aws-sdk-secretsmanager 1.56.0 → 1.59.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: afae56189aaced0447f70b316c9844c9f8e3cead9190a1ce1acf53cb4e7377fa
4
- data.tar.gz: 2555cf8b9f69fe0da5c886e40c5fd2ba3081f0556767c3dbfb7c5ca4f1bf20b8
3
+ metadata.gz: 53d7a097bb8f0559cb4af375370fb495ca859b2fb472392419f6bd8991e238bf
4
+ data.tar.gz: 52c9f84d3cc5ddacd48cbc6856d7b2757e5644046a7c0366de3ddda6d42e6753
5
5
  SHA512:
6
- metadata.gz: 3bd0e26570f843f7578b8ea81690bafec69fd4d1bbb5ec100077f55520ca696b30db864ea8cff35bf06ccd993a42698911480117dd347d152e1df11ffce2eead
7
- data.tar.gz: d2af4d31855f4af44298037b00b853fd581e7f5b3bc88a78b90983bb6e044dcd96a964bd4f91288dc25dc5c026ce91a606a715cace97a3f3bfbfad7bf4ed030f
6
+ metadata.gz: 6921e16b817f9831d27d7b53dbc3fb79e1d8e8242758e3ab6e38245f5ea9e33e7b66a87de5822b73d62b8581c544bdddd9ce70373fefd8c75976c5e6b6e3b17d
7
+ data.tar.gz: 133798d6d44dd7262efb23bb94e9807499183057344ba2dfc0aaf304c08225a27f93f7272d8fd66ee128e55d68094cbf63aee77a6e226ea9a8b644c4f16c03ad
data/CHANGELOG.md CHANGED
@@ -1,6 +1,21 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.59.0 (2022-03-11)
5
+ ------------------
6
+
7
+ * Feature - Documentation updates for Secrets Manager.
8
+
9
+ 1.58.0 (2022-02-24)
10
+ ------------------
11
+
12
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
13
+
14
+ 1.57.0 (2022-02-03)
15
+ ------------------
16
+
17
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
18
+
4
19
  1.56.0 (2022-01-28)
5
20
  ------------------
6
21
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.56.0
1
+ 1.59.0
@@ -27,7 +27,9 @@ require 'aws-sdk-core/plugins/client_metrics_plugin.rb'
27
27
  require 'aws-sdk-core/plugins/client_metrics_send_plugin.rb'
28
28
  require 'aws-sdk-core/plugins/transfer_encoding.rb'
29
29
  require 'aws-sdk-core/plugins/http_checksum.rb'
30
+ require 'aws-sdk-core/plugins/checksum_algorithm.rb'
30
31
  require 'aws-sdk-core/plugins/defaults_mode.rb'
32
+ require 'aws-sdk-core/plugins/recursion_detection.rb'
31
33
  require 'aws-sdk-core/plugins/signature_v4.rb'
32
34
  require 'aws-sdk-core/plugins/protocols/json_rpc.rb'
33
35
 
@@ -74,7 +76,9 @@ module Aws::SecretsManager
74
76
  add_plugin(Aws::Plugins::ClientMetricsSendPlugin)
75
77
  add_plugin(Aws::Plugins::TransferEncoding)
76
78
  add_plugin(Aws::Plugins::HttpChecksum)
79
+ add_plugin(Aws::Plugins::ChecksumAlgorithm)
77
80
  add_plugin(Aws::Plugins::DefaultsMode)
81
+ add_plugin(Aws::Plugins::RecursionDetection)
78
82
  add_plugin(Aws::Plugins::SignatureV4)
79
83
  add_plugin(Aws::Plugins::Protocols::JsonRpc)
80
84
 
@@ -644,7 +648,7 @@ module Aws::SecretsManager
644
648
  # client_request_token: "EXAMPLE1-90ab-cdef-fedc-ba987SECRET1",
645
649
  # description: "My test database secret created with the CLI",
646
650
  # name: "MyTestDatabaseSecret",
647
- # secret_string: "{\"username\":\"david\",\"password\":\"BnQw!XDWgaEeT9XGTT29\"}",
651
+ # secret_string: "{\"username\":\"david\",\"password\":\"EXAMPLE-PASSWORD\"}",
648
652
  # })
649
653
  #
650
654
  # resp.to_h outputs the following:
@@ -929,7 +933,9 @@ module Aws::SecretsManager
929
933
  # rotation_enabled: true,
930
934
  # rotation_lambda_arn: "arn:aws:lambda:us-west-2:123456789012:function:MyTestRotationLambda",
931
935
  # rotation_rules: {
932
- # automatically_after_days: 30,
936
+ # automatically_after_days: 14,
937
+ # duration: "2h",
938
+ # schedule_expression: "cron(0 16 1,15 * ? *)",
933
939
  # },
934
940
  # tags: [
935
941
  # {
@@ -1064,7 +1070,7 @@ module Aws::SecretsManager
1064
1070
  #
1065
1071
  # resp.to_h outputs the following:
1066
1072
  # {
1067
- # random_password: "N+Z43a,>vx7j O8^*<8i3",
1073
+ # random_password: "EXAMPLE-PASSWORD",
1068
1074
  # }
1069
1075
  #
1070
1076
  # @example Request syntax with placeholder values
@@ -1221,13 +1227,10 @@ module Aws::SecretsManager
1221
1227
  #
1222
1228
  # @example Example: To retrieve the encrypted secret value of a secret
1223
1229
  #
1224
- # # The following example shows how to retrieve the secret string value from the version of the secret that has the
1225
- # # AWSPREVIOUS staging label attached. If you want to retrieve the AWSCURRENT version of the secret, then you can omit the
1226
- # # VersionStage parameter because it defaults to AWSCURRENT.
1230
+ # # The following example shows how to retrieve a secret string value.
1227
1231
  #
1228
1232
  # resp = client.get_secret_value({
1229
1233
  # secret_id: "MyTestDatabaseSecret",
1230
- # version_stage: "AWSPREVIOUS",
1231
1234
  # })
1232
1235
  #
1233
1236
  # resp.to_h outputs the following:
@@ -1235,7 +1238,7 @@ module Aws::SecretsManager
1235
1238
  # arn: "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
1236
1239
  # created_date: Time.parse(1523477145.713),
1237
1240
  # name: "MyTestDatabaseSecret",
1238
- # secret_string: "{\n \"username\":\"david\",\n \"password\":\"BnQw&XDWgaEeT9XGTT29\"\n}\n",
1241
+ # secret_string: "{\n \"username\":\"david\",\n \"password\":\"EXAMPLE-PASSWORD\"\n}\n",
1239
1242
  # version_id: "EXAMPLE1-90ab-cdef-fedc-ba987SECRET1",
1240
1243
  # version_stages: [
1241
1244
  # "AWSPREVIOUS",
@@ -1388,7 +1391,8 @@ module Aws::SecretsManager
1388
1391
  end
1389
1392
 
1390
1393
  # Lists the secrets that are stored by Secrets Manager in the Amazon Web
1391
- # Services account.
1394
+ # Services account, not including secrets that are marked for deletion.
1395
+ # To see secrets marked for deletion, use the Secrets Manager console.
1392
1396
  #
1393
1397
  # To list the versions of a secret, use ListSecretVersionIds.
1394
1398
  #
@@ -1738,7 +1742,7 @@ module Aws::SecretsManager
1738
1742
  # resp = client.put_secret_value({
1739
1743
  # client_request_token: "EXAMPLE2-90ab-cdef-fedc-ba987EXAMPLE",
1740
1744
  # secret_id: "MyTestDatabaseSecret",
1741
- # secret_string: "{\"username\":\"david\",\"password\":\"BnQw!XDWgaEeT9XGTT29\"}",
1745
+ # secret_string: "{\"username\":\"david\",\"password\":\"EXAMPLE-PASSWORD\"}",
1742
1746
  # })
1743
1747
  #
1744
1748
  # resp.to_h outputs the following:
@@ -2735,7 +2739,7 @@ module Aws::SecretsManager
2735
2739
  params: params,
2736
2740
  config: config)
2737
2741
  context[:gem_name] = 'aws-sdk-secretsmanager'
2738
- context[:gem_version] = '1.56.0'
2742
+ context[:gem_version] = '1.59.0'
2739
2743
  Seahorse::Client::Request.new(handlers, context)
2740
2744
  end
2741
2745
 
@@ -48,6 +48,6 @@ require_relative 'aws-sdk-secretsmanager/customizations'
48
48
  # @!group service
49
49
  module Aws::SecretsManager
50
50
 
51
- GEM_VERSION = '1.56.0'
51
+ GEM_VERSION = '1.59.0'
52
52
 
53
53
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-secretsmanager
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.56.0
4
+ version: 1.59.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-01-28 00:00:00.000000000 Z
11
+ date: 2022-03-11 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -19,7 +19,7 @@ dependencies:
19
19
  version: '3'
20
20
  - - ">="
21
21
  - !ruby/object:Gem::Version
22
- version: 3.125.0
22
+ version: 3.127.0
23
23
  type: :runtime
24
24
  prerelease: false
25
25
  version_requirements: !ruby/object:Gem::Requirement
@@ -29,7 +29,7 @@ dependencies:
29
29
  version: '3'
30
30
  - - ">="
31
31
  - !ruby/object:Gem::Version
32
- version: 3.125.0
32
+ version: 3.127.0
33
33
  - !ruby/object:Gem::Dependency
34
34
  name: aws-sigv4
35
35
  requirement: !ruby/object:Gem::Requirement