aboutsummaryrefslogtreecommitdiffstats
path: root/contrib/libs/aws-sdk-cpp/aws-cpp-sdk-s3/include/aws/s3/model/ServerSideEncryptionByDefault.h
diff options
context:
space:
mode:
authordakovalkov <dakovalkov@yandex-team.com>2023-12-03 13:33:55 +0300
committerdakovalkov <dakovalkov@yandex-team.com>2023-12-03 14:04:39 +0300
commit2a718325637e5302334b6d0a6430f63168f8dbb3 (patch)
tree64be81080b7df9ec1d86d053a0c394ae53fcf1fe /contrib/libs/aws-sdk-cpp/aws-cpp-sdk-s3/include/aws/s3/model/ServerSideEncryptionByDefault.h
parente0d94a470142d95c3007e9c5d80380994940664a (diff)
downloadydb-2a718325637e5302334b6d0a6430f63168f8dbb3.tar.gz
Update contrib/libs/aws-sdk-cpp to 1.11.37
Diffstat (limited to 'contrib/libs/aws-sdk-cpp/aws-cpp-sdk-s3/include/aws/s3/model/ServerSideEncryptionByDefault.h')
-rw-r--r--contrib/libs/aws-sdk-cpp/aws-cpp-sdk-s3/include/aws/s3/model/ServerSideEncryptionByDefault.h192
1 files changed, 102 insertions, 90 deletions
diff --git a/contrib/libs/aws-sdk-cpp/aws-cpp-sdk-s3/include/aws/s3/model/ServerSideEncryptionByDefault.h b/contrib/libs/aws-sdk-cpp/aws-cpp-sdk-s3/include/aws/s3/model/ServerSideEncryptionByDefault.h
index 273cb34fbe..69fc7b2dd7 100644
--- a/contrib/libs/aws-sdk-cpp/aws-cpp-sdk-s3/include/aws/s3/model/ServerSideEncryptionByDefault.h
+++ b/contrib/libs/aws-sdk-cpp/aws-cpp-sdk-s3/include/aws/s3/model/ServerSideEncryptionByDefault.h
@@ -26,21 +26,25 @@ namespace Model
/**
* <p>Describes the default server-side encryption to apply to new objects in the
* bucket. If a PUT Object request doesn't specify any server-side encryption, this
- * default encryption will be applied. For more information, see <a
+ * default encryption will be applied. If you don't specify a customer managed key
+ * at configuration, Amazon S3 automatically creates an Amazon Web Services KMS key
+ * in your Amazon Web Services account the first time that you add an object
+ * encrypted with SSE-KMS to a bucket. By default, Amazon S3 uses this KMS key for
+ * SSE-KMS. For more information, see <a
* href="https://docs.aws.amazon.com/AmazonS3/latest/API/RESTBucketPUTencryption.html">PUT
- * Bucket encryption</a> in the <i>Amazon Simple Storage Service API
- * Reference</i>.</p><p><h3>See Also:</h3> <a
+ * Bucket encryption</a> in the <i>Amazon S3 API Reference</i>.</p><p><h3>See
+ * Also:</h3> <a
* href="http://docs.aws.amazon.com/goto/WebAPI/s3-2006-03-01/ServerSideEncryptionByDefault">AWS
* API Reference</a></p>
*/
- class AWS_S3_API ServerSideEncryptionByDefault
+ class ServerSideEncryptionByDefault
{
public:
- ServerSideEncryptionByDefault();
- ServerSideEncryptionByDefault(const Aws::Utils::Xml::XmlNode& xmlNode);
- ServerSideEncryptionByDefault& operator=(const Aws::Utils::Xml::XmlNode& xmlNode);
+ AWS_S3_API ServerSideEncryptionByDefault();
+ AWS_S3_API ServerSideEncryptionByDefault(const Aws::Utils::Xml::XmlNode& xmlNode);
+ AWS_S3_API ServerSideEncryptionByDefault& operator=(const Aws::Utils::Xml::XmlNode& xmlNode);
- void AddToNode(Aws::Utils::Xml::XmlNode& parentNode) const;
+ AWS_S3_API void AddToNode(Aws::Utils::Xml::XmlNode& parentNode) const;
/**
@@ -75,172 +79,180 @@ namespace Model
/**
- * <p>AWS Key Management Service (KMS) customer master key ID to use for the
- * default encryption. This parameter is allowed if and only if
- * <code>SSEAlgorithm</code> is set to <code>aws:kms</code>.</p> <p>You can specify
- * the key ID or the Amazon Resource Name (ARN) of the CMK. However, if you are
- * using encryption with cross-account operations, you must use a fully qualified
- * CMK ARN. For more information, see <a
+ * <p>Amazon Web Services Key Management Service (KMS) customer Amazon Web Services
+ * KMS key ID to use for the default encryption. This parameter is allowed if and
+ * only if <code>SSEAlgorithm</code> is set to <code>aws:kms</code>.</p> <p>You can
+ * specify the key ID or the Amazon Resource Name (ARN) of the KMS key. However, if
+ * you are using encryption with cross-account or Amazon Web Services service
+ * operations you must use a fully qualified KMS key ARN. For more information, see
+ * <a
* href="https://docs.aws.amazon.com/AmazonS3/latest/dev/bucket-encryption.html#bucket-encryption-update-bucket-policy">Using
* encryption for cross-account operations</a>. </p> <p> <b>For example:</b> </p>
* <ul> <li> <p>Key ID: <code>1234abcd-12ab-34cd-56ef-1234567890ab</code> </p>
* </li> <li> <p>Key ARN:
* <code>arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>
- * </p> </li> </ul> <p>Amazon S3 only supports symmetric CMKs and not
- * asymmetric CMKs. For more information, see <a
+ * </p> </li> </ul> <p>Amazon S3 only supports symmetric KMS keys and
+ * not asymmetric KMS keys. For more information, see <a
* href="https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html">Using
- * Symmetric and Asymmetric Keys</a> in the <i>AWS Key Management Service Developer
- * Guide</i>.</p>
+ * symmetric and asymmetric keys</a> in the <i>Amazon Web Services Key Management
+ * Service Developer Guide</i>.</p>
*/
inline const Aws::String& GetKMSMasterKeyID() const{ return m_kMSMasterKeyID; }
/**
- * <p>AWS Key Management Service (KMS) customer master key ID to use for the
- * default encryption. This parameter is allowed if and only if
- * <code>SSEAlgorithm</code> is set to <code>aws:kms</code>.</p> <p>You can specify
- * the key ID or the Amazon Resource Name (ARN) of the CMK. However, if you are
- * using encryption with cross-account operations, you must use a fully qualified
- * CMK ARN. For more information, see <a
+ * <p>Amazon Web Services Key Management Service (KMS) customer Amazon Web Services
+ * KMS key ID to use for the default encryption. This parameter is allowed if and
+ * only if <code>SSEAlgorithm</code> is set to <code>aws:kms</code>.</p> <p>You can
+ * specify the key ID or the Amazon Resource Name (ARN) of the KMS key. However, if
+ * you are using encryption with cross-account or Amazon Web Services service
+ * operations you must use a fully qualified KMS key ARN. For more information, see
+ * <a
* href="https://docs.aws.amazon.com/AmazonS3/latest/dev/bucket-encryption.html#bucket-encryption-update-bucket-policy">Using
* encryption for cross-account operations</a>. </p> <p> <b>For example:</b> </p>
* <ul> <li> <p>Key ID: <code>1234abcd-12ab-34cd-56ef-1234567890ab</code> </p>
* </li> <li> <p>Key ARN:
* <code>arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>
- * </p> </li> </ul> <p>Amazon S3 only supports symmetric CMKs and not
- * asymmetric CMKs. For more information, see <a
+ * </p> </li> </ul> <p>Amazon S3 only supports symmetric KMS keys and
+ * not asymmetric KMS keys. For more information, see <a
* href="https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html">Using
- * Symmetric and Asymmetric Keys</a> in the <i>AWS Key Management Service Developer
- * Guide</i>.</p>
+ * symmetric and asymmetric keys</a> in the <i>Amazon Web Services Key Management
+ * Service Developer Guide</i>.</p>
*/
inline bool KMSMasterKeyIDHasBeenSet() const { return m_kMSMasterKeyIDHasBeenSet; }
/**
- * <p>AWS Key Management Service (KMS) customer master key ID to use for the
- * default encryption. This parameter is allowed if and only if
- * <code>SSEAlgorithm</code> is set to <code>aws:kms</code>.</p> <p>You can specify
- * the key ID or the Amazon Resource Name (ARN) of the CMK. However, if you are
- * using encryption with cross-account operations, you must use a fully qualified
- * CMK ARN. For more information, see <a
+ * <p>Amazon Web Services Key Management Service (KMS) customer Amazon Web Services
+ * KMS key ID to use for the default encryption. This parameter is allowed if and
+ * only if <code>SSEAlgorithm</code> is set to <code>aws:kms</code>.</p> <p>You can
+ * specify the key ID or the Amazon Resource Name (ARN) of the KMS key. However, if
+ * you are using encryption with cross-account or Amazon Web Services service
+ * operations you must use a fully qualified KMS key ARN. For more information, see
+ * <a
* href="https://docs.aws.amazon.com/AmazonS3/latest/dev/bucket-encryption.html#bucket-encryption-update-bucket-policy">Using
* encryption for cross-account operations</a>. </p> <p> <b>For example:</b> </p>
* <ul> <li> <p>Key ID: <code>1234abcd-12ab-34cd-56ef-1234567890ab</code> </p>
* </li> <li> <p>Key ARN:
* <code>arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>
- * </p> </li> </ul> <p>Amazon S3 only supports symmetric CMKs and not
- * asymmetric CMKs. For more information, see <a
+ * </p> </li> </ul> <p>Amazon S3 only supports symmetric KMS keys and
+ * not asymmetric KMS keys. For more information, see <a
* href="https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html">Using
- * Symmetric and Asymmetric Keys</a> in the <i>AWS Key Management Service Developer
- * Guide</i>.</p>
+ * symmetric and asymmetric keys</a> in the <i>Amazon Web Services Key Management
+ * Service Developer Guide</i>.</p>
*/
inline void SetKMSMasterKeyID(const Aws::String& value) { m_kMSMasterKeyIDHasBeenSet = true; m_kMSMasterKeyID = value; }
/**
- * <p>AWS Key Management Service (KMS) customer master key ID to use for the
- * default encryption. This parameter is allowed if and only if
- * <code>SSEAlgorithm</code> is set to <code>aws:kms</code>.</p> <p>You can specify
- * the key ID or the Amazon Resource Name (ARN) of the CMK. However, if you are
- * using encryption with cross-account operations, you must use a fully qualified
- * CMK ARN. For more information, see <a
+ * <p>Amazon Web Services Key Management Service (KMS) customer Amazon Web Services
+ * KMS key ID to use for the default encryption. This parameter is allowed if and
+ * only if <code>SSEAlgorithm</code> is set to <code>aws:kms</code>.</p> <p>You can
+ * specify the key ID or the Amazon Resource Name (ARN) of the KMS key. However, if
+ * you are using encryption with cross-account or Amazon Web Services service
+ * operations you must use a fully qualified KMS key ARN. For more information, see
+ * <a
* href="https://docs.aws.amazon.com/AmazonS3/latest/dev/bucket-encryption.html#bucket-encryption-update-bucket-policy">Using
* encryption for cross-account operations</a>. </p> <p> <b>For example:</b> </p>
* <ul> <li> <p>Key ID: <code>1234abcd-12ab-34cd-56ef-1234567890ab</code> </p>
* </li> <li> <p>Key ARN:
* <code>arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>
- * </p> </li> </ul> <p>Amazon S3 only supports symmetric CMKs and not
- * asymmetric CMKs. For more information, see <a
+ * </p> </li> </ul> <p>Amazon S3 only supports symmetric KMS keys and
+ * not asymmetric KMS keys. For more information, see <a
* href="https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html">Using
- * Symmetric and Asymmetric Keys</a> in the <i>AWS Key Management Service Developer
- * Guide</i>.</p>
+ * symmetric and asymmetric keys</a> in the <i>Amazon Web Services Key Management
+ * Service Developer Guide</i>.</p>
*/
inline void SetKMSMasterKeyID(Aws::String&& value) { m_kMSMasterKeyIDHasBeenSet = true; m_kMSMasterKeyID = std::move(value); }
/**
- * <p>AWS Key Management Service (KMS) customer master key ID to use for the
- * default encryption. This parameter is allowed if and only if
- * <code>SSEAlgorithm</code> is set to <code>aws:kms</code>.</p> <p>You can specify
- * the key ID or the Amazon Resource Name (ARN) of the CMK. However, if you are
- * using encryption with cross-account operations, you must use a fully qualified
- * CMK ARN. For more information, see <a
+ * <p>Amazon Web Services Key Management Service (KMS) customer Amazon Web Services
+ * KMS key ID to use for the default encryption. This parameter is allowed if and
+ * only if <code>SSEAlgorithm</code> is set to <code>aws:kms</code>.</p> <p>You can
+ * specify the key ID or the Amazon Resource Name (ARN) of the KMS key. However, if
+ * you are using encryption with cross-account or Amazon Web Services service
+ * operations you must use a fully qualified KMS key ARN. For more information, see
+ * <a
* href="https://docs.aws.amazon.com/AmazonS3/latest/dev/bucket-encryption.html#bucket-encryption-update-bucket-policy">Using
* encryption for cross-account operations</a>. </p> <p> <b>For example:</b> </p>
* <ul> <li> <p>Key ID: <code>1234abcd-12ab-34cd-56ef-1234567890ab</code> </p>
* </li> <li> <p>Key ARN:
* <code>arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>
- * </p> </li> </ul> <p>Amazon S3 only supports symmetric CMKs and not
- * asymmetric CMKs. For more information, see <a
+ * </p> </li> </ul> <p>Amazon S3 only supports symmetric KMS keys and
+ * not asymmetric KMS keys. For more information, see <a
* href="https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html">Using
- * Symmetric and Asymmetric Keys</a> in the <i>AWS Key Management Service Developer
- * Guide</i>.</p>
+ * symmetric and asymmetric keys</a> in the <i>Amazon Web Services Key Management
+ * Service Developer Guide</i>.</p>
*/
inline void SetKMSMasterKeyID(const char* value) { m_kMSMasterKeyIDHasBeenSet = true; m_kMSMasterKeyID.assign(value); }
/**
- * <p>AWS Key Management Service (KMS) customer master key ID to use for the
- * default encryption. This parameter is allowed if and only if
- * <code>SSEAlgorithm</code> is set to <code>aws:kms</code>.</p> <p>You can specify
- * the key ID or the Amazon Resource Name (ARN) of the CMK. However, if you are
- * using encryption with cross-account operations, you must use a fully qualified
- * CMK ARN. For more information, see <a
+ * <p>Amazon Web Services Key Management Service (KMS) customer Amazon Web Services
+ * KMS key ID to use for the default encryption. This parameter is allowed if and
+ * only if <code>SSEAlgorithm</code> is set to <code>aws:kms</code>.</p> <p>You can
+ * specify the key ID or the Amazon Resource Name (ARN) of the KMS key. However, if
+ * you are using encryption with cross-account or Amazon Web Services service
+ * operations you must use a fully qualified KMS key ARN. For more information, see
+ * <a
* href="https://docs.aws.amazon.com/AmazonS3/latest/dev/bucket-encryption.html#bucket-encryption-update-bucket-policy">Using
* encryption for cross-account operations</a>. </p> <p> <b>For example:</b> </p>
* <ul> <li> <p>Key ID: <code>1234abcd-12ab-34cd-56ef-1234567890ab</code> </p>
* </li> <li> <p>Key ARN:
* <code>arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>
- * </p> </li> </ul> <p>Amazon S3 only supports symmetric CMKs and not
- * asymmetric CMKs. For more information, see <a
+ * </p> </li> </ul> <p>Amazon S3 only supports symmetric KMS keys and
+ * not asymmetric KMS keys. For more information, see <a
* href="https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html">Using
- * Symmetric and Asymmetric Keys</a> in the <i>AWS Key Management Service Developer
- * Guide</i>.</p>
+ * symmetric and asymmetric keys</a> in the <i>Amazon Web Services Key Management
+ * Service Developer Guide</i>.</p>
*/
inline ServerSideEncryptionByDefault& WithKMSMasterKeyID(const Aws::String& value) { SetKMSMasterKeyID(value); return *this;}
/**
- * <p>AWS Key Management Service (KMS) customer master key ID to use for the
- * default encryption. This parameter is allowed if and only if
- * <code>SSEAlgorithm</code> is set to <code>aws:kms</code>.</p> <p>You can specify
- * the key ID or the Amazon Resource Name (ARN) of the CMK. However, if you are
- * using encryption with cross-account operations, you must use a fully qualified
- * CMK ARN. For more information, see <a
+ * <p>Amazon Web Services Key Management Service (KMS) customer Amazon Web Services
+ * KMS key ID to use for the default encryption. This parameter is allowed if and
+ * only if <code>SSEAlgorithm</code> is set to <code>aws:kms</code>.</p> <p>You can
+ * specify the key ID or the Amazon Resource Name (ARN) of the KMS key. However, if
+ * you are using encryption with cross-account or Amazon Web Services service
+ * operations you must use a fully qualified KMS key ARN. For more information, see
+ * <a
* href="https://docs.aws.amazon.com/AmazonS3/latest/dev/bucket-encryption.html#bucket-encryption-update-bucket-policy">Using
* encryption for cross-account operations</a>. </p> <p> <b>For example:</b> </p>
* <ul> <li> <p>Key ID: <code>1234abcd-12ab-34cd-56ef-1234567890ab</code> </p>
* </li> <li> <p>Key ARN:
* <code>arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>
- * </p> </li> </ul> <p>Amazon S3 only supports symmetric CMKs and not
- * asymmetric CMKs. For more information, see <a
+ * </p> </li> </ul> <p>Amazon S3 only supports symmetric KMS keys and
+ * not asymmetric KMS keys. For more information, see <a
* href="https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html">Using
- * Symmetric and Asymmetric Keys</a> in the <i>AWS Key Management Service Developer
- * Guide</i>.</p>
+ * symmetric and asymmetric keys</a> in the <i>Amazon Web Services Key Management
+ * Service Developer Guide</i>.</p>
*/
inline ServerSideEncryptionByDefault& WithKMSMasterKeyID(Aws::String&& value) { SetKMSMasterKeyID(std::move(value)); return *this;}
/**
- * <p>AWS Key Management Service (KMS) customer master key ID to use for the
- * default encryption. This parameter is allowed if and only if
- * <code>SSEAlgorithm</code> is set to <code>aws:kms</code>.</p> <p>You can specify
- * the key ID or the Amazon Resource Name (ARN) of the CMK. However, if you are
- * using encryption with cross-account operations, you must use a fully qualified
- * CMK ARN. For more information, see <a
+ * <p>Amazon Web Services Key Management Service (KMS) customer Amazon Web Services
+ * KMS key ID to use for the default encryption. This parameter is allowed if and
+ * only if <code>SSEAlgorithm</code> is set to <code>aws:kms</code>.</p> <p>You can
+ * specify the key ID or the Amazon Resource Name (ARN) of the KMS key. However, if
+ * you are using encryption with cross-account or Amazon Web Services service
+ * operations you must use a fully qualified KMS key ARN. For more information, see
+ * <a
* href="https://docs.aws.amazon.com/AmazonS3/latest/dev/bucket-encryption.html#bucket-encryption-update-bucket-policy">Using
* encryption for cross-account operations</a>. </p> <p> <b>For example:</b> </p>
* <ul> <li> <p>Key ID: <code>1234abcd-12ab-34cd-56ef-1234567890ab</code> </p>
* </li> <li> <p>Key ARN:
* <code>arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>
- * </p> </li> </ul> <p>Amazon S3 only supports symmetric CMKs and not
- * asymmetric CMKs. For more information, see <a
+ * </p> </li> </ul> <p>Amazon S3 only supports symmetric KMS keys and
+ * not asymmetric KMS keys. For more information, see <a
* href="https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html">Using
- * Symmetric and Asymmetric Keys</a> in the <i>AWS Key Management Service Developer
- * Guide</i>.</p>
+ * symmetric and asymmetric keys</a> in the <i>Amazon Web Services Key Management
+ * Service Developer Guide</i>.</p>
*/
inline ServerSideEncryptionByDefault& WithKMSMasterKeyID(const char* value) { SetKMSMasterKeyID(value); return *this;}
private:
ServerSideEncryption m_sSEAlgorithm;
- bool m_sSEAlgorithmHasBeenSet;
+ bool m_sSEAlgorithmHasBeenSet = false;
Aws::String m_kMSMasterKeyID;
- bool m_kMSMasterKeyIDHasBeenSet;
+ bool m_kMSMasterKeyIDHasBeenSet = false;
};
} // namespace Model