lib/aws-sdk-secretsmanager/client.rb in aws-sdk-secretsmanager-1.3.0 vs lib/aws-sdk-secretsmanager/client.rb in aws-sdk-secretsmanager-1.4.0
- old
+ new
@@ -269,12 +269,12 @@
#
# You provide the secret data to be encrypted by putting text in either
# the `SecretString` parameter or binary data in the `SecretBinary`
# parameter, but not both. If you include `SecretString` or
# `SecretBinary` then Secrets Manager also creates an initial secret
- # version and, if you don't supply a staging label, automatically maps
- # the new version's ID to the staging label `AWSCURRENT`.
+ # version and automatically attaches the staging label `AWSCURRENT` to
+ # the new version.
#
# <note markdown="1"> * If you call an operation that needs to encrypt or decrypt the
# `SecretString` or `SecretBinary` for a secret in the same account as
# the calling user and that secret doesn't specify a KMS encryption
# key, Secrets Manager uses the account's default AWS managed
@@ -1250,11 +1250,12 @@
end
# Stores a new encrypted secret value in the specified secret. To do
# this, the operation creates a new version and attaches it to the
# secret. The version can contain a new `SecretString` value or a new
- # `SecretBinary` value.
+ # `SecretBinary` value. You can also specify the staging labels that are
+ # initially attached to the new version.
#
# <note markdown="1"> The Secrets Manager console uses only the `SecretString` field. To add
# binary data to a secret with the `SecretBinary` field you must use the
# AWS CLI or one of the AWS SDKs.
#
@@ -1264,24 +1265,25 @@
# Secrets Manager automatically attaches the staging label
# `AWSCURRENT` to the new version.
#
# * If another version of this secret already exists, then this
# operation does not automatically move any staging labels other than
- # those that you specify in the `VersionStages` parameter.
+ # those that you explicitly specify in the `VersionStages` parameter.
#
+ # * If this operation moves the staging label `AWSCURRENT` from another
+ # version to this version (because you included it in the
+ # `StagingLabels` parameter) then Secrets Manager also automatically
+ # moves the staging label `AWSPREVIOUS` to the version that
+ # `AWSCURRENT` was removed from.
+ #
# * This operation is idempotent. If a version with a `SecretVersionId`
# with the same value as the `ClientRequestToken` parameter already
# exists and you specify the same secret data, the operation succeeds
# but does nothing. However, if the secret data is different, then the
# operation fails because you cannot modify an existing version; you
# can only create new ones.
#
- # * If this operation moves the staging label `AWSCURRENT` to this
- # version (because you included it in the `StagingLabels` parameter)
- # then Secrets Manager also automatically moves the staging label
- # `AWSPREVIOUS` to the version that `AWSCURRENT` was removed from.
- #
# <note markdown="1"> * If you call an operation that needs to encrypt or decrypt the
# `SecretString` or `SecretBinary` for a secret in the same account as
# the calling user and that secret doesn't specify a KMS encryption
# key, Secrets Manager uses the account's default AWS managed
# customer master key (CMK) with the alias `aws/secretsmanager`. If
@@ -1884,22 +1886,19 @@
# encrypt and store binary data as part of the version of a secret, you
# must use either the AWS CLI or one of the AWS SDKs.
#
# </note>
#
- # * If this update creates the first version of the secret or if you did
- # not include the `VersionStages` parameter then Secrets Manager
- # automatically attaches the staging label `AWSCURRENT` to the new
- # version and removes it from any version that had it previously. The
- # previous version (if any) is then given the staging label
- # `AWSPREVIOUS`.
- #
# * If a version with a `SecretVersionId` with the same value as the
# `ClientRequestToken` parameter already exists, the operation
# generates an error. You cannot modify an existing version, you can
# only create new ones.
#
+ # * If you include `SecretString` or `SecretBinary` to create a new
+ # secret version, Secrets Manager automatically attaches the staging
+ # label `AWSCURRENT` to the new version.
+ #
# <note markdown="1"> * If you call an operation that needs to encrypt or decrypt the
# `SecretString` or `SecretBinary` for a secret in the same account as
# the calling user and that secret doesn't specify a KMS encryption
# key, Secrets Manager uses the account's default AWS managed
# customer master key (CMK) with the alias `aws/secretsmanager`. If
@@ -2302,10 +2301,10 @@
operation: config.api.operation(operation_name),
client: self,
params: params,
config: config)
context[:gem_name] = 'aws-sdk-secretsmanager'
- context[:gem_version] = '1.3.0'
+ context[:gem_version] = '1.4.0'
Seahorse::Client::Request.new(handlers, context)
end
# @api private
# @deprecated