aws-sdk-s3 1.166.0 → 1.168.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -57,6 +57,7 @@ module Aws::S3
57
57
  BucketLoggingStatus = Shapes::StructureShape.new(name: 'BucketLoggingStatus')
58
58
  BucketLogsPermission = Shapes::StringShape.new(name: 'BucketLogsPermission')
59
59
  BucketName = Shapes::StringShape.new(name: 'BucketName')
60
+ BucketRegion = Shapes::StringShape.new(name: 'BucketRegion')
60
61
  BucketType = Shapes::StringShape.new(name: 'BucketType')
61
62
  BucketVersioningStatus = Shapes::StringShape.new(name: 'BucketVersioningStatus')
62
63
  Buckets = Shapes::ListShape.new(name: 'Buckets')
@@ -464,6 +465,7 @@ module Aws::S3
464
465
  PutBucketEncryptionRequest = Shapes::StructureShape.new(name: 'PutBucketEncryptionRequest')
465
466
  PutBucketIntelligentTieringConfigurationRequest = Shapes::StructureShape.new(name: 'PutBucketIntelligentTieringConfigurationRequest')
466
467
  PutBucketInventoryConfigurationRequest = Shapes::StructureShape.new(name: 'PutBucketInventoryConfigurationRequest')
468
+ PutBucketLifecycleConfigurationOutput = Shapes::StructureShape.new(name: 'PutBucketLifecycleConfigurationOutput')
467
469
  PutBucketLifecycleConfigurationRequest = Shapes::StructureShape.new(name: 'PutBucketLifecycleConfigurationRequest')
468
470
  PutBucketLifecycleRequest = Shapes::StructureShape.new(name: 'PutBucketLifecycleRequest')
469
471
  PutBucketLoggingRequest = Shapes::StructureShape.new(name: 'PutBucketLoggingRequest')
@@ -603,6 +605,7 @@ module Aws::S3
603
605
  TopicConfigurationDeprecated = Shapes::StructureShape.new(name: 'TopicConfigurationDeprecated')
604
606
  TopicConfigurationList = Shapes::ListShape.new(name: 'TopicConfigurationList', flattened: true)
605
607
  Transition = Shapes::StructureShape.new(name: 'Transition')
608
+ TransitionDefaultMinimumObjectSize = Shapes::StringShape.new(name: 'TransitionDefaultMinimumObjectSize')
606
609
  TransitionList = Shapes::ListShape.new(name: 'TransitionList', flattened: true)
607
610
  TransitionStorageClass = Shapes::StringShape.new(name: 'TransitionStorageClass')
608
611
  Type = Shapes::StringShape.new(name: 'Type')
@@ -678,6 +681,7 @@ module Aws::S3
678
681
 
679
682
  Bucket.add_member(:name, Shapes::ShapeRef.new(shape: BucketName, location_name: "Name"))
680
683
  Bucket.add_member(:creation_date, Shapes::ShapeRef.new(shape: CreationDate, location_name: "CreationDate"))
684
+ Bucket.add_member(:bucket_region, Shapes::ShapeRef.new(shape: BucketRegion, location_name: "BucketRegion"))
681
685
  Bucket.struct_class = Types::Bucket
682
686
 
683
687
  BucketAlreadyExists.struct_class = Types::BucketAlreadyExists
@@ -1191,6 +1195,7 @@ module Aws::S3
1191
1195
  GetBucketInventoryConfigurationRequest.struct_class = Types::GetBucketInventoryConfigurationRequest
1192
1196
 
1193
1197
  GetBucketLifecycleConfigurationOutput.add_member(:rules, Shapes::ShapeRef.new(shape: LifecycleRules, location_name: "Rule"))
1198
+ GetBucketLifecycleConfigurationOutput.add_member(:transition_default_minimum_object_size, Shapes::ShapeRef.new(shape: TransitionDefaultMinimumObjectSize, location: "header", location_name: "x-amz-transition-default-minimum-object-size"))
1194
1199
  GetBucketLifecycleConfigurationOutput.struct_class = Types::GetBucketLifecycleConfigurationOutput
1195
1200
 
1196
1201
  GetBucketLifecycleConfigurationRequest.add_member(:bucket, Shapes::ShapeRef.new(shape: BucketName, required: true, location: "uri", location_name: "Bucket", metadata: {"contextParam"=>{"name"=>"Bucket"}}))
@@ -1720,10 +1725,13 @@ module Aws::S3
1720
1725
  ListBucketsOutput.add_member(:buckets, Shapes::ShapeRef.new(shape: Buckets, location_name: "Buckets"))
1721
1726
  ListBucketsOutput.add_member(:owner, Shapes::ShapeRef.new(shape: Owner, location_name: "Owner"))
1722
1727
  ListBucketsOutput.add_member(:continuation_token, Shapes::ShapeRef.new(shape: NextToken, location_name: "ContinuationToken"))
1728
+ ListBucketsOutput.add_member(:prefix, Shapes::ShapeRef.new(shape: Prefix, location_name: "Prefix"))
1723
1729
  ListBucketsOutput.struct_class = Types::ListBucketsOutput
1724
1730
 
1725
1731
  ListBucketsRequest.add_member(:max_buckets, Shapes::ShapeRef.new(shape: MaxBuckets, location: "querystring", location_name: "max-buckets"))
1726
1732
  ListBucketsRequest.add_member(:continuation_token, Shapes::ShapeRef.new(shape: Token, location: "querystring", location_name: "continuation-token"))
1733
+ ListBucketsRequest.add_member(:prefix, Shapes::ShapeRef.new(shape: Prefix, location: "querystring", location_name: "prefix"))
1734
+ ListBucketsRequest.add_member(:bucket_region, Shapes::ShapeRef.new(shape: BucketRegion, location: "querystring", location_name: "bucket-region"))
1727
1735
  ListBucketsRequest.struct_class = Types::ListBucketsRequest
1728
1736
 
1729
1737
  ListDirectoryBucketsOutput.add_member(:buckets, Shapes::ShapeRef.new(shape: Buckets, location_name: "Buckets"))
@@ -2130,10 +2138,14 @@ module Aws::S3
2130
2138
  PutBucketInventoryConfigurationRequest[:payload] = :inventory_configuration
2131
2139
  PutBucketInventoryConfigurationRequest[:payload_member] = PutBucketInventoryConfigurationRequest.member(:inventory_configuration)
2132
2140
 
2141
+ PutBucketLifecycleConfigurationOutput.add_member(:transition_default_minimum_object_size, Shapes::ShapeRef.new(shape: TransitionDefaultMinimumObjectSize, location: "header", location_name: "x-amz-transition-default-minimum-object-size"))
2142
+ PutBucketLifecycleConfigurationOutput.struct_class = Types::PutBucketLifecycleConfigurationOutput
2143
+
2133
2144
  PutBucketLifecycleConfigurationRequest.add_member(:bucket, Shapes::ShapeRef.new(shape: BucketName, required: true, location: "uri", location_name: "Bucket", metadata: {"contextParam"=>{"name"=>"Bucket"}}))
2134
2145
  PutBucketLifecycleConfigurationRequest.add_member(:checksum_algorithm, Shapes::ShapeRef.new(shape: ChecksumAlgorithm, location: "header", location_name: "x-amz-sdk-checksum-algorithm"))
2135
2146
  PutBucketLifecycleConfigurationRequest.add_member(:lifecycle_configuration, Shapes::ShapeRef.new(shape: BucketLifecycleConfiguration, location_name: "LifecycleConfiguration", metadata: {"xmlNamespace"=>{"uri"=>"http://s3.amazonaws.com/doc/2006-03-01/"}}))
2136
2147
  PutBucketLifecycleConfigurationRequest.add_member(:expected_bucket_owner, Shapes::ShapeRef.new(shape: AccountId, location: "header", location_name: "x-amz-expected-bucket-owner"))
2148
+ PutBucketLifecycleConfigurationRequest.add_member(:transition_default_minimum_object_size, Shapes::ShapeRef.new(shape: TransitionDefaultMinimumObjectSize, location: "header", location_name: "x-amz-transition-default-minimum-object-size"))
2137
2149
  PutBucketLifecycleConfigurationRequest.struct_class = Types::PutBucketLifecycleConfigurationRequest
2138
2150
  PutBucketLifecycleConfigurationRequest[:payload] = :lifecycle_configuration
2139
2151
  PutBucketLifecycleConfigurationRequest[:payload_member] = PutBucketLifecycleConfigurationRequest.member(:lifecycle_configuration)
@@ -3529,7 +3541,7 @@ module Aws::S3
3529
3541
  "requestChecksumRequired" => true,
3530
3542
  }
3531
3543
  o.input = Shapes::ShapeRef.new(shape: PutBucketLifecycleConfigurationRequest)
3532
- o.output = Shapes::ShapeRef.new(shape: Shapes::StructureShape.new(struct_class: Aws::EmptyStructure))
3544
+ o.output = Shapes::ShapeRef.new(shape: PutBucketLifecycleConfigurationOutput)
3533
3545
  end)
3534
3546
 
3535
3547
  api.add_operation(:put_bucket_logging, Seahorse::Model::Operation.new.tap do |o|
@@ -306,9 +306,9 @@ module Aws::S3
306
306
  # @option options [String] :checksum_crc32
307
307
  # This header can be used as a data integrity check to verify that the
308
308
  # data received is the same data that was originally sent. This header
309
- # specifies the base64-encoded, 32-bit CRC32 checksum of the object. For
310
- # more information, see [Checking object integrity][1] in the *Amazon S3
311
- # User Guide*.
309
+ # specifies the base64-encoded, 32-bit CRC-32 checksum of the object.
310
+ # For more information, see [Checking object integrity][1] in the
311
+ # *Amazon S3 User Guide*.
312
312
  #
313
313
  #
314
314
  #
@@ -316,7 +316,7 @@ module Aws::S3
316
316
  # @option options [String] :checksum_crc32c
317
317
  # This header can be used as a data integrity check to verify that the
318
318
  # data received is the same data that was originally sent. This header
319
- # specifies the base64-encoded, 32-bit CRC32C checksum of the object.
319
+ # specifies the base64-encoded, 32-bit CRC-32C checksum of the object.
320
320
  # For more information, see [Checking object integrity][1] in the
321
321
  # *Amazon S3 User Guide*.
322
322
  #
@@ -78,9 +78,9 @@ module Aws::S3
78
78
 
79
79
  # This header can be used as a data integrity check to verify that the
80
80
  # data received is the same data that was originally sent. This header
81
- # specifies the base64-encoded, 32-bit CRC32 checksum of the object. For
82
- # more information, see [Checking object integrity][1] in the *Amazon S3
83
- # User Guide*.
81
+ # specifies the base64-encoded, 32-bit CRC-32 checksum of the object.
82
+ # For more information, see [Checking object integrity][1] in the
83
+ # *Amazon S3 User Guide*.
84
84
  #
85
85
  #
86
86
  #
@@ -90,7 +90,7 @@ module Aws::S3
90
90
  data[:checksum_crc32]
91
91
  end
92
92
 
93
- # The base64-encoded, 32-bit CRC32C checksum of the object. This will
93
+ # The base64-encoded, 32-bit CRC-32C checksum of the object. This will
94
94
  # only be present if it was uploaded with the object. When you use an
95
95
  # API operation on an object that was uploaded using multipart uploads,
96
96
  # this value may not be a direct checksum value of the full object.
@@ -558,9 +558,9 @@ module Aws::S3
558
558
  # @option options [String] :checksum_crc32
559
559
  # This header can be used as a data integrity check to verify that the
560
560
  # data received is the same data that was originally sent. This header
561
- # specifies the base64-encoded, 32-bit CRC32 checksum of the object. For
562
- # more information, see [Checking object integrity][1] in the *Amazon S3
563
- # User Guide*.
561
+ # specifies the base64-encoded, 32-bit CRC-32 checksum of the object.
562
+ # For more information, see [Checking object integrity][1] in the
563
+ # *Amazon S3 User Guide*.
564
564
  #
565
565
  #
566
566
  #
@@ -568,7 +568,7 @@ module Aws::S3
568
568
  # @option options [String] :checksum_crc32c
569
569
  # This header can be used as a data integrity check to verify that the
570
570
  # data received is the same data that was originally sent. This header
571
- # specifies the base64-encoded, 32-bit CRC32C checksum of the object.
571
+ # specifies the base64-encoded, 32-bit CRC-32C checksum of the object.
572
572
  # For more information, see [Checking object integrity][1] in the
573
573
  # *Amazon S3 User Guide*.
574
574
  #
@@ -132,7 +132,7 @@ module Aws::S3
132
132
  data[:content_length]
133
133
  end
134
134
 
135
- # The base64-encoded, 32-bit CRC32 checksum of the object. This will
135
+ # The base64-encoded, 32-bit CRC-32 checksum of the object. This will
136
136
  # only be present if it was uploaded with the object. When you use an
137
137
  # API operation on an object that was uploaded using multipart uploads,
138
138
  # this value may not be a direct checksum value of the full object.
@@ -149,7 +149,7 @@ module Aws::S3
149
149
  data[:checksum_crc32]
150
150
  end
151
151
 
152
- # The base64-encoded, 32-bit CRC32C checksum of the object. This will
152
+ # The base64-encoded, 32-bit CRC-32C checksum of the object. This will
153
153
  # only be present if it was uploaded with the object. When you use an
154
154
  # API operation on an object that was uploaded using multipart uploads,
155
155
  # this value may not be a direct checksum value of the full object.
@@ -1073,17 +1073,17 @@ module Aws::S3
1073
1073
  # * To encrypt new object copies to a directory bucket with SSE-KMS, we
1074
1074
  # recommend you specify SSE-KMS as the directory bucket's default
1075
1075
  # encryption configuration with a KMS key (specifically, a [customer
1076
- # managed key][4]). [Amazon Web Services managed key][5] (`aws/s3`)
1077
- # isn't supported. Your SSE-KMS configuration can only support 1
1078
- # [customer managed key][4] per directory bucket for the lifetime of
1079
- # the bucket. After you specify a customer managed key for SSE-KMS,
1080
- # you can't override the customer managed key for the bucket's
1081
- # SSE-KMS configuration. Then, when you perform a `CopyObject`
1082
- # operation and want to specify server-side encryption settings for
1083
- # new object copies with SSE-KMS in the encryption-related request
1084
- # headers, you must ensure the encryption key is the same customer
1085
- # managed key that you specified for the directory bucket's default
1086
- # encryption configuration.
1076
+ # managed key][4]). The [Amazon Web Services managed key][5]
1077
+ # (`aws/s3`) isn't supported. Your SSE-KMS configuration can only
1078
+ # support 1 [customer managed key][4] per directory bucket for the
1079
+ # lifetime of the bucket. After you specify a customer managed key for
1080
+ # SSE-KMS, you can't override the customer managed key for the
1081
+ # bucket's SSE-KMS configuration. Then, when you perform a
1082
+ # `CopyObject` operation and want to specify server-side encryption
1083
+ # settings for new object copies with SSE-KMS in the
1084
+ # encryption-related request headers, you must ensure the encryption
1085
+ # key is the same customer managed key that you specified for the
1086
+ # directory bucket's default encryption configuration.
1087
1087
  #
1088
1088
  #
1089
1089
  #
@@ -1191,14 +1191,19 @@ module Aws::S3
1191
1191
  # Guide*.
1192
1192
  #
1193
1193
  # **Directory buckets** - If you specify `x-amz-server-side-encryption`
1194
- # with `aws:kms`, you must specify the `
1195
- # x-amz-server-side-encryption-aws-kms-key-id` header with the ID (Key
1196
- # ID or Key ARN) of the KMS symmetric encryption customer managed key to
1197
- # use. Otherwise, you get an HTTP `400 Bad Request` error. Only use the
1198
- # key ID or key ARN. The key alias format of the KMS key isn't
1199
- # supported. Your SSE-KMS configuration can only support 1 [customer
1200
- # managed key][2] per directory bucket for the lifetime of the bucket.
1201
- # [Amazon Web Services managed key][3] (`aws/s3`) isn't supported.
1194
+ # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
1195
+ # header is implicitly assigned the ID of the KMS symmetric encryption
1196
+ # customer managed key that's configured for your directory bucket's
1197
+ # default encryption setting. If you want to specify the `
1198
+ # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
1199
+ # can only specify it with the ID (Key ID or Key ARN) of the KMS
1200
+ # customer managed key that's configured for your directory bucket's
1201
+ # default encryption setting. Otherwise, you get an HTTP `400 Bad
1202
+ # Request` error. Only use the key ID or key ARN. The key alias format
1203
+ # of the KMS key isn't supported. Your SSE-KMS configuration can only
1204
+ # support 1 [customer managed key][2] per directory bucket for the
1205
+ # lifetime of the bucket. The [Amazon Web Services managed key][3]
1206
+ # (`aws/s3`) isn't supported.
1202
1207
  #
1203
1208
  #
1204
1209
  #
@@ -2176,14 +2181,19 @@ module Aws::S3
2176
2181
  # Amazon Web Services managed key (`aws/s3`) to protect the data.
2177
2182
  #
2178
2183
  # **Directory buckets** - If you specify `x-amz-server-side-encryption`
2179
- # with `aws:kms`, you must specify the `
2180
- # x-amz-server-side-encryption-aws-kms-key-id` header with the ID (Key
2181
- # ID or Key ARN) of the KMS symmetric encryption customer managed key to
2182
- # use. Otherwise, you get an HTTP `400 Bad Request` error. Only use the
2183
- # key ID or key ARN. The key alias format of the KMS key isn't
2184
- # supported. Your SSE-KMS configuration can only support 1 [customer
2185
- # managed key][1] per directory bucket for the lifetime of the bucket.
2186
- # [Amazon Web Services managed key][2] (`aws/s3`) isn't supported.
2184
+ # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
2185
+ # header is implicitly assigned the ID of the KMS symmetric encryption
2186
+ # customer managed key that's configured for your directory bucket's
2187
+ # default encryption setting. If you want to specify the `
2188
+ # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
2189
+ # can only specify it with the ID (Key ID or Key ARN) of the KMS
2190
+ # customer managed key that's configured for your directory bucket's
2191
+ # default encryption setting. Otherwise, you get an HTTP `400 Bad
2192
+ # Request` error. Only use the key ID or key ARN. The key alias format
2193
+ # of the KMS key isn't supported. Your SSE-KMS configuration can only
2194
+ # support 1 [customer managed key][1] per directory bucket for the
2195
+ # lifetime of the bucket. The [Amazon Web Services managed key][2]
2196
+ # (`aws/s3`) isn't supported.
2187
2197
  #
2188
2198
  #
2189
2199
  #
@@ -2423,10 +2433,11 @@ module Aws::S3
2423
2433
  # information about REST request authentication, see [REST
2424
2434
  # Authentication][1].
2425
2435
  #
2426
- # <note markdown="1"> The `Content-MD5` header is required for any request to upload an
2427
- # object with a retention period configured using Amazon S3 Object Lock.
2428
- # For more information about Amazon S3 Object Lock, see [Amazon S3
2429
- # Object Lock Overview][2] in the *Amazon S3 User Guide*.
2436
+ # <note markdown="1"> The `Content-MD5` or `x-amz-sdk-checksum-algorithm` header is required
2437
+ # for any request to upload an object with a retention period configured
2438
+ # using Amazon S3 Object Lock. For more information, see [Uploading
2439
+ # objects to an Object Lock enabled bucket ][2] in the *Amazon S3 User
2440
+ # Guide*.
2430
2441
  #
2431
2442
  # </note>
2432
2443
  #
@@ -2437,7 +2448,7 @@ module Aws::S3
2437
2448
  #
2438
2449
  #
2439
2450
  # [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/RESTAuthentication.html
2440
- # [2]: https://docs.aws.amazon.com/AmazonS3/latest/dev/object-lock-overview.html
2451
+ # [2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock-managing.html#object-lock-put-object
2441
2452
  # @option options [String] :content_type
2442
2453
  # A standard MIME type describing the format of the contents. For more
2443
2454
  # information, see
@@ -2457,13 +2468,13 @@ module Aws::S3
2457
2468
  # For the `x-amz-checksum-algorithm ` header, replace ` algorithm ` with
2458
2469
  # the supported algorithm from the following list:
2459
2470
  #
2460
- # * CRC32
2471
+ # * `CRC32`
2461
2472
  #
2462
- # * CRC32C
2473
+ # * `CRC32C`
2463
2474
  #
2464
- # * SHA1
2475
+ # * `SHA1`
2465
2476
  #
2466
- # * SHA256
2477
+ # * `SHA256`
2467
2478
  #
2468
2479
  # For more information, see [Checking object integrity][1] in the
2469
2480
  # *Amazon S3 User Guide*.
@@ -2474,20 +2485,27 @@ module Aws::S3
2474
2485
  # provided `ChecksumAlgorithm` parameter and uses the checksum algorithm
2475
2486
  # that matches the provided value in `x-amz-checksum-algorithm `.
2476
2487
  #
2477
- # <note markdown="1"> For directory buckets, when you use Amazon Web Services SDKs, `CRC32`
2478
- # is the default checksum algorithm that's used for performance.
2488
+ # <note markdown="1"> The `Content-MD5` or `x-amz-sdk-checksum-algorithm` header is required
2489
+ # for any request to upload an object with a retention period configured
2490
+ # using Amazon S3 Object Lock. For more information, see [Uploading
2491
+ # objects to an Object Lock enabled bucket ][2] in the *Amazon S3 User
2492
+ # Guide*.
2479
2493
  #
2480
2494
  # </note>
2481
2495
  #
2496
+ # For directory buckets, when you use Amazon Web Services SDKs, `CRC32`
2497
+ # is the default checksum algorithm that's used for performance.
2498
+ #
2482
2499
  #
2483
2500
  #
2484
2501
  # [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html
2502
+ # [2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock-managing.html#object-lock-put-object
2485
2503
  # @option options [String] :checksum_crc32
2486
2504
  # This header can be used as a data integrity check to verify that the
2487
2505
  # data received is the same data that was originally sent. This header
2488
- # specifies the base64-encoded, 32-bit CRC32 checksum of the object. For
2489
- # more information, see [Checking object integrity][1] in the *Amazon S3
2490
- # User Guide*.
2506
+ # specifies the base64-encoded, 32-bit CRC-32 checksum of the object.
2507
+ # For more information, see [Checking object integrity][1] in the
2508
+ # *Amazon S3 User Guide*.
2491
2509
  #
2492
2510
  #
2493
2511
  #
@@ -2495,7 +2513,7 @@ module Aws::S3
2495
2513
  # @option options [String] :checksum_crc32c
2496
2514
  # This header can be used as a data integrity check to verify that the
2497
2515
  # data received is the same data that was originally sent. This header
2498
- # specifies the base64-encoded, 32-bit CRC32C checksum of the object.
2516
+ # specifies the base64-encoded, 32-bit CRC-32C checksum of the object.
2499
2517
  # For more information, see [Checking object integrity][1] in the
2500
2518
  # *Amazon S3 User Guide*.
2501
2519
  #
@@ -2734,14 +2752,19 @@ module Aws::S3
2734
2752
  # Amazon Web Services managed key (`aws/s3`) to protect the data.
2735
2753
  #
2736
2754
  # **Directory buckets** - If you specify `x-amz-server-side-encryption`
2737
- # with `aws:kms`, you must specify the `
2738
- # x-amz-server-side-encryption-aws-kms-key-id` header with the ID (Key
2739
- # ID or Key ARN) of the KMS symmetric encryption customer managed key to
2740
- # use. Otherwise, you get an HTTP `400 Bad Request` error. Only use the
2741
- # key ID or key ARN. The key alias format of the KMS key isn't
2742
- # supported. Your SSE-KMS configuration can only support 1 [customer
2743
- # managed key][1] per directory bucket for the lifetime of the bucket.
2744
- # [Amazon Web Services managed key][2] (`aws/s3`) isn't supported.
2755
+ # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
2756
+ # header is implicitly assigned the ID of the KMS symmetric encryption
2757
+ # customer managed key that's configured for your directory bucket's
2758
+ # default encryption setting. If you want to specify the `
2759
+ # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
2760
+ # can only specify it with the ID (Key ID or Key ARN) of the KMS
2761
+ # customer managed key that's configured for your directory bucket's
2762
+ # default encryption setting. Otherwise, you get an HTTP `400 Bad
2763
+ # Request` error. Only use the key ID or key ARN. The key alias format
2764
+ # of the KMS key isn't supported. Your SSE-KMS configuration can only
2765
+ # support 1 [customer managed key][1] per directory bucket for the
2766
+ # lifetime of the bucket. The [Amazon Web Services managed key][2]
2767
+ # (`aws/s3`) isn't supported.
2745
2768
  #
2746
2769
  #
2747
2770
  #
@@ -3376,13 +3399,13 @@ module Aws::S3
3376
3399
  # For the `x-amz-checksum-algorithm ` header, replace ` algorithm ` with
3377
3400
  # the supported algorithm from the following list:
3378
3401
  #
3379
- # * CRC32
3402
+ # * `CRC32`
3380
3403
  #
3381
- # * CRC32C
3404
+ # * `CRC32C`
3382
3405
  #
3383
- # * SHA1
3406
+ # * `SHA1`
3384
3407
  #
3385
- # * SHA256
3408
+ # * `SHA256`
3386
3409
  #
3387
3410
  # For more information, see [Checking object integrity][1] in the
3388
3411
  # *Amazon S3 User Guide*.
@@ -723,17 +723,17 @@ module Aws::S3
723
723
  # * To encrypt new object copies to a directory bucket with SSE-KMS, we
724
724
  # recommend you specify SSE-KMS as the directory bucket's default
725
725
  # encryption configuration with a KMS key (specifically, a [customer
726
- # managed key][4]). [Amazon Web Services managed key][5] (`aws/s3`)
727
- # isn't supported. Your SSE-KMS configuration can only support 1
728
- # [customer managed key][4] per directory bucket for the lifetime of
729
- # the bucket. After you specify a customer managed key for SSE-KMS,
730
- # you can't override the customer managed key for the bucket's
731
- # SSE-KMS configuration. Then, when you perform a `CopyObject`
732
- # operation and want to specify server-side encryption settings for
733
- # new object copies with SSE-KMS in the encryption-related request
734
- # headers, you must ensure the encryption key is the same customer
735
- # managed key that you specified for the directory bucket's default
736
- # encryption configuration.
726
+ # managed key][4]). The [Amazon Web Services managed key][5]
727
+ # (`aws/s3`) isn't supported. Your SSE-KMS configuration can only
728
+ # support 1 [customer managed key][4] per directory bucket for the
729
+ # lifetime of the bucket. After you specify a customer managed key for
730
+ # SSE-KMS, you can't override the customer managed key for the
731
+ # bucket's SSE-KMS configuration. Then, when you perform a
732
+ # `CopyObject` operation and want to specify server-side encryption
733
+ # settings for new object copies with SSE-KMS in the
734
+ # encryption-related request headers, you must ensure the encryption
735
+ # key is the same customer managed key that you specified for the
736
+ # directory bucket's default encryption configuration.
737
737
  #
738
738
  #
739
739
  #
@@ -841,14 +841,19 @@ module Aws::S3
841
841
  # Guide*.
842
842
  #
843
843
  # **Directory buckets** - If you specify `x-amz-server-side-encryption`
844
- # with `aws:kms`, you must specify the `
845
- # x-amz-server-side-encryption-aws-kms-key-id` header with the ID (Key
846
- # ID or Key ARN) of the KMS symmetric encryption customer managed key to
847
- # use. Otherwise, you get an HTTP `400 Bad Request` error. Only use the
848
- # key ID or key ARN. The key alias format of the KMS key isn't
849
- # supported. Your SSE-KMS configuration can only support 1 [customer
850
- # managed key][2] per directory bucket for the lifetime of the bucket.
851
- # [Amazon Web Services managed key][3] (`aws/s3`) isn't supported.
844
+ # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
845
+ # header is implicitly assigned the ID of the KMS symmetric encryption
846
+ # customer managed key that's configured for your directory bucket's
847
+ # default encryption setting. If you want to specify the `
848
+ # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
849
+ # can only specify it with the ID (Key ID or Key ARN) of the KMS
850
+ # customer managed key that's configured for your directory bucket's
851
+ # default encryption setting. Otherwise, you get an HTTP `400 Bad
852
+ # Request` error. Only use the key ID or key ARN. The key alias format
853
+ # of the KMS key isn't supported. Your SSE-KMS configuration can only
854
+ # support 1 [customer managed key][2] per directory bucket for the
855
+ # lifetime of the bucket. The [Amazon Web Services managed key][3]
856
+ # (`aws/s3`) isn't supported.
852
857
  #
853
858
  #
854
859
  #
@@ -1826,14 +1831,19 @@ module Aws::S3
1826
1831
  # Amazon Web Services managed key (`aws/s3`) to protect the data.
1827
1832
  #
1828
1833
  # **Directory buckets** - If you specify `x-amz-server-side-encryption`
1829
- # with `aws:kms`, you must specify the `
1830
- # x-amz-server-side-encryption-aws-kms-key-id` header with the ID (Key
1831
- # ID or Key ARN) of the KMS symmetric encryption customer managed key to
1832
- # use. Otherwise, you get an HTTP `400 Bad Request` error. Only use the
1833
- # key ID or key ARN. The key alias format of the KMS key isn't
1834
- # supported. Your SSE-KMS configuration can only support 1 [customer
1835
- # managed key][1] per directory bucket for the lifetime of the bucket.
1836
- # [Amazon Web Services managed key][2] (`aws/s3`) isn't supported.
1834
+ # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
1835
+ # header is implicitly assigned the ID of the KMS symmetric encryption
1836
+ # customer managed key that's configured for your directory bucket's
1837
+ # default encryption setting. If you want to specify the `
1838
+ # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
1839
+ # can only specify it with the ID (Key ID or Key ARN) of the KMS
1840
+ # customer managed key that's configured for your directory bucket's
1841
+ # default encryption setting. Otherwise, you get an HTTP `400 Bad
1842
+ # Request` error. Only use the key ID or key ARN. The key alias format
1843
+ # of the KMS key isn't supported. Your SSE-KMS configuration can only
1844
+ # support 1 [customer managed key][1] per directory bucket for the
1845
+ # lifetime of the bucket. The [Amazon Web Services managed key][2]
1846
+ # (`aws/s3`) isn't supported.
1837
1847
  #
1838
1848
  #
1839
1849
  #
@@ -2073,10 +2083,11 @@ module Aws::S3
2073
2083
  # information about REST request authentication, see [REST
2074
2084
  # Authentication][1].
2075
2085
  #
2076
- # <note markdown="1"> The `Content-MD5` header is required for any request to upload an
2077
- # object with a retention period configured using Amazon S3 Object Lock.
2078
- # For more information about Amazon S3 Object Lock, see [Amazon S3
2079
- # Object Lock Overview][2] in the *Amazon S3 User Guide*.
2086
+ # <note markdown="1"> The `Content-MD5` or `x-amz-sdk-checksum-algorithm` header is required
2087
+ # for any request to upload an object with a retention period configured
2088
+ # using Amazon S3 Object Lock. For more information, see [Uploading
2089
+ # objects to an Object Lock enabled bucket ][2] in the *Amazon S3 User
2090
+ # Guide*.
2080
2091
  #
2081
2092
  # </note>
2082
2093
  #
@@ -2087,7 +2098,7 @@ module Aws::S3
2087
2098
  #
2088
2099
  #
2089
2100
  # [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/RESTAuthentication.html
2090
- # [2]: https://docs.aws.amazon.com/AmazonS3/latest/dev/object-lock-overview.html
2101
+ # [2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock-managing.html#object-lock-put-object
2091
2102
  # @option options [String] :content_type
2092
2103
  # A standard MIME type describing the format of the contents. For more
2093
2104
  # information, see
@@ -2107,13 +2118,13 @@ module Aws::S3
2107
2118
  # For the `x-amz-checksum-algorithm ` header, replace ` algorithm ` with
2108
2119
  # the supported algorithm from the following list:
2109
2120
  #
2110
- # * CRC32
2121
+ # * `CRC32`
2111
2122
  #
2112
- # * CRC32C
2123
+ # * `CRC32C`
2113
2124
  #
2114
- # * SHA1
2125
+ # * `SHA1`
2115
2126
  #
2116
- # * SHA256
2127
+ # * `SHA256`
2117
2128
  #
2118
2129
  # For more information, see [Checking object integrity][1] in the
2119
2130
  # *Amazon S3 User Guide*.
@@ -2124,20 +2135,27 @@ module Aws::S3
2124
2135
  # provided `ChecksumAlgorithm` parameter and uses the checksum algorithm
2125
2136
  # that matches the provided value in `x-amz-checksum-algorithm `.
2126
2137
  #
2127
- # <note markdown="1"> For directory buckets, when you use Amazon Web Services SDKs, `CRC32`
2128
- # is the default checksum algorithm that's used for performance.
2138
+ # <note markdown="1"> The `Content-MD5` or `x-amz-sdk-checksum-algorithm` header is required
2139
+ # for any request to upload an object with a retention period configured
2140
+ # using Amazon S3 Object Lock. For more information, see [Uploading
2141
+ # objects to an Object Lock enabled bucket ][2] in the *Amazon S3 User
2142
+ # Guide*.
2129
2143
  #
2130
2144
  # </note>
2131
2145
  #
2146
+ # For directory buckets, when you use Amazon Web Services SDKs, `CRC32`
2147
+ # is the default checksum algorithm that's used for performance.
2148
+ #
2132
2149
  #
2133
2150
  #
2134
2151
  # [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html
2152
+ # [2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock-managing.html#object-lock-put-object
2135
2153
  # @option options [String] :checksum_crc32
2136
2154
  # This header can be used as a data integrity check to verify that the
2137
2155
  # data received is the same data that was originally sent. This header
2138
- # specifies the base64-encoded, 32-bit CRC32 checksum of the object. For
2139
- # more information, see [Checking object integrity][1] in the *Amazon S3
2140
- # User Guide*.
2156
+ # specifies the base64-encoded, 32-bit CRC-32 checksum of the object.
2157
+ # For more information, see [Checking object integrity][1] in the
2158
+ # *Amazon S3 User Guide*.
2141
2159
  #
2142
2160
  #
2143
2161
  #
@@ -2145,7 +2163,7 @@ module Aws::S3
2145
2163
  # @option options [String] :checksum_crc32c
2146
2164
  # This header can be used as a data integrity check to verify that the
2147
2165
  # data received is the same data that was originally sent. This header
2148
- # specifies the base64-encoded, 32-bit CRC32C checksum of the object.
2166
+ # specifies the base64-encoded, 32-bit CRC-32C checksum of the object.
2149
2167
  # For more information, see [Checking object integrity][1] in the
2150
2168
  # *Amazon S3 User Guide*.
2151
2169
  #
@@ -2384,14 +2402,19 @@ module Aws::S3
2384
2402
  # Amazon Web Services managed key (`aws/s3`) to protect the data.
2385
2403
  #
2386
2404
  # **Directory buckets** - If you specify `x-amz-server-side-encryption`
2387
- # with `aws:kms`, you must specify the `
2388
- # x-amz-server-side-encryption-aws-kms-key-id` header with the ID (Key
2389
- # ID or Key ARN) of the KMS symmetric encryption customer managed key to
2390
- # use. Otherwise, you get an HTTP `400 Bad Request` error. Only use the
2391
- # key ID or key ARN. The key alias format of the KMS key isn't
2392
- # supported. Your SSE-KMS configuration can only support 1 [customer
2393
- # managed key][1] per directory bucket for the lifetime of the bucket.
2394
- # [Amazon Web Services managed key][2] (`aws/s3`) isn't supported.
2405
+ # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
2406
+ # header is implicitly assigned the ID of the KMS symmetric encryption
2407
+ # customer managed key that's configured for your directory bucket's
2408
+ # default encryption setting. If you want to specify the `
2409
+ # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
2410
+ # can only specify it with the ID (Key ID or Key ARN) of the KMS
2411
+ # customer managed key that's configured for your directory bucket's
2412
+ # default encryption setting. Otherwise, you get an HTTP `400 Bad
2413
+ # Request` error. Only use the key ID or key ARN. The key alias format
2414
+ # of the KMS key isn't supported. Your SSE-KMS configuration can only
2415
+ # support 1 [customer managed key][1] per directory bucket for the
2416
+ # lifetime of the bucket. The [Amazon Web Services managed key][2]
2417
+ # (`aws/s3`) isn't supported.
2395
2418
  #
2396
2419
  #
2397
2420
  #
@@ -2836,13 +2859,13 @@ module Aws::S3
2836
2859
  # For the `x-amz-checksum-algorithm ` header, replace ` algorithm ` with
2837
2860
  # the supported algorithm from the following list:
2838
2861
  #
2839
- # * CRC32
2862
+ # * `CRC32`
2840
2863
  #
2841
- # * CRC32C
2864
+ # * `CRC32C`
2842
2865
  #
2843
- # * SHA1
2866
+ # * `SHA1`
2844
2867
  #
2845
- # * SHA256
2868
+ # * `SHA256`
2846
2869
  #
2847
2870
  # For more information, see [Checking object integrity][1] in the
2848
2871
  # *Amazon S3 User Guide*.
@@ -869,13 +869,13 @@ module Aws::S3
869
869
  # For the `x-amz-checksum-algorithm ` header, replace ` algorithm ` with
870
870
  # the supported algorithm from the following list:
871
871
  #
872
- # * CRC32
872
+ # * `CRC32`
873
873
  #
874
- # * CRC32C
874
+ # * `CRC32C`
875
875
  #
876
- # * SHA1
876
+ # * `SHA1`
877
877
  #
878
- # * SHA256
878
+ # * `SHA256`
879
879
  #
880
880
  # For more information, see [Checking object integrity][1] in the
881
881
  # *Amazon S3 User Guide*.