lib/aws-sdk-secretsmanager/client.rb in aws-sdk-secretsmanager-1.64.0 vs lib/aws-sdk-secretsmanager/client.rb in aws-sdk-secretsmanager-1.65.0
- old
+ new
@@ -551,11 +551,13 @@
# @option params [String] :description
# The description of the secret.
#
# @option params [String] :kms_key_id
# The ARN, key ID, or alias of the KMS key that Secrets Manager uses to
- # encrypt the secret value in the secret.
+ # encrypt the secret value in the secret. An alias is always prefixed by
+ # `alias/`, for example `alias/aws/secretsmanager`. For more
+ # information, see [About aliases][1].
#
# To use a KMS key in a different account, use the key ARN or the alias
# ARN.
#
# If you don't specify this value, then Secrets Manager uses the key
@@ -566,10 +568,14 @@
# If the secret is in a different Amazon Web Services account from the
# credentials calling the API, then you can't use `aws/secretsmanager`
# to encrypt the secret, and you must create and use a customer managed
# KMS key.
#
+ #
+ #
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/alias-about.html
+ #
# @option params [String, StringIO, File] :secret_binary
# The binary data to encrypt and store in the new version of the secret.
# We recommend that you store your binary data in a file and then pass
# the contents of the file as a parameter.
#
@@ -1216,22 +1222,27 @@
#
# We recommend that you cache your secret values by using client-side
# caching. Caching secrets improves speed and reduces your costs. For
# more information, see [Cache secrets for your applications][1].
#
+ # To retrieve the previous version of a secret, use `VersionStage` and
+ # specify AWSPREVIOUS. To revert to the previous version of a secret,
+ # call [UpdateSecretVersionStage][2].
+ #
# <b>Required permissions: </b> `secretsmanager:GetSecretValue`. If the
# secret is encrypted using a customer-managed key instead of the Amazon
# Web Services managed key `aws/secretsmanager`, then you also need
# `kms:Decrypt` permissions for that key. For more information, see [
- # IAM policy actions for Secrets Manager][2] and [Authentication and
- # access control in Secrets Manager][3].
+ # IAM policy actions for Secrets Manager][3] and [Authentication and
+ # access control in Secrets Manager][4].
#
#
#
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/retrieving-secrets.html
- # [2]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
- # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
+ # [2]: https://docs.aws.amazon.com/cli/latest/reference/secretsmanager/update-secret-version-stage.html
+ # [3]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#reference_iam-permissions_actions
+ # [4]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html
#
# @option params [required, String] :secret_id
# The ARN or name of the secret to retrieve.
#
# For an ARN, we recommend that you specify a complete ARN rather than a
@@ -2454,23 +2465,10 @@
# existing version's `VersionId`, the operation results in an error.
# You can't modify an existing version, you can only create a new
# version. To remove a version, remove all staging labels from it. See
# UpdateSecretVersionStage.
#
- # If you don't specify an KMS encryption key, Secrets Manager uses the
- # Amazon Web Services managed key `aws/secretsmanager`. If this key
- # doesn't already exist in your account, then Secrets Manager creates
- # it for you automatically. All users and roles in the Amazon Web
- # Services account automatically have access to use
- # `aws/secretsmanager`. Creating `aws/secretsmanager` can result in a
- # one-time significant delay in returning the result.
- #
- # If the secret is in a different Amazon Web Services account from the
- # credentials calling the API, then you can't use `aws/secretsmanager`
- # to encrypt the secret, and you must create and use a customer managed
- # key.
- #
# <b>Required permissions: </b> `secretsmanager:UpdateSecret`. For more
# information, see [ IAM policy actions for Secrets Manager][1] and
# [Authentication and access control in Secrets Manager][2]. If you use
# a customer managed key, you must also have `kms:GenerateDataKey` and
# `kms:Decrypt` permissions on the key. For more information, see [
@@ -2516,15 +2514,27 @@
# @option params [String] :description
# The description of the secret.
#
# @option params [String] :kms_key_id
# The ARN, key ID, or alias of the KMS key that Secrets Manager uses to
- # encrypt new secret versions as well as any existing versions the
+ # encrypt new secret versions as well as any existing versions with the
# staging labels `AWSCURRENT`, `AWSPENDING`, or `AWSPREVIOUS`. For more
# information about versions and staging labels, see [Concepts:
# Version][1].
#
+ # A key alias is always prefixed by `alias/`, for example
+ # `alias/aws/secretsmanager`. For more information, see [About
+ # aliases][2].
+ #
+ # If you set this to an empty string, Secrets Manager uses the Amazon
+ # Web Services managed key `aws/secretsmanager`. If this key doesn't
+ # already exist in your account, then Secrets Manager creates it for you
+ # automatically. All users and roles in the Amazon Web Services account
+ # automatically have access to use `aws/secretsmanager`. Creating
+ # `aws/secretsmanager` can result in a one-time significant delay in
+ # returning the result.
+ #
# You can only use the Amazon Web Services managed key
# `aws/secretsmanager` if you call this operation using credentials from
# the same Amazon Web Services account that owns the secret. If the
# secret is in a different account, then you must use a customer managed
# key and provide the ARN of that KMS key in this field. The user making
@@ -2532,10 +2542,11 @@
# their respective accounts.
#
#
#
# [1]: https://docs.aws.amazon.com/secretsmanager/latest/userguide/getting-started.html#term_version
+ # [2]: https://docs.aws.amazon.com/kms/latest/developerguide/alias-about.html
#
# @option params [String, StringIO, File] :secret_binary
# The binary data to encrypt and store in the new version of the secret.
# We recommend that you store your binary data in a file and then pass
# the contents of the file as a parameter.
@@ -2877,10 +2888,10 @@
operation: config.api.operation(operation_name),
client: self,
params: params,
config: config)
context[:gem_name] = 'aws-sdk-secretsmanager'
- context[:gem_version] = '1.64.0'
+ context[:gem_version] = '1.65.0'
Seahorse::Client::Request.new(handlers, context)
end
# @api private
# @deprecated