aws-sdk-s3 1.178.0 → 1.180.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -1219,20 +1219,17 @@ module Aws::S3
1219
1219
  # Signature Version in Request Authentication][1] in the *Amazon S3 User
1220
1220
  # Guide*.
1221
1221
  #
1222
- # **Directory buckets** - If you specify `x-amz-server-side-encryption`
1223
- # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
1224
- # header is implicitly assigned the ID of the KMS symmetric encryption
1225
- # customer managed key that's configured for your directory bucket's
1226
- # default encryption setting. If you want to specify the `
1227
- # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
1228
- # can only specify it with the ID (Key ID or Key ARN) of the KMS
1229
- # customer managed key that's configured for your directory bucket's
1230
- # default encryption setting. Otherwise, you get an HTTP `400 Bad
1231
- # Request` error. Only use the key ID or key ARN. The key alias format
1232
- # of the KMS key isn't supported. Your SSE-KMS configuration can only
1233
- # support 1 [customer managed key][2] per directory bucket for the
1234
- # lifetime of the bucket. The [Amazon Web Services managed key][3]
1235
- # (`aws/s3`) isn't supported.
1222
+ # **Directory buckets** - To encrypt data using SSE-KMS, it's
1223
+ # recommended to specify the `x-amz-server-side-encryption` header to
1224
+ # `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
1225
+ # header implicitly uses the bucket's default KMS customer managed key
1226
+ # ID. If you want to explicitly set the `
1227
+ # x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
1228
+ # bucket's default customer managed key (using key ID or ARN, not
1229
+ # alias). Your SSE-KMS configuration can only support 1 [customer
1230
+ # managed key][2] per directory bucket's lifetime. The [Amazon Web
1231
+ # Services managed key][3] (`aws/s3`) isn't supported. Incorrect key
1232
+ # specification results in an HTTP `400 Bad Request` error.
1236
1233
  #
1237
1234
  #
1238
1235
  #
@@ -1503,7 +1500,7 @@ module Aws::S3
1503
1500
  #
1504
1501
  #
1505
1502
  #
1506
- # [1]: https://docs.aws.amazon.com/https:/tools.ietf.org/html/rfc7232
1503
+ # [1]: https://tools.ietf.org/html/rfc7232
1507
1504
  # @option options [Time,DateTime,Date,Integer,String] :if_match_last_modified_time
1508
1505
  # If present, the object is deleted only if its modification times
1509
1506
  # matches the provided `Timestamp`. If the `Timestamp` values do not
@@ -1784,15 +1781,6 @@ module Aws::S3
1784
1781
  # fails with the HTTP status code `403 Forbidden` (access denied).
1785
1782
  # @option options [String] :checksum_mode
1786
1783
  # To retrieve the checksum, this mode must be enabled.
1787
- #
1788
- # **General purpose buckets** - In addition, if you enable checksum mode
1789
- # and the object is uploaded with a [checksum][1] and encrypted with an
1790
- # Key Management Service (KMS) key, you must have permission to use the
1791
- # `kms:Decrypt` action to retrieve the checksum.
1792
- #
1793
- #
1794
- #
1795
- # [1]: https://docs.aws.amazon.com/AmazonS3/latest/API/API_Checksum.html
1796
1784
  # @return [Types::GetObjectOutput]
1797
1785
  def get(options = {}, &block)
1798
1786
  options = options.merge(
@@ -2253,20 +2241,17 @@ module Aws::S3
2253
2241
  # `x-amz-server-side-encryption-aws-kms-key-id`, Amazon S3 uses the
2254
2242
  # Amazon Web Services managed key (`aws/s3`) to protect the data.
2255
2243
  #
2256
- # **Directory buckets** - If you specify `x-amz-server-side-encryption`
2257
- # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
2258
- # header is implicitly assigned the ID of the KMS symmetric encryption
2259
- # customer managed key that's configured for your directory bucket's
2260
- # default encryption setting. If you want to specify the `
2261
- # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
2262
- # can only specify it with the ID (Key ID or Key ARN) of the KMS
2263
- # customer managed key that's configured for your directory bucket's
2264
- # default encryption setting. Otherwise, you get an HTTP `400 Bad
2265
- # Request` error. Only use the key ID or key ARN. The key alias format
2266
- # of the KMS key isn't supported. Your SSE-KMS configuration can only
2267
- # support 1 [customer managed key][1] per directory bucket for the
2268
- # lifetime of the bucket. The [Amazon Web Services managed key][2]
2269
- # (`aws/s3`) isn't supported.
2244
+ # **Directory buckets** - To encrypt data using SSE-KMS, it's
2245
+ # recommended to specify the `x-amz-server-side-encryption` header to
2246
+ # `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
2247
+ # header implicitly uses the bucket's default KMS customer managed key
2248
+ # ID. If you want to explicitly set the `
2249
+ # x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
2250
+ # bucket's default customer managed key (using key ID or ARN, not
2251
+ # alias). Your SSE-KMS configuration can only support 1 [customer
2252
+ # managed key][1] per directory bucket's lifetime. The [Amazon Web
2253
+ # Services managed key][2] (`aws/s3`) isn't supported. Incorrect key
2254
+ # specification results in an HTTP `400 Bad Request` error.
2270
2255
  #
2271
2256
  #
2272
2257
  #
@@ -2876,20 +2861,17 @@ module Aws::S3
2876
2861
  # `x-amz-server-side-encryption-aws-kms-key-id`, Amazon S3 uses the
2877
2862
  # Amazon Web Services managed key (`aws/s3`) to protect the data.
2878
2863
  #
2879
- # **Directory buckets** - If you specify `x-amz-server-side-encryption`
2880
- # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
2881
- # header is implicitly assigned the ID of the KMS symmetric encryption
2882
- # customer managed key that's configured for your directory bucket's
2883
- # default encryption setting. If you want to specify the `
2884
- # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
2885
- # can only specify it with the ID (Key ID or Key ARN) of the KMS
2886
- # customer managed key that's configured for your directory bucket's
2887
- # default encryption setting. Otherwise, you get an HTTP `400 Bad
2888
- # Request` error. Only use the key ID or key ARN. The key alias format
2889
- # of the KMS key isn't supported. Your SSE-KMS configuration can only
2890
- # support 1 [customer managed key][1] per directory bucket for the
2891
- # lifetime of the bucket. The [Amazon Web Services managed key][2]
2892
- # (`aws/s3`) isn't supported.
2864
+ # **Directory buckets** - To encrypt data using SSE-KMS, it's
2865
+ # recommended to specify the `x-amz-server-side-encryption` header to
2866
+ # `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
2867
+ # header implicitly uses the bucket's default KMS customer managed key
2868
+ # ID. If you want to explicitly set the `
2869
+ # x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
2870
+ # bucket's default customer managed key (using key ID or ARN, not
2871
+ # alias). Your SSE-KMS configuration can only support 1 [customer
2872
+ # managed key][1] per directory bucket's lifetime. The [Amazon Web
2873
+ # Services managed key][2] (`aws/s3`) isn't supported. Incorrect key
2874
+ # specification results in an HTTP `400 Bad Request` error.
2893
2875
  #
2894
2876
  #
2895
2877
  #
@@ -852,20 +852,17 @@ module Aws::S3
852
852
  # Signature Version in Request Authentication][1] in the *Amazon S3 User
853
853
  # Guide*.
854
854
  #
855
- # **Directory buckets** - If you specify `x-amz-server-side-encryption`
856
- # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
857
- # header is implicitly assigned the ID of the KMS symmetric encryption
858
- # customer managed key that's configured for your directory bucket's
859
- # default encryption setting. If you want to specify the `
860
- # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
861
- # can only specify it with the ID (Key ID or Key ARN) of the KMS
862
- # customer managed key that's configured for your directory bucket's
863
- # default encryption setting. Otherwise, you get an HTTP `400 Bad
864
- # Request` error. Only use the key ID or key ARN. The key alias format
865
- # of the KMS key isn't supported. Your SSE-KMS configuration can only
866
- # support 1 [customer managed key][2] per directory bucket for the
867
- # lifetime of the bucket. The [Amazon Web Services managed key][3]
868
- # (`aws/s3`) isn't supported.
855
+ # **Directory buckets** - To encrypt data using SSE-KMS, it's
856
+ # recommended to specify the `x-amz-server-side-encryption` header to
857
+ # `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
858
+ # header implicitly uses the bucket's default KMS customer managed key
859
+ # ID. If you want to explicitly set the `
860
+ # x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
861
+ # bucket's default customer managed key (using key ID or ARN, not
862
+ # alias). Your SSE-KMS configuration can only support 1 [customer
863
+ # managed key][2] per directory bucket's lifetime. The [Amazon Web
864
+ # Services managed key][3] (`aws/s3`) isn't supported. Incorrect key
865
+ # specification results in an HTTP `400 Bad Request` error.
869
866
  #
870
867
  #
871
868
  #
@@ -1136,7 +1133,7 @@ module Aws::S3
1136
1133
  #
1137
1134
  #
1138
1135
  #
1139
- # [1]: https://docs.aws.amazon.com/https:/tools.ietf.org/html/rfc7232
1136
+ # [1]: https://tools.ietf.org/html/rfc7232
1140
1137
  # @option options [Time,DateTime,Date,Integer,String] :if_match_last_modified_time
1141
1138
  # If present, the object is deleted only if its modification times
1142
1139
  # matches the provided `Timestamp`. If the `Timestamp` values do not
@@ -1417,15 +1414,6 @@ module Aws::S3
1417
1414
  # fails with the HTTP status code `403 Forbidden` (access denied).
1418
1415
  # @option options [String] :checksum_mode
1419
1416
  # To retrieve the checksum, this mode must be enabled.
1420
- #
1421
- # **General purpose buckets** - In addition, if you enable checksum mode
1422
- # and the object is uploaded with a [checksum][1] and encrypted with an
1423
- # Key Management Service (KMS) key, you must have permission to use the
1424
- # `kms:Decrypt` action to retrieve the checksum.
1425
- #
1426
- #
1427
- #
1428
- # [1]: https://docs.aws.amazon.com/AmazonS3/latest/API/API_Checksum.html
1429
1417
  # @return [Types::GetObjectOutput]
1430
1418
  def get(options = {}, &block)
1431
1419
  options = options.merge(
@@ -1886,20 +1874,17 @@ module Aws::S3
1886
1874
  # `x-amz-server-side-encryption-aws-kms-key-id`, Amazon S3 uses the
1887
1875
  # Amazon Web Services managed key (`aws/s3`) to protect the data.
1888
1876
  #
1889
- # **Directory buckets** - If you specify `x-amz-server-side-encryption`
1890
- # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
1891
- # header is implicitly assigned the ID of the KMS symmetric encryption
1892
- # customer managed key that's configured for your directory bucket's
1893
- # default encryption setting. If you want to specify the `
1894
- # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
1895
- # can only specify it with the ID (Key ID or Key ARN) of the KMS
1896
- # customer managed key that's configured for your directory bucket's
1897
- # default encryption setting. Otherwise, you get an HTTP `400 Bad
1898
- # Request` error. Only use the key ID or key ARN. The key alias format
1899
- # of the KMS key isn't supported. Your SSE-KMS configuration can only
1900
- # support 1 [customer managed key][1] per directory bucket for the
1901
- # lifetime of the bucket. The [Amazon Web Services managed key][2]
1902
- # (`aws/s3`) isn't supported.
1877
+ # **Directory buckets** - To encrypt data using SSE-KMS, it's
1878
+ # recommended to specify the `x-amz-server-side-encryption` header to
1879
+ # `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
1880
+ # header implicitly uses the bucket's default KMS customer managed key
1881
+ # ID. If you want to explicitly set the `
1882
+ # x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
1883
+ # bucket's default customer managed key (using key ID or ARN, not
1884
+ # alias). Your SSE-KMS configuration can only support 1 [customer
1885
+ # managed key][1] per directory bucket's lifetime. The [Amazon Web
1886
+ # Services managed key][2] (`aws/s3`) isn't supported. Incorrect key
1887
+ # specification results in an HTTP `400 Bad Request` error.
1903
1888
  #
1904
1889
  #
1905
1890
  #
@@ -2509,20 +2494,17 @@ module Aws::S3
2509
2494
  # `x-amz-server-side-encryption-aws-kms-key-id`, Amazon S3 uses the
2510
2495
  # Amazon Web Services managed key (`aws/s3`) to protect the data.
2511
2496
  #
2512
- # **Directory buckets** - If you specify `x-amz-server-side-encryption`
2513
- # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
2514
- # header is implicitly assigned the ID of the KMS symmetric encryption
2515
- # customer managed key that's configured for your directory bucket's
2516
- # default encryption setting. If you want to specify the `
2517
- # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
2518
- # can only specify it with the ID (Key ID or Key ARN) of the KMS
2519
- # customer managed key that's configured for your directory bucket's
2520
- # default encryption setting. Otherwise, you get an HTTP `400 Bad
2521
- # Request` error. Only use the key ID or key ARN. The key alias format
2522
- # of the KMS key isn't supported. Your SSE-KMS configuration can only
2523
- # support 1 [customer managed key][1] per directory bucket for the
2524
- # lifetime of the bucket. The [Amazon Web Services managed key][2]
2525
- # (`aws/s3`) isn't supported.
2497
+ # **Directory buckets** - To encrypt data using SSE-KMS, it's
2498
+ # recommended to specify the `x-amz-server-side-encryption` header to
2499
+ # `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
2500
+ # header implicitly uses the bucket's default KMS customer managed key
2501
+ # ID. If you want to explicitly set the `
2502
+ # x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
2503
+ # bucket's default customer managed key (using key ID or ARN, not
2504
+ # alias). Your SSE-KMS configuration can only support 1 [customer
2505
+ # managed key][1] per directory bucket's lifetime. The [Amazon Web
2506
+ # Services managed key][2] (`aws/s3`) isn't supported. Incorrect key
2507
+ # specification results in an HTTP `400 Bad Request` error.
2526
2508
  #
2527
2509
  #
2528
2510
  #
@@ -326,7 +326,7 @@ module Aws::S3
326
326
  #
327
327
  #
328
328
  #
329
- # [1]: https://docs.aws.amazon.com/https:/tools.ietf.org/html/rfc7232
329
+ # [1]: https://tools.ietf.org/html/rfc7232
330
330
  # @option options [Time,DateTime,Date,Integer,String] :if_match_last_modified_time
331
331
  # If present, the object is deleted only if its modification times
332
332
  # matches the provided `Timestamp`. If the `Timestamp` values do not
@@ -578,15 +578,6 @@ module Aws::S3
578
578
  # fails with the HTTP status code `403 Forbidden` (access denied).
579
579
  # @option options [String] :checksum_mode
580
580
  # To retrieve the checksum, this mode must be enabled.
581
- #
582
- # **General purpose buckets** - In addition, if you enable checksum mode
583
- # and the object is uploaded with a [checksum][1] and encrypted with an
584
- # Key Management Service (KMS) key, you must have permission to use the
585
- # `kms:Decrypt` action to retrieve the checksum.
586
- #
587
- #
588
- #
589
- # [1]: https://docs.aws.amazon.com/AmazonS3/latest/API/API_Checksum.html
590
581
  # @return [Types::GetObjectOutput]
591
582
  def get(options = {}, &block)
592
583
  options = options.merge(
@@ -41,7 +41,7 @@ module Aws::S3
41
41
  # acl: "private", # accepts private, public-read, public-read-write, authenticated-read
42
42
  # bucket: "BucketName", # required
43
43
  # create_bucket_configuration: {
44
- # location_constraint: "af-south-1", # accepts af-south-1, ap-east-1, ap-northeast-1, ap-northeast-2, ap-northeast-3, ap-south-1, ap-south-2, ap-southeast-1, ap-southeast-2, ap-southeast-3, ca-central-1, cn-north-1, cn-northwest-1, EU, eu-central-1, eu-north-1, eu-south-1, eu-south-2, eu-west-1, eu-west-2, eu-west-3, me-south-1, sa-east-1, us-east-2, us-gov-east-1, us-gov-west-1, us-west-1, us-west-2
44
+ # location_constraint: "af-south-1", # accepts af-south-1, ap-east-1, ap-northeast-1, ap-northeast-2, ap-northeast-3, ap-south-1, ap-south-2, ap-southeast-1, ap-southeast-2, ap-southeast-3, ap-southeast-4, ap-southeast-5, ca-central-1, cn-north-1, cn-northwest-1, EU, eu-central-1, eu-central-2, eu-north-1, eu-south-1, eu-south-2, eu-west-1, eu-west-2, eu-west-3, il-central-1, me-central-1, me-south-1, sa-east-1, us-east-2, us-gov-east-1, us-gov-west-1, us-west-1, us-west-2
45
45
  # location: {
46
46
  # type: "AvailabilityZone", # accepts AvailabilityZone, LocalZone
47
47
  # name: "LocationNameAsString",