aws-sdk-s3 1.166.0 → 1.169.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +15 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-s3/bucket.rb +48 -27
- data/lib/aws-sdk-s3/bucket_lifecycle_configuration.rb +38 -1
- data/lib/aws-sdk-s3/bucket_policy.rb +4 -4
- data/lib/aws-sdk-s3/client.rb +332 -299
- data/lib/aws-sdk-s3/client_api.rb +13 -1
- data/lib/aws-sdk-s3/endpoint_parameters.rb +13 -18
- data/lib/aws-sdk-s3/endpoints.rb +405 -1405
- data/lib/aws-sdk-s3/multipart_upload.rb +4 -4
- data/lib/aws-sdk-s3/multipart_upload_part.rb +8 -8
- data/lib/aws-sdk-s3/object.rb +79 -56
- data/lib/aws-sdk-s3/object_summary.rb +77 -54
- data/lib/aws-sdk-s3/object_version.rb +4 -4
- data/lib/aws-sdk-s3/plugins/endpoints.rb +1 -204
- data/lib/aws-sdk-s3/resource.rb +25 -1
- data/lib/aws-sdk-s3/types.rb +227 -141
- data/lib/aws-sdk-s3.rb +1 -1
- data/sig/bucket.rbs +3 -0
- data/sig/bucket_lifecycle_configuration.rbs +7 -3
- data/sig/client.rbs +13 -4
- data/sig/resource.rbs +2 -0
- data/sig/types.rbs +11 -0
- metadata +4 -4
@@ -306,9 +306,9 @@ module Aws::S3
|
|
306
306
|
# @option options [String] :checksum_crc32
|
307
307
|
# This header can be used as a data integrity check to verify that the
|
308
308
|
# data received is the same data that was originally sent. This header
|
309
|
-
# specifies the base64-encoded, 32-bit
|
310
|
-
# more information, see [Checking object integrity][1] in the
|
311
|
-
# User Guide*.
|
309
|
+
# specifies the base64-encoded, 32-bit CRC-32 checksum of the object.
|
310
|
+
# For more information, see [Checking object integrity][1] in the
|
311
|
+
# *Amazon S3 User Guide*.
|
312
312
|
#
|
313
313
|
#
|
314
314
|
#
|
@@ -316,7 +316,7 @@ module Aws::S3
|
|
316
316
|
# @option options [String] :checksum_crc32c
|
317
317
|
# This header can be used as a data integrity check to verify that the
|
318
318
|
# data received is the same data that was originally sent. This header
|
319
|
-
# specifies the base64-encoded, 32-bit
|
319
|
+
# specifies the base64-encoded, 32-bit CRC-32C checksum of the object.
|
320
320
|
# For more information, see [Checking object integrity][1] in the
|
321
321
|
# *Amazon S3 User Guide*.
|
322
322
|
#
|
@@ -78,9 +78,9 @@ module Aws::S3
|
|
78
78
|
|
79
79
|
# This header can be used as a data integrity check to verify that the
|
80
80
|
# data received is the same data that was originally sent. This header
|
81
|
-
# specifies the base64-encoded, 32-bit
|
82
|
-
# more information, see [Checking object integrity][1] in the
|
83
|
-
# User Guide*.
|
81
|
+
# specifies the base64-encoded, 32-bit CRC-32 checksum of the object.
|
82
|
+
# For more information, see [Checking object integrity][1] in the
|
83
|
+
# *Amazon S3 User Guide*.
|
84
84
|
#
|
85
85
|
#
|
86
86
|
#
|
@@ -90,7 +90,7 @@ module Aws::S3
|
|
90
90
|
data[:checksum_crc32]
|
91
91
|
end
|
92
92
|
|
93
|
-
# The base64-encoded, 32-bit
|
93
|
+
# The base64-encoded, 32-bit CRC-32C checksum of the object. This will
|
94
94
|
# only be present if it was uploaded with the object. When you use an
|
95
95
|
# API operation on an object that was uploaded using multipart uploads,
|
96
96
|
# this value may not be a direct checksum value of the full object.
|
@@ -558,9 +558,9 @@ module Aws::S3
|
|
558
558
|
# @option options [String] :checksum_crc32
|
559
559
|
# This header can be used as a data integrity check to verify that the
|
560
560
|
# data received is the same data that was originally sent. This header
|
561
|
-
# specifies the base64-encoded, 32-bit
|
562
|
-
# more information, see [Checking object integrity][1] in the
|
563
|
-
# User Guide*.
|
561
|
+
# specifies the base64-encoded, 32-bit CRC-32 checksum of the object.
|
562
|
+
# For more information, see [Checking object integrity][1] in the
|
563
|
+
# *Amazon S3 User Guide*.
|
564
564
|
#
|
565
565
|
#
|
566
566
|
#
|
@@ -568,7 +568,7 @@ module Aws::S3
|
|
568
568
|
# @option options [String] :checksum_crc32c
|
569
569
|
# This header can be used as a data integrity check to verify that the
|
570
570
|
# data received is the same data that was originally sent. This header
|
571
|
-
# specifies the base64-encoded, 32-bit
|
571
|
+
# specifies the base64-encoded, 32-bit CRC-32C checksum of the object.
|
572
572
|
# For more information, see [Checking object integrity][1] in the
|
573
573
|
# *Amazon S3 User Guide*.
|
574
574
|
#
|
data/lib/aws-sdk-s3/object.rb
CHANGED
@@ -132,7 +132,7 @@ module Aws::S3
|
|
132
132
|
data[:content_length]
|
133
133
|
end
|
134
134
|
|
135
|
-
# The base64-encoded, 32-bit
|
135
|
+
# The base64-encoded, 32-bit CRC-32 checksum of the object. This will
|
136
136
|
# only be present if it was uploaded with the object. When you use an
|
137
137
|
# API operation on an object that was uploaded using multipart uploads,
|
138
138
|
# this value may not be a direct checksum value of the full object.
|
@@ -149,7 +149,7 @@ module Aws::S3
|
|
149
149
|
data[:checksum_crc32]
|
150
150
|
end
|
151
151
|
|
152
|
-
# The base64-encoded, 32-bit
|
152
|
+
# The base64-encoded, 32-bit CRC-32C checksum of the object. This will
|
153
153
|
# only be present if it was uploaded with the object. When you use an
|
154
154
|
# API operation on an object that was uploaded using multipart uploads,
|
155
155
|
# this value may not be a direct checksum value of the full object.
|
@@ -1073,17 +1073,17 @@ module Aws::S3
|
|
1073
1073
|
# * To encrypt new object copies to a directory bucket with SSE-KMS, we
|
1074
1074
|
# recommend you specify SSE-KMS as the directory bucket's default
|
1075
1075
|
# encryption configuration with a KMS key (specifically, a [customer
|
1076
|
-
# managed key][4]). [Amazon Web Services managed key][5]
|
1077
|
-
# isn't supported. Your SSE-KMS configuration can only
|
1078
|
-
# [customer managed key][4] per directory bucket for the
|
1079
|
-
# the bucket. After you specify a customer managed key for
|
1080
|
-
# you can't override the customer managed key for the
|
1081
|
-
# SSE-KMS configuration. Then, when you perform a
|
1082
|
-
# operation and want to specify server-side encryption
|
1083
|
-
# new object copies with SSE-KMS in the
|
1084
|
-
# headers, you must ensure the encryption
|
1085
|
-
# managed key that you specified for the
|
1086
|
-
# encryption configuration.
|
1076
|
+
# managed key][4]). The [Amazon Web Services managed key][5]
|
1077
|
+
# (`aws/s3`) isn't supported. Your SSE-KMS configuration can only
|
1078
|
+
# support 1 [customer managed key][4] per directory bucket for the
|
1079
|
+
# lifetime of the bucket. After you specify a customer managed key for
|
1080
|
+
# SSE-KMS, you can't override the customer managed key for the
|
1081
|
+
# bucket's SSE-KMS configuration. Then, when you perform a
|
1082
|
+
# `CopyObject` operation and want to specify server-side encryption
|
1083
|
+
# settings for new object copies with SSE-KMS in the
|
1084
|
+
# encryption-related request headers, you must ensure the encryption
|
1085
|
+
# key is the same customer managed key that you specified for the
|
1086
|
+
# directory bucket's default encryption configuration.
|
1087
1087
|
#
|
1088
1088
|
#
|
1089
1089
|
#
|
@@ -1191,14 +1191,19 @@ module Aws::S3
|
|
1191
1191
|
# Guide*.
|
1192
1192
|
#
|
1193
1193
|
# **Directory buckets** - If you specify `x-amz-server-side-encryption`
|
1194
|
-
# with `aws:kms`,
|
1195
|
-
#
|
1196
|
-
#
|
1197
|
-
#
|
1198
|
-
# key
|
1199
|
-
#
|
1200
|
-
# managed key
|
1201
|
-
#
|
1194
|
+
# with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
|
1195
|
+
# header is implicitly assigned the ID of the KMS symmetric encryption
|
1196
|
+
# customer managed key that's configured for your directory bucket's
|
1197
|
+
# default encryption setting. If you want to specify the `
|
1198
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
|
1199
|
+
# can only specify it with the ID (Key ID or Key ARN) of the KMS
|
1200
|
+
# customer managed key that's configured for your directory bucket's
|
1201
|
+
# default encryption setting. Otherwise, you get an HTTP `400 Bad
|
1202
|
+
# Request` error. Only use the key ID or key ARN. The key alias format
|
1203
|
+
# of the KMS key isn't supported. Your SSE-KMS configuration can only
|
1204
|
+
# support 1 [customer managed key][2] per directory bucket for the
|
1205
|
+
# lifetime of the bucket. The [Amazon Web Services managed key][3]
|
1206
|
+
# (`aws/s3`) isn't supported.
|
1202
1207
|
#
|
1203
1208
|
#
|
1204
1209
|
#
|
@@ -2176,14 +2181,19 @@ module Aws::S3
|
|
2176
2181
|
# Amazon Web Services managed key (`aws/s3`) to protect the data.
|
2177
2182
|
#
|
2178
2183
|
# **Directory buckets** - If you specify `x-amz-server-side-encryption`
|
2179
|
-
# with `aws:kms`,
|
2180
|
-
#
|
2181
|
-
#
|
2182
|
-
#
|
2183
|
-
# key
|
2184
|
-
#
|
2185
|
-
# managed key
|
2186
|
-
#
|
2184
|
+
# with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
|
2185
|
+
# header is implicitly assigned the ID of the KMS symmetric encryption
|
2186
|
+
# customer managed key that's configured for your directory bucket's
|
2187
|
+
# default encryption setting. If you want to specify the `
|
2188
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
|
2189
|
+
# can only specify it with the ID (Key ID or Key ARN) of the KMS
|
2190
|
+
# customer managed key that's configured for your directory bucket's
|
2191
|
+
# default encryption setting. Otherwise, you get an HTTP `400 Bad
|
2192
|
+
# Request` error. Only use the key ID or key ARN. The key alias format
|
2193
|
+
# of the KMS key isn't supported. Your SSE-KMS configuration can only
|
2194
|
+
# support 1 [customer managed key][1] per directory bucket for the
|
2195
|
+
# lifetime of the bucket. The [Amazon Web Services managed key][2]
|
2196
|
+
# (`aws/s3`) isn't supported.
|
2187
2197
|
#
|
2188
2198
|
#
|
2189
2199
|
#
|
@@ -2423,10 +2433,11 @@ module Aws::S3
|
|
2423
2433
|
# information about REST request authentication, see [REST
|
2424
2434
|
# Authentication][1].
|
2425
2435
|
#
|
2426
|
-
# <note markdown="1"> The `Content-MD5` header is required
|
2427
|
-
# object with a retention period configured
|
2428
|
-
#
|
2429
|
-
# Object Lock
|
2436
|
+
# <note markdown="1"> The `Content-MD5` or `x-amz-sdk-checksum-algorithm` header is required
|
2437
|
+
# for any request to upload an object with a retention period configured
|
2438
|
+
# using Amazon S3 Object Lock. For more information, see [Uploading
|
2439
|
+
# objects to an Object Lock enabled bucket ][2] in the *Amazon S3 User
|
2440
|
+
# Guide*.
|
2430
2441
|
#
|
2431
2442
|
# </note>
|
2432
2443
|
#
|
@@ -2437,7 +2448,7 @@ module Aws::S3
|
|
2437
2448
|
#
|
2438
2449
|
#
|
2439
2450
|
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/RESTAuthentication.html
|
2440
|
-
# [2]: https://docs.aws.amazon.com/AmazonS3/latest/
|
2451
|
+
# [2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock-managing.html#object-lock-put-object
|
2441
2452
|
# @option options [String] :content_type
|
2442
2453
|
# A standard MIME type describing the format of the contents. For more
|
2443
2454
|
# information, see
|
@@ -2457,13 +2468,13 @@ module Aws::S3
|
|
2457
2468
|
# For the `x-amz-checksum-algorithm ` header, replace ` algorithm ` with
|
2458
2469
|
# the supported algorithm from the following list:
|
2459
2470
|
#
|
2460
|
-
# * CRC32
|
2471
|
+
# * `CRC32`
|
2461
2472
|
#
|
2462
|
-
# * CRC32C
|
2473
|
+
# * `CRC32C`
|
2463
2474
|
#
|
2464
|
-
# * SHA1
|
2475
|
+
# * `SHA1`
|
2465
2476
|
#
|
2466
|
-
# * SHA256
|
2477
|
+
# * `SHA256`
|
2467
2478
|
#
|
2468
2479
|
# For more information, see [Checking object integrity][1] in the
|
2469
2480
|
# *Amazon S3 User Guide*.
|
@@ -2474,20 +2485,27 @@ module Aws::S3
|
|
2474
2485
|
# provided `ChecksumAlgorithm` parameter and uses the checksum algorithm
|
2475
2486
|
# that matches the provided value in `x-amz-checksum-algorithm `.
|
2476
2487
|
#
|
2477
|
-
# <note markdown="1">
|
2478
|
-
#
|
2488
|
+
# <note markdown="1"> The `Content-MD5` or `x-amz-sdk-checksum-algorithm` header is required
|
2489
|
+
# for any request to upload an object with a retention period configured
|
2490
|
+
# using Amazon S3 Object Lock. For more information, see [Uploading
|
2491
|
+
# objects to an Object Lock enabled bucket ][2] in the *Amazon S3 User
|
2492
|
+
# Guide*.
|
2479
2493
|
#
|
2480
2494
|
# </note>
|
2481
2495
|
#
|
2496
|
+
# For directory buckets, when you use Amazon Web Services SDKs, `CRC32`
|
2497
|
+
# is the default checksum algorithm that's used for performance.
|
2498
|
+
#
|
2482
2499
|
#
|
2483
2500
|
#
|
2484
2501
|
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html
|
2502
|
+
# [2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock-managing.html#object-lock-put-object
|
2485
2503
|
# @option options [String] :checksum_crc32
|
2486
2504
|
# This header can be used as a data integrity check to verify that the
|
2487
2505
|
# data received is the same data that was originally sent. This header
|
2488
|
-
# specifies the base64-encoded, 32-bit
|
2489
|
-
# more information, see [Checking object integrity][1] in the
|
2490
|
-
# User Guide*.
|
2506
|
+
# specifies the base64-encoded, 32-bit CRC-32 checksum of the object.
|
2507
|
+
# For more information, see [Checking object integrity][1] in the
|
2508
|
+
# *Amazon S3 User Guide*.
|
2491
2509
|
#
|
2492
2510
|
#
|
2493
2511
|
#
|
@@ -2495,7 +2513,7 @@ module Aws::S3
|
|
2495
2513
|
# @option options [String] :checksum_crc32c
|
2496
2514
|
# This header can be used as a data integrity check to verify that the
|
2497
2515
|
# data received is the same data that was originally sent. This header
|
2498
|
-
# specifies the base64-encoded, 32-bit
|
2516
|
+
# specifies the base64-encoded, 32-bit CRC-32C checksum of the object.
|
2499
2517
|
# For more information, see [Checking object integrity][1] in the
|
2500
2518
|
# *Amazon S3 User Guide*.
|
2501
2519
|
#
|
@@ -2734,14 +2752,19 @@ module Aws::S3
|
|
2734
2752
|
# Amazon Web Services managed key (`aws/s3`) to protect the data.
|
2735
2753
|
#
|
2736
2754
|
# **Directory buckets** - If you specify `x-amz-server-side-encryption`
|
2737
|
-
# with `aws:kms`,
|
2738
|
-
#
|
2739
|
-
#
|
2740
|
-
#
|
2741
|
-
# key
|
2742
|
-
#
|
2743
|
-
# managed key
|
2744
|
-
#
|
2755
|
+
# with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
|
2756
|
+
# header is implicitly assigned the ID of the KMS symmetric encryption
|
2757
|
+
# customer managed key that's configured for your directory bucket's
|
2758
|
+
# default encryption setting. If you want to specify the `
|
2759
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
|
2760
|
+
# can only specify it with the ID (Key ID or Key ARN) of the KMS
|
2761
|
+
# customer managed key that's configured for your directory bucket's
|
2762
|
+
# default encryption setting. Otherwise, you get an HTTP `400 Bad
|
2763
|
+
# Request` error. Only use the key ID or key ARN. The key alias format
|
2764
|
+
# of the KMS key isn't supported. Your SSE-KMS configuration can only
|
2765
|
+
# support 1 [customer managed key][1] per directory bucket for the
|
2766
|
+
# lifetime of the bucket. The [Amazon Web Services managed key][2]
|
2767
|
+
# (`aws/s3`) isn't supported.
|
2745
2768
|
#
|
2746
2769
|
#
|
2747
2770
|
#
|
@@ -3376,13 +3399,13 @@ module Aws::S3
|
|
3376
3399
|
# For the `x-amz-checksum-algorithm ` header, replace ` algorithm ` with
|
3377
3400
|
# the supported algorithm from the following list:
|
3378
3401
|
#
|
3379
|
-
# * CRC32
|
3402
|
+
# * `CRC32`
|
3380
3403
|
#
|
3381
|
-
# * CRC32C
|
3404
|
+
# * `CRC32C`
|
3382
3405
|
#
|
3383
|
-
# * SHA1
|
3406
|
+
# * `SHA1`
|
3384
3407
|
#
|
3385
|
-
# * SHA256
|
3408
|
+
# * `SHA256`
|
3386
3409
|
#
|
3387
3410
|
# For more information, see [Checking object integrity][1] in the
|
3388
3411
|
# *Amazon S3 User Guide*.
|
@@ -723,17 +723,17 @@ module Aws::S3
|
|
723
723
|
# * To encrypt new object copies to a directory bucket with SSE-KMS, we
|
724
724
|
# recommend you specify SSE-KMS as the directory bucket's default
|
725
725
|
# encryption configuration with a KMS key (specifically, a [customer
|
726
|
-
# managed key][4]). [Amazon Web Services managed key][5]
|
727
|
-
# isn't supported. Your SSE-KMS configuration can only
|
728
|
-
# [customer managed key][4] per directory bucket for the
|
729
|
-
# the bucket. After you specify a customer managed key for
|
730
|
-
# you can't override the customer managed key for the
|
731
|
-
# SSE-KMS configuration. Then, when you perform a
|
732
|
-
# operation and want to specify server-side encryption
|
733
|
-
# new object copies with SSE-KMS in the
|
734
|
-
# headers, you must ensure the encryption
|
735
|
-
# managed key that you specified for the
|
736
|
-
# encryption configuration.
|
726
|
+
# managed key][4]). The [Amazon Web Services managed key][5]
|
727
|
+
# (`aws/s3`) isn't supported. Your SSE-KMS configuration can only
|
728
|
+
# support 1 [customer managed key][4] per directory bucket for the
|
729
|
+
# lifetime of the bucket. After you specify a customer managed key for
|
730
|
+
# SSE-KMS, you can't override the customer managed key for the
|
731
|
+
# bucket's SSE-KMS configuration. Then, when you perform a
|
732
|
+
# `CopyObject` operation and want to specify server-side encryption
|
733
|
+
# settings for new object copies with SSE-KMS in the
|
734
|
+
# encryption-related request headers, you must ensure the encryption
|
735
|
+
# key is the same customer managed key that you specified for the
|
736
|
+
# directory bucket's default encryption configuration.
|
737
737
|
#
|
738
738
|
#
|
739
739
|
#
|
@@ -841,14 +841,19 @@ module Aws::S3
|
|
841
841
|
# Guide*.
|
842
842
|
#
|
843
843
|
# **Directory buckets** - If you specify `x-amz-server-side-encryption`
|
844
|
-
# with `aws:kms`,
|
845
|
-
#
|
846
|
-
#
|
847
|
-
#
|
848
|
-
# key
|
849
|
-
#
|
850
|
-
# managed key
|
851
|
-
#
|
844
|
+
# with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
|
845
|
+
# header is implicitly assigned the ID of the KMS symmetric encryption
|
846
|
+
# customer managed key that's configured for your directory bucket's
|
847
|
+
# default encryption setting. If you want to specify the `
|
848
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
|
849
|
+
# can only specify it with the ID (Key ID or Key ARN) of the KMS
|
850
|
+
# customer managed key that's configured for your directory bucket's
|
851
|
+
# default encryption setting. Otherwise, you get an HTTP `400 Bad
|
852
|
+
# Request` error. Only use the key ID or key ARN. The key alias format
|
853
|
+
# of the KMS key isn't supported. Your SSE-KMS configuration can only
|
854
|
+
# support 1 [customer managed key][2] per directory bucket for the
|
855
|
+
# lifetime of the bucket. The [Amazon Web Services managed key][3]
|
856
|
+
# (`aws/s3`) isn't supported.
|
852
857
|
#
|
853
858
|
#
|
854
859
|
#
|
@@ -1826,14 +1831,19 @@ module Aws::S3
|
|
1826
1831
|
# Amazon Web Services managed key (`aws/s3`) to protect the data.
|
1827
1832
|
#
|
1828
1833
|
# **Directory buckets** - If you specify `x-amz-server-side-encryption`
|
1829
|
-
# with `aws:kms`,
|
1830
|
-
#
|
1831
|
-
#
|
1832
|
-
#
|
1833
|
-
# key
|
1834
|
-
#
|
1835
|
-
# managed key
|
1836
|
-
#
|
1834
|
+
# with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
|
1835
|
+
# header is implicitly assigned the ID of the KMS symmetric encryption
|
1836
|
+
# customer managed key that's configured for your directory bucket's
|
1837
|
+
# default encryption setting. If you want to specify the `
|
1838
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
|
1839
|
+
# can only specify it with the ID (Key ID or Key ARN) of the KMS
|
1840
|
+
# customer managed key that's configured for your directory bucket's
|
1841
|
+
# default encryption setting. Otherwise, you get an HTTP `400 Bad
|
1842
|
+
# Request` error. Only use the key ID or key ARN. The key alias format
|
1843
|
+
# of the KMS key isn't supported. Your SSE-KMS configuration can only
|
1844
|
+
# support 1 [customer managed key][1] per directory bucket for the
|
1845
|
+
# lifetime of the bucket. The [Amazon Web Services managed key][2]
|
1846
|
+
# (`aws/s3`) isn't supported.
|
1837
1847
|
#
|
1838
1848
|
#
|
1839
1849
|
#
|
@@ -2073,10 +2083,11 @@ module Aws::S3
|
|
2073
2083
|
# information about REST request authentication, see [REST
|
2074
2084
|
# Authentication][1].
|
2075
2085
|
#
|
2076
|
-
# <note markdown="1"> The `Content-MD5` header is required
|
2077
|
-
# object with a retention period configured
|
2078
|
-
#
|
2079
|
-
# Object Lock
|
2086
|
+
# <note markdown="1"> The `Content-MD5` or `x-amz-sdk-checksum-algorithm` header is required
|
2087
|
+
# for any request to upload an object with a retention period configured
|
2088
|
+
# using Amazon S3 Object Lock. For more information, see [Uploading
|
2089
|
+
# objects to an Object Lock enabled bucket ][2] in the *Amazon S3 User
|
2090
|
+
# Guide*.
|
2080
2091
|
#
|
2081
2092
|
# </note>
|
2082
2093
|
#
|
@@ -2087,7 +2098,7 @@ module Aws::S3
|
|
2087
2098
|
#
|
2088
2099
|
#
|
2089
2100
|
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/RESTAuthentication.html
|
2090
|
-
# [2]: https://docs.aws.amazon.com/AmazonS3/latest/
|
2101
|
+
# [2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock-managing.html#object-lock-put-object
|
2091
2102
|
# @option options [String] :content_type
|
2092
2103
|
# A standard MIME type describing the format of the contents. For more
|
2093
2104
|
# information, see
|
@@ -2107,13 +2118,13 @@ module Aws::S3
|
|
2107
2118
|
# For the `x-amz-checksum-algorithm ` header, replace ` algorithm ` with
|
2108
2119
|
# the supported algorithm from the following list:
|
2109
2120
|
#
|
2110
|
-
# * CRC32
|
2121
|
+
# * `CRC32`
|
2111
2122
|
#
|
2112
|
-
# * CRC32C
|
2123
|
+
# * `CRC32C`
|
2113
2124
|
#
|
2114
|
-
# * SHA1
|
2125
|
+
# * `SHA1`
|
2115
2126
|
#
|
2116
|
-
# * SHA256
|
2127
|
+
# * `SHA256`
|
2117
2128
|
#
|
2118
2129
|
# For more information, see [Checking object integrity][1] in the
|
2119
2130
|
# *Amazon S3 User Guide*.
|
@@ -2124,20 +2135,27 @@ module Aws::S3
|
|
2124
2135
|
# provided `ChecksumAlgorithm` parameter and uses the checksum algorithm
|
2125
2136
|
# that matches the provided value in `x-amz-checksum-algorithm `.
|
2126
2137
|
#
|
2127
|
-
# <note markdown="1">
|
2128
|
-
#
|
2138
|
+
# <note markdown="1"> The `Content-MD5` or `x-amz-sdk-checksum-algorithm` header is required
|
2139
|
+
# for any request to upload an object with a retention period configured
|
2140
|
+
# using Amazon S3 Object Lock. For more information, see [Uploading
|
2141
|
+
# objects to an Object Lock enabled bucket ][2] in the *Amazon S3 User
|
2142
|
+
# Guide*.
|
2129
2143
|
#
|
2130
2144
|
# </note>
|
2131
2145
|
#
|
2146
|
+
# For directory buckets, when you use Amazon Web Services SDKs, `CRC32`
|
2147
|
+
# is the default checksum algorithm that's used for performance.
|
2148
|
+
#
|
2132
2149
|
#
|
2133
2150
|
#
|
2134
2151
|
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html
|
2152
|
+
# [2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock-managing.html#object-lock-put-object
|
2135
2153
|
# @option options [String] :checksum_crc32
|
2136
2154
|
# This header can be used as a data integrity check to verify that the
|
2137
2155
|
# data received is the same data that was originally sent. This header
|
2138
|
-
# specifies the base64-encoded, 32-bit
|
2139
|
-
# more information, see [Checking object integrity][1] in the
|
2140
|
-
# User Guide*.
|
2156
|
+
# specifies the base64-encoded, 32-bit CRC-32 checksum of the object.
|
2157
|
+
# For more information, see [Checking object integrity][1] in the
|
2158
|
+
# *Amazon S3 User Guide*.
|
2141
2159
|
#
|
2142
2160
|
#
|
2143
2161
|
#
|
@@ -2145,7 +2163,7 @@ module Aws::S3
|
|
2145
2163
|
# @option options [String] :checksum_crc32c
|
2146
2164
|
# This header can be used as a data integrity check to verify that the
|
2147
2165
|
# data received is the same data that was originally sent. This header
|
2148
|
-
# specifies the base64-encoded, 32-bit
|
2166
|
+
# specifies the base64-encoded, 32-bit CRC-32C checksum of the object.
|
2149
2167
|
# For more information, see [Checking object integrity][1] in the
|
2150
2168
|
# *Amazon S3 User Guide*.
|
2151
2169
|
#
|
@@ -2384,14 +2402,19 @@ module Aws::S3
|
|
2384
2402
|
# Amazon Web Services managed key (`aws/s3`) to protect the data.
|
2385
2403
|
#
|
2386
2404
|
# **Directory buckets** - If you specify `x-amz-server-side-encryption`
|
2387
|
-
# with `aws:kms`,
|
2388
|
-
#
|
2389
|
-
#
|
2390
|
-
#
|
2391
|
-
# key
|
2392
|
-
#
|
2393
|
-
# managed key
|
2394
|
-
#
|
2405
|
+
# with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
|
2406
|
+
# header is implicitly assigned the ID of the KMS symmetric encryption
|
2407
|
+
# customer managed key that's configured for your directory bucket's
|
2408
|
+
# default encryption setting. If you want to specify the `
|
2409
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
|
2410
|
+
# can only specify it with the ID (Key ID or Key ARN) of the KMS
|
2411
|
+
# customer managed key that's configured for your directory bucket's
|
2412
|
+
# default encryption setting. Otherwise, you get an HTTP `400 Bad
|
2413
|
+
# Request` error. Only use the key ID or key ARN. The key alias format
|
2414
|
+
# of the KMS key isn't supported. Your SSE-KMS configuration can only
|
2415
|
+
# support 1 [customer managed key][1] per directory bucket for the
|
2416
|
+
# lifetime of the bucket. The [Amazon Web Services managed key][2]
|
2417
|
+
# (`aws/s3`) isn't supported.
|
2395
2418
|
#
|
2396
2419
|
#
|
2397
2420
|
#
|
@@ -2836,13 +2859,13 @@ module Aws::S3
|
|
2836
2859
|
# For the `x-amz-checksum-algorithm ` header, replace ` algorithm ` with
|
2837
2860
|
# the supported algorithm from the following list:
|
2838
2861
|
#
|
2839
|
-
# * CRC32
|
2862
|
+
# * `CRC32`
|
2840
2863
|
#
|
2841
|
-
# * CRC32C
|
2864
|
+
# * `CRC32C`
|
2842
2865
|
#
|
2843
|
-
# * SHA1
|
2866
|
+
# * `SHA1`
|
2844
2867
|
#
|
2845
|
-
# * SHA256
|
2868
|
+
# * `SHA256`
|
2846
2869
|
#
|
2847
2870
|
# For more information, see [Checking object integrity][1] in the
|
2848
2871
|
# *Amazon S3 User Guide*.
|
@@ -869,13 +869,13 @@ module Aws::S3
|
|
869
869
|
# For the `x-amz-checksum-algorithm ` header, replace ` algorithm ` with
|
870
870
|
# the supported algorithm from the following list:
|
871
871
|
#
|
872
|
-
# * CRC32
|
872
|
+
# * `CRC32`
|
873
873
|
#
|
874
|
-
# * CRC32C
|
874
|
+
# * `CRC32C`
|
875
875
|
#
|
876
|
-
# * SHA1
|
876
|
+
# * `SHA1`
|
877
877
|
#
|
878
|
-
# * SHA256
|
878
|
+
# * `SHA256`
|
879
879
|
#
|
880
880
|
# For more information, see [Checking object integrity][1] in the
|
881
881
|
# *Amazon S3 User Guide*.
|