aws-sdk-secretsmanager 1.18.0 → 1.19.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 78d398abb721ba008a47a4e1d48e9195befe3487
4
- data.tar.gz: eaf7e8dac62435abb72bfdff3d4e53e10e30f92f
3
+ metadata.gz: 852d0642609633cb4d3a36c10923c74de2d07f80
4
+ data.tar.gz: a98bb71df485aa8197b5fe7bb66180ced0c48ada
5
5
  SHA512:
6
- metadata.gz: 1ee6bf7c1fdadbc50c0162ffdc2a2c6c04f565cf41e891214f0bfd7eda65ff46b00ff7b68a5a3b2800c23c732868e36577e1f5b35cf774dec4b4aab94a6ab3c4
7
- data.tar.gz: 5f6a530d90e3b870b86b1baf10b2ccbe9289eaaccb57807746a1dfa46a9eb1aa487920731b562c178c5fe010f17991ad68afb88c7d4fc6f5768dfd7c5ba7f2df
6
+ metadata.gz: 04327d40ab43dbd8da7a5231689fd41f38a27c3571867420178f0ccea483f6f6750c7dd11b5d58d866c4cb7f3f84ce83265dbee81ae317211e6a62774109b70c
7
+ data.tar.gz: 2c32391148790d0546ca6bf15fe4c44a518333cfab77c2fa994ff6837e0ee681177e9e8590a202277fcce7e9e3265590bd1b32ba149d4ec9518017da1eb8e551
@@ -42,6 +42,6 @@ require_relative 'aws-sdk-secretsmanager/customizations'
42
42
  # @service
43
43
  module Aws::SecretsManager
44
44
 
45
- GEM_VERSION = '1.18.0'
45
+ GEM_VERSION = '1.19.0'
46
46
 
47
47
  end
@@ -329,10 +329,10 @@ module Aws::SecretsManager
329
329
  # managed customer master key (CMK) with the alias
330
330
  # `aws/secretsmanager`. If this key doesn't already exist in your
331
331
  # account then Secrets Manager creates it for you automatically. All
332
- # users in the same AWS account automatically have access to use the
333
- # default CMK. Note that if an Secrets Manager API call results in AWS
334
- # having to create the account's AWS-managed CMK, it can result in a
335
- # one-time significant delay in returning the result.
332
+ # users and roles in the same AWS account automatically have access to
333
+ # use the default CMK. Note that if an Secrets Manager API call
334
+ # results in AWS having to create the account's AWS-managed CMK, it
335
+ # can result in a one-time significant delay in returning the result.
336
336
  #
337
337
  # * If the secret is in a different AWS account from the credentials
338
338
  # calling an API that requires encryption or decryption of the secret
@@ -364,6 +364,9 @@ module Aws::SecretsManager
364
364
  # to encrypt the secret. You do not need this permission to use the
365
365
  # account's default AWS managed CMK for Secrets Manager.
366
366
  #
367
+ # * secretsmanager:TagResource - needed only if you include the `Tags`
368
+ # parameter.
369
+ #
367
370
  # **Related operations**
368
371
  #
369
372
  # * To delete a secret, use DeleteSecret.
@@ -1713,10 +1716,10 @@ module Aws::SecretsManager
1713
1716
  # managed customer master key (CMK) with the alias
1714
1717
  # `aws/secretsmanager`. If this key doesn't already exist in your
1715
1718
  # account then Secrets Manager creates it for you automatically. All
1716
- # users in the same AWS account automatically have access to use the
1717
- # default CMK. Note that if an Secrets Manager API call results in AWS
1718
- # having to create the account's AWS-managed CMK, it can result in a
1719
- # one-time significant delay in returning the result.
1719
+ # users and roles in the same AWS account automatically have access to
1720
+ # use the default CMK. Note that if an Secrets Manager API call
1721
+ # results in AWS having to create the account's AWS-managed CMK, it
1722
+ # can result in a one-time significant delay in returning the result.
1720
1723
  #
1721
1724
  # * If the secret is in a different AWS account from the credentials
1722
1725
  # calling an API that requires encryption or decryption of the secret
@@ -2402,10 +2405,10 @@ module Aws::SecretsManager
2402
2405
  # managed customer master key (CMK) with the alias
2403
2406
  # `aws/secretsmanager`. If this key doesn't already exist in your
2404
2407
  # account then Secrets Manager creates it for you automatically. All
2405
- # users in the same AWS account automatically have access to use the
2406
- # default CMK. Note that if an Secrets Manager API call results in AWS
2407
- # having to create the account's AWS-managed CMK, it can result in a
2408
- # one-time significant delay in returning the result.
2408
+ # users and roles in the same AWS account automatically have access to
2409
+ # use the default CMK. Note that if an Secrets Manager API call
2410
+ # results in AWS having to create the account's AWS-managed CMK, it
2411
+ # can result in a one-time significant delay in returning the result.
2409
2412
  #
2410
2413
  # * If the secret is in a different AWS account from the credentials
2411
2414
  # calling an API that requires encryption or decryption of the secret
@@ -2719,11 +2722,11 @@ module Aws::SecretsManager
2719
2722
  # </note>
2720
2723
  #
2721
2724
  # @option params [required, String] :version_stage
2722
- # The list of staging labels to add to this version.
2725
+ # The staging label to add to this version.
2723
2726
  #
2724
2727
  # @option params [String] :remove_from_version_id
2725
- # Specifies the secret version ID of the version that the staging labels
2726
- # are to be removed from. If the staging label you are trying to attach
2728
+ # Specifies the secret version ID of the version that the staging label
2729
+ # is to be removed from. If the staging label you are trying to attach
2727
2730
  # to one version is already attached to a different version, then you
2728
2731
  # must include this parameter and specify the version that the label is
2729
2732
  # to be removed from. If the label is attached and you either do not
@@ -2732,12 +2735,12 @@ module Aws::SecretsManager
2732
2735
  #
2733
2736
  # @option params [String] :move_to_version_id
2734
2737
  # (Optional) The secret version ID that you want to add the staging
2735
- # labels to. If you want to remove a label from a version, then do not
2738
+ # label to. If you want to remove a label from a version, then do not
2736
2739
  # specify this parameter.
2737
2740
  #
2738
- # If any of the staging labels are already attached to a different
2739
- # version of the secret, then you must also specify the
2740
- # `RemoveFromVersionId` parameter.
2741
+ # If the staging label is already attached to a different version of the
2742
+ # secret, then you must also specify the `RemoveFromVersionId`
2743
+ # parameter.
2741
2744
  #
2742
2745
  # @return [Types::UpdateSecretVersionStageResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
2743
2746
  #
@@ -2835,7 +2838,7 @@ module Aws::SecretsManager
2835
2838
  params: params,
2836
2839
  config: config)
2837
2840
  context[:gem_name] = 'aws-sdk-secretsmanager'
2838
- context[:gem_version] = '1.18.0'
2841
+ context[:gem_version] = '1.19.0'
2839
2842
  Seahorse::Client::Request.new(handlers, context)
2840
2843
  end
2841
2844
 
@@ -2002,13 +2002,13 @@ module Aws::SecretsManager
2002
2002
  # @return [String]
2003
2003
  #
2004
2004
  # @!attribute [rw] version_stage
2005
- # The list of staging labels to add to this version.
2005
+ # The staging label to add to this version.
2006
2006
  # @return [String]
2007
2007
  #
2008
2008
  # @!attribute [rw] remove_from_version_id
2009
2009
  # Specifies the secret version ID of the version that the staging
2010
- # labels are to be removed from. If the staging label you are trying
2011
- # to attach to one version is already attached to a different version,
2010
+ # label is to be removed from. If the staging label you are trying to
2011
+ # attach to one version is already attached to a different version,
2012
2012
  # then you must include this parameter and specify the version that
2013
2013
  # the label is to be removed from. If the label is attached and you
2014
2014
  # either do not specify this parameter, or the version ID does not
@@ -2017,12 +2017,12 @@ module Aws::SecretsManager
2017
2017
  #
2018
2018
  # @!attribute [rw] move_to_version_id
2019
2019
  # (Optional) The secret version ID that you want to add the staging
2020
- # labels to. If you want to remove a label from a version, then do not
2020
+ # label to. If you want to remove a label from a version, then do not
2021
2021
  # specify this parameter.
2022
2022
  #
2023
- # If any of the staging labels are already attached to a different
2024
- # version of the secret, then you must also specify the
2025
- # `RemoveFromVersionId` parameter.
2023
+ # If the staging label is already attached to a different version of
2024
+ # the secret, then you must also specify the `RemoveFromVersionId`
2025
+ # parameter.
2026
2026
  # @return [String]
2027
2027
  #
2028
2028
  # @see http://docs.aws.amazon.com/goto/WebAPI/secretsmanager-2017-10-17/UpdateSecretVersionStageRequest AWS API Documentation
@@ -2036,11 +2036,11 @@ module Aws::SecretsManager
2036
2036
  end
2037
2037
 
2038
2038
  # @!attribute [rw] arn
2039
- # The ARN of the secret with the staging labels that were modified.
2039
+ # The ARN of the secret with the staging label that was modified.
2040
2040
  # @return [String]
2041
2041
  #
2042
2042
  # @!attribute [rw] name
2043
- # The friendly name of the secret with the staging labels that were
2043
+ # The friendly name of the secret with the staging label that was
2044
2044
  # modified.
2045
2045
  # @return [String]
2046
2046
  #
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-secretsmanager
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.18.0
4
+ version: 1.19.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2018-10-24 00:00:00.000000000 Z
11
+ date: 2018-10-31 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core