aws-sdk-s3 1.178.0 → 1.180.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1219,20 +1219,17 @@ module Aws::S3
1219
1219
  # Signature Version in Request Authentication][1] in the *Amazon S3 User
1220
1220
  # Guide*.
1221
1221
  #
1222
- # **Directory buckets** - If you specify `x-amz-server-side-encryption`
1223
- # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
1224
- # header is implicitly assigned the ID of the KMS symmetric encryption
1225
- # customer managed key that's configured for your directory bucket's
1226
- # default encryption setting. If you want to specify the `
1227
- # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
1228
- # can only specify it with the ID (Key ID or Key ARN) of the KMS
1229
- # customer managed key that's configured for your directory bucket's
1230
- # default encryption setting. Otherwise, you get an HTTP `400 Bad
1231
- # Request` error. Only use the key ID or key ARN. The key alias format
1232
- # of the KMS key isn't supported. Your SSE-KMS configuration can only
1233
- # support 1 [customer managed key][2] per directory bucket for the
1234
- # lifetime of the bucket. The [Amazon Web Services managed key][3]
1235
- # (`aws/s3`) isn't supported.
1222
+ # **Directory buckets** - To encrypt data using SSE-KMS, it's
1223
+ # recommended to specify the `x-amz-server-side-encryption` header to
1224
+ # `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
1225
+ # header implicitly uses the bucket's default KMS customer managed key
1226
+ # ID. If you want to explicitly set the `
1227
+ # x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
1228
+ # bucket's default customer managed key (using key ID or ARN, not
1229
+ # alias). Your SSE-KMS configuration can only support 1 [customer
1230
+ # managed key][2] per directory bucket's lifetime. The [Amazon Web
1231
+ # Services managed key][3] (`aws/s3`) isn't supported. Incorrect key
1232
+ # specification results in an HTTP `400 Bad Request` error.
1236
1233
  #
1237
1234
  #
1238
1235
  #
@@ -1503,7 +1500,7 @@ module Aws::S3
1503
1500
  #
1504
1501
  #
1505
1502
  #
1506
- # [1]: https://docs.aws.amazon.com/https:/tools.ietf.org/html/rfc7232
1503
+ # [1]: https://tools.ietf.org/html/rfc7232
1507
1504
  # @option options [Time,DateTime,Date,Integer,String] :if_match_last_modified_time
1508
1505
  # If present, the object is deleted only if its modification times
1509
1506
  # matches the provided `Timestamp`. If the `Timestamp` values do not
@@ -1784,15 +1781,6 @@ module Aws::S3
1784
1781
  # fails with the HTTP status code `403 Forbidden` (access denied).
1785
1782
  # @option options [String] :checksum_mode
1786
1783
  # To retrieve the checksum, this mode must be enabled.
1787
- #
1788
- # **General purpose buckets** - In addition, if you enable checksum mode
1789
- # and the object is uploaded with a [checksum][1] and encrypted with an
1790
- # Key Management Service (KMS) key, you must have permission to use the
1791
- # `kms:Decrypt` action to retrieve the checksum.
1792
- #
1793
- #
1794
- #
1795
- # [1]: https://docs.aws.amazon.com/AmazonS3/latest/API/API_Checksum.html
1796
1784
  # @return [Types::GetObjectOutput]
1797
1785
  def get(options = {}, &block)
1798
1786
  options = options.merge(
@@ -2253,20 +2241,17 @@ module Aws::S3
2253
2241
  # `x-amz-server-side-encryption-aws-kms-key-id`, Amazon S3 uses the
2254
2242
  # Amazon Web Services managed key (`aws/s3`) to protect the data.
2255
2243
  #
2256
- # **Directory buckets** - If you specify `x-amz-server-side-encryption`
2257
- # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
2258
- # header is implicitly assigned the ID of the KMS symmetric encryption
2259
- # customer managed key that's configured for your directory bucket's
2260
- # default encryption setting. If you want to specify the `
2261
- # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
2262
- # can only specify it with the ID (Key ID or Key ARN) of the KMS
2263
- # customer managed key that's configured for your directory bucket's
2264
- # default encryption setting. Otherwise, you get an HTTP `400 Bad
2265
- # Request` error. Only use the key ID or key ARN. The key alias format
2266
- # of the KMS key isn't supported. Your SSE-KMS configuration can only
2267
- # support 1 [customer managed key][1] per directory bucket for the
2268
- # lifetime of the bucket. The [Amazon Web Services managed key][2]
2269
- # (`aws/s3`) isn't supported.
2244
+ # **Directory buckets** - To encrypt data using SSE-KMS, it's
2245
+ # recommended to specify the `x-amz-server-side-encryption` header to
2246
+ # `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
2247
+ # header implicitly uses the bucket's default KMS customer managed key
2248
+ # ID. If you want to explicitly set the `
2249
+ # x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
2250
+ # bucket's default customer managed key (using key ID or ARN, not
2251
+ # alias). Your SSE-KMS configuration can only support 1 [customer
2252
+ # managed key][1] per directory bucket's lifetime. The [Amazon Web
2253
+ # Services managed key][2] (`aws/s3`) isn't supported. Incorrect key
2254
+ # specification results in an HTTP `400 Bad Request` error.
2270
2255
  #
2271
2256
  #
2272
2257
  #
@@ -2876,20 +2861,17 @@ module Aws::S3
2876
2861
  # `x-amz-server-side-encryption-aws-kms-key-id`, Amazon S3 uses the
2877
2862
  # Amazon Web Services managed key (`aws/s3`) to protect the data.
2878
2863
  #
2879
- # **Directory buckets** - If you specify `x-amz-server-side-encryption`
2880
- # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
2881
- # header is implicitly assigned the ID of the KMS symmetric encryption
2882
- # customer managed key that's configured for your directory bucket's
2883
- # default encryption setting. If you want to specify the `
2884
- # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
2885
- # can only specify it with the ID (Key ID or Key ARN) of the KMS
2886
- # customer managed key that's configured for your directory bucket's
2887
- # default encryption setting. Otherwise, you get an HTTP `400 Bad
2888
- # Request` error. Only use the key ID or key ARN. The key alias format
2889
- # of the KMS key isn't supported. Your SSE-KMS configuration can only
2890
- # support 1 [customer managed key][1] per directory bucket for the
2891
- # lifetime of the bucket. The [Amazon Web Services managed key][2]
2892
- # (`aws/s3`) isn't supported.
2864
+ # **Directory buckets** - To encrypt data using SSE-KMS, it's
2865
+ # recommended to specify the `x-amz-server-side-encryption` header to
2866
+ # `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
2867
+ # header implicitly uses the bucket's default KMS customer managed key
2868
+ # ID. If you want to explicitly set the `
2869
+ # x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
2870
+ # bucket's default customer managed key (using key ID or ARN, not
2871
+ # alias). Your SSE-KMS configuration can only support 1 [customer
2872
+ # managed key][1] per directory bucket's lifetime. The [Amazon Web
2873
+ # Services managed key][2] (`aws/s3`) isn't supported. Incorrect key
2874
+ # specification results in an HTTP `400 Bad Request` error.
2893
2875
  #
2894
2876
  #
2895
2877
  #
@@ -852,20 +852,17 @@ module Aws::S3
852
852
  # Signature Version in Request Authentication][1] in the *Amazon S3 User
853
853
  # Guide*.
854
854
  #
855
- # **Directory buckets** - If you specify `x-amz-server-side-encryption`
856
- # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
857
- # header is implicitly assigned the ID of the KMS symmetric encryption
858
- # customer managed key that's configured for your directory bucket's
859
- # default encryption setting. If you want to specify the `
860
- # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
861
- # can only specify it with the ID (Key ID or Key ARN) of the KMS
862
- # customer managed key that's configured for your directory bucket's
863
- # default encryption setting. Otherwise, you get an HTTP `400 Bad
864
- # Request` error. Only use the key ID or key ARN. The key alias format
865
- # of the KMS key isn't supported. Your SSE-KMS configuration can only
866
- # support 1 [customer managed key][2] per directory bucket for the
867
- # lifetime of the bucket. The [Amazon Web Services managed key][3]
868
- # (`aws/s3`) isn't supported.
855
+ # **Directory buckets** - To encrypt data using SSE-KMS, it's
856
+ # recommended to specify the `x-amz-server-side-encryption` header to
857
+ # `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
858
+ # header implicitly uses the bucket's default KMS customer managed key
859
+ # ID. If you want to explicitly set the `
860
+ # x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
861
+ # bucket's default customer managed key (using key ID or ARN, not
862
+ # alias). Your SSE-KMS configuration can only support 1 [customer
863
+ # managed key][2] per directory bucket's lifetime. The [Amazon Web
864
+ # Services managed key][3] (`aws/s3`) isn't supported. Incorrect key
865
+ # specification results in an HTTP `400 Bad Request` error.
869
866
  #
870
867
  #
871
868
  #
@@ -1136,7 +1133,7 @@ module Aws::S3
1136
1133
  #
1137
1134
  #
1138
1135
  #
1139
- # [1]: https://docs.aws.amazon.com/https:/tools.ietf.org/html/rfc7232
1136
+ # [1]: https://tools.ietf.org/html/rfc7232
1140
1137
  # @option options [Time,DateTime,Date,Integer,String] :if_match_last_modified_time
1141
1138
  # If present, the object is deleted only if its modification times
1142
1139
  # matches the provided `Timestamp`. If the `Timestamp` values do not
@@ -1417,15 +1414,6 @@ module Aws::S3
1417
1414
  # fails with the HTTP status code `403 Forbidden` (access denied).
1418
1415
  # @option options [String] :checksum_mode
1419
1416
  # To retrieve the checksum, this mode must be enabled.
1420
- #
1421
- # **General purpose buckets** - In addition, if you enable checksum mode
1422
- # and the object is uploaded with a [checksum][1] and encrypted with an
1423
- # Key Management Service (KMS) key, you must have permission to use the
1424
- # `kms:Decrypt` action to retrieve the checksum.
1425
- #
1426
- #
1427
- #
1428
- # [1]: https://docs.aws.amazon.com/AmazonS3/latest/API/API_Checksum.html
1429
1417
  # @return [Types::GetObjectOutput]
1430
1418
  def get(options = {}, &block)
1431
1419
  options = options.merge(
@@ -1886,20 +1874,17 @@ module Aws::S3
1886
1874
  # `x-amz-server-side-encryption-aws-kms-key-id`, Amazon S3 uses the
1887
1875
  # Amazon Web Services managed key (`aws/s3`) to protect the data.
1888
1876
  #
1889
- # **Directory buckets** - If you specify `x-amz-server-side-encryption`
1890
- # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
1891
- # header is implicitly assigned the ID of the KMS symmetric encryption
1892
- # customer managed key that's configured for your directory bucket's
1893
- # default encryption setting. If you want to specify the `
1894
- # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
1895
- # can only specify it with the ID (Key ID or Key ARN) of the KMS
1896
- # customer managed key that's configured for your directory bucket's
1897
- # default encryption setting. Otherwise, you get an HTTP `400 Bad
1898
- # Request` error. Only use the key ID or key ARN. The key alias format
1899
- # of the KMS key isn't supported. Your SSE-KMS configuration can only
1900
- # support 1 [customer managed key][1] per directory bucket for the
1901
- # lifetime of the bucket. The [Amazon Web Services managed key][2]
1902
- # (`aws/s3`) isn't supported.
1877
+ # **Directory buckets** - To encrypt data using SSE-KMS, it's
1878
+ # recommended to specify the `x-amz-server-side-encryption` header to
1879
+ # `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
1880
+ # header implicitly uses the bucket's default KMS customer managed key
1881
+ # ID. If you want to explicitly set the `
1882
+ # x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
1883
+ # bucket's default customer managed key (using key ID or ARN, not
1884
+ # alias). Your SSE-KMS configuration can only support 1 [customer
1885
+ # managed key][1] per directory bucket's lifetime. The [Amazon Web
1886
+ # Services managed key][2] (`aws/s3`) isn't supported. Incorrect key
1887
+ # specification results in an HTTP `400 Bad Request` error.
1903
1888
  #
1904
1889
  #
1905
1890
  #
@@ -2509,20 +2494,17 @@ module Aws::S3
2509
2494
  # `x-amz-server-side-encryption-aws-kms-key-id`, Amazon S3 uses the
2510
2495
  # Amazon Web Services managed key (`aws/s3`) to protect the data.
2511
2496
  #
2512
- # **Directory buckets** - If you specify `x-amz-server-side-encryption`
2513
- # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
2514
- # header is implicitly assigned the ID of the KMS symmetric encryption
2515
- # customer managed key that's configured for your directory bucket's
2516
- # default encryption setting. If you want to specify the `
2517
- # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
2518
- # can only specify it with the ID (Key ID or Key ARN) of the KMS
2519
- # customer managed key that's configured for your directory bucket's
2520
- # default encryption setting. Otherwise, you get an HTTP `400 Bad
2521
- # Request` error. Only use the key ID or key ARN. The key alias format
2522
- # of the KMS key isn't supported. Your SSE-KMS configuration can only
2523
- # support 1 [customer managed key][1] per directory bucket for the
2524
- # lifetime of the bucket. The [Amazon Web Services managed key][2]
2525
- # (`aws/s3`) isn't supported.
2497
+ # **Directory buckets** - To encrypt data using SSE-KMS, it's
2498
+ # recommended to specify the `x-amz-server-side-encryption` header to
2499
+ # `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
2500
+ # header implicitly uses the bucket's default KMS customer managed key
2501
+ # ID. If you want to explicitly set the `
2502
+ # x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
2503
+ # bucket's default customer managed key (using key ID or ARN, not
2504
+ # alias). Your SSE-KMS configuration can only support 1 [customer
2505
+ # managed key][1] per directory bucket's lifetime. The [Amazon Web
2506
+ # Services managed key][2] (`aws/s3`) isn't supported. Incorrect key
2507
+ # specification results in an HTTP `400 Bad Request` error.
2526
2508
  #
2527
2509
  #
2528
2510
  #
@@ -326,7 +326,7 @@ module Aws::S3
326
326
  #
327
327
  #
328
328
  #
329
- # [1]: https://docs.aws.amazon.com/https:/tools.ietf.org/html/rfc7232
329
+ # [1]: https://tools.ietf.org/html/rfc7232
330
330
  # @option options [Time,DateTime,Date,Integer,String] :if_match_last_modified_time
331
331
  # If present, the object is deleted only if its modification times
332
332
  # matches the provided `Timestamp`. If the `Timestamp` values do not
@@ -578,15 +578,6 @@ module Aws::S3
578
578
  # fails with the HTTP status code `403 Forbidden` (access denied).
579
579
  # @option options [String] :checksum_mode
580
580
  # To retrieve the checksum, this mode must be enabled.
581
- #
582
- # **General purpose buckets** - In addition, if you enable checksum mode
583
- # and the object is uploaded with a [checksum][1] and encrypted with an
584
- # Key Management Service (KMS) key, you must have permission to use the
585
- # `kms:Decrypt` action to retrieve the checksum.
586
- #
587
- #
588
- #
589
- # [1]: https://docs.aws.amazon.com/AmazonS3/latest/API/API_Checksum.html
590
581
  # @return [Types::GetObjectOutput]
591
582
  def get(options = {}, &block)
592
583
  options = options.merge(
@@ -41,7 +41,7 @@ module Aws::S3
41
41
  # acl: "private", # accepts private, public-read, public-read-write, authenticated-read
42
42
  # bucket: "BucketName", # required
43
43
  # create_bucket_configuration: {
44
- # location_constraint: "af-south-1", # accepts af-south-1, ap-east-1, ap-northeast-1, ap-northeast-2, ap-northeast-3, ap-south-1, ap-south-2, ap-southeast-1, ap-southeast-2, ap-southeast-3, ca-central-1, cn-north-1, cn-northwest-1, EU, eu-central-1, eu-north-1, eu-south-1, eu-south-2, eu-west-1, eu-west-2, eu-west-3, me-south-1, sa-east-1, us-east-2, us-gov-east-1, us-gov-west-1, us-west-1, us-west-2
44
+ # location_constraint: "af-south-1", # accepts af-south-1, ap-east-1, ap-northeast-1, ap-northeast-2, ap-northeast-3, ap-south-1, ap-south-2, ap-southeast-1, ap-southeast-2, ap-southeast-3, ap-southeast-4, ap-southeast-5, ca-central-1, cn-north-1, cn-northwest-1, EU, eu-central-1, eu-central-2, eu-north-1, eu-south-1, eu-south-2, eu-west-1, eu-west-2, eu-west-3, il-central-1, me-central-1, me-south-1, sa-east-1, us-east-2, us-gov-east-1, us-gov-west-1, us-west-1, us-west-2
45
45
  # location: {
46
46
  # type: "AvailabilityZone", # accepts AvailabilityZone, LocalZone
47
47
  # name: "LocationNameAsString",