aws-sdk-s3 1.178.0 → 1.180.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-s3/bucket.rb +12 -15
- data/lib/aws-sdk-s3/bucket_acl.rb +1 -1
- data/lib/aws-sdk-s3/bucket_cors.rb +1 -1
- data/lib/aws-sdk-s3/bucket_lifecycle.rb +1 -1
- data/lib/aws-sdk-s3/bucket_lifecycle_configuration.rb +1 -1
- data/lib/aws-sdk-s3/bucket_logging.rb +1 -1
- data/lib/aws-sdk-s3/bucket_policy.rb +1 -1
- data/lib/aws-sdk-s3/bucket_request_payment.rb +1 -1
- data/lib/aws-sdk-s3/bucket_tagging.rb +1 -1
- data/lib/aws-sdk-s3/bucket_versioning.rb +3 -3
- data/lib/aws-sdk-s3/bucket_website.rb +1 -1
- data/lib/aws-sdk-s3/client.rb +449 -431
- data/lib/aws-sdk-s3/endpoint_provider.rb +260 -277
- data/lib/aws-sdk-s3/object.rb +34 -52
- data/lib/aws-sdk-s3/object_summary.rb +34 -52
- data/lib/aws-sdk-s3/object_version.rb +1 -10
- data/lib/aws-sdk-s3/resource.rb +1 -1
- data/lib/aws-sdk-s3/types.rb +290 -264
- data/lib/aws-sdk-s3.rb +1 -1
- data/sig/bucket.rbs +1 -1
- data/sig/client.rbs +2 -2
- data/sig/resource.rbs +1 -1
- data/sig/types.rbs +2 -2
- metadata +2 -2
data/lib/aws-sdk-s3/object.rb
CHANGED
@@ -1219,20 +1219,17 @@ module Aws::S3
|
|
1219
1219
|
# Signature Version in Request Authentication][1] in the *Amazon S3 User
|
1220
1220
|
# Guide*.
|
1221
1221
|
#
|
1222
|
-
# **Directory buckets** -
|
1223
|
-
#
|
1224
|
-
#
|
1225
|
-
#
|
1226
|
-
#
|
1227
|
-
# x-amz-server-side-encryption-aws-kms-key-id` header
|
1228
|
-
#
|
1229
|
-
#
|
1230
|
-
#
|
1231
|
-
#
|
1232
|
-
#
|
1233
|
-
# support 1 [customer managed key][2] per directory bucket for the
|
1234
|
-
# lifetime of the bucket. The [Amazon Web Services managed key][3]
|
1235
|
-
# (`aws/s3`) isn't supported.
|
1222
|
+
# **Directory buckets** - To encrypt data using SSE-KMS, it's
|
1223
|
+
# recommended to specify the `x-amz-server-side-encryption` header to
|
1224
|
+
# `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
|
1225
|
+
# header implicitly uses the bucket's default KMS customer managed key
|
1226
|
+
# ID. If you want to explicitly set the `
|
1227
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
|
1228
|
+
# bucket's default customer managed key (using key ID or ARN, not
|
1229
|
+
# alias). Your SSE-KMS configuration can only support 1 [customer
|
1230
|
+
# managed key][2] per directory bucket's lifetime. The [Amazon Web
|
1231
|
+
# Services managed key][3] (`aws/s3`) isn't supported. Incorrect key
|
1232
|
+
# specification results in an HTTP `400 Bad Request` error.
|
1236
1233
|
#
|
1237
1234
|
#
|
1238
1235
|
#
|
@@ -1503,7 +1500,7 @@ module Aws::S3
|
|
1503
1500
|
#
|
1504
1501
|
#
|
1505
1502
|
#
|
1506
|
-
# [1]: https://
|
1503
|
+
# [1]: https://tools.ietf.org/html/rfc7232
|
1507
1504
|
# @option options [Time,DateTime,Date,Integer,String] :if_match_last_modified_time
|
1508
1505
|
# If present, the object is deleted only if its modification times
|
1509
1506
|
# matches the provided `Timestamp`. If the `Timestamp` values do not
|
@@ -1784,15 +1781,6 @@ module Aws::S3
|
|
1784
1781
|
# fails with the HTTP status code `403 Forbidden` (access denied).
|
1785
1782
|
# @option options [String] :checksum_mode
|
1786
1783
|
# To retrieve the checksum, this mode must be enabled.
|
1787
|
-
#
|
1788
|
-
# **General purpose buckets** - In addition, if you enable checksum mode
|
1789
|
-
# and the object is uploaded with a [checksum][1] and encrypted with an
|
1790
|
-
# Key Management Service (KMS) key, you must have permission to use the
|
1791
|
-
# `kms:Decrypt` action to retrieve the checksum.
|
1792
|
-
#
|
1793
|
-
#
|
1794
|
-
#
|
1795
|
-
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/API/API_Checksum.html
|
1796
1784
|
# @return [Types::GetObjectOutput]
|
1797
1785
|
def get(options = {}, &block)
|
1798
1786
|
options = options.merge(
|
@@ -2253,20 +2241,17 @@ module Aws::S3
|
|
2253
2241
|
# `x-amz-server-side-encryption-aws-kms-key-id`, Amazon S3 uses the
|
2254
2242
|
# Amazon Web Services managed key (`aws/s3`) to protect the data.
|
2255
2243
|
#
|
2256
|
-
# **Directory buckets** -
|
2257
|
-
#
|
2258
|
-
#
|
2259
|
-
#
|
2260
|
-
#
|
2261
|
-
# x-amz-server-side-encryption-aws-kms-key-id` header
|
2262
|
-
#
|
2263
|
-
#
|
2264
|
-
#
|
2265
|
-
#
|
2266
|
-
#
|
2267
|
-
# support 1 [customer managed key][1] per directory bucket for the
|
2268
|
-
# lifetime of the bucket. The [Amazon Web Services managed key][2]
|
2269
|
-
# (`aws/s3`) isn't supported.
|
2244
|
+
# **Directory buckets** - To encrypt data using SSE-KMS, it's
|
2245
|
+
# recommended to specify the `x-amz-server-side-encryption` header to
|
2246
|
+
# `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
|
2247
|
+
# header implicitly uses the bucket's default KMS customer managed key
|
2248
|
+
# ID. If you want to explicitly set the `
|
2249
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
|
2250
|
+
# bucket's default customer managed key (using key ID or ARN, not
|
2251
|
+
# alias). Your SSE-KMS configuration can only support 1 [customer
|
2252
|
+
# managed key][1] per directory bucket's lifetime. The [Amazon Web
|
2253
|
+
# Services managed key][2] (`aws/s3`) isn't supported. Incorrect key
|
2254
|
+
# specification results in an HTTP `400 Bad Request` error.
|
2270
2255
|
#
|
2271
2256
|
#
|
2272
2257
|
#
|
@@ -2876,20 +2861,17 @@ module Aws::S3
|
|
2876
2861
|
# `x-amz-server-side-encryption-aws-kms-key-id`, Amazon S3 uses the
|
2877
2862
|
# Amazon Web Services managed key (`aws/s3`) to protect the data.
|
2878
2863
|
#
|
2879
|
-
# **Directory buckets** -
|
2880
|
-
#
|
2881
|
-
#
|
2882
|
-
#
|
2883
|
-
#
|
2884
|
-
# x-amz-server-side-encryption-aws-kms-key-id` header
|
2885
|
-
#
|
2886
|
-
#
|
2887
|
-
#
|
2888
|
-
#
|
2889
|
-
#
|
2890
|
-
# support 1 [customer managed key][1] per directory bucket for the
|
2891
|
-
# lifetime of the bucket. The [Amazon Web Services managed key][2]
|
2892
|
-
# (`aws/s3`) isn't supported.
|
2864
|
+
# **Directory buckets** - To encrypt data using SSE-KMS, it's
|
2865
|
+
# recommended to specify the `x-amz-server-side-encryption` header to
|
2866
|
+
# `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
|
2867
|
+
# header implicitly uses the bucket's default KMS customer managed key
|
2868
|
+
# ID. If you want to explicitly set the `
|
2869
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
|
2870
|
+
# bucket's default customer managed key (using key ID or ARN, not
|
2871
|
+
# alias). Your SSE-KMS configuration can only support 1 [customer
|
2872
|
+
# managed key][1] per directory bucket's lifetime. The [Amazon Web
|
2873
|
+
# Services managed key][2] (`aws/s3`) isn't supported. Incorrect key
|
2874
|
+
# specification results in an HTTP `400 Bad Request` error.
|
2893
2875
|
#
|
2894
2876
|
#
|
2895
2877
|
#
|
@@ -852,20 +852,17 @@ module Aws::S3
|
|
852
852
|
# Signature Version in Request Authentication][1] in the *Amazon S3 User
|
853
853
|
# Guide*.
|
854
854
|
#
|
855
|
-
# **Directory buckets** -
|
856
|
-
#
|
857
|
-
#
|
858
|
-
#
|
859
|
-
#
|
860
|
-
# x-amz-server-side-encryption-aws-kms-key-id` header
|
861
|
-
#
|
862
|
-
#
|
863
|
-
#
|
864
|
-
#
|
865
|
-
#
|
866
|
-
# support 1 [customer managed key][2] per directory bucket for the
|
867
|
-
# lifetime of the bucket. The [Amazon Web Services managed key][3]
|
868
|
-
# (`aws/s3`) isn't supported.
|
855
|
+
# **Directory buckets** - To encrypt data using SSE-KMS, it's
|
856
|
+
# recommended to specify the `x-amz-server-side-encryption` header to
|
857
|
+
# `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
|
858
|
+
# header implicitly uses the bucket's default KMS customer managed key
|
859
|
+
# ID. If you want to explicitly set the `
|
860
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
|
861
|
+
# bucket's default customer managed key (using key ID or ARN, not
|
862
|
+
# alias). Your SSE-KMS configuration can only support 1 [customer
|
863
|
+
# managed key][2] per directory bucket's lifetime. The [Amazon Web
|
864
|
+
# Services managed key][3] (`aws/s3`) isn't supported. Incorrect key
|
865
|
+
# specification results in an HTTP `400 Bad Request` error.
|
869
866
|
#
|
870
867
|
#
|
871
868
|
#
|
@@ -1136,7 +1133,7 @@ module Aws::S3
|
|
1136
1133
|
#
|
1137
1134
|
#
|
1138
1135
|
#
|
1139
|
-
# [1]: https://
|
1136
|
+
# [1]: https://tools.ietf.org/html/rfc7232
|
1140
1137
|
# @option options [Time,DateTime,Date,Integer,String] :if_match_last_modified_time
|
1141
1138
|
# If present, the object is deleted only if its modification times
|
1142
1139
|
# matches the provided `Timestamp`. If the `Timestamp` values do not
|
@@ -1417,15 +1414,6 @@ module Aws::S3
|
|
1417
1414
|
# fails with the HTTP status code `403 Forbidden` (access denied).
|
1418
1415
|
# @option options [String] :checksum_mode
|
1419
1416
|
# To retrieve the checksum, this mode must be enabled.
|
1420
|
-
#
|
1421
|
-
# **General purpose buckets** - In addition, if you enable checksum mode
|
1422
|
-
# and the object is uploaded with a [checksum][1] and encrypted with an
|
1423
|
-
# Key Management Service (KMS) key, you must have permission to use the
|
1424
|
-
# `kms:Decrypt` action to retrieve the checksum.
|
1425
|
-
#
|
1426
|
-
#
|
1427
|
-
#
|
1428
|
-
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/API/API_Checksum.html
|
1429
1417
|
# @return [Types::GetObjectOutput]
|
1430
1418
|
def get(options = {}, &block)
|
1431
1419
|
options = options.merge(
|
@@ -1886,20 +1874,17 @@ module Aws::S3
|
|
1886
1874
|
# `x-amz-server-side-encryption-aws-kms-key-id`, Amazon S3 uses the
|
1887
1875
|
# Amazon Web Services managed key (`aws/s3`) to protect the data.
|
1888
1876
|
#
|
1889
|
-
# **Directory buckets** -
|
1890
|
-
#
|
1891
|
-
#
|
1892
|
-
#
|
1893
|
-
#
|
1894
|
-
# x-amz-server-side-encryption-aws-kms-key-id` header
|
1895
|
-
#
|
1896
|
-
#
|
1897
|
-
#
|
1898
|
-
#
|
1899
|
-
#
|
1900
|
-
# support 1 [customer managed key][1] per directory bucket for the
|
1901
|
-
# lifetime of the bucket. The [Amazon Web Services managed key][2]
|
1902
|
-
# (`aws/s3`) isn't supported.
|
1877
|
+
# **Directory buckets** - To encrypt data using SSE-KMS, it's
|
1878
|
+
# recommended to specify the `x-amz-server-side-encryption` header to
|
1879
|
+
# `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
|
1880
|
+
# header implicitly uses the bucket's default KMS customer managed key
|
1881
|
+
# ID. If you want to explicitly set the `
|
1882
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
|
1883
|
+
# bucket's default customer managed key (using key ID or ARN, not
|
1884
|
+
# alias). Your SSE-KMS configuration can only support 1 [customer
|
1885
|
+
# managed key][1] per directory bucket's lifetime. The [Amazon Web
|
1886
|
+
# Services managed key][2] (`aws/s3`) isn't supported. Incorrect key
|
1887
|
+
# specification results in an HTTP `400 Bad Request` error.
|
1903
1888
|
#
|
1904
1889
|
#
|
1905
1890
|
#
|
@@ -2509,20 +2494,17 @@ module Aws::S3
|
|
2509
2494
|
# `x-amz-server-side-encryption-aws-kms-key-id`, Amazon S3 uses the
|
2510
2495
|
# Amazon Web Services managed key (`aws/s3`) to protect the data.
|
2511
2496
|
#
|
2512
|
-
# **Directory buckets** -
|
2513
|
-
#
|
2514
|
-
#
|
2515
|
-
#
|
2516
|
-
#
|
2517
|
-
# x-amz-server-side-encryption-aws-kms-key-id` header
|
2518
|
-
#
|
2519
|
-
#
|
2520
|
-
#
|
2521
|
-
#
|
2522
|
-
#
|
2523
|
-
# support 1 [customer managed key][1] per directory bucket for the
|
2524
|
-
# lifetime of the bucket. The [Amazon Web Services managed key][2]
|
2525
|
-
# (`aws/s3`) isn't supported.
|
2497
|
+
# **Directory buckets** - To encrypt data using SSE-KMS, it's
|
2498
|
+
# recommended to specify the `x-amz-server-side-encryption` header to
|
2499
|
+
# `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
|
2500
|
+
# header implicitly uses the bucket's default KMS customer managed key
|
2501
|
+
# ID. If you want to explicitly set the `
|
2502
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
|
2503
|
+
# bucket's default customer managed key (using key ID or ARN, not
|
2504
|
+
# alias). Your SSE-KMS configuration can only support 1 [customer
|
2505
|
+
# managed key][1] per directory bucket's lifetime. The [Amazon Web
|
2506
|
+
# Services managed key][2] (`aws/s3`) isn't supported. Incorrect key
|
2507
|
+
# specification results in an HTTP `400 Bad Request` error.
|
2526
2508
|
#
|
2527
2509
|
#
|
2528
2510
|
#
|
@@ -326,7 +326,7 @@ module Aws::S3
|
|
326
326
|
#
|
327
327
|
#
|
328
328
|
#
|
329
|
-
# [1]: https://
|
329
|
+
# [1]: https://tools.ietf.org/html/rfc7232
|
330
330
|
# @option options [Time,DateTime,Date,Integer,String] :if_match_last_modified_time
|
331
331
|
# If present, the object is deleted only if its modification times
|
332
332
|
# matches the provided `Timestamp`. If the `Timestamp` values do not
|
@@ -578,15 +578,6 @@ module Aws::S3
|
|
578
578
|
# fails with the HTTP status code `403 Forbidden` (access denied).
|
579
579
|
# @option options [String] :checksum_mode
|
580
580
|
# To retrieve the checksum, this mode must be enabled.
|
581
|
-
#
|
582
|
-
# **General purpose buckets** - In addition, if you enable checksum mode
|
583
|
-
# and the object is uploaded with a [checksum][1] and encrypted with an
|
584
|
-
# Key Management Service (KMS) key, you must have permission to use the
|
585
|
-
# `kms:Decrypt` action to retrieve the checksum.
|
586
|
-
#
|
587
|
-
#
|
588
|
-
#
|
589
|
-
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/API/API_Checksum.html
|
590
581
|
# @return [Types::GetObjectOutput]
|
591
582
|
def get(options = {}, &block)
|
592
583
|
options = options.merge(
|
data/lib/aws-sdk-s3/resource.rb
CHANGED
@@ -41,7 +41,7 @@ module Aws::S3
|
|
41
41
|
# acl: "private", # accepts private, public-read, public-read-write, authenticated-read
|
42
42
|
# bucket: "BucketName", # required
|
43
43
|
# create_bucket_configuration: {
|
44
|
-
# location_constraint: "af-south-1", # accepts af-south-1, ap-east-1, ap-northeast-1, ap-northeast-2, ap-northeast-3, ap-south-1, ap-south-2, ap-southeast-1, ap-southeast-2, ap-southeast-3, ca-central-1, cn-north-1, cn-northwest-1, EU, eu-central-1, eu-north-1, eu-south-1, eu-south-2, eu-west-1, eu-west-2, eu-west-3, me-south-1, sa-east-1, us-east-2, us-gov-east-1, us-gov-west-1, us-west-1, us-west-2
|
44
|
+
# location_constraint: "af-south-1", # accepts af-south-1, ap-east-1, ap-northeast-1, ap-northeast-2, ap-northeast-3, ap-south-1, ap-south-2, ap-southeast-1, ap-southeast-2, ap-southeast-3, ap-southeast-4, ap-southeast-5, ca-central-1, cn-north-1, cn-northwest-1, EU, eu-central-1, eu-central-2, eu-north-1, eu-south-1, eu-south-2, eu-west-1, eu-west-2, eu-west-3, il-central-1, me-central-1, me-south-1, sa-east-1, us-east-2, us-gov-east-1, us-gov-west-1, us-west-1, us-west-2
|
45
45
|
# location: {
|
46
46
|
# type: "AvailabilityZone", # accepts AvailabilityZone, LocalZone
|
47
47
|
# name: "LocationNameAsString",
|