lib/aws-sdk-secretsmanager/client.rb in aws-sdk-secretsmanager-1.58.0 vs lib/aws-sdk-secretsmanager/client.rb in aws-sdk-secretsmanager-1.59.0
- old
+ new
@@ -646,11 +646,11 @@
#
# resp = client.create_secret({
# client_request_token: "EXAMPLE1-90ab-cdef-fedc-ba987SECRET1",
# description: "My test database secret created with the CLI",
# name: "MyTestDatabaseSecret",
- # secret_string: "{\"username\":\"david\",\"password\":\"BnQw!XDWgaEeT9XGTT29\"}",
+ # secret_string: "{\"username\":\"david\",\"password\":\"EXAMPLE-PASSWORD\"}",
# })
#
# resp.to_h outputs the following:
# {
# arn: "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
@@ -931,11 +931,13 @@
# last_rotated_date: Time.parse(1525747253.72),
# name: "MyTestDatabaseSecret",
# rotation_enabled: true,
# rotation_lambda_arn: "arn:aws:lambda:us-west-2:123456789012:function:MyTestRotationLambda",
# rotation_rules: {
- # automatically_after_days: 30,
+ # automatically_after_days: 14,
+ # duration: "2h",
+ # schedule_expression: "cron(0 16 1,15 * ? *)",
# },
# tags: [
# {
# key: "SecondTag",
# value: "AnotherValue",
@@ -1066,11 +1068,11 @@
# require_each_included_type: true,
# })
#
# resp.to_h outputs the following:
# {
- # random_password: "N+Z43a,>vx7j O8^*<8i3",
+ # random_password: "EXAMPLE-PASSWORD",
# }
#
# @example Request syntax with placeholder values
#
# resp = client.get_random_password({
@@ -1223,25 +1225,22 @@
# * {Types::GetSecretValueResponse#created_date #created_date} => Time
#
#
# @example Example: To retrieve the encrypted secret value of a secret
#
- # # The following example shows how to retrieve the secret string value from the version of the secret that has the
- # # AWSPREVIOUS staging label attached. If you want to retrieve the AWSCURRENT version of the secret, then you can omit the
- # # VersionStage parameter because it defaults to AWSCURRENT.
+ # # The following example shows how to retrieve a secret string value.
#
# resp = client.get_secret_value({
# secret_id: "MyTestDatabaseSecret",
- # version_stage: "AWSPREVIOUS",
# })
#
# resp.to_h outputs the following:
# {
# arn: "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
# created_date: Time.parse(1523477145.713),
# name: "MyTestDatabaseSecret",
- # secret_string: "{\n \"username\":\"david\",\n \"password\":\"BnQw&XDWgaEeT9XGTT29\"\n}\n",
+ # secret_string: "{\n \"username\":\"david\",\n \"password\":\"EXAMPLE-PASSWORD\"\n}\n",
# version_id: "EXAMPLE1-90ab-cdef-fedc-ba987SECRET1",
# version_stages: [
# "AWSPREVIOUS",
# ],
# }
@@ -1390,11 +1389,12 @@
req = build_request(:list_secret_version_ids, params)
req.send_request(options)
end
# Lists the secrets that are stored by Secrets Manager in the Amazon Web
- # Services account.
+ # Services account, not including secrets that are marked for deletion.
+ # To see secrets marked for deletion, use the Secrets Manager console.
#
# To list the versions of a secret, use ListSecretVersionIds.
#
# To get the secret value from `SecretString` or `SecretBinary`, call
# GetSecretValue.
@@ -1740,11 +1740,11 @@
# # command.
#
# resp = client.put_secret_value({
# client_request_token: "EXAMPLE2-90ab-cdef-fedc-ba987EXAMPLE",
# secret_id: "MyTestDatabaseSecret",
- # secret_string: "{\"username\":\"david\",\"password\":\"BnQw!XDWgaEeT9XGTT29\"}",
+ # secret_string: "{\"username\":\"david\",\"password\":\"EXAMPLE-PASSWORD\"}",
# })
#
# resp.to_h outputs the following:
# {
# arn: "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
@@ -2737,10 +2737,10 @@
operation: config.api.operation(operation_name),
client: self,
params: params,
config: config)
context[:gem_name] = 'aws-sdk-secretsmanager'
- context[:gem_version] = '1.58.0'
+ context[:gem_version] = '1.59.0'
Seahorse::Client::Request.new(handlers, context)
end
# @api private
# @deprecated