aws-sdk-secretsmanager 1.58.0 → 1.59.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: f09659a24e0631b1aaaa0f7100cfbbf33abf64736e66c68277a10fd458213668
4
- data.tar.gz: 9185e9fea293199255512f4ccc289063207f96af16903adfb4d3a68d8ea8c3d6
3
+ metadata.gz: 53d7a097bb8f0559cb4af375370fb495ca859b2fb472392419f6bd8991e238bf
4
+ data.tar.gz: 52c9f84d3cc5ddacd48cbc6856d7b2757e5644046a7c0366de3ddda6d42e6753
5
5
  SHA512:
6
- metadata.gz: d650b64de401e99dbef7f94e7200b768932ae05757b42b252304733a689f6bd7b12de097aa144c129f17d143e199dd5d2458a6e838b34248692b6e65837836e3
7
- data.tar.gz: 343e78a03f8c96b304d460c015d1651a7ee5f1eff152db46bb479f96ba331ab45e18236de50e326170845d61726d651b354c280657f0b29d79adaefc1472135e
6
+ metadata.gz: 6921e16b817f9831d27d7b53dbc3fb79e1d8e8242758e3ab6e38245f5ea9e33e7b66a87de5822b73d62b8581c544bdddd9ce70373fefd8c75976c5e6b6e3b17d
7
+ data.tar.gz: 133798d6d44dd7262efb23bb94e9807499183057344ba2dfc0aaf304c08225a27f93f7272d8fd66ee128e55d68094cbf63aee77a6e226ea9a8b644c4f16c03ad
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.59.0 (2022-03-11)
5
+ ------------------
6
+
7
+ * Feature - Documentation updates for Secrets Manager.
8
+
4
9
  1.58.0 (2022-02-24)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.58.0
1
+ 1.59.0
@@ -648,7 +648,7 @@ module Aws::SecretsManager
648
648
  # client_request_token: "EXAMPLE1-90ab-cdef-fedc-ba987SECRET1",
649
649
  # description: "My test database secret created with the CLI",
650
650
  # name: "MyTestDatabaseSecret",
651
- # secret_string: "{\"username\":\"david\",\"password\":\"BnQw!XDWgaEeT9XGTT29\"}",
651
+ # secret_string: "{\"username\":\"david\",\"password\":\"EXAMPLE-PASSWORD\"}",
652
652
  # })
653
653
  #
654
654
  # resp.to_h outputs the following:
@@ -933,7 +933,9 @@ module Aws::SecretsManager
933
933
  # rotation_enabled: true,
934
934
  # rotation_lambda_arn: "arn:aws:lambda:us-west-2:123456789012:function:MyTestRotationLambda",
935
935
  # rotation_rules: {
936
- # automatically_after_days: 30,
936
+ # automatically_after_days: 14,
937
+ # duration: "2h",
938
+ # schedule_expression: "cron(0 16 1,15 * ? *)",
937
939
  # },
938
940
  # tags: [
939
941
  # {
@@ -1068,7 +1070,7 @@ module Aws::SecretsManager
1068
1070
  #
1069
1071
  # resp.to_h outputs the following:
1070
1072
  # {
1071
- # random_password: "N+Z43a,>vx7j O8^*<8i3",
1073
+ # random_password: "EXAMPLE-PASSWORD",
1072
1074
  # }
1073
1075
  #
1074
1076
  # @example Request syntax with placeholder values
@@ -1225,13 +1227,10 @@ module Aws::SecretsManager
1225
1227
  #
1226
1228
  # @example Example: To retrieve the encrypted secret value of a secret
1227
1229
  #
1228
- # # The following example shows how to retrieve the secret string value from the version of the secret that has the
1229
- # # AWSPREVIOUS staging label attached. If you want to retrieve the AWSCURRENT version of the secret, then you can omit the
1230
- # # VersionStage parameter because it defaults to AWSCURRENT.
1230
+ # # The following example shows how to retrieve a secret string value.
1231
1231
  #
1232
1232
  # resp = client.get_secret_value({
1233
1233
  # secret_id: "MyTestDatabaseSecret",
1234
- # version_stage: "AWSPREVIOUS",
1235
1234
  # })
1236
1235
  #
1237
1236
  # resp.to_h outputs the following:
@@ -1239,7 +1238,7 @@ module Aws::SecretsManager
1239
1238
  # arn: "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
1240
1239
  # created_date: Time.parse(1523477145.713),
1241
1240
  # name: "MyTestDatabaseSecret",
1242
- # secret_string: "{\n \"username\":\"david\",\n \"password\":\"BnQw&XDWgaEeT9XGTT29\"\n}\n",
1241
+ # secret_string: "{\n \"username\":\"david\",\n \"password\":\"EXAMPLE-PASSWORD\"\n}\n",
1243
1242
  # version_id: "EXAMPLE1-90ab-cdef-fedc-ba987SECRET1",
1244
1243
  # version_stages: [
1245
1244
  # "AWSPREVIOUS",
@@ -1392,7 +1391,8 @@ module Aws::SecretsManager
1392
1391
  end
1393
1392
 
1394
1393
  # Lists the secrets that are stored by Secrets Manager in the Amazon Web
1395
- # Services account.
1394
+ # Services account, not including secrets that are marked for deletion.
1395
+ # To see secrets marked for deletion, use the Secrets Manager console.
1396
1396
  #
1397
1397
  # To list the versions of a secret, use ListSecretVersionIds.
1398
1398
  #
@@ -1742,7 +1742,7 @@ module Aws::SecretsManager
1742
1742
  # resp = client.put_secret_value({
1743
1743
  # client_request_token: "EXAMPLE2-90ab-cdef-fedc-ba987EXAMPLE",
1744
1744
  # secret_id: "MyTestDatabaseSecret",
1745
- # secret_string: "{\"username\":\"david\",\"password\":\"BnQw!XDWgaEeT9XGTT29\"}",
1745
+ # secret_string: "{\"username\":\"david\",\"password\":\"EXAMPLE-PASSWORD\"}",
1746
1746
  # })
1747
1747
  #
1748
1748
  # resp.to_h outputs the following:
@@ -2739,7 +2739,7 @@ module Aws::SecretsManager
2739
2739
  params: params,
2740
2740
  config: config)
2741
2741
  context[:gem_name] = 'aws-sdk-secretsmanager'
2742
- context[:gem_version] = '1.58.0'
2742
+ context[:gem_version] = '1.59.0'
2743
2743
  Seahorse::Client::Request.new(handlers, context)
2744
2744
  end
2745
2745
 
@@ -48,6 +48,6 @@ require_relative 'aws-sdk-secretsmanager/customizations'
48
48
  # @!group service
49
49
  module Aws::SecretsManager
50
50
 
51
- GEM_VERSION = '1.58.0'
51
+ GEM_VERSION = '1.59.0'
52
52
 
53
53
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-secretsmanager
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.58.0
4
+ version: 1.59.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-02-24 00:00:00.000000000 Z
11
+ date: 2022-03-11 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core