aws-sdk-secretsmanager 1.100.0 → 1.102.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 38fb7475b0441ce17e120fa6c7c0eb487135f865163e5ed457179845a2ef8031
4
- data.tar.gz: 4fa1a07ae1fba7606b808ac0a2d36a39b5913b39e014122c094ba3dbb6d9bc4a
3
+ metadata.gz: 50f7a307d3cf7e170b14c7c82003a213df54c39cb4ef1362439c98b1bb8975fb
4
+ data.tar.gz: f582e643ce4cedebc497bf2d4b5dbe1df20e1e46093eb7acff75202bcd351e0f
5
5
  SHA512:
6
- metadata.gz: f7b51c716baee7e3bc54657cb949e935363dccb5ff2854cbfd92d23cf6f661009d59b5fa5c58a366ac9b04d1759f9c131857eaf564ed465e3f7d9aef315ebdef
7
- data.tar.gz: 6c7987592b17c7c9a77dbd4b81e3395c5d4b99ed71a42fcc33bc7a35716b63c857f4a3f6591d9f4c557b9c3f41f1ef215e4789b56440786388f68b9d76d6dcc6
6
+ metadata.gz: b2090771993d6af8f722c35db483af31fe92513907c358a2faddedfcde98d52e017df49d29550a36da745b3943d98273c5ab72e86fc3e2fa05a66fcf7d06d296
7
+ data.tar.gz: f921d379077a4522b8982ae7e0328fdadb73909152cfc0c681a442a766fe7e6214ded88dd8903918cf23f50dca640782b3dc73c63ca5026b85fc9f4b65b8614e
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.102.0 (2024-07-18)
5
+ ------------------
6
+
7
+ * Feature - Doc only update for Secrets Manager
8
+
9
+ 1.101.0 (2024-07-02)
10
+ ------------------
11
+
12
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
13
+
4
14
  1.100.0 (2024-06-25)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.100.0
1
+ 1.102.0
@@ -312,6 +312,15 @@ module Aws::SecretsManager
312
312
  #
313
313
  # @option options [String] :session_token
314
314
  #
315
+ # @option options [Array] :sigv4a_signing_region_set
316
+ # A list of regions that should be signed with SigV4a signing. When
317
+ # not passed, a default `:sigv4a_signing_region_set` is searched for
318
+ # in the following locations:
319
+ #
320
+ # * `Aws.config[:sigv4a_signing_region_set]`
321
+ # * `ENV['AWS_SIGV4A_SIGNING_REGION_SET']`
322
+ # * `~/.aws/config`
323
+ #
315
324
  # @option options [Boolean] :simple_json (false)
316
325
  # Disables request parameter conversion, validation, and formatting.
317
326
  # Also disables response data type conversions. The request parameters
@@ -715,6 +724,12 @@ module Aws::SecretsManager
715
724
  # you need `kms:GenerateDataKey` and `kms:Decrypt` permission to the
716
725
  # key.
717
726
  #
727
+ # When you enter commands in a command shell, there is a risk of the
728
+ # command history being accessed or utilities having access to your
729
+ # command parameters. This is a concern if the command includes the
730
+ # value of a secret. Learn how to [Mitigate the risks of using
731
+ # command-line tools to store Secrets Manager secrets][7].
732
+ #
718
733
  #
719
734
  #
720
735
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/service-linked-secrets.html
@@ -723,6 +738,7 @@ module Aws::SecretsManager
723
738
  # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
724
739
  # [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
725
740
  # [6]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
741
+ # [7]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
726
742
  #
727
743
  # @option params [required, String] :name
728
744
  # The name of the new secret.
@@ -2029,11 +2045,18 @@ module Aws::SecretsManager
2029
2045
  # more information, see [ IAM policy actions for Secrets Manager][2] and
2030
2046
  # [Authentication and access control in Secrets Manager][3].
2031
2047
  #
2048
+ # When you enter commands in a command shell, there is a risk of the
2049
+ # command history being accessed or utilities having access to your
2050
+ # command parameters. This is a concern if the command includes the
2051
+ # value of a secret. Learn how to [Mitigate the risks of using
2052
+ # command-line tools to store Secrets Manager secrets][4].
2053
+ #
2032
2054
  #
2033
2055
  #
2034
2056
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
2035
2057
  # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2036
2058
  # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2059
+ # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
2037
2060
  #
2038
2061
  # @option params [required, String] :secret_id
2039
2062
  # The ARN or name of the secret to add a new version to.
@@ -2882,10 +2905,16 @@ module Aws::SecretsManager
2882
2905
  # a customer managed key, you must also have `kms:GenerateDataKey`,
2883
2906
  # `kms:Encrypt`, and `kms:Decrypt` permissions on the key. If you change
2884
2907
  # the KMS key and you don't have `kms:Encrypt` permission to the new
2885
- # key, Secrets Manager does not re-ecrypt existing secret versions with
2908
+ # key, Secrets Manager does not re-encrypt existing secret versions with
2886
2909
  # the new key. For more information, see [ Secret encryption and
2887
2910
  # decryption][5].
2888
2911
  #
2912
+ # When you enter commands in a command shell, there is a risk of the
2913
+ # command history being accessed or utilities having access to your
2914
+ # command parameters. This is a concern if the command includes the
2915
+ # value of a secret. Learn how to [Mitigate the risks of using
2916
+ # command-line tools to store Secrets Manager secrets][6].
2917
+ #
2889
2918
  #
2890
2919
  #
2891
2920
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/service-linked-secrets.html
@@ -2893,6 +2922,7 @@ module Aws::SecretsManager
2893
2922
  # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2894
2923
  # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2895
2924
  # [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security-encryption.html
2925
+ # [6]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
2896
2926
  #
2897
2927
  # @option params [required, String] :secret_id
2898
2928
  # The ARN or name of the secret.
@@ -2941,8 +2971,8 @@ module Aws::SecretsManager
2941
2971
  # encrypt new secret versions as well as any existing versions with the
2942
2972
  # staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. If you
2943
2973
  # don't have `kms:Encrypt` permission to the new key, Secrets Manager
2944
- # does not re-ecrypt existing secret versions with the new key. For more
2945
- # information about versions and staging labels, see [Concepts:
2974
+ # does not re-encrypt existing secret versions with the new key. For
2975
+ # more information about versions and staging labels, see [Concepts:
2946
2976
  # Version][1].
2947
2977
  #
2948
2978
  # A key alias is always prefixed by `alias/`, for example
@@ -3338,7 +3368,7 @@ module Aws::SecretsManager
3338
3368
  params: params,
3339
3369
  config: config)
3340
3370
  context[:gem_name] = 'aws-sdk-secretsmanager'
3341
- context[:gem_version] = '1.100.0'
3371
+ context[:gem_version] = '1.102.0'
3342
3372
  Seahorse::Client::Request.new(handlers, context)
3343
3373
  end
3344
3374
 
@@ -2266,7 +2266,7 @@ module Aws::SecretsManager
2266
2266
  # to encrypt new secret versions as well as any existing versions with
2267
2267
  # the staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. If
2268
2268
  # you don't have `kms:Encrypt` permission to the new key, Secrets
2269
- # Manager does not re-ecrypt existing secret versions with the new
2269
+ # Manager does not re-encrypt existing secret versions with the new
2270
2270
  # key. For more information about versions and staging labels, see
2271
2271
  # [Concepts: Version][1].
2272
2272
  #
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-secretsmanager/customizations'
52
52
  # @!group service
53
53
  module Aws::SecretsManager
54
54
 
55
- GEM_VERSION = '1.100.0'
55
+ GEM_VERSION = '1.102.0'
56
56
 
57
57
  end
data/sig/client.rbs CHANGED
@@ -48,6 +48,7 @@ module Aws
48
48
  ?sdk_ua_app_id: String,
49
49
  ?secret_access_key: String,
50
50
  ?session_token: String,
51
+ ?sigv4a_signing_region_set: Array[String],
51
52
  ?simple_json: bool,
52
53
  ?stub_responses: untyped,
53
54
  ?token_provider: untyped,
data/sig/resource.rbs CHANGED
@@ -48,6 +48,7 @@ module Aws
48
48
  ?sdk_ua_app_id: String,
49
49
  ?secret_access_key: String,
50
50
  ?session_token: String,
51
+ ?sigv4a_signing_region_set: Array[String],
51
52
  ?simple_json: bool,
52
53
  ?stub_responses: untyped,
53
54
  ?token_provider: untyped,
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-secretsmanager
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.100.0
4
+ version: 1.102.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-06-25 00:00:00.000000000 Z
11
+ date: 2024-07-18 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -19,7 +19,7 @@ dependencies:
19
19
  version: '3'
20
20
  - - ">="
21
21
  - !ruby/object:Gem::Version
22
- version: 3.199.0
22
+ version: 3.201.0
23
23
  type: :runtime
24
24
  prerelease: false
25
25
  version_requirements: !ruby/object:Gem::Requirement
@@ -29,21 +29,21 @@ dependencies:
29
29
  version: '3'
30
30
  - - ">="
31
31
  - !ruby/object:Gem::Version
32
- version: 3.199.0
32
+ version: 3.201.0
33
33
  - !ruby/object:Gem::Dependency
34
34
  name: aws-sigv4
35
35
  requirement: !ruby/object:Gem::Requirement
36
36
  requirements:
37
37
  - - "~>"
38
38
  - !ruby/object:Gem::Version
39
- version: '1.1'
39
+ version: '1.5'
40
40
  type: :runtime
41
41
  prerelease: false
42
42
  version_requirements: !ruby/object:Gem::Requirement
43
43
  requirements:
44
44
  - - "~>"
45
45
  - !ruby/object:Gem::Version
46
- version: '1.1'
46
+ version: '1.5'
47
47
  description: Official AWS Ruby gem for AWS Secrets Manager. This gem is part of the
48
48
  AWS SDK for Ruby.
49
49
  email: