aws-sdk-s3 1.190.0 → 1.191.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 912a376612086528cf57db9f1d8b688cc47c5a1adea96bc114ea8dc40fd52c9f
4
- data.tar.gz: d5a9deb36e98cadcb61ec5c8e9552e0a61a7aec1e5ceaf6c6163fa56ae1fc28d
3
+ metadata.gz: 36a6478ae4c76eddd30004239c4e34f5e547877585c66d1cb9e8aa2133b092b2
4
+ data.tar.gz: c37c962235875baa974c484948591a512fcaea0b87c6938bbd1d029eec8f9955
5
5
  SHA512:
6
- metadata.gz: 1feba34ac0e9a7c4e93a81a65b1d1e6dd49c9537411867decfd2133a1b7553737d7964be14cdb2e3194e1923b6389b23761a17e6238025980cf073a2ca262336
7
- data.tar.gz: 36bd0d47354efde065942d5178ddc3094b75d005dca1bb7ab44a2b020e0b4b67ea72f784c4147a9e39531ff3bcd169bbfab74cd183dbde3ff06943a32848b7c3
6
+ metadata.gz: 8417b4c8f3821aa1ed703c8cee292596d537c5dfb6972126e5222bf27f00f66ef1efdfb5d591e20bcc554cf56fbea105baab964c17414ec386bd19d759bb4691
7
+ data.tar.gz: fd8673bf729de6d8e13ae90d555763dd36ec5eaa4538e7856db300a531a17541731eced4a9a9b393d9787a4c6ec4b1c9b6765afbe77bc095775c44f29a2ffd13
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.191.0 (2025-06-25)
5
+ ------------------
6
+
7
+ * Feature - Adds support for additional server-side encryption mode and storage class values for accessing Amazon FSx data from Amazon S3 using S3 Access Points
8
+
4
9
  1.190.0 (2025-06-18)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.190.0
1
+ 1.191.0
@@ -521,8 +521,8 @@ module Aws::S3
521
521
  # metadata: {
522
522
  # "MetadataKey" => "MetadataValue",
523
523
  # },
524
- # server_side_encryption: "AES256", # accepts AES256, aws:kms, aws:kms:dsse
525
- # storage_class: "STANDARD", # accepts STANDARD, REDUCED_REDUNDANCY, STANDARD_IA, ONEZONE_IA, INTELLIGENT_TIERING, GLACIER, DEEP_ARCHIVE, OUTPOSTS, GLACIER_IR, SNOW, EXPRESS_ONEZONE
524
+ # server_side_encryption: "AES256", # accepts AES256, aws:fsx, aws:kms, aws:kms:dsse
525
+ # storage_class: "STANDARD", # accepts STANDARD, REDUCED_REDUNDANCY, STANDARD_IA, ONEZONE_IA, INTELLIGENT_TIERING, GLACIER, DEEP_ARCHIVE, OUTPOSTS, GLACIER_IR, SNOW, EXPRESS_ONEZONE, FSX_OPENZFS
526
526
  # website_redirect_location: "WebsiteRedirectLocation",
527
527
  # sse_customer_algorithm: "SSECustomerAlgorithm",
528
528
  # sse_customer_key: "SSECustomerKey",
@@ -834,8 +834,7 @@ module Aws::S3
834
834
  # A map of metadata to store with the object in S3.
835
835
  # @option options [String] :server_side_encryption
836
836
  # The server-side encryption algorithm that was used when you store this
837
- # object in Amazon S3 (for example, `AES256`, `aws:kms`,
838
- # `aws:kms:dsse`).
837
+ # object in Amazon S3 or Amazon FSx.
839
838
  #
840
839
  # * <b>General purpose buckets </b> - You have four mutually exclusive
841
840
  # options to protect data using server-side encryption in Amazon S3,
@@ -889,6 +888,14 @@ module Aws::S3
889
888
  #
890
889
  # </note>
891
890
  #
891
+ # * <b>S3 access points for Amazon FSx </b> - When accessing data stored
892
+ # in Amazon FSx file systems using S3 access points, the only valid
893
+ # server side encryption option is `aws:fsx`. All Amazon FSx file
894
+ # systems have encryption configured by default and are encrypted at
895
+ # rest. Data is automatically encrypted before being written to the
896
+ # file system, and automatically decrypted as it is read. These
897
+ # processes are handled transparently by Amazon FSx.
898
+ #
892
899
  #
893
900
  #
894
901
  # [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html
@@ -1264,7 +1264,7 @@ module Aws::S3
1264
1264
  # resp.checksum_sha1 #=> String
1265
1265
  # resp.checksum_sha256 #=> String
1266
1266
  # resp.checksum_type #=> String, one of "COMPOSITE", "FULL_OBJECT"
1267
- # resp.server_side_encryption #=> String, one of "AES256", "aws:kms", "aws:kms:dsse"
1267
+ # resp.server_side_encryption #=> String, one of "AES256", "aws:fsx", "aws:kms", "aws:kms:dsse"
1268
1268
  # resp.version_id #=> String
1269
1269
  # resp.ssekms_key_id #=> String
1270
1270
  # resp.bucket_key_enabled #=> Boolean
@@ -1928,6 +1928,14 @@ module Aws::S3
1928
1928
  # key is the same customer managed key that you specified for the
1929
1929
  # directory bucket's default encryption configuration.
1930
1930
  #
1931
+ # * <b>S3 access points for Amazon FSx </b> - When accessing data stored
1932
+ # in Amazon FSx file systems using S3 access points, the only valid
1933
+ # server side encryption option is `aws:fsx`. All Amazon FSx file
1934
+ # systems have encryption configured by default and are encrypted at
1935
+ # rest. Data is automatically encrypted before being written to the
1936
+ # file system, and automatically decrypted as it is read. These
1937
+ # processes are handled transparently by Amazon FSx.
1938
+ #
1931
1939
  #
1932
1940
  #
1933
1941
  # [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/serv-side-encryption.html
@@ -2311,8 +2319,8 @@ module Aws::S3
2311
2319
  # },
2312
2320
  # metadata_directive: "COPY", # accepts COPY, REPLACE
2313
2321
  # tagging_directive: "COPY", # accepts COPY, REPLACE
2314
- # server_side_encryption: "AES256", # accepts AES256, aws:kms, aws:kms:dsse
2315
- # storage_class: "STANDARD", # accepts STANDARD, REDUCED_REDUNDANCY, STANDARD_IA, ONEZONE_IA, INTELLIGENT_TIERING, GLACIER, DEEP_ARCHIVE, OUTPOSTS, GLACIER_IR, SNOW, EXPRESS_ONEZONE
2322
+ # server_side_encryption: "AES256", # accepts AES256, aws:fsx, aws:kms, aws:kms:dsse
2323
+ # storage_class: "STANDARD", # accepts STANDARD, REDUCED_REDUNDANCY, STANDARD_IA, ONEZONE_IA, INTELLIGENT_TIERING, GLACIER, DEEP_ARCHIVE, OUTPOSTS, GLACIER_IR, SNOW, EXPRESS_ONEZONE, FSX_OPENZFS
2316
2324
  # website_redirect_location: "WebsiteRedirectLocation",
2317
2325
  # sse_customer_algorithm: "SSECustomerAlgorithm",
2318
2326
  # sse_customer_key: "SSECustomerKey",
@@ -2345,7 +2353,7 @@ module Aws::S3
2345
2353
  # resp.expiration #=> String
2346
2354
  # resp.copy_source_version_id #=> String
2347
2355
  # resp.version_id #=> String
2348
- # resp.server_side_encryption #=> String, one of "AES256", "aws:kms", "aws:kms:dsse"
2356
+ # resp.server_side_encryption #=> String, one of "AES256", "aws:fsx", "aws:kms", "aws:kms:dsse"
2349
2357
  # resp.sse_customer_algorithm #=> String
2350
2358
  # resp.sse_customer_key_md5 #=> String
2351
2359
  # resp.ssekms_key_id #=> String
@@ -3427,7 +3435,7 @@ module Aws::S3
3427
3435
  #
3428
3436
  # @option params [String] :server_side_encryption
3429
3437
  # The server-side encryption algorithm used when you store this object
3430
- # in Amazon S3 (for example, `AES256`, `aws:kms`).
3438
+ # in Amazon S3 or Amazon FSx.
3431
3439
  #
3432
3440
  # * <b>Directory buckets </b> - For directory buckets, there are only
3433
3441
  # two supported options for server-side encryption: server-side
@@ -3469,6 +3477,14 @@ module Aws::S3
3469
3477
  #
3470
3478
  # </note>
3471
3479
  #
3480
+ # * <b>S3 access points for Amazon FSx </b> - When accessing data stored
3481
+ # in Amazon FSx file systems using S3 access points, the only valid
3482
+ # server side encryption option is `aws:fsx`. All Amazon FSx file
3483
+ # systems have encryption configured by default and are encrypted at
3484
+ # rest. Data is automatically encrypted before being written to the
3485
+ # file system, and automatically decrypted as it is read. These
3486
+ # processes are handled transparently by Amazon FSx.
3487
+ #
3472
3488
  #
3473
3489
  #
3474
3490
  # [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-serv-side-encryption.html
@@ -3726,8 +3742,8 @@ module Aws::S3
3726
3742
  # metadata: {
3727
3743
  # "MetadataKey" => "MetadataValue",
3728
3744
  # },
3729
- # server_side_encryption: "AES256", # accepts AES256, aws:kms, aws:kms:dsse
3730
- # storage_class: "STANDARD", # accepts STANDARD, REDUCED_REDUNDANCY, STANDARD_IA, ONEZONE_IA, INTELLIGENT_TIERING, GLACIER, DEEP_ARCHIVE, OUTPOSTS, GLACIER_IR, SNOW, EXPRESS_ONEZONE
3745
+ # server_side_encryption: "AES256", # accepts AES256, aws:fsx, aws:kms, aws:kms:dsse
3746
+ # storage_class: "STANDARD", # accepts STANDARD, REDUCED_REDUNDANCY, STANDARD_IA, ONEZONE_IA, INTELLIGENT_TIERING, GLACIER, DEEP_ARCHIVE, OUTPOSTS, GLACIER_IR, SNOW, EXPRESS_ONEZONE, FSX_OPENZFS
3731
3747
  # website_redirect_location: "WebsiteRedirectLocation",
3732
3748
  # sse_customer_algorithm: "SSECustomerAlgorithm",
3733
3749
  # sse_customer_key: "SSECustomerKey",
@@ -3752,7 +3768,7 @@ module Aws::S3
3752
3768
  # resp.bucket #=> String
3753
3769
  # resp.key #=> String
3754
3770
  # resp.upload_id #=> String
3755
- # resp.server_side_encryption #=> String, one of "AES256", "aws:kms", "aws:kms:dsse"
3771
+ # resp.server_side_encryption #=> String, one of "AES256", "aws:fsx", "aws:kms", "aws:kms:dsse"
3756
3772
  # resp.sse_customer_algorithm #=> String
3757
3773
  # resp.sse_customer_key_md5 #=> String
3758
3774
  # resp.ssekms_key_id #=> String
@@ -3959,6 +3975,14 @@ module Aws::S3
3959
3975
  # SSE-S3. For more information, see [Protecting data with server-side
3960
3976
  # encryption][1] in the *Amazon S3 User Guide*.
3961
3977
  #
3978
+ # <b>S3 access points for Amazon FSx </b> - When accessing data stored
3979
+ # in Amazon FSx file systems using S3 access points, the only valid
3980
+ # server side encryption option is `aws:fsx`. All Amazon FSx file
3981
+ # systems have encryption configured by default and are encrypted at
3982
+ # rest. Data is automatically encrypted before being written to the file
3983
+ # system, and automatically decrypted as it is read. These processes are
3984
+ # handled transparently by Amazon FSx.
3985
+ #
3962
3986
  #
3963
3987
  #
3964
3988
  # [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/serv-side-encryption.html
@@ -4039,7 +4063,7 @@ module Aws::S3
4039
4063
  # resp = client.create_session({
4040
4064
  # session_mode: "ReadOnly", # accepts ReadOnly, ReadWrite
4041
4065
  # bucket: "BucketName", # required
4042
- # server_side_encryption: "AES256", # accepts AES256, aws:kms, aws:kms:dsse
4066
+ # server_side_encryption: "AES256", # accepts AES256, aws:fsx, aws:kms, aws:kms:dsse
4043
4067
  # ssekms_key_id: "SSEKMSKeyId",
4044
4068
  # ssekms_encryption_context: "SSEKMSEncryptionContext",
4045
4069
  # bucket_key_enabled: false,
@@ -4047,7 +4071,7 @@ module Aws::S3
4047
4071
  #
4048
4072
  # @example Response structure
4049
4073
  #
4050
- # resp.server_side_encryption #=> String, one of "AES256", "aws:kms", "aws:kms:dsse"
4074
+ # resp.server_side_encryption #=> String, one of "AES256", "aws:fsx", "aws:kms", "aws:kms:dsse"
4051
4075
  # resp.ssekms_key_id #=> String
4052
4076
  # resp.ssekms_encryption_context #=> String
4053
4077
  # resp.bucket_key_enabled #=> Boolean
@@ -6544,7 +6568,7 @@ module Aws::S3
6544
6568
  # @example Response structure
6545
6569
  #
6546
6570
  # resp.server_side_encryption_configuration.rules #=> Array
6547
- # resp.server_side_encryption_configuration.rules[0].apply_server_side_encryption_by_default.sse_algorithm #=> String, one of "AES256", "aws:kms", "aws:kms:dsse"
6571
+ # resp.server_side_encryption_configuration.rules[0].apply_server_side_encryption_by_default.sse_algorithm #=> String, one of "AES256", "aws:fsx", "aws:kms", "aws:kms:dsse"
6548
6572
  # resp.server_side_encryption_configuration.rules[0].apply_server_side_encryption_by_default.kms_master_key_id #=> String
6549
6573
  # resp.server_side_encryption_configuration.rules[0].bucket_key_enabled #=> Boolean
6550
6574
  #
@@ -8005,7 +8029,7 @@ module Aws::S3
8005
8029
  # resp.replication_configuration.rules[0].existing_object_replication.status #=> String, one of "Enabled", "Disabled"
8006
8030
  # resp.replication_configuration.rules[0].destination.bucket #=> String
8007
8031
  # resp.replication_configuration.rules[0].destination.account #=> String
8008
- # resp.replication_configuration.rules[0].destination.storage_class #=> String, one of "STANDARD", "REDUCED_REDUNDANCY", "STANDARD_IA", "ONEZONE_IA", "INTELLIGENT_TIERING", "GLACIER", "DEEP_ARCHIVE", "OUTPOSTS", "GLACIER_IR", "SNOW", "EXPRESS_ONEZONE"
8032
+ # resp.replication_configuration.rules[0].destination.storage_class #=> String, one of "STANDARD", "REDUCED_REDUNDANCY", "STANDARD_IA", "ONEZONE_IA", "INTELLIGENT_TIERING", "GLACIER", "DEEP_ARCHIVE", "OUTPOSTS", "GLACIER_IR", "SNOW", "EXPRESS_ONEZONE", "FSX_OPENZFS"
8009
8033
  # resp.replication_configuration.rules[0].destination.access_control_translation.owner #=> String, one of "Destination"
8010
8034
  # resp.replication_configuration.rules[0].destination.encryption_configuration.replica_kms_key_id #=> String
8011
8035
  # resp.replication_configuration.rules[0].destination.replication_time.status #=> String, one of "Enabled", "Disabled"
@@ -8987,14 +9011,14 @@ module Aws::S3
8987
9011
  # resp.expires #=> Time
8988
9012
  # resp.expires_string #=> String
8989
9013
  # resp.website_redirect_location #=> String
8990
- # resp.server_side_encryption #=> String, one of "AES256", "aws:kms", "aws:kms:dsse"
9014
+ # resp.server_side_encryption #=> String, one of "AES256", "aws:fsx", "aws:kms", "aws:kms:dsse"
8991
9015
  # resp.metadata #=> Hash
8992
9016
  # resp.metadata["MetadataKey"] #=> String
8993
9017
  # resp.sse_customer_algorithm #=> String
8994
9018
  # resp.sse_customer_key_md5 #=> String
8995
9019
  # resp.ssekms_key_id #=> String
8996
9020
  # resp.bucket_key_enabled #=> Boolean
8997
- # resp.storage_class #=> String, one of "STANDARD", "REDUCED_REDUNDANCY", "STANDARD_IA", "ONEZONE_IA", "INTELLIGENT_TIERING", "GLACIER", "DEEP_ARCHIVE", "OUTPOSTS", "GLACIER_IR", "SNOW", "EXPRESS_ONEZONE"
9021
+ # resp.storage_class #=> String, one of "STANDARD", "REDUCED_REDUNDANCY", "STANDARD_IA", "ONEZONE_IA", "INTELLIGENT_TIERING", "GLACIER", "DEEP_ARCHIVE", "OUTPOSTS", "GLACIER_IR", "SNOW", "EXPRESS_ONEZONE", "FSX_OPENZFS"
8998
9022
  # resp.request_charged #=> String, one of "requester"
8999
9023
  # resp.replication_status #=> String, one of "COMPLETE", "PENDING", "FAILED", "REPLICA", "COMPLETED"
9000
9024
  # resp.parts_count #=> Integer
@@ -9573,7 +9597,7 @@ module Aws::S3
9573
9597
  # resp.object_parts.parts[0].checksum_crc64nvme #=> String
9574
9598
  # resp.object_parts.parts[0].checksum_sha1 #=> String
9575
9599
  # resp.object_parts.parts[0].checksum_sha256 #=> String
9576
- # resp.storage_class #=> String, one of "STANDARD", "REDUCED_REDUNDANCY", "STANDARD_IA", "ONEZONE_IA", "INTELLIGENT_TIERING", "GLACIER", "DEEP_ARCHIVE", "OUTPOSTS", "GLACIER_IR", "SNOW", "EXPRESS_ONEZONE"
9600
+ # resp.storage_class #=> String, one of "STANDARD", "REDUCED_REDUNDANCY", "STANDARD_IA", "ONEZONE_IA", "INTELLIGENT_TIERING", "GLACIER", "DEEP_ARCHIVE", "OUTPOSTS", "GLACIER_IR", "SNOW", "EXPRESS_ONEZONE", "FSX_OPENZFS"
9577
9601
  # resp.object_size #=> Integer
9578
9602
  #
9579
9603
  # @see http://docs.aws.amazon.com/goto/WebAPI/s3-2006-03-01/GetObjectAttributes AWS API Documentation
@@ -10888,14 +10912,14 @@ module Aws::S3
10888
10912
  # resp.expires #=> Time
10889
10913
  # resp.expires_string #=> String
10890
10914
  # resp.website_redirect_location #=> String
10891
- # resp.server_side_encryption #=> String, one of "AES256", "aws:kms", "aws:kms:dsse"
10915
+ # resp.server_side_encryption #=> String, one of "AES256", "aws:fsx", "aws:kms", "aws:kms:dsse"
10892
10916
  # resp.metadata #=> Hash
10893
10917
  # resp.metadata["MetadataKey"] #=> String
10894
10918
  # resp.sse_customer_algorithm #=> String
10895
10919
  # resp.sse_customer_key_md5 #=> String
10896
10920
  # resp.ssekms_key_id #=> String
10897
10921
  # resp.bucket_key_enabled #=> Boolean
10898
- # resp.storage_class #=> String, one of "STANDARD", "REDUCED_REDUNDANCY", "STANDARD_IA", "ONEZONE_IA", "INTELLIGENT_TIERING", "GLACIER", "DEEP_ARCHIVE", "OUTPOSTS", "GLACIER_IR", "SNOW", "EXPRESS_ONEZONE"
10922
+ # resp.storage_class #=> String, one of "STANDARD", "REDUCED_REDUNDANCY", "STANDARD_IA", "ONEZONE_IA", "INTELLIGENT_TIERING", "GLACIER", "DEEP_ARCHIVE", "OUTPOSTS", "GLACIER_IR", "SNOW", "EXPRESS_ONEZONE", "FSX_OPENZFS"
10899
10923
  # resp.request_charged #=> String, one of "requester"
10900
10924
  # resp.replication_status #=> String, one of "COMPLETE", "PENDING", "FAILED", "REPLICA", "COMPLETED"
10901
10925
  # resp.parts_count #=> Integer
@@ -11999,7 +12023,7 @@ module Aws::S3
11999
12023
  # resp.uploads[0].upload_id #=> String
12000
12024
  # resp.uploads[0].key #=> String
12001
12025
  # resp.uploads[0].initiated #=> Time
12002
- # resp.uploads[0].storage_class #=> String, one of "STANDARD", "REDUCED_REDUNDANCY", "STANDARD_IA", "ONEZONE_IA", "INTELLIGENT_TIERING", "GLACIER", "DEEP_ARCHIVE", "OUTPOSTS", "GLACIER_IR", "SNOW", "EXPRESS_ONEZONE"
12026
+ # resp.uploads[0].storage_class #=> String, one of "STANDARD", "REDUCED_REDUNDANCY", "STANDARD_IA", "ONEZONE_IA", "INTELLIGENT_TIERING", "GLACIER", "DEEP_ARCHIVE", "OUTPOSTS", "GLACIER_IR", "SNOW", "EXPRESS_ONEZONE", "FSX_OPENZFS"
12003
12027
  # resp.uploads[0].owner.display_name #=> String
12004
12028
  # resp.uploads[0].owner.id #=> String
12005
12029
  # resp.uploads[0].initiator.id #=> String
@@ -12499,7 +12523,7 @@ module Aws::S3
12499
12523
  # resp.contents[0].checksum_algorithm[0] #=> String, one of "CRC32", "CRC32C", "SHA1", "SHA256", "CRC64NVME"
12500
12524
  # resp.contents[0].checksum_type #=> String, one of "COMPOSITE", "FULL_OBJECT"
12501
12525
  # resp.contents[0].size #=> Integer
12502
- # resp.contents[0].storage_class #=> String, one of "STANDARD", "REDUCED_REDUNDANCY", "GLACIER", "STANDARD_IA", "ONEZONE_IA", "INTELLIGENT_TIERING", "DEEP_ARCHIVE", "OUTPOSTS", "GLACIER_IR", "SNOW", "EXPRESS_ONEZONE"
12526
+ # resp.contents[0].storage_class #=> String, one of "STANDARD", "REDUCED_REDUNDANCY", "GLACIER", "STANDARD_IA", "ONEZONE_IA", "INTELLIGENT_TIERING", "DEEP_ARCHIVE", "OUTPOSTS", "GLACIER_IR", "SNOW", "EXPRESS_ONEZONE", "FSX_OPENZFS"
12503
12527
  # resp.contents[0].owner.display_name #=> String
12504
12528
  # resp.contents[0].owner.id #=> String
12505
12529
  # resp.contents[0].restore_status.is_restore_in_progress #=> Boolean
@@ -12842,7 +12866,7 @@ module Aws::S3
12842
12866
  # resp.contents[0].checksum_algorithm[0] #=> String, one of "CRC32", "CRC32C", "SHA1", "SHA256", "CRC64NVME"
12843
12867
  # resp.contents[0].checksum_type #=> String, one of "COMPOSITE", "FULL_OBJECT"
12844
12868
  # resp.contents[0].size #=> Integer
12845
- # resp.contents[0].storage_class #=> String, one of "STANDARD", "REDUCED_REDUNDANCY", "GLACIER", "STANDARD_IA", "ONEZONE_IA", "INTELLIGENT_TIERING", "DEEP_ARCHIVE", "OUTPOSTS", "GLACIER_IR", "SNOW", "EXPRESS_ONEZONE"
12869
+ # resp.contents[0].storage_class #=> String, one of "STANDARD", "REDUCED_REDUNDANCY", "GLACIER", "STANDARD_IA", "ONEZONE_IA", "INTELLIGENT_TIERING", "DEEP_ARCHIVE", "OUTPOSTS", "GLACIER_IR", "SNOW", "EXPRESS_ONEZONE", "FSX_OPENZFS"
12846
12870
  # resp.contents[0].owner.display_name #=> String
12847
12871
  # resp.contents[0].owner.id #=> String
12848
12872
  # resp.contents[0].restore_status.is_restore_in_progress #=> Boolean
@@ -13197,7 +13221,7 @@ module Aws::S3
13197
13221
  # resp.initiator.display_name #=> String
13198
13222
  # resp.owner.display_name #=> String
13199
13223
  # resp.owner.id #=> String
13200
- # resp.storage_class #=> String, one of "STANDARD", "REDUCED_REDUNDANCY", "STANDARD_IA", "ONEZONE_IA", "INTELLIGENT_TIERING", "GLACIER", "DEEP_ARCHIVE", "OUTPOSTS", "GLACIER_IR", "SNOW", "EXPRESS_ONEZONE"
13224
+ # resp.storage_class #=> String, one of "STANDARD", "REDUCED_REDUNDANCY", "STANDARD_IA", "ONEZONE_IA", "INTELLIGENT_TIERING", "GLACIER", "DEEP_ARCHIVE", "OUTPOSTS", "GLACIER_IR", "SNOW", "EXPRESS_ONEZONE", "FSX_OPENZFS"
13201
13225
  # resp.request_charged #=> String, one of "requester"
13202
13226
  # resp.checksum_algorithm #=> String, one of "CRC32", "CRC32C", "SHA1", "SHA256", "CRC64NVME"
13203
13227
  # resp.checksum_type #=> String, one of "COMPOSITE", "FULL_OBJECT"
@@ -14153,7 +14177,7 @@ module Aws::S3
14153
14177
  # rules: [ # required
14154
14178
  # {
14155
14179
  # apply_server_side_encryption_by_default: {
14156
- # sse_algorithm: "AES256", # required, accepts AES256, aws:kms, aws:kms:dsse
14180
+ # sse_algorithm: "AES256", # required, accepts AES256, aws:fsx, aws:kms, aws:kms:dsse
14157
14181
  # kms_master_key_id: "SSEKMSKeyId",
14158
14182
  # },
14159
14183
  # bucket_key_enabled: false,
@@ -15971,7 +15995,7 @@ module Aws::S3
15971
15995
  # destination: { # required
15972
15996
  # bucket: "BucketName", # required
15973
15997
  # account: "AccountId",
15974
- # storage_class: "STANDARD", # accepts STANDARD, REDUCED_REDUNDANCY, STANDARD_IA, ONEZONE_IA, INTELLIGENT_TIERING, GLACIER, DEEP_ARCHIVE, OUTPOSTS, GLACIER_IR, SNOW, EXPRESS_ONEZONE
15998
+ # storage_class: "STANDARD", # accepts STANDARD, REDUCED_REDUNDANCY, STANDARD_IA, ONEZONE_IA, INTELLIGENT_TIERING, GLACIER, DEEP_ARCHIVE, OUTPOSTS, GLACIER_IR, SNOW, EXPRESS_ONEZONE, FSX_OPENZFS
15975
15999
  # access_control_translation: {
15976
16000
  # owner: "Destination", # required, accepts Destination
15977
16001
  # },
@@ -17105,8 +17129,7 @@ module Aws::S3
17105
17129
  #
17106
17130
  # @option params [String] :server_side_encryption
17107
17131
  # The server-side encryption algorithm that was used when you store this
17108
- # object in Amazon S3 (for example, `AES256`, `aws:kms`,
17109
- # `aws:kms:dsse`).
17132
+ # object in Amazon S3 or Amazon FSx.
17110
17133
  #
17111
17134
  # * <b>General purpose buckets </b> - You have four mutually exclusive
17112
17135
  # options to protect data using server-side encryption in Amazon S3,
@@ -17160,6 +17183,14 @@ module Aws::S3
17160
17183
  #
17161
17184
  # </note>
17162
17185
  #
17186
+ # * <b>S3 access points for Amazon FSx </b> - When accessing data stored
17187
+ # in Amazon FSx file systems using S3 access points, the only valid
17188
+ # server side encryption option is `aws:fsx`. All Amazon FSx file
17189
+ # systems have encryption configured by default and are encrypted at
17190
+ # rest. Data is automatically encrypted before being written to the
17191
+ # file system, and automatically decrypted as it is read. These
17192
+ # processes are handled transparently by Amazon FSx.
17193
+ #
17163
17194
  #
17164
17195
  #
17165
17196
  # [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html
@@ -17573,8 +17604,8 @@ module Aws::S3
17573
17604
  # metadata: {
17574
17605
  # "MetadataKey" => "MetadataValue",
17575
17606
  # },
17576
- # server_side_encryption: "AES256", # accepts AES256, aws:kms, aws:kms:dsse
17577
- # storage_class: "STANDARD", # accepts STANDARD, REDUCED_REDUNDANCY, STANDARD_IA, ONEZONE_IA, INTELLIGENT_TIERING, GLACIER, DEEP_ARCHIVE, OUTPOSTS, GLACIER_IR, SNOW, EXPRESS_ONEZONE
17607
+ # server_side_encryption: "AES256", # accepts AES256, aws:fsx, aws:kms, aws:kms:dsse
17608
+ # storage_class: "STANDARD", # accepts STANDARD, REDUCED_REDUNDANCY, STANDARD_IA, ONEZONE_IA, INTELLIGENT_TIERING, GLACIER, DEEP_ARCHIVE, OUTPOSTS, GLACIER_IR, SNOW, EXPRESS_ONEZONE, FSX_OPENZFS
17578
17609
  # website_redirect_location: "WebsiteRedirectLocation",
17579
17610
  # sse_customer_algorithm: "SSECustomerAlgorithm",
17580
17611
  # sse_customer_key: "SSECustomerKey",
@@ -17600,7 +17631,7 @@ module Aws::S3
17600
17631
  # resp.checksum_sha1 #=> String
17601
17632
  # resp.checksum_sha256 #=> String
17602
17633
  # resp.checksum_type #=> String, one of "COMPOSITE", "FULL_OBJECT"
17603
- # resp.server_side_encryption #=> String, one of "AES256", "aws:kms", "aws:kms:dsse"
17634
+ # resp.server_side_encryption #=> String, one of "AES256", "aws:fsx", "aws:kms", "aws:kms:dsse"
17604
17635
  # resp.version_id #=> String
17605
17636
  # resp.sse_customer_algorithm #=> String
17606
17637
  # resp.sse_customer_key_md5 #=> String
@@ -18716,7 +18747,7 @@ module Aws::S3
18716
18747
  # session. A `ReadWrite` session is required for executing all the
18717
18748
  # Zonal endpoint API operations, including `RenameObject`. For more
18718
18749
  # information about authorization, see [ `CreateSession` ][2]. To
18719
- # learn more about Zonal endpoint APT operations, see [Authorizing
18750
+ # learn more about Zonal endpoint API operations, see [Authorizing
18720
18751
  # Zonal endpoint API operations with CreateSession][3] in the *Amazon
18721
18752
  # S3 User Guide*.
18722
18753
  #
@@ -18802,15 +18833,19 @@ module Aws::S3
18802
18833
  #
18803
18834
  # @option params [String] :client_token
18804
18835
  # A unique string with a max of 64 ASCII characters in the ASCII range
18805
- # of 33 - 126. `RenameObject` supports idempotency using a client token.
18806
- # To make an idempotent API request using `RenameObject`, specify a
18807
- # client token in the request. You should not reuse the same client
18808
- # token for other API requests. If you retry a request that completed
18809
- # successfully using the same client token and the same parameters, the
18810
- # retry succeeds without performing any further actions. If you retry a
18811
- # successful request using the same client token, but one or more of the
18812
- # parameters are different, the retry fails and an
18813
- # `IdempotentParameterMismatch` error is returned.
18836
+ # of 33 - 126.
18837
+ #
18838
+ # <note markdown="1"> `RenameObject` supports idempotency using a client token. To make an
18839
+ # idempotent API request using `RenameObject`, specify a client token in
18840
+ # the request. You should not reuse the same client token for other API
18841
+ # requests. If you retry a request that completed successfully using the
18842
+ # same client token and the same parameters, the retry succeeds without
18843
+ # performing any further actions. If you retry a successful request
18844
+ # using the same client token, but one or more of the parameters are
18845
+ # different, the retry fails and an `IdempotentParameterMismatch` error
18846
+ # is returned.
18847
+ #
18848
+ # </note>
18814
18849
  #
18815
18850
  # **A suitable default value is auto-generated.** You should normally
18816
18851
  # not need to pass this option.**
@@ -19173,7 +19208,7 @@ module Aws::S3
19173
19208
  # bucket_name: "BucketName", # required
19174
19209
  # prefix: "LocationPrefix", # required
19175
19210
  # encryption: {
19176
- # encryption_type: "AES256", # required, accepts AES256, aws:kms, aws:kms:dsse
19211
+ # encryption_type: "AES256", # required, accepts AES256, aws:fsx, aws:kms, aws:kms:dsse
19177
19212
  # kms_key_id: "SSEKMSKeyId",
19178
19213
  # kms_context: "KMSContext",
19179
19214
  # },
@@ -19204,7 +19239,7 @@ module Aws::S3
19204
19239
  # value: "MetadataValue",
19205
19240
  # },
19206
19241
  # ],
19207
- # storage_class: "STANDARD", # accepts STANDARD, REDUCED_REDUNDANCY, STANDARD_IA, ONEZONE_IA, INTELLIGENT_TIERING, GLACIER, DEEP_ARCHIVE, OUTPOSTS, GLACIER_IR, SNOW, EXPRESS_ONEZONE
19242
+ # storage_class: "STANDARD", # accepts STANDARD, REDUCED_REDUNDANCY, STANDARD_IA, ONEZONE_IA, INTELLIGENT_TIERING, GLACIER, DEEP_ARCHIVE, OUTPOSTS, GLACIER_IR, SNOW, EXPRESS_ONEZONE, FSX_OPENZFS
19208
19243
  # },
19209
19244
  # },
19210
19245
  # },
@@ -20097,7 +20132,7 @@ module Aws::S3
20097
20132
  #
20098
20133
  # @example Response structure
20099
20134
  #
20100
- # resp.server_side_encryption #=> String, one of "AES256", "aws:kms", "aws:kms:dsse"
20135
+ # resp.server_side_encryption #=> String, one of "AES256", "aws:fsx", "aws:kms", "aws:kms:dsse"
20101
20136
  # resp.etag #=> String
20102
20137
  # resp.checksum_crc32 #=> String
20103
20138
  # resp.checksum_crc32c #=> String
@@ -20684,7 +20719,7 @@ module Aws::S3
20684
20719
  # resp.copy_part_result.checksum_crc64nvme #=> String
20685
20720
  # resp.copy_part_result.checksum_sha1 #=> String
20686
20721
  # resp.copy_part_result.checksum_sha256 #=> String
20687
- # resp.server_side_encryption #=> String, one of "AES256", "aws:kms", "aws:kms:dsse"
20722
+ # resp.server_side_encryption #=> String, one of "AES256", "aws:fsx", "aws:kms", "aws:kms:dsse"
20688
20723
  # resp.sse_customer_algorithm #=> String
20689
20724
  # resp.sse_customer_key_md5 #=> String
20690
20725
  # resp.ssekms_key_id #=> String
@@ -21011,7 +21046,12 @@ module Aws::S3
21011
21046
  #
21012
21047
  # @option params [String] :server_side_encryption
21013
21048
  # The server-side encryption algorithm used when storing requested
21014
- # object in Amazon S3 (for example, AES256, `aws:kms`).
21049
+ # object in Amazon S3 or Amazon FSx.
21050
+ #
21051
+ # <note markdown="1"> When accessing data stored in Amazon FSx file systems using S3 access
21052
+ # points, the only valid server side encryption option is `aws:fsx`.
21053
+ #
21054
+ # </note>
21015
21055
  #
21016
21056
  # @option params [String] :sse_customer_algorithm
21017
21057
  # Encryption algorithm used if server-side encryption with a
@@ -21095,11 +21135,11 @@ module Aws::S3
21095
21135
  # replication_status: "COMPLETE", # accepts COMPLETE, PENDING, FAILED, REPLICA, COMPLETED
21096
21136
  # request_charged: "requester", # accepts requester
21097
21137
  # restore: "Restore",
21098
- # server_side_encryption: "AES256", # accepts AES256, aws:kms, aws:kms:dsse
21138
+ # server_side_encryption: "AES256", # accepts AES256, aws:fsx, aws:kms, aws:kms:dsse
21099
21139
  # sse_customer_algorithm: "SSECustomerAlgorithm",
21100
21140
  # ssekms_key_id: "SSEKMSKeyId",
21101
21141
  # sse_customer_key_md5: "SSECustomerKeyMD5",
21102
- # storage_class: "STANDARD", # accepts STANDARD, REDUCED_REDUNDANCY, STANDARD_IA, ONEZONE_IA, INTELLIGENT_TIERING, GLACIER, DEEP_ARCHIVE, OUTPOSTS, GLACIER_IR, SNOW, EXPRESS_ONEZONE
21142
+ # storage_class: "STANDARD", # accepts STANDARD, REDUCED_REDUNDANCY, STANDARD_IA, ONEZONE_IA, INTELLIGENT_TIERING, GLACIER, DEEP_ARCHIVE, OUTPOSTS, GLACIER_IR, SNOW, EXPRESS_ONEZONE, FSX_OPENZFS
21103
21143
  # tag_count: 1,
21104
21144
  # version_id: "ObjectVersionId",
21105
21145
  # bucket_key_enabled: false,
@@ -21132,7 +21172,7 @@ module Aws::S3
21132
21172
  tracer: tracer
21133
21173
  )
21134
21174
  context[:gem_name] = 'aws-sdk-s3'
21135
- context[:gem_version] = '1.190.0'
21175
+ context[:gem_version] = '1.191.0'
21136
21176
  Seahorse::Client::Request.new(handlers, context)
21137
21177
  end
21138
21178
 
@@ -324,7 +324,12 @@ module Aws::S3
324
324
  end
325
325
 
326
326
  # The server-side encryption algorithm used when you store this object
327
- # in Amazon S3 (for example, `AES256`, `aws:kms`, `aws:kms:dsse`).
327
+ # in Amazon S3 or Amazon FSx.
328
+ #
329
+ # <note markdown="1"> When accessing data stored in Amazon FSx file systems using S3 access
330
+ # points, the only valid server side encryption option is `aws:fsx`.
331
+ #
332
+ # </note>
328
333
  # @return [String]
329
334
  def server_side_encryption
330
335
  data[:server_side_encryption]
@@ -757,8 +762,8 @@ module Aws::S3
757
762
  # },
758
763
  # metadata_directive: "COPY", # accepts COPY, REPLACE
759
764
  # tagging_directive: "COPY", # accepts COPY, REPLACE
760
- # server_side_encryption: "AES256", # accepts AES256, aws:kms, aws:kms:dsse
761
- # storage_class: "STANDARD", # accepts STANDARD, REDUCED_REDUNDANCY, STANDARD_IA, ONEZONE_IA, INTELLIGENT_TIERING, GLACIER, DEEP_ARCHIVE, OUTPOSTS, GLACIER_IR, SNOW, EXPRESS_ONEZONE
765
+ # server_side_encryption: "AES256", # accepts AES256, aws:fsx, aws:kms, aws:kms:dsse
766
+ # storage_class: "STANDARD", # accepts STANDARD, REDUCED_REDUNDANCY, STANDARD_IA, ONEZONE_IA, INTELLIGENT_TIERING, GLACIER, DEEP_ARCHIVE, OUTPOSTS, GLACIER_IR, SNOW, EXPRESS_ONEZONE, FSX_OPENZFS
762
767
  # website_redirect_location: "WebsiteRedirectLocation",
763
768
  # sse_customer_algorithm: "SSECustomerAlgorithm",
764
769
  # sse_customer_key: "SSECustomerKey",
@@ -1148,6 +1153,14 @@ module Aws::S3
1148
1153
  # key is the same customer managed key that you specified for the
1149
1154
  # directory bucket's default encryption configuration.
1150
1155
  #
1156
+ # * <b>S3 access points for Amazon FSx </b> - When accessing data stored
1157
+ # in Amazon FSx file systems using S3 access points, the only valid
1158
+ # server side encryption option is `aws:fsx`. All Amazon FSx file
1159
+ # systems have encryption configured by default and are encrypted at
1160
+ # rest. Data is automatically encrypted before being written to the
1161
+ # file system, and automatically decrypted as it is read. These
1162
+ # processes are handled transparently by Amazon FSx.
1163
+ #
1151
1164
  #
1152
1165
  #
1153
1166
  # [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/serv-side-encryption.html
@@ -1846,8 +1859,8 @@ module Aws::S3
1846
1859
  # metadata: {
1847
1860
  # "MetadataKey" => "MetadataValue",
1848
1861
  # },
1849
- # server_side_encryption: "AES256", # accepts AES256, aws:kms, aws:kms:dsse
1850
- # storage_class: "STANDARD", # accepts STANDARD, REDUCED_REDUNDANCY, STANDARD_IA, ONEZONE_IA, INTELLIGENT_TIERING, GLACIER, DEEP_ARCHIVE, OUTPOSTS, GLACIER_IR, SNOW, EXPRESS_ONEZONE
1862
+ # server_side_encryption: "AES256", # accepts AES256, aws:fsx, aws:kms, aws:kms:dsse
1863
+ # storage_class: "STANDARD", # accepts STANDARD, REDUCED_REDUNDANCY, STANDARD_IA, ONEZONE_IA, INTELLIGENT_TIERING, GLACIER, DEEP_ARCHIVE, OUTPOSTS, GLACIER_IR, SNOW, EXPRESS_ONEZONE, FSX_OPENZFS
1851
1864
  # website_redirect_location: "WebsiteRedirectLocation",
1852
1865
  # sse_customer_algorithm: "SSECustomerAlgorithm",
1853
1866
  # sse_customer_key: "SSECustomerKey",
@@ -2164,7 +2177,7 @@ module Aws::S3
2164
2177
  # A map of metadata to store with the object in S3.
2165
2178
  # @option options [String] :server_side_encryption
2166
2179
  # The server-side encryption algorithm used when you store this object
2167
- # in Amazon S3 (for example, `AES256`, `aws:kms`).
2180
+ # in Amazon S3 or Amazon FSx.
2168
2181
  #
2169
2182
  # * <b>Directory buckets </b> - For directory buckets, there are only
2170
2183
  # two supported options for server-side encryption: server-side
@@ -2206,6 +2219,14 @@ module Aws::S3
2206
2219
  #
2207
2220
  # </note>
2208
2221
  #
2222
+ # * <b>S3 access points for Amazon FSx </b> - When accessing data stored
2223
+ # in Amazon FSx file systems using S3 access points, the only valid
2224
+ # server side encryption option is `aws:fsx`. All Amazon FSx file
2225
+ # systems have encryption configured by default and are encrypted at
2226
+ # rest. Data is automatically encrypted before being written to the
2227
+ # file system, and automatically decrypted as it is read. These
2228
+ # processes are handled transparently by Amazon FSx.
2229
+ #
2209
2230
  #
2210
2231
  #
2211
2232
  # [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-serv-side-encryption.html
@@ -2439,8 +2460,8 @@ module Aws::S3
2439
2460
  # metadata: {
2440
2461
  # "MetadataKey" => "MetadataValue",
2441
2462
  # },
2442
- # server_side_encryption: "AES256", # accepts AES256, aws:kms, aws:kms:dsse
2443
- # storage_class: "STANDARD", # accepts STANDARD, REDUCED_REDUNDANCY, STANDARD_IA, ONEZONE_IA, INTELLIGENT_TIERING, GLACIER, DEEP_ARCHIVE, OUTPOSTS, GLACIER_IR, SNOW, EXPRESS_ONEZONE
2463
+ # server_side_encryption: "AES256", # accepts AES256, aws:fsx, aws:kms, aws:kms:dsse
2464
+ # storage_class: "STANDARD", # accepts STANDARD, REDUCED_REDUNDANCY, STANDARD_IA, ONEZONE_IA, INTELLIGENT_TIERING, GLACIER, DEEP_ARCHIVE, OUTPOSTS, GLACIER_IR, SNOW, EXPRESS_ONEZONE, FSX_OPENZFS
2444
2465
  # website_redirect_location: "WebsiteRedirectLocation",
2445
2466
  # sse_customer_algorithm: "SSECustomerAlgorithm",
2446
2467
  # sse_customer_key: "SSECustomerKey",
@@ -2750,8 +2771,7 @@ module Aws::S3
2750
2771
  # A map of metadata to store with the object in S3.
2751
2772
  # @option options [String] :server_side_encryption
2752
2773
  # The server-side encryption algorithm that was used when you store this
2753
- # object in Amazon S3 (for example, `AES256`, `aws:kms`,
2754
- # `aws:kms:dsse`).
2774
+ # object in Amazon S3 or Amazon FSx.
2755
2775
  #
2756
2776
  # * <b>General purpose buckets </b> - You have four mutually exclusive
2757
2777
  # options to protect data using server-side encryption in Amazon S3,
@@ -2805,6 +2825,14 @@ module Aws::S3
2805
2825
  #
2806
2826
  # </note>
2807
2827
  #
2828
+ # * <b>S3 access points for Amazon FSx </b> - When accessing data stored
2829
+ # in Amazon FSx file systems using S3 access points, the only valid
2830
+ # server side encryption option is `aws:fsx`. All Amazon FSx file
2831
+ # systems have encryption configured by default and are encrypted at
2832
+ # rest. Data is automatically encrypted before being written to the
2833
+ # file system, and automatically decrypted as it is read. These
2834
+ # processes are handled transparently by Amazon FSx.
2835
+ #
2808
2836
  #
2809
2837
  #
2810
2838
  # [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html
@@ -3077,7 +3105,7 @@ module Aws::S3
3077
3105
  # bucket_name: "BucketName", # required
3078
3106
  # prefix: "LocationPrefix", # required
3079
3107
  # encryption: {
3080
- # encryption_type: "AES256", # required, accepts AES256, aws:kms, aws:kms:dsse
3108
+ # encryption_type: "AES256", # required, accepts AES256, aws:fsx, aws:kms, aws:kms:dsse
3081
3109
  # kms_key_id: "SSEKMSKeyId",
3082
3110
  # kms_context: "KMSContext",
3083
3111
  # },
@@ -3108,7 +3136,7 @@ module Aws::S3
3108
3136
  # value: "MetadataValue",
3109
3137
  # },
3110
3138
  # ],
3111
- # storage_class: "STANDARD", # accepts STANDARD, REDUCED_REDUNDANCY, STANDARD_IA, ONEZONE_IA, INTELLIGENT_TIERING, GLACIER, DEEP_ARCHIVE, OUTPOSTS, GLACIER_IR, SNOW, EXPRESS_ONEZONE
3139
+ # storage_class: "STANDARD", # accepts STANDARD, REDUCED_REDUNDANCY, STANDARD_IA, ONEZONE_IA, INTELLIGENT_TIERING, GLACIER, DEEP_ARCHIVE, OUTPOSTS, GLACIER_IR, SNOW, EXPRESS_ONEZONE, FSX_OPENZFS
3112
3140
  # },
3113
3141
  # },
3114
3142
  # },