aws-sdk-secretsmanager 1.101.0 → 1.103.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 27aba913be3847849aa610964d15ee3b5fca875fae22d51df856c81d1e653da4
4
- data.tar.gz: eed6bb159ff151a94fa16331e1882c7fa3b4ad23be00c8e1721ed561d00de088
3
+ metadata.gz: c4b00cfe03c49655fa2c684267c14cb108b7e4599718ef9076c89272034aeeaa
4
+ data.tar.gz: 670cb1b4519e6e160d8c041af2f661e8d6b85402ef96dc137887906ffeaa75bb
5
5
  SHA512:
6
- metadata.gz: df812f193a3284a5141a9a4a4242b0d657fcc02f90d7a3b8802a9414753f139802b5e305825e9ee852628c49072a5eb465380294e72fcb22adffaeb59eda3a1a
7
- data.tar.gz: d8e1e0b617ab53e9ad8cfc202b9f6f283e8a156d9f7c96792631dd8e313531e290e1f6b0ef3ac5221a998a9b5f788bf7a15b940fc1b349c8351243ccf060b7c9
6
+ metadata.gz: 508fea2b0771c6c709ca4436a1b104a0022d836e870d64b931a38c11a1ea0affbef091f927d51da27f9a205655c3ff05364e19957f01329d3e54c45704e4b78d
7
+ data.tar.gz: e304002223b05d777fe4ca0a71d316bc375061cdec6da020e8bb93ceaeef010f72faa32d5f92cf9b9c377080a5cdb33eb09d74cf3a486d23a24318f0fa85b3b7
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.103.0 (2024-09-03)
5
+ ------------------
6
+
7
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
8
+
9
+ 1.102.0 (2024-07-18)
10
+ ------------------
11
+
12
+ * Feature - Doc only update for Secrets Manager
13
+
4
14
  1.101.0 (2024-07-02)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.101.0
1
+ 1.103.0
@@ -32,6 +32,7 @@ require 'aws-sdk-core/plugins/checksum_algorithm.rb'
32
32
  require 'aws-sdk-core/plugins/request_compression.rb'
33
33
  require 'aws-sdk-core/plugins/defaults_mode.rb'
34
34
  require 'aws-sdk-core/plugins/recursion_detection.rb'
35
+ require 'aws-sdk-core/plugins/telemetry.rb'
35
36
  require 'aws-sdk-core/plugins/sign.rb'
36
37
  require 'aws-sdk-core/plugins/protocols/json_rpc.rb'
37
38
 
@@ -83,6 +84,7 @@ module Aws::SecretsManager
83
84
  add_plugin(Aws::Plugins::RequestCompression)
84
85
  add_plugin(Aws::Plugins::DefaultsMode)
85
86
  add_plugin(Aws::Plugins::RecursionDetection)
87
+ add_plugin(Aws::Plugins::Telemetry)
86
88
  add_plugin(Aws::Plugins::Sign)
87
89
  add_plugin(Aws::Plugins::Protocols::JsonRpc)
88
90
  add_plugin(Aws::SecretsManager::Plugins::Endpoints)
@@ -337,6 +339,16 @@ module Aws::SecretsManager
337
339
  # ** Please note ** When response stubbing is enabled, no HTTP
338
340
  # requests are made, and retries are disabled.
339
341
  #
342
+ # @option options [Aws::Telemetry::TelemetryProviderBase] :telemetry_provider (Aws::Telemetry::NoOpTelemetryProvider)
343
+ # Allows you to provide a telemetry provider, which is used to
344
+ # emit telemetry data. By default, uses `NoOpTelemetryProvider` which
345
+ # will not record or emit any telemetry data. The SDK supports the
346
+ # following telemetry providers:
347
+ #
348
+ # * OpenTelemetry (OTel) - To use the OTel provider, install and require the
349
+ # `opentelemetry-sdk` gem and then, pass in an instance of a
350
+ # `Aws::Telemetry::OTelProvider` for telemetry provider.
351
+ #
340
352
  # @option options [Aws::TokenProvider] :token_provider
341
353
  # A Bearer Token Provider. This can be an instance of any one of the
342
354
  # following classes:
@@ -724,6 +736,12 @@ module Aws::SecretsManager
724
736
  # you need `kms:GenerateDataKey` and `kms:Decrypt` permission to the
725
737
  # key.
726
738
  #
739
+ # When you enter commands in a command shell, there is a risk of the
740
+ # command history being accessed or utilities having access to your
741
+ # command parameters. This is a concern if the command includes the
742
+ # value of a secret. Learn how to [Mitigate the risks of using
743
+ # command-line tools to store Secrets Manager secrets][7].
744
+ #
727
745
  #
728
746
  #
729
747
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/service-linked-secrets.html
@@ -732,6 +750,7 @@ module Aws::SecretsManager
732
750
  # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
733
751
  # [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
734
752
  # [6]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
753
+ # [7]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
735
754
  #
736
755
  # @option params [required, String] :name
737
756
  # The name of the new secret.
@@ -2038,11 +2057,18 @@ module Aws::SecretsManager
2038
2057
  # more information, see [ IAM policy actions for Secrets Manager][2] and
2039
2058
  # [Authentication and access control in Secrets Manager][3].
2040
2059
  #
2060
+ # When you enter commands in a command shell, there is a risk of the
2061
+ # command history being accessed or utilities having access to your
2062
+ # command parameters. This is a concern if the command includes the
2063
+ # value of a secret. Learn how to [Mitigate the risks of using
2064
+ # command-line tools to store Secrets Manager secrets][4].
2065
+ #
2041
2066
  #
2042
2067
  #
2043
2068
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
2044
2069
  # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2045
2070
  # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2071
+ # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
2046
2072
  #
2047
2073
  # @option params [required, String] :secret_id
2048
2074
  # The ARN or name of the secret to add a new version to.
@@ -2891,10 +2917,16 @@ module Aws::SecretsManager
2891
2917
  # a customer managed key, you must also have `kms:GenerateDataKey`,
2892
2918
  # `kms:Encrypt`, and `kms:Decrypt` permissions on the key. If you change
2893
2919
  # the KMS key and you don't have `kms:Encrypt` permission to the new
2894
- # key, Secrets Manager does not re-ecrypt existing secret versions with
2920
+ # key, Secrets Manager does not re-encrypt existing secret versions with
2895
2921
  # the new key. For more information, see [ Secret encryption and
2896
2922
  # decryption][5].
2897
2923
  #
2924
+ # When you enter commands in a command shell, there is a risk of the
2925
+ # command history being accessed or utilities having access to your
2926
+ # command parameters. This is a concern if the command includes the
2927
+ # value of a secret. Learn how to [Mitigate the risks of using
2928
+ # command-line tools to store Secrets Manager secrets][6].
2929
+ #
2898
2930
  #
2899
2931
  #
2900
2932
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/service-linked-secrets.html
@@ -2902,6 +2934,7 @@ module Aws::SecretsManager
2902
2934
  # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2903
2935
  # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2904
2936
  # [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security-encryption.html
2937
+ # [6]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
2905
2938
  #
2906
2939
  # @option params [required, String] :secret_id
2907
2940
  # The ARN or name of the secret.
@@ -2950,8 +2983,8 @@ module Aws::SecretsManager
2950
2983
  # encrypt new secret versions as well as any existing versions with the
2951
2984
  # staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. If you
2952
2985
  # don't have `kms:Encrypt` permission to the new key, Secrets Manager
2953
- # does not re-ecrypt existing secret versions with the new key. For more
2954
- # information about versions and staging labels, see [Concepts:
2986
+ # does not re-encrypt existing secret versions with the new key. For
2987
+ # more information about versions and staging labels, see [Concepts:
2955
2988
  # Version][1].
2956
2989
  #
2957
2990
  # A key alias is always prefixed by `alias/`, for example
@@ -3340,14 +3373,19 @@ module Aws::SecretsManager
3340
3373
  # @api private
3341
3374
  def build_request(operation_name, params = {})
3342
3375
  handlers = @handlers.for(operation_name)
3376
+ tracer = config.telemetry_provider.tracer_provider.tracer(
3377
+ Aws::Telemetry.module_to_tracer_name('Aws::SecretsManager')
3378
+ )
3343
3379
  context = Seahorse::Client::RequestContext.new(
3344
3380
  operation_name: operation_name,
3345
3381
  operation: config.api.operation(operation_name),
3346
3382
  client: self,
3347
3383
  params: params,
3348
- config: config)
3384
+ config: config,
3385
+ tracer: tracer
3386
+ )
3349
3387
  context[:gem_name] = 'aws-sdk-secretsmanager'
3350
- context[:gem_version] = '1.101.0'
3388
+ context[:gem_version] = '1.103.0'
3351
3389
  Seahorse::Client::Request.new(handlers, context)
3352
3390
  end
3353
3391
 
@@ -2266,7 +2266,7 @@ module Aws::SecretsManager
2266
2266
  # to encrypt new secret versions as well as any existing versions with
2267
2267
  # the staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. If
2268
2268
  # you don't have `kms:Encrypt` permission to the new key, Secrets
2269
- # Manager does not re-ecrypt existing secret versions with the new
2269
+ # Manager does not re-encrypt existing secret versions with the new
2270
2270
  # key. For more information about versions and staging labels, see
2271
2271
  # [Concepts: Version][1].
2272
2272
  #
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-secretsmanager/customizations'
52
52
  # @!group service
53
53
  module Aws::SecretsManager
54
54
 
55
- GEM_VERSION = '1.101.0'
55
+ GEM_VERSION = '1.103.0'
56
56
 
57
57
  end
data/sig/client.rbs CHANGED
@@ -51,6 +51,7 @@ module Aws
51
51
  ?sigv4a_signing_region_set: Array[String],
52
52
  ?simple_json: bool,
53
53
  ?stub_responses: untyped,
54
+ ?telemetry_provider: Aws::Telemetry::TelemetryProviderBase,
54
55
  ?token_provider: untyped,
55
56
  ?use_dualstack_endpoint: bool,
56
57
  ?use_fips_endpoint: bool,
data/sig/resource.rbs CHANGED
@@ -51,6 +51,7 @@ module Aws
51
51
  ?sigv4a_signing_region_set: Array[String],
52
52
  ?simple_json: bool,
53
53
  ?stub_responses: untyped,
54
+ ?telemetry_provider: Aws::Telemetry::TelemetryProviderBase,
54
55
  ?token_provider: untyped,
55
56
  ?use_dualstack_endpoint: bool,
56
57
  ?use_fips_endpoint: bool,
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-secretsmanager
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.101.0
4
+ version: 1.103.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-07-02 00:00:00.000000000 Z
11
+ date: 2024-09-03 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -19,7 +19,7 @@ dependencies:
19
19
  version: '3'
20
20
  - - ">="
21
21
  - !ruby/object:Gem::Version
22
- version: 3.201.0
22
+ version: 3.203.0
23
23
  type: :runtime
24
24
  prerelease: false
25
25
  version_requirements: !ruby/object:Gem::Requirement
@@ -29,7 +29,7 @@ dependencies:
29
29
  version: '3'
30
30
  - - ">="
31
31
  - !ruby/object:Gem::Version
32
- version: 3.201.0
32
+ version: 3.203.0
33
33
  - !ruby/object:Gem::Dependency
34
34
  name: aws-sigv4
35
35
  requirement: !ruby/object:Gem::Requirement