lib/aws-sdk-secretsmanager/client.rb in aws-sdk-secretsmanager-1.58.0 vs lib/aws-sdk-secretsmanager/client.rb in aws-sdk-secretsmanager-1.59.0

- old
+ new

@@ -646,11 +646,11 @@ # # resp = client.create_secret({ # client_request_token: "EXAMPLE1-90ab-cdef-fedc-ba987SECRET1", # description: "My test database secret created with the CLI", # name: "MyTestDatabaseSecret", - # secret_string: "{\"username\":\"david\",\"password\":\"BnQw!XDWgaEeT9XGTT29\"}", + # secret_string: "{\"username\":\"david\",\"password\":\"EXAMPLE-PASSWORD\"}", # }) # # resp.to_h outputs the following: # { # arn: "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3", @@ -931,11 +931,13 @@ # last_rotated_date: Time.parse(1525747253.72), # name: "MyTestDatabaseSecret", # rotation_enabled: true, # rotation_lambda_arn: "arn:aws:lambda:us-west-2:123456789012:function:MyTestRotationLambda", # rotation_rules: { - # automatically_after_days: 30, + # automatically_after_days: 14, + # duration: "2h", + # schedule_expression: "cron(0 16 1,15 * ? *)", # }, # tags: [ # { # key: "SecondTag", # value: "AnotherValue", @@ -1066,11 +1068,11 @@ # require_each_included_type: true, # }) # # resp.to_h outputs the following: # { - # random_password: "N+Z43a,>vx7j O8^*<8i3", + # random_password: "EXAMPLE-PASSWORD", # } # # @example Request syntax with placeholder values # # resp = client.get_random_password({ @@ -1223,25 +1225,22 @@ # * {Types::GetSecretValueResponse#created_date #created_date} => Time # # # @example Example: To retrieve the encrypted secret value of a secret # - # # The following example shows how to retrieve the secret string value from the version of the secret that has the - # # AWSPREVIOUS staging label attached. If you want to retrieve the AWSCURRENT version of the secret, then you can omit the - # # VersionStage parameter because it defaults to AWSCURRENT. + # # The following example shows how to retrieve a secret string value. # # resp = client.get_secret_value({ # secret_id: "MyTestDatabaseSecret", - # version_stage: "AWSPREVIOUS", # }) # # resp.to_h outputs the following: # { # arn: "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3", # created_date: Time.parse(1523477145.713), # name: "MyTestDatabaseSecret", - # secret_string: "{\n \"username\":\"david\",\n \"password\":\"BnQw&XDWgaEeT9XGTT29\"\n}\n", + # secret_string: "{\n \"username\":\"david\",\n \"password\":\"EXAMPLE-PASSWORD\"\n}\n", # version_id: "EXAMPLE1-90ab-cdef-fedc-ba987SECRET1", # version_stages: [ # "AWSPREVIOUS", # ], # } @@ -1390,11 +1389,12 @@ req = build_request(:list_secret_version_ids, params) req.send_request(options) end # Lists the secrets that are stored by Secrets Manager in the Amazon Web - # Services account. + # Services account, not including secrets that are marked for deletion. + # To see secrets marked for deletion, use the Secrets Manager console. # # To list the versions of a secret, use ListSecretVersionIds. # # To get the secret value from `SecretString` or `SecretBinary`, call # GetSecretValue. @@ -1740,11 +1740,11 @@ # # command. # # resp = client.put_secret_value({ # client_request_token: "EXAMPLE2-90ab-cdef-fedc-ba987EXAMPLE", # secret_id: "MyTestDatabaseSecret", - # secret_string: "{\"username\":\"david\",\"password\":\"BnQw!XDWgaEeT9XGTT29\"}", + # secret_string: "{\"username\":\"david\",\"password\":\"EXAMPLE-PASSWORD\"}", # }) # # resp.to_h outputs the following: # { # arn: "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3", @@ -2737,10 +2737,10 @@ operation: config.api.operation(operation_name), client: self, params: params, config: config) context[:gem_name] = 'aws-sdk-secretsmanager' - context[:gem_version] = '1.58.0' + context[:gem_version] = '1.59.0' Seahorse::Client::Request.new(handlers, context) end # @api private # @deprecated