aws-sdk-secretsmanager 1.101.0 → 1.103.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-secretsmanager/client.rb +43 -5
- data/lib/aws-sdk-secretsmanager/types.rb +1 -1
- data/lib/aws-sdk-secretsmanager.rb +1 -1
- data/sig/client.rbs +1 -0
- data/sig/resource.rbs +1 -0
- metadata +4 -4
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: c4b00cfe03c49655fa2c684267c14cb108b7e4599718ef9076c89272034aeeaa
|
4
|
+
data.tar.gz: 670cb1b4519e6e160d8c041af2f661e8d6b85402ef96dc137887906ffeaa75bb
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 508fea2b0771c6c709ca4436a1b104a0022d836e870d64b931a38c11a1ea0affbef091f927d51da27f9a205655c3ff05364e19957f01329d3e54c45704e4b78d
|
7
|
+
data.tar.gz: e304002223b05d777fe4ca0a71d316bc375061cdec6da020e8bb93ceaeef010f72faa32d5f92cf9b9c377080a5cdb33eb09d74cf3a486d23a24318f0fa85b3b7
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.103.0 (2024-09-03)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
8
|
+
|
9
|
+
1.102.0 (2024-07-18)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Doc only update for Secrets Manager
|
13
|
+
|
4
14
|
1.101.0 (2024-07-02)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.103.0
|
@@ -32,6 +32,7 @@ require 'aws-sdk-core/plugins/checksum_algorithm.rb'
|
|
32
32
|
require 'aws-sdk-core/plugins/request_compression.rb'
|
33
33
|
require 'aws-sdk-core/plugins/defaults_mode.rb'
|
34
34
|
require 'aws-sdk-core/plugins/recursion_detection.rb'
|
35
|
+
require 'aws-sdk-core/plugins/telemetry.rb'
|
35
36
|
require 'aws-sdk-core/plugins/sign.rb'
|
36
37
|
require 'aws-sdk-core/plugins/protocols/json_rpc.rb'
|
37
38
|
|
@@ -83,6 +84,7 @@ module Aws::SecretsManager
|
|
83
84
|
add_plugin(Aws::Plugins::RequestCompression)
|
84
85
|
add_plugin(Aws::Plugins::DefaultsMode)
|
85
86
|
add_plugin(Aws::Plugins::RecursionDetection)
|
87
|
+
add_plugin(Aws::Plugins::Telemetry)
|
86
88
|
add_plugin(Aws::Plugins::Sign)
|
87
89
|
add_plugin(Aws::Plugins::Protocols::JsonRpc)
|
88
90
|
add_plugin(Aws::SecretsManager::Plugins::Endpoints)
|
@@ -337,6 +339,16 @@ module Aws::SecretsManager
|
|
337
339
|
# ** Please note ** When response stubbing is enabled, no HTTP
|
338
340
|
# requests are made, and retries are disabled.
|
339
341
|
#
|
342
|
+
# @option options [Aws::Telemetry::TelemetryProviderBase] :telemetry_provider (Aws::Telemetry::NoOpTelemetryProvider)
|
343
|
+
# Allows you to provide a telemetry provider, which is used to
|
344
|
+
# emit telemetry data. By default, uses `NoOpTelemetryProvider` which
|
345
|
+
# will not record or emit any telemetry data. The SDK supports the
|
346
|
+
# following telemetry providers:
|
347
|
+
#
|
348
|
+
# * OpenTelemetry (OTel) - To use the OTel provider, install and require the
|
349
|
+
# `opentelemetry-sdk` gem and then, pass in an instance of a
|
350
|
+
# `Aws::Telemetry::OTelProvider` for telemetry provider.
|
351
|
+
#
|
340
352
|
# @option options [Aws::TokenProvider] :token_provider
|
341
353
|
# A Bearer Token Provider. This can be an instance of any one of the
|
342
354
|
# following classes:
|
@@ -724,6 +736,12 @@ module Aws::SecretsManager
|
|
724
736
|
# you need `kms:GenerateDataKey` and `kms:Decrypt` permission to the
|
725
737
|
# key.
|
726
738
|
#
|
739
|
+
# When you enter commands in a command shell, there is a risk of the
|
740
|
+
# command history being accessed or utilities having access to your
|
741
|
+
# command parameters. This is a concern if the command includes the
|
742
|
+
# value of a secret. Learn how to [Mitigate the risks of using
|
743
|
+
# command-line tools to store Secrets Manager secrets][7].
|
744
|
+
#
|
727
745
|
#
|
728
746
|
#
|
729
747
|
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/service-linked-secrets.html
|
@@ -732,6 +750,7 @@ module Aws::SecretsManager
|
|
732
750
|
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
733
751
|
# [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
734
752
|
# [6]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
753
|
+
# [7]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
|
735
754
|
#
|
736
755
|
# @option params [required, String] :name
|
737
756
|
# The name of the new secret.
|
@@ -2038,11 +2057,18 @@ module Aws::SecretsManager
|
|
2038
2057
|
# more information, see [ IAM policy actions for Secrets Manager][2] and
|
2039
2058
|
# [Authentication and access control in Secrets Manager][3].
|
2040
2059
|
#
|
2060
|
+
# When you enter commands in a command shell, there is a risk of the
|
2061
|
+
# command history being accessed or utilities having access to your
|
2062
|
+
# command parameters. This is a concern if the command includes the
|
2063
|
+
# value of a secret. Learn how to [Mitigate the risks of using
|
2064
|
+
# command-line tools to store Secrets Manager secrets][4].
|
2065
|
+
#
|
2041
2066
|
#
|
2042
2067
|
#
|
2043
2068
|
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
2044
2069
|
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
2045
2070
|
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
2071
|
+
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
|
2046
2072
|
#
|
2047
2073
|
# @option params [required, String] :secret_id
|
2048
2074
|
# The ARN or name of the secret to add a new version to.
|
@@ -2891,10 +2917,16 @@ module Aws::SecretsManager
|
|
2891
2917
|
# a customer managed key, you must also have `kms:GenerateDataKey`,
|
2892
2918
|
# `kms:Encrypt`, and `kms:Decrypt` permissions on the key. If you change
|
2893
2919
|
# the KMS key and you don't have `kms:Encrypt` permission to the new
|
2894
|
-
# key, Secrets Manager does not re-
|
2920
|
+
# key, Secrets Manager does not re-encrypt existing secret versions with
|
2895
2921
|
# the new key. For more information, see [ Secret encryption and
|
2896
2922
|
# decryption][5].
|
2897
2923
|
#
|
2924
|
+
# When you enter commands in a command shell, there is a risk of the
|
2925
|
+
# command history being accessed or utilities having access to your
|
2926
|
+
# command parameters. This is a concern if the command includes the
|
2927
|
+
# value of a secret. Learn how to [Mitigate the risks of using
|
2928
|
+
# command-line tools to store Secrets Manager secrets][6].
|
2929
|
+
#
|
2898
2930
|
#
|
2899
2931
|
#
|
2900
2932
|
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/service-linked-secrets.html
|
@@ -2902,6 +2934,7 @@ module Aws::SecretsManager
|
|
2902
2934
|
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
2903
2935
|
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
2904
2936
|
# [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security-encryption.html
|
2937
|
+
# [6]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
|
2905
2938
|
#
|
2906
2939
|
# @option params [required, String] :secret_id
|
2907
2940
|
# The ARN or name of the secret.
|
@@ -2950,8 +2983,8 @@ module Aws::SecretsManager
|
|
2950
2983
|
# encrypt new secret versions as well as any existing versions with the
|
2951
2984
|
# staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. If you
|
2952
2985
|
# don't have `kms:Encrypt` permission to the new key, Secrets Manager
|
2953
|
-
# does not re-
|
2954
|
-
# information about versions and staging labels, see [Concepts:
|
2986
|
+
# does not re-encrypt existing secret versions with the new key. For
|
2987
|
+
# more information about versions and staging labels, see [Concepts:
|
2955
2988
|
# Version][1].
|
2956
2989
|
#
|
2957
2990
|
# A key alias is always prefixed by `alias/`, for example
|
@@ -3340,14 +3373,19 @@ module Aws::SecretsManager
|
|
3340
3373
|
# @api private
|
3341
3374
|
def build_request(operation_name, params = {})
|
3342
3375
|
handlers = @handlers.for(operation_name)
|
3376
|
+
tracer = config.telemetry_provider.tracer_provider.tracer(
|
3377
|
+
Aws::Telemetry.module_to_tracer_name('Aws::SecretsManager')
|
3378
|
+
)
|
3343
3379
|
context = Seahorse::Client::RequestContext.new(
|
3344
3380
|
operation_name: operation_name,
|
3345
3381
|
operation: config.api.operation(operation_name),
|
3346
3382
|
client: self,
|
3347
3383
|
params: params,
|
3348
|
-
config: config
|
3384
|
+
config: config,
|
3385
|
+
tracer: tracer
|
3386
|
+
)
|
3349
3387
|
context[:gem_name] = 'aws-sdk-secretsmanager'
|
3350
|
-
context[:gem_version] = '1.
|
3388
|
+
context[:gem_version] = '1.103.0'
|
3351
3389
|
Seahorse::Client::Request.new(handlers, context)
|
3352
3390
|
end
|
3353
3391
|
|
@@ -2266,7 +2266,7 @@ module Aws::SecretsManager
|
|
2266
2266
|
# to encrypt new secret versions as well as any existing versions with
|
2267
2267
|
# the staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. If
|
2268
2268
|
# you don't have `kms:Encrypt` permission to the new key, Secrets
|
2269
|
-
# Manager does not re-
|
2269
|
+
# Manager does not re-encrypt existing secret versions with the new
|
2270
2270
|
# key. For more information about versions and staging labels, see
|
2271
2271
|
# [Concepts: Version][1].
|
2272
2272
|
#
|
data/sig/client.rbs
CHANGED
@@ -51,6 +51,7 @@ module Aws
|
|
51
51
|
?sigv4a_signing_region_set: Array[String],
|
52
52
|
?simple_json: bool,
|
53
53
|
?stub_responses: untyped,
|
54
|
+
?telemetry_provider: Aws::Telemetry::TelemetryProviderBase,
|
54
55
|
?token_provider: untyped,
|
55
56
|
?use_dualstack_endpoint: bool,
|
56
57
|
?use_fips_endpoint: bool,
|
data/sig/resource.rbs
CHANGED
@@ -51,6 +51,7 @@ module Aws
|
|
51
51
|
?sigv4a_signing_region_set: Array[String],
|
52
52
|
?simple_json: bool,
|
53
53
|
?stub_responses: untyped,
|
54
|
+
?telemetry_provider: Aws::Telemetry::TelemetryProviderBase,
|
54
55
|
?token_provider: untyped,
|
55
56
|
?use_dualstack_endpoint: bool,
|
56
57
|
?use_fips_endpoint: bool,
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-secretsmanager
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.103.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-
|
11
|
+
date: 2024-09-03 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|
@@ -19,7 +19,7 @@ dependencies:
|
|
19
19
|
version: '3'
|
20
20
|
- - ">="
|
21
21
|
- !ruby/object:Gem::Version
|
22
|
-
version: 3.
|
22
|
+
version: 3.203.0
|
23
23
|
type: :runtime
|
24
24
|
prerelease: false
|
25
25
|
version_requirements: !ruby/object:Gem::Requirement
|
@@ -29,7 +29,7 @@ dependencies:
|
|
29
29
|
version: '3'
|
30
30
|
- - ">="
|
31
31
|
- !ruby/object:Gem::Version
|
32
|
-
version: 3.
|
32
|
+
version: 3.203.0
|
33
33
|
- !ruby/object:Gem::Dependency
|
34
34
|
name: aws-sigv4
|
35
35
|
requirement: !ruby/object:Gem::Requirement
|