lib/aws-sdk-secretsmanager/client.rb in aws-sdk-secretsmanager-1.40.0 vs lib/aws-sdk-secretsmanager/client.rb in aws-sdk-secretsmanager-1.41.0

- old
+ new

@@ -83,30 +83,45 @@ # following classes: # # * `Aws::Credentials` - Used for configuring static, non-refreshing # credentials. # + # * `Aws::SharedCredentials` - Used for loading static credentials from a + # shared file, such as `~/.aws/config`. + # + # * `Aws::AssumeRoleCredentials` - Used when you need to assume a role. + # + # * `Aws::AssumeRoleWebIdentityCredentials` - Used when you need to + # assume a role after providing credentials via the web. + # + # * `Aws::SSOCredentials` - Used for loading credentials from AWS SSO using an + # access token generated from `aws login`. + # + # * `Aws::ProcessCredentials` - Used for loading credentials from a + # process that outputs to stdout. + # # * `Aws::InstanceProfileCredentials` - Used for loading credentials # from an EC2 IMDS on an EC2 instance. # - # * `Aws::SharedCredentials` - Used for loading credentials from a - # shared file, such as `~/.aws/config`. + # * `Aws::ECSCredentials` - Used for loading credentials from + # instances running in ECS. # - # * `Aws::AssumeRoleCredentials` - Used when you need to assume a role. + # * `Aws::CognitoIdentityCredentials` - Used for loading credentials + # from the Cognito Identity service. # # When `:credentials` are not configured directly, the following # locations will be searched for credentials: # # * `Aws.config[:credentials]` # * The `:access_key_id`, `:secret_access_key`, and `:session_token` options. # * ENV['AWS_ACCESS_KEY_ID'], ENV['AWS_SECRET_ACCESS_KEY'] # * `~/.aws/credentials` # * `~/.aws/config` - # * EC2 IMDS instance profile - When used by default, the timeouts are - # very aggressive. Construct and pass an instance of - # `Aws::InstanceProfileCredentails` to enable retries and extended - # timeouts. + # * EC2/ECS IMDS instance profile - When used by default, the timeouts + # are very aggressive. Construct and pass an instance of + # `Aws::InstanceProfileCredentails` or `Aws::ECSCredentials` to + # enable retries and extended timeouts. # # @option options [required, String] :region # The AWS region to connect to. The configured `:region` is # used to determine the service `:endpoint`. When not passed, # a default `:region` is searched for in the following locations: @@ -604,11 +619,11 @@ # You can use the account default CMK to encrypt and decrypt only if you # call this operation using credentials from the same account that owns # the secret. If the secret resides in a different account, then you # must create a custom CMK and specify the ARN in this field. # - # @option params [String, IO] :secret_binary + # @option params [String, StringIO, File] :secret_binary # (Optional) Specifies binary data that you want to encrypt and store in # the new version of the secret. To use this parameter in the # command-line tools, we recommend that you store your binary data in a # file and then use the appropriate technique for your tool to pass the # contents of the file as a parameter. @@ -2028,11 +2043,11 @@ # # # # [1]: https://wikipedia.org/wiki/Universally_unique_identifier # - # @option params [String, IO] :secret_binary + # @option params [String, StringIO, File] :secret_binary # (Optional) Specifies binary data that you want to encrypt and store in # the new version of the secret. To use this parameter in the # command-line tools, we recommend that you store your binary data in a # file and then use the appropriate technique for your tool to pass the # contents of the file as a parameter. Either `SecretBinary` or @@ -2769,11 +2784,11 @@ # owns the secret. If the secret is in a different account, then you # must create a custom CMK and provide the ARN of that CMK in this # field. The user making the call must have permissions to both the # secret and the CMK in their respective accounts. # - # @option params [String, IO] :secret_binary + # @option params [String, StringIO, File] :secret_binary # (Optional) Specifies updated binary data that you want to encrypt and # store in the new version of the secret. To use this parameter in the # command-line tools, we recommend that you store your binary data in a # file and then use the appropriate technique for your tool to pass the # contents of the file as a parameter. Either `SecretBinary` or @@ -3164,10 +3179,10 @@ operation: config.api.operation(operation_name), client: self, params: params, config: config) context[:gem_name] = 'aws-sdk-secretsmanager' - context[:gem_version] = '1.40.0' + context[:gem_version] = '1.41.0' Seahorse::Client::Request.new(handlers, context) end # @api private # @deprecated