aws-sdk-secretsmanager 1.83.0 → 1.84.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 463ab954c2874f7fa498396b355e6bad469ed537d7cdd207330895856593226e
4
- data.tar.gz: b1a5be0e9ca6779a4c84d37e091b7a7d4d428b0cec6e1f316b4a77959fa0e7c0
3
+ metadata.gz: 7ad8f83fd5cda53d70ffeca9f17fb1a162f3872019c017056c48d37612fd5eae
4
+ data.tar.gz: 0d43fd6b56e8eb6d9bf0172ab814c70da6d73e3e30e07d3374436e245f7d27ed
5
5
  SHA512:
6
- metadata.gz: d60ce0dafd34e04cf2e80f5e4b30c3c0266ac1310ec1f5c835bcb38c96f660845ccbfba1b27d8c53f71e30ed4396675c0960a19d3599a72e84125c9c27e88606
7
- data.tar.gz: 51328f03de7bef776f764112a7661968c786e27cf27298bc563aed8757a86073601119b53288bb4acd915419f8c5bbeff7bf91cd3f6544c13edfedd578fda8f0
6
+ metadata.gz: ba0e3b0c2a0ffd25b3be0909a6a790648a67ba37930e4b4aef8c86c8a78f7ef7d8226423e0f29a0d61fc0cc02ccb881619c601c0252d1d4222db91c7c37782f3
7
+ data.tar.gz: 135f6b242162722e8a93906cebe17b9c9763d6adc4107da3feb5dee4b7d01413d1b324bfaf1950329195991c92a010aad60ab1b34cd359678bd479af10192449
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.84.0 (2023-10-19)
5
+ ------------------
6
+
7
+ * Feature - Documentation updates for Secrets Manager
8
+
4
9
  1.83.0 (2023-09-27)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.83.0
1
+ 1.84.0
@@ -567,14 +567,14 @@ module Aws::SecretsManager
567
567
  # <note markdown="1"> If you use the Amazon Web Services CLI or one of the Amazon Web
568
568
  # Services SDKs to call this operation, then you can leave this
569
569
  # parameter empty. The CLI or SDK generates a random UUID for you and
570
- # includes it as the value for this parameter in the request. If you
571
- # don't use the SDK and instead generate a raw HTTP request to the
572
- # Secrets Manager service endpoint, then you must generate a
573
- # `ClientRequestToken` yourself for the new version and include the
574
- # value in the request.
570
+ # includes it as the value for this parameter in the request.
575
571
  #
576
572
  # </note>
577
573
  #
574
+ # If you generate a raw HTTP request to the Secrets Manager service
575
+ # endpoint, then you must generate a `ClientRequestToken` and include it
576
+ # in the request.
577
+ #
578
578
  # This value helps ensure idempotency. Secrets Manager uses this value
579
579
  # to prevent the accidental creation of duplicate versions if there are
580
580
  # failures and retries during a rotation. We recommend that you generate
@@ -676,32 +676,15 @@ module Aws::SecretsManager
676
676
  # parameter, you should use single quotes to avoid confusion with the
677
677
  # double quotes required in the JSON text.
678
678
  #
679
- # The following restrictions apply to tags:
680
- #
681
- # * Maximum number of tags per secret: 50
682
- #
683
- # * Maximum key length: 127 Unicode characters in UTF-8
684
- #
685
- # * Maximum value length: 255 Unicode characters in UTF-8
686
- #
687
- # * Tag keys and values are case sensitive.
688
- #
689
- # * Do not use the `aws:` prefix in your tag names or values because
690
- # Amazon Web Services reserves it for Amazon Web Services use. You
691
- # can't edit or delete tag names or values with this prefix. Tags
692
- # with this prefix do not count against your tags per secret limit.
693
- #
694
- # * If you use your tagging schema across multiple services and
695
- # resources, other services might have restrictions on allowed
696
- # characters. Generally allowed characters: letters, spaces, and
697
- # numbers representable in UTF-8, plus the following special
698
- # characters: + - = . \_ : / @.
679
+ # For tag quotas and naming restrictions, see [Service quotas for
680
+ # Tagging][4] in the *Amazon Web Services General Reference guide*.
699
681
  #
700
682
  #
701
683
  #
702
684
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access_examples.html#tag-secrets-abac
703
685
  # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access_examples.html#auth-and-access_tags2
704
686
  # [3]: https://docs.aws.amazon.com/cli/latest/userguide/cli-using-param.html#cli-using-param-json
687
+ # [4]: https://docs.aws.amazon.com/general/latest/gr/arg.html#taged-reference-quotas
705
688
  #
706
689
  # @option params [Array<Types::ReplicaRegionType>] :add_replica_regions
707
690
  # A list of Regions and KMS keys to replicate secrets.
@@ -1860,19 +1843,20 @@ module Aws::SecretsManager
1860
1843
  #
1861
1844
  # <note markdown="1"> If you use the Amazon Web Services CLI or one of the Amazon Web
1862
1845
  # Services SDKs to call this operation, then you can leave this
1863
- # parameter empty because they generate a random UUID for you. If you
1864
- # don't use the SDK and instead generate a raw HTTP request to the
1865
- # Secrets Manager service endpoint, then you must generate a
1866
- # `ClientRequestToken` yourself for new versions and include that value
1867
- # in the request.
1846
+ # parameter empty. The CLI or SDK generates a random UUID for you and
1847
+ # includes it as the value for this parameter in the request.
1868
1848
  #
1869
1849
  # </note>
1870
1850
  #
1851
+ # If you generate a raw HTTP request to the Secrets Manager service
1852
+ # endpoint, then you must generate a `ClientRequestToken` and include it
1853
+ # in the request.
1854
+ #
1871
1855
  # This value helps ensure idempotency. Secrets Manager uses this value
1872
1856
  # to prevent the accidental creation of duplicate versions if there are
1873
- # failures and retries during the Lambda rotation function processing.
1874
- # We recommend that you generate a [UUID-type][1] value to ensure
1875
- # uniqueness within the specified secret.
1857
+ # failures and retries during a rotation. We recommend that you generate
1858
+ # a [UUID-type][1] value to ensure uniqueness of your versions within
1859
+ # the specified secret.
1876
1860
  #
1877
1861
  # * If the `ClientRequestToken` value isn't already associated with a
1878
1862
  # version of the secret then a new version of the secret is created.
@@ -2253,24 +2237,27 @@ module Aws::SecretsManager
2253
2237
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/troubleshoot.html#ARN_secretnamehyphen
2254
2238
  #
2255
2239
  # @option params [String] :client_request_token
2256
- # A unique identifier for the new version of the secret that helps
2257
- # ensure idempotency. Secrets Manager uses this value to prevent the
2258
- # accidental creation of duplicate versions if there are failures and
2259
- # retries during rotation. This value becomes the `VersionId` of the new
2260
- # version.
2261
- #
2262
- # If you use the Amazon Web Services CLI or one of the Amazon Web
2263
- # Services SDK to call this operation, then you can leave this parameter
2264
- # empty. The CLI or SDK generates a random UUID for you and includes
2265
- # that in the request for this parameter. If you don't use the SDK and
2266
- # instead generate a raw HTTP request to the Secrets Manager service
2267
- # endpoint, then you must generate a `ClientRequestToken` yourself for
2268
- # new versions and include that value in the request.
2269
- #
2270
- # You only need to specify this value if you implement your own retry
2271
- # logic and you want to ensure that Secrets Manager doesn't attempt to
2272
- # create a secret version twice. We recommend that you generate a
2273
- # [UUID-type][1] value to ensure uniqueness within the specified secret.
2240
+ # A unique identifier for the new version of the secret. You only need
2241
+ # to specify this value if you implement your own retry logic and you
2242
+ # want to ensure that Secrets Manager doesn't attempt to create a
2243
+ # secret version twice.
2244
+ #
2245
+ # <note markdown="1"> If you use the Amazon Web Services CLI or one of the Amazon Web
2246
+ # Services SDKs to call this operation, then you can leave this
2247
+ # parameter empty. The CLI or SDK generates a random UUID for you and
2248
+ # includes it as the value for this parameter in the request.
2249
+ #
2250
+ # </note>
2251
+ #
2252
+ # If you generate a raw HTTP request to the Secrets Manager service
2253
+ # endpoint, then you must generate a `ClientRequestToken` and include it
2254
+ # in the request.
2255
+ #
2256
+ # This value helps ensure idempotency. Secrets Manager uses this value
2257
+ # to prevent the accidental creation of duplicate versions if there are
2258
+ # failures and retries during a rotation. We recommend that you generate
2259
+ # a [UUID-type][1] value to ensure uniqueness of your versions within
2260
+ # the specified secret.
2274
2261
  #
2275
2262
  # **A suitable default value is auto-generated.** You should normally
2276
2263
  # not need to pass this option.**
@@ -2438,26 +2425,8 @@ module Aws::SecretsManager
2438
2425
  # specific versions of the secret. This operation appends tags to the
2439
2426
  # existing list of tags.
2440
2427
  #
2441
- # The following restrictions apply to tags:
2442
- #
2443
- # * Maximum number of tags per secret: 50
2444
- #
2445
- # * Maximum key length: 127 Unicode characters in UTF-8
2446
- #
2447
- # * Maximum value length: 255 Unicode characters in UTF-8
2448
- #
2449
- # * Tag keys and values are case sensitive.
2450
- #
2451
- # * Do not use the `aws:` prefix in your tag names or values because
2452
- # Amazon Web Services reserves it for Amazon Web Services use. You
2453
- # can't edit or delete tag names or values with this prefix. Tags
2454
- # with this prefix do not count against your tags per secret limit.
2455
- #
2456
- # * If you use your tagging schema across multiple services and
2457
- # resources, other services might have restrictions on allowed
2458
- # characters. Generally allowed characters: letters, spaces, and
2459
- # numbers representable in UTF-8, plus the following special
2460
- # characters: + - = . \_ : / @.
2428
+ # For tag quotas and naming restrictions, see [Service quotas for
2429
+ # Tagging][1] in the *Amazon Web Services General Reference guide*.
2461
2430
  #
2462
2431
  # If you use tags as part of your security strategy, then adding or
2463
2432
  # removing a tag can change permissions. If successfully completing this
@@ -2467,17 +2436,18 @@ module Aws::SecretsManager
2467
2436
  # Secrets Manager generates a CloudTrail log entry when you call this
2468
2437
  # action. Do not include sensitive information in request parameters
2469
2438
  # because it might be logged. For more information, see [Logging Secrets
2470
- # Manager events with CloudTrail][1].
2439
+ # Manager events with CloudTrail][2].
2471
2440
  #
2472
2441
  # <b>Required permissions: </b> `secretsmanager:TagResource`. For more
2473
- # information, see [ IAM policy actions for Secrets Manager][2] and
2474
- # [Authentication and access control in Secrets Manager][3].
2442
+ # information, see [ IAM policy actions for Secrets Manager][3] and
2443
+ # [Authentication and access control in Secrets Manager][4].
2475
2444
  #
2476
2445
  #
2477
2446
  #
2478
- # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
2479
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2480
- # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2447
+ # [1]: https://docs.aws.amazon.com/general/latest/gr/arg.html#taged-reference-quotas
2448
+ # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
2449
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
2450
+ # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
2481
2451
  #
2482
2452
  # @option params [required, String] :secret_id
2483
2453
  # The identifier for the secret to attach tags to. You can specify
@@ -2701,19 +2671,27 @@ module Aws::SecretsManager
2701
2671
  # <note markdown="1"> If you use the Amazon Web Services CLI or one of the Amazon Web
2702
2672
  # Services SDKs to call this operation, then you can leave this
2703
2673
  # parameter empty. The CLI or SDK generates a random UUID for you and
2704
- # includes it as the value for this parameter in the request. If you
2705
- # don't use the SDK and instead generate a raw HTTP request to the
2706
- # Secrets Manager service endpoint, then you must generate a
2707
- # `ClientRequestToken` yourself for the new version and include the
2708
- # value in the request.
2674
+ # includes it as the value for this parameter in the request.
2709
2675
  #
2710
2676
  # </note>
2711
2677
  #
2712
- # This value becomes the `VersionId` of the new version.
2678
+ # If you generate a raw HTTP request to the Secrets Manager service
2679
+ # endpoint, then you must generate a `ClientRequestToken` and include it
2680
+ # in the request.
2681
+ #
2682
+ # This value helps ensure idempotency. Secrets Manager uses this value
2683
+ # to prevent the accidental creation of duplicate versions if there are
2684
+ # failures and retries during a rotation. We recommend that you generate
2685
+ # a [UUID-type][1] value to ensure uniqueness of your versions within
2686
+ # the specified secret.
2713
2687
  #
2714
2688
  # **A suitable default value is auto-generated.** You should normally
2715
2689
  # not need to pass this option.**
2716
2690
  #
2691
+ #
2692
+ #
2693
+ # [1]: https://wikipedia.org/wiki/Universally_unique_identifier
2694
+ #
2717
2695
  # @option params [String] :description
2718
2696
  # The description of the secret.
2719
2697
  #
@@ -3108,7 +3086,7 @@ module Aws::SecretsManager
3108
3086
  params: params,
3109
3087
  config: config)
3110
3088
  context[:gem_name] = 'aws-sdk-secretsmanager'
3111
- context[:gem_version] = '1.83.0'
3089
+ context[:gem_version] = '1.84.0'
3112
3090
  Seahorse::Client::Request.new(handlers, context)
3113
3091
  end
3114
3092
 
@@ -32,7 +32,7 @@ module Aws::SecretsManager
32
32
  raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
33
33
  end
34
34
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
35
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
35
+ if Aws::Endpoints::Matchers.boolean_equals?(Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"), true)
36
36
  return Aws::Endpoints::Endpoint.new(url: "https://secretsmanager-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
37
37
  end
38
38
  raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
@@ -77,14 +77,14 @@ module Aws::SecretsManager
77
77
  # <note markdown="1"> If you use the Amazon Web Services CLI or one of the Amazon Web
78
78
  # Services SDKs to call this operation, then you can leave this
79
79
  # parameter empty. The CLI or SDK generates a random UUID for you and
80
- # includes it as the value for this parameter in the request. If you
81
- # don't use the SDK and instead generate a raw HTTP request to the
82
- # Secrets Manager service endpoint, then you must generate a
83
- # `ClientRequestToken` yourself for the new version and include the
84
- # value in the request.
80
+ # includes it as the value for this parameter in the request.
85
81
  #
86
82
  # </note>
87
83
  #
84
+ # If you generate a raw HTTP request to the Secrets Manager service
85
+ # endpoint, then you must generate a `ClientRequestToken` and include
86
+ # it in the request.
87
+ #
88
88
  # This value helps ensure idempotency. Secrets Manager uses this value
89
89
  # to prevent the accidental creation of duplicate versions if there
90
90
  # are failures and retries during a rotation. We recommend that you
@@ -191,32 +191,15 @@ module Aws::SecretsManager
191
191
  # parameter, you should use single quotes to avoid confusion with the
192
192
  # double quotes required in the JSON text.
193
193
  #
194
- # The following restrictions apply to tags:
195
- #
196
- # * Maximum number of tags per secret: 50
197
- #
198
- # * Maximum key length: 127 Unicode characters in UTF-8
199
- #
200
- # * Maximum value length: 255 Unicode characters in UTF-8
201
- #
202
- # * Tag keys and values are case sensitive.
203
- #
204
- # * Do not use the `aws:` prefix in your tag names or values because
205
- # Amazon Web Services reserves it for Amazon Web Services use. You
206
- # can't edit or delete tag names or values with this prefix. Tags
207
- # with this prefix do not count against your tags per secret limit.
208
- #
209
- # * If you use your tagging schema across multiple services and
210
- # resources, other services might have restrictions on allowed
211
- # characters. Generally allowed characters: letters, spaces, and
212
- # numbers representable in UTF-8, plus the following special
213
- # characters: + - = . \_ : / @.
194
+ # For tag quotas and naming restrictions, see [Service quotas for
195
+ # Tagging][4] in the *Amazon Web Services General Reference guide*.
214
196
  #
215
197
  #
216
198
  #
217
199
  # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access_examples.html#tag-secrets-abac
218
200
  # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access_examples.html#auth-and-access_tags2
219
201
  # [3]: https://docs.aws.amazon.com/cli/latest/userguide/cli-using-param.html#cli-using-param-json
202
+ # [4]: https://docs.aws.amazon.com/general/latest/gr/arg.html#taged-reference-quotas
220
203
  # @return [Array<Types::Tag>]
221
204
  #
222
205
  # @!attribute [rw] add_replica_regions
@@ -1215,19 +1198,20 @@ module Aws::SecretsManager
1215
1198
  #
1216
1199
  # <note markdown="1"> If you use the Amazon Web Services CLI or one of the Amazon Web
1217
1200
  # Services SDKs to call this operation, then you can leave this
1218
- # parameter empty because they generate a random UUID for you. If you
1219
- # don't use the SDK and instead generate a raw HTTP request to the
1220
- # Secrets Manager service endpoint, then you must generate a
1221
- # `ClientRequestToken` yourself for new versions and include that
1222
- # value in the request.
1201
+ # parameter empty. The CLI or SDK generates a random UUID for you and
1202
+ # includes it as the value for this parameter in the request.
1223
1203
  #
1224
1204
  # </note>
1225
1205
  #
1206
+ # If you generate a raw HTTP request to the Secrets Manager service
1207
+ # endpoint, then you must generate a `ClientRequestToken` and include
1208
+ # it in the request.
1209
+ #
1226
1210
  # This value helps ensure idempotency. Secrets Manager uses this value
1227
1211
  # to prevent the accidental creation of duplicate versions if there
1228
- # are failures and retries during the Lambda rotation function
1229
- # processing. We recommend that you generate a [UUID-type][1] value to
1230
- # ensure uniqueness within the specified secret.
1212
+ # are failures and retries during a rotation. We recommend that you
1213
+ # generate a [UUID-type][1] value to ensure uniqueness of your
1214
+ # versions within the specified secret.
1231
1215
  #
1232
1216
  # * If the `ClientRequestToken` value isn't already associated with a
1233
1217
  # version of the secret then a new version of the secret is created.
@@ -1542,26 +1526,27 @@ module Aws::SecretsManager
1542
1526
  # @return [String]
1543
1527
  #
1544
1528
  # @!attribute [rw] client_request_token
1545
- # A unique identifier for the new version of the secret that helps
1546
- # ensure idempotency. Secrets Manager uses this value to prevent the
1547
- # accidental creation of duplicate versions if there are failures and
1548
- # retries during rotation. This value becomes the `VersionId` of the
1549
- # new version.
1529
+ # A unique identifier for the new version of the secret. You only need
1530
+ # to specify this value if you implement your own retry logic and you
1531
+ # want to ensure that Secrets Manager doesn't attempt to create a
1532
+ # secret version twice.
1550
1533
  #
1551
- # If you use the Amazon Web Services CLI or one of the Amazon Web
1552
- # Services SDK to call this operation, then you can leave this
1534
+ # <note markdown="1"> If you use the Amazon Web Services CLI or one of the Amazon Web
1535
+ # Services SDKs to call this operation, then you can leave this
1553
1536
  # parameter empty. The CLI or SDK generates a random UUID for you and
1554
- # includes that in the request for this parameter. If you don't use
1555
- # the SDK and instead generate a raw HTTP request to the Secrets
1556
- # Manager service endpoint, then you must generate a
1557
- # `ClientRequestToken` yourself for new versions and include that
1558
- # value in the request.
1559
- #
1560
- # You only need to specify this value if you implement your own retry
1561
- # logic and you want to ensure that Secrets Manager doesn't attempt
1562
- # to create a secret version twice. We recommend that you generate a
1563
- # [UUID-type][1] value to ensure uniqueness within the specified
1564
- # secret.
1537
+ # includes it as the value for this parameter in the request.
1538
+ #
1539
+ # </note>
1540
+ #
1541
+ # If you generate a raw HTTP request to the Secrets Manager service
1542
+ # endpoint, then you must generate a `ClientRequestToken` and include
1543
+ # it in the request.
1544
+ #
1545
+ # This value helps ensure idempotency. Secrets Manager uses this value
1546
+ # to prevent the accidental creation of duplicate versions if there
1547
+ # are failures and retries during a rotation. We recommend that you
1548
+ # generate a [UUID-type][1] value to ensure uniqueness of your
1549
+ # versions within the specified secret.
1565
1550
  #
1566
1551
  # **A suitable default value is auto-generated.** You should normally
1567
1552
  # not need to pass this option.
@@ -2031,18 +2016,26 @@ module Aws::SecretsManager
2031
2016
  # <note markdown="1"> If you use the Amazon Web Services CLI or one of the Amazon Web
2032
2017
  # Services SDKs to call this operation, then you can leave this
2033
2018
  # parameter empty. The CLI or SDK generates a random UUID for you and
2034
- # includes it as the value for this parameter in the request. If you
2035
- # don't use the SDK and instead generate a raw HTTP request to the
2036
- # Secrets Manager service endpoint, then you must generate a
2037
- # `ClientRequestToken` yourself for the new version and include the
2038
- # value in the request.
2019
+ # includes it as the value for this parameter in the request.
2039
2020
  #
2040
2021
  # </note>
2041
2022
  #
2042
- # This value becomes the `VersionId` of the new version.
2023
+ # If you generate a raw HTTP request to the Secrets Manager service
2024
+ # endpoint, then you must generate a `ClientRequestToken` and include
2025
+ # it in the request.
2026
+ #
2027
+ # This value helps ensure idempotency. Secrets Manager uses this value
2028
+ # to prevent the accidental creation of duplicate versions if there
2029
+ # are failures and retries during a rotation. We recommend that you
2030
+ # generate a [UUID-type][1] value to ensure uniqueness of your
2031
+ # versions within the specified secret.
2043
2032
  #
2044
2033
  # **A suitable default value is auto-generated.** You should normally
2045
2034
  # not need to pass this option.
2035
+ #
2036
+ #
2037
+ #
2038
+ # [1]: https://wikipedia.org/wiki/Universally_unique_identifier
2046
2039
  # @return [String]
2047
2040
  #
2048
2041
  # @!attribute [rw] description
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-secretsmanager/customizations'
52
52
  # @!group service
53
53
  module Aws::SecretsManager
54
54
 
55
- GEM_VERSION = '1.83.0'
55
+ GEM_VERSION = '1.84.0'
56
56
 
57
57
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-secretsmanager
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.83.0
4
+ version: 1.84.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-09-27 00:00:00.000000000 Z
11
+ date: 2023-10-19 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core