aws-sdk-secretsmanager 1.18.0 → 1.19.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/aws-sdk-secretsmanager.rb +1 -1
- data/lib/aws-sdk-secretsmanager/client.rb +23 -20
- data/lib/aws-sdk-secretsmanager/types.rb +9 -9
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 852d0642609633cb4d3a36c10923c74de2d07f80
|
4
|
+
data.tar.gz: a98bb71df485aa8197b5fe7bb66180ced0c48ada
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 04327d40ab43dbd8da7a5231689fd41f38a27c3571867420178f0ccea483f6f6750c7dd11b5d58d866c4cb7f3f84ce83265dbee81ae317211e6a62774109b70c
|
7
|
+
data.tar.gz: 2c32391148790d0546ca6bf15fe4c44a518333cfab77c2fa994ff6837e0ee681177e9e8590a202277fcce7e9e3265590bd1b32ba149d4ec9518017da1eb8e551
|
@@ -329,10 +329,10 @@ module Aws::SecretsManager
|
|
329
329
|
# managed customer master key (CMK) with the alias
|
330
330
|
# `aws/secretsmanager`. If this key doesn't already exist in your
|
331
331
|
# account then Secrets Manager creates it for you automatically. All
|
332
|
-
# users in the same AWS account automatically have access to
|
333
|
-
# default CMK. Note that if an Secrets Manager API call
|
334
|
-
# having to create the account's AWS-managed CMK, it
|
335
|
-
# one-time significant delay in returning the result.
|
332
|
+
# users and roles in the same AWS account automatically have access to
|
333
|
+
# use the default CMK. Note that if an Secrets Manager API call
|
334
|
+
# results in AWS having to create the account's AWS-managed CMK, it
|
335
|
+
# can result in a one-time significant delay in returning the result.
|
336
336
|
#
|
337
337
|
# * If the secret is in a different AWS account from the credentials
|
338
338
|
# calling an API that requires encryption or decryption of the secret
|
@@ -364,6 +364,9 @@ module Aws::SecretsManager
|
|
364
364
|
# to encrypt the secret. You do not need this permission to use the
|
365
365
|
# account's default AWS managed CMK for Secrets Manager.
|
366
366
|
#
|
367
|
+
# * secretsmanager:TagResource - needed only if you include the `Tags`
|
368
|
+
# parameter.
|
369
|
+
#
|
367
370
|
# **Related operations**
|
368
371
|
#
|
369
372
|
# * To delete a secret, use DeleteSecret.
|
@@ -1713,10 +1716,10 @@ module Aws::SecretsManager
|
|
1713
1716
|
# managed customer master key (CMK) with the alias
|
1714
1717
|
# `aws/secretsmanager`. If this key doesn't already exist in your
|
1715
1718
|
# account then Secrets Manager creates it for you automatically. All
|
1716
|
-
# users in the same AWS account automatically have access to
|
1717
|
-
# default CMK. Note that if an Secrets Manager API call
|
1718
|
-
# having to create the account's AWS-managed CMK, it
|
1719
|
-
# one-time significant delay in returning the result.
|
1719
|
+
# users and roles in the same AWS account automatically have access to
|
1720
|
+
# use the default CMK. Note that if an Secrets Manager API call
|
1721
|
+
# results in AWS having to create the account's AWS-managed CMK, it
|
1722
|
+
# can result in a one-time significant delay in returning the result.
|
1720
1723
|
#
|
1721
1724
|
# * If the secret is in a different AWS account from the credentials
|
1722
1725
|
# calling an API that requires encryption or decryption of the secret
|
@@ -2402,10 +2405,10 @@ module Aws::SecretsManager
|
|
2402
2405
|
# managed customer master key (CMK) with the alias
|
2403
2406
|
# `aws/secretsmanager`. If this key doesn't already exist in your
|
2404
2407
|
# account then Secrets Manager creates it for you automatically. All
|
2405
|
-
# users in the same AWS account automatically have access to
|
2406
|
-
# default CMK. Note that if an Secrets Manager API call
|
2407
|
-
# having to create the account's AWS-managed CMK, it
|
2408
|
-
# one-time significant delay in returning the result.
|
2408
|
+
# users and roles in the same AWS account automatically have access to
|
2409
|
+
# use the default CMK. Note that if an Secrets Manager API call
|
2410
|
+
# results in AWS having to create the account's AWS-managed CMK, it
|
2411
|
+
# can result in a one-time significant delay in returning the result.
|
2409
2412
|
#
|
2410
2413
|
# * If the secret is in a different AWS account from the credentials
|
2411
2414
|
# calling an API that requires encryption or decryption of the secret
|
@@ -2719,11 +2722,11 @@ module Aws::SecretsManager
|
|
2719
2722
|
# </note>
|
2720
2723
|
#
|
2721
2724
|
# @option params [required, String] :version_stage
|
2722
|
-
# The
|
2725
|
+
# The staging label to add to this version.
|
2723
2726
|
#
|
2724
2727
|
# @option params [String] :remove_from_version_id
|
2725
|
-
# Specifies the secret version ID of the version that the staging
|
2726
|
-
#
|
2728
|
+
# Specifies the secret version ID of the version that the staging label
|
2729
|
+
# is to be removed from. If the staging label you are trying to attach
|
2727
2730
|
# to one version is already attached to a different version, then you
|
2728
2731
|
# must include this parameter and specify the version that the label is
|
2729
2732
|
# to be removed from. If the label is attached and you either do not
|
@@ -2732,12 +2735,12 @@ module Aws::SecretsManager
|
|
2732
2735
|
#
|
2733
2736
|
# @option params [String] :move_to_version_id
|
2734
2737
|
# (Optional) The secret version ID that you want to add the staging
|
2735
|
-
#
|
2738
|
+
# label to. If you want to remove a label from a version, then do not
|
2736
2739
|
# specify this parameter.
|
2737
2740
|
#
|
2738
|
-
# If
|
2739
|
-
#
|
2740
|
-
#
|
2741
|
+
# If the staging label is already attached to a different version of the
|
2742
|
+
# secret, then you must also specify the `RemoveFromVersionId`
|
2743
|
+
# parameter.
|
2741
2744
|
#
|
2742
2745
|
# @return [Types::UpdateSecretVersionStageResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
2743
2746
|
#
|
@@ -2835,7 +2838,7 @@ module Aws::SecretsManager
|
|
2835
2838
|
params: params,
|
2836
2839
|
config: config)
|
2837
2840
|
context[:gem_name] = 'aws-sdk-secretsmanager'
|
2838
|
-
context[:gem_version] = '1.
|
2841
|
+
context[:gem_version] = '1.19.0'
|
2839
2842
|
Seahorse::Client::Request.new(handlers, context)
|
2840
2843
|
end
|
2841
2844
|
|
@@ -2002,13 +2002,13 @@ module Aws::SecretsManager
|
|
2002
2002
|
# @return [String]
|
2003
2003
|
#
|
2004
2004
|
# @!attribute [rw] version_stage
|
2005
|
-
# The
|
2005
|
+
# The staging label to add to this version.
|
2006
2006
|
# @return [String]
|
2007
2007
|
#
|
2008
2008
|
# @!attribute [rw] remove_from_version_id
|
2009
2009
|
# Specifies the secret version ID of the version that the staging
|
2010
|
-
#
|
2011
|
-
#
|
2010
|
+
# label is to be removed from. If the staging label you are trying to
|
2011
|
+
# attach to one version is already attached to a different version,
|
2012
2012
|
# then you must include this parameter and specify the version that
|
2013
2013
|
# the label is to be removed from. If the label is attached and you
|
2014
2014
|
# either do not specify this parameter, or the version ID does not
|
@@ -2017,12 +2017,12 @@ module Aws::SecretsManager
|
|
2017
2017
|
#
|
2018
2018
|
# @!attribute [rw] move_to_version_id
|
2019
2019
|
# (Optional) The secret version ID that you want to add the staging
|
2020
|
-
#
|
2020
|
+
# label to. If you want to remove a label from a version, then do not
|
2021
2021
|
# specify this parameter.
|
2022
2022
|
#
|
2023
|
-
# If
|
2024
|
-
#
|
2025
|
-
#
|
2023
|
+
# If the staging label is already attached to a different version of
|
2024
|
+
# the secret, then you must also specify the `RemoveFromVersionId`
|
2025
|
+
# parameter.
|
2026
2026
|
# @return [String]
|
2027
2027
|
#
|
2028
2028
|
# @see http://docs.aws.amazon.com/goto/WebAPI/secretsmanager-2017-10-17/UpdateSecretVersionStageRequest AWS API Documentation
|
@@ -2036,11 +2036,11 @@ module Aws::SecretsManager
|
|
2036
2036
|
end
|
2037
2037
|
|
2038
2038
|
# @!attribute [rw] arn
|
2039
|
-
# The ARN of the secret with the staging
|
2039
|
+
# The ARN of the secret with the staging label that was modified.
|
2040
2040
|
# @return [String]
|
2041
2041
|
#
|
2042
2042
|
# @!attribute [rw] name
|
2043
|
-
# The friendly name of the secret with the staging
|
2043
|
+
# The friendly name of the secret with the staging label that was
|
2044
2044
|
# modified.
|
2045
2045
|
# @return [String]
|
2046
2046
|
#
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-secretsmanager
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.19.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2018-10-
|
11
|
+
date: 2018-10-31 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|