@aws-sdk/client-s3-control 3.699.0 → 3.704.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist-cjs/index.js CHANGED
@@ -557,6 +557,7 @@ var S3CannedAccessControlList = {
557
557
  var S3ChecksumAlgorithm = {
558
558
  CRC32: "CRC32",
559
559
  CRC32C: "CRC32C",
560
+ CRC64NVME: "CRC64NVME",
560
561
  SHA1: "SHA1",
561
562
  SHA256: "SHA256"
562
563
  };
@@ -169,6 +169,7 @@ export const S3CannedAccessControlList = {
169
169
  export const S3ChecksumAlgorithm = {
170
170
  CRC32: "CRC32",
171
171
  CRC32C: "CRC32C",
172
+ CRC64NVME: "CRC64NVME",
172
173
  SHA1: "SHA1",
173
174
  SHA256: "SHA256",
174
175
  };
@@ -130,7 +130,7 @@ declare const CreateJobCommand_base: {
130
130
  * ObjectLockMode: "COMPLIANCE" || "GOVERNANCE",
131
131
  * ObjectLockRetainUntilDate: new Date("TIMESTAMP"),
132
132
  * BucketKeyEnabled: true || false,
133
- * ChecksumAlgorithm: "CRC32" || "CRC32C" || "SHA1" || "SHA256",
133
+ * ChecksumAlgorithm: "CRC32" || "CRC32C" || "SHA1" || "SHA256" || "CRC64NVME",
134
134
  * },
135
135
  * S3PutObjectAcl: { // S3SetObjectAclOperation
136
136
  * AccessControlPolicy: { // S3AccessControlPolicy
@@ -144,7 +144,7 @@ declare const DescribeJobCommand_base: {
144
144
  * // ObjectLockMode: "COMPLIANCE" || "GOVERNANCE",
145
145
  * // ObjectLockRetainUntilDate: new Date("TIMESTAMP"),
146
146
  * // BucketKeyEnabled: true || false,
147
- * // ChecksumAlgorithm: "CRC32" || "CRC32C" || "SHA1" || "SHA256",
147
+ * // ChecksumAlgorithm: "CRC32" || "CRC32C" || "SHA1" || "SHA256" || "CRC64NVME",
148
148
  * // },
149
149
  * // S3PutObjectAcl: { // S3SetObjectAclOperation
150
150
  * // AccessControlPolicy: { // S3AccessControlPolicy
@@ -27,7 +27,7 @@ declare const ListCallerAccessGrantsCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Returns a list of the access grants that were given to the caller using S3 Access Grants and that allow the caller to access the S3 data of the Amazon Web Services account specified in the request.</p>
30
+ * <p>Use this API to list the access grants that grant the caller access to Amazon S3 data through S3 Access Grants. The caller (grantee) can be an Identity and Access Management (IAM) identity or Amazon Web Services Identity Center corporate directory identity. You must pass the Amazon Web Services account of the S3 data owner (grantor) in the request. You can, optionally, narrow the results by <code>GrantScope</code>, using a fragment of the data's S3 path, and S3 Access Grants will return only the grants with a path that contains the path fragment. You can also pass the <code>AllowedByApplication</code> filter in the request, which returns only the grants authorized for applications, whether the application is the caller's Identity Center application or any other application (<code>ALL</code>). For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-grants-list-grants.html">List the caller's access grants</a> in the <i>Amazon S3 User Guide</i>.</p>
31
31
  * <dl>
32
32
  * <dt>Permissions</dt>
33
33
  * <dd>
@@ -2139,6 +2139,7 @@ export interface S3SetObjectAclOperation {
2139
2139
  export declare const S3ChecksumAlgorithm: {
2140
2140
  readonly CRC32: "CRC32";
2141
2141
  readonly CRC32C: "CRC32C";
2142
+ readonly CRC64NVME: "CRC64NVME";
2142
2143
  readonly SHA1: "SHA1";
2143
2144
  readonly SHA256: "SHA256";
2144
2145
  };
@@ -2235,10 +2236,10 @@ export interface S3ObjectMetadata {
2235
2236
  */
2236
2237
  RequesterCharged?: boolean | undefined;
2237
2238
  /**
2238
- * <p></p>
2239
- * <note>
2240
- * <p>For directory buckets, only the server-side encryption with Amazon S3 managed keys (SSE-S3) (<code>AES256</code>) is supported.</p>
2241
- * </note>
2239
+ * <p>The server-side encryption algorithm used when storing objects in Amazon S3.</p>
2240
+ * <p>
2241
+ * <b>Directory buckets </b> - For directory buckets, there are only two supported options for server-side encryption: server-side encryption with Amazon S3 managed keys (SSE-S3) (<code>AES256</code>) and server-side encryption with KMS keys (SSE-KMS) (<code>KMS</code>). For more
2242
+ * information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-serv-side-encryption.html">Protecting data with server-side encryption</a> in the <i>Amazon S3 User Guide</i>. For <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-buckets-objects-Batch-Ops">the Copy operation in Batch Operations</a>, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_S3CopyObjectOperation.html">S3CopyObjectOperation</a>.</p>
2242
2243
  * @public
2243
2244
  */
2244
2245
  SSEAlgorithm?: S3SSEAlgorithm | undefined;
@@ -2394,9 +2395,17 @@ export interface S3CopyObjectOperation {
2394
2395
  */
2395
2396
  UnModifiedSinceConstraint?: Date | undefined;
2396
2397
  /**
2397
- * <p></p>
2398
+ * <p>Specifies the KMS key ID (Key ID, Key ARN, or Key Alias) to use for object encryption. If the KMS key doesn't exist in the same
2399
+ * account that's issuing the command, you must use the full Key ARN not the Key ID.</p>
2398
2400
  * <note>
2399
- * <p>This functionality is not supported by directory buckets.</p>
2401
+ * <p>
2402
+ * <b>Directory buckets</b> - If you specify <code>SSEAlgorithm</code> with <code>KMS</code>, you must specify the <code>
2403
+ * SSEAwsKmsKeyId</code> parameter with the ID (Key ID or Key ARN) of the KMS
2404
+ * symmetric encryption customer managed key to use. Otherwise, you get an HTTP <code>400 Bad Request</code> error. The key alias format of the KMS key isn't supported. To encrypt new object copies in a directory bucket with SSE-KMS, you must specify SSE-KMS as the directory bucket's default encryption configuration with a KMS key (specifically, a <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#customer-cmk">customer managed key</a>).
2405
+ * The <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-managed-cmk">Amazon Web Services managed key</a> (<code>aws/s3</code>) isn't supported. Your SSE-KMS configuration can only support 1 <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#customer-cmk">customer managed key</a> per directory bucket for the lifetime of the bucket.
2406
+ * After you specify a customer managed key for SSE-KMS as the bucket default encryption, you can't override the customer managed key for the bucket's SSE-KMS configuration.
2407
+ * Then, when you specify server-side encryption settings for new object copies with SSE-KMS, you must make sure the encryption key is the same customer managed key that you specified for the directory bucket's default encryption configuration.
2408
+ * </p>
2400
2409
  * </note>
2401
2410
  * @public
2402
2411
  */
@@ -2445,10 +2454,12 @@ export interface S3CopyObjectOperation {
2445
2454
  * <p>Specifies whether Amazon S3 should use an S3 Bucket Key for object encryption with
2446
2455
  * server-side encryption using Amazon Web Services KMS (SSE-KMS). Setting this header to <code>true</code>
2447
2456
  * causes Amazon S3 to use an S3 Bucket Key for object encryption with SSE-KMS.</p>
2448
- * <p>Specifying this header with an <i>object</i> action doesn’t affect
2457
+ * <p>Specifying this header with an <i>Copy</i> action doesn’t affect
2449
2458
  * <i>bucket-level</i> settings for S3 Bucket Key.</p>
2450
2459
  * <note>
2451
- * <p>This functionality is not supported by directory buckets.</p>
2460
+ * <p>
2461
+ * <b>Directory buckets</b> - S3 Bucket Keys aren't supported, when you copy SSE-KMS encrypted objects from general purpose buckets
2462
+ * to directory buckets, from directory buckets to general purpose buckets, or between directory buckets, through <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-buckets-objects-Batch-Ops">the Copy operation in Batch Operations</a>. In this case, Amazon S3 makes a call to KMS every time a copy request is made for a KMS-encrypted object.</p>
2452
2463
  * </note>
2453
2464
  * @public
2454
2465
  */
@@ -2757,7 +2768,7 @@ export interface CreateJobRequest {
2757
2768
  ConfirmationRequired?: boolean | undefined;
2758
2769
  /**
2759
2770
  * <p>The action that you want this job to perform on every object listed in the manifest. For
2760
- * more information about the available actions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/batch-ops-actions.html">Operations</a> in the
2771
+ * more information about the available actions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/batch-ops-operations.html">Operations</a> in the
2761
2772
  * <i>Amazon S3 User Guide</i>.</p>
2762
2773
  * @public
2763
2774
  */
@@ -573,6 +573,7 @@ export interface S3SetObjectAclOperation {
573
573
  export declare const S3ChecksumAlgorithm: {
574
574
  readonly CRC32: "CRC32";
575
575
  readonly CRC32C: "CRC32C";
576
+ readonly CRC64NVME: "CRC64NVME";
576
577
  readonly SHA1: "SHA1";
577
578
  readonly SHA256: "SHA256";
578
579
  };
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-s3-control",
3
3
  "description": "AWS SDK for JavaScript S3 Control Client for Node.js, Browser and React Native",
4
- "version": "3.699.0",
4
+ "version": "3.704.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "node ../../scripts/compilation/inline client-s3-control",