aws-sdk-secretsmanager 1.88.0 → 1.89.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 4669f3f52f4980a976f36175a927aa4fe62d5bf28064d563363156fb56c218ab
4
- data.tar.gz: fcb51f2589031a84c72e6c23c56fdd40f09548af8775094270549d9c5ea49a99
3
+ metadata.gz: 923abb0f15dbf93c43bc9b78c4e717937965e006f9b7cdd06f62e6a7e7607ee0
4
+ data.tar.gz: 646436ad1fb5ea3559377f2f42fcbfacc2d99ec543467f672d959bd22e60f03e
5
5
  SHA512:
6
- metadata.gz: 43772884acfcecbb37e2f0459741a188492cad30c5e214e4153b6064f0783c0a8837b6d5fc5d82b2d6ef393009023bbdbe77e4f2198a3d32a9461236f74cffda
7
- data.tar.gz: cf33230683cc1cbc1d55aaf375ebbefcc6f348fd8070e1deb7a3d4ef45a37605f6d19928f7c381bc6860999c37ce67018ae492ecdc0412ae7b8f8d13777988c3
6
+ metadata.gz: c499c1ef98120af158f7d307087215836e635e5a5ca293c61def398cb2755d7768efd251feab4359cea0707d5b19599ccb93b365875db30de4e50439dc9a986d
7
+ data.tar.gz: 90b78a72e59b3259536b84cb542cbb9acce5078ec239d180d0ad0782ff434ffa74d572e7c0b60d268b7f0979a71cfc4975310ac532704f490dedd4bfc972c41e
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.89.0 (2024-01-11)
5
+ ------------------
6
+
7
+ * Feature - Doc only update for Secrets Manager
8
+
4
9
  1.88.0 (2023-12-22)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.88.0
1
+ 1.89.0
@@ -457,6 +457,57 @@ module Aws::SecretsManager
457
457
  #
458
458
  # The returned {Seahorse::Client::Response response} is a pageable response and is Enumerable. For details on usage see {Aws::PageableResponse PageableResponse}.
459
459
  #
460
+ #
461
+ # @example Example: To retrieve the secret values for a group of secrets listed by name
462
+ #
463
+ # # The following example gets the values for three secrets.
464
+ #
465
+ # resp = client.batch_get_secret_value({
466
+ # secret_id_list: [
467
+ # "MySecret1",
468
+ # "MySecret2",
469
+ # "MySecret3",
470
+ # ],
471
+ # })
472
+ #
473
+ # resp.to_h outputs the following:
474
+ # {
475
+ # errors: [
476
+ # ],
477
+ # secret_values: [
478
+ # {
479
+ # arn: "&region-arn;&asm-service-name;:us-west-2:&ExampleAccountId;:secret:MySecret1-a1b2c3",
480
+ # created_date: Time.parse(1700591229.801),
481
+ # name: "MySecret1",
482
+ # secret_string: "{\"username\":\"diego_ramirez\",\"password\":\"EXAMPLE-PASSWORD\",\"engine\":\"mysql\",\"host\":\"secretsmanagertutorial.cluster.us-west-2.rds.amazonaws.com\",\"port\":3306,\"dbClusterIdentifier\":\"secretsmanagertutorial\"}",
483
+ # version_id: "a1b2c3d4-5678-90ab-cdef-EXAMPLEaaaaa",
484
+ # version_stages: [
485
+ # "AWSCURRENT",
486
+ # ],
487
+ # },
488
+ # {
489
+ # arn: "&region-arn;&asm-service-name;:us-west-2:&ExampleAccountId;:secret:MySecret2-a1b2c3",
490
+ # created_date: Time.parse(1699911394.105),
491
+ # name: "MySecret2",
492
+ # secret_string: "{\"username\":\"akua_mansa\",\"password\":\"EXAMPLE-PASSWORD\"",
493
+ # version_id: "a1b2c3d4-5678-90ab-cdef-EXAMPLEbbbbb",
494
+ # version_stages: [
495
+ # "AWSCURRENT",
496
+ # ],
497
+ # },
498
+ # {
499
+ # arn: "&region-arn;&asm-service-name;:us-west-2:&ExampleAccountId;:secret:MySecret3-a1b2c3",
500
+ # created_date: Time.parse(1699911394.105),
501
+ # name: "MySecret3",
502
+ # secret_string: "{\"username\":\"jie_liu\",\"password\":\"EXAMPLE-PASSWORD\"",
503
+ # version_id: "a1b2c3d4-5678-90ab-cdef-EXAMPLEccccc",
504
+ # version_stages: [
505
+ # "AWSCURRENT",
506
+ # ],
507
+ # },
508
+ # ],
509
+ # }
510
+ #
460
511
  # @example Request syntax with placeholder values
461
512
  #
462
513
  # resp = client.batch_get_secret_value({
@@ -1214,7 +1265,9 @@ module Aws::SecretsManager
1214
1265
 
1215
1266
  # Generates a random password. We recommend that you specify the maximum
1216
1267
  # length and include every character type that the system you are
1217
- # generating a password for can support.
1268
+ # generating a password for can support. By default, Secrets Manager
1269
+ # uses uppercase and lowercase letters, numbers, and the following
1270
+ # characters in passwords: `` !"#$%&'()*+,-./:;<=>?@[\\]^_`\{|\}~ ``
1218
1271
  #
1219
1272
  # Secrets Manager generates a CloudTrail log entry when you call this
1220
1273
  # action. Do not include sensitive information in request parameters
@@ -2135,9 +2188,13 @@ module Aws::SecretsManager
2135
2188
  # Manager events with CloudTrail][2].
2136
2189
  #
2137
2190
  # <b>Required permissions: </b>
2138
- # `secretsmanager:ReplicateSecretToRegions`. For more information, see [
2139
- # IAM policy actions for Secrets Manager][3] and [Authentication and
2140
- # access control in Secrets Manager][4].
2191
+ # `secretsmanager:ReplicateSecretToRegions`. If the primary secret is
2192
+ # encrypted with a KMS key other than `aws/secretsmanager`, you also
2193
+ # need `kms:Decrypt` permission to the key. To encrypt the replicated
2194
+ # secret with a KMS key other than `aws/secretsmanager`, you need
2195
+ # `kms:GenerateDataKey` and `kms:Encrypt` to the key. For more
2196
+ # information, see [ IAM policy actions for Secrets Manager][3] and
2197
+ # [Authentication and access control in Secrets Manager][4].
2141
2198
  #
2142
2199
  #
2143
2200
  #
@@ -3188,7 +3245,7 @@ module Aws::SecretsManager
3188
3245
  params: params,
3189
3246
  config: config)
3190
3247
  context[:gem_name] = 'aws-sdk-secretsmanager'
3191
- context[:gem_version] = '1.88.0'
3248
+ context[:gem_version] = '1.89.0'
3192
3249
  Seahorse::Client::Request.new(handlers, context)
3193
3250
  end
3194
3251
 
@@ -546,8 +546,8 @@ module Aws::SecretsManager
546
546
  #
547
547
  # @!attribute [rw] last_rotated_date
548
548
  # The last date and time that Secrets Manager rotated the secret. If
549
- # the secret isn't configured for rotation, Secrets Manager returns
550
- # null.
549
+ # the secret isn't configured for rotation or rotation has been
550
+ # disabled, Secrets Manager returns null.
551
551
  # @return [Time]
552
552
  #
553
553
  # @!attribute [rw] last_changed_date
@@ -573,8 +573,8 @@ module Aws::SecretsManager
573
573
  #
574
574
  # @!attribute [rw] next_rotation_date
575
575
  # The next rotation is scheduled to occur on or before this date. If
576
- # the secret isn't configured for rotation, Secrets Manager returns
577
- # null.
576
+ # the secret isn't configured for rotation or rotation has been
577
+ # disabled, Secrets Manager returns null.
578
578
  # @return [Time]
579
579
  #
580
580
  # @!attribute [rw] tags
@@ -912,18 +912,15 @@ module Aws::SecretsManager
912
912
  #
913
913
  # @!attribute [rw] secret_binary
914
914
  # The decrypted secret value, if the secret value was originally
915
- # provided as binary data in the form of a byte array. The response
916
- # parameter represents the binary data as a [base64-encoded][1]
917
- # string.
915
+ # provided as binary data in the form of a byte array. When you
916
+ # retrieve a `SecretBinary` using the HTTP API, the Python SDK, or the
917
+ # Amazon Web Services CLI, the value is Base64-encoded. Otherwise, it
918
+ # is not encoded.
918
919
  #
919
920
  # If the secret was created by using the Secrets Manager console, or
920
921
  # if the secret value was originally provided as a string, then this
921
922
  # field is omitted. The secret value appears in `SecretString`
922
923
  # instead.
923
- #
924
- #
925
- #
926
- # [1]: https://tools.ietf.org/html/rfc4648#section-4
927
924
  # @return [String]
928
925
  #
929
926
  # @!attribute [rw] secret_string
@@ -1867,8 +1864,8 @@ module Aws::SecretsManager
1867
1864
  #
1868
1865
  # @!attribute [rw] next_rotation_date
1869
1866
  # The next rotation is scheduled to occur on or before this date. If
1870
- # the secret isn't configured for rotation, Secrets Manager returns
1871
- # null.
1867
+ # the secret isn't configured for rotation or rotation has been
1868
+ # disabled, Secrets Manager returns null.
1872
1869
  # @return [Time]
1873
1870
  #
1874
1871
  # @!attribute [rw] tags
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-secretsmanager/customizations'
52
52
  # @!group service
53
53
  module Aws::SecretsManager
54
54
 
55
- GEM_VERSION = '1.88.0'
55
+ GEM_VERSION = '1.89.0'
56
56
 
57
57
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-secretsmanager
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.88.0
4
+ version: 1.89.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
- autorequire:
8
+ autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-12-22 00:00:00.000000000 Z
11
+ date: 2024-01-11 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -72,7 +72,7 @@ licenses:
72
72
  metadata:
73
73
  source_code_uri: https://github.com/aws/aws-sdk-ruby/tree/version-3/gems/aws-sdk-secretsmanager
74
74
  changelog_uri: https://github.com/aws/aws-sdk-ruby/tree/version-3/gems/aws-sdk-secretsmanager/CHANGELOG.md
75
- post_install_message:
75
+ post_install_message:
76
76
  rdoc_options: []
77
77
  require_paths:
78
78
  - lib
@@ -87,8 +87,8 @@ required_rubygems_version: !ruby/object:Gem::Requirement
87
87
  - !ruby/object:Gem::Version
88
88
  version: '0'
89
89
  requirements: []
90
- rubygems_version: 3.1.6
91
- signing_key:
90
+ rubygems_version: 3.4.10
91
+ signing_key:
92
92
  specification_version: 4
93
93
  summary: AWS SDK for Ruby - AWS Secrets Manager
94
94
  test_files: []