aws-sdk-secretsmanager 1.3.0 → 1.4.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/aws-sdk-secretsmanager.rb +1 -1
- data/lib/aws-sdk-secretsmanager/client.rb +16 -17
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 2f17237570f95842390c4f41ba74d2c68148a07e
|
4
|
+
data.tar.gz: d1d0f97ae02f336614827ce6a9ceb7d381c6d083
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 7037266f1cd9e210ac1a4b6ba1b1a9ade064617a63b2f78bbd40db4912bb7e260952eb26d731940ffc60e57135f708d4665ad8140f75989b2499274dd31ed113
|
7
|
+
data.tar.gz: 7eee3de54d702b3889516af345f9d433465f71d8a9da37a8c59c64db734c8fdbddc3c51f6934e8fc9ebc800b8f945e3a5af862172bfa83dda8d9fae402b74828
|
@@ -271,8 +271,8 @@ module Aws::SecretsManager
|
|
271
271
|
# the `SecretString` parameter or binary data in the `SecretBinary`
|
272
272
|
# parameter, but not both. If you include `SecretString` or
|
273
273
|
# `SecretBinary` then Secrets Manager also creates an initial secret
|
274
|
-
# version and
|
275
|
-
# the new version
|
274
|
+
# version and automatically attaches the staging label `AWSCURRENT` to
|
275
|
+
# the new version.
|
276
276
|
#
|
277
277
|
# <note markdown="1"> * If you call an operation that needs to encrypt or decrypt the
|
278
278
|
# `SecretString` or `SecretBinary` for a secret in the same account as
|
@@ -1252,7 +1252,8 @@ module Aws::SecretsManager
|
|
1252
1252
|
# Stores a new encrypted secret value in the specified secret. To do
|
1253
1253
|
# this, the operation creates a new version and attaches it to the
|
1254
1254
|
# secret. The version can contain a new `SecretString` value or a new
|
1255
|
-
# `SecretBinary` value.
|
1255
|
+
# `SecretBinary` value. You can also specify the staging labels that are
|
1256
|
+
# initially attached to the new version.
|
1256
1257
|
#
|
1257
1258
|
# <note markdown="1"> The Secrets Manager console uses only the `SecretString` field. To add
|
1258
1259
|
# binary data to a secret with the `SecretBinary` field you must use the
|
@@ -1266,7 +1267,13 @@ module Aws::SecretsManager
|
|
1266
1267
|
#
|
1267
1268
|
# * If another version of this secret already exists, then this
|
1268
1269
|
# operation does not automatically move any staging labels other than
|
1269
|
-
# those that you specify in the `VersionStages` parameter.
|
1270
|
+
# those that you explicitly specify in the `VersionStages` parameter.
|
1271
|
+
#
|
1272
|
+
# * If this operation moves the staging label `AWSCURRENT` from another
|
1273
|
+
# version to this version (because you included it in the
|
1274
|
+
# `StagingLabels` parameter) then Secrets Manager also automatically
|
1275
|
+
# moves the staging label `AWSPREVIOUS` to the version that
|
1276
|
+
# `AWSCURRENT` was removed from.
|
1270
1277
|
#
|
1271
1278
|
# * This operation is idempotent. If a version with a `SecretVersionId`
|
1272
1279
|
# with the same value as the `ClientRequestToken` parameter already
|
@@ -1275,11 +1282,6 @@ module Aws::SecretsManager
|
|
1275
1282
|
# operation fails because you cannot modify an existing version; you
|
1276
1283
|
# can only create new ones.
|
1277
1284
|
#
|
1278
|
-
# * If this operation moves the staging label `AWSCURRENT` to this
|
1279
|
-
# version (because you included it in the `StagingLabels` parameter)
|
1280
|
-
# then Secrets Manager also automatically moves the staging label
|
1281
|
-
# `AWSPREVIOUS` to the version that `AWSCURRENT` was removed from.
|
1282
|
-
#
|
1283
1285
|
# <note markdown="1"> * If you call an operation that needs to encrypt or decrypt the
|
1284
1286
|
# `SecretString` or `SecretBinary` for a secret in the same account as
|
1285
1287
|
# the calling user and that secret doesn't specify a KMS encryption
|
@@ -1886,18 +1888,15 @@ module Aws::SecretsManager
|
|
1886
1888
|
#
|
1887
1889
|
# </note>
|
1888
1890
|
#
|
1889
|
-
# * If this update creates the first version of the secret or if you did
|
1890
|
-
# not include the `VersionStages` parameter then Secrets Manager
|
1891
|
-
# automatically attaches the staging label `AWSCURRENT` to the new
|
1892
|
-
# version and removes it from any version that had it previously. The
|
1893
|
-
# previous version (if any) is then given the staging label
|
1894
|
-
# `AWSPREVIOUS`.
|
1895
|
-
#
|
1896
1891
|
# * If a version with a `SecretVersionId` with the same value as the
|
1897
1892
|
# `ClientRequestToken` parameter already exists, the operation
|
1898
1893
|
# generates an error. You cannot modify an existing version, you can
|
1899
1894
|
# only create new ones.
|
1900
1895
|
#
|
1896
|
+
# * If you include `SecretString` or `SecretBinary` to create a new
|
1897
|
+
# secret version, Secrets Manager automatically attaches the staging
|
1898
|
+
# label `AWSCURRENT` to the new version.
|
1899
|
+
#
|
1901
1900
|
# <note markdown="1"> * If you call an operation that needs to encrypt or decrypt the
|
1902
1901
|
# `SecretString` or `SecretBinary` for a secret in the same account as
|
1903
1902
|
# the calling user and that secret doesn't specify a KMS encryption
|
@@ -2304,7 +2303,7 @@ module Aws::SecretsManager
|
|
2304
2303
|
params: params,
|
2305
2304
|
config: config)
|
2306
2305
|
context[:gem_name] = 'aws-sdk-secretsmanager'
|
2307
|
-
context[:gem_version] = '1.
|
2306
|
+
context[:gem_version] = '1.4.0'
|
2308
2307
|
Seahorse::Client::Request.new(handlers, context)
|
2309
2308
|
end
|
2310
2309
|
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-secretsmanager
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.4.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2018-
|
11
|
+
date: 2018-05-03 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|