aws-sdk-secretsmanager 1.87.0 → 1.89.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-secretsmanager/client.rb +62 -5
- data/lib/aws-sdk-secretsmanager/endpoint_provider.rb +15 -0
- data/lib/aws-sdk-secretsmanager/types.rb +10 -13
- data/lib/aws-sdk-secretsmanager.rb +1 -1
- metadata +6 -6
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 923abb0f15dbf93c43bc9b78c4e717937965e006f9b7cdd06f62e6a7e7607ee0
|
4
|
+
data.tar.gz: 646436ad1fb5ea3559377f2f42fcbfacc2d99ec543467f672d959bd22e60f03e
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: c499c1ef98120af158f7d307087215836e635e5a5ca293c61def398cb2755d7768efd251feab4359cea0707d5b19599ccb93b365875db30de4e50439dc9a986d
|
7
|
+
data.tar.gz: 90b78a72e59b3259536b84cb542cbb9acce5078ec239d180d0ad0782ff434ffa74d572e7c0b60d268b7f0979a71cfc4975310ac532704f490dedd4bfc972c41e
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.89.0 (2024-01-11)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Doc only update for Secrets Manager
|
8
|
+
|
9
|
+
1.88.0 (2023-12-22)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Update endpoint rules and examples.
|
13
|
+
|
4
14
|
1.87.0 (2023-11-28)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.89.0
|
@@ -457,6 +457,57 @@ module Aws::SecretsManager
|
|
457
457
|
#
|
458
458
|
# The returned {Seahorse::Client::Response response} is a pageable response and is Enumerable. For details on usage see {Aws::PageableResponse PageableResponse}.
|
459
459
|
#
|
460
|
+
#
|
461
|
+
# @example Example: To retrieve the secret values for a group of secrets listed by name
|
462
|
+
#
|
463
|
+
# # The following example gets the values for three secrets.
|
464
|
+
#
|
465
|
+
# resp = client.batch_get_secret_value({
|
466
|
+
# secret_id_list: [
|
467
|
+
# "MySecret1",
|
468
|
+
# "MySecret2",
|
469
|
+
# "MySecret3",
|
470
|
+
# ],
|
471
|
+
# })
|
472
|
+
#
|
473
|
+
# resp.to_h outputs the following:
|
474
|
+
# {
|
475
|
+
# errors: [
|
476
|
+
# ],
|
477
|
+
# secret_values: [
|
478
|
+
# {
|
479
|
+
# arn: "®ion-arn;&asm-service-name;:us-west-2:&ExampleAccountId;:secret:MySecret1-a1b2c3",
|
480
|
+
# created_date: Time.parse(1700591229.801),
|
481
|
+
# name: "MySecret1",
|
482
|
+
# secret_string: "{\"username\":\"diego_ramirez\",\"password\":\"EXAMPLE-PASSWORD\",\"engine\":\"mysql\",\"host\":\"secretsmanagertutorial.cluster.us-west-2.rds.amazonaws.com\",\"port\":3306,\"dbClusterIdentifier\":\"secretsmanagertutorial\"}",
|
483
|
+
# version_id: "a1b2c3d4-5678-90ab-cdef-EXAMPLEaaaaa",
|
484
|
+
# version_stages: [
|
485
|
+
# "AWSCURRENT",
|
486
|
+
# ],
|
487
|
+
# },
|
488
|
+
# {
|
489
|
+
# arn: "®ion-arn;&asm-service-name;:us-west-2:&ExampleAccountId;:secret:MySecret2-a1b2c3",
|
490
|
+
# created_date: Time.parse(1699911394.105),
|
491
|
+
# name: "MySecret2",
|
492
|
+
# secret_string: "{\"username\":\"akua_mansa\",\"password\":\"EXAMPLE-PASSWORD\"",
|
493
|
+
# version_id: "a1b2c3d4-5678-90ab-cdef-EXAMPLEbbbbb",
|
494
|
+
# version_stages: [
|
495
|
+
# "AWSCURRENT",
|
496
|
+
# ],
|
497
|
+
# },
|
498
|
+
# {
|
499
|
+
# arn: "®ion-arn;&asm-service-name;:us-west-2:&ExampleAccountId;:secret:MySecret3-a1b2c3",
|
500
|
+
# created_date: Time.parse(1699911394.105),
|
501
|
+
# name: "MySecret3",
|
502
|
+
# secret_string: "{\"username\":\"jie_liu\",\"password\":\"EXAMPLE-PASSWORD\"",
|
503
|
+
# version_id: "a1b2c3d4-5678-90ab-cdef-EXAMPLEccccc",
|
504
|
+
# version_stages: [
|
505
|
+
# "AWSCURRENT",
|
506
|
+
# ],
|
507
|
+
# },
|
508
|
+
# ],
|
509
|
+
# }
|
510
|
+
#
|
460
511
|
# @example Request syntax with placeholder values
|
461
512
|
#
|
462
513
|
# resp = client.batch_get_secret_value({
|
@@ -1214,7 +1265,9 @@ module Aws::SecretsManager
|
|
1214
1265
|
|
1215
1266
|
# Generates a random password. We recommend that you specify the maximum
|
1216
1267
|
# length and include every character type that the system you are
|
1217
|
-
# generating a password for can support.
|
1268
|
+
# generating a password for can support. By default, Secrets Manager
|
1269
|
+
# uses uppercase and lowercase letters, numbers, and the following
|
1270
|
+
# characters in passwords: `` !"#$%&'()*+,-./:;<=>?@[\\]^_`\{|\}~ ``
|
1218
1271
|
#
|
1219
1272
|
# Secrets Manager generates a CloudTrail log entry when you call this
|
1220
1273
|
# action. Do not include sensitive information in request parameters
|
@@ -2135,9 +2188,13 @@ module Aws::SecretsManager
|
|
2135
2188
|
# Manager events with CloudTrail][2].
|
2136
2189
|
#
|
2137
2190
|
# <b>Required permissions: </b>
|
2138
|
-
# `secretsmanager:ReplicateSecretToRegions`.
|
2139
|
-
#
|
2140
|
-
#
|
2191
|
+
# `secretsmanager:ReplicateSecretToRegions`. If the primary secret is
|
2192
|
+
# encrypted with a KMS key other than `aws/secretsmanager`, you also
|
2193
|
+
# need `kms:Decrypt` permission to the key. To encrypt the replicated
|
2194
|
+
# secret with a KMS key other than `aws/secretsmanager`, you need
|
2195
|
+
# `kms:GenerateDataKey` and `kms:Encrypt` to the key. For more
|
2196
|
+
# information, see [ IAM policy actions for Secrets Manager][3] and
|
2197
|
+
# [Authentication and access control in Secrets Manager][4].
|
2141
2198
|
#
|
2142
2199
|
#
|
2143
2200
|
#
|
@@ -3188,7 +3245,7 @@ module Aws::SecretsManager
|
|
3188
3245
|
params: params,
|
3189
3246
|
config: config)
|
3190
3247
|
context[:gem_name] = 'aws-sdk-secretsmanager'
|
3191
|
-
context[:gem_version] = '1.
|
3248
|
+
context[:gem_version] = '1.89.0'
|
3192
3249
|
Seahorse::Client::Request.new(handlers, context)
|
3193
3250
|
end
|
3194
3251
|
|
@@ -27,6 +27,12 @@ module Aws::SecretsManager
|
|
27
27
|
if (partition_result = Aws::Endpoints::Matchers.aws_partition(region))
|
28
28
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
29
29
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
30
|
+
if Aws::Endpoints::Matchers.string_equals?("aws", Aws::Endpoints::Matchers.attr(partition_result, "name"))
|
31
|
+
return Aws::Endpoints::Endpoint.new(url: "https://secretsmanager-fips.#{region}.amazonaws.com", headers: {}, properties: {})
|
32
|
+
end
|
33
|
+
if Aws::Endpoints::Matchers.string_equals?("aws-us-gov", Aws::Endpoints::Matchers.attr(partition_result, "name"))
|
34
|
+
return Aws::Endpoints::Endpoint.new(url: "https://secretsmanager-fips.#{region}.amazonaws.com", headers: {}, properties: {})
|
35
|
+
end
|
30
36
|
return Aws::Endpoints::Endpoint.new(url: "https://secretsmanager-fips.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
|
31
37
|
end
|
32
38
|
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
@@ -39,6 +45,15 @@ module Aws::SecretsManager
|
|
39
45
|
end
|
40
46
|
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
41
47
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
48
|
+
if Aws::Endpoints::Matchers.string_equals?("aws", Aws::Endpoints::Matchers.attr(partition_result, "name"))
|
49
|
+
return Aws::Endpoints::Endpoint.new(url: "https://secretsmanager.#{region}.amazonaws.com", headers: {}, properties: {})
|
50
|
+
end
|
51
|
+
if Aws::Endpoints::Matchers.string_equals?("aws-cn", Aws::Endpoints::Matchers.attr(partition_result, "name"))
|
52
|
+
return Aws::Endpoints::Endpoint.new(url: "https://secretsmanager.#{region}.amazonaws.com.cn", headers: {}, properties: {})
|
53
|
+
end
|
54
|
+
if Aws::Endpoints::Matchers.string_equals?("aws-us-gov", Aws::Endpoints::Matchers.attr(partition_result, "name"))
|
55
|
+
return Aws::Endpoints::Endpoint.new(url: "https://secretsmanager.#{region}.amazonaws.com", headers: {}, properties: {})
|
56
|
+
end
|
42
57
|
return Aws::Endpoints::Endpoint.new(url: "https://secretsmanager.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
|
43
58
|
end
|
44
59
|
raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
|
@@ -546,8 +546,8 @@ module Aws::SecretsManager
|
|
546
546
|
#
|
547
547
|
# @!attribute [rw] last_rotated_date
|
548
548
|
# The last date and time that Secrets Manager rotated the secret. If
|
549
|
-
# the secret isn't configured for rotation
|
550
|
-
# null.
|
549
|
+
# the secret isn't configured for rotation or rotation has been
|
550
|
+
# disabled, Secrets Manager returns null.
|
551
551
|
# @return [Time]
|
552
552
|
#
|
553
553
|
# @!attribute [rw] last_changed_date
|
@@ -573,8 +573,8 @@ module Aws::SecretsManager
|
|
573
573
|
#
|
574
574
|
# @!attribute [rw] next_rotation_date
|
575
575
|
# The next rotation is scheduled to occur on or before this date. If
|
576
|
-
# the secret isn't configured for rotation
|
577
|
-
# null.
|
576
|
+
# the secret isn't configured for rotation or rotation has been
|
577
|
+
# disabled, Secrets Manager returns null.
|
578
578
|
# @return [Time]
|
579
579
|
#
|
580
580
|
# @!attribute [rw] tags
|
@@ -912,18 +912,15 @@ module Aws::SecretsManager
|
|
912
912
|
#
|
913
913
|
# @!attribute [rw] secret_binary
|
914
914
|
# The decrypted secret value, if the secret value was originally
|
915
|
-
# provided as binary data in the form of a byte array.
|
916
|
-
#
|
917
|
-
#
|
915
|
+
# provided as binary data in the form of a byte array. When you
|
916
|
+
# retrieve a `SecretBinary` using the HTTP API, the Python SDK, or the
|
917
|
+
# Amazon Web Services CLI, the value is Base64-encoded. Otherwise, it
|
918
|
+
# is not encoded.
|
918
919
|
#
|
919
920
|
# If the secret was created by using the Secrets Manager console, or
|
920
921
|
# if the secret value was originally provided as a string, then this
|
921
922
|
# field is omitted. The secret value appears in `SecretString`
|
922
923
|
# instead.
|
923
|
-
#
|
924
|
-
#
|
925
|
-
#
|
926
|
-
# [1]: https://tools.ietf.org/html/rfc4648#section-4
|
927
924
|
# @return [String]
|
928
925
|
#
|
929
926
|
# @!attribute [rw] secret_string
|
@@ -1867,8 +1864,8 @@ module Aws::SecretsManager
|
|
1867
1864
|
#
|
1868
1865
|
# @!attribute [rw] next_rotation_date
|
1869
1866
|
# The next rotation is scheduled to occur on or before this date. If
|
1870
|
-
# the secret isn't configured for rotation
|
1871
|
-
# null.
|
1867
|
+
# the secret isn't configured for rotation or rotation has been
|
1868
|
+
# disabled, Secrets Manager returns null.
|
1872
1869
|
# @return [Time]
|
1873
1870
|
#
|
1874
1871
|
# @!attribute [rw] tags
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-secretsmanager
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.89.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
|
-
autorequire:
|
8
|
+
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date:
|
11
|
+
date: 2024-01-11 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|
@@ -72,7 +72,7 @@ licenses:
|
|
72
72
|
metadata:
|
73
73
|
source_code_uri: https://github.com/aws/aws-sdk-ruby/tree/version-3/gems/aws-sdk-secretsmanager
|
74
74
|
changelog_uri: https://github.com/aws/aws-sdk-ruby/tree/version-3/gems/aws-sdk-secretsmanager/CHANGELOG.md
|
75
|
-
post_install_message:
|
75
|
+
post_install_message:
|
76
76
|
rdoc_options: []
|
77
77
|
require_paths:
|
78
78
|
- lib
|
@@ -87,8 +87,8 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
87
87
|
- !ruby/object:Gem::Version
|
88
88
|
version: '0'
|
89
89
|
requirements: []
|
90
|
-
rubygems_version: 3.
|
91
|
-
signing_key:
|
90
|
+
rubygems_version: 3.4.10
|
91
|
+
signing_key:
|
92
92
|
specification_version: 4
|
93
93
|
summary: AWS SDK for Ruby - AWS Secrets Manager
|
94
94
|
test_files: []
|