aws-sdk-s3 1.178.0 → 1.183.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -104,8 +104,10 @@ module Aws::S3
104
104
 
105
105
  # The class of storage used to store the object.
106
106
  #
107
- # <note markdown="1"> **Directory buckets** - Only the S3 Express One Zone storage class is
108
- # supported by directory buckets to store objects.
107
+ # <note markdown="1"> **Directory buckets** - Directory buckets only support
108
+ # `EXPRESS_ONEZONE` (the S3 Express One Zone storage class) in
109
+ # Availability Zones and `ONEZONE_IA` (the S3 One Zone-Infrequent Access
110
+ # storage class) in Dedicated Local Zones.
109
111
  #
110
112
  # </note>
111
113
  # @return [String]
@@ -130,9 +132,10 @@ module Aws::S3
130
132
  # archived objects, see [ Working with archived objects][1] in the
131
133
  # *Amazon S3 User Guide*.
132
134
  #
133
- # <note markdown="1"> This functionality is not supported for directory buckets. Only the S3
134
- # Express One Zone storage class is supported by directory buckets to
135
- # store objects.
135
+ # <note markdown="1"> This functionality is not supported for directory buckets. Directory
136
+ # buckets only support `EXPRESS_ONEZONE` (the S3 Express One Zone
137
+ # storage class) in Availability Zones and `ONEZONE_IA` (the S3 One
138
+ # Zone-Infrequent Access storage class) in Dedicated Local Zones.
136
139
  #
137
140
  # </note>
138
141
  #
@@ -761,10 +764,12 @@ module Aws::S3
761
764
  # availability. Depending on performance needs, you can specify a
762
765
  # different Storage Class.
763
766
  #
764
- # <note markdown="1"> * <b>Directory buckets </b> - For directory buckets, only the S3
765
- # Express One Zone storage class is supported to store newly created
766
- # objects. Unsupported storage class values won't write a destination
767
- # object and will respond with the HTTP status code `400 Bad Request`.
767
+ # <note markdown="1"> * <b>Directory buckets </b> - Directory buckets only support
768
+ # `EXPRESS_ONEZONE` (the S3 Express One Zone storage class) in
769
+ # Availability Zones and `ONEZONE_IA` (the S3 One Zone-Infrequent
770
+ # Access storage class) in Dedicated Local Zones. Unsupported storage
771
+ # class values won't write a destination object and will respond with
772
+ # the HTTP status code `400 Bad Request`.
768
773
  #
769
774
  # * <b>Amazon S3 on Outposts </b> - S3 on Outposts only uses the
770
775
  # `OUTPOSTS` Storage Class.
@@ -852,20 +857,17 @@ module Aws::S3
852
857
  # Signature Version in Request Authentication][1] in the *Amazon S3 User
853
858
  # Guide*.
854
859
  #
855
- # **Directory buckets** - If you specify `x-amz-server-side-encryption`
856
- # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
857
- # header is implicitly assigned the ID of the KMS symmetric encryption
858
- # customer managed key that's configured for your directory bucket's
859
- # default encryption setting. If you want to specify the `
860
- # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
861
- # can only specify it with the ID (Key ID or Key ARN) of the KMS
862
- # customer managed key that's configured for your directory bucket's
863
- # default encryption setting. Otherwise, you get an HTTP `400 Bad
864
- # Request` error. Only use the key ID or key ARN. The key alias format
865
- # of the KMS key isn't supported. Your SSE-KMS configuration can only
866
- # support 1 [customer managed key][2] per directory bucket for the
867
- # lifetime of the bucket. The [Amazon Web Services managed key][3]
868
- # (`aws/s3`) isn't supported.
860
+ # **Directory buckets** - To encrypt data using SSE-KMS, it's
861
+ # recommended to specify the `x-amz-server-side-encryption` header to
862
+ # `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
863
+ # header implicitly uses the bucket's default KMS customer managed key
864
+ # ID. If you want to explicitly set the `
865
+ # x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
866
+ # bucket's default customer managed key (using key ID or ARN, not
867
+ # alias). Your SSE-KMS configuration can only support 1 [customer
868
+ # managed key][2] per directory bucket's lifetime. The [Amazon Web
869
+ # Services managed key][3] (`aws/s3`) isn't supported. Incorrect key
870
+ # specification results in an HTTP `400 Bad Request` error.
869
871
  #
870
872
  #
871
873
  #
@@ -1136,7 +1138,7 @@ module Aws::S3
1136
1138
  #
1137
1139
  #
1138
1140
  #
1139
- # [1]: https://docs.aws.amazon.com/https:/tools.ietf.org/html/rfc7232
1141
+ # [1]: https://tools.ietf.org/html/rfc7232
1140
1142
  # @option options [Time,DateTime,Date,Integer,String] :if_match_last_modified_time
1141
1143
  # If present, the object is deleted only if its modification times
1142
1144
  # matches the provided `Timestamp`. If the `Timestamp` values do not
@@ -1417,15 +1419,6 @@ module Aws::S3
1417
1419
  # fails with the HTTP status code `403 Forbidden` (access denied).
1418
1420
  # @option options [String] :checksum_mode
1419
1421
  # To retrieve the checksum, this mode must be enabled.
1420
- #
1421
- # **General purpose buckets** - In addition, if you enable checksum mode
1422
- # and the object is uploaded with a [checksum][1] and encrypted with an
1423
- # Key Management Service (KMS) key, you must have permission to use the
1424
- # `kms:Decrypt` action to retrieve the checksum.
1425
- #
1426
- #
1427
- #
1428
- # [1]: https://docs.aws.amazon.com/AmazonS3/latest/API/API_Checksum.html
1429
1422
  # @return [Types::GetObjectOutput]
1430
1423
  def get(options = {}, &block)
1431
1424
  options = options.merge(
@@ -1828,8 +1821,9 @@ module Aws::S3
1828
1821
  # a different Storage Class. For more information, see [Storage
1829
1822
  # Classes][1] in the *Amazon S3 User Guide*.
1830
1823
  #
1831
- # <note markdown="1"> * For directory buckets, only the S3 Express One Zone storage class is
1832
- # supported to store newly created objects.
1824
+ # <note markdown="1"> * Directory buckets only support `EXPRESS_ONEZONE` (the S3 Express One
1825
+ # Zone storage class) in Availability Zones and `ONEZONE_IA` (the S3
1826
+ # One Zone-Infrequent Access storage class) in Dedicated Local Zones.
1833
1827
  #
1834
1828
  # * Amazon S3 on Outposts only uses the OUTPOSTS Storage Class.
1835
1829
  #
@@ -1886,20 +1880,17 @@ module Aws::S3
1886
1880
  # `x-amz-server-side-encryption-aws-kms-key-id`, Amazon S3 uses the
1887
1881
  # Amazon Web Services managed key (`aws/s3`) to protect the data.
1888
1882
  #
1889
- # **Directory buckets** - If you specify `x-amz-server-side-encryption`
1890
- # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
1891
- # header is implicitly assigned the ID of the KMS symmetric encryption
1892
- # customer managed key that's configured for your directory bucket's
1893
- # default encryption setting. If you want to specify the `
1894
- # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
1895
- # can only specify it with the ID (Key ID or Key ARN) of the KMS
1896
- # customer managed key that's configured for your directory bucket's
1897
- # default encryption setting. Otherwise, you get an HTTP `400 Bad
1898
- # Request` error. Only use the key ID or key ARN. The key alias format
1899
- # of the KMS key isn't supported. Your SSE-KMS configuration can only
1900
- # support 1 [customer managed key][1] per directory bucket for the
1901
- # lifetime of the bucket. The [Amazon Web Services managed key][2]
1902
- # (`aws/s3`) isn't supported.
1883
+ # **Directory buckets** - To encrypt data using SSE-KMS, it's
1884
+ # recommended to specify the `x-amz-server-side-encryption` header to
1885
+ # `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
1886
+ # header implicitly uses the bucket's default KMS customer managed key
1887
+ # ID. If you want to explicitly set the `
1888
+ # x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
1889
+ # bucket's default customer managed key (using key ID or ARN, not
1890
+ # alias). Your SSE-KMS configuration can only support 1 [customer
1891
+ # managed key][1] per directory bucket's lifetime. The [Amazon Web
1892
+ # Services managed key][2] (`aws/s3`) isn't supported. Incorrect key
1893
+ # specification results in an HTTP `400 Bad Request` error.
1903
1894
  #
1904
1895
  #
1905
1896
  #
@@ -2185,15 +2176,15 @@ module Aws::S3
2185
2176
  # For the `x-amz-checksum-algorithm ` header, replace ` algorithm ` with
2186
2177
  # the supported algorithm from the following list:
2187
2178
  #
2188
- # * `CRC-32`
2179
+ # * `CRC32`
2189
2180
  #
2190
- # * `CRC-32C`
2181
+ # * `CRC32C`
2191
2182
  #
2192
- # * `CRC-64NVME`
2183
+ # * `CRC64NVME`
2193
2184
  #
2194
- # * `SHA-1`
2185
+ # * `SHA1`
2195
2186
  #
2196
- # * `SHA-256`
2187
+ # * `SHA256`
2197
2188
  #
2198
2189
  # For more information, see [Checking object integrity][1] in the
2199
2190
  # *Amazon S3 User Guide*.
@@ -2221,7 +2212,7 @@ module Aws::S3
2221
2212
  # @option options [String] :checksum_crc32
2222
2213
  # This header can be used as a data integrity check to verify that the
2223
2214
  # data received is the same data that was originally sent. This header
2224
- # specifies the Base64 encoded, 32-bit `CRC-32` checksum of the object.
2215
+ # specifies the Base64 encoded, 32-bit `CRC32` checksum of the object.
2225
2216
  # For more information, see [Checking object integrity][1] in the
2226
2217
  # *Amazon S3 User Guide*.
2227
2218
  #
@@ -2231,7 +2222,7 @@ module Aws::S3
2231
2222
  # @option options [String] :checksum_crc32c
2232
2223
  # This header can be used as a data integrity check to verify that the
2233
2224
  # data received is the same data that was originally sent. This header
2234
- # specifies the Base64 encoded, 32-bit `CRC-32C` checksum of the object.
2225
+ # specifies the Base64 encoded, 32-bit `CRC32C` checksum of the object.
2235
2226
  # For more information, see [Checking object integrity][1] in the
2236
2227
  # *Amazon S3 User Guide*.
2237
2228
  #
@@ -2241,10 +2232,10 @@ module Aws::S3
2241
2232
  # @option options [String] :checksum_crc64nvme
2242
2233
  # This header can be used as a data integrity check to verify that the
2243
2234
  # data received is the same data that was originally sent. This header
2244
- # specifies the Base64 encoded, 64-bit `CRC-64NVME` checksum of the
2245
- # object. The `CRC-64NVME` checksum is always a full object checksum.
2246
- # For more information, see [Checking object integrity in the Amazon S3
2247
- # User Guide][1].
2235
+ # specifies the Base64 encoded, 64-bit `CRC64NVME` checksum of the
2236
+ # object. The `CRC64NVME` checksum is always a full object checksum. For
2237
+ # more information, see [Checking object integrity in the Amazon S3 User
2238
+ # Guide][1].
2248
2239
  #
2249
2240
  #
2250
2241
  #
@@ -2252,9 +2243,9 @@ module Aws::S3
2252
2243
  # @option options [String] :checksum_sha1
2253
2244
  # This header can be used as a data integrity check to verify that the
2254
2245
  # data received is the same data that was originally sent. This header
2255
- # specifies the Base64 encoded, 160-bit `SHA-1` digest of the object.
2256
- # For more information, see [Checking object integrity][1] in the
2257
- # *Amazon S3 User Guide*.
2246
+ # specifies the Base64 encoded, 160-bit `SHA1` digest of the object. For
2247
+ # more information, see [Checking object integrity][1] in the *Amazon S3
2248
+ # User Guide*.
2258
2249
  #
2259
2250
  #
2260
2251
  #
@@ -2262,7 +2253,7 @@ module Aws::S3
2262
2253
  # @option options [String] :checksum_sha256
2263
2254
  # This header can be used as a data integrity check to verify that the
2264
2255
  # data received is the same data that was originally sent. This header
2265
- # specifies the Base64 encoded, 256-bit `SHA-256` digest of the object.
2256
+ # specifies the Base64 encoded, 256-bit `SHA256` digest of the object.
2266
2257
  # For more information, see [Checking object integrity][1] in the
2267
2258
  # *Amazon S3 User Guide*.
2268
2259
  #
@@ -2430,8 +2421,9 @@ module Aws::S3
2430
2421
  # a different Storage Class. For more information, see [Storage
2431
2422
  # Classes][1] in the *Amazon S3 User Guide*.
2432
2423
  #
2433
- # <note markdown="1"> * For directory buckets, only the S3 Express One Zone storage class is
2434
- # supported to store newly created objects.
2424
+ # <note markdown="1"> * Directory buckets only support `EXPRESS_ONEZONE` (the S3 Express One
2425
+ # Zone storage class) in Availability Zones and `ONEZONE_IA` (the S3
2426
+ # One Zone-Infrequent Access storage class) in Dedicated Local Zones.
2435
2427
  #
2436
2428
  # * Amazon S3 on Outposts only uses the OUTPOSTS Storage Class.
2437
2429
  #
@@ -2509,20 +2501,17 @@ module Aws::S3
2509
2501
  # `x-amz-server-side-encryption-aws-kms-key-id`, Amazon S3 uses the
2510
2502
  # Amazon Web Services managed key (`aws/s3`) to protect the data.
2511
2503
  #
2512
- # **Directory buckets** - If you specify `x-amz-server-side-encryption`
2513
- # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
2514
- # header is implicitly assigned the ID of the KMS symmetric encryption
2515
- # customer managed key that's configured for your directory bucket's
2516
- # default encryption setting. If you want to specify the `
2517
- # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
2518
- # can only specify it with the ID (Key ID or Key ARN) of the KMS
2519
- # customer managed key that's configured for your directory bucket's
2520
- # default encryption setting. Otherwise, you get an HTTP `400 Bad
2521
- # Request` error. Only use the key ID or key ARN. The key alias format
2522
- # of the KMS key isn't supported. Your SSE-KMS configuration can only
2523
- # support 1 [customer managed key][1] per directory bucket for the
2524
- # lifetime of the bucket. The [Amazon Web Services managed key][2]
2525
- # (`aws/s3`) isn't supported.
2504
+ # **Directory buckets** - To encrypt data using SSE-KMS, it's
2505
+ # recommended to specify the `x-amz-server-side-encryption` header to
2506
+ # `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
2507
+ # header implicitly uses the bucket's default KMS customer managed key
2508
+ # ID. If you want to explicitly set the `
2509
+ # x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
2510
+ # bucket's default customer managed key (using key ID or ARN, not
2511
+ # alias). Your SSE-KMS configuration can only support 1 [customer
2512
+ # managed key][1] per directory bucket's lifetime. The [Amazon Web
2513
+ # Services managed key][2] (`aws/s3`) isn't supported. Incorrect key
2514
+ # specification results in an HTTP `400 Bad Request` error.
2526
2515
  #
2527
2516
  #
2528
2517
  #
@@ -2967,15 +2956,15 @@ module Aws::S3
2967
2956
  # For the `x-amz-checksum-algorithm ` header, replace ` algorithm ` with
2968
2957
  # the supported algorithm from the following list:
2969
2958
  #
2970
- # * `CRC-32`
2959
+ # * `CRC32`
2971
2960
  #
2972
- # * `CRC-32C`
2961
+ # * `CRC32C`
2973
2962
  #
2974
- # * `CRC-64NVME`
2963
+ # * `CRC64NVME`
2975
2964
  #
2976
- # * `SHA-1`
2965
+ # * `SHA1`
2977
2966
  #
2978
- # * `SHA-256`
2967
+ # * `SHA256`
2979
2968
  #
2980
2969
  # For more information, see [Checking object integrity][1] in the
2981
2970
  # *Amazon S3 User Guide*.
@@ -326,7 +326,7 @@ module Aws::S3
326
326
  #
327
327
  #
328
328
  #
329
- # [1]: https://docs.aws.amazon.com/https:/tools.ietf.org/html/rfc7232
329
+ # [1]: https://tools.ietf.org/html/rfc7232
330
330
  # @option options [Time,DateTime,Date,Integer,String] :if_match_last_modified_time
331
331
  # If present, the object is deleted only if its modification times
332
332
  # matches the provided `Timestamp`. If the `Timestamp` values do not
@@ -578,15 +578,6 @@ module Aws::S3
578
578
  # fails with the HTTP status code `403 Forbidden` (access denied).
579
579
  # @option options [String] :checksum_mode
580
580
  # To retrieve the checksum, this mode must be enabled.
581
- #
582
- # **General purpose buckets** - In addition, if you enable checksum mode
583
- # and the object is uploaded with a [checksum][1] and encrypted with an
584
- # Key Management Service (KMS) key, you must have permission to use the
585
- # `kms:Decrypt` action to retrieve the checksum.
586
- #
587
- #
588
- #
589
- # [1]: https://docs.aws.amazon.com/AmazonS3/latest/API/API_Checksum.html
590
581
  # @return [Types::GetObjectOutput]
591
582
  def get(options = {}, &block)
592
583
  options = options.merge(
@@ -924,15 +915,15 @@ module Aws::S3
924
915
  # For the `x-amz-checksum-algorithm ` header, replace ` algorithm ` with
925
916
  # the supported algorithm from the following list:
926
917
  #
927
- # * `CRC-32`
918
+ # * `CRC32`
928
919
  #
929
- # * `CRC-32C`
920
+ # * `CRC32C`
930
921
  #
931
- # * `CRC-64NVME`
922
+ # * `CRC64NVME`
932
923
  #
933
- # * `SHA-1`
924
+ # * `SHA1`
934
925
  #
935
- # * `SHA-256`
926
+ # * `SHA256`
936
927
  #
937
928
  # For more information, see [Checking object integrity][1] in the
938
929
  # *Amazon S3 User Guide*.
@@ -41,7 +41,7 @@ module Aws::S3
41
41
  # acl: "private", # accepts private, public-read, public-read-write, authenticated-read
42
42
  # bucket: "BucketName", # required
43
43
  # create_bucket_configuration: {
44
- # location_constraint: "af-south-1", # accepts af-south-1, ap-east-1, ap-northeast-1, ap-northeast-2, ap-northeast-3, ap-south-1, ap-south-2, ap-southeast-1, ap-southeast-2, ap-southeast-3, ca-central-1, cn-north-1, cn-northwest-1, EU, eu-central-1, eu-north-1, eu-south-1, eu-south-2, eu-west-1, eu-west-2, eu-west-3, me-south-1, sa-east-1, us-east-2, us-gov-east-1, us-gov-west-1, us-west-1, us-west-2
44
+ # location_constraint: "af-south-1", # accepts af-south-1, ap-east-1, ap-northeast-1, ap-northeast-2, ap-northeast-3, ap-south-1, ap-south-2, ap-southeast-1, ap-southeast-2, ap-southeast-3, ap-southeast-4, ap-southeast-5, ca-central-1, cn-north-1, cn-northwest-1, EU, eu-central-1, eu-central-2, eu-north-1, eu-south-1, eu-south-2, eu-west-1, eu-west-2, eu-west-3, il-central-1, me-central-1, me-south-1, sa-east-1, us-east-2, us-gov-east-1, us-gov-west-1, us-west-1, us-west-2
45
45
  # location: {
46
46
  # type: "AvailabilityZone", # accepts AvailabilityZone, LocalZone
47
47
  # name: "LocationNameAsString",