aws-sdk-secretsmanager 1.40.0 → 1.41.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/aws-sdk-secretsmanager.rb +2 -2
- data/lib/aws-sdk-secretsmanager/client.rb +26 -11
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 49a9df70bca437d8d4c359afd6adca86e7c3b32ae4d4c03896f0e829d4bfd7ad
|
4
|
+
data.tar.gz: 47834c3354b531844f1ca4116cb0daac6b48527a5e28229aa04da3bceb06fa1c
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 4975ecc76204074581310cb95abf9f00f4f767c95bc258af1dab8b78ab5b95b3bc07fbe8e94ad6d1240ea7c2fc23ac361166dc506a075c1c8dd8aa32f1177287
|
7
|
+
data.tar.gz: 7998ad7a9171982145b0319f036fd478660da373c2d5afd9c655c45a9c635b9889e4583b7d8cbb3207369e43067219188ed683d9bfa4beadcc9769e6dd0e76cc
|
@@ -85,13 +85,28 @@ module Aws::SecretsManager
|
|
85
85
|
# * `Aws::Credentials` - Used for configuring static, non-refreshing
|
86
86
|
# credentials.
|
87
87
|
#
|
88
|
+
# * `Aws::SharedCredentials` - Used for loading static credentials from a
|
89
|
+
# shared file, such as `~/.aws/config`.
|
90
|
+
#
|
91
|
+
# * `Aws::AssumeRoleCredentials` - Used when you need to assume a role.
|
92
|
+
#
|
93
|
+
# * `Aws::AssumeRoleWebIdentityCredentials` - Used when you need to
|
94
|
+
# assume a role after providing credentials via the web.
|
95
|
+
#
|
96
|
+
# * `Aws::SSOCredentials` - Used for loading credentials from AWS SSO using an
|
97
|
+
# access token generated from `aws login`.
|
98
|
+
#
|
99
|
+
# * `Aws::ProcessCredentials` - Used for loading credentials from a
|
100
|
+
# process that outputs to stdout.
|
101
|
+
#
|
88
102
|
# * `Aws::InstanceProfileCredentials` - Used for loading credentials
|
89
103
|
# from an EC2 IMDS on an EC2 instance.
|
90
104
|
#
|
91
|
-
# * `Aws::
|
92
|
-
#
|
105
|
+
# * `Aws::ECSCredentials` - Used for loading credentials from
|
106
|
+
# instances running in ECS.
|
93
107
|
#
|
94
|
-
# * `Aws::
|
108
|
+
# * `Aws::CognitoIdentityCredentials` - Used for loading credentials
|
109
|
+
# from the Cognito Identity service.
|
95
110
|
#
|
96
111
|
# When `:credentials` are not configured directly, the following
|
97
112
|
# locations will be searched for credentials:
|
@@ -101,10 +116,10 @@ module Aws::SecretsManager
|
|
101
116
|
# * ENV['AWS_ACCESS_KEY_ID'], ENV['AWS_SECRET_ACCESS_KEY']
|
102
117
|
# * `~/.aws/credentials`
|
103
118
|
# * `~/.aws/config`
|
104
|
-
# * EC2 IMDS instance profile - When used by default, the timeouts
|
105
|
-
# very aggressive. Construct and pass an instance of
|
106
|
-
# `Aws::InstanceProfileCredentails`
|
107
|
-
# timeouts.
|
119
|
+
# * EC2/ECS IMDS instance profile - When used by default, the timeouts
|
120
|
+
# are very aggressive. Construct and pass an instance of
|
121
|
+
# `Aws::InstanceProfileCredentails` or `Aws::ECSCredentials` to
|
122
|
+
# enable retries and extended timeouts.
|
108
123
|
#
|
109
124
|
# @option options [required, String] :region
|
110
125
|
# The AWS region to connect to. The configured `:region` is
|
@@ -606,7 +621,7 @@ module Aws::SecretsManager
|
|
606
621
|
# the secret. If the secret resides in a different account, then you
|
607
622
|
# must create a custom CMK and specify the ARN in this field.
|
608
623
|
#
|
609
|
-
# @option params [String,
|
624
|
+
# @option params [String, StringIO, File] :secret_binary
|
610
625
|
# (Optional) Specifies binary data that you want to encrypt and store in
|
611
626
|
# the new version of the secret. To use this parameter in the
|
612
627
|
# command-line tools, we recommend that you store your binary data in a
|
@@ -2030,7 +2045,7 @@ module Aws::SecretsManager
|
|
2030
2045
|
#
|
2031
2046
|
# [1]: https://wikipedia.org/wiki/Universally_unique_identifier
|
2032
2047
|
#
|
2033
|
-
# @option params [String,
|
2048
|
+
# @option params [String, StringIO, File] :secret_binary
|
2034
2049
|
# (Optional) Specifies binary data that you want to encrypt and store in
|
2035
2050
|
# the new version of the secret. To use this parameter in the
|
2036
2051
|
# command-line tools, we recommend that you store your binary data in a
|
@@ -2771,7 +2786,7 @@ module Aws::SecretsManager
|
|
2771
2786
|
# field. The user making the call must have permissions to both the
|
2772
2787
|
# secret and the CMK in their respective accounts.
|
2773
2788
|
#
|
2774
|
-
# @option params [String,
|
2789
|
+
# @option params [String, StringIO, File] :secret_binary
|
2775
2790
|
# (Optional) Specifies updated binary data that you want to encrypt and
|
2776
2791
|
# store in the new version of the secret. To use this parameter in the
|
2777
2792
|
# command-line tools, we recommend that you store your binary data in a
|
@@ -3166,7 +3181,7 @@ module Aws::SecretsManager
|
|
3166
3181
|
params: params,
|
3167
3182
|
config: config)
|
3168
3183
|
context[:gem_name] = 'aws-sdk-secretsmanager'
|
3169
|
-
context[:gem_version] = '1.
|
3184
|
+
context[:gem_version] = '1.41.0'
|
3170
3185
|
Seahorse::Client::Request.new(handlers, context)
|
3171
3186
|
end
|
3172
3187
|
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-secretsmanager
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.41.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2020-
|
11
|
+
date: 2020-08-25 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|