aws-sdk-secretsmanager 1.62.0 → 1.65.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 0b1db95d58a296965e3e67e29dda7bddae3029b9828a0bf4016a951825d5fa61
4
- data.tar.gz: 4ce3047b908c3134c8ae717ad79790d1877e17a9ebf1ce42414692c2e1869d5f
3
+ metadata.gz: 55454322928dc33ba5dbd7fde31a3d863eccff4c56eb542668f51ae0b08f16f7
4
+ data.tar.gz: 8726157c51744c29b479d30782973a74a00fb486408b696c4e5bbb1a70ac7a93
5
5
  SHA512:
6
- metadata.gz: 345690087bb756e8218ead0897f15495268eb02da24ea0e79fd5b7f6ebeab68e3c4af91509c240f12dcd53d4527270fe3bccbef8cc7b7db998cf10ce023a2e58
7
- data.tar.gz: f8a195852f3adc1ad281a8143d46cbef53e0da62c21fc8804223964afb7df176d93fd806e23ad380047415ad05c6ea5f845d93c2066db74b3ede0a03566ce913
6
+ metadata.gz: a3ce58ec66c49f185e64a1cdde6f9bec89c261df7eec2dc3a71d3bf5d9b1fdfee4852fa63be43635921f0a8702814c46868ba831d400bb124aa3cc4f19463e07
7
+ data.tar.gz: 16cbab9304366563b8e9222ea70d917b8649ec4be9fedb85159671d2f531b6c0dc38074ca40351bf7a9508283986fa50743ccdbc94cbd96dcf062387d667e6b0
data/CHANGELOG.md CHANGED
@@ -1,6 +1,21 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.65.0 (2022-08-17)
5
+ ------------------
6
+
7
+ * Feature - Documentation updates for Secrets Manager.
8
+
9
+ 1.64.0 (2022-06-16)
10
+ ------------------
11
+
12
+ * Feature - Documentation updates for Secrets Manager
13
+
14
+ 1.63.0 (2022-06-16)
15
+ ------------------
16
+
17
+ * Feature - Documentation updates for Secrets Manager
18
+
4
19
  1.62.0 (2022-05-25)
5
20
  ------------------
6
21
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.62.0
1
+ 1.65.0
@@ -553,7 +553,9 @@ module Aws::SecretsManager
553
553
  #
554
554
  # @option params [String] :kms_key_id
555
555
  # The ARN, key ID, or alias of the KMS key that Secrets Manager uses to
556
- # encrypt the secret value in the secret.
556
+ # encrypt the secret value in the secret. An alias is always prefixed by
557
+ # `alias/`, for example `alias/aws/secretsmanager`. For more
558
+ # information, see [About aliases][1].
557
559
  #
558
560
  # To use a KMS key in a different account, use the key ARN or the alias
559
561
  # ARN.
@@ -568,6 +570,10 @@ module Aws::SecretsManager
568
570
  # to encrypt the secret, and you must create and use a customer managed
569
571
  # KMS key.
570
572
  #
573
+ #
574
+ #
575
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/alias-about.html
576
+ #
571
577
  # @option params [String, StringIO, File] :secret_binary
572
578
  # The binary data to encrypt and store in the new version of the secret.
573
579
  # We recommend that you store your binary data in a file and then pass
@@ -1218,18 +1224,23 @@ module Aws::SecretsManager
1218
1224
  # caching. Caching secrets improves speed and reduces your costs. For
1219
1225
  # more information, see [Cache secrets for your applications][1].
1220
1226
  #
1227
+ # To retrieve the previous version of a secret, use `VersionStage` and
1228
+ # specify AWSPREVIOUS. To revert to the previous version of a secret,
1229
+ # call [UpdateSecretVersionStage][2].
1230
+ #
1221
1231
  # <b>Required permissions: </b> `secretsmanager:GetSecretValue`. If the
1222
1232
  # secret is encrypted using a customer-managed key instead of the Amazon
1223
1233
  # Web Services managed key `aws/secretsmanager`, then you also need
1224
1234
  # `kms:Decrypt` permissions for that key. For more information, see [
1225
- # IAM policy actions for Secrets Manager][2] and [Authentication and
1226
- # access control in Secrets Manager][3].
1235
+ # IAM policy actions for Secrets Manager][3] and [Authentication and
1236
+ # access control in Secrets Manager][4].
1227
1237
  #
1228
1238
  #
1229
1239
  #
1230
1240
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieving-secrets.html
1231
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1232
- # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1241
+ # [2]: https://docs.aws.amazon.com/cli/latest/reference/secretsmanager/update-secret-version-stage.html
1242
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1243
+ # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1233
1244
  #
1234
1245
  # @option params [required, String] :secret_id
1235
1246
  # The ARN or name of the secret to retrieve.
@@ -1448,6 +1459,10 @@ module Aws::SecretsManager
1448
1459
  # Services account, not including secrets that are marked for deletion.
1449
1460
  # To see secrets marked for deletion, use the Secrets Manager console.
1450
1461
  #
1462
+ # ListSecrets is eventually consistent, however it might not reflect
1463
+ # changes from the last five minutes. To get the latest information for
1464
+ # a specific secret, use DescribeSecret.
1465
+ #
1451
1466
  # To list the versions of a secret, use ListSecretVersionIds.
1452
1467
  #
1453
1468
  # To get the secret value from `SecretString` or `SecretBinary`, call
@@ -1685,9 +1700,9 @@ module Aws::SecretsManager
1685
1700
  # the staging label `AWSPREVIOUS` to the version that `AWSCURRENT` was
1686
1701
  # removed from.
1687
1702
  #
1688
- # This operation is idempotent. If a version with a `VersionId` with the
1689
- # same value as the `ClientRequestToken` parameter already exists, and
1690
- # you specify the same secret data, the operation succeeds but does
1703
+ # This operation is idempotent. If you call this operation with a
1704
+ # `ClientRequestToken` that matches an existing version's VersionId,
1705
+ # and you specify the same secret data, the operation succeeds but does
1691
1706
  # nothing. However, if the secret data is different, then the operation
1692
1707
  # fails because you can't modify an existing version; you can only
1693
1708
  # create new ones.
@@ -2446,25 +2461,12 @@ module Aws::SecretsManager
2446
2461
  # version, Secrets Manager automatically attaches the staging label
2447
2462
  # `AWSCURRENT` to the new version.
2448
2463
  #
2449
- # If you call this operation with a `VersionId` that matches an existing
2450
- # version's `ClientRequestToken`, the operation results in an error.
2464
+ # If you call this operation with a `ClientRequestToken` that matches an
2465
+ # existing version's `VersionId`, the operation results in an error.
2451
2466
  # You can't modify an existing version, you can only create a new
2452
2467
  # version. To remove a version, remove all staging labels from it. See
2453
2468
  # UpdateSecretVersionStage.
2454
2469
  #
2455
- # If you don't specify an KMS encryption key, Secrets Manager uses the
2456
- # Amazon Web Services managed key `aws/secretsmanager`. If this key
2457
- # doesn't already exist in your account, then Secrets Manager creates
2458
- # it for you automatically. All users and roles in the Amazon Web
2459
- # Services account automatically have access to use
2460
- # `aws/secretsmanager`. Creating `aws/secretsmanager` can result in a
2461
- # one-time significant delay in returning the result.
2462
- #
2463
- # If the secret is in a different Amazon Web Services account from the
2464
- # credentials calling the API, then you can't use `aws/secretsmanager`
2465
- # to encrypt the secret, and you must create and use a customer managed
2466
- # key.
2467
- #
2468
2470
  # <b>Required permissions: </b> `secretsmanager:UpdateSecret`. For more
2469
2471
  # information, see [ IAM policy actions for Secrets Manager][1] and
2470
2472
  # [Authentication and access control in Secrets Manager][2]. If you use
@@ -2514,11 +2516,23 @@ module Aws::SecretsManager
2514
2516
  #
2515
2517
  # @option params [String] :kms_key_id
2516
2518
  # The ARN, key ID, or alias of the KMS key that Secrets Manager uses to
2517
- # encrypt new secret versions as well as any existing versions the
2519
+ # encrypt new secret versions as well as any existing versions with the
2518
2520
  # staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. For more
2519
2521
  # information about versions and staging labels, see [Concepts:
2520
2522
  # Version][1].
2521
2523
  #
2524
+ # A key alias is always prefixed by `alias/`, for example
2525
+ # `alias/aws/secretsmanager`. For more information, see [About
2526
+ # aliases][2].
2527
+ #
2528
+ # If you set this to an empty string, Secrets Manager uses the Amazon
2529
+ # Web Services managed key `aws/secretsmanager`. If this key doesn't
2530
+ # already exist in your account, then Secrets Manager creates it for you
2531
+ # automatically. All users and roles in the Amazon Web Services account
2532
+ # automatically have access to use `aws/secretsmanager`. Creating
2533
+ # `aws/secretsmanager` can result in a one-time significant delay in
2534
+ # returning the result.
2535
+ #
2522
2536
  # You can only use the Amazon Web Services managed key
2523
2537
  # `aws/secretsmanager` if you call this operation using credentials from
2524
2538
  # the same Amazon Web Services account that owns the secret. If the
@@ -2530,6 +2544,7 @@ module Aws::SecretsManager
2530
2544
  #
2531
2545
  #
2532
2546
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/getting-started.html#term_version
2547
+ # [2]: https://docs.aws.amazon.com/kms/latest/developerguide/alias-about.html
2533
2548
  #
2534
2549
  # @option params [String, StringIO, File] :secret_binary
2535
2550
  # The binary data to encrypt and store in the new version of the secret.
@@ -2875,7 +2890,7 @@ module Aws::SecretsManager
2875
2890
  params: params,
2876
2891
  config: config)
2877
2892
  context[:gem_name] = 'aws-sdk-secretsmanager'
2878
- context[:gem_version] = '1.62.0'
2893
+ context[:gem_version] = '1.65.0'
2879
2894
  Seahorse::Client::Request.new(handlers, context)
2880
2895
  end
2881
2896
 
@@ -152,7 +152,9 @@ module Aws::SecretsManager
152
152
  #
153
153
  # @!attribute [rw] kms_key_id
154
154
  # The ARN, key ID, or alias of the KMS key that Secrets Manager uses
155
- # to encrypt the secret value in the secret.
155
+ # to encrypt the secret value in the secret. An alias is always
156
+ # prefixed by `alias/`, for example `alias/aws/secretsmanager`. For
157
+ # more information, see [About aliases][1].
156
158
  #
157
159
  # To use a KMS key in a different account, use the key ARN or the
158
160
  # alias ARN.
@@ -166,6 +168,10 @@ module Aws::SecretsManager
166
168
  # credentials calling the API, then you can't use
167
169
  # `aws/secretsmanager` to encrypt the secret, and you must create and
168
170
  # use a customer managed KMS key.
171
+ #
172
+ #
173
+ #
174
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/alias-about.html
169
175
  # @return [String]
170
176
  #
171
177
  # @!attribute [rw] secret_binary
@@ -489,9 +495,10 @@ module Aws::SecretsManager
489
495
  # @return [String]
490
496
  #
491
497
  # @!attribute [rw] kms_key_id
492
- # The ARN of the KMS key that Secrets Manager uses to encrypt the
493
- # secret value. If the secret is encrypted with the Amazon Web
494
- # Services managed key `aws/secretsmanager`, this field is omitted.
498
+ # The key ID or alias ARN of the KMS key that Secrets Manager uses to
499
+ # encrypt the secret value. If the secret is encrypted with the Amazon
500
+ # Web Services managed key `aws/secretsmanager`, this field is
501
+ # omitted. Secrets created using the console use an KMS key ID.
495
502
  # @return [String]
496
503
  #
497
504
  # @!attribute [rw] rotation_enabled
@@ -525,9 +532,8 @@ module Aws::SecretsManager
525
532
  # @return [Time]
526
533
  #
527
534
  # @!attribute [rw] last_accessed_date
528
- # The last date that the secret value was retrieved. This value does
529
- # not include the time. This field is omitted if the secret has never
530
- # been retrieved.
535
+ # The date that the secret was last accessed in the Region. This field
536
+ # is omitted if the secret has never been retrieved in the Region.
531
537
  # @return [Time]
532
538
  #
533
539
  # @!attribute [rw] deleted_date
@@ -578,7 +584,13 @@ module Aws::SecretsManager
578
584
  # @return [Hash<String,Array<String>>]
579
585
  #
580
586
  # @!attribute [rw] owning_service
581
- # The name of the service that created this secret.
587
+ # The ID of the service that created this secret. For more
588
+ # information, see [Secrets managed by other Amazon Web Services
589
+ # services][1].
590
+ #
591
+ #
592
+ #
593
+ # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/service-linked-secrets.html
582
594
  # @return [String]
583
595
  #
584
596
  # @!attribute [rw] created_date
@@ -1003,6 +1015,14 @@ module Aws::SecretsManager
1003
1015
  # a Lambda function ARN configured and you didn't include such an ARN
1004
1016
  # as a parameter in this call.
1005
1017
  #
1018
+ # * The secret is managed by another service, and you must use that
1019
+ # service to update it. For more information, see [Secrets managed by
1020
+ # other Amazon Web Services services][1].
1021
+ #
1022
+ #
1023
+ #
1024
+ # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/service-linked-secrets.html
1025
+ #
1006
1026
  # @!attribute [rw] message
1007
1027
  # @return [String]
1008
1028
  #
@@ -1580,7 +1600,8 @@ module Aws::SecretsManager
1580
1600
  # @return [String]
1581
1601
  #
1582
1602
  # @!attribute [rw] last_accessed_date
1583
- # The date that you last accessed the secret in the Region.
1603
+ # The date that the secret was last accessed in the Region. This field
1604
+ # is omitted if the secret has never been retrieved in the Region.
1584
1605
  # @return [Time]
1585
1606
  #
1586
1607
  # @see http://docs.aws.amazon.com/goto/WebAPI/secretsmanager-2017-10-17/ReplicationStatusType AWS API Documentation
@@ -1912,9 +1933,8 @@ module Aws::SecretsManager
1912
1933
  # @return [Time]
1913
1934
  #
1914
1935
  # @!attribute [rw] last_accessed_date
1915
- # The last date that this secret was accessed. This value is truncated
1916
- # to midnight of the date and therefore shows only the date, not the
1917
- # time.
1936
+ # The date that the secret was last accessed in the Region. This field
1937
+ # is omitted if the secret has never been retrieved in the Region.
1918
1938
  # @return [Time]
1919
1939
  #
1920
1940
  # @!attribute [rw] deleted_date
@@ -2229,11 +2249,23 @@ module Aws::SecretsManager
2229
2249
  #
2230
2250
  # @!attribute [rw] kms_key_id
2231
2251
  # The ARN, key ID, or alias of the KMS key that Secrets Manager uses
2232
- # to encrypt new secret versions as well as any existing versions the
2233
- # staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. For
2252
+ # to encrypt new secret versions as well as any existing versions with
2253
+ # the staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. For
2234
2254
  # more information about versions and staging labels, see [Concepts:
2235
2255
  # Version][1].
2236
2256
  #
2257
+ # A key alias is always prefixed by `alias/`, for example
2258
+ # `alias/aws/secretsmanager`. For more information, see [About
2259
+ # aliases][2].
2260
+ #
2261
+ # If you set this to an empty string, Secrets Manager uses the Amazon
2262
+ # Web Services managed key `aws/secretsmanager`. If this key doesn't
2263
+ # already exist in your account, then Secrets Manager creates it for
2264
+ # you automatically. All users and roles in the Amazon Web Services
2265
+ # account automatically have access to use `aws/secretsmanager`.
2266
+ # Creating `aws/secretsmanager` can result in a one-time significant
2267
+ # delay in returning the result.
2268
+ #
2237
2269
  # You can only use the Amazon Web Services managed key
2238
2270
  # `aws/secretsmanager` if you call this operation using credentials
2239
2271
  # from the same Amazon Web Services account that owns the secret. If
@@ -2245,6 +2277,7 @@ module Aws::SecretsManager
2245
2277
  #
2246
2278
  #
2247
2279
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/getting-started.html#term_version
2280
+ # [2]: https://docs.aws.amazon.com/kms/latest/developerguide/alias-about.html
2248
2281
  # @return [String]
2249
2282
  #
2250
2283
  # @!attribute [rw] secret_binary
@@ -48,6 +48,6 @@ require_relative 'aws-sdk-secretsmanager/customizations'
48
48
  # @!group service
49
49
  module Aws::SecretsManager
50
50
 
51
- GEM_VERSION = '1.62.0'
51
+ GEM_VERSION = '1.65.0'
52
52
 
53
53
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-secretsmanager
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.62.0
4
+ version: 1.65.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-05-25 00:00:00.000000000 Z
11
+ date: 2022-08-17 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core