aws-sdk-secretsmanager 1.90.0 → 1.91.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 17c1cc751557ac38b7bcb25edf7774d62491244607c803422a3a622877aba429
4
- data.tar.gz: e2bfd21bdfc5038b3e2b9c36772127ed82576f274eef9a105403eb5f75e62140
3
+ metadata.gz: c9ccfc0333feb677c8a83a4ca7f62509f73c49e5917dd8bfb5135ed6405a6442
4
+ data.tar.gz: 98e8b6facb734bc90b52f19646848b6723582d8a6e08fba6118ab0c64dcf0927
5
5
  SHA512:
6
- metadata.gz: ad251a70575b3b2547db4f485fd5e214eb8e3a36b05fef8bbd59864bed6665eb38c4b880c42cf41dd5cade6b72a5534bca5346d62113d81fb3f6900347922fb2
7
- data.tar.gz: 3c814692e69783f50192d409094ec3b758a975c3ac24557ad3fdfb927ed5231a10c7d5873f60a76d39d9b79db0c80fb785c89f6684ddd62260d19766771d439a
6
+ metadata.gz: 43a950b89ba79e7bc09767ab034854f78cdfcefee1f412285893a301451bde912b6bed36823c58d5e7a6ad8985360121153e80243e2a066f19d0339d1c3741b4
7
+ data.tar.gz: 415ae25be39b817eaf73cc8117c170bee4eb76fe13c1aafaa0b84d14a3e06d3d88f9a7fb77b29b6d4cb07796572f2729251210b889e2d08c1bcb457f76178893
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.91.0 (2024-03-27)
5
+ ------------------
6
+
7
+ * Feature - Documentation updates for Secrets Manager
8
+
4
9
  1.90.0 (2024-01-26)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.90.0
1
+ 1.91.0
@@ -442,7 +442,8 @@ module Aws::SecretsManager
442
442
  #
443
443
  # If there are more results available, in the response, Secrets Manager
444
444
  # includes `NextToken`. To get the next results, call
445
- # `BatchGetSecretValue` again with the value from `NextToken`.
445
+ # `BatchGetSecretValue` again with the value from `NextToken`. To use
446
+ # this parameter, you must also use the `Filters` parameter.
446
447
  #
447
448
  # @option params [String] :next_token
448
449
  # A token that indicates where the output should continue from, if a
@@ -1270,19 +1271,16 @@ module Aws::SecretsManager
1270
1271
  # characters in passwords: `` !"#$%&'()*+,-./:;<=>?@[\\]^_`\{|\}~ ``
1271
1272
  #
1272
1273
  # Secrets Manager generates a CloudTrail log entry when you call this
1273
- # action. Do not include sensitive information in request parameters
1274
- # because it might be logged. For more information, see [Logging Secrets
1275
- # Manager events with CloudTrail][1].
1274
+ # action.
1276
1275
  #
1277
1276
  # <b>Required permissions: </b> `secretsmanager:GetRandomPassword`. For
1278
- # more information, see [ IAM policy actions for Secrets Manager][2] and
1279
- # [Authentication and access control in Secrets Manager][3].
1277
+ # more information, see [ IAM policy actions for Secrets Manager][1] and
1278
+ # [Authentication and access control in Secrets Manager][2].
1280
1279
  #
1281
1280
  #
1282
1281
  #
1283
- # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
1284
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1285
- # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1282
+ # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1283
+ # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1286
1284
  #
1287
1285
  # @option params [Integer] :password_length
1288
1286
  # The length of the password. If you don't include this parameter, the
@@ -1701,9 +1699,9 @@ module Aws::SecretsManager
1701
1699
  # Services account, not including secrets that are marked for deletion.
1702
1700
  # To see secrets marked for deletion, use the Secrets Manager console.
1703
1701
  #
1704
- # ListSecrets is eventually consistent, however it might not reflect
1705
- # changes from the last five minutes. To get the latest information for
1706
- # a specific secret, use DescribeSecret.
1702
+ # All Secrets Manager operations are eventually consistent. ListSecrets
1703
+ # might not reflect changes from the last five minutes. You can get more
1704
+ # recent information for a specific secret by calling DescribeSecret.
1707
1705
  #
1708
1706
  # To list the versions of a secret, use ListSecretVersionIds.
1709
1707
  #
@@ -1892,6 +1890,25 @@ module Aws::SecretsManager
1892
1890
  # access to the secret, for example those that use a wildcard for the
1893
1891
  # principal. By default, public policies aren't blocked.
1894
1892
  #
1893
+ # Resource policy validation and the BlockPublicPolicy parameter help
1894
+ # protect your resources by preventing public access from being granted
1895
+ # through the resource policies that are directly attached to your
1896
+ # secrets. In addition to using these features, carefully inspect the
1897
+ # following policies to confirm that they do not grant public access:
1898
+ #
1899
+ # * Identity-based policies attached to associated Amazon Web Services
1900
+ # principals (for example, IAM roles)
1901
+ #
1902
+ # * Resource-based policies attached to associated Amazon Web Services
1903
+ # resources (for example, Key Management Service (KMS) keys)
1904
+ #
1905
+ # To review permissions to your secrets, see [Determine who has
1906
+ # permissions to your secrets][1].
1907
+ #
1908
+ #
1909
+ #
1910
+ # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/determine-acccess_examine-iam-policies.html
1911
+ #
1895
1912
  # @return [Types::PutResourcePolicyResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1896
1913
  #
1897
1914
  # * {Types::PutResourcePolicyResponse#arn #arn} => String
@@ -3245,7 +3262,7 @@ module Aws::SecretsManager
3245
3262
  params: params,
3246
3263
  config: config)
3247
3264
  context[:gem_name] = 'aws-sdk-secretsmanager'
3248
- context[:gem_version] = '1.90.0'
3265
+ context[:gem_version] = '1.91.0'
3249
3266
  Seahorse::Client::Request.new(handlers, context)
3250
3267
  end
3251
3268
 
@@ -54,7 +54,8 @@ module Aws::SecretsManager
54
54
  #
55
55
  # If there are more results available, in the response, Secrets
56
56
  # Manager includes `NextToken`. To get the next results, call
57
- # `BatchGetSecretValue` again with the value from `NextToken`.
57
+ # `BatchGetSecretValue` again with the value from `NextToken`. To use
58
+ # this parameter, you must also use the `Filters` parameter.
58
59
  # @return [Integer]
59
60
  #
60
61
  # @!attribute [rw] next_token
@@ -574,7 +575,14 @@ module Aws::SecretsManager
574
575
  # @!attribute [rw] next_rotation_date
575
576
  # The next rotation is scheduled to occur on or before this date. If
576
577
  # the secret isn't configured for rotation or rotation has been
577
- # disabled, Secrets Manager returns null.
578
+ # disabled, Secrets Manager returns null. If rotation fails, Secrets
579
+ # Manager retries the entire rotation process multiple times. If
580
+ # rotation is unsuccessful, this date may be in the past.
581
+ #
582
+ # This date represents the latest date that rotation will occur, but
583
+ # it is not an approximate rotation date. In some cases, for example
584
+ # if you turn off automatic rotation and then turn it back on, the
585
+ # next rotation may occur much sooner than this date.
578
586
  # @return [Time]
579
587
  #
580
588
  # @!attribute [rw] tags
@@ -1239,6 +1247,27 @@ module Aws::SecretsManager
1239
1247
  # Specifies whether to block resource-based policies that allow broad
1240
1248
  # access to the secret, for example those that use a wildcard for the
1241
1249
  # principal. By default, public policies aren't blocked.
1250
+ #
1251
+ # Resource policy validation and the BlockPublicPolicy parameter help
1252
+ # protect your resources by preventing public access from being
1253
+ # granted through the resource policies that are directly attached to
1254
+ # your secrets. In addition to using these features, carefully inspect
1255
+ # the following policies to confirm that they do not grant public
1256
+ # access:
1257
+ #
1258
+ # * Identity-based policies attached to associated Amazon Web
1259
+ # Services
1260
+ # principals (for example, IAM roles)
1261
+ #
1262
+ # * Resource-based policies attached to associated Amazon Web Services
1263
+ # resources (for example, Key Management Service (KMS) keys)
1264
+ #
1265
+ # To review permissions to your secrets, see [Determine who has
1266
+ # permissions to your secrets][1].
1267
+ #
1268
+ #
1269
+ #
1270
+ # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/determine-acccess_examine-iam-policies.html
1242
1271
  # @return [Boolean]
1243
1272
  #
1244
1273
  # @see http://docs.aws.amazon.com/goto/WebAPI/secretsmanager-2017-10-17/PutResourcePolicyRequest AWS API Documentation
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-secretsmanager/customizations'
52
52
  # @!group service
53
53
  module Aws::SecretsManager
54
54
 
55
- GEM_VERSION = '1.90.0'
55
+ GEM_VERSION = '1.91.0'
56
56
 
57
57
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-secretsmanager
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.90.0
4
+ version: 1.91.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-01-26 00:00:00.000000000 Z
11
+ date: 2024-03-27 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core