aws-sdk-secretsmanager 1.18.0 → 1.19.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 78d398abb721ba008a47a4e1d48e9195befe3487
4
- data.tar.gz: eaf7e8dac62435abb72bfdff3d4e53e10e30f92f
3
+ metadata.gz: 852d0642609633cb4d3a36c10923c74de2d07f80
4
+ data.tar.gz: a98bb71df485aa8197b5fe7bb66180ced0c48ada
5
5
  SHA512:
6
- metadata.gz: 1ee6bf7c1fdadbc50c0162ffdc2a2c6c04f565cf41e891214f0bfd7eda65ff46b00ff7b68a5a3b2800c23c732868e36577e1f5b35cf774dec4b4aab94a6ab3c4
7
- data.tar.gz: 5f6a530d90e3b870b86b1baf10b2ccbe9289eaaccb57807746a1dfa46a9eb1aa487920731b562c178c5fe010f17991ad68afb88c7d4fc6f5768dfd7c5ba7f2df
6
+ metadata.gz: 04327d40ab43dbd8da7a5231689fd41f38a27c3571867420178f0ccea483f6f6750c7dd11b5d58d866c4cb7f3f84ce83265dbee81ae317211e6a62774109b70c
7
+ data.tar.gz: 2c32391148790d0546ca6bf15fe4c44a518333cfab77c2fa994ff6837e0ee681177e9e8590a202277fcce7e9e3265590bd1b32ba149d4ec9518017da1eb8e551
@@ -42,6 +42,6 @@ require_relative 'aws-sdk-secretsmanager/customizations'
42
42
  # @service
43
43
  module Aws::SecretsManager
44
44
 
45
- GEM_VERSION = '1.18.0'
45
+ GEM_VERSION = '1.19.0'
46
46
 
47
47
  end
@@ -329,10 +329,10 @@ module Aws::SecretsManager
329
329
  # managed customer master key (CMK) with the alias
330
330
  # `aws/secretsmanager`. If this key doesn't already exist in your
331
331
  # account then Secrets Manager creates it for you automatically. All
332
- # users in the same AWS account automatically have access to use the
333
- # default CMK. Note that if an Secrets Manager API call results in AWS
334
- # having to create the account's AWS-managed CMK, it can result in a
335
- # one-time significant delay in returning the result.
332
+ # users and roles in the same AWS account automatically have access to
333
+ # use the default CMK. Note that if an Secrets Manager API call
334
+ # results in AWS having to create the account's AWS-managed CMK, it
335
+ # can result in a one-time significant delay in returning the result.
336
336
  #
337
337
  # * If the secret is in a different AWS account from the credentials
338
338
  # calling an API that requires encryption or decryption of the secret
@@ -364,6 +364,9 @@ module Aws::SecretsManager
364
364
  # to encrypt the secret. You do not need this permission to use the
365
365
  # account's default AWS managed CMK for Secrets Manager.
366
366
  #
367
+ # * secretsmanager:TagResource - needed only if you include the `Tags`
368
+ # parameter.
369
+ #
367
370
  # **Related operations**
368
371
  #
369
372
  # * To delete a secret, use DeleteSecret.
@@ -1713,10 +1716,10 @@ module Aws::SecretsManager
1713
1716
  # managed customer master key (CMK) with the alias
1714
1717
  # `aws/secretsmanager`. If this key doesn't already exist in your
1715
1718
  # account then Secrets Manager creates it for you automatically. All
1716
- # users in the same AWS account automatically have access to use the
1717
- # default CMK. Note that if an Secrets Manager API call results in AWS
1718
- # having to create the account's AWS-managed CMK, it can result in a
1719
- # one-time significant delay in returning the result.
1719
+ # users and roles in the same AWS account automatically have access to
1720
+ # use the default CMK. Note that if an Secrets Manager API call
1721
+ # results in AWS having to create the account's AWS-managed CMK, it
1722
+ # can result in a one-time significant delay in returning the result.
1720
1723
  #
1721
1724
  # * If the secret is in a different AWS account from the credentials
1722
1725
  # calling an API that requires encryption or decryption of the secret
@@ -2402,10 +2405,10 @@ module Aws::SecretsManager
2402
2405
  # managed customer master key (CMK) with the alias
2403
2406
  # `aws/secretsmanager`. If this key doesn't already exist in your
2404
2407
  # account then Secrets Manager creates it for you automatically. All
2405
- # users in the same AWS account automatically have access to use the
2406
- # default CMK. Note that if an Secrets Manager API call results in AWS
2407
- # having to create the account's AWS-managed CMK, it can result in a
2408
- # one-time significant delay in returning the result.
2408
+ # users and roles in the same AWS account automatically have access to
2409
+ # use the default CMK. Note that if an Secrets Manager API call
2410
+ # results in AWS having to create the account's AWS-managed CMK, it
2411
+ # can result in a one-time significant delay in returning the result.
2409
2412
  #
2410
2413
  # * If the secret is in a different AWS account from the credentials
2411
2414
  # calling an API that requires encryption or decryption of the secret
@@ -2719,11 +2722,11 @@ module Aws::SecretsManager
2719
2722
  # </note>
2720
2723
  #
2721
2724
  # @option params [required, String] :version_stage
2722
- # The list of staging labels to add to this version.
2725
+ # The staging label to add to this version.
2723
2726
  #
2724
2727
  # @option params [String] :remove_from_version_id
2725
- # Specifies the secret version ID of the version that the staging labels
2726
- # are to be removed from. If the staging label you are trying to attach
2728
+ # Specifies the secret version ID of the version that the staging label
2729
+ # is to be removed from. If the staging label you are trying to attach
2727
2730
  # to one version is already attached to a different version, then you
2728
2731
  # must include this parameter and specify the version that the label is
2729
2732
  # to be removed from. If the label is attached and you either do not
@@ -2732,12 +2735,12 @@ module Aws::SecretsManager
2732
2735
  #
2733
2736
  # @option params [String] :move_to_version_id
2734
2737
  # (Optional) The secret version ID that you want to add the staging
2735
- # labels to. If you want to remove a label from a version, then do not
2738
+ # label to. If you want to remove a label from a version, then do not
2736
2739
  # specify this parameter.
2737
2740
  #
2738
- # If any of the staging labels are already attached to a different
2739
- # version of the secret, then you must also specify the
2740
- # `RemoveFromVersionId` parameter.
2741
+ # If the staging label is already attached to a different version of the
2742
+ # secret, then you must also specify the `RemoveFromVersionId`
2743
+ # parameter.
2741
2744
  #
2742
2745
  # @return [Types::UpdateSecretVersionStageResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
2743
2746
  #
@@ -2835,7 +2838,7 @@ module Aws::SecretsManager
2835
2838
  params: params,
2836
2839
  config: config)
2837
2840
  context[:gem_name] = 'aws-sdk-secretsmanager'
2838
- context[:gem_version] = '1.18.0'
2841
+ context[:gem_version] = '1.19.0'
2839
2842
  Seahorse::Client::Request.new(handlers, context)
2840
2843
  end
2841
2844
 
@@ -2002,13 +2002,13 @@ module Aws::SecretsManager
2002
2002
  # @return [String]
2003
2003
  #
2004
2004
  # @!attribute [rw] version_stage
2005
- # The list of staging labels to add to this version.
2005
+ # The staging label to add to this version.
2006
2006
  # @return [String]
2007
2007
  #
2008
2008
  # @!attribute [rw] remove_from_version_id
2009
2009
  # Specifies the secret version ID of the version that the staging
2010
- # labels are to be removed from. If the staging label you are trying
2011
- # to attach to one version is already attached to a different version,
2010
+ # label is to be removed from. If the staging label you are trying to
2011
+ # attach to one version is already attached to a different version,
2012
2012
  # then you must include this parameter and specify the version that
2013
2013
  # the label is to be removed from. If the label is attached and you
2014
2014
  # either do not specify this parameter, or the version ID does not
@@ -2017,12 +2017,12 @@ module Aws::SecretsManager
2017
2017
  #
2018
2018
  # @!attribute [rw] move_to_version_id
2019
2019
  # (Optional) The secret version ID that you want to add the staging
2020
- # labels to. If you want to remove a label from a version, then do not
2020
+ # label to. If you want to remove a label from a version, then do not
2021
2021
  # specify this parameter.
2022
2022
  #
2023
- # If any of the staging labels are already attached to a different
2024
- # version of the secret, then you must also specify the
2025
- # `RemoveFromVersionId` parameter.
2023
+ # If the staging label is already attached to a different version of
2024
+ # the secret, then you must also specify the `RemoveFromVersionId`
2025
+ # parameter.
2026
2026
  # @return [String]
2027
2027
  #
2028
2028
  # @see http://docs.aws.amazon.com/goto/WebAPI/secretsmanager-2017-10-17/UpdateSecretVersionStageRequest AWS API Documentation
@@ -2036,11 +2036,11 @@ module Aws::SecretsManager
2036
2036
  end
2037
2037
 
2038
2038
  # @!attribute [rw] arn
2039
- # The ARN of the secret with the staging labels that were modified.
2039
+ # The ARN of the secret with the staging label that was modified.
2040
2040
  # @return [String]
2041
2041
  #
2042
2042
  # @!attribute [rw] name
2043
- # The friendly name of the secret with the staging labels that were
2043
+ # The friendly name of the secret with the staging label that was
2044
2044
  # modified.
2045
2045
  # @return [String]
2046
2046
  #
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-secretsmanager
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.18.0
4
+ version: 1.19.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2018-10-24 00:00:00.000000000 Z
11
+ date: 2018-10-31 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core