aws-sdk-secretsmanager 1.80.0 → 1.81.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-secretsmanager/client.rb +11 -6
- data/lib/aws-sdk-secretsmanager/types.rb +5 -3
- data/lib/aws-sdk-secretsmanager.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: e59a6b33a6c17f0a2dc23311bef30f6ed2092732a4c870cab2cd056f83a8aab2
|
|
4
|
+
data.tar.gz: 2611bd919d4d288fee0fe7ab8a20a51aba5eaab4b3a7577ecbee650aea0dde69
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 6ff4ae1cf3a2f34959beae04741dac6bfa1e13aba10e78cec0ae8c88886de8a685b3eedfcdc4e2e343112805cdba76918d6ac8e781062b402d7245c4757dc9ca
|
|
7
|
+
data.tar.gz: 26f4cfe6a06783c0de02ea8aac85031e97bf5c358be95663bf524911cab44a6387d1e84e48cb1a83187b39e0fbeda043324f09d50a1ae688c65b421e5f4d5dc5
|
data/CHANGELOG.md
CHANGED
data/VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.
|
|
1
|
+
1.81.0
|
|
@@ -827,7 +827,7 @@ module Aws::SecretsManager
|
|
|
827
827
|
#
|
|
828
828
|
# resp.to_h outputs the following:
|
|
829
829
|
# {
|
|
830
|
-
# arn: "arn:aws:secretsmanager:us-west-2:123456789012:secret:
|
|
830
|
+
# arn: "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
|
|
831
831
|
# name: "MyTestDatabaseSecret",
|
|
832
832
|
# }
|
|
833
833
|
#
|
|
@@ -2668,9 +2668,12 @@ module Aws::SecretsManager
|
|
|
2668
2668
|
# <b>Required permissions: </b> `secretsmanager:UpdateSecret`. For more
|
|
2669
2669
|
# information, see [ IAM policy actions for Secrets Manager][3] and
|
|
2670
2670
|
# [Authentication and access control in Secrets Manager][4]. If you use
|
|
2671
|
-
# a customer managed key, you must also have `kms:GenerateDataKey
|
|
2672
|
-
# `kms:Decrypt` permissions on the key.
|
|
2673
|
-
#
|
|
2671
|
+
# a customer managed key, you must also have `kms:GenerateDataKey`,
|
|
2672
|
+
# `kms:Encrypt`, and `kms:Decrypt` permissions on the key. If you change
|
|
2673
|
+
# the KMS key and you don't have `kms:Encrypt` permission to the new
|
|
2674
|
+
# key, Secrets Manager does not re-ecrypt existing secret versions with
|
|
2675
|
+
# the new key. For more information, see [ Secret encryption and
|
|
2676
|
+
# decryption][5].
|
|
2674
2677
|
#
|
|
2675
2678
|
#
|
|
2676
2679
|
#
|
|
@@ -2717,7 +2720,9 @@ module Aws::SecretsManager
|
|
|
2717
2720
|
# @option params [String] :kms_key_id
|
|
2718
2721
|
# The ARN, key ID, or alias of the KMS key that Secrets Manager uses to
|
|
2719
2722
|
# encrypt new secret versions as well as any existing versions with the
|
|
2720
|
-
# staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`.
|
|
2723
|
+
# staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. If you
|
|
2724
|
+
# don't have `kms:Encrypt` permission to the new key, Secrets Manager
|
|
2725
|
+
# does not re-ecrypt existing secret versions with the new key. For more
|
|
2721
2726
|
# information about versions and staging labels, see [Concepts:
|
|
2722
2727
|
# Version][1].
|
|
2723
2728
|
#
|
|
@@ -3103,7 +3108,7 @@ module Aws::SecretsManager
|
|
|
3103
3108
|
params: params,
|
|
3104
3109
|
config: config)
|
|
3105
3110
|
context[:gem_name] = 'aws-sdk-secretsmanager'
|
|
3106
|
-
context[:gem_version] = '1.
|
|
3111
|
+
context[:gem_version] = '1.81.0'
|
|
3107
3112
|
Seahorse::Client::Request.new(handlers, context)
|
|
3108
3113
|
end
|
|
3109
3114
|
|
|
@@ -2052,9 +2052,11 @@ module Aws::SecretsManager
|
|
|
2052
2052
|
# @!attribute [rw] kms_key_id
|
|
2053
2053
|
# The ARN, key ID, or alias of the KMS key that Secrets Manager uses
|
|
2054
2054
|
# to encrypt new secret versions as well as any existing versions with
|
|
2055
|
-
# the staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`.
|
|
2056
|
-
#
|
|
2057
|
-
#
|
|
2055
|
+
# the staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. If
|
|
2056
|
+
# you don't have `kms:Encrypt` permission to the new key, Secrets
|
|
2057
|
+
# Manager does not re-ecrypt existing secret versions with the new
|
|
2058
|
+
# key. For more information about versions and staging labels, see
|
|
2059
|
+
# [Concepts: Version][1].
|
|
2058
2060
|
#
|
|
2059
2061
|
# A key alias is always prefixed by `alias/`, for example
|
|
2060
2062
|
# `alias/aws/secretsmanager`. For more information, see [About
|
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: aws-sdk-secretsmanager
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 1.
|
|
4
|
+
version: 1.81.0
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Amazon Web Services
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2023-07-
|
|
11
|
+
date: 2023-07-13 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: aws-sdk-core
|