aws-sdk-s3 1.178.0 → 1.180.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-s3/bucket.rb +12 -15
- data/lib/aws-sdk-s3/bucket_acl.rb +1 -1
- data/lib/aws-sdk-s3/bucket_cors.rb +1 -1
- data/lib/aws-sdk-s3/bucket_lifecycle.rb +1 -1
- data/lib/aws-sdk-s3/bucket_lifecycle_configuration.rb +1 -1
- data/lib/aws-sdk-s3/bucket_logging.rb +1 -1
- data/lib/aws-sdk-s3/bucket_policy.rb +1 -1
- data/lib/aws-sdk-s3/bucket_request_payment.rb +1 -1
- data/lib/aws-sdk-s3/bucket_tagging.rb +1 -1
- data/lib/aws-sdk-s3/bucket_versioning.rb +3 -3
- data/lib/aws-sdk-s3/bucket_website.rb +1 -1
- data/lib/aws-sdk-s3/client.rb +449 -431
- data/lib/aws-sdk-s3/endpoint_provider.rb +260 -277
- data/lib/aws-sdk-s3/object.rb +34 -52
- data/lib/aws-sdk-s3/object_summary.rb +34 -52
- data/lib/aws-sdk-s3/object_version.rb +1 -10
- data/lib/aws-sdk-s3/resource.rb +1 -1
- data/lib/aws-sdk-s3/types.rb +290 -264
- data/lib/aws-sdk-s3.rb +1 -1
- data/sig/bucket.rbs +1 -1
- data/sig/client.rbs +2 -2
- data/sig/resource.rbs +1 -1
- data/sig/types.rbs +2 -2
- metadata +2 -2
data/lib/aws-sdk-s3/object.rb
CHANGED
@@ -1219,20 +1219,17 @@ module Aws::S3
|
|
1219
1219
|
# Signature Version in Request Authentication][1] in the *Amazon S3 User
|
1220
1220
|
# Guide*.
|
1221
1221
|
#
|
1222
|
-
# **Directory buckets** -
|
1223
|
-
#
|
1224
|
-
#
|
1225
|
-
#
|
1226
|
-
#
|
1227
|
-
# x-amz-server-side-encryption-aws-kms-key-id` header
|
1228
|
-
#
|
1229
|
-
#
|
1230
|
-
#
|
1231
|
-
#
|
1232
|
-
#
|
1233
|
-
# support 1 [customer managed key][2] per directory bucket for the
|
1234
|
-
# lifetime of the bucket. The [Amazon Web Services managed key][3]
|
1235
|
-
# (`aws/s3`) isn't supported.
|
1222
|
+
# **Directory buckets** - To encrypt data using SSE-KMS, it's
|
1223
|
+
# recommended to specify the `x-amz-server-side-encryption` header to
|
1224
|
+
# `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
|
1225
|
+
# header implicitly uses the bucket's default KMS customer managed key
|
1226
|
+
# ID. If you want to explicitly set the `
|
1227
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
|
1228
|
+
# bucket's default customer managed key (using key ID or ARN, not
|
1229
|
+
# alias). Your SSE-KMS configuration can only support 1 [customer
|
1230
|
+
# managed key][2] per directory bucket's lifetime. The [Amazon Web
|
1231
|
+
# Services managed key][3] (`aws/s3`) isn't supported. Incorrect key
|
1232
|
+
# specification results in an HTTP `400 Bad Request` error.
|
1236
1233
|
#
|
1237
1234
|
#
|
1238
1235
|
#
|
@@ -1503,7 +1500,7 @@ module Aws::S3
|
|
1503
1500
|
#
|
1504
1501
|
#
|
1505
1502
|
#
|
1506
|
-
# [1]: https://
|
1503
|
+
# [1]: https://tools.ietf.org/html/rfc7232
|
1507
1504
|
# @option options [Time,DateTime,Date,Integer,String] :if_match_last_modified_time
|
1508
1505
|
# If present, the object is deleted only if its modification times
|
1509
1506
|
# matches the provided `Timestamp`. If the `Timestamp` values do not
|
@@ -1784,15 +1781,6 @@ module Aws::S3
|
|
1784
1781
|
# fails with the HTTP status code `403 Forbidden` (access denied).
|
1785
1782
|
# @option options [String] :checksum_mode
|
1786
1783
|
# To retrieve the checksum, this mode must be enabled.
|
1787
|
-
#
|
1788
|
-
# **General purpose buckets** - In addition, if you enable checksum mode
|
1789
|
-
# and the object is uploaded with a [checksum][1] and encrypted with an
|
1790
|
-
# Key Management Service (KMS) key, you must have permission to use the
|
1791
|
-
# `kms:Decrypt` action to retrieve the checksum.
|
1792
|
-
#
|
1793
|
-
#
|
1794
|
-
#
|
1795
|
-
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/API/API_Checksum.html
|
1796
1784
|
# @return [Types::GetObjectOutput]
|
1797
1785
|
def get(options = {}, &block)
|
1798
1786
|
options = options.merge(
|
@@ -2253,20 +2241,17 @@ module Aws::S3
|
|
2253
2241
|
# `x-amz-server-side-encryption-aws-kms-key-id`, Amazon S3 uses the
|
2254
2242
|
# Amazon Web Services managed key (`aws/s3`) to protect the data.
|
2255
2243
|
#
|
2256
|
-
# **Directory buckets** -
|
2257
|
-
#
|
2258
|
-
#
|
2259
|
-
#
|
2260
|
-
#
|
2261
|
-
# x-amz-server-side-encryption-aws-kms-key-id` header
|
2262
|
-
#
|
2263
|
-
#
|
2264
|
-
#
|
2265
|
-
#
|
2266
|
-
#
|
2267
|
-
# support 1 [customer managed key][1] per directory bucket for the
|
2268
|
-
# lifetime of the bucket. The [Amazon Web Services managed key][2]
|
2269
|
-
# (`aws/s3`) isn't supported.
|
2244
|
+
# **Directory buckets** - To encrypt data using SSE-KMS, it's
|
2245
|
+
# recommended to specify the `x-amz-server-side-encryption` header to
|
2246
|
+
# `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
|
2247
|
+
# header implicitly uses the bucket's default KMS customer managed key
|
2248
|
+
# ID. If you want to explicitly set the `
|
2249
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
|
2250
|
+
# bucket's default customer managed key (using key ID or ARN, not
|
2251
|
+
# alias). Your SSE-KMS configuration can only support 1 [customer
|
2252
|
+
# managed key][1] per directory bucket's lifetime. The [Amazon Web
|
2253
|
+
# Services managed key][2] (`aws/s3`) isn't supported. Incorrect key
|
2254
|
+
# specification results in an HTTP `400 Bad Request` error.
|
2270
2255
|
#
|
2271
2256
|
#
|
2272
2257
|
#
|
@@ -2876,20 +2861,17 @@ module Aws::S3
|
|
2876
2861
|
# `x-amz-server-side-encryption-aws-kms-key-id`, Amazon S3 uses the
|
2877
2862
|
# Amazon Web Services managed key (`aws/s3`) to protect the data.
|
2878
2863
|
#
|
2879
|
-
# **Directory buckets** -
|
2880
|
-
#
|
2881
|
-
#
|
2882
|
-
#
|
2883
|
-
#
|
2884
|
-
# x-amz-server-side-encryption-aws-kms-key-id` header
|
2885
|
-
#
|
2886
|
-
#
|
2887
|
-
#
|
2888
|
-
#
|
2889
|
-
#
|
2890
|
-
# support 1 [customer managed key][1] per directory bucket for the
|
2891
|
-
# lifetime of the bucket. The [Amazon Web Services managed key][2]
|
2892
|
-
# (`aws/s3`) isn't supported.
|
2864
|
+
# **Directory buckets** - To encrypt data using SSE-KMS, it's
|
2865
|
+
# recommended to specify the `x-amz-server-side-encryption` header to
|
2866
|
+
# `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
|
2867
|
+
# header implicitly uses the bucket's default KMS customer managed key
|
2868
|
+
# ID. If you want to explicitly set the `
|
2869
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
|
2870
|
+
# bucket's default customer managed key (using key ID or ARN, not
|
2871
|
+
# alias). Your SSE-KMS configuration can only support 1 [customer
|
2872
|
+
# managed key][1] per directory bucket's lifetime. The [Amazon Web
|
2873
|
+
# Services managed key][2] (`aws/s3`) isn't supported. Incorrect key
|
2874
|
+
# specification results in an HTTP `400 Bad Request` error.
|
2893
2875
|
#
|
2894
2876
|
#
|
2895
2877
|
#
|
@@ -852,20 +852,17 @@ module Aws::S3
|
|
852
852
|
# Signature Version in Request Authentication][1] in the *Amazon S3 User
|
853
853
|
# Guide*.
|
854
854
|
#
|
855
|
-
# **Directory buckets** -
|
856
|
-
#
|
857
|
-
#
|
858
|
-
#
|
859
|
-
#
|
860
|
-
# x-amz-server-side-encryption-aws-kms-key-id` header
|
861
|
-
#
|
862
|
-
#
|
863
|
-
#
|
864
|
-
#
|
865
|
-
#
|
866
|
-
# support 1 [customer managed key][2] per directory bucket for the
|
867
|
-
# lifetime of the bucket. The [Amazon Web Services managed key][3]
|
868
|
-
# (`aws/s3`) isn't supported.
|
855
|
+
# **Directory buckets** - To encrypt data using SSE-KMS, it's
|
856
|
+
# recommended to specify the `x-amz-server-side-encryption` header to
|
857
|
+
# `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
|
858
|
+
# header implicitly uses the bucket's default KMS customer managed key
|
859
|
+
# ID. If you want to explicitly set the `
|
860
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
|
861
|
+
# bucket's default customer managed key (using key ID or ARN, not
|
862
|
+
# alias). Your SSE-KMS configuration can only support 1 [customer
|
863
|
+
# managed key][2] per directory bucket's lifetime. The [Amazon Web
|
864
|
+
# Services managed key][3] (`aws/s3`) isn't supported. Incorrect key
|
865
|
+
# specification results in an HTTP `400 Bad Request` error.
|
869
866
|
#
|
870
867
|
#
|
871
868
|
#
|
@@ -1136,7 +1133,7 @@ module Aws::S3
|
|
1136
1133
|
#
|
1137
1134
|
#
|
1138
1135
|
#
|
1139
|
-
# [1]: https://
|
1136
|
+
# [1]: https://tools.ietf.org/html/rfc7232
|
1140
1137
|
# @option options [Time,DateTime,Date,Integer,String] :if_match_last_modified_time
|
1141
1138
|
# If present, the object is deleted only if its modification times
|
1142
1139
|
# matches the provided `Timestamp`. If the `Timestamp` values do not
|
@@ -1417,15 +1414,6 @@ module Aws::S3
|
|
1417
1414
|
# fails with the HTTP status code `403 Forbidden` (access denied).
|
1418
1415
|
# @option options [String] :checksum_mode
|
1419
1416
|
# To retrieve the checksum, this mode must be enabled.
|
1420
|
-
#
|
1421
|
-
# **General purpose buckets** - In addition, if you enable checksum mode
|
1422
|
-
# and the object is uploaded with a [checksum][1] and encrypted with an
|
1423
|
-
# Key Management Service (KMS) key, you must have permission to use the
|
1424
|
-
# `kms:Decrypt` action to retrieve the checksum.
|
1425
|
-
#
|
1426
|
-
#
|
1427
|
-
#
|
1428
|
-
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/API/API_Checksum.html
|
1429
1417
|
# @return [Types::GetObjectOutput]
|
1430
1418
|
def get(options = {}, &block)
|
1431
1419
|
options = options.merge(
|
@@ -1886,20 +1874,17 @@ module Aws::S3
|
|
1886
1874
|
# `x-amz-server-side-encryption-aws-kms-key-id`, Amazon S3 uses the
|
1887
1875
|
# Amazon Web Services managed key (`aws/s3`) to protect the data.
|
1888
1876
|
#
|
1889
|
-
# **Directory buckets** -
|
1890
|
-
#
|
1891
|
-
#
|
1892
|
-
#
|
1893
|
-
#
|
1894
|
-
# x-amz-server-side-encryption-aws-kms-key-id` header
|
1895
|
-
#
|
1896
|
-
#
|
1897
|
-
#
|
1898
|
-
#
|
1899
|
-
#
|
1900
|
-
# support 1 [customer managed key][1] per directory bucket for the
|
1901
|
-
# lifetime of the bucket. The [Amazon Web Services managed key][2]
|
1902
|
-
# (`aws/s3`) isn't supported.
|
1877
|
+
# **Directory buckets** - To encrypt data using SSE-KMS, it's
|
1878
|
+
# recommended to specify the `x-amz-server-side-encryption` header to
|
1879
|
+
# `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
|
1880
|
+
# header implicitly uses the bucket's default KMS customer managed key
|
1881
|
+
# ID. If you want to explicitly set the `
|
1882
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
|
1883
|
+
# bucket's default customer managed key (using key ID or ARN, not
|
1884
|
+
# alias). Your SSE-KMS configuration can only support 1 [customer
|
1885
|
+
# managed key][1] per directory bucket's lifetime. The [Amazon Web
|
1886
|
+
# Services managed key][2] (`aws/s3`) isn't supported. Incorrect key
|
1887
|
+
# specification results in an HTTP `400 Bad Request` error.
|
1903
1888
|
#
|
1904
1889
|
#
|
1905
1890
|
#
|
@@ -2509,20 +2494,17 @@ module Aws::S3
|
|
2509
2494
|
# `x-amz-server-side-encryption-aws-kms-key-id`, Amazon S3 uses the
|
2510
2495
|
# Amazon Web Services managed key (`aws/s3`) to protect the data.
|
2511
2496
|
#
|
2512
|
-
# **Directory buckets** -
|
2513
|
-
#
|
2514
|
-
#
|
2515
|
-
#
|
2516
|
-
#
|
2517
|
-
# x-amz-server-side-encryption-aws-kms-key-id` header
|
2518
|
-
#
|
2519
|
-
#
|
2520
|
-
#
|
2521
|
-
#
|
2522
|
-
#
|
2523
|
-
# support 1 [customer managed key][1] per directory bucket for the
|
2524
|
-
# lifetime of the bucket. The [Amazon Web Services managed key][2]
|
2525
|
-
# (`aws/s3`) isn't supported.
|
2497
|
+
# **Directory buckets** - To encrypt data using SSE-KMS, it's
|
2498
|
+
# recommended to specify the `x-amz-server-side-encryption` header to
|
2499
|
+
# `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
|
2500
|
+
# header implicitly uses the bucket's default KMS customer managed key
|
2501
|
+
# ID. If you want to explicitly set the `
|
2502
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
|
2503
|
+
# bucket's default customer managed key (using key ID or ARN, not
|
2504
|
+
# alias). Your SSE-KMS configuration can only support 1 [customer
|
2505
|
+
# managed key][1] per directory bucket's lifetime. The [Amazon Web
|
2506
|
+
# Services managed key][2] (`aws/s3`) isn't supported. Incorrect key
|
2507
|
+
# specification results in an HTTP `400 Bad Request` error.
|
2526
2508
|
#
|
2527
2509
|
#
|
2528
2510
|
#
|
@@ -326,7 +326,7 @@ module Aws::S3
|
|
326
326
|
#
|
327
327
|
#
|
328
328
|
#
|
329
|
-
# [1]: https://
|
329
|
+
# [1]: https://tools.ietf.org/html/rfc7232
|
330
330
|
# @option options [Time,DateTime,Date,Integer,String] :if_match_last_modified_time
|
331
331
|
# If present, the object is deleted only if its modification times
|
332
332
|
# matches the provided `Timestamp`. If the `Timestamp` values do not
|
@@ -578,15 +578,6 @@ module Aws::S3
|
|
578
578
|
# fails with the HTTP status code `403 Forbidden` (access denied).
|
579
579
|
# @option options [String] :checksum_mode
|
580
580
|
# To retrieve the checksum, this mode must be enabled.
|
581
|
-
#
|
582
|
-
# **General purpose buckets** - In addition, if you enable checksum mode
|
583
|
-
# and the object is uploaded with a [checksum][1] and encrypted with an
|
584
|
-
# Key Management Service (KMS) key, you must have permission to use the
|
585
|
-
# `kms:Decrypt` action to retrieve the checksum.
|
586
|
-
#
|
587
|
-
#
|
588
|
-
#
|
589
|
-
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/API/API_Checksum.html
|
590
581
|
# @return [Types::GetObjectOutput]
|
591
582
|
def get(options = {}, &block)
|
592
583
|
options = options.merge(
|
data/lib/aws-sdk-s3/resource.rb
CHANGED
@@ -41,7 +41,7 @@ module Aws::S3
|
|
41
41
|
# acl: "private", # accepts private, public-read, public-read-write, authenticated-read
|
42
42
|
# bucket: "BucketName", # required
|
43
43
|
# create_bucket_configuration: {
|
44
|
-
# location_constraint: "af-south-1", # accepts af-south-1, ap-east-1, ap-northeast-1, ap-northeast-2, ap-northeast-3, ap-south-1, ap-south-2, ap-southeast-1, ap-southeast-2, ap-southeast-3, ca-central-1, cn-north-1, cn-northwest-1, EU, eu-central-1, eu-north-1, eu-south-1, eu-south-2, eu-west-1, eu-west-2, eu-west-3, me-south-1, sa-east-1, us-east-2, us-gov-east-1, us-gov-west-1, us-west-1, us-west-2
|
44
|
+
# location_constraint: "af-south-1", # accepts af-south-1, ap-east-1, ap-northeast-1, ap-northeast-2, ap-northeast-3, ap-south-1, ap-south-2, ap-southeast-1, ap-southeast-2, ap-southeast-3, ap-southeast-4, ap-southeast-5, ca-central-1, cn-north-1, cn-northwest-1, EU, eu-central-1, eu-central-2, eu-north-1, eu-south-1, eu-south-2, eu-west-1, eu-west-2, eu-west-3, il-central-1, me-central-1, me-south-1, sa-east-1, us-east-2, us-gov-east-1, us-gov-west-1, us-west-1, us-west-2
|
45
45
|
# location: {
|
46
46
|
# type: "AvailabilityZone", # accepts AvailabilityZone, LocalZone
|
47
47
|
# name: "LocationNameAsString",
|