lib/aws-sdk-secretsmanager/client.rb in aws-sdk-secretsmanager-1.101.0 vs lib/aws-sdk-secretsmanager/client.rb in aws-sdk-secretsmanager-1.102.0

- old
+ new

@@ -722,18 +722,25 @@ # # To encrypt the secret with a KMS key other than `aws/secretsmanager`, # you need `kms:GenerateDataKey` and `kms:Decrypt` permission to the # key. # + # When you enter commands in a command shell, there is a risk of the + # command history being accessed or utilities having access to your + # command parameters. This is a concern if the command includes the + # value of a secret. Learn how to [Mitigate the risks of using + # command-line tools to store Secrets Manager secrets][7]. # # + # # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/service-linked-secrets.html # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/manage_create-basic-secret.html # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_secret_json_structure.html # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html # [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions # [6]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html + # [7]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html # # @option params [required, String] :name # The name of the new secret. # # The secret name can contain ASCII letters, numbers, and the following @@ -2036,15 +2043,22 @@ # # <b>Required permissions: </b> `secretsmanager:PutSecretValue`. For # more information, see [ IAM policy actions for Secrets Manager][2] and # [Authentication and access control in Secrets Manager][3]. # + # When you enter commands in a command shell, there is a risk of the + # command history being accessed or utilities having access to your + # command parameters. This is a concern if the command includes the + # value of a secret. Learn how to [Mitigate the risks of using + # command-line tools to store Secrets Manager secrets][4]. # # + # # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html + # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html # # @option params [required, String] :secret_id # The ARN or name of the secret to add a new version to. # # For an ARN, we recommend that you specify a complete ARN rather than a @@ -2889,21 +2903,28 @@ # information, see [ IAM policy actions for Secrets Manager][3] and # [Authentication and access control in Secrets Manager][4]. If you use # a customer managed key, you must also have `kms:GenerateDataKey`, # `kms:Encrypt`, and `kms:Decrypt` permissions on the key. If you change # the KMS key and you don't have `kms:Encrypt` permission to the new - # key, Secrets Manager does not re-ecrypt existing secret versions with + # key, Secrets Manager does not re-encrypt existing secret versions with # the new key. For more information, see [ Secret encryption and # decryption][5]. # + # When you enter commands in a command shell, there is a risk of the + # command history being accessed or utilities having access to your + # command parameters. This is a concern if the command includes the + # value of a secret. Learn how to [Mitigate the risks of using + # command-line tools to store Secrets Manager secrets][6]. # # + # # [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/service-linked-secrets.html # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieve-ct-entries.html # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html # [5]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security-encryption.html + # [6]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/security_cli-exposure-risks.html # # @option params [required, String] :secret_id # The ARN or name of the secret. # # For an ARN, we recommend that you specify a complete ARN rather than a @@ -2948,12 +2969,12 @@ # @option params [String] :kms_key_id # The ARN, key ID, or alias of the KMS key that Secrets Manager uses to # encrypt new secret versions as well as any existing versions with the # staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. If you # don't have `kms:Encrypt` permission to the new key, Secrets Manager - # does not re-ecrypt existing secret versions with the new key. For more - # information about versions and staging labels, see [Concepts: + # does not re-encrypt existing secret versions with the new key. For + # more information about versions and staging labels, see [Concepts: # Version][1]. # # A key alias is always prefixed by `alias/`, for example # `alias/aws/secretsmanager`. For more information, see [About # aliases][2]. @@ -3345,10 +3366,10 @@ operation: config.api.operation(operation_name), client: self, params: params, config: config) context[:gem_name] = 'aws-sdk-secretsmanager' - context[:gem_version] = '1.101.0' + context[:gem_version] = '1.102.0' Seahorse::Client::Request.new(handlers, context) end # @api private # @deprecated