aws-sdk-secretsmanager 1.40.0 → 1.41.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/aws-sdk-secretsmanager.rb +2 -2
- data/lib/aws-sdk-secretsmanager/client.rb +26 -11
- metadata +2 -2
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 49a9df70bca437d8d4c359afd6adca86e7c3b32ae4d4c03896f0e829d4bfd7ad
|
|
4
|
+
data.tar.gz: 47834c3354b531844f1ca4116cb0daac6b48527a5e28229aa04da3bceb06fa1c
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 4975ecc76204074581310cb95abf9f00f4f767c95bc258af1dab8b78ab5b95b3bc07fbe8e94ad6d1240ea7c2fc23ac361166dc506a075c1c8dd8aa32f1177287
|
|
7
|
+
data.tar.gz: 7998ad7a9171982145b0319f036fd478660da373c2d5afd9c655c45a9c635b9889e4583b7d8cbb3207369e43067219188ed683d9bfa4beadcc9769e6dd0e76cc
|
|
@@ -85,13 +85,28 @@ module Aws::SecretsManager
|
|
|
85
85
|
# * `Aws::Credentials` - Used for configuring static, non-refreshing
|
|
86
86
|
# credentials.
|
|
87
87
|
#
|
|
88
|
+
# * `Aws::SharedCredentials` - Used for loading static credentials from a
|
|
89
|
+
# shared file, such as `~/.aws/config`.
|
|
90
|
+
#
|
|
91
|
+
# * `Aws::AssumeRoleCredentials` - Used when you need to assume a role.
|
|
92
|
+
#
|
|
93
|
+
# * `Aws::AssumeRoleWebIdentityCredentials` - Used when you need to
|
|
94
|
+
# assume a role after providing credentials via the web.
|
|
95
|
+
#
|
|
96
|
+
# * `Aws::SSOCredentials` - Used for loading credentials from AWS SSO using an
|
|
97
|
+
# access token generated from `aws login`.
|
|
98
|
+
#
|
|
99
|
+
# * `Aws::ProcessCredentials` - Used for loading credentials from a
|
|
100
|
+
# process that outputs to stdout.
|
|
101
|
+
#
|
|
88
102
|
# * `Aws::InstanceProfileCredentials` - Used for loading credentials
|
|
89
103
|
# from an EC2 IMDS on an EC2 instance.
|
|
90
104
|
#
|
|
91
|
-
# * `Aws::
|
|
92
|
-
#
|
|
105
|
+
# * `Aws::ECSCredentials` - Used for loading credentials from
|
|
106
|
+
# instances running in ECS.
|
|
93
107
|
#
|
|
94
|
-
# * `Aws::
|
|
108
|
+
# * `Aws::CognitoIdentityCredentials` - Used for loading credentials
|
|
109
|
+
# from the Cognito Identity service.
|
|
95
110
|
#
|
|
96
111
|
# When `:credentials` are not configured directly, the following
|
|
97
112
|
# locations will be searched for credentials:
|
|
@@ -101,10 +116,10 @@ module Aws::SecretsManager
|
|
|
101
116
|
# * ENV['AWS_ACCESS_KEY_ID'], ENV['AWS_SECRET_ACCESS_KEY']
|
|
102
117
|
# * `~/.aws/credentials`
|
|
103
118
|
# * `~/.aws/config`
|
|
104
|
-
# * EC2 IMDS instance profile - When used by default, the timeouts
|
|
105
|
-
# very aggressive. Construct and pass an instance of
|
|
106
|
-
# `Aws::InstanceProfileCredentails`
|
|
107
|
-
# timeouts.
|
|
119
|
+
# * EC2/ECS IMDS instance profile - When used by default, the timeouts
|
|
120
|
+
# are very aggressive. Construct and pass an instance of
|
|
121
|
+
# `Aws::InstanceProfileCredentails` or `Aws::ECSCredentials` to
|
|
122
|
+
# enable retries and extended timeouts.
|
|
108
123
|
#
|
|
109
124
|
# @option options [required, String] :region
|
|
110
125
|
# The AWS region to connect to. The configured `:region` is
|
|
@@ -606,7 +621,7 @@ module Aws::SecretsManager
|
|
|
606
621
|
# the secret. If the secret resides in a different account, then you
|
|
607
622
|
# must create a custom CMK and specify the ARN in this field.
|
|
608
623
|
#
|
|
609
|
-
# @option params [String,
|
|
624
|
+
# @option params [String, StringIO, File] :secret_binary
|
|
610
625
|
# (Optional) Specifies binary data that you want to encrypt and store in
|
|
611
626
|
# the new version of the secret. To use this parameter in the
|
|
612
627
|
# command-line tools, we recommend that you store your binary data in a
|
|
@@ -2030,7 +2045,7 @@ module Aws::SecretsManager
|
|
|
2030
2045
|
#
|
|
2031
2046
|
# [1]: https://wikipedia.org/wiki/Universally_unique_identifier
|
|
2032
2047
|
#
|
|
2033
|
-
# @option params [String,
|
|
2048
|
+
# @option params [String, StringIO, File] :secret_binary
|
|
2034
2049
|
# (Optional) Specifies binary data that you want to encrypt and store in
|
|
2035
2050
|
# the new version of the secret. To use this parameter in the
|
|
2036
2051
|
# command-line tools, we recommend that you store your binary data in a
|
|
@@ -2771,7 +2786,7 @@ module Aws::SecretsManager
|
|
|
2771
2786
|
# field. The user making the call must have permissions to both the
|
|
2772
2787
|
# secret and the CMK in their respective accounts.
|
|
2773
2788
|
#
|
|
2774
|
-
# @option params [String,
|
|
2789
|
+
# @option params [String, StringIO, File] :secret_binary
|
|
2775
2790
|
# (Optional) Specifies updated binary data that you want to encrypt and
|
|
2776
2791
|
# store in the new version of the secret. To use this parameter in the
|
|
2777
2792
|
# command-line tools, we recommend that you store your binary data in a
|
|
@@ -3166,7 +3181,7 @@ module Aws::SecretsManager
|
|
|
3166
3181
|
params: params,
|
|
3167
3182
|
config: config)
|
|
3168
3183
|
context[:gem_name] = 'aws-sdk-secretsmanager'
|
|
3169
|
-
context[:gem_version] = '1.
|
|
3184
|
+
context[:gem_version] = '1.41.0'
|
|
3170
3185
|
Seahorse::Client::Request.new(handlers, context)
|
|
3171
3186
|
end
|
|
3172
3187
|
|
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: aws-sdk-secretsmanager
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 1.
|
|
4
|
+
version: 1.41.0
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Amazon Web Services
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2020-
|
|
11
|
+
date: 2020-08-25 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: aws-sdk-core
|