aws-sdk-secretsmanager 1.80.0 → 1.82.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-secretsmanager/client.rb +11 -6
- data/lib/aws-sdk-secretsmanager/client_api.rb +1 -0
- data/lib/aws-sdk-secretsmanager/types.rb +5 -3
- data/lib/aws-sdk-secretsmanager.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 1a90a586b081b2878d14dff9262f4f93434fbe619ffb25c1d16b66cc7e8a12b8
|
4
|
+
data.tar.gz: 7a0e7529d7cfb2d8617cac2bcab4c25c92911e28108453110e9f4ee0973f97ec
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 9b76f5c9543779072fd17b8377ff3b910e86a80dca783dfe589be7f4610341f3d01da557e8bba44b37431986a65747e3d48a94be0739c71e177600d304b863d2
|
7
|
+
data.tar.gz: 21ef070b58b05175d10837e28a3383e772c48e87175278ff4db2643ff040575b43bd7fb19899797d874a4e08de45e633eae9ed1f37ed82638443b0ef9fb7ca39
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.82.0 (2023-08-10)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Add additional InvalidRequestException to list of possible exceptions for ListSecret.
|
8
|
+
|
9
|
+
1.81.0 (2023-07-13)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Documentation updates for Secrets Manager
|
13
|
+
|
4
14
|
1.80.0 (2023-07-11)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.82.0
|
@@ -827,7 +827,7 @@ module Aws::SecretsManager
|
|
827
827
|
#
|
828
828
|
# resp.to_h outputs the following:
|
829
829
|
# {
|
830
|
-
# arn: "arn:aws:secretsmanager:us-west-2:123456789012:secret:
|
830
|
+
# arn: "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
|
831
831
|
# name: "MyTestDatabaseSecret",
|
832
832
|
# }
|
833
833
|
#
|
@@ -2668,9 +2668,12 @@ module Aws::SecretsManager
|
|
2668
2668
|
# <b>Required permissions: </b> `secretsmanager:UpdateSecret`. For more
|
2669
2669
|
# information, see [ IAM policy actions for Secrets Manager][3] and
|
2670
2670
|
# [Authentication and access control in Secrets Manager][4]. If you use
|
2671
|
-
# a customer managed key, you must also have `kms:GenerateDataKey
|
2672
|
-
# `kms:Decrypt` permissions on the key.
|
2673
|
-
#
|
2671
|
+
# a customer managed key, you must also have `kms:GenerateDataKey`,
|
2672
|
+
# `kms:Encrypt`, and `kms:Decrypt` permissions on the key. If you change
|
2673
|
+
# the KMS key and you don't have `kms:Encrypt` permission to the new
|
2674
|
+
# key, Secrets Manager does not re-ecrypt existing secret versions with
|
2675
|
+
# the new key. For more information, see [ Secret encryption and
|
2676
|
+
# decryption][5].
|
2674
2677
|
#
|
2675
2678
|
#
|
2676
2679
|
#
|
@@ -2717,7 +2720,9 @@ module Aws::SecretsManager
|
|
2717
2720
|
# @option params [String] :kms_key_id
|
2718
2721
|
# The ARN, key ID, or alias of the KMS key that Secrets Manager uses to
|
2719
2722
|
# encrypt new secret versions as well as any existing versions with the
|
2720
|
-
# staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`.
|
2723
|
+
# staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. If you
|
2724
|
+
# don't have `kms:Encrypt` permission to the new key, Secrets Manager
|
2725
|
+
# does not re-ecrypt existing secret versions with the new key. For more
|
2721
2726
|
# information about versions and staging labels, see [Concepts:
|
2722
2727
|
# Version][1].
|
2723
2728
|
#
|
@@ -3103,7 +3108,7 @@ module Aws::SecretsManager
|
|
3103
3108
|
params: params,
|
3104
3109
|
config: config)
|
3105
3110
|
context[:gem_name] = 'aws-sdk-secretsmanager'
|
3106
|
-
context[:gem_version] = '1.
|
3111
|
+
context[:gem_version] = '1.82.0'
|
3107
3112
|
Seahorse::Client::Request.new(handlers, context)
|
3108
3113
|
end
|
3109
3114
|
|
@@ -625,6 +625,7 @@ module Aws::SecretsManager
|
|
625
625
|
o.input = Shapes::ShapeRef.new(shape: ListSecretsRequest)
|
626
626
|
o.output = Shapes::ShapeRef.new(shape: ListSecretsResponse)
|
627
627
|
o.errors << Shapes::ShapeRef.new(shape: InvalidParameterException)
|
628
|
+
o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
|
628
629
|
o.errors << Shapes::ShapeRef.new(shape: InvalidNextTokenException)
|
629
630
|
o.errors << Shapes::ShapeRef.new(shape: InternalServiceError)
|
630
631
|
o[:pager] = Aws::Pager.new(
|
@@ -2052,9 +2052,11 @@ module Aws::SecretsManager
|
|
2052
2052
|
# @!attribute [rw] kms_key_id
|
2053
2053
|
# The ARN, key ID, or alias of the KMS key that Secrets Manager uses
|
2054
2054
|
# to encrypt new secret versions as well as any existing versions with
|
2055
|
-
# the staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`.
|
2056
|
-
#
|
2057
|
-
#
|
2055
|
+
# the staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. If
|
2056
|
+
# you don't have `kms:Encrypt` permission to the new key, Secrets
|
2057
|
+
# Manager does not re-ecrypt existing secret versions with the new
|
2058
|
+
# key. For more information about versions and staging labels, see
|
2059
|
+
# [Concepts: Version][1].
|
2058
2060
|
#
|
2059
2061
|
# A key alias is always prefixed by `alias/`, for example
|
2060
2062
|
# `alias/aws/secretsmanager`. For more information, see [About
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-secretsmanager
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.82.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2023-
|
11
|
+
date: 2023-08-10 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|