aws-sdk-secretsmanager 1.90.0 → 1.91.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 17c1cc751557ac38b7bcb25edf7774d62491244607c803422a3a622877aba429
4
- data.tar.gz: e2bfd21bdfc5038b3e2b9c36772127ed82576f274eef9a105403eb5f75e62140
3
+ metadata.gz: c9ccfc0333feb677c8a83a4ca7f62509f73c49e5917dd8bfb5135ed6405a6442
4
+ data.tar.gz: 98e8b6facb734bc90b52f19646848b6723582d8a6e08fba6118ab0c64dcf0927
5
5
  SHA512:
6
- metadata.gz: ad251a70575b3b2547db4f485fd5e214eb8e3a36b05fef8bbd59864bed6665eb38c4b880c42cf41dd5cade6b72a5534bca5346d62113d81fb3f6900347922fb2
7
- data.tar.gz: 3c814692e69783f50192d409094ec3b758a975c3ac24557ad3fdfb927ed5231a10c7d5873f60a76d39d9b79db0c80fb785c89f6684ddd62260d19766771d439a
6
+ metadata.gz: 43a950b89ba79e7bc09767ab034854f78cdfcefee1f412285893a301451bde912b6bed36823c58d5e7a6ad8985360121153e80243e2a066f19d0339d1c3741b4
7
+ data.tar.gz: 415ae25be39b817eaf73cc8117c170bee4eb76fe13c1aafaa0b84d14a3e06d3d88f9a7fb77b29b6d4cb07796572f2729251210b889e2d08c1bcb457f76178893
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.91.0 (2024-03-27)
5
+ ------------------
6
+
7
+ * Feature - Documentation updates for Secrets Manager
8
+
4
9
  1.90.0 (2024-01-26)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.90.0
1
+ 1.91.0
@@ -442,7 +442,8 @@ module Aws::SecretsManager
442
442
  #
443
443
  # If there are more results available, in the response, Secrets Manager
444
444
  # includes `NextToken`. To get the next results, call
445
- # `BatchGetSecretValue` again with the value from `NextToken`.
445
+ # `BatchGetSecretValue` again with the value from `NextToken`. To use
446
+ # this parameter, you must also use the `Filters` parameter.
446
447
  #
447
448
  # @option params [String] :next_token
448
449
  # A token that indicates where the output should continue from, if a
@@ -1270,19 +1271,16 @@ module Aws::SecretsManager
1270
1271
  # characters in passwords: `` !"#$%&'()*+,-./:;<=>?@[\\]^_`\{|\}~ ``
1271
1272
  #
1272
1273
  # Secrets Manager generates a CloudTrail log entry when you call this
1273
- # action. Do not include sensitive information in request parameters
1274
- # because it might be logged. For more information, see [Logging Secrets
1275
- # Manager events with CloudTrail][1].
1274
+ # action.
1276
1275
  #
1277
1276
  # <b>Required permissions: </b> `secretsmanager:GetRandomPassword`. For
1278
- # more information, see [ IAM policy actions for Secrets Manager][2] and
1279
- # [Authentication and access control in Secrets Manager][3].
1277
+ # more information, see [ IAM policy actions for Secrets Manager][1] and
1278
+ # [Authentication and access control in Secrets Manager][2].
1280
1279
  #
1281
1280
  #
1282
1281
  #
1283
- # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
1284
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1285
- # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1282
+ # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
1283
+ # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
1286
1284
  #
1287
1285
  # @option params [Integer] :password_length
1288
1286
  # The length of the password. If you don't include this parameter, the
@@ -1701,9 +1699,9 @@ module Aws::SecretsManager
1701
1699
  # Services account, not including secrets that are marked for deletion.
1702
1700
  # To see secrets marked for deletion, use the Secrets Manager console.
1703
1701
  #
1704
- # ListSecrets is eventually consistent, however it might not reflect
1705
- # changes from the last five minutes. To get the latest information for
1706
- # a specific secret, use DescribeSecret.
1702
+ # All Secrets Manager operations are eventually consistent. ListSecrets
1703
+ # might not reflect changes from the last five minutes. You can get more
1704
+ # recent information for a specific secret by calling DescribeSecret.
1707
1705
  #
1708
1706
  # To list the versions of a secret, use ListSecretVersionIds.
1709
1707
  #
@@ -1892,6 +1890,25 @@ module Aws::SecretsManager
1892
1890
  # access to the secret, for example those that use a wildcard for the
1893
1891
  # principal. By default, public policies aren't blocked.
1894
1892
  #
1893
+ # Resource policy validation and the BlockPublicPolicy parameter help
1894
+ # protect your resources by preventing public access from being granted
1895
+ # through the resource policies that are directly attached to your
1896
+ # secrets. In addition to using these features, carefully inspect the
1897
+ # following policies to confirm that they do not grant public access:
1898
+ #
1899
+ # * Identity-based policies attached to associated Amazon Web Services
1900
+ # principals (for example, IAM roles)
1901
+ #
1902
+ # * Resource-based policies attached to associated Amazon Web Services
1903
+ # resources (for example, Key Management Service (KMS) keys)
1904
+ #
1905
+ # To review permissions to your secrets, see [Determine who has
1906
+ # permissions to your secrets][1].
1907
+ #
1908
+ #
1909
+ #
1910
+ # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/determine-acccess_examine-iam-policies.html
1911
+ #
1895
1912
  # @return [Types::PutResourcePolicyResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1896
1913
  #
1897
1914
  # * {Types::PutResourcePolicyResponse#arn #arn} => String
@@ -3245,7 +3262,7 @@ module Aws::SecretsManager
3245
3262
  params: params,
3246
3263
  config: config)
3247
3264
  context[:gem_name] = 'aws-sdk-secretsmanager'
3248
- context[:gem_version] = '1.90.0'
3265
+ context[:gem_version] = '1.91.0'
3249
3266
  Seahorse::Client::Request.new(handlers, context)
3250
3267
  end
3251
3268
 
@@ -54,7 +54,8 @@ module Aws::SecretsManager
54
54
  #
55
55
  # If there are more results available, in the response, Secrets
56
56
  # Manager includes `NextToken`. To get the next results, call
57
- # `BatchGetSecretValue` again with the value from `NextToken`.
57
+ # `BatchGetSecretValue` again with the value from `NextToken`. To use
58
+ # this parameter, you must also use the `Filters` parameter.
58
59
  # @return [Integer]
59
60
  #
60
61
  # @!attribute [rw] next_token
@@ -574,7 +575,14 @@ module Aws::SecretsManager
574
575
  # @!attribute [rw] next_rotation_date
575
576
  # The next rotation is scheduled to occur on or before this date. If
576
577
  # the secret isn't configured for rotation or rotation has been
577
- # disabled, Secrets Manager returns null.
578
+ # disabled, Secrets Manager returns null. If rotation fails, Secrets
579
+ # Manager retries the entire rotation process multiple times. If
580
+ # rotation is unsuccessful, this date may be in the past.
581
+ #
582
+ # This date represents the latest date that rotation will occur, but
583
+ # it is not an approximate rotation date. In some cases, for example
584
+ # if you turn off automatic rotation and then turn it back on, the
585
+ # next rotation may occur much sooner than this date.
578
586
  # @return [Time]
579
587
  #
580
588
  # @!attribute [rw] tags
@@ -1239,6 +1247,27 @@ module Aws::SecretsManager
1239
1247
  # Specifies whether to block resource-based policies that allow broad
1240
1248
  # access to the secret, for example those that use a wildcard for the
1241
1249
  # principal. By default, public policies aren't blocked.
1250
+ #
1251
+ # Resource policy validation and the BlockPublicPolicy parameter help
1252
+ # protect your resources by preventing public access from being
1253
+ # granted through the resource policies that are directly attached to
1254
+ # your secrets. In addition to using these features, carefully inspect
1255
+ # the following policies to confirm that they do not grant public
1256
+ # access:
1257
+ #
1258
+ # * Identity-based policies attached to associated Amazon Web
1259
+ # Services
1260
+ # principals (for example, IAM roles)
1261
+ #
1262
+ # * Resource-based policies attached to associated Amazon Web Services
1263
+ # resources (for example, Key Management Service (KMS) keys)
1264
+ #
1265
+ # To review permissions to your secrets, see [Determine who has
1266
+ # permissions to your secrets][1].
1267
+ #
1268
+ #
1269
+ #
1270
+ # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/determine-acccess_examine-iam-policies.html
1242
1271
  # @return [Boolean]
1243
1272
  #
1244
1273
  # @see http://docs.aws.amazon.com/goto/WebAPI/secretsmanager-2017-10-17/PutResourcePolicyRequest AWS API Documentation
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-secretsmanager/customizations'
52
52
  # @!group service
53
53
  module Aws::SecretsManager
54
54
 
55
- GEM_VERSION = '1.90.0'
55
+ GEM_VERSION = '1.91.0'
56
56
 
57
57
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-secretsmanager
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.90.0
4
+ version: 1.91.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-01-26 00:00:00.000000000 Z
11
+ date: 2024-03-27 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core