aws-sdk-s3control 1.97.0 → 1.99.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-s3control/client.rb +21 -7
- data/lib/aws-sdk-s3control/types.rb +54 -7
- data/lib/aws-sdk-s3control.rb +1 -1
- data/sig/client.rbs +1 -1
- data/sig/types.rbs +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: a2177ac0aad4f1bc0af9afb89a5b6a3311c8754d44c96aefb37129eff15d310b
|
4
|
+
data.tar.gz: 2bb2314fc3f666343c24517fb7e6d53c78a7ac1840156a3c16c85e2c16a0f082
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: d9403af2698f4b597c1fcc3c77b2bcb008b1577381c5715d21df7d845715f9dc6f140d791c086847c0e867f1fb4d00fbfe26f2fcab063f74edb5d1a1b9cecd6d
|
7
|
+
data.tar.gz: 5b23efb92902012a35ddae456e39bbe91f691e692d5e8be4d07da7c44c7bad959113cb404f78b784fbe9a6a30c2bacf7b04653913d25ee0b525df03fecf69984
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.99.0 (2024-12-03)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - It allows customers to pass CRC64NVME as a header in S3 Batch Operations copy requests
|
8
|
+
|
9
|
+
1.98.0 (2024-12-02)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Amazon S3 introduces support for AWS Dedicated Local Zones
|
13
|
+
|
4
14
|
1.97.0 (2024-11-18)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.99.0
|
@@ -1235,7 +1235,7 @@ module Aws::S3Control
|
|
1235
1235
|
#
|
1236
1236
|
#
|
1237
1237
|
#
|
1238
|
-
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/batch-ops-
|
1238
|
+
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/batch-ops-operations.html
|
1239
1239
|
#
|
1240
1240
|
# @option params [required, Types::JobReport] :report
|
1241
1241
|
# Configuration parameters for the optional job-completion report.
|
@@ -1336,7 +1336,7 @@ module Aws::S3Control
|
|
1336
1336
|
# object_lock_mode: "COMPLIANCE", # accepts COMPLIANCE, GOVERNANCE
|
1337
1337
|
# object_lock_retain_until_date: Time.now,
|
1338
1338
|
# bucket_key_enabled: false,
|
1339
|
-
# checksum_algorithm: "CRC32", # accepts CRC32, CRC32C, SHA1, SHA256
|
1339
|
+
# checksum_algorithm: "CRC32", # accepts CRC32, CRC32C, SHA1, SHA256, CRC64NVME
|
1340
1340
|
# },
|
1341
1341
|
# s3_put_object_acl: {
|
1342
1342
|
# access_control_policy: {
|
@@ -2847,7 +2847,7 @@ module Aws::S3Control
|
|
2847
2847
|
# resp.job.operation.s3_put_object_copy.object_lock_mode #=> String, one of "COMPLIANCE", "GOVERNANCE"
|
2848
2848
|
# resp.job.operation.s3_put_object_copy.object_lock_retain_until_date #=> Time
|
2849
2849
|
# resp.job.operation.s3_put_object_copy.bucket_key_enabled #=> Boolean
|
2850
|
-
# resp.job.operation.s3_put_object_copy.checksum_algorithm #=> String, one of "CRC32", "CRC32C", "SHA1", "SHA256"
|
2850
|
+
# resp.job.operation.s3_put_object_copy.checksum_algorithm #=> String, one of "CRC32", "CRC32C", "SHA1", "SHA256", "CRC64NVME"
|
2851
2851
|
# resp.job.operation.s3_put_object_acl.access_control_policy.access_control_list.owner.id #=> String
|
2852
2852
|
# resp.job.operation.s3_put_object_acl.access_control_policy.access_control_list.owner.display_name #=> String
|
2853
2853
|
# resp.job.operation.s3_put_object_acl.access_control_policy.access_control_list.grants #=> Array
|
@@ -5393,15 +5393,29 @@ module Aws::S3Control
|
|
5393
5393
|
req.send_request(options)
|
5394
5394
|
end
|
5395
5395
|
|
5396
|
-
#
|
5397
|
-
#
|
5398
|
-
#
|
5396
|
+
# Use this API to list the access grants that grant the caller access to
|
5397
|
+
# Amazon S3 data through S3 Access Grants. The caller (grantee) can be
|
5398
|
+
# an Identity and Access Management (IAM) identity or Amazon Web
|
5399
|
+
# Services Identity Center corporate directory identity. You must pass
|
5400
|
+
# the Amazon Web Services account of the S3 data owner (grantor) in the
|
5401
|
+
# request. You can, optionally, narrow the results by `GrantScope`,
|
5402
|
+
# using a fragment of the data's S3 path, and S3 Access Grants will
|
5403
|
+
# return only the grants with a path that contains the path fragment.
|
5404
|
+
# You can also pass the `AllowedByApplication` filter in the request,
|
5405
|
+
# which returns only the grants authorized for applications, whether the
|
5406
|
+
# application is the caller's Identity Center application or any other
|
5407
|
+
# application (`ALL`). For more information, see [List the caller's
|
5408
|
+
# access grants][1] in the *Amazon S3 User Guide*.
|
5399
5409
|
#
|
5400
5410
|
# Permissions
|
5401
5411
|
#
|
5402
5412
|
# : You must have the `s3:ListCallerAccessGrants` permission to use this
|
5403
5413
|
# operation.
|
5404
5414
|
#
|
5415
|
+
#
|
5416
|
+
#
|
5417
|
+
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-grants-list-grants.html
|
5418
|
+
#
|
5405
5419
|
# @option params [String] :account_id
|
5406
5420
|
# The Amazon Web Services account ID of the S3 Access Grants instance.
|
5407
5421
|
#
|
@@ -7720,7 +7734,7 @@ module Aws::S3Control
|
|
7720
7734
|
tracer: tracer
|
7721
7735
|
)
|
7722
7736
|
context[:gem_name] = 'aws-sdk-s3control'
|
7723
|
-
context[:gem_version] = '1.
|
7737
|
+
context[:gem_version] = '1.99.0'
|
7724
7738
|
Seahorse::Client::Request.new(handlers, context)
|
7725
7739
|
end
|
7726
7740
|
|
@@ -1175,7 +1175,7 @@ module Aws::S3Control
|
|
1175
1175
|
#
|
1176
1176
|
#
|
1177
1177
|
#
|
1178
|
-
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/batch-ops-
|
1178
|
+
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/batch-ops-operations.html
|
1179
1179
|
# @return [Types::JobOperation]
|
1180
1180
|
#
|
1181
1181
|
# @!attribute [rw] report
|
@@ -7013,9 +7013,35 @@ module Aws::S3Control
|
|
7013
7013
|
# @return [Time]
|
7014
7014
|
#
|
7015
7015
|
# @!attribute [rw] sse_aws_kms_key_id
|
7016
|
-
#
|
7016
|
+
# Specifies the KMS key ID (Key ID, Key ARN, or Key Alias) to use for
|
7017
|
+
# object encryption. If the KMS key doesn't exist in the same account
|
7018
|
+
# that's issuing the command, you must use the full Key ARN not the
|
7019
|
+
# Key ID.
|
7020
|
+
#
|
7021
|
+
# <note markdown="1"> **Directory buckets** - If you specify `SSEAlgorithm` with `KMS`,
|
7022
|
+
# you must specify the ` SSEAwsKmsKeyId` parameter with the ID (Key ID
|
7023
|
+
# or Key ARN) of the KMS symmetric encryption customer managed key to
|
7024
|
+
# use. Otherwise, you get an HTTP `400 Bad Request` error. The key
|
7025
|
+
# alias format of the KMS key isn't supported. To encrypt new object
|
7026
|
+
# copies in a directory bucket with SSE-KMS, you must specify SSE-KMS
|
7027
|
+
# as the directory bucket's default encryption configuration with a
|
7028
|
+
# KMS key (specifically, a [customer managed key][1]). The [Amazon Web
|
7029
|
+
# Services managed key][2] (`aws/s3`) isn't supported. Your SSE-KMS
|
7030
|
+
# configuration can only support 1 [customer managed key][1] per
|
7031
|
+
# directory bucket for the lifetime of the bucket. After you specify a
|
7032
|
+
# customer managed key for SSE-KMS as the bucket default encryption,
|
7033
|
+
# you can't override the customer managed key for the bucket's
|
7034
|
+
# SSE-KMS configuration. Then, when you specify server-side encryption
|
7035
|
+
# settings for new object copies with SSE-KMS, you must make sure the
|
7036
|
+
# encryption key is the same customer managed key that you specified
|
7037
|
+
# for the directory bucket's default encryption configuration.
|
7017
7038
|
#
|
7018
7039
|
# </note>
|
7040
|
+
#
|
7041
|
+
#
|
7042
|
+
#
|
7043
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#customer-cmk
|
7044
|
+
# [2]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-managed-cmk
|
7019
7045
|
# @return [String]
|
7020
7046
|
#
|
7021
7047
|
# @!attribute [rw] target_key_prefix
|
@@ -7058,12 +7084,21 @@ module Aws::S3Control
|
|
7058
7084
|
# (SSE-KMS). Setting this header to `true` causes Amazon S3 to use an
|
7059
7085
|
# S3 Bucket Key for object encryption with SSE-KMS.
|
7060
7086
|
#
|
7061
|
-
# Specifying this header with an *
|
7087
|
+
# Specifying this header with an *Copy* action doesn’t affect
|
7062
7088
|
# *bucket-level* settings for S3 Bucket Key.
|
7063
7089
|
#
|
7064
|
-
# <note markdown="1">
|
7090
|
+
# <note markdown="1"> **Directory buckets** - S3 Bucket Keys aren't supported, when you
|
7091
|
+
# copy SSE-KMS encrypted objects from general purpose buckets to
|
7092
|
+
# directory buckets, from directory buckets to general purpose
|
7093
|
+
# buckets, or between directory buckets, through [the Copy operation
|
7094
|
+
# in Batch Operations][1]. In this case, Amazon S3 makes a call to KMS
|
7095
|
+
# every time a copy request is made for a KMS-encrypted object.
|
7065
7096
|
#
|
7066
7097
|
# </note>
|
7098
|
+
#
|
7099
|
+
#
|
7100
|
+
#
|
7101
|
+
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-buckets-objects-Batch-Ops
|
7067
7102
|
# @return [Boolean]
|
7068
7103
|
#
|
7069
7104
|
# @!attribute [rw] checksum_algorithm
|
@@ -7360,10 +7395,22 @@ module Aws::S3Control
|
|
7360
7395
|
# @return [Boolean]
|
7361
7396
|
#
|
7362
7397
|
# @!attribute [rw] sse_algorithm
|
7363
|
-
#
|
7364
|
-
#
|
7398
|
+
# The server-side encryption algorithm used when storing objects in
|
7399
|
+
# Amazon S3.
|
7365
7400
|
#
|
7366
|
-
#
|
7401
|
+
# <b>Directory buckets </b> - For directory buckets, there are only
|
7402
|
+
# two supported options for server-side encryption: server-side
|
7403
|
+
# encryption with Amazon S3 managed keys (SSE-S3) (`AES256`) and
|
7404
|
+
# server-side encryption with KMS keys (SSE-KMS) (`KMS`). For more
|
7405
|
+
# information, see [Protecting data with server-side encryption][1] in
|
7406
|
+
# the *Amazon S3 User Guide*. For [the Copy operation in Batch
|
7407
|
+
# Operations][2], see [S3CopyObjectOperation][3].
|
7408
|
+
#
|
7409
|
+
#
|
7410
|
+
#
|
7411
|
+
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-serv-side-encryption.html
|
7412
|
+
# [2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-buckets-objects-Batch-Ops
|
7413
|
+
# [3]: https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_S3CopyObjectOperation.html
|
7367
7414
|
# @return [String]
|
7368
7415
|
#
|
7369
7416
|
# @see http://docs.aws.amazon.com/goto/WebAPI/s3control-2018-08-20/S3ObjectMetadata AWS API Documentation
|
data/lib/aws-sdk-s3control.rb
CHANGED
data/sig/client.rbs
CHANGED
@@ -293,7 +293,7 @@ module Aws
|
|
293
293
|
object_lock_mode: ("COMPLIANCE" | "GOVERNANCE")?,
|
294
294
|
object_lock_retain_until_date: ::Time?,
|
295
295
|
bucket_key_enabled: bool?,
|
296
|
-
checksum_algorithm: ("CRC32" | "CRC32C" | "SHA1" | "SHA256")?
|
296
|
+
checksum_algorithm: ("CRC32" | "CRC32C" | "SHA1" | "SHA256" | "CRC64NVME")?
|
297
297
|
}?,
|
298
298
|
s3_put_object_acl: {
|
299
299
|
access_control_policy: {
|
data/sig/types.rbs
CHANGED
@@ -1646,7 +1646,7 @@ module Aws::S3Control
|
|
1646
1646
|
attr_accessor object_lock_mode: ("COMPLIANCE" | "GOVERNANCE")
|
1647
1647
|
attr_accessor object_lock_retain_until_date: ::Time
|
1648
1648
|
attr_accessor bucket_key_enabled: bool
|
1649
|
-
attr_accessor checksum_algorithm: ("CRC32" | "CRC32C" | "SHA1" | "SHA256")
|
1649
|
+
attr_accessor checksum_algorithm: ("CRC32" | "CRC32C" | "SHA1" | "SHA256" | "CRC64NVME")
|
1650
1650
|
SENSITIVE: []
|
1651
1651
|
end
|
1652
1652
|
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-s3control
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.99.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-
|
11
|
+
date: 2024-12-03 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|