lib/aws-sdk-secretsmanager/client.rb in aws-sdk-secretsmanager-1.2.0 vs lib/aws-sdk-secretsmanager/client.rb in aws-sdk-secretsmanager-1.3.0

- old
+ new

@@ -293,11 +293,12 @@ # a different AWS account. Store the ARN of the CMK in the secret when # you create the secret or when you update it by including it in the # `KMSKeyId`. If you call an API that must encrypt or decrypt # `SecretString` or `SecretBinary` using credentials from a different # account then the KMS key policy must grant cross-account access to - # that other account's user or role. + # that other account's user or role for both the kms:GenerateDataKey + # and kms:Decrypt operations. # # </note> # # # @@ -309,11 +310,11 @@ # # * kms:GenerateDataKey - needed only if you use a customer-created KMS # key to encrypt the secret. You do not need this permission to use # the account's default AWS managed CMK for Secrets Manager. # - # * kms:Encrypt - needed only if you use a customer-created KMS key to + # * kms:Decrypt - needed only if you use a customer-created KMS key to # encrypt the secret. You do not need this permission to use the # account's default AWS managed CMK for Secrets Manager. # # **Related operations** # @@ -1298,11 +1299,12 @@ # a different AWS account. Store the ARN of the CMK in the secret when # you create the secret or when you update it by including it in the # `KMSKeyId`. If you call an API that must encrypt or decrypt # `SecretString` or `SecretBinary` using credentials from a different # account then the KMS key policy must grant cross-account access to - # that other account's user or role. + # that other account's user or role for both the kms:GenerateDataKey + # and kms:Decrypt operations. # # </note> # # **Minimum permissions** # @@ -1915,11 +1917,12 @@ # a different AWS account. Store the ARN of the CMK in the secret when # you create the secret or when you update it by including it in the # `KMSKeyId`. If you call an API that must encrypt or decrypt # `SecretString` or `SecretBinary` using credentials from a different # account then the KMS key policy must grant cross-account access to - # that other account's user or role. + # that other account's user or role for both the kms:GenerateDataKey + # and kms:Decrypt operations. # # </note> # # **Minimum permissions** # @@ -2299,10 +2302,10 @@ operation: config.api.operation(operation_name), client: self, params: params, config: config) context[:gem_name] = 'aws-sdk-secretsmanager' - context[:gem_version] = '1.2.0' + context[:gem_version] = '1.3.0' Seahorse::Client::Request.new(handlers, context) end # @api private # @deprecated