aws-sdk-secretsmanager 1.58.0 → 1.59.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-secretsmanager/client.rb +11 -11
- data/lib/aws-sdk-secretsmanager.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 53d7a097bb8f0559cb4af375370fb495ca859b2fb472392419f6bd8991e238bf
|
|
4
|
+
data.tar.gz: 52c9f84d3cc5ddacd48cbc6856d7b2757e5644046a7c0366de3ddda6d42e6753
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 6921e16b817f9831d27d7b53dbc3fb79e1d8e8242758e3ab6e38245f5ea9e33e7b66a87de5822b73d62b8581c544bdddd9ce70373fefd8c75976c5e6b6e3b17d
|
|
7
|
+
data.tar.gz: 133798d6d44dd7262efb23bb94e9807499183057344ba2dfc0aaf304c08225a27f93f7272d8fd66ee128e55d68094cbf63aee77a6e226ea9a8b644c4f16c03ad
|
data/CHANGELOG.md
CHANGED
data/VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.
|
|
1
|
+
1.59.0
|
|
@@ -648,7 +648,7 @@ module Aws::SecretsManager
|
|
|
648
648
|
# client_request_token: "EXAMPLE1-90ab-cdef-fedc-ba987SECRET1",
|
|
649
649
|
# description: "My test database secret created with the CLI",
|
|
650
650
|
# name: "MyTestDatabaseSecret",
|
|
651
|
-
# secret_string: "{\"username\":\"david\",\"password\":\"
|
|
651
|
+
# secret_string: "{\"username\":\"david\",\"password\":\"EXAMPLE-PASSWORD\"}",
|
|
652
652
|
# })
|
|
653
653
|
#
|
|
654
654
|
# resp.to_h outputs the following:
|
|
@@ -933,7 +933,9 @@ module Aws::SecretsManager
|
|
|
933
933
|
# rotation_enabled: true,
|
|
934
934
|
# rotation_lambda_arn: "arn:aws:lambda:us-west-2:123456789012:function:MyTestRotationLambda",
|
|
935
935
|
# rotation_rules: {
|
|
936
|
-
# automatically_after_days:
|
|
936
|
+
# automatically_after_days: 14,
|
|
937
|
+
# duration: "2h",
|
|
938
|
+
# schedule_expression: "cron(0 16 1,15 * ? *)",
|
|
937
939
|
# },
|
|
938
940
|
# tags: [
|
|
939
941
|
# {
|
|
@@ -1068,7 +1070,7 @@ module Aws::SecretsManager
|
|
|
1068
1070
|
#
|
|
1069
1071
|
# resp.to_h outputs the following:
|
|
1070
1072
|
# {
|
|
1071
|
-
# random_password: "
|
|
1073
|
+
# random_password: "EXAMPLE-PASSWORD",
|
|
1072
1074
|
# }
|
|
1073
1075
|
#
|
|
1074
1076
|
# @example Request syntax with placeholder values
|
|
@@ -1225,13 +1227,10 @@ module Aws::SecretsManager
|
|
|
1225
1227
|
#
|
|
1226
1228
|
# @example Example: To retrieve the encrypted secret value of a secret
|
|
1227
1229
|
#
|
|
1228
|
-
# # The following example shows how to retrieve
|
|
1229
|
-
# # AWSPREVIOUS staging label attached. If you want to retrieve the AWSCURRENT version of the secret, then you can omit the
|
|
1230
|
-
# # VersionStage parameter because it defaults to AWSCURRENT.
|
|
1230
|
+
# # The following example shows how to retrieve a secret string value.
|
|
1231
1231
|
#
|
|
1232
1232
|
# resp = client.get_secret_value({
|
|
1233
1233
|
# secret_id: "MyTestDatabaseSecret",
|
|
1234
|
-
# version_stage: "AWSPREVIOUS",
|
|
1235
1234
|
# })
|
|
1236
1235
|
#
|
|
1237
1236
|
# resp.to_h outputs the following:
|
|
@@ -1239,7 +1238,7 @@ module Aws::SecretsManager
|
|
|
1239
1238
|
# arn: "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
|
|
1240
1239
|
# created_date: Time.parse(1523477145.713),
|
|
1241
1240
|
# name: "MyTestDatabaseSecret",
|
|
1242
|
-
# secret_string: "{\n \"username\":\"david\",\n \"password\":\"
|
|
1241
|
+
# secret_string: "{\n \"username\":\"david\",\n \"password\":\"EXAMPLE-PASSWORD\"\n}\n",
|
|
1243
1242
|
# version_id: "EXAMPLE1-90ab-cdef-fedc-ba987SECRET1",
|
|
1244
1243
|
# version_stages: [
|
|
1245
1244
|
# "AWSPREVIOUS",
|
|
@@ -1392,7 +1391,8 @@ module Aws::SecretsManager
|
|
|
1392
1391
|
end
|
|
1393
1392
|
|
|
1394
1393
|
# Lists the secrets that are stored by Secrets Manager in the Amazon Web
|
|
1395
|
-
# Services account.
|
|
1394
|
+
# Services account, not including secrets that are marked for deletion.
|
|
1395
|
+
# To see secrets marked for deletion, use the Secrets Manager console.
|
|
1396
1396
|
#
|
|
1397
1397
|
# To list the versions of a secret, use ListSecretVersionIds.
|
|
1398
1398
|
#
|
|
@@ -1742,7 +1742,7 @@ module Aws::SecretsManager
|
|
|
1742
1742
|
# resp = client.put_secret_value({
|
|
1743
1743
|
# client_request_token: "EXAMPLE2-90ab-cdef-fedc-ba987EXAMPLE",
|
|
1744
1744
|
# secret_id: "MyTestDatabaseSecret",
|
|
1745
|
-
# secret_string: "{\"username\":\"david\",\"password\":\"
|
|
1745
|
+
# secret_string: "{\"username\":\"david\",\"password\":\"EXAMPLE-PASSWORD\"}",
|
|
1746
1746
|
# })
|
|
1747
1747
|
#
|
|
1748
1748
|
# resp.to_h outputs the following:
|
|
@@ -2739,7 +2739,7 @@ module Aws::SecretsManager
|
|
|
2739
2739
|
params: params,
|
|
2740
2740
|
config: config)
|
|
2741
2741
|
context[:gem_name] = 'aws-sdk-secretsmanager'
|
|
2742
|
-
context[:gem_version] = '1.
|
|
2742
|
+
context[:gem_version] = '1.59.0'
|
|
2743
2743
|
Seahorse::Client::Request.new(handlers, context)
|
|
2744
2744
|
end
|
|
2745
2745
|
|
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: aws-sdk-secretsmanager
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 1.
|
|
4
|
+
version: 1.59.0
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Amazon Web Services
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2022-
|
|
11
|
+
date: 2022-03-11 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: aws-sdk-core
|