aws-sdk-secretsmanager 1.60.0 → 1.63.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +15 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-secretsmanager/client.rb +93 -38
- data/lib/aws-sdk-secretsmanager/types.rb +2 -3
- data/lib/aws-sdk-secretsmanager.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: '044692586d1b8a9beb0da617e052a08ff463f0493a4645e756f7d84ee649d8f2'
|
4
|
+
data.tar.gz: f7c83670c68063d67e0f252cf0c8a7d219ec414d218b52f2a6478326f919cf16
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: ed436c8c5bdc245594ef6be3ef4fcc5b0f7733ad54cd2612337e4354cc642e4db93a72fbc97dc8b844474bb5eff857e1e697dc0b613c3ee3bab600b5f6bcd5b7
|
7
|
+
data.tar.gz: f1e5b5decfe900008c8d45171bd45e1e19408b09b622639190a23645c7cde32d1bab8d125c4694f88d764b09f86665375e8c007e9478e6d5e23d48eda019143f
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,21 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.63.0 (2022-06-16)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Documentation updates for Secrets Manager
|
8
|
+
|
9
|
+
1.62.0 (2022-05-25)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Documentation updates for Secrets Manager
|
13
|
+
|
14
|
+
1.61.0 (2022-05-11)
|
15
|
+
------------------
|
16
|
+
|
17
|
+
* Feature - Doc only update for Secrets Manager that fixes several customer-reported issues.
|
18
|
+
|
4
19
|
1.60.0 (2022-04-21)
|
5
20
|
------------------
|
6
21
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.63.0
|
@@ -364,26 +364,27 @@ module Aws::SecretsManager
|
|
364
364
|
# Turns off automatic rotation, and if a rotation is currently in
|
365
365
|
# progress, cancels the rotation.
|
366
366
|
#
|
367
|
-
#
|
368
|
-
#
|
369
|
-
#
|
370
|
-
#
|
371
|
-
#
|
372
|
-
#
|
373
|
-
#
|
374
|
-
#
|
375
|
-
#
|
367
|
+
# If you cancel a rotation in progress, it can leave the `VersionStage`
|
368
|
+
# labels in an unexpected state. You might need to remove the staging
|
369
|
+
# label `AWSPENDING` from the partially created version. You also need
|
370
|
+
# to determine whether to roll back to the previous version of the
|
371
|
+
# secret by moving the staging label `AWSCURRENT` to the version that
|
372
|
+
# has `AWSPENDING`. To determine which version has a specific staging
|
373
|
+
# label, call ListSecretVersionIds. Then use UpdateSecretVersionStage to
|
374
|
+
# change staging labels. For more information, see [How rotation
|
375
|
+
# works][1].
|
376
376
|
#
|
377
|
-
#
|
377
|
+
# To turn on automatic rotation again, call RotateSecret.
|
378
378
|
#
|
379
379
|
# <b>Required permissions: </b> `secretsmanager:CancelRotateSecret`. For
|
380
|
-
# more information, see [ IAM policy actions for Secrets Manager][
|
381
|
-
# [Authentication and access control in Secrets Manager][
|
380
|
+
# more information, see [ IAM policy actions for Secrets Manager][2] and
|
381
|
+
# [Authentication and access control in Secrets Manager][3].
|
382
382
|
#
|
383
383
|
#
|
384
384
|
#
|
385
|
-
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
386
|
-
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
385
|
+
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/rotate-secrets_how.html
|
386
|
+
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
387
|
+
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
387
388
|
#
|
388
389
|
# @option params [required, String] :secret_id
|
389
390
|
# The ARN or name of the secret.
|
@@ -790,8 +791,20 @@ module Aws::SecretsManager
|
|
790
791
|
# the end of the recovery window. At the end of the recovery window,
|
791
792
|
# Secrets Manager deletes the secret permanently.
|
792
793
|
#
|
793
|
-
#
|
794
|
-
#
|
794
|
+
# You can't delete a primary secret that is replicated to other
|
795
|
+
# Regions. You must first delete the replicas using
|
796
|
+
# RemoveRegionsFromReplication, and then delete the primary secret. When
|
797
|
+
# you delete a replica, it is deleted immediately.
|
798
|
+
#
|
799
|
+
# You can't directly delete a version of a secret. Instead, you remove
|
800
|
+
# all staging labels from the version using UpdateSecretVersionStage.
|
801
|
+
# This marks the version as deprecated, and then Secrets Manager can
|
802
|
+
# automatically delete the version in the background.
|
803
|
+
#
|
804
|
+
# To determine whether an application still uses a secret, you can
|
805
|
+
# create an Amazon CloudWatch alarm to alert you to any attempts to
|
806
|
+
# access a secret during the recovery window. For more information, see
|
807
|
+
# [ Monitor secrets scheduled for deletion][1].
|
795
808
|
#
|
796
809
|
# Secrets Manager performs the permanent secret deletion at the end of
|
797
810
|
# the waiting period as a background task with low priority. There is no
|
@@ -801,9 +814,9 @@ module Aws::SecretsManager
|
|
801
814
|
# At any time before recovery window ends, you can use RestoreSecret to
|
802
815
|
# remove the `DeletionDate` and cancel the deletion of the secret.
|
803
816
|
#
|
804
|
-
#
|
805
|
-
# secret value.
|
806
|
-
#
|
817
|
+
# When a secret is scheduled for deletion, you cannot retrieve the
|
818
|
+
# secret value. You must first cancel the deletion with RestoreSecret
|
819
|
+
# and then you can retrieve the secret.
|
807
820
|
#
|
808
821
|
# <b>Required permissions: </b> `secretsmanager:DeleteSecret`. For more
|
809
822
|
# information, see [ IAM policy actions for Secrets Manager][2] and
|
@@ -811,7 +824,7 @@ module Aws::SecretsManager
|
|
811
824
|
#
|
812
825
|
#
|
813
826
|
#
|
814
|
-
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
827
|
+
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/monitoring_cloudwatch_deleted-secrets.html
|
815
828
|
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
816
829
|
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
817
830
|
#
|
@@ -1310,21 +1323,21 @@ module Aws::SecretsManager
|
|
1310
1323
|
req.send_request(options)
|
1311
1324
|
end
|
1312
1325
|
|
1313
|
-
# Lists the versions
|
1326
|
+
# Lists the versions of a secret. Secrets Manager uses staging labels to
|
1327
|
+
# indicate the different versions of a secret. For more information, see
|
1328
|
+
# [ Secrets Manager concepts: Versions][1].
|
1314
1329
|
#
|
1315
1330
|
# To list the secrets in the account, use ListSecrets.
|
1316
1331
|
#
|
1317
|
-
# To get the secret value from `SecretString` or `SecretBinary`, call
|
1318
|
-
# GetSecretValue.
|
1319
|
-
#
|
1320
1332
|
# <b>Required permissions: </b> `secretsmanager:ListSecretVersionIds`.
|
1321
|
-
# For more information, see [ IAM policy actions for Secrets Manager][
|
1322
|
-
# and [Authentication and access control in Secrets Manager][
|
1333
|
+
# For more information, see [ IAM policy actions for Secrets Manager][2]
|
1334
|
+
# and [Authentication and access control in Secrets Manager][3].
|
1323
1335
|
#
|
1324
1336
|
#
|
1325
1337
|
#
|
1326
|
-
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
1327
|
-
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
1338
|
+
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/getting-started.html#term_version
|
1339
|
+
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
1340
|
+
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
1328
1341
|
#
|
1329
1342
|
# @option params [required, String] :secret_id
|
1330
1343
|
# The ARN or name of the secret whose versions you want to list.
|
@@ -1435,13 +1448,17 @@ module Aws::SecretsManager
|
|
1435
1448
|
# Services account, not including secrets that are marked for deletion.
|
1436
1449
|
# To see secrets marked for deletion, use the Secrets Manager console.
|
1437
1450
|
#
|
1451
|
+
# ListSecrets is eventually consistent, however it might not reflect
|
1452
|
+
# changes from the last five minutes. To get the latest information for
|
1453
|
+
# a specific secret, use DescribeSecret.
|
1454
|
+
#
|
1438
1455
|
# To list the versions of a secret, use ListSecretVersionIds.
|
1439
1456
|
#
|
1440
1457
|
# To get the secret value from `SecretString` or `SecretBinary`, call
|
1441
1458
|
# GetSecretValue.
|
1442
1459
|
#
|
1443
|
-
# For information about finding secrets in the console, see [
|
1444
|
-
#
|
1460
|
+
# For information about finding secrets in the console, see [Find
|
1461
|
+
# secrets in Secrets Manager][1].
|
1445
1462
|
#
|
1446
1463
|
# <b>Required permissions: </b> `secretsmanager:ListSecrets`. For more
|
1447
1464
|
# information, see [ IAM policy actions for Secrets Manager][2] and
|
@@ -1601,8 +1618,7 @@ module Aws::SecretsManager
|
|
1601
1618
|
#
|
1602
1619
|
# @option params [Boolean] :block_public_policy
|
1603
1620
|
# Specifies whether to block resource-based policies that allow broad
|
1604
|
-
# access to the secret
|
1605
|
-
# allow broad access, for example those that use a wildcard for the
|
1621
|
+
# access to the secret, for example those that use a wildcard for the
|
1606
1622
|
# principal.
|
1607
1623
|
#
|
1608
1624
|
# @return [Types::PutResourcePolicyResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
@@ -1673,9 +1689,9 @@ module Aws::SecretsManager
|
|
1673
1689
|
# the staging label `AWSPREVIOUS` to the version that `AWSCURRENT` was
|
1674
1690
|
# removed from.
|
1675
1691
|
#
|
1676
|
-
# This operation is idempotent. If
|
1677
|
-
#
|
1678
|
-
# you specify the same secret data, the operation succeeds but does
|
1692
|
+
# This operation is idempotent. If you call this operation with a
|
1693
|
+
# `ClientRequestToken` that matches an existing version's VersionId,
|
1694
|
+
# and you specify the same secret data, the operation succeeds but does
|
1679
1695
|
# nothing. However, if the secret data is different, then the operation
|
1680
1696
|
# fails because you can't modify an existing version; you can only
|
1681
1697
|
# create new ones.
|
@@ -2121,6 +2137,45 @@ module Aws::SecretsManager
|
|
2121
2137
|
# * {Types::RotateSecretResponse#name #name} => String
|
2122
2138
|
# * {Types::RotateSecretResponse#version_id #version_id} => String
|
2123
2139
|
#
|
2140
|
+
#
|
2141
|
+
# @example Example: To configure rotation for a secret
|
2142
|
+
#
|
2143
|
+
# # The following example configures rotation for a secret using a cron expression. The first rotation happens immediately
|
2144
|
+
# # after the changes are stored in the secret. The rotation schedule is the first and 15th day of every month. The rotation
|
2145
|
+
# # window begins at 4:00 PM UTC and ends at 6:00 PM.
|
2146
|
+
#
|
2147
|
+
# resp = client.rotate_secret({
|
2148
|
+
# rotation_lambda_arn: "arn:aws:lambda:us-west-2:123456789012:function:MyTestDatabaseRotationLambda",
|
2149
|
+
# rotation_rules: {
|
2150
|
+
# duration: "2h",
|
2151
|
+
# schedule_expression: "cron(0 16 1,15 * ? *)",
|
2152
|
+
# },
|
2153
|
+
# secret_id: "MyTestDatabaseSecret",
|
2154
|
+
# })
|
2155
|
+
#
|
2156
|
+
# resp.to_h outputs the following:
|
2157
|
+
# {
|
2158
|
+
# arn: "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
|
2159
|
+
# name: "MyTestDatabaseSecret",
|
2160
|
+
# version_id: "EXAMPLE2-90ab-cdef-fedc-ba987SECRET2",
|
2161
|
+
# }
|
2162
|
+
#
|
2163
|
+
# @example Example: To request an immediate rotation for a secret
|
2164
|
+
#
|
2165
|
+
# # The following example requests an immediate invocation of the secret's Lambda rotation function. It assumes that the
|
2166
|
+
# # specified secret already has rotation configured. The rotation function runs asynchronously in the background.
|
2167
|
+
#
|
2168
|
+
# resp = client.rotate_secret({
|
2169
|
+
# secret_id: "MyTestDatabaseSecret",
|
2170
|
+
# })
|
2171
|
+
#
|
2172
|
+
# resp.to_h outputs the following:
|
2173
|
+
# {
|
2174
|
+
# arn: "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
|
2175
|
+
# name: "MyTestDatabaseSecret",
|
2176
|
+
# version_id: "EXAMPLE2-90ab-cdef-fedc-ba987SECRET2",
|
2177
|
+
# }
|
2178
|
+
#
|
2124
2179
|
# @example Request syntax with placeholder values
|
2125
2180
|
#
|
2126
2181
|
# resp = client.rotate_secret({
|
@@ -2395,8 +2450,8 @@ module Aws::SecretsManager
|
|
2395
2450
|
# version, Secrets Manager automatically attaches the staging label
|
2396
2451
|
# `AWSCURRENT` to the new version.
|
2397
2452
|
#
|
2398
|
-
# If you call this operation with a `
|
2399
|
-
# version's `
|
2453
|
+
# If you call this operation with a `ClientRequestToken` that matches an
|
2454
|
+
# existing version's `VersionId`, the operation results in an error.
|
2400
2455
|
# You can't modify an existing version, you can only create a new
|
2401
2456
|
# version. To remove a version, remove all staging labels from it. See
|
2402
2457
|
# UpdateSecretVersionStage.
|
@@ -2824,7 +2879,7 @@ module Aws::SecretsManager
|
|
2824
2879
|
params: params,
|
2825
2880
|
config: config)
|
2826
2881
|
context[:gem_name] = 'aws-sdk-secretsmanager'
|
2827
|
-
context[:gem_version] = '1.
|
2882
|
+
context[:gem_version] = '1.63.0'
|
2828
2883
|
Seahorse::Client::Request.new(handlers, context)
|
2829
2884
|
end
|
2830
2885
|
|
@@ -1253,9 +1253,8 @@ module Aws::SecretsManager
|
|
1253
1253
|
#
|
1254
1254
|
# @!attribute [rw] block_public_policy
|
1255
1255
|
# Specifies whether to block resource-based policies that allow broad
|
1256
|
-
# access to the secret
|
1257
|
-
#
|
1258
|
-
# the principal.
|
1256
|
+
# access to the secret, for example those that use a wildcard for the
|
1257
|
+
# principal.
|
1259
1258
|
# @return [Boolean]
|
1260
1259
|
#
|
1261
1260
|
# @see http://docs.aws.amazon.com/goto/WebAPI/secretsmanager-2017-10-17/PutResourcePolicyRequest AWS API Documentation
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-secretsmanager
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.63.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2022-
|
11
|
+
date: 2022-06-16 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|