aws-sdk-secretsmanager 1.60.0 → 1.63.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 8df4daf2d651916a1c2064939bcf1dc18cc30ef5ceef9fdda071f67f3d365632
4
- data.tar.gz: 8913f355a291887628e8f3537e3f700dab0fd90c0cc5430c216d0310e7005421
3
+ metadata.gz: '044692586d1b8a9beb0da617e052a08ff463f0493a4645e756f7d84ee649d8f2'
4
+ data.tar.gz: f7c83670c68063d67e0f252cf0c8a7d219ec414d218b52f2a6478326f919cf16
5
5
  SHA512:
6
- metadata.gz: 8068795275cfe892637f5e9635f01566a237fdca18b9388cd3372609d24fe011e011c8a2e59d4c75b0aac0c08078be335028539d6b363e09d0fd3a079fca116d
7
- data.tar.gz: c68a142de2be5b6d86b0205d663a4fb289e94d8e6bef6f0d30a0744a7f0815339637662c4ed482ff29ee151ae6c6ef530f7bf9c998bbd2b51d1443e4286a6de3
6
+ metadata.gz: ed436c8c5bdc245594ef6be3ef4fcc5b0f7733ad54cd2612337e4354cc642e4db93a72fbc97dc8b844474bb5eff857e1e697dc0b613c3ee3bab600b5f6bcd5b7
7
+ data.tar.gz: f1e5b5decfe900008c8d45171bd45e1e19408b09b622639190a23645c7cde32d1bab8d125c4694f88d764b09f86665375e8c007e9478e6d5e23d48eda019143f
data/CHANGELOG.md CHANGED
@@ -1,6 +1,21 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.63.0 (2022-06-16)
5
+ ------------------
6
+
7
+ * Feature - Documentation updates for Secrets Manager
8
+
9
+ 1.62.0 (2022-05-25)
10
+ ------------------
11
+
12
+ * Feature - Documentation updates for Secrets Manager
13
+
14
+ 1.61.0 (2022-05-11)
15
+ ------------------
16
+
17
+ * Feature - Doc only update for Secrets Manager that fixes several customer-reported issues.
18
+
4
19
  1.60.0 (2022-04-21)
5
20
  ------------------
6
21
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.60.0
1
+ 1.63.0
@@ -364,26 +364,27 @@ module Aws::SecretsManager
364
364
  # Turns off automatic rotation, and if a rotation is currently in
365
365
  # progress, cancels the rotation.
366
366
  #
367
- # To turn on automatic rotation again, call RotateSecret.
368
- #
369
- # <note markdown="1"> If you cancel a rotation in progress, it can leave the `VersionStage`
370
- # labels in an unexpected state. Depending on the step of the rotation
371
- # in progress, you might need to remove the staging label `AWSPENDING`
372
- # from the partially created version, specified by the `VersionId`
373
- # response value. We recommend you also evaluate the partially rotated
374
- # new version to see if it should be deleted. You can delete a version
375
- # by removing all staging labels from it.
367
+ # If you cancel a rotation in progress, it can leave the `VersionStage`
368
+ # labels in an unexpected state. You might need to remove the staging
369
+ # label `AWSPENDING` from the partially created version. You also need
370
+ # to determine whether to roll back to the previous version of the
371
+ # secret by moving the staging label `AWSCURRENT` to the version that
372
+ # has `AWSPENDING`. To determine which version has a specific staging
373
+ # label, call ListSecretVersionIds. Then use UpdateSecretVersionStage to
374
+ # change staging labels. For more information, see [How rotation
375
+ # works][1].
376
376
  #
377
- # </note>
377
+ # To turn on automatic rotation again, call RotateSecret.
378
378
  #
379
379
  # <b>Required permissions: </b> `secretsmanager:CancelRotateSecret`. For
380
- # more information, see [ IAM policy actions for Secrets Manager][1] and
381
- # [Authentication and access control in Secrets Manager][2].
380
+ # more information, see [ IAM policy actions for Secrets Manager][2] and
381
+ # [Authentication and access control in Secrets Manager][3].
382
382
  #
383
383
  #
384
384
  #
385
- # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
386
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
385
+ # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/rotate-secrets_how.html
386
+ # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
387
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
387
388
  #
388
389
  # @option params [required, String] :secret_id
389
390
  # The ARN or name of the secret.
@@ -790,8 +791,20 @@ module Aws::SecretsManager
790
791
  # the end of the recovery window. At the end of the recovery window,
791
792
  # Secrets Manager deletes the secret permanently.
792
793
  #
793
- # For information about deleting a secret in the console, see
794
- # [https://docs.aws.amazon.com/secretsmanager/latest/userguide/manage\_delete-secret.html][1].
794
+ # You can't delete a primary secret that is replicated to other
795
+ # Regions. You must first delete the replicas using
796
+ # RemoveRegionsFromReplication, and then delete the primary secret. When
797
+ # you delete a replica, it is deleted immediately.
798
+ #
799
+ # You can't directly delete a version of a secret. Instead, you remove
800
+ # all staging labels from the version using UpdateSecretVersionStage.
801
+ # This marks the version as deprecated, and then Secrets Manager can
802
+ # automatically delete the version in the background.
803
+ #
804
+ # To determine whether an application still uses a secret, you can
805
+ # create an Amazon CloudWatch alarm to alert you to any attempts to
806
+ # access a secret during the recovery window. For more information, see
807
+ # [ Monitor secrets scheduled for deletion][1].
795
808
  #
796
809
  # Secrets Manager performs the permanent secret deletion at the end of
797
810
  # the waiting period as a background task with low priority. There is no
@@ -801,9 +814,9 @@ module Aws::SecretsManager
801
814
  # At any time before recovery window ends, you can use RestoreSecret to
802
815
  # remove the `DeletionDate` and cancel the deletion of the secret.
803
816
  #
804
- # In a secret scheduled for deletion, you cannot access the encrypted
805
- # secret value. To access that information, first cancel the deletion
806
- # with RestoreSecret and then retrieve the information.
817
+ # When a secret is scheduled for deletion, you cannot retrieve the
818
+ # secret value. You must first cancel the deletion with RestoreSecret
819
+ # and then you can retrieve the secret.
807
820
  #
808
821
  # <b>Required permissions: </b> `secretsmanager:DeleteSecret`. For more
809
822
  # information, see [ IAM policy actions for Secrets Manager][2] and
@@ -811,7 +824,7 @@ module Aws::SecretsManager
811
824
  #
812
825
  #
813
826
  #
814
- # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/manage_delete-secret.html
827
+ # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/monitoring_cloudwatch_deleted-secrets.html
815
828
  # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
816
829
  # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
817
830
  #
@@ -1310,21 +1323,21 @@ module Aws::SecretsManager
1310
1323
  req.send_request(options)
1311
1324
  end
1312
1325
 
1313
- # Lists the versions for a secret.
1326
+ # Lists the versions of a secret. Secrets Manager uses staging labels to
1327
+ # indicate the different versions of a secret. For more information, see
1328
+ # [ Secrets Manager concepts: Versions][1].
1314
1329
  #
1315
1330
  # To list the secrets in the account, use ListSecrets.
1316
1331
  #
1317
- # To get the secret value from `SecretString` or `SecretBinary`, call
1318
- # GetSecretValue.
1319
- #
1320
1332
  # <b>Required permissions: </b> `secretsmanager:ListSecretVersionIds`.
1321
- # For more information, see [ IAM policy actions for Secrets Manager][1]
1322
- # and [Authentication and access control in Secrets Manager][2].
1333
+ # For more information, see [ IAM policy actions for Secrets Manager][2]
1334
+ # and [Authentication and access control in Secrets Manager][3].
1323
1335
  #
1324
1336
  #
1325
1337
  #
1326
- # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1327
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1338
+ # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/getting-started.html#term_version
1339
+ # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1340
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1328
1341
  #
1329
1342
  # @option params [required, String] :secret_id
1330
1343
  # The ARN or name of the secret whose versions you want to list.
@@ -1435,13 +1448,17 @@ module Aws::SecretsManager
1435
1448
  # Services account, not including secrets that are marked for deletion.
1436
1449
  # To see secrets marked for deletion, use the Secrets Manager console.
1437
1450
  #
1451
+ # ListSecrets is eventually consistent, however it might not reflect
1452
+ # changes from the last five minutes. To get the latest information for
1453
+ # a specific secret, use DescribeSecret.
1454
+ #
1438
1455
  # To list the versions of a secret, use ListSecretVersionIds.
1439
1456
  #
1440
1457
  # To get the secret value from `SecretString` or `SecretBinary`, call
1441
1458
  # GetSecretValue.
1442
1459
  #
1443
- # For information about finding secrets in the console, see [Enhanced
1444
- # search capabilities for secrets in Secrets Manager][1].
1460
+ # For information about finding secrets in the console, see [Find
1461
+ # secrets in Secrets Manager][1].
1445
1462
  #
1446
1463
  # <b>Required permissions: </b> `secretsmanager:ListSecrets`. For more
1447
1464
  # information, see [ IAM policy actions for Secrets Manager][2] and
@@ -1601,8 +1618,7 @@ module Aws::SecretsManager
1601
1618
  #
1602
1619
  # @option params [Boolean] :block_public_policy
1603
1620
  # Specifies whether to block resource-based policies that allow broad
1604
- # access to the secret. By default, Secrets Manager blocks policies that
1605
- # allow broad access, for example those that use a wildcard for the
1621
+ # access to the secret, for example those that use a wildcard for the
1606
1622
  # principal.
1607
1623
  #
1608
1624
  # @return [Types::PutResourcePolicyResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
@@ -1673,9 +1689,9 @@ module Aws::SecretsManager
1673
1689
  # the staging label `AWSPREVIOUS` to the version that `AWSCURRENT` was
1674
1690
  # removed from.
1675
1691
  #
1676
- # This operation is idempotent. If a version with a `VersionId` with the
1677
- # same value as the `ClientRequestToken` parameter already exists, and
1678
- # you specify the same secret data, the operation succeeds but does
1692
+ # This operation is idempotent. If you call this operation with a
1693
+ # `ClientRequestToken` that matches an existing version's VersionId,
1694
+ # and you specify the same secret data, the operation succeeds but does
1679
1695
  # nothing. However, if the secret data is different, then the operation
1680
1696
  # fails because you can't modify an existing version; you can only
1681
1697
  # create new ones.
@@ -2121,6 +2137,45 @@ module Aws::SecretsManager
2121
2137
  # * {Types::RotateSecretResponse#name #name} => String
2122
2138
  # * {Types::RotateSecretResponse#version_id #version_id} => String
2123
2139
  #
2140
+ #
2141
+ # @example Example: To configure rotation for a secret
2142
+ #
2143
+ # # The following example configures rotation for a secret using a cron expression. The first rotation happens immediately
2144
+ # # after the changes are stored in the secret. The rotation schedule is the first and 15th day of every month. The rotation
2145
+ # # window begins at 4:00 PM UTC and ends at 6:00 PM.
2146
+ #
2147
+ # resp = client.rotate_secret({
2148
+ # rotation_lambda_arn: "arn:aws:lambda:us-west-2:123456789012:function:MyTestDatabaseRotationLambda",
2149
+ # rotation_rules: {
2150
+ # duration: "2h",
2151
+ # schedule_expression: "cron(0 16 1,15 * ? *)",
2152
+ # },
2153
+ # secret_id: "MyTestDatabaseSecret",
2154
+ # })
2155
+ #
2156
+ # resp.to_h outputs the following:
2157
+ # {
2158
+ # arn: "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
2159
+ # name: "MyTestDatabaseSecret",
2160
+ # version_id: "EXAMPLE2-90ab-cdef-fedc-ba987SECRET2",
2161
+ # }
2162
+ #
2163
+ # @example Example: To request an immediate rotation for a secret
2164
+ #
2165
+ # # The following example requests an immediate invocation of the secret's Lambda rotation function. It assumes that the
2166
+ # # specified secret already has rotation configured. The rotation function runs asynchronously in the background.
2167
+ #
2168
+ # resp = client.rotate_secret({
2169
+ # secret_id: "MyTestDatabaseSecret",
2170
+ # })
2171
+ #
2172
+ # resp.to_h outputs the following:
2173
+ # {
2174
+ # arn: "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
2175
+ # name: "MyTestDatabaseSecret",
2176
+ # version_id: "EXAMPLE2-90ab-cdef-fedc-ba987SECRET2",
2177
+ # }
2178
+ #
2124
2179
  # @example Request syntax with placeholder values
2125
2180
  #
2126
2181
  # resp = client.rotate_secret({
@@ -2395,8 +2450,8 @@ module Aws::SecretsManager
2395
2450
  # version, Secrets Manager automatically attaches the staging label
2396
2451
  # `AWSCURRENT` to the new version.
2397
2452
  #
2398
- # If you call this operation with a `VersionId` that matches an existing
2399
- # version's `ClientRequestToken`, the operation results in an error.
2453
+ # If you call this operation with a `ClientRequestToken` that matches an
2454
+ # existing version's `VersionId`, the operation results in an error.
2400
2455
  # You can't modify an existing version, you can only create a new
2401
2456
  # version. To remove a version, remove all staging labels from it. See
2402
2457
  # UpdateSecretVersionStage.
@@ -2824,7 +2879,7 @@ module Aws::SecretsManager
2824
2879
  params: params,
2825
2880
  config: config)
2826
2881
  context[:gem_name] = 'aws-sdk-secretsmanager'
2827
- context[:gem_version] = '1.60.0'
2882
+ context[:gem_version] = '1.63.0'
2828
2883
  Seahorse::Client::Request.new(handlers, context)
2829
2884
  end
2830
2885
 
@@ -1253,9 +1253,8 @@ module Aws::SecretsManager
1253
1253
  #
1254
1254
  # @!attribute [rw] block_public_policy
1255
1255
  # Specifies whether to block resource-based policies that allow broad
1256
- # access to the secret. By default, Secrets Manager blocks policies
1257
- # that allow broad access, for example those that use a wildcard for
1258
- # the principal.
1256
+ # access to the secret, for example those that use a wildcard for the
1257
+ # principal.
1259
1258
  # @return [Boolean]
1260
1259
  #
1261
1260
  # @see http://docs.aws.amazon.com/goto/WebAPI/secretsmanager-2017-10-17/PutResourcePolicyRequest AWS API Documentation
@@ -48,6 +48,6 @@ require_relative 'aws-sdk-secretsmanager/customizations'
48
48
  # @!group service
49
49
  module Aws::SecretsManager
50
50
 
51
- GEM_VERSION = '1.60.0'
51
+ GEM_VERSION = '1.63.0'
52
52
 
53
53
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-secretsmanager
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.60.0
4
+ version: 1.63.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-04-21 00:00:00.000000000 Z
11
+ date: 2022-06-16 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core