aws-sdk-secretsmanager 1.88.0 → 1.89.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-secretsmanager/client.rb +62 -5
- data/lib/aws-sdk-secretsmanager/types.rb +10 -13
- data/lib/aws-sdk-secretsmanager.rb +1 -1
- metadata +6 -6
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 923abb0f15dbf93c43bc9b78c4e717937965e006f9b7cdd06f62e6a7e7607ee0
|
4
|
+
data.tar.gz: 646436ad1fb5ea3559377f2f42fcbfacc2d99ec543467f672d959bd22e60f03e
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: c499c1ef98120af158f7d307087215836e635e5a5ca293c61def398cb2755d7768efd251feab4359cea0707d5b19599ccb93b365875db30de4e50439dc9a986d
|
7
|
+
data.tar.gz: 90b78a72e59b3259536b84cb542cbb9acce5078ec239d180d0ad0782ff434ffa74d572e7c0b60d268b7f0979a71cfc4975310ac532704f490dedd4bfc972c41e
|
data/CHANGELOG.md
CHANGED
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.89.0
|
@@ -457,6 +457,57 @@ module Aws::SecretsManager
|
|
457
457
|
#
|
458
458
|
# The returned {Seahorse::Client::Response response} is a pageable response and is Enumerable. For details on usage see {Aws::PageableResponse PageableResponse}.
|
459
459
|
#
|
460
|
+
#
|
461
|
+
# @example Example: To retrieve the secret values for a group of secrets listed by name
|
462
|
+
#
|
463
|
+
# # The following example gets the values for three secrets.
|
464
|
+
#
|
465
|
+
# resp = client.batch_get_secret_value({
|
466
|
+
# secret_id_list: [
|
467
|
+
# "MySecret1",
|
468
|
+
# "MySecret2",
|
469
|
+
# "MySecret3",
|
470
|
+
# ],
|
471
|
+
# })
|
472
|
+
#
|
473
|
+
# resp.to_h outputs the following:
|
474
|
+
# {
|
475
|
+
# errors: [
|
476
|
+
# ],
|
477
|
+
# secret_values: [
|
478
|
+
# {
|
479
|
+
# arn: "®ion-arn;&asm-service-name;:us-west-2:&ExampleAccountId;:secret:MySecret1-a1b2c3",
|
480
|
+
# created_date: Time.parse(1700591229.801),
|
481
|
+
# name: "MySecret1",
|
482
|
+
# secret_string: "{\"username\":\"diego_ramirez\",\"password\":\"EXAMPLE-PASSWORD\",\"engine\":\"mysql\",\"host\":\"secretsmanagertutorial.cluster.us-west-2.rds.amazonaws.com\",\"port\":3306,\"dbClusterIdentifier\":\"secretsmanagertutorial\"}",
|
483
|
+
# version_id: "a1b2c3d4-5678-90ab-cdef-EXAMPLEaaaaa",
|
484
|
+
# version_stages: [
|
485
|
+
# "AWSCURRENT",
|
486
|
+
# ],
|
487
|
+
# },
|
488
|
+
# {
|
489
|
+
# arn: "®ion-arn;&asm-service-name;:us-west-2:&ExampleAccountId;:secret:MySecret2-a1b2c3",
|
490
|
+
# created_date: Time.parse(1699911394.105),
|
491
|
+
# name: "MySecret2",
|
492
|
+
# secret_string: "{\"username\":\"akua_mansa\",\"password\":\"EXAMPLE-PASSWORD\"",
|
493
|
+
# version_id: "a1b2c3d4-5678-90ab-cdef-EXAMPLEbbbbb",
|
494
|
+
# version_stages: [
|
495
|
+
# "AWSCURRENT",
|
496
|
+
# ],
|
497
|
+
# },
|
498
|
+
# {
|
499
|
+
# arn: "®ion-arn;&asm-service-name;:us-west-2:&ExampleAccountId;:secret:MySecret3-a1b2c3",
|
500
|
+
# created_date: Time.parse(1699911394.105),
|
501
|
+
# name: "MySecret3",
|
502
|
+
# secret_string: "{\"username\":\"jie_liu\",\"password\":\"EXAMPLE-PASSWORD\"",
|
503
|
+
# version_id: "a1b2c3d4-5678-90ab-cdef-EXAMPLEccccc",
|
504
|
+
# version_stages: [
|
505
|
+
# "AWSCURRENT",
|
506
|
+
# ],
|
507
|
+
# },
|
508
|
+
# ],
|
509
|
+
# }
|
510
|
+
#
|
460
511
|
# @example Request syntax with placeholder values
|
461
512
|
#
|
462
513
|
# resp = client.batch_get_secret_value({
|
@@ -1214,7 +1265,9 @@ module Aws::SecretsManager
|
|
1214
1265
|
|
1215
1266
|
# Generates a random password. We recommend that you specify the maximum
|
1216
1267
|
# length and include every character type that the system you are
|
1217
|
-
# generating a password for can support.
|
1268
|
+
# generating a password for can support. By default, Secrets Manager
|
1269
|
+
# uses uppercase and lowercase letters, numbers, and the following
|
1270
|
+
# characters in passwords: `` !"#$%&'()*+,-./:;<=>?@[\\]^_`\{|\}~ ``
|
1218
1271
|
#
|
1219
1272
|
# Secrets Manager generates a CloudTrail log entry when you call this
|
1220
1273
|
# action. Do not include sensitive information in request parameters
|
@@ -2135,9 +2188,13 @@ module Aws::SecretsManager
|
|
2135
2188
|
# Manager events with CloudTrail][2].
|
2136
2189
|
#
|
2137
2190
|
# <b>Required permissions: </b>
|
2138
|
-
# `secretsmanager:ReplicateSecretToRegions`.
|
2139
|
-
#
|
2140
|
-
#
|
2191
|
+
# `secretsmanager:ReplicateSecretToRegions`. If the primary secret is
|
2192
|
+
# encrypted with a KMS key other than `aws/secretsmanager`, you also
|
2193
|
+
# need `kms:Decrypt` permission to the key. To encrypt the replicated
|
2194
|
+
# secret with a KMS key other than `aws/secretsmanager`, you need
|
2195
|
+
# `kms:GenerateDataKey` and `kms:Encrypt` to the key. For more
|
2196
|
+
# information, see [ IAM policy actions for Secrets Manager][3] and
|
2197
|
+
# [Authentication and access control in Secrets Manager][4].
|
2141
2198
|
#
|
2142
2199
|
#
|
2143
2200
|
#
|
@@ -3188,7 +3245,7 @@ module Aws::SecretsManager
|
|
3188
3245
|
params: params,
|
3189
3246
|
config: config)
|
3190
3247
|
context[:gem_name] = 'aws-sdk-secretsmanager'
|
3191
|
-
context[:gem_version] = '1.
|
3248
|
+
context[:gem_version] = '1.89.0'
|
3192
3249
|
Seahorse::Client::Request.new(handlers, context)
|
3193
3250
|
end
|
3194
3251
|
|
@@ -546,8 +546,8 @@ module Aws::SecretsManager
|
|
546
546
|
#
|
547
547
|
# @!attribute [rw] last_rotated_date
|
548
548
|
# The last date and time that Secrets Manager rotated the secret. If
|
549
|
-
# the secret isn't configured for rotation
|
550
|
-
# null.
|
549
|
+
# the secret isn't configured for rotation or rotation has been
|
550
|
+
# disabled, Secrets Manager returns null.
|
551
551
|
# @return [Time]
|
552
552
|
#
|
553
553
|
# @!attribute [rw] last_changed_date
|
@@ -573,8 +573,8 @@ module Aws::SecretsManager
|
|
573
573
|
#
|
574
574
|
# @!attribute [rw] next_rotation_date
|
575
575
|
# The next rotation is scheduled to occur on or before this date. If
|
576
|
-
# the secret isn't configured for rotation
|
577
|
-
# null.
|
576
|
+
# the secret isn't configured for rotation or rotation has been
|
577
|
+
# disabled, Secrets Manager returns null.
|
578
578
|
# @return [Time]
|
579
579
|
#
|
580
580
|
# @!attribute [rw] tags
|
@@ -912,18 +912,15 @@ module Aws::SecretsManager
|
|
912
912
|
#
|
913
913
|
# @!attribute [rw] secret_binary
|
914
914
|
# The decrypted secret value, if the secret value was originally
|
915
|
-
# provided as binary data in the form of a byte array.
|
916
|
-
#
|
917
|
-
#
|
915
|
+
# provided as binary data in the form of a byte array. When you
|
916
|
+
# retrieve a `SecretBinary` using the HTTP API, the Python SDK, or the
|
917
|
+
# Amazon Web Services CLI, the value is Base64-encoded. Otherwise, it
|
918
|
+
# is not encoded.
|
918
919
|
#
|
919
920
|
# If the secret was created by using the Secrets Manager console, or
|
920
921
|
# if the secret value was originally provided as a string, then this
|
921
922
|
# field is omitted. The secret value appears in `SecretString`
|
922
923
|
# instead.
|
923
|
-
#
|
924
|
-
#
|
925
|
-
#
|
926
|
-
# [1]: https://tools.ietf.org/html/rfc4648#section-4
|
927
924
|
# @return [String]
|
928
925
|
#
|
929
926
|
# @!attribute [rw] secret_string
|
@@ -1867,8 +1864,8 @@ module Aws::SecretsManager
|
|
1867
1864
|
#
|
1868
1865
|
# @!attribute [rw] next_rotation_date
|
1869
1866
|
# The next rotation is scheduled to occur on or before this date. If
|
1870
|
-
# the secret isn't configured for rotation
|
1871
|
-
# null.
|
1867
|
+
# the secret isn't configured for rotation or rotation has been
|
1868
|
+
# disabled, Secrets Manager returns null.
|
1872
1869
|
# @return [Time]
|
1873
1870
|
#
|
1874
1871
|
# @!attribute [rw] tags
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-secretsmanager
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.89.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
|
-
autorequire:
|
8
|
+
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date:
|
11
|
+
date: 2024-01-11 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|
@@ -72,7 +72,7 @@ licenses:
|
|
72
72
|
metadata:
|
73
73
|
source_code_uri: https://github.com/aws/aws-sdk-ruby/tree/version-3/gems/aws-sdk-secretsmanager
|
74
74
|
changelog_uri: https://github.com/aws/aws-sdk-ruby/tree/version-3/gems/aws-sdk-secretsmanager/CHANGELOG.md
|
75
|
-
post_install_message:
|
75
|
+
post_install_message:
|
76
76
|
rdoc_options: []
|
77
77
|
require_paths:
|
78
78
|
- lib
|
@@ -87,8 +87,8 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
87
87
|
- !ruby/object:Gem::Version
|
88
88
|
version: '0'
|
89
89
|
requirements: []
|
90
|
-
rubygems_version: 3.
|
91
|
-
signing_key:
|
90
|
+
rubygems_version: 3.4.10
|
91
|
+
signing_key:
|
92
92
|
specification_version: 4
|
93
93
|
summary: AWS SDK for Ruby - AWS Secrets Manager
|
94
94
|
test_files: []
|