aws-sdk-s3control 1.97.0 → 1.99.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 30ffdf89bc69e79f0d7fddaca467179bb9b41a866926c48a865e4c3eb41c7560
4
- data.tar.gz: 1da95e12ac5c767c2c35594a29e8bee214119ff9c2cdb891e751e4d63429a4c5
3
+ metadata.gz: a2177ac0aad4f1bc0af9afb89a5b6a3311c8754d44c96aefb37129eff15d310b
4
+ data.tar.gz: 2bb2314fc3f666343c24517fb7e6d53c78a7ac1840156a3c16c85e2c16a0f082
5
5
  SHA512:
6
- metadata.gz: 8fa6e239ea7d19dc49ef04fa9043e811833bbb4c429c51f9f7620a576987c3707f01ca6bb7d6fb3797380cea78cb5261b657272d0b25785d0fb64d4ced831a39
7
- data.tar.gz: b963e8468cfef67f547253ba099dcc633ebfe37d39155e1cecf4a0f92208dd394051a2bb49edbf4ab9432e7287d4aaaa7883ac14632c4a8c20ed41244afebd14
6
+ metadata.gz: d9403af2698f4b597c1fcc3c77b2bcb008b1577381c5715d21df7d845715f9dc6f140d791c086847c0e867f1fb4d00fbfe26f2fcab063f74edb5d1a1b9cecd6d
7
+ data.tar.gz: 5b23efb92902012a35ddae456e39bbe91f691e692d5e8be4d07da7c44c7bad959113cb404f78b784fbe9a6a30c2bacf7b04653913d25ee0b525df03fecf69984
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.99.0 (2024-12-03)
5
+ ------------------
6
+
7
+ * Feature - It allows customers to pass CRC64NVME as a header in S3 Batch Operations copy requests
8
+
9
+ 1.98.0 (2024-12-02)
10
+ ------------------
11
+
12
+ * Feature - Amazon S3 introduces support for AWS Dedicated Local Zones
13
+
4
14
  1.97.0 (2024-11-18)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.97.0
1
+ 1.99.0
@@ -1235,7 +1235,7 @@ module Aws::S3Control
1235
1235
  #
1236
1236
  #
1237
1237
  #
1238
- # [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/batch-ops-actions.html
1238
+ # [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/batch-ops-operations.html
1239
1239
  #
1240
1240
  # @option params [required, Types::JobReport] :report
1241
1241
  # Configuration parameters for the optional job-completion report.
@@ -1336,7 +1336,7 @@ module Aws::S3Control
1336
1336
  # object_lock_mode: "COMPLIANCE", # accepts COMPLIANCE, GOVERNANCE
1337
1337
  # object_lock_retain_until_date: Time.now,
1338
1338
  # bucket_key_enabled: false,
1339
- # checksum_algorithm: "CRC32", # accepts CRC32, CRC32C, SHA1, SHA256
1339
+ # checksum_algorithm: "CRC32", # accepts CRC32, CRC32C, SHA1, SHA256, CRC64NVME
1340
1340
  # },
1341
1341
  # s3_put_object_acl: {
1342
1342
  # access_control_policy: {
@@ -2847,7 +2847,7 @@ module Aws::S3Control
2847
2847
  # resp.job.operation.s3_put_object_copy.object_lock_mode #=> String, one of "COMPLIANCE", "GOVERNANCE"
2848
2848
  # resp.job.operation.s3_put_object_copy.object_lock_retain_until_date #=> Time
2849
2849
  # resp.job.operation.s3_put_object_copy.bucket_key_enabled #=> Boolean
2850
- # resp.job.operation.s3_put_object_copy.checksum_algorithm #=> String, one of "CRC32", "CRC32C", "SHA1", "SHA256"
2850
+ # resp.job.operation.s3_put_object_copy.checksum_algorithm #=> String, one of "CRC32", "CRC32C", "SHA1", "SHA256", "CRC64NVME"
2851
2851
  # resp.job.operation.s3_put_object_acl.access_control_policy.access_control_list.owner.id #=> String
2852
2852
  # resp.job.operation.s3_put_object_acl.access_control_policy.access_control_list.owner.display_name #=> String
2853
2853
  # resp.job.operation.s3_put_object_acl.access_control_policy.access_control_list.grants #=> Array
@@ -5393,15 +5393,29 @@ module Aws::S3Control
5393
5393
  req.send_request(options)
5394
5394
  end
5395
5395
 
5396
- # Returns a list of the access grants that were given to the caller
5397
- # using S3 Access Grants and that allow the caller to access the S3 data
5398
- # of the Amazon Web Services account specified in the request.
5396
+ # Use this API to list the access grants that grant the caller access to
5397
+ # Amazon S3 data through S3 Access Grants. The caller (grantee) can be
5398
+ # an Identity and Access Management (IAM) identity or Amazon Web
5399
+ # Services Identity Center corporate directory identity. You must pass
5400
+ # the Amazon Web Services account of the S3 data owner (grantor) in the
5401
+ # request. You can, optionally, narrow the results by `GrantScope`,
5402
+ # using a fragment of the data's S3 path, and S3 Access Grants will
5403
+ # return only the grants with a path that contains the path fragment.
5404
+ # You can also pass the `AllowedByApplication` filter in the request,
5405
+ # which returns only the grants authorized for applications, whether the
5406
+ # application is the caller's Identity Center application or any other
5407
+ # application (`ALL`). For more information, see [List the caller's
5408
+ # access grants][1] in the *Amazon S3 User Guide*.
5399
5409
  #
5400
5410
  # Permissions
5401
5411
  #
5402
5412
  # : You must have the `s3:ListCallerAccessGrants` permission to use this
5403
5413
  # operation.
5404
5414
  #
5415
+ #
5416
+ #
5417
+ # [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-grants-list-grants.html
5418
+ #
5405
5419
  # @option params [String] :account_id
5406
5420
  # The Amazon Web Services account ID of the S3 Access Grants instance.
5407
5421
  #
@@ -7720,7 +7734,7 @@ module Aws::S3Control
7720
7734
  tracer: tracer
7721
7735
  )
7722
7736
  context[:gem_name] = 'aws-sdk-s3control'
7723
- context[:gem_version] = '1.97.0'
7737
+ context[:gem_version] = '1.99.0'
7724
7738
  Seahorse::Client::Request.new(handlers, context)
7725
7739
  end
7726
7740
 
@@ -1175,7 +1175,7 @@ module Aws::S3Control
1175
1175
  #
1176
1176
  #
1177
1177
  #
1178
- # [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/batch-ops-actions.html
1178
+ # [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/batch-ops-operations.html
1179
1179
  # @return [Types::JobOperation]
1180
1180
  #
1181
1181
  # @!attribute [rw] report
@@ -7013,9 +7013,35 @@ module Aws::S3Control
7013
7013
  # @return [Time]
7014
7014
  #
7015
7015
  # @!attribute [rw] sse_aws_kms_key_id
7016
- # <note markdown="1"> This functionality is not supported by directory buckets.
7016
+ # Specifies the KMS key ID (Key ID, Key ARN, or Key Alias) to use for
7017
+ # object encryption. If the KMS key doesn't exist in the same account
7018
+ # that's issuing the command, you must use the full Key ARN not the
7019
+ # Key ID.
7020
+ #
7021
+ # <note markdown="1"> **Directory buckets** - If you specify `SSEAlgorithm` with `KMS`,
7022
+ # you must specify the ` SSEAwsKmsKeyId` parameter with the ID (Key ID
7023
+ # or Key ARN) of the KMS symmetric encryption customer managed key to
7024
+ # use. Otherwise, you get an HTTP `400 Bad Request` error. The key
7025
+ # alias format of the KMS key isn't supported. To encrypt new object
7026
+ # copies in a directory bucket with SSE-KMS, you must specify SSE-KMS
7027
+ # as the directory bucket's default encryption configuration with a
7028
+ # KMS key (specifically, a [customer managed key][1]). The [Amazon Web
7029
+ # Services managed key][2] (`aws/s3`) isn't supported. Your SSE-KMS
7030
+ # configuration can only support 1 [customer managed key][1] per
7031
+ # directory bucket for the lifetime of the bucket. After you specify a
7032
+ # customer managed key for SSE-KMS as the bucket default encryption,
7033
+ # you can't override the customer managed key for the bucket's
7034
+ # SSE-KMS configuration. Then, when you specify server-side encryption
7035
+ # settings for new object copies with SSE-KMS, you must make sure the
7036
+ # encryption key is the same customer managed key that you specified
7037
+ # for the directory bucket's default encryption configuration.
7017
7038
  #
7018
7039
  # </note>
7040
+ #
7041
+ #
7042
+ #
7043
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#customer-cmk
7044
+ # [2]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-managed-cmk
7019
7045
  # @return [String]
7020
7046
  #
7021
7047
  # @!attribute [rw] target_key_prefix
@@ -7058,12 +7084,21 @@ module Aws::S3Control
7058
7084
  # (SSE-KMS). Setting this header to `true` causes Amazon S3 to use an
7059
7085
  # S3 Bucket Key for object encryption with SSE-KMS.
7060
7086
  #
7061
- # Specifying this header with an *object* action doesn’t affect
7087
+ # Specifying this header with an *Copy* action doesn’t affect
7062
7088
  # *bucket-level* settings for S3 Bucket Key.
7063
7089
  #
7064
- # <note markdown="1"> This functionality is not supported by directory buckets.
7090
+ # <note markdown="1"> **Directory buckets** - S3 Bucket Keys aren't supported, when you
7091
+ # copy SSE-KMS encrypted objects from general purpose buckets to
7092
+ # directory buckets, from directory buckets to general purpose
7093
+ # buckets, or between directory buckets, through [the Copy operation
7094
+ # in Batch Operations][1]. In this case, Amazon S3 makes a call to KMS
7095
+ # every time a copy request is made for a KMS-encrypted object.
7065
7096
  #
7066
7097
  # </note>
7098
+ #
7099
+ #
7100
+ #
7101
+ # [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-buckets-objects-Batch-Ops
7067
7102
  # @return [Boolean]
7068
7103
  #
7069
7104
  # @!attribute [rw] checksum_algorithm
@@ -7360,10 +7395,22 @@ module Aws::S3Control
7360
7395
  # @return [Boolean]
7361
7396
  #
7362
7397
  # @!attribute [rw] sse_algorithm
7363
- # <note markdown="1"> For directory buckets, only the server-side encryption with Amazon
7364
- # S3 managed keys (SSE-S3) (`AES256`) is supported.
7398
+ # The server-side encryption algorithm used when storing objects in
7399
+ # Amazon S3.
7365
7400
  #
7366
- # </note>
7401
+ # <b>Directory buckets </b> - For directory buckets, there are only
7402
+ # two supported options for server-side encryption: server-side
7403
+ # encryption with Amazon S3 managed keys (SSE-S3) (`AES256`) and
7404
+ # server-side encryption with KMS keys (SSE-KMS) (`KMS`). For more
7405
+ # information, see [Protecting data with server-side encryption][1] in
7406
+ # the *Amazon S3 User Guide*. For [the Copy operation in Batch
7407
+ # Operations][2], see [S3CopyObjectOperation][3].
7408
+ #
7409
+ #
7410
+ #
7411
+ # [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-serv-side-encryption.html
7412
+ # [2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-buckets-objects-Batch-Ops
7413
+ # [3]: https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_S3CopyObjectOperation.html
7367
7414
  # @return [String]
7368
7415
  #
7369
7416
  # @see http://docs.aws.amazon.com/goto/WebAPI/s3control-2018-08-20/S3ObjectMetadata AWS API Documentation
@@ -54,7 +54,7 @@ module Aws::S3Control
54
54
  autoload :EndpointProvider, 'aws-sdk-s3control/endpoint_provider'
55
55
  autoload :Endpoints, 'aws-sdk-s3control/endpoints'
56
56
 
57
- GEM_VERSION = '1.97.0'
57
+ GEM_VERSION = '1.99.0'
58
58
 
59
59
  end
60
60
 
data/sig/client.rbs CHANGED
@@ -293,7 +293,7 @@ module Aws
293
293
  object_lock_mode: ("COMPLIANCE" | "GOVERNANCE")?,
294
294
  object_lock_retain_until_date: ::Time?,
295
295
  bucket_key_enabled: bool?,
296
- checksum_algorithm: ("CRC32" | "CRC32C" | "SHA1" | "SHA256")?
296
+ checksum_algorithm: ("CRC32" | "CRC32C" | "SHA1" | "SHA256" | "CRC64NVME")?
297
297
  }?,
298
298
  s3_put_object_acl: {
299
299
  access_control_policy: {
data/sig/types.rbs CHANGED
@@ -1646,7 +1646,7 @@ module Aws::S3Control
1646
1646
  attr_accessor object_lock_mode: ("COMPLIANCE" | "GOVERNANCE")
1647
1647
  attr_accessor object_lock_retain_until_date: ::Time
1648
1648
  attr_accessor bucket_key_enabled: bool
1649
- attr_accessor checksum_algorithm: ("CRC32" | "CRC32C" | "SHA1" | "SHA256")
1649
+ attr_accessor checksum_algorithm: ("CRC32" | "CRC32C" | "SHA1" | "SHA256" | "CRC64NVME")
1650
1650
  SENSITIVE: []
1651
1651
  end
1652
1652
 
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-s3control
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.97.0
4
+ version: 1.99.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-11-18 00:00:00.000000000 Z
11
+ date: 2024-12-03 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core