lib/aws-sdk-secretsmanager/client.rb in aws-sdk-secretsmanager-1.101.0 vs lib/aws-sdk-secretsmanager/client.rb in aws-sdk-secretsmanager-1.102.0
- old
+ new
@@ -722,18 +722,25 @@
#
# To encrypt the secret with a KMS key other than `aws/secretsmanager`,
# you need `kms:GenerateDataKey` and `kms:Decrypt` permission to the
# key.
#
+ # When you enter commands in a command shell, there is a risk of the
+ # command history being accessed or utilities having access to your
+ # command parameters. This is a concern if the command includes the
+ # value of a secret. Learn how to [Mitigate the risks of using
+ # command-line tools to store Secrets Manager secrets][7].
#
#
+ #
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/service-linked-secrets.html
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/manage_create-basic-secret.html
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_secret_json_structure.html
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
# [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
# [6]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
+ # [7]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
#
# @option params [required, String] :name
# The name of the new secret.
#
# The secret name can contain ASCII letters, numbers, and the following
@@ -2036,15 +2043,22 @@
#
# <b>Required permissions: </b> `secretsmanager:PutSecretValue`. For
# more information, see [ IAM policy actions for Secrets Manager][2] and
# [Authentication and access control in Secrets Manager][3].
#
+ # When you enter commands in a command shell, there is a risk of the
+ # command history being accessed or utilities having access to your
+ # command parameters. This is a concern if the command includes the
+ # value of a secret. Learn how to [Mitigate the risks of using
+ # command-line tools to store Secrets Manager secrets][4].
#
#
+ #
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
+ # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
#
# @option params [required, String] :secret_id
# The ARN or name of the secret to add a new version to.
#
# For an ARN, we recommend that you specify a complete ARN rather than a
@@ -2889,21 +2903,28 @@
# information, see [ IAM policy actions for Secrets Manager][3] and
# [Authentication and access control in Secrets Manager][4]. If you use
# a customer managed key, you must also have `kms:GenerateDataKey`,
# `kms:Encrypt`, and `kms:Decrypt` permissions on the key. If you change
# the KMS key and you don't have `kms:Encrypt` permission to the new
- # key, Secrets Manager does not re-ecrypt existing secret versions with
+ # key, Secrets Manager does not re-encrypt existing secret versions with
# the new key. For more information, see [ Secret encryption and
# decryption][5].
#
+ # When you enter commands in a command shell, there is a risk of the
+ # command history being accessed or utilities having access to your
+ # command parameters. This is a concern if the command includes the
+ # value of a secret. Learn how to [Mitigate the risks of using
+ # command-line tools to store Secrets Manager secrets][6].
#
#
+ #
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/service-linked-secrets.html
# [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html
# [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
# [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
# [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security-encryption.html
+ # [6]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html
#
# @option params [required, String] :secret_id
# The ARN or name of the secret.
#
# For an ARN, we recommend that you specify a complete ARN rather than a
@@ -2948,12 +2969,12 @@
# @option params [String] :kms_key_id
# The ARN, key ID, or alias of the KMS key that Secrets Manager uses to
# encrypt new secret versions as well as any existing versions with the
# staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. If you
# don't have `kms:Encrypt` permission to the new key, Secrets Manager
- # does not re-ecrypt existing secret versions with the new key. For more
- # information about versions and staging labels, see [Concepts:
+ # does not re-encrypt existing secret versions with the new key. For
+ # more information about versions and staging labels, see [Concepts:
# Version][1].
#
# A key alias is always prefixed by `alias/`, for example
# `alias/aws/secretsmanager`. For more information, see [About
# aliases][2].
@@ -3345,10 +3366,10 @@
operation: config.api.operation(operation_name),
client: self,
params: params,
config: config)
context[:gem_name] = 'aws-sdk-secretsmanager'
- context[:gem_version] = '1.101.0'
+ context[:gem_version] = '1.102.0'
Seahorse::Client::Request.new(handlers, context)
end
# @api private
# @deprecated