aws-sdk-s3 1.166.0 → 1.169.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +15 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-s3/bucket.rb +48 -27
- data/lib/aws-sdk-s3/bucket_lifecycle_configuration.rb +38 -1
- data/lib/aws-sdk-s3/bucket_policy.rb +4 -4
- data/lib/aws-sdk-s3/client.rb +332 -299
- data/lib/aws-sdk-s3/client_api.rb +13 -1
- data/lib/aws-sdk-s3/endpoint_parameters.rb +13 -18
- data/lib/aws-sdk-s3/endpoints.rb +405 -1405
- data/lib/aws-sdk-s3/multipart_upload.rb +4 -4
- data/lib/aws-sdk-s3/multipart_upload_part.rb +8 -8
- data/lib/aws-sdk-s3/object.rb +79 -56
- data/lib/aws-sdk-s3/object_summary.rb +77 -54
- data/lib/aws-sdk-s3/object_version.rb +4 -4
- data/lib/aws-sdk-s3/plugins/endpoints.rb +1 -204
- data/lib/aws-sdk-s3/resource.rb +25 -1
- data/lib/aws-sdk-s3/types.rb +227 -141
- data/lib/aws-sdk-s3.rb +1 -1
- data/sig/bucket.rbs +3 -0
- data/sig/bucket_lifecycle_configuration.rbs +7 -3
- data/sig/client.rbs +13 -4
- data/sig/resource.rbs +2 -0
- data/sig/types.rbs +11 -0
- metadata +4 -4
@@ -306,9 +306,9 @@ module Aws::S3
|
|
306
306
|
# @option options [String] :checksum_crc32
|
307
307
|
# This header can be used as a data integrity check to verify that the
|
308
308
|
# data received is the same data that was originally sent. This header
|
309
|
-
# specifies the base64-encoded, 32-bit
|
310
|
-
# more information, see [Checking object integrity][1] in the
|
311
|
-
# User Guide*.
|
309
|
+
# specifies the base64-encoded, 32-bit CRC-32 checksum of the object.
|
310
|
+
# For more information, see [Checking object integrity][1] in the
|
311
|
+
# *Amazon S3 User Guide*.
|
312
312
|
#
|
313
313
|
#
|
314
314
|
#
|
@@ -316,7 +316,7 @@ module Aws::S3
|
|
316
316
|
# @option options [String] :checksum_crc32c
|
317
317
|
# This header can be used as a data integrity check to verify that the
|
318
318
|
# data received is the same data that was originally sent. This header
|
319
|
-
# specifies the base64-encoded, 32-bit
|
319
|
+
# specifies the base64-encoded, 32-bit CRC-32C checksum of the object.
|
320
320
|
# For more information, see [Checking object integrity][1] in the
|
321
321
|
# *Amazon S3 User Guide*.
|
322
322
|
#
|
@@ -78,9 +78,9 @@ module Aws::S3
|
|
78
78
|
|
79
79
|
# This header can be used as a data integrity check to verify that the
|
80
80
|
# data received is the same data that was originally sent. This header
|
81
|
-
# specifies the base64-encoded, 32-bit
|
82
|
-
# more information, see [Checking object integrity][1] in the
|
83
|
-
# User Guide*.
|
81
|
+
# specifies the base64-encoded, 32-bit CRC-32 checksum of the object.
|
82
|
+
# For more information, see [Checking object integrity][1] in the
|
83
|
+
# *Amazon S3 User Guide*.
|
84
84
|
#
|
85
85
|
#
|
86
86
|
#
|
@@ -90,7 +90,7 @@ module Aws::S3
|
|
90
90
|
data[:checksum_crc32]
|
91
91
|
end
|
92
92
|
|
93
|
-
# The base64-encoded, 32-bit
|
93
|
+
# The base64-encoded, 32-bit CRC-32C checksum of the object. This will
|
94
94
|
# only be present if it was uploaded with the object. When you use an
|
95
95
|
# API operation on an object that was uploaded using multipart uploads,
|
96
96
|
# this value may not be a direct checksum value of the full object.
|
@@ -558,9 +558,9 @@ module Aws::S3
|
|
558
558
|
# @option options [String] :checksum_crc32
|
559
559
|
# This header can be used as a data integrity check to verify that the
|
560
560
|
# data received is the same data that was originally sent. This header
|
561
|
-
# specifies the base64-encoded, 32-bit
|
562
|
-
# more information, see [Checking object integrity][1] in the
|
563
|
-
# User Guide*.
|
561
|
+
# specifies the base64-encoded, 32-bit CRC-32 checksum of the object.
|
562
|
+
# For more information, see [Checking object integrity][1] in the
|
563
|
+
# *Amazon S3 User Guide*.
|
564
564
|
#
|
565
565
|
#
|
566
566
|
#
|
@@ -568,7 +568,7 @@ module Aws::S3
|
|
568
568
|
# @option options [String] :checksum_crc32c
|
569
569
|
# This header can be used as a data integrity check to verify that the
|
570
570
|
# data received is the same data that was originally sent. This header
|
571
|
-
# specifies the base64-encoded, 32-bit
|
571
|
+
# specifies the base64-encoded, 32-bit CRC-32C checksum of the object.
|
572
572
|
# For more information, see [Checking object integrity][1] in the
|
573
573
|
# *Amazon S3 User Guide*.
|
574
574
|
#
|
data/lib/aws-sdk-s3/object.rb
CHANGED
@@ -132,7 +132,7 @@ module Aws::S3
|
|
132
132
|
data[:content_length]
|
133
133
|
end
|
134
134
|
|
135
|
-
# The base64-encoded, 32-bit
|
135
|
+
# The base64-encoded, 32-bit CRC-32 checksum of the object. This will
|
136
136
|
# only be present if it was uploaded with the object. When you use an
|
137
137
|
# API operation on an object that was uploaded using multipart uploads,
|
138
138
|
# this value may not be a direct checksum value of the full object.
|
@@ -149,7 +149,7 @@ module Aws::S3
|
|
149
149
|
data[:checksum_crc32]
|
150
150
|
end
|
151
151
|
|
152
|
-
# The base64-encoded, 32-bit
|
152
|
+
# The base64-encoded, 32-bit CRC-32C checksum of the object. This will
|
153
153
|
# only be present if it was uploaded with the object. When you use an
|
154
154
|
# API operation on an object that was uploaded using multipart uploads,
|
155
155
|
# this value may not be a direct checksum value of the full object.
|
@@ -1073,17 +1073,17 @@ module Aws::S3
|
|
1073
1073
|
# * To encrypt new object copies to a directory bucket with SSE-KMS, we
|
1074
1074
|
# recommend you specify SSE-KMS as the directory bucket's default
|
1075
1075
|
# encryption configuration with a KMS key (specifically, a [customer
|
1076
|
-
# managed key][4]). [Amazon Web Services managed key][5]
|
1077
|
-
# isn't supported. Your SSE-KMS configuration can only
|
1078
|
-
# [customer managed key][4] per directory bucket for the
|
1079
|
-
# the bucket. After you specify a customer managed key for
|
1080
|
-
# you can't override the customer managed key for the
|
1081
|
-
# SSE-KMS configuration. Then, when you perform a
|
1082
|
-
# operation and want to specify server-side encryption
|
1083
|
-
# new object copies with SSE-KMS in the
|
1084
|
-
# headers, you must ensure the encryption
|
1085
|
-
# managed key that you specified for the
|
1086
|
-
# encryption configuration.
|
1076
|
+
# managed key][4]). The [Amazon Web Services managed key][5]
|
1077
|
+
# (`aws/s3`) isn't supported. Your SSE-KMS configuration can only
|
1078
|
+
# support 1 [customer managed key][4] per directory bucket for the
|
1079
|
+
# lifetime of the bucket. After you specify a customer managed key for
|
1080
|
+
# SSE-KMS, you can't override the customer managed key for the
|
1081
|
+
# bucket's SSE-KMS configuration. Then, when you perform a
|
1082
|
+
# `CopyObject` operation and want to specify server-side encryption
|
1083
|
+
# settings for new object copies with SSE-KMS in the
|
1084
|
+
# encryption-related request headers, you must ensure the encryption
|
1085
|
+
# key is the same customer managed key that you specified for the
|
1086
|
+
# directory bucket's default encryption configuration.
|
1087
1087
|
#
|
1088
1088
|
#
|
1089
1089
|
#
|
@@ -1191,14 +1191,19 @@ module Aws::S3
|
|
1191
1191
|
# Guide*.
|
1192
1192
|
#
|
1193
1193
|
# **Directory buckets** - If you specify `x-amz-server-side-encryption`
|
1194
|
-
# with `aws:kms`,
|
1195
|
-
#
|
1196
|
-
#
|
1197
|
-
#
|
1198
|
-
# key
|
1199
|
-
#
|
1200
|
-
# managed key
|
1201
|
-
#
|
1194
|
+
# with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
|
1195
|
+
# header is implicitly assigned the ID of the KMS symmetric encryption
|
1196
|
+
# customer managed key that's configured for your directory bucket's
|
1197
|
+
# default encryption setting. If you want to specify the `
|
1198
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
|
1199
|
+
# can only specify it with the ID (Key ID or Key ARN) of the KMS
|
1200
|
+
# customer managed key that's configured for your directory bucket's
|
1201
|
+
# default encryption setting. Otherwise, you get an HTTP `400 Bad
|
1202
|
+
# Request` error. Only use the key ID or key ARN. The key alias format
|
1203
|
+
# of the KMS key isn't supported. Your SSE-KMS configuration can only
|
1204
|
+
# support 1 [customer managed key][2] per directory bucket for the
|
1205
|
+
# lifetime of the bucket. The [Amazon Web Services managed key][3]
|
1206
|
+
# (`aws/s3`) isn't supported.
|
1202
1207
|
#
|
1203
1208
|
#
|
1204
1209
|
#
|
@@ -2176,14 +2181,19 @@ module Aws::S3
|
|
2176
2181
|
# Amazon Web Services managed key (`aws/s3`) to protect the data.
|
2177
2182
|
#
|
2178
2183
|
# **Directory buckets** - If you specify `x-amz-server-side-encryption`
|
2179
|
-
# with `aws:kms`,
|
2180
|
-
#
|
2181
|
-
#
|
2182
|
-
#
|
2183
|
-
# key
|
2184
|
-
#
|
2185
|
-
# managed key
|
2186
|
-
#
|
2184
|
+
# with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
|
2185
|
+
# header is implicitly assigned the ID of the KMS symmetric encryption
|
2186
|
+
# customer managed key that's configured for your directory bucket's
|
2187
|
+
# default encryption setting. If you want to specify the `
|
2188
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
|
2189
|
+
# can only specify it with the ID (Key ID or Key ARN) of the KMS
|
2190
|
+
# customer managed key that's configured for your directory bucket's
|
2191
|
+
# default encryption setting. Otherwise, you get an HTTP `400 Bad
|
2192
|
+
# Request` error. Only use the key ID or key ARN. The key alias format
|
2193
|
+
# of the KMS key isn't supported. Your SSE-KMS configuration can only
|
2194
|
+
# support 1 [customer managed key][1] per directory bucket for the
|
2195
|
+
# lifetime of the bucket. The [Amazon Web Services managed key][2]
|
2196
|
+
# (`aws/s3`) isn't supported.
|
2187
2197
|
#
|
2188
2198
|
#
|
2189
2199
|
#
|
@@ -2423,10 +2433,11 @@ module Aws::S3
|
|
2423
2433
|
# information about REST request authentication, see [REST
|
2424
2434
|
# Authentication][1].
|
2425
2435
|
#
|
2426
|
-
# <note markdown="1"> The `Content-MD5` header is required
|
2427
|
-
# object with a retention period configured
|
2428
|
-
#
|
2429
|
-
# Object Lock
|
2436
|
+
# <note markdown="1"> The `Content-MD5` or `x-amz-sdk-checksum-algorithm` header is required
|
2437
|
+
# for any request to upload an object with a retention period configured
|
2438
|
+
# using Amazon S3 Object Lock. For more information, see [Uploading
|
2439
|
+
# objects to an Object Lock enabled bucket ][2] in the *Amazon S3 User
|
2440
|
+
# Guide*.
|
2430
2441
|
#
|
2431
2442
|
# </note>
|
2432
2443
|
#
|
@@ -2437,7 +2448,7 @@ module Aws::S3
|
|
2437
2448
|
#
|
2438
2449
|
#
|
2439
2450
|
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/RESTAuthentication.html
|
2440
|
-
# [2]: https://docs.aws.amazon.com/AmazonS3/latest/
|
2451
|
+
# [2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock-managing.html#object-lock-put-object
|
2441
2452
|
# @option options [String] :content_type
|
2442
2453
|
# A standard MIME type describing the format of the contents. For more
|
2443
2454
|
# information, see
|
@@ -2457,13 +2468,13 @@ module Aws::S3
|
|
2457
2468
|
# For the `x-amz-checksum-algorithm ` header, replace ` algorithm ` with
|
2458
2469
|
# the supported algorithm from the following list:
|
2459
2470
|
#
|
2460
|
-
# * CRC32
|
2471
|
+
# * `CRC32`
|
2461
2472
|
#
|
2462
|
-
# * CRC32C
|
2473
|
+
# * `CRC32C`
|
2463
2474
|
#
|
2464
|
-
# * SHA1
|
2475
|
+
# * `SHA1`
|
2465
2476
|
#
|
2466
|
-
# * SHA256
|
2477
|
+
# * `SHA256`
|
2467
2478
|
#
|
2468
2479
|
# For more information, see [Checking object integrity][1] in the
|
2469
2480
|
# *Amazon S3 User Guide*.
|
@@ -2474,20 +2485,27 @@ module Aws::S3
|
|
2474
2485
|
# provided `ChecksumAlgorithm` parameter and uses the checksum algorithm
|
2475
2486
|
# that matches the provided value in `x-amz-checksum-algorithm `.
|
2476
2487
|
#
|
2477
|
-
# <note markdown="1">
|
2478
|
-
#
|
2488
|
+
# <note markdown="1"> The `Content-MD5` or `x-amz-sdk-checksum-algorithm` header is required
|
2489
|
+
# for any request to upload an object with a retention period configured
|
2490
|
+
# using Amazon S3 Object Lock. For more information, see [Uploading
|
2491
|
+
# objects to an Object Lock enabled bucket ][2] in the *Amazon S3 User
|
2492
|
+
# Guide*.
|
2479
2493
|
#
|
2480
2494
|
# </note>
|
2481
2495
|
#
|
2496
|
+
# For directory buckets, when you use Amazon Web Services SDKs, `CRC32`
|
2497
|
+
# is the default checksum algorithm that's used for performance.
|
2498
|
+
#
|
2482
2499
|
#
|
2483
2500
|
#
|
2484
2501
|
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html
|
2502
|
+
# [2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock-managing.html#object-lock-put-object
|
2485
2503
|
# @option options [String] :checksum_crc32
|
2486
2504
|
# This header can be used as a data integrity check to verify that the
|
2487
2505
|
# data received is the same data that was originally sent. This header
|
2488
|
-
# specifies the base64-encoded, 32-bit
|
2489
|
-
# more information, see [Checking object integrity][1] in the
|
2490
|
-
# User Guide*.
|
2506
|
+
# specifies the base64-encoded, 32-bit CRC-32 checksum of the object.
|
2507
|
+
# For more information, see [Checking object integrity][1] in the
|
2508
|
+
# *Amazon S3 User Guide*.
|
2491
2509
|
#
|
2492
2510
|
#
|
2493
2511
|
#
|
@@ -2495,7 +2513,7 @@ module Aws::S3
|
|
2495
2513
|
# @option options [String] :checksum_crc32c
|
2496
2514
|
# This header can be used as a data integrity check to verify that the
|
2497
2515
|
# data received is the same data that was originally sent. This header
|
2498
|
-
# specifies the base64-encoded, 32-bit
|
2516
|
+
# specifies the base64-encoded, 32-bit CRC-32C checksum of the object.
|
2499
2517
|
# For more information, see [Checking object integrity][1] in the
|
2500
2518
|
# *Amazon S3 User Guide*.
|
2501
2519
|
#
|
@@ -2734,14 +2752,19 @@ module Aws::S3
|
|
2734
2752
|
# Amazon Web Services managed key (`aws/s3`) to protect the data.
|
2735
2753
|
#
|
2736
2754
|
# **Directory buckets** - If you specify `x-amz-server-side-encryption`
|
2737
|
-
# with `aws:kms`,
|
2738
|
-
#
|
2739
|
-
#
|
2740
|
-
#
|
2741
|
-
# key
|
2742
|
-
#
|
2743
|
-
# managed key
|
2744
|
-
#
|
2755
|
+
# with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
|
2756
|
+
# header is implicitly assigned the ID of the KMS symmetric encryption
|
2757
|
+
# customer managed key that's configured for your directory bucket's
|
2758
|
+
# default encryption setting. If you want to specify the `
|
2759
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
|
2760
|
+
# can only specify it with the ID (Key ID or Key ARN) of the KMS
|
2761
|
+
# customer managed key that's configured for your directory bucket's
|
2762
|
+
# default encryption setting. Otherwise, you get an HTTP `400 Bad
|
2763
|
+
# Request` error. Only use the key ID or key ARN. The key alias format
|
2764
|
+
# of the KMS key isn't supported. Your SSE-KMS configuration can only
|
2765
|
+
# support 1 [customer managed key][1] per directory bucket for the
|
2766
|
+
# lifetime of the bucket. The [Amazon Web Services managed key][2]
|
2767
|
+
# (`aws/s3`) isn't supported.
|
2745
2768
|
#
|
2746
2769
|
#
|
2747
2770
|
#
|
@@ -3376,13 +3399,13 @@ module Aws::S3
|
|
3376
3399
|
# For the `x-amz-checksum-algorithm ` header, replace ` algorithm ` with
|
3377
3400
|
# the supported algorithm from the following list:
|
3378
3401
|
#
|
3379
|
-
# * CRC32
|
3402
|
+
# * `CRC32`
|
3380
3403
|
#
|
3381
|
-
# * CRC32C
|
3404
|
+
# * `CRC32C`
|
3382
3405
|
#
|
3383
|
-
# * SHA1
|
3406
|
+
# * `SHA1`
|
3384
3407
|
#
|
3385
|
-
# * SHA256
|
3408
|
+
# * `SHA256`
|
3386
3409
|
#
|
3387
3410
|
# For more information, see [Checking object integrity][1] in the
|
3388
3411
|
# *Amazon S3 User Guide*.
|
@@ -723,17 +723,17 @@ module Aws::S3
|
|
723
723
|
# * To encrypt new object copies to a directory bucket with SSE-KMS, we
|
724
724
|
# recommend you specify SSE-KMS as the directory bucket's default
|
725
725
|
# encryption configuration with a KMS key (specifically, a [customer
|
726
|
-
# managed key][4]). [Amazon Web Services managed key][5]
|
727
|
-
# isn't supported. Your SSE-KMS configuration can only
|
728
|
-
# [customer managed key][4] per directory bucket for the
|
729
|
-
# the bucket. After you specify a customer managed key for
|
730
|
-
# you can't override the customer managed key for the
|
731
|
-
# SSE-KMS configuration. Then, when you perform a
|
732
|
-
# operation and want to specify server-side encryption
|
733
|
-
# new object copies with SSE-KMS in the
|
734
|
-
# headers, you must ensure the encryption
|
735
|
-
# managed key that you specified for the
|
736
|
-
# encryption configuration.
|
726
|
+
# managed key][4]). The [Amazon Web Services managed key][5]
|
727
|
+
# (`aws/s3`) isn't supported. Your SSE-KMS configuration can only
|
728
|
+
# support 1 [customer managed key][4] per directory bucket for the
|
729
|
+
# lifetime of the bucket. After you specify a customer managed key for
|
730
|
+
# SSE-KMS, you can't override the customer managed key for the
|
731
|
+
# bucket's SSE-KMS configuration. Then, when you perform a
|
732
|
+
# `CopyObject` operation and want to specify server-side encryption
|
733
|
+
# settings for new object copies with SSE-KMS in the
|
734
|
+
# encryption-related request headers, you must ensure the encryption
|
735
|
+
# key is the same customer managed key that you specified for the
|
736
|
+
# directory bucket's default encryption configuration.
|
737
737
|
#
|
738
738
|
#
|
739
739
|
#
|
@@ -841,14 +841,19 @@ module Aws::S3
|
|
841
841
|
# Guide*.
|
842
842
|
#
|
843
843
|
# **Directory buckets** - If you specify `x-amz-server-side-encryption`
|
844
|
-
# with `aws:kms`,
|
845
|
-
#
|
846
|
-
#
|
847
|
-
#
|
848
|
-
# key
|
849
|
-
#
|
850
|
-
# managed key
|
851
|
-
#
|
844
|
+
# with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
|
845
|
+
# header is implicitly assigned the ID of the KMS symmetric encryption
|
846
|
+
# customer managed key that's configured for your directory bucket's
|
847
|
+
# default encryption setting. If you want to specify the `
|
848
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
|
849
|
+
# can only specify it with the ID (Key ID or Key ARN) of the KMS
|
850
|
+
# customer managed key that's configured for your directory bucket's
|
851
|
+
# default encryption setting. Otherwise, you get an HTTP `400 Bad
|
852
|
+
# Request` error. Only use the key ID or key ARN. The key alias format
|
853
|
+
# of the KMS key isn't supported. Your SSE-KMS configuration can only
|
854
|
+
# support 1 [customer managed key][2] per directory bucket for the
|
855
|
+
# lifetime of the bucket. The [Amazon Web Services managed key][3]
|
856
|
+
# (`aws/s3`) isn't supported.
|
852
857
|
#
|
853
858
|
#
|
854
859
|
#
|
@@ -1826,14 +1831,19 @@ module Aws::S3
|
|
1826
1831
|
# Amazon Web Services managed key (`aws/s3`) to protect the data.
|
1827
1832
|
#
|
1828
1833
|
# **Directory buckets** - If you specify `x-amz-server-side-encryption`
|
1829
|
-
# with `aws:kms`,
|
1830
|
-
#
|
1831
|
-
#
|
1832
|
-
#
|
1833
|
-
# key
|
1834
|
-
#
|
1835
|
-
# managed key
|
1836
|
-
#
|
1834
|
+
# with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
|
1835
|
+
# header is implicitly assigned the ID of the KMS symmetric encryption
|
1836
|
+
# customer managed key that's configured for your directory bucket's
|
1837
|
+
# default encryption setting. If you want to specify the `
|
1838
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
|
1839
|
+
# can only specify it with the ID (Key ID or Key ARN) of the KMS
|
1840
|
+
# customer managed key that's configured for your directory bucket's
|
1841
|
+
# default encryption setting. Otherwise, you get an HTTP `400 Bad
|
1842
|
+
# Request` error. Only use the key ID or key ARN. The key alias format
|
1843
|
+
# of the KMS key isn't supported. Your SSE-KMS configuration can only
|
1844
|
+
# support 1 [customer managed key][1] per directory bucket for the
|
1845
|
+
# lifetime of the bucket. The [Amazon Web Services managed key][2]
|
1846
|
+
# (`aws/s3`) isn't supported.
|
1837
1847
|
#
|
1838
1848
|
#
|
1839
1849
|
#
|
@@ -2073,10 +2083,11 @@ module Aws::S3
|
|
2073
2083
|
# information about REST request authentication, see [REST
|
2074
2084
|
# Authentication][1].
|
2075
2085
|
#
|
2076
|
-
# <note markdown="1"> The `Content-MD5` header is required
|
2077
|
-
# object with a retention period configured
|
2078
|
-
#
|
2079
|
-
# Object Lock
|
2086
|
+
# <note markdown="1"> The `Content-MD5` or `x-amz-sdk-checksum-algorithm` header is required
|
2087
|
+
# for any request to upload an object with a retention period configured
|
2088
|
+
# using Amazon S3 Object Lock. For more information, see [Uploading
|
2089
|
+
# objects to an Object Lock enabled bucket ][2] in the *Amazon S3 User
|
2090
|
+
# Guide*.
|
2080
2091
|
#
|
2081
2092
|
# </note>
|
2082
2093
|
#
|
@@ -2087,7 +2098,7 @@ module Aws::S3
|
|
2087
2098
|
#
|
2088
2099
|
#
|
2089
2100
|
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/RESTAuthentication.html
|
2090
|
-
# [2]: https://docs.aws.amazon.com/AmazonS3/latest/
|
2101
|
+
# [2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock-managing.html#object-lock-put-object
|
2091
2102
|
# @option options [String] :content_type
|
2092
2103
|
# A standard MIME type describing the format of the contents. For more
|
2093
2104
|
# information, see
|
@@ -2107,13 +2118,13 @@ module Aws::S3
|
|
2107
2118
|
# For the `x-amz-checksum-algorithm ` header, replace ` algorithm ` with
|
2108
2119
|
# the supported algorithm from the following list:
|
2109
2120
|
#
|
2110
|
-
# * CRC32
|
2121
|
+
# * `CRC32`
|
2111
2122
|
#
|
2112
|
-
# * CRC32C
|
2123
|
+
# * `CRC32C`
|
2113
2124
|
#
|
2114
|
-
# * SHA1
|
2125
|
+
# * `SHA1`
|
2115
2126
|
#
|
2116
|
-
# * SHA256
|
2127
|
+
# * `SHA256`
|
2117
2128
|
#
|
2118
2129
|
# For more information, see [Checking object integrity][1] in the
|
2119
2130
|
# *Amazon S3 User Guide*.
|
@@ -2124,20 +2135,27 @@ module Aws::S3
|
|
2124
2135
|
# provided `ChecksumAlgorithm` parameter and uses the checksum algorithm
|
2125
2136
|
# that matches the provided value in `x-amz-checksum-algorithm `.
|
2126
2137
|
#
|
2127
|
-
# <note markdown="1">
|
2128
|
-
#
|
2138
|
+
# <note markdown="1"> The `Content-MD5` or `x-amz-sdk-checksum-algorithm` header is required
|
2139
|
+
# for any request to upload an object with a retention period configured
|
2140
|
+
# using Amazon S3 Object Lock. For more information, see [Uploading
|
2141
|
+
# objects to an Object Lock enabled bucket ][2] in the *Amazon S3 User
|
2142
|
+
# Guide*.
|
2129
2143
|
#
|
2130
2144
|
# </note>
|
2131
2145
|
#
|
2146
|
+
# For directory buckets, when you use Amazon Web Services SDKs, `CRC32`
|
2147
|
+
# is the default checksum algorithm that's used for performance.
|
2148
|
+
#
|
2132
2149
|
#
|
2133
2150
|
#
|
2134
2151
|
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html
|
2152
|
+
# [2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock-managing.html#object-lock-put-object
|
2135
2153
|
# @option options [String] :checksum_crc32
|
2136
2154
|
# This header can be used as a data integrity check to verify that the
|
2137
2155
|
# data received is the same data that was originally sent. This header
|
2138
|
-
# specifies the base64-encoded, 32-bit
|
2139
|
-
# more information, see [Checking object integrity][1] in the
|
2140
|
-
# User Guide*.
|
2156
|
+
# specifies the base64-encoded, 32-bit CRC-32 checksum of the object.
|
2157
|
+
# For more information, see [Checking object integrity][1] in the
|
2158
|
+
# *Amazon S3 User Guide*.
|
2141
2159
|
#
|
2142
2160
|
#
|
2143
2161
|
#
|
@@ -2145,7 +2163,7 @@ module Aws::S3
|
|
2145
2163
|
# @option options [String] :checksum_crc32c
|
2146
2164
|
# This header can be used as a data integrity check to verify that the
|
2147
2165
|
# data received is the same data that was originally sent. This header
|
2148
|
-
# specifies the base64-encoded, 32-bit
|
2166
|
+
# specifies the base64-encoded, 32-bit CRC-32C checksum of the object.
|
2149
2167
|
# For more information, see [Checking object integrity][1] in the
|
2150
2168
|
# *Amazon S3 User Guide*.
|
2151
2169
|
#
|
@@ -2384,14 +2402,19 @@ module Aws::S3
|
|
2384
2402
|
# Amazon Web Services managed key (`aws/s3`) to protect the data.
|
2385
2403
|
#
|
2386
2404
|
# **Directory buckets** - If you specify `x-amz-server-side-encryption`
|
2387
|
-
# with `aws:kms`,
|
2388
|
-
#
|
2389
|
-
#
|
2390
|
-
#
|
2391
|
-
# key
|
2392
|
-
#
|
2393
|
-
# managed key
|
2394
|
-
#
|
2405
|
+
# with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
|
2406
|
+
# header is implicitly assigned the ID of the KMS symmetric encryption
|
2407
|
+
# customer managed key that's configured for your directory bucket's
|
2408
|
+
# default encryption setting. If you want to specify the `
|
2409
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
|
2410
|
+
# can only specify it with the ID (Key ID or Key ARN) of the KMS
|
2411
|
+
# customer managed key that's configured for your directory bucket's
|
2412
|
+
# default encryption setting. Otherwise, you get an HTTP `400 Bad
|
2413
|
+
# Request` error. Only use the key ID or key ARN. The key alias format
|
2414
|
+
# of the KMS key isn't supported. Your SSE-KMS configuration can only
|
2415
|
+
# support 1 [customer managed key][1] per directory bucket for the
|
2416
|
+
# lifetime of the bucket. The [Amazon Web Services managed key][2]
|
2417
|
+
# (`aws/s3`) isn't supported.
|
2395
2418
|
#
|
2396
2419
|
#
|
2397
2420
|
#
|
@@ -2836,13 +2859,13 @@ module Aws::S3
|
|
2836
2859
|
# For the `x-amz-checksum-algorithm ` header, replace ` algorithm ` with
|
2837
2860
|
# the supported algorithm from the following list:
|
2838
2861
|
#
|
2839
|
-
# * CRC32
|
2862
|
+
# * `CRC32`
|
2840
2863
|
#
|
2841
|
-
# * CRC32C
|
2864
|
+
# * `CRC32C`
|
2842
2865
|
#
|
2843
|
-
# * SHA1
|
2866
|
+
# * `SHA1`
|
2844
2867
|
#
|
2845
|
-
# * SHA256
|
2868
|
+
# * `SHA256`
|
2846
2869
|
#
|
2847
2870
|
# For more information, see [Checking object integrity][1] in the
|
2848
2871
|
# *Amazon S3 User Guide*.
|
@@ -869,13 +869,13 @@ module Aws::S3
|
|
869
869
|
# For the `x-amz-checksum-algorithm ` header, replace ` algorithm ` with
|
870
870
|
# the supported algorithm from the following list:
|
871
871
|
#
|
872
|
-
# * CRC32
|
872
|
+
# * `CRC32`
|
873
873
|
#
|
874
|
-
# * CRC32C
|
874
|
+
# * `CRC32C`
|
875
875
|
#
|
876
|
-
# * SHA1
|
876
|
+
# * `SHA1`
|
877
877
|
#
|
878
|
-
# * SHA256
|
878
|
+
# * `SHA256`
|
879
879
|
#
|
880
880
|
# For more information, see [Checking object integrity][1] in the
|
881
881
|
# *Amazon S3 User Guide*.
|