aws-sdk-secretsmanager 1.80.0 → 1.82.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: c42f27b4657d57bbf577dae00732dd06b7cba796c0639feee655bd11de7a3aea
4
- data.tar.gz: c28a1edc5d2b048bc078903eb4eb5701bee60e3ad7cdba3ac4e57196296e3fe5
3
+ metadata.gz: 1a90a586b081b2878d14dff9262f4f93434fbe619ffb25c1d16b66cc7e8a12b8
4
+ data.tar.gz: 7a0e7529d7cfb2d8617cac2bcab4c25c92911e28108453110e9f4ee0973f97ec
5
5
  SHA512:
6
- metadata.gz: a47f0f55362464adbbd1247baa668a5ac565a01a9079680c754ccac3ada4786de89aa4a7e378e8666a18b61eb5d7406cab43c2ad02442e8f0db46445c49d6c82
7
- data.tar.gz: a82014af02712bac9b197980f5f4298f2547e9816048e56b50618686289ed45c0c4c6393a612fa1cd4585da93fee50f021fe892fba3c496e2aa3dd83422eb4f5
6
+ metadata.gz: 9b76f5c9543779072fd17b8377ff3b910e86a80dca783dfe589be7f4610341f3d01da557e8bba44b37431986a65747e3d48a94be0739c71e177600d304b863d2
7
+ data.tar.gz: 21ef070b58b05175d10837e28a3383e772c48e87175278ff4db2643ff040575b43bd7fb19899797d874a4e08de45e633eae9ed1f37ed82638443b0ef9fb7ca39
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.82.0 (2023-08-10)
5
+ ------------------
6
+
7
+ * Feature - Add additional InvalidRequestException to list of possible exceptions for ListSecret.
8
+
9
+ 1.81.0 (2023-07-13)
10
+ ------------------
11
+
12
+ * Feature - Documentation updates for Secrets Manager
13
+
4
14
  1.80.0 (2023-07-11)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.80.0
1
+ 1.82.0
@@ -827,7 +827,7 @@ module Aws::SecretsManager
827
827
  #
828
828
  # resp.to_h outputs the following:
829
829
  # {
830
- # arn: "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseMasterSecret-a1b2c3",
830
+ # arn: "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
831
831
  # name: "MyTestDatabaseSecret",
832
832
  # }
833
833
  #
@@ -2668,9 +2668,12 @@ module Aws::SecretsManager
2668
2668
  # <b>Required permissions: </b> `secretsmanager:UpdateSecret`. For more
2669
2669
  # information, see [ IAM policy actions for Secrets Manager][3] and
2670
2670
  # [Authentication and access control in Secrets Manager][4]. If you use
2671
- # a customer managed key, you must also have `kms:GenerateDataKey` and
2672
- # `kms:Decrypt` permissions on the key. For more information, see [
2673
- # Secret encryption and decryption][5].
2671
+ # a customer managed key, you must also have `kms:GenerateDataKey`,
2672
+ # `kms:Encrypt`, and `kms:Decrypt` permissions on the key. If you change
2673
+ # the KMS key and you don't have `kms:Encrypt` permission to the new
2674
+ # key, Secrets Manager does not re-ecrypt existing secret versions with
2675
+ # the new key. For more information, see [ Secret encryption and
2676
+ # decryption][5].
2674
2677
  #
2675
2678
  #
2676
2679
  #
@@ -2717,7 +2720,9 @@ module Aws::SecretsManager
2717
2720
  # @option params [String] :kms_key_id
2718
2721
  # The ARN, key ID, or alias of the KMS key that Secrets Manager uses to
2719
2722
  # encrypt new secret versions as well as any existing versions with the
2720
- # staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. For more
2723
+ # staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. If you
2724
+ # don't have `kms:Encrypt` permission to the new key, Secrets Manager
2725
+ # does not re-ecrypt existing secret versions with the new key. For more
2721
2726
  # information about versions and staging labels, see [Concepts:
2722
2727
  # Version][1].
2723
2728
  #
@@ -3103,7 +3108,7 @@ module Aws::SecretsManager
3103
3108
  params: params,
3104
3109
  config: config)
3105
3110
  context[:gem_name] = 'aws-sdk-secretsmanager'
3106
- context[:gem_version] = '1.80.0'
3111
+ context[:gem_version] = '1.82.0'
3107
3112
  Seahorse::Client::Request.new(handlers, context)
3108
3113
  end
3109
3114
 
@@ -625,6 +625,7 @@ module Aws::SecretsManager
625
625
  o.input = Shapes::ShapeRef.new(shape: ListSecretsRequest)
626
626
  o.output = Shapes::ShapeRef.new(shape: ListSecretsResponse)
627
627
  o.errors << Shapes::ShapeRef.new(shape: InvalidParameterException)
628
+ o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
628
629
  o.errors << Shapes::ShapeRef.new(shape: InvalidNextTokenException)
629
630
  o.errors << Shapes::ShapeRef.new(shape: InternalServiceError)
630
631
  o[:pager] = Aws::Pager.new(
@@ -2052,9 +2052,11 @@ module Aws::SecretsManager
2052
2052
  # @!attribute [rw] kms_key_id
2053
2053
  # The ARN, key ID, or alias of the KMS key that Secrets Manager uses
2054
2054
  # to encrypt new secret versions as well as any existing versions with
2055
- # the staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. For
2056
- # more information about versions and staging labels, see [Concepts:
2057
- # Version][1].
2055
+ # the staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. If
2056
+ # you don't have `kms:Encrypt` permission to the new key, Secrets
2057
+ # Manager does not re-ecrypt existing secret versions with the new
2058
+ # key. For more information about versions and staging labels, see
2059
+ # [Concepts: Version][1].
2058
2060
  #
2059
2061
  # A key alias is always prefixed by `alias/`, for example
2060
2062
  # `alias/aws/secretsmanager`. For more information, see [About
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-secretsmanager/customizations'
52
52
  # @!group service
53
53
  module Aws::SecretsManager
54
54
 
55
- GEM_VERSION = '1.80.0'
55
+ GEM_VERSION = '1.82.0'
56
56
 
57
57
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-secretsmanager
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.80.0
4
+ version: 1.82.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-07-11 00:00:00.000000000 Z
11
+ date: 2023-08-10 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core