aws-sdk-secretsmanager 1.101.0 → 1.103.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 27aba913be3847849aa610964d15ee3b5fca875fae22d51df856c81d1e653da4
4
- data.tar.gz: eed6bb159ff151a94fa16331e1882c7fa3b4ad23be00c8e1721ed561d00de088
3
+ metadata.gz: c4b00cfe03c49655fa2c684267c14cb108b7e4599718ef9076c89272034aeeaa
4
+ data.tar.gz: 670cb1b4519e6e160d8c041af2f661e8d6b85402ef96dc137887906ffeaa75bb
5
5
  SHA512:
6
- metadata.gz: df812f193a3284a5141a9a4a4242b0d657fcc02f90d7a3b8802a9414753f139802b5e305825e9ee852628c49072a5eb465380294e72fcb22adffaeb59eda3a1a
7
- data.tar.gz: d8e1e0b617ab53e9ad8cfc202b9f6f283e8a156d9f7c96792631dd8e313531e290e1f6b0ef3ac5221a998a9b5f788bf7a15b940fc1b349c8351243ccf060b7c9
6
+ metadata.gz: 508fea2b0771c6c709ca4436a1b104a0022d836e870d64b931a38c11a1ea0affbef091f927d51da27f9a205655c3ff05364e19957f01329d3e54c45704e4b78d
7
+ data.tar.gz: e304002223b05d777fe4ca0a71d316bc375061cdec6da020e8bb93ceaeef010f72faa32d5f92cf9b9c377080a5cdb33eb09d74cf3a486d23a24318f0fa85b3b7
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.103.0 (2024-09-03)
5
+ ------------------
6
+
7
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
8
+
9
+ 1.102.0 (2024-07-18)
10
+ ------------------
11
+
12
+ * Feature - Doc only update for Secrets Manager
13
+
4
14
  1.101.0 (2024-07-02)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.101.0
1
+ 1.103.0
@@ -32,6 +32,7 @@ require 'aws-sdk-core/plugins/checksum_algorithm.rb'
32
32
  require 'aws-sdk-core/plugins/request_compression.rb'
33
33
  require 'aws-sdk-core/plugins/defaults_mode.rb'
34
34
  require 'aws-sdk-core/plugins/recursion_detection.rb'
35
+ require 'aws-sdk-core/plugins/telemetry.rb'
35
36
  require 'aws-sdk-core/plugins/sign.rb'
36
37
  require 'aws-sdk-core/plugins/protocols/json_rpc.rb'
37
38
 
@@ -83,6 +84,7 @@ module Aws::SecretsManager
83
84
  add_plugin(Aws::Plugins::RequestCompression)
84
85
  add_plugin(Aws::Plugins::DefaultsMode)
85
86
  add_plugin(Aws::Plugins::RecursionDetection)
87
+ add_plugin(Aws::Plugins::Telemetry)
86
88
  add_plugin(Aws::Plugins::Sign)
87
89
  add_plugin(Aws::Plugins::Protocols::JsonRpc)
88
90
  add_plugin(Aws::SecretsManager::Plugins::Endpoints)
@@ -337,6 +339,16 @@ module Aws::SecretsManager
337
339
  # ** Please note ** When response stubbing is enabled, no HTTP
338
340
  # requests are made, and retries are disabled.
339
341
  #
342
+ # @option options [Aws::Telemetry::TelemetryProviderBase] :telemetry_provider (Aws::Telemetry::NoOpTelemetryProvider)
343
+ # Allows you to provide a telemetry provider, which is used to
344
+ # emit telemetry data. By default, uses `NoOpTelemetryProvider` which
345
+ # will not record or emit any telemetry data. The SDK supports the
346
+ # following telemetry providers:
347
+ #
348
+ # * OpenTelemetry (OTel) - To use the OTel provider, install and require the
349
+ # `opentelemetry-sdk` gem and then, pass in an instance of a
350
+ # `Aws::Telemetry::OTelProvider` for telemetry provider.
351
+ #
340
352
  # @option options [Aws::TokenProvider] :token_provider
341
353
  # A Bearer Token Provider. This can be an instance of any one of the
342
354
  # following classes:
@@ -724,6 +736,12 @@ module Aws::SecretsManager
724
736
  # you need `kms:GenerateDataKey` and `kms:Decrypt` permission to the
725
737
  # key.
726
738
  #
739
+ # When you enter commands in a command shell, there is a risk of the
740
+ # command history being accessed or utilities having access to your
741
+ # command parameters. This is a concern if the command includes the
742
+ # value of a secret. Learn how to [Mitigate the risks of using
743
+ # command-line tools to store Secrets Manager secrets][7].
744
+ #
727
745
  #
728
746
  #
729
747
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/service-linked-secrets.html
@@ -732,6 +750,7 @@ module Aws::SecretsManager
732
750
  # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
733
751
  # [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
734
752
  # [6]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
753
+ # [7]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
735
754
  #
736
755
  # @option params [required, String] :name
737
756
  # The name of the new secret.
@@ -2038,11 +2057,18 @@ module Aws::SecretsManager
2038
2057
  # more information, see [ IAM policy actions for Secrets Manager][2] and
2039
2058
  # [Authentication and access control in Secrets Manager][3].
2040
2059
  #
2060
+ # When you enter commands in a command shell, there is a risk of the
2061
+ # command history being accessed or utilities having access to your
2062
+ # command parameters. This is a concern if the command includes the
2063
+ # value of a secret. Learn how to [Mitigate the risks of using
2064
+ # command-line tools to store Secrets Manager secrets][4].
2065
+ #
2041
2066
  #
2042
2067
  #
2043
2068
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
2044
2069
  # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2045
2070
  # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2071
+ # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
2046
2072
  #
2047
2073
  # @option params [required, String] :secret_id
2048
2074
  # The ARN or name of the secret to add a new version to.
@@ -2891,10 +2917,16 @@ module Aws::SecretsManager
2891
2917
  # a customer managed key, you must also have `kms:GenerateDataKey`,
2892
2918
  # `kms:Encrypt`, and `kms:Decrypt` permissions on the key. If you change
2893
2919
  # the KMS key and you don't have `kms:Encrypt` permission to the new
2894
- # key, Secrets Manager does not re-ecrypt existing secret versions with
2920
+ # key, Secrets Manager does not re-encrypt existing secret versions with
2895
2921
  # the new key. For more information, see [ Secret encryption and
2896
2922
  # decryption][5].
2897
2923
  #
2924
+ # When you enter commands in a command shell, there is a risk of the
2925
+ # command history being accessed or utilities having access to your
2926
+ # command parameters. This is a concern if the command includes the
2927
+ # value of a secret. Learn how to [Mitigate the risks of using
2928
+ # command-line tools to store Secrets Manager secrets][6].
2929
+ #
2898
2930
  #
2899
2931
  #
2900
2932
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/service-linked-secrets.html
@@ -2902,6 +2934,7 @@ module Aws::SecretsManager
2902
2934
  # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2903
2935
  # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2904
2936
  # [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security-encryption.html
2937
+ # [6]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
2905
2938
  #
2906
2939
  # @option params [required, String] :secret_id
2907
2940
  # The ARN or name of the secret.
@@ -2950,8 +2983,8 @@ module Aws::SecretsManager
2950
2983
  # encrypt new secret versions as well as any existing versions with the
2951
2984
  # staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. If you
2952
2985
  # don't have `kms:Encrypt` permission to the new key, Secrets Manager
2953
- # does not re-ecrypt existing secret versions with the new key. For more
2954
- # information about versions and staging labels, see [Concepts:
2986
+ # does not re-encrypt existing secret versions with the new key. For
2987
+ # more information about versions and staging labels, see [Concepts:
2955
2988
  # Version][1].
2956
2989
  #
2957
2990
  # A key alias is always prefixed by `alias/`, for example
@@ -3340,14 +3373,19 @@ module Aws::SecretsManager
3340
3373
  # @api private
3341
3374
  def build_request(operation_name, params = {})
3342
3375
  handlers = @handlers.for(operation_name)
3376
+ tracer = config.telemetry_provider.tracer_provider.tracer(
3377
+ Aws::Telemetry.module_to_tracer_name('Aws::SecretsManager')
3378
+ )
3343
3379
  context = Seahorse::Client::RequestContext.new(
3344
3380
  operation_name: operation_name,
3345
3381
  operation: config.api.operation(operation_name),
3346
3382
  client: self,
3347
3383
  params: params,
3348
- config: config)
3384
+ config: config,
3385
+ tracer: tracer
3386
+ )
3349
3387
  context[:gem_name] = 'aws-sdk-secretsmanager'
3350
- context[:gem_version] = '1.101.0'
3388
+ context[:gem_version] = '1.103.0'
3351
3389
  Seahorse::Client::Request.new(handlers, context)
3352
3390
  end
3353
3391
 
@@ -2266,7 +2266,7 @@ module Aws::SecretsManager
2266
2266
  # to encrypt new secret versions as well as any existing versions with
2267
2267
  # the staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. If
2268
2268
  # you don't have `kms:Encrypt` permission to the new key, Secrets
2269
- # Manager does not re-ecrypt existing secret versions with the new
2269
+ # Manager does not re-encrypt existing secret versions with the new
2270
2270
  # key. For more information about versions and staging labels, see
2271
2271
  # [Concepts: Version][1].
2272
2272
  #
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-secretsmanager/customizations'
52
52
  # @!group service
53
53
  module Aws::SecretsManager
54
54
 
55
- GEM_VERSION = '1.101.0'
55
+ GEM_VERSION = '1.103.0'
56
56
 
57
57
  end
data/sig/client.rbs CHANGED
@@ -51,6 +51,7 @@ module Aws
51
51
  ?sigv4a_signing_region_set: Array[String],
52
52
  ?simple_json: bool,
53
53
  ?stub_responses: untyped,
54
+ ?telemetry_provider: Aws::Telemetry::TelemetryProviderBase,
54
55
  ?token_provider: untyped,
55
56
  ?use_dualstack_endpoint: bool,
56
57
  ?use_fips_endpoint: bool,
data/sig/resource.rbs CHANGED
@@ -51,6 +51,7 @@ module Aws
51
51
  ?sigv4a_signing_region_set: Array[String],
52
52
  ?simple_json: bool,
53
53
  ?stub_responses: untyped,
54
+ ?telemetry_provider: Aws::Telemetry::TelemetryProviderBase,
54
55
  ?token_provider: untyped,
55
56
  ?use_dualstack_endpoint: bool,
56
57
  ?use_fips_endpoint: bool,
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-secretsmanager
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.101.0
4
+ version: 1.103.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-07-02 00:00:00.000000000 Z
11
+ date: 2024-09-03 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -19,7 +19,7 @@ dependencies:
19
19
  version: '3'
20
20
  - - ">="
21
21
  - !ruby/object:Gem::Version
22
- version: 3.201.0
22
+ version: 3.203.0
23
23
  type: :runtime
24
24
  prerelease: false
25
25
  version_requirements: !ruby/object:Gem::Requirement
@@ -29,7 +29,7 @@ dependencies:
29
29
  version: '3'
30
30
  - - ">="
31
31
  - !ruby/object:Gem::Version
32
- version: 3.201.0
32
+ version: 3.203.0
33
33
  - !ruby/object:Gem::Dependency
34
34
  name: aws-sigv4
35
35
  requirement: !ruby/object:Gem::Requirement