aws-sdk-secretsmanager 1.90.0 → 1.91.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-secretsmanager/client.rb +30 -13
- data/lib/aws-sdk-secretsmanager/types.rb +31 -2
- data/lib/aws-sdk-secretsmanager.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: c9ccfc0333feb677c8a83a4ca7f62509f73c49e5917dd8bfb5135ed6405a6442
|
4
|
+
data.tar.gz: 98e8b6facb734bc90b52f19646848b6723582d8a6e08fba6118ab0c64dcf0927
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 43a950b89ba79e7bc09767ab034854f78cdfcefee1f412285893a301451bde912b6bed36823c58d5e7a6ad8985360121153e80243e2a066f19d0339d1c3741b4
|
7
|
+
data.tar.gz: 415ae25be39b817eaf73cc8117c170bee4eb76fe13c1aafaa0b84d14a3e06d3d88f9a7fb77b29b6d4cb07796572f2729251210b889e2d08c1bcb457f76178893
|
data/CHANGELOG.md
CHANGED
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.91.0
|
@@ -442,7 +442,8 @@ module Aws::SecretsManager
|
|
442
442
|
#
|
443
443
|
# If there are more results available, in the response, Secrets Manager
|
444
444
|
# includes `NextToken`. To get the next results, call
|
445
|
-
# `BatchGetSecretValue` again with the value from `NextToken`.
|
445
|
+
# `BatchGetSecretValue` again with the value from `NextToken`. To use
|
446
|
+
# this parameter, you must also use the `Filters` parameter.
|
446
447
|
#
|
447
448
|
# @option params [String] :next_token
|
448
449
|
# A token that indicates where the output should continue from, if a
|
@@ -1270,19 +1271,16 @@ module Aws::SecretsManager
|
|
1270
1271
|
# characters in passwords: `` !"#$%&'()*+,-./:;<=>?@[\\]^_`\{|\}~ ``
|
1271
1272
|
#
|
1272
1273
|
# Secrets Manager generates a CloudTrail log entry when you call this
|
1273
|
-
# action.
|
1274
|
-
# because it might be logged. For more information, see [Logging Secrets
|
1275
|
-
# Manager events with CloudTrail][1].
|
1274
|
+
# action.
|
1276
1275
|
#
|
1277
1276
|
# <b>Required permissions: </b> `secretsmanager:GetRandomPassword`. For
|
1278
|
-
# more information, see [ IAM policy actions for Secrets Manager][
|
1279
|
-
# [Authentication and access control in Secrets Manager][
|
1277
|
+
# more information, see [ IAM policy actions for Secrets Manager][1] and
|
1278
|
+
# [Authentication and access control in Secrets Manager][2].
|
1280
1279
|
#
|
1281
1280
|
#
|
1282
1281
|
#
|
1283
|
-
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
1284
|
-
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/
|
1285
|
-
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
1282
|
+
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
|
1283
|
+
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
|
1286
1284
|
#
|
1287
1285
|
# @option params [Integer] :password_length
|
1288
1286
|
# The length of the password. If you don't include this parameter, the
|
@@ -1701,9 +1699,9 @@ module Aws::SecretsManager
|
|
1701
1699
|
# Services account, not including secrets that are marked for deletion.
|
1702
1700
|
# To see secrets marked for deletion, use the Secrets Manager console.
|
1703
1701
|
#
|
1704
|
-
#
|
1705
|
-
# changes from the last five minutes.
|
1706
|
-
# a specific secret
|
1702
|
+
# All Secrets Manager operations are eventually consistent. ListSecrets
|
1703
|
+
# might not reflect changes from the last five minutes. You can get more
|
1704
|
+
# recent information for a specific secret by calling DescribeSecret.
|
1707
1705
|
#
|
1708
1706
|
# To list the versions of a secret, use ListSecretVersionIds.
|
1709
1707
|
#
|
@@ -1892,6 +1890,25 @@ module Aws::SecretsManager
|
|
1892
1890
|
# access to the secret, for example those that use a wildcard for the
|
1893
1891
|
# principal. By default, public policies aren't blocked.
|
1894
1892
|
#
|
1893
|
+
# Resource policy validation and the BlockPublicPolicy parameter help
|
1894
|
+
# protect your resources by preventing public access from being granted
|
1895
|
+
# through the resource policies that are directly attached to your
|
1896
|
+
# secrets. In addition to using these features, carefully inspect the
|
1897
|
+
# following policies to confirm that they do not grant public access:
|
1898
|
+
#
|
1899
|
+
# * Identity-based policies attached to associated Amazon Web Services
|
1900
|
+
# principals (for example, IAM roles)
|
1901
|
+
#
|
1902
|
+
# * Resource-based policies attached to associated Amazon Web Services
|
1903
|
+
# resources (for example, Key Management Service (KMS) keys)
|
1904
|
+
#
|
1905
|
+
# To review permissions to your secrets, see [Determine who has
|
1906
|
+
# permissions to your secrets][1].
|
1907
|
+
#
|
1908
|
+
#
|
1909
|
+
#
|
1910
|
+
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/determine-acccess_examine-iam-policies.html
|
1911
|
+
#
|
1895
1912
|
# @return [Types::PutResourcePolicyResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1896
1913
|
#
|
1897
1914
|
# * {Types::PutResourcePolicyResponse#arn #arn} => String
|
@@ -3245,7 +3262,7 @@ module Aws::SecretsManager
|
|
3245
3262
|
params: params,
|
3246
3263
|
config: config)
|
3247
3264
|
context[:gem_name] = 'aws-sdk-secretsmanager'
|
3248
|
-
context[:gem_version] = '1.
|
3265
|
+
context[:gem_version] = '1.91.0'
|
3249
3266
|
Seahorse::Client::Request.new(handlers, context)
|
3250
3267
|
end
|
3251
3268
|
|
@@ -54,7 +54,8 @@ module Aws::SecretsManager
|
|
54
54
|
#
|
55
55
|
# If there are more results available, in the response, Secrets
|
56
56
|
# Manager includes `NextToken`. To get the next results, call
|
57
|
-
# `BatchGetSecretValue` again with the value from `NextToken`.
|
57
|
+
# `BatchGetSecretValue` again with the value from `NextToken`. To use
|
58
|
+
# this parameter, you must also use the `Filters` parameter.
|
58
59
|
# @return [Integer]
|
59
60
|
#
|
60
61
|
# @!attribute [rw] next_token
|
@@ -574,7 +575,14 @@ module Aws::SecretsManager
|
|
574
575
|
# @!attribute [rw] next_rotation_date
|
575
576
|
# The next rotation is scheduled to occur on or before this date. If
|
576
577
|
# the secret isn't configured for rotation or rotation has been
|
577
|
-
# disabled, Secrets Manager returns null.
|
578
|
+
# disabled, Secrets Manager returns null. If rotation fails, Secrets
|
579
|
+
# Manager retries the entire rotation process multiple times. If
|
580
|
+
# rotation is unsuccessful, this date may be in the past.
|
581
|
+
#
|
582
|
+
# This date represents the latest date that rotation will occur, but
|
583
|
+
# it is not an approximate rotation date. In some cases, for example
|
584
|
+
# if you turn off automatic rotation and then turn it back on, the
|
585
|
+
# next rotation may occur much sooner than this date.
|
578
586
|
# @return [Time]
|
579
587
|
#
|
580
588
|
# @!attribute [rw] tags
|
@@ -1239,6 +1247,27 @@ module Aws::SecretsManager
|
|
1239
1247
|
# Specifies whether to block resource-based policies that allow broad
|
1240
1248
|
# access to the secret, for example those that use a wildcard for the
|
1241
1249
|
# principal. By default, public policies aren't blocked.
|
1250
|
+
#
|
1251
|
+
# Resource policy validation and the BlockPublicPolicy parameter help
|
1252
|
+
# protect your resources by preventing public access from being
|
1253
|
+
# granted through the resource policies that are directly attached to
|
1254
|
+
# your secrets. In addition to using these features, carefully inspect
|
1255
|
+
# the following policies to confirm that they do not grant public
|
1256
|
+
# access:
|
1257
|
+
#
|
1258
|
+
# * Identity-based policies attached to associated Amazon Web
|
1259
|
+
# Services
|
1260
|
+
# principals (for example, IAM roles)
|
1261
|
+
#
|
1262
|
+
# * Resource-based policies attached to associated Amazon Web Services
|
1263
|
+
# resources (for example, Key Management Service (KMS) keys)
|
1264
|
+
#
|
1265
|
+
# To review permissions to your secrets, see [Determine who has
|
1266
|
+
# permissions to your secrets][1].
|
1267
|
+
#
|
1268
|
+
#
|
1269
|
+
#
|
1270
|
+
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/determine-acccess_examine-iam-policies.html
|
1242
1271
|
# @return [Boolean]
|
1243
1272
|
#
|
1244
1273
|
# @see http://docs.aws.amazon.com/goto/WebAPI/secretsmanager-2017-10-17/PutResourcePolicyRequest AWS API Documentation
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-secretsmanager
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.91.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-
|
11
|
+
date: 2024-03-27 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|