aws-sdk-secretsmanager 1.80.0 → 1.81.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: c42f27b4657d57bbf577dae00732dd06b7cba796c0639feee655bd11de7a3aea
4
- data.tar.gz: c28a1edc5d2b048bc078903eb4eb5701bee60e3ad7cdba3ac4e57196296e3fe5
3
+ metadata.gz: e59a6b33a6c17f0a2dc23311bef30f6ed2092732a4c870cab2cd056f83a8aab2
4
+ data.tar.gz: 2611bd919d4d288fee0fe7ab8a20a51aba5eaab4b3a7577ecbee650aea0dde69
5
5
  SHA512:
6
- metadata.gz: a47f0f55362464adbbd1247baa668a5ac565a01a9079680c754ccac3ada4786de89aa4a7e378e8666a18b61eb5d7406cab43c2ad02442e8f0db46445c49d6c82
7
- data.tar.gz: a82014af02712bac9b197980f5f4298f2547e9816048e56b50618686289ed45c0c4c6393a612fa1cd4585da93fee50f021fe892fba3c496e2aa3dd83422eb4f5
6
+ metadata.gz: 6ff4ae1cf3a2f34959beae04741dac6bfa1e13aba10e78cec0ae8c88886de8a685b3eedfcdc4e2e343112805cdba76918d6ac8e781062b402d7245c4757dc9ca
7
+ data.tar.gz: 26f4cfe6a06783c0de02ea8aac85031e97bf5c358be95663bf524911cab44a6387d1e84e48cb1a83187b39e0fbeda043324f09d50a1ae688c65b421e5f4d5dc5
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.81.0 (2023-07-13)
5
+ ------------------
6
+
7
+ * Feature - Documentation updates for Secrets Manager
8
+
4
9
  1.80.0 (2023-07-11)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.80.0
1
+ 1.81.0
@@ -827,7 +827,7 @@ module Aws::SecretsManager
827
827
  #
828
828
  # resp.to_h outputs the following:
829
829
  # {
830
- # arn: "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseMasterSecret-a1b2c3",
830
+ # arn: "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
831
831
  # name: "MyTestDatabaseSecret",
832
832
  # }
833
833
  #
@@ -2668,9 +2668,12 @@ module Aws::SecretsManager
2668
2668
  # <b>Required permissions: </b> `secretsmanager:UpdateSecret`. For more
2669
2669
  # information, see [ IAM policy actions for Secrets Manager][3] and
2670
2670
  # [Authentication and access control in Secrets Manager][4]. If you use
2671
- # a customer managed key, you must also have `kms:GenerateDataKey` and
2672
- # `kms:Decrypt` permissions on the key. For more information, see [
2673
- # Secret encryption and decryption][5].
2671
+ # a customer managed key, you must also have `kms:GenerateDataKey`,
2672
+ # `kms:Encrypt`, and `kms:Decrypt` permissions on the key. If you change
2673
+ # the KMS key and you don't have `kms:Encrypt` permission to the new
2674
+ # key, Secrets Manager does not re-ecrypt existing secret versions with
2675
+ # the new key. For more information, see [ Secret encryption and
2676
+ # decryption][5].
2674
2677
  #
2675
2678
  #
2676
2679
  #
@@ -2717,7 +2720,9 @@ module Aws::SecretsManager
2717
2720
  # @option params [String] :kms_key_id
2718
2721
  # The ARN, key ID, or alias of the KMS key that Secrets Manager uses to
2719
2722
  # encrypt new secret versions as well as any existing versions with the
2720
- # staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. For more
2723
+ # staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. If you
2724
+ # don't have `kms:Encrypt` permission to the new key, Secrets Manager
2725
+ # does not re-ecrypt existing secret versions with the new key. For more
2721
2726
  # information about versions and staging labels, see [Concepts:
2722
2727
  # Version][1].
2723
2728
  #
@@ -3103,7 +3108,7 @@ module Aws::SecretsManager
3103
3108
  params: params,
3104
3109
  config: config)
3105
3110
  context[:gem_name] = 'aws-sdk-secretsmanager'
3106
- context[:gem_version] = '1.80.0'
3111
+ context[:gem_version] = '1.81.0'
3107
3112
  Seahorse::Client::Request.new(handlers, context)
3108
3113
  end
3109
3114
 
@@ -2052,9 +2052,11 @@ module Aws::SecretsManager
2052
2052
  # @!attribute [rw] kms_key_id
2053
2053
  # The ARN, key ID, or alias of the KMS key that Secrets Manager uses
2054
2054
  # to encrypt new secret versions as well as any existing versions with
2055
- # the staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. For
2056
- # more information about versions and staging labels, see [Concepts:
2057
- # Version][1].
2055
+ # the staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. If
2056
+ # you don't have `kms:Encrypt` permission to the new key, Secrets
2057
+ # Manager does not re-ecrypt existing secret versions with the new
2058
+ # key. For more information about versions and staging labels, see
2059
+ # [Concepts: Version][1].
2058
2060
  #
2059
2061
  # A key alias is always prefixed by `alias/`, for example
2060
2062
  # `alias/aws/secretsmanager`. For more information, see [About
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-secretsmanager/customizations'
52
52
  # @!group service
53
53
  module Aws::SecretsManager
54
54
 
55
- GEM_VERSION = '1.80.0'
55
+ GEM_VERSION = '1.81.0'
56
56
 
57
57
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-secretsmanager
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.80.0
4
+ version: 1.81.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-07-11 00:00:00.000000000 Z
11
+ date: 2023-07-13 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core