aws-sdk-s3 1.179.0 → 1.181.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-s3/bucket.rb +32 -35
- data/lib/aws-sdk-s3/bucket_acl.rb +1 -1
- data/lib/aws-sdk-s3/bucket_cors.rb +1 -1
- data/lib/aws-sdk-s3/bucket_lifecycle.rb +1 -1
- data/lib/aws-sdk-s3/bucket_lifecycle_configuration.rb +1 -1
- data/lib/aws-sdk-s3/bucket_logging.rb +1 -1
- data/lib/aws-sdk-s3/bucket_policy.rb +6 -6
- data/lib/aws-sdk-s3/bucket_request_payment.rb +1 -1
- data/lib/aws-sdk-s3/bucket_tagging.rb +1 -1
- data/lib/aws-sdk-s3/bucket_versioning.rb +3 -3
- data/lib/aws-sdk-s3/bucket_website.rb +1 -1
- data/lib/aws-sdk-s3/client.rb +563 -543
- data/lib/aws-sdk-s3/client_api.rb +1 -0
- data/lib/aws-sdk-s3/endpoint_provider.rb +260 -277
- data/lib/aws-sdk-s3/multipart_upload.rb +10 -10
- data/lib/aws-sdk-s3/multipart_upload_part.rb +23 -23
- data/lib/aws-sdk-s3/object.rb +66 -77
- data/lib/aws-sdk-s3/object_summary.rb +54 -72
- data/lib/aws-sdk-s3/object_version.rb +6 -15
- data/lib/aws-sdk-s3/resource.rb +1 -1
- data/lib/aws-sdk-s3/types.rb +482 -450
- data/lib/aws-sdk-s3.rb +1 -1
- data/sig/bucket.rbs +1 -1
- data/sig/client.rbs +3 -2
- data/sig/object.rbs +3 -0
- data/sig/resource.rbs +1 -1
- data/sig/types.rbs +3 -2
- metadata +2 -2
@@ -852,20 +852,17 @@ module Aws::S3
|
|
852
852
|
# Signature Version in Request Authentication][1] in the *Amazon S3 User
|
853
853
|
# Guide*.
|
854
854
|
#
|
855
|
-
# **Directory buckets** -
|
856
|
-
#
|
857
|
-
#
|
858
|
-
#
|
859
|
-
#
|
860
|
-
# x-amz-server-side-encryption-aws-kms-key-id` header
|
861
|
-
#
|
862
|
-
#
|
863
|
-
#
|
864
|
-
#
|
865
|
-
#
|
866
|
-
# support 1 [customer managed key][2] per directory bucket for the
|
867
|
-
# lifetime of the bucket. The [Amazon Web Services managed key][3]
|
868
|
-
# (`aws/s3`) isn't supported.
|
855
|
+
# **Directory buckets** - To encrypt data using SSE-KMS, it's
|
856
|
+
# recommended to specify the `x-amz-server-side-encryption` header to
|
857
|
+
# `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
|
858
|
+
# header implicitly uses the bucket's default KMS customer managed key
|
859
|
+
# ID. If you want to explicitly set the `
|
860
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
|
861
|
+
# bucket's default customer managed key (using key ID or ARN, not
|
862
|
+
# alias). Your SSE-KMS configuration can only support 1 [customer
|
863
|
+
# managed key][2] per directory bucket's lifetime. The [Amazon Web
|
864
|
+
# Services managed key][3] (`aws/s3`) isn't supported. Incorrect key
|
865
|
+
# specification results in an HTTP `400 Bad Request` error.
|
869
866
|
#
|
870
867
|
#
|
871
868
|
#
|
@@ -1136,7 +1133,7 @@ module Aws::S3
|
|
1136
1133
|
#
|
1137
1134
|
#
|
1138
1135
|
#
|
1139
|
-
# [1]: https://
|
1136
|
+
# [1]: https://tools.ietf.org/html/rfc7232
|
1140
1137
|
# @option options [Time,DateTime,Date,Integer,String] :if_match_last_modified_time
|
1141
1138
|
# If present, the object is deleted only if its modification times
|
1142
1139
|
# matches the provided `Timestamp`. If the `Timestamp` values do not
|
@@ -1417,15 +1414,6 @@ module Aws::S3
|
|
1417
1414
|
# fails with the HTTP status code `403 Forbidden` (access denied).
|
1418
1415
|
# @option options [String] :checksum_mode
|
1419
1416
|
# To retrieve the checksum, this mode must be enabled.
|
1420
|
-
#
|
1421
|
-
# **General purpose buckets** - In addition, if you enable checksum mode
|
1422
|
-
# and the object is uploaded with a [checksum][1] and encrypted with an
|
1423
|
-
# Key Management Service (KMS) key, you must have permission to use the
|
1424
|
-
# `kms:Decrypt` action to retrieve the checksum.
|
1425
|
-
#
|
1426
|
-
#
|
1427
|
-
#
|
1428
|
-
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/API/API_Checksum.html
|
1429
1417
|
# @return [Types::GetObjectOutput]
|
1430
1418
|
def get(options = {}, &block)
|
1431
1419
|
options = options.merge(
|
@@ -1886,20 +1874,17 @@ module Aws::S3
|
|
1886
1874
|
# `x-amz-server-side-encryption-aws-kms-key-id`, Amazon S3 uses the
|
1887
1875
|
# Amazon Web Services managed key (`aws/s3`) to protect the data.
|
1888
1876
|
#
|
1889
|
-
# **Directory buckets** -
|
1890
|
-
#
|
1891
|
-
#
|
1892
|
-
#
|
1893
|
-
#
|
1894
|
-
# x-amz-server-side-encryption-aws-kms-key-id` header
|
1895
|
-
#
|
1896
|
-
#
|
1897
|
-
#
|
1898
|
-
#
|
1899
|
-
#
|
1900
|
-
# support 1 [customer managed key][1] per directory bucket for the
|
1901
|
-
# lifetime of the bucket. The [Amazon Web Services managed key][2]
|
1902
|
-
# (`aws/s3`) isn't supported.
|
1877
|
+
# **Directory buckets** - To encrypt data using SSE-KMS, it's
|
1878
|
+
# recommended to specify the `x-amz-server-side-encryption` header to
|
1879
|
+
# `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
|
1880
|
+
# header implicitly uses the bucket's default KMS customer managed key
|
1881
|
+
# ID. If you want to explicitly set the `
|
1882
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
|
1883
|
+
# bucket's default customer managed key (using key ID or ARN, not
|
1884
|
+
# alias). Your SSE-KMS configuration can only support 1 [customer
|
1885
|
+
# managed key][1] per directory bucket's lifetime. The [Amazon Web
|
1886
|
+
# Services managed key][2] (`aws/s3`) isn't supported. Incorrect key
|
1887
|
+
# specification results in an HTTP `400 Bad Request` error.
|
1903
1888
|
#
|
1904
1889
|
#
|
1905
1890
|
#
|
@@ -2185,15 +2170,15 @@ module Aws::S3
|
|
2185
2170
|
# For the `x-amz-checksum-algorithm ` header, replace ` algorithm ` with
|
2186
2171
|
# the supported algorithm from the following list:
|
2187
2172
|
#
|
2188
|
-
# * `
|
2173
|
+
# * `CRC32`
|
2189
2174
|
#
|
2190
|
-
# * `
|
2175
|
+
# * `CRC32C`
|
2191
2176
|
#
|
2192
|
-
# * `
|
2177
|
+
# * `CRC64NVME`
|
2193
2178
|
#
|
2194
|
-
# * `
|
2179
|
+
# * `SHA1`
|
2195
2180
|
#
|
2196
|
-
# * `
|
2181
|
+
# * `SHA256`
|
2197
2182
|
#
|
2198
2183
|
# For more information, see [Checking object integrity][1] in the
|
2199
2184
|
# *Amazon S3 User Guide*.
|
@@ -2221,7 +2206,7 @@ module Aws::S3
|
|
2221
2206
|
# @option options [String] :checksum_crc32
|
2222
2207
|
# This header can be used as a data integrity check to verify that the
|
2223
2208
|
# data received is the same data that was originally sent. This header
|
2224
|
-
# specifies the Base64 encoded, 32-bit `
|
2209
|
+
# specifies the Base64 encoded, 32-bit `CRC32` checksum of the object.
|
2225
2210
|
# For more information, see [Checking object integrity][1] in the
|
2226
2211
|
# *Amazon S3 User Guide*.
|
2227
2212
|
#
|
@@ -2231,7 +2216,7 @@ module Aws::S3
|
|
2231
2216
|
# @option options [String] :checksum_crc32c
|
2232
2217
|
# This header can be used as a data integrity check to verify that the
|
2233
2218
|
# data received is the same data that was originally sent. This header
|
2234
|
-
# specifies the Base64 encoded, 32-bit `
|
2219
|
+
# specifies the Base64 encoded, 32-bit `CRC32C` checksum of the object.
|
2235
2220
|
# For more information, see [Checking object integrity][1] in the
|
2236
2221
|
# *Amazon S3 User Guide*.
|
2237
2222
|
#
|
@@ -2241,10 +2226,10 @@ module Aws::S3
|
|
2241
2226
|
# @option options [String] :checksum_crc64nvme
|
2242
2227
|
# This header can be used as a data integrity check to verify that the
|
2243
2228
|
# data received is the same data that was originally sent. This header
|
2244
|
-
# specifies the Base64 encoded, 64-bit `
|
2245
|
-
# object. The `
|
2246
|
-
#
|
2247
|
-
#
|
2229
|
+
# specifies the Base64 encoded, 64-bit `CRC64NVME` checksum of the
|
2230
|
+
# object. The `CRC64NVME` checksum is always a full object checksum. For
|
2231
|
+
# more information, see [Checking object integrity in the Amazon S3 User
|
2232
|
+
# Guide][1].
|
2248
2233
|
#
|
2249
2234
|
#
|
2250
2235
|
#
|
@@ -2252,9 +2237,9 @@ module Aws::S3
|
|
2252
2237
|
# @option options [String] :checksum_sha1
|
2253
2238
|
# This header can be used as a data integrity check to verify that the
|
2254
2239
|
# data received is the same data that was originally sent. This header
|
2255
|
-
# specifies the Base64 encoded, 160-bit `
|
2256
|
-
#
|
2257
|
-
#
|
2240
|
+
# specifies the Base64 encoded, 160-bit `SHA1` digest of the object. For
|
2241
|
+
# more information, see [Checking object integrity][1] in the *Amazon S3
|
2242
|
+
# User Guide*.
|
2258
2243
|
#
|
2259
2244
|
#
|
2260
2245
|
#
|
@@ -2262,7 +2247,7 @@ module Aws::S3
|
|
2262
2247
|
# @option options [String] :checksum_sha256
|
2263
2248
|
# This header can be used as a data integrity check to verify that the
|
2264
2249
|
# data received is the same data that was originally sent. This header
|
2265
|
-
# specifies the Base64 encoded, 256-bit `
|
2250
|
+
# specifies the Base64 encoded, 256-bit `SHA256` digest of the object.
|
2266
2251
|
# For more information, see [Checking object integrity][1] in the
|
2267
2252
|
# *Amazon S3 User Guide*.
|
2268
2253
|
#
|
@@ -2509,20 +2494,17 @@ module Aws::S3
|
|
2509
2494
|
# `x-amz-server-side-encryption-aws-kms-key-id`, Amazon S3 uses the
|
2510
2495
|
# Amazon Web Services managed key (`aws/s3`) to protect the data.
|
2511
2496
|
#
|
2512
|
-
# **Directory buckets** -
|
2513
|
-
#
|
2514
|
-
#
|
2515
|
-
#
|
2516
|
-
#
|
2517
|
-
# x-amz-server-side-encryption-aws-kms-key-id` header
|
2518
|
-
#
|
2519
|
-
#
|
2520
|
-
#
|
2521
|
-
#
|
2522
|
-
#
|
2523
|
-
# support 1 [customer managed key][1] per directory bucket for the
|
2524
|
-
# lifetime of the bucket. The [Amazon Web Services managed key][2]
|
2525
|
-
# (`aws/s3`) isn't supported.
|
2497
|
+
# **Directory buckets** - To encrypt data using SSE-KMS, it's
|
2498
|
+
# recommended to specify the `x-amz-server-side-encryption` header to
|
2499
|
+
# `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
|
2500
|
+
# header implicitly uses the bucket's default KMS customer managed key
|
2501
|
+
# ID. If you want to explicitly set the `
|
2502
|
+
# x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
|
2503
|
+
# bucket's default customer managed key (using key ID or ARN, not
|
2504
|
+
# alias). Your SSE-KMS configuration can only support 1 [customer
|
2505
|
+
# managed key][1] per directory bucket's lifetime. The [Amazon Web
|
2506
|
+
# Services managed key][2] (`aws/s3`) isn't supported. Incorrect key
|
2507
|
+
# specification results in an HTTP `400 Bad Request` error.
|
2526
2508
|
#
|
2527
2509
|
#
|
2528
2510
|
#
|
@@ -2967,15 +2949,15 @@ module Aws::S3
|
|
2967
2949
|
# For the `x-amz-checksum-algorithm ` header, replace ` algorithm ` with
|
2968
2950
|
# the supported algorithm from the following list:
|
2969
2951
|
#
|
2970
|
-
# * `
|
2952
|
+
# * `CRC32`
|
2971
2953
|
#
|
2972
|
-
# * `
|
2954
|
+
# * `CRC32C`
|
2973
2955
|
#
|
2974
|
-
# * `
|
2956
|
+
# * `CRC64NVME`
|
2975
2957
|
#
|
2976
|
-
# * `
|
2958
|
+
# * `SHA1`
|
2977
2959
|
#
|
2978
|
-
# * `
|
2960
|
+
# * `SHA256`
|
2979
2961
|
#
|
2980
2962
|
# For more information, see [Checking object integrity][1] in the
|
2981
2963
|
# *Amazon S3 User Guide*.
|
@@ -326,7 +326,7 @@ module Aws::S3
|
|
326
326
|
#
|
327
327
|
#
|
328
328
|
#
|
329
|
-
# [1]: https://
|
329
|
+
# [1]: https://tools.ietf.org/html/rfc7232
|
330
330
|
# @option options [Time,DateTime,Date,Integer,String] :if_match_last_modified_time
|
331
331
|
# If present, the object is deleted only if its modification times
|
332
332
|
# matches the provided `Timestamp`. If the `Timestamp` values do not
|
@@ -578,15 +578,6 @@ module Aws::S3
|
|
578
578
|
# fails with the HTTP status code `403 Forbidden` (access denied).
|
579
579
|
# @option options [String] :checksum_mode
|
580
580
|
# To retrieve the checksum, this mode must be enabled.
|
581
|
-
#
|
582
|
-
# **General purpose buckets** - In addition, if you enable checksum mode
|
583
|
-
# and the object is uploaded with a [checksum][1] and encrypted with an
|
584
|
-
# Key Management Service (KMS) key, you must have permission to use the
|
585
|
-
# `kms:Decrypt` action to retrieve the checksum.
|
586
|
-
#
|
587
|
-
#
|
588
|
-
#
|
589
|
-
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/API/API_Checksum.html
|
590
581
|
# @return [Types::GetObjectOutput]
|
591
582
|
def get(options = {}, &block)
|
592
583
|
options = options.merge(
|
@@ -924,15 +915,15 @@ module Aws::S3
|
|
924
915
|
# For the `x-amz-checksum-algorithm ` header, replace ` algorithm ` with
|
925
916
|
# the supported algorithm from the following list:
|
926
917
|
#
|
927
|
-
# * `
|
918
|
+
# * `CRC32`
|
928
919
|
#
|
929
|
-
# * `
|
920
|
+
# * `CRC32C`
|
930
921
|
#
|
931
|
-
# * `
|
922
|
+
# * `CRC64NVME`
|
932
923
|
#
|
933
|
-
# * `
|
924
|
+
# * `SHA1`
|
934
925
|
#
|
935
|
-
# * `
|
926
|
+
# * `SHA256`
|
936
927
|
#
|
937
928
|
# For more information, see [Checking object integrity][1] in the
|
938
929
|
# *Amazon S3 User Guide*.
|
data/lib/aws-sdk-s3/resource.rb
CHANGED
@@ -41,7 +41,7 @@ module Aws::S3
|
|
41
41
|
# acl: "private", # accepts private, public-read, public-read-write, authenticated-read
|
42
42
|
# bucket: "BucketName", # required
|
43
43
|
# create_bucket_configuration: {
|
44
|
-
# location_constraint: "af-south-1", # accepts af-south-1, ap-east-1, ap-northeast-1, ap-northeast-2, ap-northeast-3, ap-south-1, ap-south-2, ap-southeast-1, ap-southeast-2, ap-southeast-3, ca-central-1, cn-north-1, cn-northwest-1, EU, eu-central-1, eu-north-1, eu-south-1, eu-south-2, eu-west-1, eu-west-2, eu-west-3, me-south-1, sa-east-1, us-east-2, us-gov-east-1, us-gov-west-1, us-west-1, us-west-2
|
44
|
+
# location_constraint: "af-south-1", # accepts af-south-1, ap-east-1, ap-northeast-1, ap-northeast-2, ap-northeast-3, ap-south-1, ap-south-2, ap-southeast-1, ap-southeast-2, ap-southeast-3, ap-southeast-4, ap-southeast-5, ca-central-1, cn-north-1, cn-northwest-1, EU, eu-central-1, eu-central-2, eu-north-1, eu-south-1, eu-south-2, eu-west-1, eu-west-2, eu-west-3, il-central-1, me-central-1, me-south-1, sa-east-1, us-east-2, us-gov-east-1, us-gov-west-1, us-west-1, us-west-2
|
45
45
|
# location: {
|
46
46
|
# type: "AvailabilityZone", # accepts AvailabilityZone, LocalZone
|
47
47
|
# name: "LocationNameAsString",
|