2914
|
+
# command parameters. This is a concern if the command includes the
|
2915
|
+
# value of a secret. Learn how to [Mitigate the risks of using
|
2916
|
+
# command-line tools to store Secrets Manager secrets][6].
|
2917
|
+
#
|
2889
2918
|
#
|
2890
2919
|
#
|
2891
2920
|
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/service-linked-secrets.html
|
@@ -2893,6 +2922,7 @@ module Aws::SecretsManager
|
|
2893
2922
|
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
2894
2923
|
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
2895
2924
|
# [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security-encryption.html
|
2925
|
+
# [6]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
|
2896
2926
|
#
|
2897
2927
|
# @option params [required, String] :secret_id
|
2898
2928
|
# The ARN or name of the secret.
|
@@ -2941,8 +2971,8 @@ module Aws::SecretsManager
|
|
2941
2971
|
# encrypt new secret versions as well as any existing versions with the
|
2942
2972
|
# staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. If you
|
2943
2973
|
# don't have `kms:Encrypt` permission to the new key, Secrets Manager
|
2944
|
-
# does not re-
|
2945
|
-
# information about versions and staging labels, see [Concepts:
|
2974
|
+
# does not re-encrypt existing secret versions with the new key. For
|
2975
|
+
# more information about versions and staging labels, see [Concepts:
|
2946
2976
|
# Version][1].
|
2947
2977
|
#
|
2948
2978
|
# A key alias is always prefixed by `alias/`, for example
|
@@ -3338,7 +3368,7 @@ module Aws::SecretsManager
|
|
3338
3368
|
params: params,
|
3339
3369
|
config: config)
|
3340
3370
|
context[:gem_name] = 'aws-sdk-secretsmanager'
|
3341
|
-
context[:gem_version] = '1.
|
3371
|
+
context[:gem_version] = '1.102.0'
|
3342
3372
|
Seahorse::Client::Request.new(handlers, context)
|
3343
3373
|
end
|
3344
3374
|
|
@@ -2266,7 +2266,7 @@ module Aws::SecretsManager
|
|
2266
2266
|
# to encrypt new secret versions as well as any existing versions with
|
2267
2267
|
# the staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. If
|
2268
2268
|
# you don't have `kms:Encrypt` permission to the new key, Secrets
|
2269
|
-
# Manager does not re-
|
2269
|
+
# Manager does not re-encrypt existing secret versions with the new
|
2270
2270
|
# key. For more information about versions and staging labels, see
|
2271
2271
|
# [Concepts: Version][1].
|
2272
2272
|
#
|
data/sig/client.rbs
CHANGED
data/sig/resource.rbs
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-secretsmanager
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.102.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-
|
11
|
+
date: 2024-07-18 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|
@@ -19,7 +19,7 @@ dependencies:
|
|
19
19
|
version: '3'
|
20
20
|
- - ">="
|
21
21
|
- !ruby/object:Gem::Version
|
22
|
-
version: 3.
|
22
|
+
version: 3.201.0
|
23
23
|
type: :runtime
|
24
24
|
prerelease: false
|
25
25
|
version_requirements: !ruby/object:Gem::Requirement
|
@@ -29,21 +29,21 @@ dependencies:
|
|
29
29
|
version: '3'
|
30
30
|
- - ">="
|
31
31
|
- !ruby/object:Gem::Version
|
32
|
-
version: 3.
|
32
|
+
version: 3.201.0
|
33
33
|
- !ruby/object:Gem::Dependency
|
34
34
|
name: aws-sigv4
|
35
35
|
requirement: !ruby/object:Gem::Requirement
|
36
36
|
requirements:
|
37
37
|
- - "~>"
|
38
38
|
- !ruby/object:Gem::Version
|
39
|
-
version: '1.
|
39
|
+
version: '1.5'
|
40
40
|
type: :runtime
|
41
41
|
prerelease: false
|
42
42
|
version_requirements: !ruby/object:Gem::Requirement
|
43
43
|
requirements:
|
44
44
|
- - "~>"
|
45
45
|
- !ruby/object:Gem::Version
|
46
|
-
version: '1.
|
46
|
+
version: '1.5'
|
47
47
|
description: Official AWS Ruby gem for AWS Secrets Manager. This gem is part of the
|
48
48
|
AWS SDK for Ruby.
|
49
49
|
email:
|