aws-sdk-secretsmanager 1.10.0 → 1.11.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 56df7596f171de9be5328c26a0317eaf9976801c
4
- data.tar.gz: 7e5a87c3519a5b9f3527cf773dc0722d0399ae97
3
+ metadata.gz: 8e190789f96d22fa81c71669cfd8ec7c404cdd95
4
+ data.tar.gz: ea781d00cc5fce6a6e82fc4c00cd6cf1f5c3f21a
5
5
  SHA512:
6
- metadata.gz: 92d17dd26a365cb854f44eae0fcac3138fccb2de31e7048cb86bbdc3a9fae907675bdb5bf17ee9db7e4b960a441ed88126929402afd569e84fb29c4d4d1df620
7
- data.tar.gz: f28dbee1cd9b9e6c80a9c451d0d027aff5823da9cea63fe9aa177aefceabffb01a80ff010f348a8b4902771c5fc267808b49a650c230f8b26ebf3885508322ba
6
+ metadata.gz: '09cae827bd2bb324f21b72d4b59afe7b5412d52812c44c11047f70fb0b04de51ba7036a531531fc595168d4fff32228ca35bd5c0a07a58fe8330ed61735e5eea'
7
+ data.tar.gz: 713e1f3549fd1ae5af8ee263d3c134426411ee535bc8401645d05b2fd744280ec43e366869e72851bb0c51587772ae5df42291a701e800b710b1d900c9e5c005
@@ -42,6 +42,6 @@ require_relative 'aws-sdk-secretsmanager/customizations'
42
42
  # @service
43
43
  module Aws::SecretsManager
44
44
 
45
- GEM_VERSION = '1.10.0'
45
+ GEM_VERSION = '1.11.0'
46
46
 
47
47
  end
@@ -690,6 +690,24 @@ module Aws::SecretsManager
690
690
  #
691
691
  # This value can range from 7 to 30 days. The default value is 30.
692
692
  #
693
+ # @option params [Boolean] :force_delete_without_recovery
694
+ # (Optional) Specifies that the secret is to be deleted immediately
695
+ # without any recovery window. You cannot use both this parameter and
696
+ # the `RecoveryWindowInDays` parameter in the same API call.
697
+ #
698
+ # An asynchronous background process performs the actual deletion, so
699
+ # there can be a short delay before the operation completes. If you
700
+ # write code to delete and then immediately recreate a secret with the
701
+ # same name, ensure that your code includes appropriate back off and
702
+ # retry logic.
703
+ #
704
+ # Use this parameter with caution. This parameter causes the operation
705
+ # to skip the normal waiting period before the permanent deletion that
706
+ # AWS would normally impose with the `RecoveryWindowInDays` parameter.
707
+ # If you delete a secret with the `ForceDeleteWithouRecovery` parameter,
708
+ # then you have no opportunity to recover the secret. It is permanently
709
+ # lost.
710
+ #
693
711
  # @return [Types::DeleteSecretResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
694
712
  #
695
713
  # * {Types::DeleteSecretResponse#arn #arn} => String
@@ -720,6 +738,7 @@ module Aws::SecretsManager
720
738
  # resp = client.delete_secret({
721
739
  # secret_id: "SecretIdType", # required
722
740
  # recovery_window_in_days: 1,
741
+ # force_delete_without_recovery: false,
723
742
  # })
724
743
  #
725
744
  # @example Response structure
@@ -2125,9 +2144,9 @@ module Aws::SecretsManager
2125
2144
  req.send_request(options)
2126
2145
  end
2127
2146
 
2128
- # Modifies many of the details of a secret. If you include a
2129
- # `ClientRequestToken` and either `SecretString` or `SecretBinary` then
2130
- # it also creates a new version attached to the secret.
2147
+ # Modifies many of the details of the specified secret. If you include a
2148
+ # `ClientRequestToken` and *either* `SecretString` or `SecretBinary`
2149
+ # then it also creates a new version attached to the secret.
2131
2150
  #
2132
2151
  # To modify the rotation configuration of a secret, use RotateSecret
2133
2152
  # instead.
@@ -2140,9 +2159,9 @@ module Aws::SecretsManager
2140
2159
  # </note>
2141
2160
  #
2142
2161
  # * If a version with a `SecretVersionId` with the same value as the
2143
- # `ClientRequestToken` parameter already exists, the operation
2144
- # generates an error. You cannot modify an existing version, you can
2145
- # only create new ones.
2162
+ # `ClientRequestToken` parameter already exists, the operation results
2163
+ # in an error. You cannot modify an existing version, you can only
2164
+ # create a new version.
2146
2165
  #
2147
2166
  # * If you include `SecretString` or `SecretBinary` to create a new
2148
2167
  # secret version, Secrets Manager automatically attaches the staging
@@ -2200,7 +2219,7 @@ module Aws::SecretsManager
2200
2219
  # ListSecretVersionIds.
2201
2220
  #
2202
2221
  # @option params [required, String] :secret_id
2203
- # Specifies the secret that you want to update or to which you want to
2222
+ # Specifies the secret that you want to modify or to which you want to
2204
2223
  # add a new version. You can specify either the Amazon Resource Name
2205
2224
  # (ARN) or the friendly name of the secret.
2206
2225
  #
@@ -2249,28 +2268,24 @@ module Aws::SecretsManager
2249
2268
  # [1]: https://wikipedia.org/wiki/Universally_unique_identifier
2250
2269
  #
2251
2270
  # @option params [String] :description
2252
- # (Optional) Specifies a user-provided description of the secret.
2271
+ # (Optional) Specifies an updated user-provided description of the
2272
+ # secret.
2253
2273
  #
2254
2274
  # @option params [String] :kms_key_id
2255
- # (Optional) Specifies the ARN or alias of the AWS KMS customer master
2256
- # key (CMK) to be used to encrypt the protected text in the versions of
2257
- # this secret.
2258
- #
2259
- # If you don't specify this value, then Secrets Manager defaults to
2260
- # using the default CMK in the account (the one named
2261
- # `aws/secretsmanager`). If a AWS KMS CMK with that name doesn't exist,
2262
- # then Secrets Manager creates it for you automatically the first time
2263
- # it needs to encrypt a version's `Plaintext` or `PlaintextString`
2264
- # fields.
2275
+ # (Optional) Specifies an updated ARN or alias of the AWS KMS customer
2276
+ # master key (CMK) to be used to encrypt the protected text in new
2277
+ # versions of this secret.
2265
2278
  #
2266
2279
  # You can only use the account's default CMK to encrypt and decrypt if
2267
2280
  # you call this operation using credentials from the same account that
2268
2281
  # owns the secret. If the secret is in a different account, then you
2269
- # must create a custom CMK and provide the ARN in this field.
2282
+ # must create a custom CMK and provide the ARN of that CMK in this
2283
+ # field. The user making the call must have permissions to both the
2284
+ # secret and the CMK in their respective accounts.
2270
2285
  #
2271
2286
  # @option params [String, IO] :secret_binary
2272
- # (Optional) Specifies binary data that you want to encrypt and store in
2273
- # the new version of the secret. To use this parameter in the
2287
+ # (Optional) Specifies updated binary data that you want to encrypt and
2288
+ # store in the new version of the secret. To use this parameter in the
2274
2289
  # command-line tools, we recommend that you store your binary data in a
2275
2290
  # file and then use the appropriate technique for your tool to pass the
2276
2291
  # contents of the file as a parameter. Either `SecretBinary` or
@@ -2280,8 +2295,8 @@ module Aws::SecretsManager
2280
2295
  # This parameter is not accessible using the Secrets Manager console.
2281
2296
  #
2282
2297
  # @option params [String] :secret_string
2283
- # (Optional) Specifies text data that you want to encrypt and store in
2284
- # this new version of the secret. Either `SecretBinary` or
2298
+ # (Optional) Specifies updated text data that you want to encrypt and
2299
+ # store in this new version of the secret. Either `SecretBinary` or
2285
2300
  # `SecretString` must have a value, but not both. They cannot both be
2286
2301
  # empty.
2287
2302
  #
@@ -2301,7 +2316,12 @@ module Aws::SecretsManager
2301
2316
  #
2302
2317
  # If your command-line tool or SDK requires quotation marks around the
2303
2318
  # parameter, you should use single quotes to avoid confusion with the
2304
- # double quotes required in the JSON text.
2319
+ # double quotes required in the JSON text. You can also 'escape' the
2320
+ # double quote character in the embedded JSON text by prefacing each
2321
+ # with a backslash. For example, the following string is surrounded by
2322
+ # double-quotes. All of the embedded double quotes are escaped:
2323
+ #
2324
+ # `"[\{"username":"bob"\},\{"password":"abc123xyz456"\}]"`
2305
2325
  #
2306
2326
  #
2307
2327
  #
@@ -2461,8 +2481,8 @@ module Aws::SecretsManager
2461
2481
  # labels to.
2462
2482
  #
2463
2483
  # If any of the staging labels are already attached to a different
2464
- # version of the secret, then they are removed from that version before
2465
- # adding them to this version.
2484
+ # version of the secret, then they are automatically removed from that
2485
+ # version before adding them to this version.
2466
2486
  #
2467
2487
  # @return [Types::UpdateSecretVersionStageResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
2468
2488
  #
@@ -2560,7 +2580,7 @@ module Aws::SecretsManager
2560
2580
  params: params,
2561
2581
  config: config)
2562
2582
  context[:gem_name] = 'aws-sdk-secretsmanager'
2563
- context[:gem_version] = '1.10.0'
2583
+ context[:gem_version] = '1.11.0'
2564
2584
  Seahorse::Client::Request.new(handlers, context)
2565
2585
  end
2566
2586
 
@@ -135,6 +135,7 @@ module Aws::SecretsManager
135
135
 
136
136
  DeleteSecretRequest.add_member(:secret_id, Shapes::ShapeRef.new(shape: SecretIdType, required: true, location_name: "SecretId"))
137
137
  DeleteSecretRequest.add_member(:recovery_window_in_days, Shapes::ShapeRef.new(shape: RecoveryWindowInDaysType, location_name: "RecoveryWindowInDays", metadata: {"box"=>true}))
138
+ DeleteSecretRequest.add_member(:force_delete_without_recovery, Shapes::ShapeRef.new(shape: BooleanType, location_name: "ForceDeleteWithoutRecovery", metadata: {"box"=>true}))
138
139
  DeleteSecretRequest.struct_class = Types::DeleteSecretRequest
139
140
 
140
141
  DeleteSecretResponse.add_member(:arn, Shapes::ShapeRef.new(shape: SecretARNType, location_name: "ARN"))
@@ -335,6 +335,7 @@ module Aws::SecretsManager
335
335
  # {
336
336
  # secret_id: "SecretIdType", # required
337
337
  # recovery_window_in_days: 1,
338
+ # force_delete_without_recovery: false,
338
339
  # }
339
340
  #
340
341
  # @!attribute [rw] secret_id
@@ -349,11 +350,31 @@ module Aws::SecretsManager
349
350
  # This value can range from 7 to 30 days. The default value is 30.
350
351
  # @return [Integer]
351
352
  #
353
+ # @!attribute [rw] force_delete_without_recovery
354
+ # (Optional) Specifies that the secret is to be deleted immediately
355
+ # without any recovery window. You cannot use both this parameter and
356
+ # the `RecoveryWindowInDays` parameter in the same API call.
357
+ #
358
+ # An asynchronous background process performs the actual deletion, so
359
+ # there can be a short delay before the operation completes. If you
360
+ # write code to delete and then immediately recreate a secret with the
361
+ # same name, ensure that your code includes appropriate back off and
362
+ # retry logic.
363
+ #
364
+ # Use this parameter with caution. This parameter causes the operation
365
+ # to skip the normal waiting period before the permanent deletion that
366
+ # AWS would normally impose with the `RecoveryWindowInDays` parameter.
367
+ # If you delete a secret with the `ForceDeleteWithouRecovery`
368
+ # parameter, then you have no opportunity to recover the secret. It is
369
+ # permanently lost.
370
+ # @return [Boolean]
371
+ #
352
372
  # @see http://docs.aws.amazon.com/goto/WebAPI/secretsmanager-2017-10-17/DeleteSecretRequest AWS API Documentation
353
373
  #
354
374
  class DeleteSecretRequest < Struct.new(
355
375
  :secret_id,
356
- :recovery_window_in_days)
376
+ :recovery_window_in_days,
377
+ :force_delete_without_recovery)
357
378
  include Aws::Structure
358
379
  end
359
380
 
@@ -1555,7 +1576,7 @@ module Aws::SecretsManager
1555
1576
  # }
1556
1577
  #
1557
1578
  # @!attribute [rw] secret_id
1558
- # Specifies the secret that you want to update or to which you want to
1579
+ # Specifies the secret that you want to modify or to which you want to
1559
1580
  # add a new version. You can specify either the Amazon Resource Name
1560
1581
  # (ARN) or the friendly name of the secret.
1561
1582
  # @return [String]
@@ -1606,42 +1627,38 @@ module Aws::SecretsManager
1606
1627
  # @return [String]
1607
1628
  #
1608
1629
  # @!attribute [rw] description
1609
- # (Optional) Specifies a user-provided description of the secret.
1630
+ # (Optional) Specifies an updated user-provided description of the
1631
+ # secret.
1610
1632
  # @return [String]
1611
1633
  #
1612
1634
  # @!attribute [rw] kms_key_id
1613
- # (Optional) Specifies the ARN or alias of the AWS KMS customer master
1614
- # key (CMK) to be used to encrypt the protected text in the versions
1615
- # of this secret.
1616
- #
1617
- # If you don't specify this value, then Secrets Manager defaults to
1618
- # using the default CMK in the account (the one named
1619
- # `aws/secretsmanager`). If a AWS KMS CMK with that name doesn't
1620
- # exist, then Secrets Manager creates it for you automatically the
1621
- # first time it needs to encrypt a version's `Plaintext` or
1622
- # `PlaintextString` fields.
1635
+ # (Optional) Specifies an updated ARN or alias of the AWS KMS customer
1636
+ # master key (CMK) to be used to encrypt the protected text in new
1637
+ # versions of this secret.
1623
1638
  #
1624
1639
  # You can only use the account's default CMK to encrypt and decrypt
1625
1640
  # if you call this operation using credentials from the same account
1626
1641
  # that owns the secret. If the secret is in a different account, then
1627
- # you must create a custom CMK and provide the ARN in this field.
1642
+ # you must create a custom CMK and provide the ARN of that CMK in this
1643
+ # field. The user making the call must have permissions to both the
1644
+ # secret and the CMK in their respective accounts.
1628
1645
  # @return [String]
1629
1646
  #
1630
1647
  # @!attribute [rw] secret_binary
1631
- # (Optional) Specifies binary data that you want to encrypt and store
1632
- # in the new version of the secret. To use this parameter in the
1633
- # command-line tools, we recommend that you store your binary data in
1634
- # a file and then use the appropriate technique for your tool to pass
1635
- # the contents of the file as a parameter. Either `SecretBinary` or
1636
- # `SecretString` must have a value, but not both. They cannot both be
1637
- # empty.
1648
+ # (Optional) Specifies updated binary data that you want to encrypt
1649
+ # and store in the new version of the secret. To use this parameter in
1650
+ # the command-line tools, we recommend that you store your binary data
1651
+ # in a file and then use the appropriate technique for your tool to
1652
+ # pass the contents of the file as a parameter. Either `SecretBinary`
1653
+ # or `SecretString` must have a value, but not both. They cannot both
1654
+ # be empty.
1638
1655
  #
1639
1656
  # This parameter is not accessible using the Secrets Manager console.
1640
1657
  # @return [String]
1641
1658
  #
1642
1659
  # @!attribute [rw] secret_string
1643
- # (Optional) Specifies text data that you want to encrypt and store in
1644
- # this new version of the secret. Either `SecretBinary` or
1660
+ # (Optional) Specifies updated text data that you want to encrypt and
1661
+ # store in this new version of the secret. Either `SecretBinary` or
1645
1662
  # `SecretString` must have a value, but not both. They cannot both be
1646
1663
  # empty.
1647
1664
  #
@@ -1661,7 +1678,12 @@ module Aws::SecretsManager
1661
1678
  #
1662
1679
  # If your command-line tool or SDK requires quotation marks around the
1663
1680
  # parameter, you should use single quotes to avoid confusion with the
1664
- # double quotes required in the JSON text.
1681
+ # double quotes required in the JSON text. You can also 'escape' the
1682
+ # double quote character in the embedded JSON text by prefacing each
1683
+ # with a backslash. For example, the following string is surrounded by
1684
+ # double-quotes. All of the embedded double quotes are escaped:
1685
+ #
1686
+ # `"[\{"username":"bob"\},\{"password":"abc123xyz456"\}]"`
1665
1687
  #
1666
1688
  #
1667
1689
  #
@@ -1681,7 +1703,7 @@ module Aws::SecretsManager
1681
1703
  end
1682
1704
 
1683
1705
  # @!attribute [rw] arn
1684
- # The ARN of this secret.
1706
+ # The ARN of the secret that was updated.
1685
1707
  #
1686
1708
  # <note markdown="1"> Secrets Manager automatically adds several random characters to the
1687
1709
  # name at the end of the ARN when you initially create a secret. This
@@ -1695,12 +1717,12 @@ module Aws::SecretsManager
1695
1717
  # @return [String]
1696
1718
  #
1697
1719
  # @!attribute [rw] name
1698
- # The friendly name of this secret.
1720
+ # The friendly name of the secret that was updated.
1699
1721
  # @return [String]
1700
1722
  #
1701
1723
  # @!attribute [rw] version_id
1702
- # If a version of the secret was created or updated by this operation,
1703
- # then its unique identifier is returned.
1724
+ # If a new version of the secret was created by this operation, then
1725
+ # `VersionId` contains the unique identifier of the new version.
1704
1726
  # @return [String]
1705
1727
  #
1706
1728
  # @see http://docs.aws.amazon.com/goto/WebAPI/secretsmanager-2017-10-17/UpdateSecretResponse AWS API Documentation
@@ -1751,8 +1773,8 @@ module Aws::SecretsManager
1751
1773
  # labels to.
1752
1774
  #
1753
1775
  # If any of the staging labels are already attached to a different
1754
- # version of the secret, then they are removed from that version
1755
- # before adding them to this version.
1776
+ # version of the secret, then they are automatically removed from that
1777
+ # version before adding them to this version.
1756
1778
  # @return [String]
1757
1779
  #
1758
1780
  # @see http://docs.aws.amazon.com/goto/WebAPI/secretsmanager-2017-10-17/UpdateSecretVersionStageRequest AWS API Documentation
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-secretsmanager
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.10.0
4
+ version: 1.11.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2018-06-29 00:00:00.000000000 Z
11
+ date: 2018-08-08 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core