aws-sdk-secretsmanager 1.60.0 → 1.61.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 8df4daf2d651916a1c2064939bcf1dc18cc30ef5ceef9fdda071f67f3d365632
4
- data.tar.gz: 8913f355a291887628e8f3537e3f700dab0fd90c0cc5430c216d0310e7005421
3
+ metadata.gz: 832ad9eeab3ae719d2d6c26151ec9aaab148192d6b42be17490c00193d3b928c
4
+ data.tar.gz: ed9c5788cb61c16cd77a7e64384d5e37a5af226b4be7f068e0846324a84459d0
5
5
  SHA512:
6
- metadata.gz: 8068795275cfe892637f5e9635f01566a237fdca18b9388cd3372609d24fe011e011c8a2e59d4c75b0aac0c08078be335028539d6b363e09d0fd3a079fca116d
7
- data.tar.gz: c68a142de2be5b6d86b0205d663a4fb289e94d8e6bef6f0d30a0744a7f0815339637662c4ed482ff29ee151ae6c6ef530f7bf9c998bbd2b51d1443e4286a6de3
6
+ metadata.gz: f453772e841f802a633a803ae51207e58382dc4a02c874939bf6042fbd37c956c25d841774459bdc427bc6d017a811b4d9fd9617551e1271e57bb9ad27fb89f3
7
+ data.tar.gz: 43a2d852ca685d9fa80b454620d1b2a448605400891915b78d4214f06a501e35cf8e58be55c5d56d5b84e9d25245432bc25456036e3b07276452e1121996eb78
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.61.0 (2022-05-11)
5
+ ------------------
6
+
7
+ * Feature - Doc only update for Secrets Manager that fixes several customer-reported issues.
8
+
4
9
  1.60.0 (2022-04-21)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.60.0
1
+ 1.61.0
@@ -364,26 +364,27 @@ module Aws::SecretsManager
364
364
  # Turns off automatic rotation, and if a rotation is currently in
365
365
  # progress, cancels the rotation.
366
366
  #
367
- # To turn on automatic rotation again, call RotateSecret.
368
- #
369
- # <note markdown="1"> If you cancel a rotation in progress, it can leave the `VersionStage`
370
- # labels in an unexpected state. Depending on the step of the rotation
371
- # in progress, you might need to remove the staging label `AWSPENDING`
372
- # from the partially created version, specified by the `VersionId`
373
- # response value. We recommend you also evaluate the partially rotated
374
- # new version to see if it should be deleted. You can delete a version
375
- # by removing all staging labels from it.
367
+ # If you cancel a rotation in progress, it can leave the `VersionStage`
368
+ # labels in an unexpected state. You might need to remove the staging
369
+ # label `AWSPENDING` from the partially created version. You also need
370
+ # to determine whether to roll back to the previous version of the
371
+ # secret by moving the staging label `AWSCURRENT` to the version that
372
+ # has `AWSPENDING`. To determine which version has a specific staging
373
+ # label, call ListSecretVersionIds. Then use UpdateSecretVersionStage to
374
+ # change staging labels. For more information, see [How rotation
375
+ # works][1].
376
376
  #
377
- # </note>
377
+ # To turn on automatic rotation again, call RotateSecret.
378
378
  #
379
379
  # <b>Required permissions: </b> `secretsmanager:CancelRotateSecret`. For
380
- # more information, see [ IAM policy actions for Secrets Manager][1] and
381
- # [Authentication and access control in Secrets Manager][2].
380
+ # more information, see [ IAM policy actions for Secrets Manager][2] and
381
+ # [Authentication and access control in Secrets Manager][3].
382
382
  #
383
383
  #
384
384
  #
385
- # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
386
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
385
+ # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/rotate-secrets_how.html
386
+ # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
387
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
387
388
  #
388
389
  # @option params [required, String] :secret_id
389
390
  # The ARN or name of the secret.
@@ -790,8 +791,20 @@ module Aws::SecretsManager
790
791
  # the end of the recovery window. At the end of the recovery window,
791
792
  # Secrets Manager deletes the secret permanently.
792
793
  #
793
- # For information about deleting a secret in the console, see
794
- # [https://docs.aws.amazon.com/secretsmanager/latest/userguide/manage\_delete-secret.html][1].
794
+ # You can't delete a primary secret that is replicated to other
795
+ # Regions. You must first delete the replicas using
796
+ # RemoveRegionsFromReplication, and then delete the primary secret. When
797
+ # you delete a replica, it is deleted immediately.
798
+ #
799
+ # You can't directly delete a version of a secret. Instead, you remove
800
+ # all staging labels from the version using UpdateSecretVersionStage.
801
+ # This marks the version as deprecated, and then Secrets Manager can
802
+ # automatically delete the version in the background.
803
+ #
804
+ # To determine whether an application still uses a secret, you can
805
+ # create an Amazon CloudWatch alarm to alert you to any attempts to
806
+ # access a secret during the recovery window. For more information, see
807
+ # [ Monitor secrets scheduled for deletion][1].
795
808
  #
796
809
  # Secrets Manager performs the permanent secret deletion at the end of
797
810
  # the waiting period as a background task with low priority. There is no
@@ -801,9 +814,9 @@ module Aws::SecretsManager
801
814
  # At any time before recovery window ends, you can use RestoreSecret to
802
815
  # remove the `DeletionDate` and cancel the deletion of the secret.
803
816
  #
804
- # In a secret scheduled for deletion, you cannot access the encrypted
805
- # secret value. To access that information, first cancel the deletion
806
- # with RestoreSecret and then retrieve the information.
817
+ # When a secret is scheduled for deletion, you cannot retrieve the
818
+ # secret value. You must first cancel the deletion with RestoreSecret
819
+ # and then you can retrieve the secret.
807
820
  #
808
821
  # <b>Required permissions: </b> `secretsmanager:DeleteSecret`. For more
809
822
  # information, see [ IAM policy actions for Secrets Manager][2] and
@@ -811,7 +824,7 @@ module Aws::SecretsManager
811
824
  #
812
825
  #
813
826
  #
814
- # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/manage_delete-secret.html
827
+ # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/monitoring_cloudwatch_deleted-secrets.html
815
828
  # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
816
829
  # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
817
830
  #
@@ -1310,21 +1323,21 @@ module Aws::SecretsManager
1310
1323
  req.send_request(options)
1311
1324
  end
1312
1325
 
1313
- # Lists the versions for a secret.
1326
+ # Lists the versions of a secret. Secrets Manager uses staging labels to
1327
+ # indicate the different versions of a secret. For more information, see
1328
+ # [ Secrets Manager concepts: Versions][1].
1314
1329
  #
1315
1330
  # To list the secrets in the account, use ListSecrets.
1316
1331
  #
1317
- # To get the secret value from `SecretString` or `SecretBinary`, call
1318
- # GetSecretValue.
1319
- #
1320
1332
  # <b>Required permissions: </b> `secretsmanager:ListSecretVersionIds`.
1321
- # For more information, see [ IAM policy actions for Secrets Manager][1]
1322
- # and [Authentication and access control in Secrets Manager][2].
1333
+ # For more information, see [ IAM policy actions for Secrets Manager][2]
1334
+ # and [Authentication and access control in Secrets Manager][3].
1323
1335
  #
1324
1336
  #
1325
1337
  #
1326
- # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1327
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1338
+ # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/getting-started.html#term_version
1339
+ # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1340
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1328
1341
  #
1329
1342
  # @option params [required, String] :secret_id
1330
1343
  # The ARN or name of the secret whose versions you want to list.
@@ -1440,8 +1453,8 @@ module Aws::SecretsManager
1440
1453
  # To get the secret value from `SecretString` or `SecretBinary`, call
1441
1454
  # GetSecretValue.
1442
1455
  #
1443
- # For information about finding secrets in the console, see [Enhanced
1444
- # search capabilities for secrets in Secrets Manager][1].
1456
+ # For information about finding secrets in the console, see [Find
1457
+ # secrets in Secrets Manager][1].
1445
1458
  #
1446
1459
  # <b>Required permissions: </b> `secretsmanager:ListSecrets`. For more
1447
1460
  # information, see [ IAM policy actions for Secrets Manager][2] and
@@ -2121,6 +2134,45 @@ module Aws::SecretsManager
2121
2134
  # * {Types::RotateSecretResponse#name #name} => String
2122
2135
  # * {Types::RotateSecretResponse#version_id #version_id} => String
2123
2136
  #
2137
+ #
2138
+ # @example Example: To configure rotation for a secret
2139
+ #
2140
+ # # The following example configures rotation for a secret using a cron expression. The first rotation happens immediately
2141
+ # # after the changes are stored in the secret. The rotation schedule is the first and 15th day of every month. The rotation
2142
+ # # window begins at 4:00 PM UTC and ends at 6:00 PM.
2143
+ #
2144
+ # resp = client.rotate_secret({
2145
+ # rotation_lambda_arn: "arn:aws:lambda:us-west-2:123456789012:function:MyTestDatabaseRotationLambda",
2146
+ # rotation_rules: {
2147
+ # duration: "2h",
2148
+ # schedule_expression: "cron(0 16 1,15 * ? *)",
2149
+ # },
2150
+ # secret_id: "MyTestDatabaseSecret",
2151
+ # })
2152
+ #
2153
+ # resp.to_h outputs the following:
2154
+ # {
2155
+ # arn: "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
2156
+ # name: "MyTestDatabaseSecret",
2157
+ # version_id: "EXAMPLE2-90ab-cdef-fedc-ba987SECRET2",
2158
+ # }
2159
+ #
2160
+ # @example Example: To request an immediate rotation for a secret
2161
+ #
2162
+ # # The following example requests an immediate invocation of the secret's Lambda rotation function. It assumes that the
2163
+ # # specified secret already has rotation configured. The rotation function runs asynchronously in the background.
2164
+ #
2165
+ # resp = client.rotate_secret({
2166
+ # secret_id: "MyTestDatabaseSecret",
2167
+ # })
2168
+ #
2169
+ # resp.to_h outputs the following:
2170
+ # {
2171
+ # arn: "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
2172
+ # name: "MyTestDatabaseSecret",
2173
+ # version_id: "EXAMPLE2-90ab-cdef-fedc-ba987SECRET2",
2174
+ # }
2175
+ #
2124
2176
  # @example Request syntax with placeholder values
2125
2177
  #
2126
2178
  # resp = client.rotate_secret({
@@ -2824,7 +2876,7 @@ module Aws::SecretsManager
2824
2876
  params: params,
2825
2877
  config: config)
2826
2878
  context[:gem_name] = 'aws-sdk-secretsmanager'
2827
- context[:gem_version] = '1.60.0'
2879
+ context[:gem_version] = '1.61.0'
2828
2880
  Seahorse::Client::Request.new(handlers, context)
2829
2881
  end
2830
2882
 
@@ -48,6 +48,6 @@ require_relative 'aws-sdk-secretsmanager/customizations'
48
48
  # @!group service
49
49
  module Aws::SecretsManager
50
50
 
51
- GEM_VERSION = '1.60.0'
51
+ GEM_VERSION = '1.61.0'
52
52
 
53
53
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-secretsmanager
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.60.0
4
+ version: 1.61.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-04-21 00:00:00.000000000 Z
11
+ date: 2022-05-11 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core