aws-sdk-s3 1.203.1 → 1.204.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 57429dc4de8e3597a4d8e608eba6d77d7277c730a7229c16e3d1f0961e542c22
4
- data.tar.gz: 8a1b6eefeab828b630a6d7a2fc2e00826ecc593401dd00ce6587a4f161cbd52c
3
+ metadata.gz: 5b3e6c1a389a8b653bb9b2cf6794af737d6eb9ba921e161cbc4d6310b5bf1da2
4
+ data.tar.gz: 0bf11ac8e2c6482a7575814185df05085bcef7395f0b4a0d1a553ac4e28516f1
5
5
  SHA512:
6
- metadata.gz: e7981b06a0c24072d4e880529cddb506c683382c68f64d7c325d87e1e446b5511fb0ec31b3a555d40bcb4bc1f7fdee6a26e17371b5fbe9e7a01c5e3526fac927
7
- data.tar.gz: 1f3fd5e176b7e41912b52ab6c83877902cd6e15d6280f885f02f2efb1e103843ba021f28d350da6ce6086055ea47e27a32260422c112be9ad4cd2631c88d47c0
6
+ metadata.gz: 345faee4d24554abf10baf21078242da350ee86f60219696f6ad1df9fc4d77149d6aeabbac480e1173f5ff05a4413d9dba39b69f5b007f438672c30d5a97b406
7
+ data.tar.gz: bff580e0faa100be19a1531472b7e066e20da84fb606fa52643e20d588babc88f34a37868f2a98ca031b323c7c6f82d7c46e1c608ff40a9b2b54e2c2a74472ca
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.204.0 (2025-11-19)
5
+ ------------------
6
+
7
+ * Feature - Adds support for blocking SSE-C writes to general purpose buckets.
8
+
4
9
  1.203.1 (2025-11-10)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.203.1
1
+ 1.204.0
@@ -5405,7 +5405,7 @@ module Aws::S3
5405
5405
  #
5406
5406
  # </note>
5407
5407
  #
5408
- # Deletes the tags from the bucket.
5408
+ # Deletes tags from the bucket.
5409
5409
  #
5410
5410
  # To use this operation, you must have permission to perform the
5411
5411
  # `s3:PutBucketTagging` action. By default, the bucket owner has this
@@ -5613,6 +5613,12 @@ module Aws::S3
5613
5613
  # * <b> <code>s3:DeleteObjectVersion</code> </b> - To delete a
5614
5614
  # specific version of an object from a versioning-enabled bucket,
5615
5615
  # you must have the `s3:DeleteObjectVersion` permission.
5616
+ #
5617
+ # <note markdown="1"> If the `s3:DeleteObject` or `s3:DeleteObjectVersion` permissions
5618
+ # are explicitly denied in your bucket policy, attempts to delete
5619
+ # any unversioned objects result in a `403 Access Denied` error.
5620
+ #
5621
+ # </note>
5616
5622
  # * **Directory bucket permissions** - To grant access to this API
5617
5623
  # operation on a directory bucket, we recommend that you use the [
5618
5624
  # `CreateSession` ][8] API operation for session-based
@@ -6052,6 +6058,12 @@ module Aws::S3
6052
6058
  # * <b> <code>s3:DeleteObjectVersion</code> </b> - To delete a
6053
6059
  # specific version of an object from a versioning-enabled bucket,
6054
6060
  # you must specify the `s3:DeleteObjectVersion` permission.
6061
+ #
6062
+ # <note markdown="1"> If the `s3:DeleteObject` or `s3:DeleteObjectVersion` permissions
6063
+ # are explicitly denied in your bucket policy, attempts to delete
6064
+ # any unversioned objects result in a `403 Access Denied` error.
6065
+ #
6066
+ # </note>
6055
6067
  # * **Directory bucket permissions** - To grant access to this API
6056
6068
  # operation on a directory bucket, we recommend that you use the [
6057
6069
  # `CreateSession` ][4] API operation for session-based
@@ -6865,7 +6877,9 @@ module Aws::S3
6865
6877
 
6866
6878
  # Returns the default encryption configuration for an Amazon S3 bucket.
6867
6879
  # By default, all buckets have a default encryption configuration that
6868
- # uses server-side encryption with Amazon S3 managed keys (SSE-S3).
6880
+ # uses server-side encryption with Amazon S3 managed keys (SSE-S3). This
6881
+ # operation also returns the `BucketKeyEnabled` and
6882
+ # `BlockedEncryptionTypes` statuses.
6869
6883
  #
6870
6884
  # <note markdown="1"> * **General purpose buckets** - For information about the bucket
6871
6885
  # default encryption feature, see [Amazon S3 Bucket Default
@@ -6916,7 +6930,7 @@ module Aws::S3
6916
6930
  #
6917
6931
  #
6918
6932
  #
6919
- # [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/bucket-encryption.html
6933
+ # [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/bucket-encryption.html
6920
6934
  # [2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-bucket-encryption.html
6921
6935
  # [3]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-with-s3-actions.html#using-with-s3-actions-related-to-bucket-subresources
6922
6936
  # [4]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-access-control.html
@@ -6971,6 +6985,8 @@ module Aws::S3
6971
6985
  # resp.server_side_encryption_configuration.rules[0].apply_server_side_encryption_by_default.sse_algorithm #=> String, one of "AES256", "aws:fsx", "aws:kms", "aws:kms:dsse"
6972
6986
  # resp.server_side_encryption_configuration.rules[0].apply_server_side_encryption_by_default.kms_master_key_id #=> String
6973
6987
  # resp.server_side_encryption_configuration.rules[0].bucket_key_enabled #=> Boolean
6988
+ # resp.server_side_encryption_configuration.rules[0].blocked_encryption_types.encryption_type #=> Array
6989
+ # resp.server_side_encryption_configuration.rules[0].blocked_encryption_types.encryption_type[0] #=> String, one of "NONE", "SSE-C"
6974
6990
  #
6975
6991
  # @see http://docs.aws.amazon.com/goto/WebAPI/s3-2006-03-01/GetBucketEncryption AWS API Documentation
6976
6992
  #
@@ -8411,7 +8427,7 @@ module Aws::S3
8411
8427
  #
8412
8428
  # resp.to_h outputs the following:
8413
8429
  # {
8414
- # policy: "{\"Version\":\"2008-10-17\",\"Id\":\"LogPolicy\",\"Statement\":[{\"Sid\":\"Enables the log delivery group to publish logs to your bucket \",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"111122223333\"},\"Action\":[\"s3:GetBucketAcl\",\"s3:GetObjectAcl\",\"s3:PutObject\"],\"Resource\":[\"arn:aws:s3:::policytest1/*\",\"arn:aws:s3:::policytest1\"]}]}",
8430
+ # policy: "{\"Version\":\"2008-10-17\",&TCX5-2025-waiver;\"Id\":\"LogPolicy\",\"Statement\":[{\"Sid\":\"Enables the log delivery group to publish logs to your bucket \",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"111122223333\"},\"Action\":[\"s3:GetBucketAcl\",\"s3:GetObjectAcl\",\"s3:PutObject\"],\"Resource\":[\"arn:aws:s3:::policytest1/*\",\"arn:aws:s3:::policytest1\"]}]}",
8415
8431
  # }
8416
8432
  #
8417
8433
  # @example Request syntax with placeholder values
@@ -8704,7 +8720,7 @@ module Aws::S3
8704
8720
  #
8705
8721
  # </note>
8706
8722
  #
8707
- # Returns the tag set associated with the bucket.
8723
+ # Returns the tag set associated with the general purpose bucket.
8708
8724
  #
8709
8725
  # To use this operation, you must have permission to perform the
8710
8726
  # `s3:GetBucketTagging` action. By default, the bucket owner has this
@@ -14712,7 +14728,8 @@ module Aws::S3
14712
14728
  end
14713
14729
 
14714
14730
  # This operation configures default encryption and Amazon S3 Bucket Keys
14715
- # for an existing bucket.
14731
+ # for an existing bucket. You can also block encryption types using this
14732
+ # operation.
14716
14733
  #
14717
14734
  # <note markdown="1"> <b>Directory buckets </b> - For directory buckets, you must make
14718
14735
  # requests for this API operation to the Regional endpoint. These
@@ -14934,6 +14951,9 @@ module Aws::S3
14934
14951
  # kms_master_key_id: "SSEKMSKeyId",
14935
14952
  # },
14936
14953
  # bucket_key_enabled: false,
14954
+ # blocked_encryption_types: {
14955
+ # encryption_type: ["NONE"], # accepts NONE, SSE-C
14956
+ # },
14937
14957
  # },
14938
14958
  # ],
14939
14959
  # },
@@ -16930,7 +16950,7 @@ module Aws::S3
16930
16950
  #
16931
16951
  # </note>
16932
16952
  #
16933
- # Sets the tags for a bucket.
16953
+ # Sets the tags for a general purpose bucket.
16934
16954
  #
16935
16955
  # Use tags to organize your Amazon Web Services bill to reflect your own
16936
16956
  # cost structure. To do this, sign up to get your Amazon Web Services
@@ -22224,7 +22244,7 @@ module Aws::S3
22224
22244
  tracer: tracer
22225
22245
  )
22226
22246
  context[:gem_name] = 'aws-sdk-s3'
22227
- context[:gem_version] = '1.203.1'
22247
+ context[:gem_version] = '1.204.0'
22228
22248
  Seahorse::Client::Request.new(handlers, context)
22229
22249
  end
22230
22250
 
@@ -43,6 +43,7 @@ module Aws::S3
43
43
  AnalyticsS3BucketDestination = Shapes::StructureShape.new(name: 'AnalyticsS3BucketDestination')
44
44
  AnalyticsS3ExportFileFormat = Shapes::StringShape.new(name: 'AnalyticsS3ExportFileFormat')
45
45
  ArchiveStatus = Shapes::StringShape.new(name: 'ArchiveStatus')
46
+ BlockedEncryptionTypes = Shapes::StructureShape.new(name: 'BlockedEncryptionTypes')
46
47
  Body = Shapes::BlobShape.new(name: 'Body')
47
48
  Bucket = Shapes::StructureShape.new(name: 'Bucket')
48
49
  BucketAccelerateStatus = Shapes::StringShape.new(name: 'BucketAccelerateStatus')
@@ -177,6 +178,8 @@ module Aws::S3
177
178
  EncodingType = Shapes::StringShape.new(name: 'EncodingType')
178
179
  Encryption = Shapes::StructureShape.new(name: 'Encryption')
179
180
  EncryptionConfiguration = Shapes::StructureShape.new(name: 'EncryptionConfiguration')
181
+ EncryptionType = Shapes::StringShape.new(name: 'EncryptionType')
182
+ EncryptionTypeList = Shapes::ListShape.new(name: 'EncryptionTypeList', flattened: true)
180
183
  EncryptionTypeMismatch = Shapes::StructureShape.new(name: 'EncryptionTypeMismatch')
181
184
  End = Shapes::IntegerShape.new(name: 'End')
182
185
  EndEvent = Shapes::StructureShape.new(name: 'EndEvent')
@@ -741,6 +744,9 @@ module Aws::S3
741
744
  AnalyticsS3BucketDestination.add_member(:prefix, Shapes::ShapeRef.new(shape: Prefix, location_name: "Prefix"))
742
745
  AnalyticsS3BucketDestination.struct_class = Types::AnalyticsS3BucketDestination
743
746
 
747
+ BlockedEncryptionTypes.add_member(:encryption_type, Shapes::ShapeRef.new(shape: EncryptionTypeList, location_name: "EncryptionType"))
748
+ BlockedEncryptionTypes.struct_class = Types::BlockedEncryptionTypes
749
+
744
750
  Bucket.add_member(:name, Shapes::ShapeRef.new(shape: BucketName, location_name: "Name"))
745
751
  Bucket.add_member(:creation_date, Shapes::ShapeRef.new(shape: CreationDate, location_name: "CreationDate"))
746
752
  Bucket.add_member(:bucket_region, Shapes::ShapeRef.new(shape: BucketRegion, location_name: "BucketRegion"))
@@ -1220,6 +1226,8 @@ module Aws::S3
1220
1226
  EncryptionConfiguration.add_member(:replica_kms_key_id, Shapes::ShapeRef.new(shape: ReplicaKmsKeyID, location_name: "ReplicaKmsKeyID"))
1221
1227
  EncryptionConfiguration.struct_class = Types::EncryptionConfiguration
1222
1228
 
1229
+ EncryptionTypeList.member = Shapes::ShapeRef.new(shape: EncryptionType, location_name: "EncryptionType")
1230
+
1223
1231
  EncryptionTypeMismatch.struct_class = Types::EncryptionTypeMismatch
1224
1232
 
1225
1233
  EndEvent.struct_class = Types::EndEvent
@@ -2843,6 +2851,7 @@ module Aws::S3
2843
2851
 
2844
2852
  ServerSideEncryptionRule.add_member(:apply_server_side_encryption_by_default, Shapes::ShapeRef.new(shape: ServerSideEncryptionByDefault, location_name: "ApplyServerSideEncryptionByDefault"))
2845
2853
  ServerSideEncryptionRule.add_member(:bucket_key_enabled, Shapes::ShapeRef.new(shape: BucketKeyEnabled, location_name: "BucketKeyEnabled"))
2854
+ ServerSideEncryptionRule.add_member(:blocked_encryption_types, Shapes::ShapeRef.new(shape: BlockedEncryptionTypes, location_name: "BlockedEncryptionTypes"))
2846
2855
  ServerSideEncryptionRule.struct_class = Types::ServerSideEncryptionRule
2847
2856
 
2848
2857
  ServerSideEncryptionRules.member = Shapes::ShapeRef.new(shape: ServerSideEncryptionRule)
@@ -355,6 +355,63 @@ module Aws::S3
355
355
  include Aws::Structure
356
356
  end
357
357
 
358
+ # A bucket-level setting for Amazon S3 general purpose buckets used to
359
+ # prevent the upload of new objects encrypted with the specified
360
+ # server-side encryption type. For example, blocking an encryption type
361
+ # will block `PutObject`, `CopyObject`, `PostObject`, multipart upload,
362
+ # and replication requests to the bucket for objects with the specified
363
+ # encryption type. However, you can continue to read and list any
364
+ # pre-existing objects already encrypted with the specified encryption
365
+ # type. For more information, see [Blocking an encryption type for a
366
+ # general purpose bucket][1].
367
+ #
368
+ # This data type is used with the following actions:
369
+ #
370
+ # * [PutBucketEncryption][2]
371
+ #
372
+ # * [GetBucketEncryption][3]
373
+ #
374
+ # * [DeleteBucketEncryption][4]
375
+ #
376
+ # Permissions
377
+ #
378
+ # : You must have the `s3:PutEncryptionConfiguration` permission to
379
+ # block or unblock an encryption type for a bucket.
380
+ #
381
+ # You must have the `s3:GetEncryptionConfiguration` permission to view
382
+ # a bucket's encryption type.
383
+ #
384
+ #
385
+ #
386
+ # [1]: https://docs.aws.amazon.com/AmazonS3/userguide/block-encryption-type.html
387
+ # [2]: https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketEncryption.html
388
+ # [3]: https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketEncryption.html
389
+ # [4]: https://docs.aws.amazon.com/AmazonS3/latest/API/API_DeleteBucketEncryption.html
390
+ #
391
+ # @!attribute [rw] encryption_type
392
+ # The object encryption type that you want to block or unblock for an
393
+ # Amazon S3 general purpose bucket.
394
+ #
395
+ # <note markdown="1"> Currently, this parameter only supports blocking or unblocking
396
+ # server side encryption with customer-provided keys (SSE-C). For more
397
+ # information about SSE-C, see [Using server-side encryption with
398
+ # customer-provided keys (SSE-C)][1].
399
+ #
400
+ # </note>
401
+ #
402
+ #
403
+ #
404
+ # [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/ServerSideEncryptionCustomerKeys.html
405
+ # @return [Array<String>]
406
+ #
407
+ # @see http://docs.aws.amazon.com/goto/WebAPI/s3-2006-03-01/BlockedEncryptionTypes AWS API Documentation
408
+ #
409
+ class BlockedEncryptionTypes < Struct.new(
410
+ :encryption_type)
411
+ SENSITIVE = []
412
+ include Aws::Structure
413
+ end
414
+
358
415
  # In terms of implementation, a Bucket is a resource.
359
416
  #
360
417
  # @!attribute [rw] name
@@ -2740,11 +2797,11 @@ module Aws::S3
2740
2797
  # creating. Tags are key-value pairs of metadata used to categorize
2741
2798
  # and organize your buckets, track costs, and control access.
2742
2799
  #
2743
- # <note markdown="1"> * This parameter is only supported for S3 directory buckets. For
2744
- # more information, see [Using tags with directory buckets][1].
2800
+ # <note markdown="1"> This parameter is only supported for S3 directory buckets. For more
2801
+ # information, see [Using tags with directory buckets][1].
2745
2802
  #
2746
- # * You must have the `s3express:TagResource` permission to create a
2747
- # directory bucket with tags.
2803
+ # You must have the `s3express:TagResource` permission to create a
2804
+ # directory bucket with tags.
2748
2805
  #
2749
2806
  # </note>
2750
2807
  #
@@ -17253,7 +17310,7 @@ module Aws::S3
17253
17310
  # record frame. To ensure continuous streaming of data, S3 Select
17254
17311
  # might split the same record across multiple record frames instead of
17255
17312
  # aggregating the results in memory. Some S3 clients (for example, the
17256
- # SDKforJava) handle this behavior by creating a `ByteStream` out of
17313
+ # SDK for Java) handle this behavior by creating a `ByteStream` out of
17257
17314
  # the response by default. Other clients might not handle this
17258
17315
  # behavior by default. In those cases, you must aggregate the results
17259
17316
  # on the client side and parse the response.
@@ -18745,11 +18802,36 @@ module Aws::S3
18745
18802
  # [5]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/create-import-job
18746
18803
  # @return [Boolean]
18747
18804
  #
18805
+ # @!attribute [rw] blocked_encryption_types
18806
+ # A bucket-level setting for Amazon S3 general purpose buckets used to
18807
+ # prevent the upload of new objects encrypted with the specified
18808
+ # server-side encryption type. For example, blocking an encryption
18809
+ # type will block `PutObject`, `CopyObject`, `PostObject`, multipart
18810
+ # upload, and replication requests to the bucket for objects with the
18811
+ # specified encryption type. However, you can continue to read and
18812
+ # list any pre-existing objects already encrypted with the specified
18813
+ # encryption type. For more information, see [Blocking an encryption
18814
+ # type for a general purpose bucket][1].
18815
+ #
18816
+ # <note markdown="1"> Currently, this parameter only supports blocking or unblocking
18817
+ # Server Side Encryption with Customer Provided Keys (SSE-C). For more
18818
+ # information about SSE-C, see [Using server-side encryption with
18819
+ # customer-provided keys (SSE-C)][2].
18820
+ #
18821
+ # </note>
18822
+ #
18823
+ #
18824
+ #
18825
+ # [1]: https://docs.aws.amazon.com/AmazonS3/userguide/block-encryption-type.html
18826
+ # [2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/ServerSideEncryptionCustomerKeys.html
18827
+ # @return [Types::BlockedEncryptionTypes]
18828
+ #
18748
18829
  # @see http://docs.aws.amazon.com/goto/WebAPI/s3-2006-03-01/ServerSideEncryptionRule AWS API Documentation
18749
18830
  #
18750
18831
  class ServerSideEncryptionRule < Struct.new(
18751
18832
  :apply_server_side_encryption_by_default,
18752
- :bucket_key_enabled)
18833
+ :bucket_key_enabled,
18834
+ :blocked_encryption_types)
18753
18835
  SENSITIVE = []
18754
18836
  include Aws::Structure
18755
18837
  end
data/lib/aws-sdk-s3.rb CHANGED
@@ -75,7 +75,7 @@ module Aws::S3
75
75
  autoload :ObjectVersion, 'aws-sdk-s3/object_version'
76
76
  autoload :EventStreams, 'aws-sdk-s3/event_streams'
77
77
 
78
- GEM_VERSION = '1.203.1'
78
+ GEM_VERSION = '1.204.0'
79
79
 
80
80
  end
81
81
 
data/sig/client.rbs CHANGED
@@ -1470,7 +1470,10 @@ module Aws
1470
1470
  sse_algorithm: ("AES256" | "aws:fsx" | "aws:kms" | "aws:kms:dsse"),
1471
1471
  kms_master_key_id: ::String?
1472
1472
  }?,
1473
- bucket_key_enabled: bool?
1473
+ bucket_key_enabled: bool?,
1474
+ blocked_encryption_types: {
1475
+ encryption_type: Array[("NONE" | "SSE-C")]?
1476
+ }?
1474
1477
  },
1475
1478
  ]
1476
1479
  },
data/sig/types.rbs CHANGED
@@ -77,6 +77,11 @@ module Aws::S3
77
77
  SENSITIVE: []
78
78
  end
79
79
 
80
+ class BlockedEncryptionTypes
81
+ attr_accessor encryption_type: ::Array[("NONE" | "SSE-C")]
82
+ SENSITIVE: []
83
+ end
84
+
80
85
  class Bucket
81
86
  attr_accessor name: ::String
82
87
  attr_accessor creation_date: ::Time
@@ -2607,6 +2612,7 @@ module Aws::S3
2607
2612
  class ServerSideEncryptionRule
2608
2613
  attr_accessor apply_server_side_encryption_by_default: Types::ServerSideEncryptionByDefault
2609
2614
  attr_accessor bucket_key_enabled: bool
2615
+ attr_accessor blocked_encryption_types: Types::BlockedEncryptionTypes
2610
2616
  SENSITIVE: []
2611
2617
  end
2612
2618
 
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-s3
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.203.1
4
+ version: 1.204.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services