aws-sdk-secretsmanager 1.83.0 → 1.84.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-secretsmanager/client.rb +62 -84
- data/lib/aws-sdk-secretsmanager/endpoint_provider.rb +1 -1
- data/lib/aws-sdk-secretsmanager/types.rb +50 -57
- data/lib/aws-sdk-secretsmanager.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 7ad8f83fd5cda53d70ffeca9f17fb1a162f3872019c017056c48d37612fd5eae
|
4
|
+
data.tar.gz: 0d43fd6b56e8eb6d9bf0172ab814c70da6d73e3e30e07d3374436e245f7d27ed
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: ba0e3b0c2a0ffd25b3be0909a6a790648a67ba37930e4b4aef8c86c8a78f7ef7d8226423e0f29a0d61fc0cc02ccb881619c601c0252d1d4222db91c7c37782f3
|
7
|
+
data.tar.gz: 135f6b242162722e8a93906cebe17b9c9763d6adc4107da3feb5dee4b7d01413d1b324bfaf1950329195991c92a010aad60ab1b34cd359678bd479af10192449
|
data/CHANGELOG.md
CHANGED
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.84.0
|
@@ -567,14 +567,14 @@ module Aws::SecretsManager
|
|
567
567
|
# <note markdown="1"> If you use the Amazon Web Services CLI or one of the Amazon Web
|
568
568
|
# Services SDKs to call this operation, then you can leave this
|
569
569
|
# parameter empty. The CLI or SDK generates a random UUID for you and
|
570
|
-
# includes it as the value for this parameter in the request.
|
571
|
-
# don't use the SDK and instead generate a raw HTTP request to the
|
572
|
-
# Secrets Manager service endpoint, then you must generate a
|
573
|
-
# `ClientRequestToken` yourself for the new version and include the
|
574
|
-
# value in the request.
|
570
|
+
# includes it as the value for this parameter in the request.
|
575
571
|
#
|
576
572
|
# </note>
|
577
573
|
#
|
574
|
+
# If you generate a raw HTTP request to the Secrets Manager service
|
575
|
+
# endpoint, then you must generate a `ClientRequestToken` and include it
|
576
|
+
# in the request.
|
577
|
+
#
|
578
578
|
# This value helps ensure idempotency. Secrets Manager uses this value
|
579
579
|
# to prevent the accidental creation of duplicate versions if there are
|
580
580
|
# failures and retries during a rotation. We recommend that you generate
|
@@ -676,32 +676,15 @@ module Aws::SecretsManager
|
|
676
676
|
# parameter, you should use single quotes to avoid confusion with the
|
677
677
|
# double quotes required in the JSON text.
|
678
678
|
#
|
679
|
-
#
|
680
|
-
#
|
681
|
-
# * Maximum number of tags per secret: 50
|
682
|
-
#
|
683
|
-
# * Maximum key length: 127 Unicode characters in UTF-8
|
684
|
-
#
|
685
|
-
# * Maximum value length: 255 Unicode characters in UTF-8
|
686
|
-
#
|
687
|
-
# * Tag keys and values are case sensitive.
|
688
|
-
#
|
689
|
-
# * Do not use the `aws:` prefix in your tag names or values because
|
690
|
-
# Amazon Web Services reserves it for Amazon Web Services use. You
|
691
|
-
# can't edit or delete tag names or values with this prefix. Tags
|
692
|
-
# with this prefix do not count against your tags per secret limit.
|
693
|
-
#
|
694
|
-
# * If you use your tagging schema across multiple services and
|
695
|
-
# resources, other services might have restrictions on allowed
|
696
|
-
# characters. Generally allowed characters: letters, spaces, and
|
697
|
-
# numbers representable in UTF-8, plus the following special
|
698
|
-
# characters: + - = . \_ : / @.
|
679
|
+
# For tag quotas and naming restrictions, see [Service quotas for
|
680
|
+
# Tagging][4] in the *Amazon Web Services General Reference guide*.
|
699
681
|
#
|
700
682
|
#
|
701
683
|
#
|
702
684
|
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access_examples.html#tag-secrets-abac
|
703
685
|
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access_examples.html#auth-and-access_tags2
|
704
686
|
# [3]: https://docs.aws.amazon.com/cli/latest/userguide/cli-using-param.html#cli-using-param-json
|
687
|
+
# [4]: https://docs.aws.amazon.com/general/latest/gr/arg.html#taged-reference-quotas
|
705
688
|
#
|
706
689
|
# @option params [Array<Types::ReplicaRegionType>] :add_replica_regions
|
707
690
|
# A list of Regions and KMS keys to replicate secrets.
|
@@ -1860,19 +1843,20 @@ module Aws::SecretsManager
|
|
1860
1843
|
#
|
1861
1844
|
# <note markdown="1"> If you use the Amazon Web Services CLI or one of the Amazon Web
|
1862
1845
|
# Services SDKs to call this operation, then you can leave this
|
1863
|
-
# parameter empty
|
1864
|
-
#
|
1865
|
-
# Secrets Manager service endpoint, then you must generate a
|
1866
|
-
# `ClientRequestToken` yourself for new versions and include that value
|
1867
|
-
# in the request.
|
1846
|
+
# parameter empty. The CLI or SDK generates a random UUID for you and
|
1847
|
+
# includes it as the value for this parameter in the request.
|
1868
1848
|
#
|
1869
1849
|
# </note>
|
1870
1850
|
#
|
1851
|
+
# If you generate a raw HTTP request to the Secrets Manager service
|
1852
|
+
# endpoint, then you must generate a `ClientRequestToken` and include it
|
1853
|
+
# in the request.
|
1854
|
+
#
|
1871
1855
|
# This value helps ensure idempotency. Secrets Manager uses this value
|
1872
1856
|
# to prevent the accidental creation of duplicate versions if there are
|
1873
|
-
# failures and retries during
|
1874
|
-
#
|
1875
|
-
#
|
1857
|
+
# failures and retries during a rotation. We recommend that you generate
|
1858
|
+
# a [UUID-type][1] value to ensure uniqueness of your versions within
|
1859
|
+
# the specified secret.
|
1876
1860
|
#
|
1877
1861
|
# * If the `ClientRequestToken` value isn't already associated with a
|
1878
1862
|
# version of the secret then a new version of the secret is created.
|
@@ -2253,24 +2237,27 @@ module Aws::SecretsManager
|
|
2253
2237
|
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/troubleshoot.html#ARN_secretnamehyphen
|
2254
2238
|
#
|
2255
2239
|
# @option params [String] :client_request_token
|
2256
|
-
# A unique identifier for the new version of the secret
|
2257
|
-
#
|
2258
|
-
#
|
2259
|
-
#
|
2260
|
-
#
|
2261
|
-
#
|
2262
|
-
#
|
2263
|
-
#
|
2264
|
-
#
|
2265
|
-
#
|
2266
|
-
#
|
2267
|
-
#
|
2268
|
-
#
|
2269
|
-
#
|
2270
|
-
#
|
2271
|
-
#
|
2272
|
-
#
|
2273
|
-
#
|
2240
|
+
# A unique identifier for the new version of the secret. You only need
|
2241
|
+
# to specify this value if you implement your own retry logic and you
|
2242
|
+
# want to ensure that Secrets Manager doesn't attempt to create a
|
2243
|
+
# secret version twice.
|
2244
|
+
#
|
2245
|
+
# <note markdown="1"> If you use the Amazon Web Services CLI or one of the Amazon Web
|
2246
|
+
# Services SDKs to call this operation, then you can leave this
|
2247
|
+
# parameter empty. The CLI or SDK generates a random UUID for you and
|
2248
|
+
# includes it as the value for this parameter in the request.
|
2249
|
+
#
|
2250
|
+
# </note>
|
2251
|
+
#
|
2252
|
+
# If you generate a raw HTTP request to the Secrets Manager service
|
2253
|
+
# endpoint, then you must generate a `ClientRequestToken` and include it
|
2254
|
+
# in the request.
|
2255
|
+
#
|
2256
|
+
# This value helps ensure idempotency. Secrets Manager uses this value
|
2257
|
+
# to prevent the accidental creation of duplicate versions if there are
|
2258
|
+
# failures and retries during a rotation. We recommend that you generate
|
2259
|
+
# a [UUID-type][1] value to ensure uniqueness of your versions within
|
2260
|
+
# the specified secret.
|
2274
2261
|
#
|
2275
2262
|
# **A suitable default value is auto-generated.** You should normally
|
2276
2263
|
# not need to pass this option.**
|
@@ -2438,26 +2425,8 @@ module Aws::SecretsManager
|
|
2438
2425
|
# specific versions of the secret. This operation appends tags to the
|
2439
2426
|
# existing list of tags.
|
2440
2427
|
#
|
2441
|
-
#
|
2442
|
-
#
|
2443
|
-
# * Maximum number of tags per secret: 50
|
2444
|
-
#
|
2445
|
-
# * Maximum key length: 127 Unicode characters in UTF-8
|
2446
|
-
#
|
2447
|
-
# * Maximum value length: 255 Unicode characters in UTF-8
|
2448
|
-
#
|
2449
|
-
# * Tag keys and values are case sensitive.
|
2450
|
-
#
|
2451
|
-
# * Do not use the `aws:` prefix in your tag names or values because
|
2452
|
-
# Amazon Web Services reserves it for Amazon Web Services use. You
|
2453
|
-
# can't edit or delete tag names or values with this prefix. Tags
|
2454
|
-
# with this prefix do not count against your tags per secret limit.
|
2455
|
-
#
|
2456
|
-
# * If you use your tagging schema across multiple services and
|
2457
|
-
# resources, other services might have restrictions on allowed
|
2458
|
-
# characters. Generally allowed characters: letters, spaces, and
|
2459
|
-
# numbers representable in UTF-8, plus the following special
|
2460
|
-
# characters: + - = . \_ : / @.
|
2428
|
+
# For tag quotas and naming restrictions, see [Service quotas for
|
2429
|
+
# Tagging][1] in the *Amazon Web Services General Reference guide*.
|
2461
2430
|
#
|
2462
2431
|
# If you use tags as part of your security strategy, then adding or
|
2463
2432
|
# removing a tag can change permissions. If successfully completing this
|
@@ -2467,17 +2436,18 @@ module Aws::SecretsManager
|
|
2467
2436
|
# Secrets Manager generates a CloudTrail log entry when you call this
|
2468
2437
|
# action. Do not include sensitive information in request parameters
|
2469
2438
|
# because it might be logged. For more information, see [Logging Secrets
|
2470
|
-
# Manager events with CloudTrail][
|
2439
|
+
# Manager events with CloudTrail][2].
|
2471
2440
|
#
|
2472
2441
|
# <b>Required permissions: </b> `secretsmanager:TagResource`. For more
|
2473
|
-
# information, see [ IAM policy actions for Secrets Manager][
|
2474
|
-
# [Authentication and access control in Secrets Manager][
|
2442
|
+
# information, see [ IAM policy actions for Secrets Manager][3] and
|
2443
|
+
# [Authentication and access control in Secrets Manager][4].
|
2475
2444
|
#
|
2476
2445
|
#
|
2477
2446
|
#
|
2478
|
-
# [1]: https://docs.aws.amazon.com/
|
2479
|
-
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
2480
|
-
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
2447
|
+
# [1]: https://docs.aws.amazon.com/general/latest/gr/arg.html#taged-reference-quotas
|
2448
|
+
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
|
2449
|
+
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
2450
|
+
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
2481
2451
|
#
|
2482
2452
|
# @option params [required, String] :secret_id
|
2483
2453
|
# The identifier for the secret to attach tags to. You can specify
|
@@ -2701,19 +2671,27 @@ module Aws::SecretsManager
|
|
2701
2671
|
# <note markdown="1"> If you use the Amazon Web Services CLI or one of the Amazon Web
|
2702
2672
|
# Services SDKs to call this operation, then you can leave this
|
2703
2673
|
# parameter empty. The CLI or SDK generates a random UUID for you and
|
2704
|
-
# includes it as the value for this parameter in the request.
|
2705
|
-
# don't use the SDK and instead generate a raw HTTP request to the
|
2706
|
-
# Secrets Manager service endpoint, then you must generate a
|
2707
|
-
# `ClientRequestToken` yourself for the new version and include the
|
2708
|
-
# value in the request.
|
2674
|
+
# includes it as the value for this parameter in the request.
|
2709
2675
|
#
|
2710
2676
|
# </note>
|
2711
2677
|
#
|
2712
|
-
#
|
2678
|
+
# If you generate a raw HTTP request to the Secrets Manager service
|
2679
|
+
# endpoint, then you must generate a `ClientRequestToken` and include it
|
2680
|
+
# in the request.
|
2681
|
+
#
|
2682
|
+
# This value helps ensure idempotency. Secrets Manager uses this value
|
2683
|
+
# to prevent the accidental creation of duplicate versions if there are
|
2684
|
+
# failures and retries during a rotation. We recommend that you generate
|
2685
|
+
# a [UUID-type][1] value to ensure uniqueness of your versions within
|
2686
|
+
# the specified secret.
|
2713
2687
|
#
|
2714
2688
|
# **A suitable default value is auto-generated.** You should normally
|
2715
2689
|
# not need to pass this option.**
|
2716
2690
|
#
|
2691
|
+
#
|
2692
|
+
#
|
2693
|
+
# [1]: https://wikipedia.org/wiki/Universally_unique_identifier
|
2694
|
+
#
|
2717
2695
|
# @option params [String] :description
|
2718
2696
|
# The description of the secret.
|
2719
2697
|
#
|
@@ -3108,7 +3086,7 @@ module Aws::SecretsManager
|
|
3108
3086
|
params: params,
|
3109
3087
|
config: config)
|
3110
3088
|
context[:gem_name] = 'aws-sdk-secretsmanager'
|
3111
|
-
context[:gem_version] = '1.
|
3089
|
+
context[:gem_version] = '1.84.0'
|
3112
3090
|
Seahorse::Client::Request.new(handlers, context)
|
3113
3091
|
end
|
3114
3092
|
|
@@ -32,7 +32,7 @@ module Aws::SecretsManager
|
|
32
32
|
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
33
33
|
end
|
34
34
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
35
|
-
if Aws::Endpoints::Matchers.boolean_equals?(
|
35
|
+
if Aws::Endpoints::Matchers.boolean_equals?(Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"), true)
|
36
36
|
return Aws::Endpoints::Endpoint.new(url: "https://secretsmanager-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
|
37
37
|
end
|
38
38
|
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
@@ -77,14 +77,14 @@ module Aws::SecretsManager
|
|
77
77
|
# <note markdown="1"> If you use the Amazon Web Services CLI or one of the Amazon Web
|
78
78
|
# Services SDKs to call this operation, then you can leave this
|
79
79
|
# parameter empty. The CLI or SDK generates a random UUID for you and
|
80
|
-
# includes it as the value for this parameter in the request.
|
81
|
-
# don't use the SDK and instead generate a raw HTTP request to the
|
82
|
-
# Secrets Manager service endpoint, then you must generate a
|
83
|
-
# `ClientRequestToken` yourself for the new version and include the
|
84
|
-
# value in the request.
|
80
|
+
# includes it as the value for this parameter in the request.
|
85
81
|
#
|
86
82
|
# </note>
|
87
83
|
#
|
84
|
+
# If you generate a raw HTTP request to the Secrets Manager service
|
85
|
+
# endpoint, then you must generate a `ClientRequestToken` and include
|
86
|
+
# it in the request.
|
87
|
+
#
|
88
88
|
# This value helps ensure idempotency. Secrets Manager uses this value
|
89
89
|
# to prevent the accidental creation of duplicate versions if there
|
90
90
|
# are failures and retries during a rotation. We recommend that you
|
@@ -191,32 +191,15 @@ module Aws::SecretsManager
|
|
191
191
|
# parameter, you should use single quotes to avoid confusion with the
|
192
192
|
# double quotes required in the JSON text.
|
193
193
|
#
|
194
|
-
#
|
195
|
-
#
|
196
|
-
# * Maximum number of tags per secret: 50
|
197
|
-
#
|
198
|
-
# * Maximum key length: 127 Unicode characters in UTF-8
|
199
|
-
#
|
200
|
-
# * Maximum value length: 255 Unicode characters in UTF-8
|
201
|
-
#
|
202
|
-
# * Tag keys and values are case sensitive.
|
203
|
-
#
|
204
|
-
# * Do not use the `aws:` prefix in your tag names or values because
|
205
|
-
# Amazon Web Services reserves it for Amazon Web Services use. You
|
206
|
-
# can't edit or delete tag names or values with this prefix. Tags
|
207
|
-
# with this prefix do not count against your tags per secret limit.
|
208
|
-
#
|
209
|
-
# * If you use your tagging schema across multiple services and
|
210
|
-
# resources, other services might have restrictions on allowed
|
211
|
-
# characters. Generally allowed characters: letters, spaces, and
|
212
|
-
# numbers representable in UTF-8, plus the following special
|
213
|
-
# characters: + - = . \_ : / @.
|
194
|
+
# For tag quotas and naming restrictions, see [Service quotas for
|
195
|
+
# Tagging][4] in the *Amazon Web Services General Reference guide*.
|
214
196
|
#
|
215
197
|
#
|
216
198
|
#
|
217
199
|
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access_examples.html#tag-secrets-abac
|
218
200
|
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access_examples.html#auth-and-access_tags2
|
219
201
|
# [3]: https://docs.aws.amazon.com/cli/latest/userguide/cli-using-param.html#cli-using-param-json
|
202
|
+
# [4]: https://docs.aws.amazon.com/general/latest/gr/arg.html#taged-reference-quotas
|
220
203
|
# @return [Array<Types::Tag>]
|
221
204
|
#
|
222
205
|
# @!attribute [rw] add_replica_regions
|
@@ -1215,19 +1198,20 @@ module Aws::SecretsManager
|
|
1215
1198
|
#
|
1216
1199
|
# <note markdown="1"> If you use the Amazon Web Services CLI or one of the Amazon Web
|
1217
1200
|
# Services SDKs to call this operation, then you can leave this
|
1218
|
-
# parameter empty
|
1219
|
-
#
|
1220
|
-
# Secrets Manager service endpoint, then you must generate a
|
1221
|
-
# `ClientRequestToken` yourself for new versions and include that
|
1222
|
-
# value in the request.
|
1201
|
+
# parameter empty. The CLI or SDK generates a random UUID for you and
|
1202
|
+
# includes it as the value for this parameter in the request.
|
1223
1203
|
#
|
1224
1204
|
# </note>
|
1225
1205
|
#
|
1206
|
+
# If you generate a raw HTTP request to the Secrets Manager service
|
1207
|
+
# endpoint, then you must generate a `ClientRequestToken` and include
|
1208
|
+
# it in the request.
|
1209
|
+
#
|
1226
1210
|
# This value helps ensure idempotency. Secrets Manager uses this value
|
1227
1211
|
# to prevent the accidental creation of duplicate versions if there
|
1228
|
-
# are failures and retries during
|
1229
|
-
#
|
1230
|
-
#
|
1212
|
+
# are failures and retries during a rotation. We recommend that you
|
1213
|
+
# generate a [UUID-type][1] value to ensure uniqueness of your
|
1214
|
+
# versions within the specified secret.
|
1231
1215
|
#
|
1232
1216
|
# * If the `ClientRequestToken` value isn't already associated with a
|
1233
1217
|
# version of the secret then a new version of the secret is created.
|
@@ -1542,26 +1526,27 @@ module Aws::SecretsManager
|
|
1542
1526
|
# @return [String]
|
1543
1527
|
#
|
1544
1528
|
# @!attribute [rw] client_request_token
|
1545
|
-
# A unique identifier for the new version of the secret
|
1546
|
-
#
|
1547
|
-
#
|
1548
|
-
#
|
1549
|
-
# new version.
|
1529
|
+
# A unique identifier for the new version of the secret. You only need
|
1530
|
+
# to specify this value if you implement your own retry logic and you
|
1531
|
+
# want to ensure that Secrets Manager doesn't attempt to create a
|
1532
|
+
# secret version twice.
|
1550
1533
|
#
|
1551
|
-
# If you use the Amazon Web Services CLI or one of the Amazon Web
|
1552
|
-
# Services
|
1534
|
+
# <note markdown="1"> If you use the Amazon Web Services CLI or one of the Amazon Web
|
1535
|
+
# Services SDKs to call this operation, then you can leave this
|
1553
1536
|
# parameter empty. The CLI or SDK generates a random UUID for you and
|
1554
|
-
# includes
|
1555
|
-
#
|
1556
|
-
#
|
1557
|
-
#
|
1558
|
-
#
|
1559
|
-
#
|
1560
|
-
#
|
1561
|
-
#
|
1562
|
-
#
|
1563
|
-
#
|
1564
|
-
#
|
1537
|
+
# includes it as the value for this parameter in the request.
|
1538
|
+
#
|
1539
|
+
# </note>
|
1540
|
+
#
|
1541
|
+
# If you generate a raw HTTP request to the Secrets Manager service
|
1542
|
+
# endpoint, then you must generate a `ClientRequestToken` and include
|
1543
|
+
# it in the request.
|
1544
|
+
#
|
1545
|
+
# This value helps ensure idempotency. Secrets Manager uses this value
|
1546
|
+
# to prevent the accidental creation of duplicate versions if there
|
1547
|
+
# are failures and retries during a rotation. We recommend that you
|
1548
|
+
# generate a [UUID-type][1] value to ensure uniqueness of your
|
1549
|
+
# versions within the specified secret.
|
1565
1550
|
#
|
1566
1551
|
# **A suitable default value is auto-generated.** You should normally
|
1567
1552
|
# not need to pass this option.
|
@@ -2031,18 +2016,26 @@ module Aws::SecretsManager
|
|
2031
2016
|
# <note markdown="1"> If you use the Amazon Web Services CLI or one of the Amazon Web
|
2032
2017
|
# Services SDKs to call this operation, then you can leave this
|
2033
2018
|
# parameter empty. The CLI or SDK generates a random UUID for you and
|
2034
|
-
# includes it as the value for this parameter in the request.
|
2035
|
-
# don't use the SDK and instead generate a raw HTTP request to the
|
2036
|
-
# Secrets Manager service endpoint, then you must generate a
|
2037
|
-
# `ClientRequestToken` yourself for the new version and include the
|
2038
|
-
# value in the request.
|
2019
|
+
# includes it as the value for this parameter in the request.
|
2039
2020
|
#
|
2040
2021
|
# </note>
|
2041
2022
|
#
|
2042
|
-
#
|
2023
|
+
# If you generate a raw HTTP request to the Secrets Manager service
|
2024
|
+
# endpoint, then you must generate a `ClientRequestToken` and include
|
2025
|
+
# it in the request.
|
2026
|
+
#
|
2027
|
+
# This value helps ensure idempotency. Secrets Manager uses this value
|
2028
|
+
# to prevent the accidental creation of duplicate versions if there
|
2029
|
+
# are failures and retries during a rotation. We recommend that you
|
2030
|
+
# generate a [UUID-type][1] value to ensure uniqueness of your
|
2031
|
+
# versions within the specified secret.
|
2043
2032
|
#
|
2044
2033
|
# **A suitable default value is auto-generated.** You should normally
|
2045
2034
|
# not need to pass this option.
|
2035
|
+
#
|
2036
|
+
#
|
2037
|
+
#
|
2038
|
+
# [1]: https://wikipedia.org/wiki/Universally_unique_identifier
|
2046
2039
|
# @return [String]
|
2047
2040
|
#
|
2048
2041
|
# @!attribute [rw] description
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-secretsmanager
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.84.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2023-
|
11
|
+
date: 2023-10-19 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|