aws_sdk_s3/operation/create_multipart_upload/_create_multipart_upload_input.rs
1// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
2#[allow(missing_docs)] // documentation missing in model
3#[non_exhaustive]
4#[derive(::std::clone::Clone, ::std::cmp::PartialEq)]
5pub struct CreateMultipartUploadInput {
6 /// <p>The canned ACL to apply to the object. Amazon S3 supports a set of predefined ACLs, known as <i>canned ACLs</i>. Each canned ACL has a predefined set of grantees and permissions. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html#CannedACL">Canned ACL</a> in the <i>Amazon S3 User Guide</i>.</p>
7 /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can grant access permissions to individual Amazon Web Services accounts or to predefined groups defined by Amazon S3. These permissions are then added to the access control list (ACL) on the new object. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/S3_ACLs_UsingACLs.html">Using ACLs</a>. One way to grant the permissions using the request headers is to specify a canned ACL with the <code>x-amz-acl</code> request header.</p><note>
8 /// <ul>
9 /// <li>
10 /// <p>This functionality is not supported for directory buckets.</p></li>
11 /// <li>
12 /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
13 /// </ul>
14 /// </note>
15 pub acl: ::std::option::Option<crate::types::ObjectCannedAcl>,
16 /// <p>The name of the bucket where the multipart upload is initiated and where the object is uploaded.</p>
17 /// <p><b>Directory buckets</b> - When you use this operation with a directory bucket, you must use virtual-hosted-style requests in the format <code> <i>Bucket-name</i>.s3express-<i>zone-id</i>.<i>region-code</i>.amazonaws.com</code>. Path-style requests are not supported. Directory bucket names must be unique in the chosen Zone (Availability Zone or Local Zone). Bucket names must follow the format <code> <i>bucket-base-name</i>--<i>zone-id</i>--x-s3</code> (for example, <code> <i>amzn-s3-demo-bucket</i>--<i>usw2-az1</i>--x-s3</code>). For information about bucket naming restrictions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-bucket-naming-rules.html">Directory bucket naming rules</a> in the <i>Amazon S3 User Guide</i>.</p>
18 /// <p><b>Access points</b> - When you use this action with an access point, you must provide the alias of the access point in place of the bucket name or specify the access point ARN. When using the access point ARN, you must direct requests to the access point hostname. The access point hostname takes the form <i>AccessPointName</i>-<i>AccountId</i>.s3-accesspoint.<i>Region</i>.amazonaws.com. When using this action with an access point through the Amazon Web Services SDKs, you provide the access point ARN in place of the bucket name. For more information about access point ARNs, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-access-points.html">Using access points</a> in the <i>Amazon S3 User Guide</i>.</p><note>
19 /// <p>Access points and Object Lambda access points are not supported by directory buckets.</p>
20 /// </note>
21 /// <p><b>S3 on Outposts</b> - When you use this action with S3 on Outposts, you must direct requests to the S3 on Outposts hostname. The S3 on Outposts hostname takes the form <code> <i>AccessPointName</i>-<i>AccountId</i>.<i>outpostID</i>.s3-outposts.<i>Region</i>.amazonaws.com</code>. When you use this action with S3 on Outposts, the destination bucket must be the Outposts access point ARN or the access point alias. For more information about S3 on Outposts, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/S3onOutposts.html">What is S3 on Outposts?</a> in the <i>Amazon S3 User Guide</i>.</p>
22 pub bucket: ::std::option::Option<::std::string::String>,
23 /// <p>Specifies caching behavior along the request/reply chain.</p>
24 pub cache_control: ::std::option::Option<::std::string::String>,
25 /// <p>Specifies presentational information for the object.</p>
26 pub content_disposition: ::std::option::Option<::std::string::String>,
27 /// <p>Specifies what content encodings have been applied to the object and thus what decoding mechanisms must be applied to obtain the media-type referenced by the Content-Type header field.</p><note>
28 /// <p>For directory buckets, only the <code>aws-chunked</code> value is supported in this header field.</p>
29 /// </note>
30 pub content_encoding: ::std::option::Option<::std::string::String>,
31 /// <p>The language that the content is in.</p>
32 pub content_language: ::std::option::Option<::std::string::String>,
33 /// <p>A standard MIME type describing the format of the object data.</p>
34 pub content_type: ::std::option::Option<::std::string::String>,
35 /// <p>The date and time at which the object is no longer cacheable.</p>
36 pub expires: ::std::option::Option<::aws_smithy_types::DateTime>,
37 /// <p>Specify access permissions explicitly to give the grantee READ, READ_ACP, and WRITE_ACP permissions on the object.</p>
38 /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
39 /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
40 /// <ul>
41 /// <li>
42 /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
43 /// <li>
44 /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
45 /// <li>
46 /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
47 /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
48 /// <ul>
49 /// <li>
50 /// <p>US East (N. Virginia)</p></li>
51 /// <li>
52 /// <p>US West (N. California)</p></li>
53 /// <li>
54 /// <p>US West (Oregon)</p></li>
55 /// <li>
56 /// <p>Asia Pacific (Singapore)</p></li>
57 /// <li>
58 /// <p>Asia Pacific (Sydney)</p></li>
59 /// <li>
60 /// <p>Asia Pacific (Tokyo)</p></li>
61 /// <li>
62 /// <p>Europe (Ireland)</p></li>
63 /// <li>
64 /// <p>South America (São Paulo)</p></li>
65 /// </ul>
66 /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
67 /// </note></li>
68 /// </ul>
69 /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
70 /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
71 /// <ul>
72 /// <li>
73 /// <p>This functionality is not supported for directory buckets.</p></li>
74 /// <li>
75 /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
76 /// </ul>
77 /// </note>
78 pub grant_full_control: ::std::option::Option<::std::string::String>,
79 /// <p>Specify access permissions explicitly to allow grantee to read the object data and its metadata.</p>
80 /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
81 /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
82 /// <ul>
83 /// <li>
84 /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
85 /// <li>
86 /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
87 /// <li>
88 /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
89 /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
90 /// <ul>
91 /// <li>
92 /// <p>US East (N. Virginia)</p></li>
93 /// <li>
94 /// <p>US West (N. California)</p></li>
95 /// <li>
96 /// <p>US West (Oregon)</p></li>
97 /// <li>
98 /// <p>Asia Pacific (Singapore)</p></li>
99 /// <li>
100 /// <p>Asia Pacific (Sydney)</p></li>
101 /// <li>
102 /// <p>Asia Pacific (Tokyo)</p></li>
103 /// <li>
104 /// <p>Europe (Ireland)</p></li>
105 /// <li>
106 /// <p>South America (São Paulo)</p></li>
107 /// </ul>
108 /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
109 /// </note></li>
110 /// </ul>
111 /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
112 /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
113 /// <ul>
114 /// <li>
115 /// <p>This functionality is not supported for directory buckets.</p></li>
116 /// <li>
117 /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
118 /// </ul>
119 /// </note>
120 pub grant_read: ::std::option::Option<::std::string::String>,
121 /// <p>Specify access permissions explicitly to allows grantee to read the object ACL.</p>
122 /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
123 /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
124 /// <ul>
125 /// <li>
126 /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
127 /// <li>
128 /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
129 /// <li>
130 /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
131 /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
132 /// <ul>
133 /// <li>
134 /// <p>US East (N. Virginia)</p></li>
135 /// <li>
136 /// <p>US West (N. California)</p></li>
137 /// <li>
138 /// <p>US West (Oregon)</p></li>
139 /// <li>
140 /// <p>Asia Pacific (Singapore)</p></li>
141 /// <li>
142 /// <p>Asia Pacific (Sydney)</p></li>
143 /// <li>
144 /// <p>Asia Pacific (Tokyo)</p></li>
145 /// <li>
146 /// <p>Europe (Ireland)</p></li>
147 /// <li>
148 /// <p>South America (São Paulo)</p></li>
149 /// </ul>
150 /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
151 /// </note></li>
152 /// </ul>
153 /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
154 /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
155 /// <ul>
156 /// <li>
157 /// <p>This functionality is not supported for directory buckets.</p></li>
158 /// <li>
159 /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
160 /// </ul>
161 /// </note>
162 pub grant_read_acp: ::std::option::Option<::std::string::String>,
163 /// <p>Specify access permissions explicitly to allows grantee to allow grantee to write the ACL for the applicable object.</p>
164 /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
165 /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
166 /// <ul>
167 /// <li>
168 /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
169 /// <li>
170 /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
171 /// <li>
172 /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
173 /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
174 /// <ul>
175 /// <li>
176 /// <p>US East (N. Virginia)</p></li>
177 /// <li>
178 /// <p>US West (N. California)</p></li>
179 /// <li>
180 /// <p>US West (Oregon)</p></li>
181 /// <li>
182 /// <p>Asia Pacific (Singapore)</p></li>
183 /// <li>
184 /// <p>Asia Pacific (Sydney)</p></li>
185 /// <li>
186 /// <p>Asia Pacific (Tokyo)</p></li>
187 /// <li>
188 /// <p>Europe (Ireland)</p></li>
189 /// <li>
190 /// <p>South America (São Paulo)</p></li>
191 /// </ul>
192 /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
193 /// </note></li>
194 /// </ul>
195 /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
196 /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
197 /// <ul>
198 /// <li>
199 /// <p>This functionality is not supported for directory buckets.</p></li>
200 /// <li>
201 /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
202 /// </ul>
203 /// </note>
204 pub grant_write_acp: ::std::option::Option<::std::string::String>,
205 /// <p>Object key for which the multipart upload is to be initiated.</p>
206 pub key: ::std::option::Option<::std::string::String>,
207 /// <p>A map of metadata to store with the object in S3.</p>
208 pub metadata: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>,
209 /// <p>The server-side encryption algorithm used when you store this object in Amazon S3 (for example, <code>AES256</code>, <code>aws:kms</code>).</p>
210 /// <ul>
211 /// <li>
212 /// <p><b>Directory buckets </b> - For directory buckets, there are only two supported options for server-side encryption: server-side encryption with Amazon S3 managed keys (SSE-S3) (<code>AES256</code>) and server-side encryption with KMS keys (SSE-KMS) (<code>aws:kms</code>). We recommend that the bucket's default encryption uses the desired encryption configuration and you don't override the bucket default encryption in your <code>CreateSession</code> requests or <code>PUT</code> object requests. Then, new objects are automatically encrypted with the desired encryption settings. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-serv-side-encryption.html">Protecting data with server-side encryption</a> in the <i>Amazon S3 User Guide</i>. For more information about the encryption overriding behaviors in directory buckets, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-specifying-kms-encryption.html">Specifying server-side encryption with KMS for new object uploads</a>.</p>
213 /// <p>In the Zonal endpoint API calls (except <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>) using the REST API, the encryption request headers must match the encryption settings that are specified in the <code>CreateSession</code> request. You can't override the values of the encryption settings (<code>x-amz-server-side-encryption</code>, <code>x-amz-server-side-encryption-aws-kms-key-id</code>, <code>x-amz-server-side-encryption-context</code>, and <code>x-amz-server-side-encryption-bucket-key-enabled</code>) that are specified in the <code>CreateSession</code> request. You don't need to explicitly specify these encryption settings values in Zonal endpoint API calls, and Amazon S3 will use the encryption settings values from the <code>CreateSession</code> request to protect new objects in the directory bucket.</p><note>
214 /// <p>When you use the CLI or the Amazon Web Services SDKs, for <code>CreateSession</code>, the session token refreshes automatically to avoid service interruptions when a session expires. The CLI or the Amazon Web Services SDKs use the bucket's default encryption configuration for the <code>CreateSession</code> request. It's not supported to override the encryption settings values in the <code>CreateSession</code> request. So in the Zonal endpoint API calls (except <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>), the encryption request headers must match the default encryption configuration of the directory bucket.</p>
215 /// </note></li>
216 /// </ul>
217 pub server_side_encryption: ::std::option::Option<crate::types::ServerSideEncryption>,
218 /// <p>By default, Amazon S3 uses the STANDARD Storage Class to store newly created objects. The STANDARD storage class provides high durability and high availability. Depending on performance needs, you can specify a different Storage Class. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/storage-class-intro.html">Storage Classes</a> in the <i>Amazon S3 User Guide</i>.</p><note>
219 /// <ul>
220 /// <li>
221 /// <p>For directory buckets, only the S3 Express One Zone storage class is supported to store newly created objects.</p></li>
222 /// <li>
223 /// <p>Amazon S3 on Outposts only uses the OUTPOSTS Storage Class.</p></li>
224 /// </ul>
225 /// </note>
226 pub storage_class: ::std::option::Option<crate::types::StorageClass>,
227 /// <p>If the bucket is configured as a website, redirects requests for this object to another object in the same bucket or to an external URL. Amazon S3 stores the value of this header in the object metadata.</p><note>
228 /// <p>This functionality is not supported for directory buckets.</p>
229 /// </note>
230 pub website_redirect_location: ::std::option::Option<::std::string::String>,
231 /// <p>Specifies the algorithm to use when encrypting the object (for example, AES256).</p><note>
232 /// <p>This functionality is not supported for directory buckets.</p>
233 /// </note>
234 pub sse_customer_algorithm: ::std::option::Option<::std::string::String>,
235 /// <p>Specifies the customer-provided encryption key for Amazon S3 to use in encrypting data. This value is used to store the object and then it is discarded; Amazon S3 does not store the encryption key. The key must be appropriate for use with the algorithm specified in the <code>x-amz-server-side-encryption-customer-algorithm</code> header.</p><note>
236 /// <p>This functionality is not supported for directory buckets.</p>
237 /// </note>
238 pub sse_customer_key: ::std::option::Option<::std::string::String>,
239 /// <p>Specifies the 128-bit MD5 digest of the customer-provided encryption key according to RFC 1321. Amazon S3 uses this header for a message integrity check to ensure that the encryption key was transmitted without error.</p><note>
240 /// <p>This functionality is not supported for directory buckets.</p>
241 /// </note>
242 pub sse_customer_key_md5: ::std::option::Option<::std::string::String>,
243 /// <p>Specifies the KMS key ID (Key ID, Key ARN, or Key Alias) to use for object encryption. If the KMS key doesn't exist in the same account that's issuing the command, you must use the full Key ARN not the Key ID.</p>
244 /// <p><b>General purpose buckets</b> - If you specify <code>x-amz-server-side-encryption</code> with <code>aws:kms</code> or <code>aws:kms:dsse</code>, this header specifies the ID (Key ID, Key ARN, or Key Alias) of the KMS key to use. If you specify <code>x-amz-server-side-encryption:aws:kms</code> or <code>x-amz-server-side-encryption:aws:kms:dsse</code>, but do not provide <code>x-amz-server-side-encryption-aws-kms-key-id</code>, Amazon S3 uses the Amazon Web Services managed key (<code>aws/s3</code>) to protect the data.</p>
245 /// <p><b>Directory buckets</b> - To encrypt data using SSE-KMS, it's recommended to specify the <code>x-amz-server-side-encryption</code> header to <code>aws:kms</code>. Then, the <code>x-amz-server-side-encryption-aws-kms-key-id</code> header implicitly uses the bucket's default KMS customer managed key ID. If you want to explicitly set the <code> x-amz-server-side-encryption-aws-kms-key-id</code> header, it must match the bucket's default customer managed key (using key ID or ARN, not alias). Your SSE-KMS configuration can only support 1 <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#customer-cmk">customer managed key</a> per directory bucket's lifetime. The <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-managed-cmk">Amazon Web Services managed key</a> (<code>aws/s3</code>) isn't supported. Incorrect key specification results in an HTTP <code>400 Bad Request</code> error.</p>
246 pub ssekms_key_id: ::std::option::Option<::std::string::String>,
247 /// <p>Specifies the Amazon Web Services KMS Encryption Context to use for object encryption. The value of this header is a Base64 encoded string of a UTF-8 encoded JSON, which contains the encryption context as key-value pairs.</p>
248 /// <p><b>Directory buckets</b> - You can optionally provide an explicit encryption context value. The value must match the default encryption context - the bucket Amazon Resource Name (ARN). An additional encryption context value is not supported.</p>
249 pub ssekms_encryption_context: ::std::option::Option<::std::string::String>,
250 /// <p>Specifies whether Amazon S3 should use an S3 Bucket Key for object encryption with server-side encryption using Key Management Service (KMS) keys (SSE-KMS).</p>
251 /// <p><b>General purpose buckets</b> - Setting this header to <code>true</code> causes Amazon S3 to use an S3 Bucket Key for object encryption with SSE-KMS. Also, specifying this header with a PUT action doesn't affect bucket-level settings for S3 Bucket Key.</p>
252 /// <p><b>Directory buckets</b> - S3 Bucket Keys are always enabled for <code>GET</code> and <code>PUT</code> operations in a directory bucket and can’t be disabled. S3 Bucket Keys aren't supported, when you copy SSE-KMS encrypted objects from general purpose buckets to directory buckets, from directory buckets to general purpose buckets, or between directory buckets, through <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a>, <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>, <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-buckets-objects-Batch-Ops">the Copy operation in Batch Operations</a>, or <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/create-import-job">the import jobs</a>. In this case, Amazon S3 makes a call to KMS every time a copy request is made for a KMS-encrypted object.</p>
253 pub bucket_key_enabled: ::std::option::Option<bool>,
254 /// <p>Confirms that the requester knows that they will be charged for the request. Bucket owners need not specify this parameter in their requests. If either the source or destination S3 bucket has Requester Pays enabled, the requester will pay for corresponding charges to copy the object. For information about downloading objects from Requester Pays buckets, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/ObjectsinRequesterPaysBuckets.html">Downloading Objects in Requester Pays Buckets</a> in the <i>Amazon S3 User Guide</i>.</p><note>
255 /// <p>This functionality is not supported for directory buckets.</p>
256 /// </note>
257 pub request_payer: ::std::option::Option<crate::types::RequestPayer>,
258 /// <p>The tag-set for the object. The tag-set must be encoded as URL Query parameters.</p><note>
259 /// <p>This functionality is not supported for directory buckets.</p>
260 /// </note>
261 pub tagging: ::std::option::Option<::std::string::String>,
262 /// <p>Specifies the Object Lock mode that you want to apply to the uploaded object.</p><note>
263 /// <p>This functionality is not supported for directory buckets.</p>
264 /// </note>
265 pub object_lock_mode: ::std::option::Option<crate::types::ObjectLockMode>,
266 /// <p>Specifies the date and time when you want the Object Lock to expire.</p><note>
267 /// <p>This functionality is not supported for directory buckets.</p>
268 /// </note>
269 pub object_lock_retain_until_date: ::std::option::Option<::aws_smithy_types::DateTime>,
270 /// <p>Specifies whether you want to apply a legal hold to the uploaded object.</p><note>
271 /// <p>This functionality is not supported for directory buckets.</p>
272 /// </note>
273 pub object_lock_legal_hold_status: ::std::option::Option<crate::types::ObjectLockLegalHoldStatus>,
274 /// <p>The account ID of the expected bucket owner. If the account ID that you provide does not match the actual owner of the bucket, the request fails with the HTTP status code <code>403 Forbidden</code> (access denied).</p>
275 pub expected_bucket_owner: ::std::option::Option<::std::string::String>,
276 /// <p>Indicates the algorithm that you want Amazon S3 to use to create the checksum for the object. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html">Checking object integrity</a> in the <i>Amazon S3 User Guide</i>.</p>
277 pub checksum_algorithm: ::std::option::Option<crate::types::ChecksumAlgorithm>,
278 /// <p>Indicates the checksum type that you want Amazon S3 to use to calculate the object’s checksum value. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html">Checking object integrity in the Amazon S3 User Guide</a>.</p>
279 pub checksum_type: ::std::option::Option<crate::types::ChecksumType>,
280}
281impl CreateMultipartUploadInput {
282 /// <p>The canned ACL to apply to the object. Amazon S3 supports a set of predefined ACLs, known as <i>canned ACLs</i>. Each canned ACL has a predefined set of grantees and permissions. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html#CannedACL">Canned ACL</a> in the <i>Amazon S3 User Guide</i>.</p>
283 /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can grant access permissions to individual Amazon Web Services accounts or to predefined groups defined by Amazon S3. These permissions are then added to the access control list (ACL) on the new object. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/S3_ACLs_UsingACLs.html">Using ACLs</a>. One way to grant the permissions using the request headers is to specify a canned ACL with the <code>x-amz-acl</code> request header.</p><note>
284 /// <ul>
285 /// <li>
286 /// <p>This functionality is not supported for directory buckets.</p></li>
287 /// <li>
288 /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
289 /// </ul>
290 /// </note>
291 pub fn acl(&self) -> ::std::option::Option<&crate::types::ObjectCannedAcl> {
292 self.acl.as_ref()
293 }
294 /// <p>The name of the bucket where the multipart upload is initiated and where the object is uploaded.</p>
295 /// <p><b>Directory buckets</b> - When you use this operation with a directory bucket, you must use virtual-hosted-style requests in the format <code> <i>Bucket-name</i>.s3express-<i>zone-id</i>.<i>region-code</i>.amazonaws.com</code>. Path-style requests are not supported. Directory bucket names must be unique in the chosen Zone (Availability Zone or Local Zone). Bucket names must follow the format <code> <i>bucket-base-name</i>--<i>zone-id</i>--x-s3</code> (for example, <code> <i>amzn-s3-demo-bucket</i>--<i>usw2-az1</i>--x-s3</code>). For information about bucket naming restrictions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-bucket-naming-rules.html">Directory bucket naming rules</a> in the <i>Amazon S3 User Guide</i>.</p>
296 /// <p><b>Access points</b> - When you use this action with an access point, you must provide the alias of the access point in place of the bucket name or specify the access point ARN. When using the access point ARN, you must direct requests to the access point hostname. The access point hostname takes the form <i>AccessPointName</i>-<i>AccountId</i>.s3-accesspoint.<i>Region</i>.amazonaws.com. When using this action with an access point through the Amazon Web Services SDKs, you provide the access point ARN in place of the bucket name. For more information about access point ARNs, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-access-points.html">Using access points</a> in the <i>Amazon S3 User Guide</i>.</p><note>
297 /// <p>Access points and Object Lambda access points are not supported by directory buckets.</p>
298 /// </note>
299 /// <p><b>S3 on Outposts</b> - When you use this action with S3 on Outposts, you must direct requests to the S3 on Outposts hostname. The S3 on Outposts hostname takes the form <code> <i>AccessPointName</i>-<i>AccountId</i>.<i>outpostID</i>.s3-outposts.<i>Region</i>.amazonaws.com</code>. When you use this action with S3 on Outposts, the destination bucket must be the Outposts access point ARN or the access point alias. For more information about S3 on Outposts, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/S3onOutposts.html">What is S3 on Outposts?</a> in the <i>Amazon S3 User Guide</i>.</p>
300 pub fn bucket(&self) -> ::std::option::Option<&str> {
301 self.bucket.as_deref()
302 }
303 /// <p>Specifies caching behavior along the request/reply chain.</p>
304 pub fn cache_control(&self) -> ::std::option::Option<&str> {
305 self.cache_control.as_deref()
306 }
307 /// <p>Specifies presentational information for the object.</p>
308 pub fn content_disposition(&self) -> ::std::option::Option<&str> {
309 self.content_disposition.as_deref()
310 }
311 /// <p>Specifies what content encodings have been applied to the object and thus what decoding mechanisms must be applied to obtain the media-type referenced by the Content-Type header field.</p><note>
312 /// <p>For directory buckets, only the <code>aws-chunked</code> value is supported in this header field.</p>
313 /// </note>
314 pub fn content_encoding(&self) -> ::std::option::Option<&str> {
315 self.content_encoding.as_deref()
316 }
317 /// <p>The language that the content is in.</p>
318 pub fn content_language(&self) -> ::std::option::Option<&str> {
319 self.content_language.as_deref()
320 }
321 /// <p>A standard MIME type describing the format of the object data.</p>
322 pub fn content_type(&self) -> ::std::option::Option<&str> {
323 self.content_type.as_deref()
324 }
325 /// <p>The date and time at which the object is no longer cacheable.</p>
326 pub fn expires(&self) -> ::std::option::Option<&::aws_smithy_types::DateTime> {
327 self.expires.as_ref()
328 }
329 /// <p>Specify access permissions explicitly to give the grantee READ, READ_ACP, and WRITE_ACP permissions on the object.</p>
330 /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
331 /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
332 /// <ul>
333 /// <li>
334 /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
335 /// <li>
336 /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
337 /// <li>
338 /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
339 /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
340 /// <ul>
341 /// <li>
342 /// <p>US East (N. Virginia)</p></li>
343 /// <li>
344 /// <p>US West (N. California)</p></li>
345 /// <li>
346 /// <p>US West (Oregon)</p></li>
347 /// <li>
348 /// <p>Asia Pacific (Singapore)</p></li>
349 /// <li>
350 /// <p>Asia Pacific (Sydney)</p></li>
351 /// <li>
352 /// <p>Asia Pacific (Tokyo)</p></li>
353 /// <li>
354 /// <p>Europe (Ireland)</p></li>
355 /// <li>
356 /// <p>South America (São Paulo)</p></li>
357 /// </ul>
358 /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
359 /// </note></li>
360 /// </ul>
361 /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
362 /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
363 /// <ul>
364 /// <li>
365 /// <p>This functionality is not supported for directory buckets.</p></li>
366 /// <li>
367 /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
368 /// </ul>
369 /// </note>
370 pub fn grant_full_control(&self) -> ::std::option::Option<&str> {
371 self.grant_full_control.as_deref()
372 }
373 /// <p>Specify access permissions explicitly to allow grantee to read the object data and its metadata.</p>
374 /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
375 /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
376 /// <ul>
377 /// <li>
378 /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
379 /// <li>
380 /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
381 /// <li>
382 /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
383 /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
384 /// <ul>
385 /// <li>
386 /// <p>US East (N. Virginia)</p></li>
387 /// <li>
388 /// <p>US West (N. California)</p></li>
389 /// <li>
390 /// <p>US West (Oregon)</p></li>
391 /// <li>
392 /// <p>Asia Pacific (Singapore)</p></li>
393 /// <li>
394 /// <p>Asia Pacific (Sydney)</p></li>
395 /// <li>
396 /// <p>Asia Pacific (Tokyo)</p></li>
397 /// <li>
398 /// <p>Europe (Ireland)</p></li>
399 /// <li>
400 /// <p>South America (São Paulo)</p></li>
401 /// </ul>
402 /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
403 /// </note></li>
404 /// </ul>
405 /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
406 /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
407 /// <ul>
408 /// <li>
409 /// <p>This functionality is not supported for directory buckets.</p></li>
410 /// <li>
411 /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
412 /// </ul>
413 /// </note>
414 pub fn grant_read(&self) -> ::std::option::Option<&str> {
415 self.grant_read.as_deref()
416 }
417 /// <p>Specify access permissions explicitly to allows grantee to read the object ACL.</p>
418 /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
419 /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
420 /// <ul>
421 /// <li>
422 /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
423 /// <li>
424 /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
425 /// <li>
426 /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
427 /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
428 /// <ul>
429 /// <li>
430 /// <p>US East (N. Virginia)</p></li>
431 /// <li>
432 /// <p>US West (N. California)</p></li>
433 /// <li>
434 /// <p>US West (Oregon)</p></li>
435 /// <li>
436 /// <p>Asia Pacific (Singapore)</p></li>
437 /// <li>
438 /// <p>Asia Pacific (Sydney)</p></li>
439 /// <li>
440 /// <p>Asia Pacific (Tokyo)</p></li>
441 /// <li>
442 /// <p>Europe (Ireland)</p></li>
443 /// <li>
444 /// <p>South America (São Paulo)</p></li>
445 /// </ul>
446 /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
447 /// </note></li>
448 /// </ul>
449 /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
450 /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
451 /// <ul>
452 /// <li>
453 /// <p>This functionality is not supported for directory buckets.</p></li>
454 /// <li>
455 /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
456 /// </ul>
457 /// </note>
458 pub fn grant_read_acp(&self) -> ::std::option::Option<&str> {
459 self.grant_read_acp.as_deref()
460 }
461 /// <p>Specify access permissions explicitly to allows grantee to allow grantee to write the ACL for the applicable object.</p>
462 /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
463 /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
464 /// <ul>
465 /// <li>
466 /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
467 /// <li>
468 /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
469 /// <li>
470 /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
471 /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
472 /// <ul>
473 /// <li>
474 /// <p>US East (N. Virginia)</p></li>
475 /// <li>
476 /// <p>US West (N. California)</p></li>
477 /// <li>
478 /// <p>US West (Oregon)</p></li>
479 /// <li>
480 /// <p>Asia Pacific (Singapore)</p></li>
481 /// <li>
482 /// <p>Asia Pacific (Sydney)</p></li>
483 /// <li>
484 /// <p>Asia Pacific (Tokyo)</p></li>
485 /// <li>
486 /// <p>Europe (Ireland)</p></li>
487 /// <li>
488 /// <p>South America (São Paulo)</p></li>
489 /// </ul>
490 /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
491 /// </note></li>
492 /// </ul>
493 /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
494 /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
495 /// <ul>
496 /// <li>
497 /// <p>This functionality is not supported for directory buckets.</p></li>
498 /// <li>
499 /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
500 /// </ul>
501 /// </note>
502 pub fn grant_write_acp(&self) -> ::std::option::Option<&str> {
503 self.grant_write_acp.as_deref()
504 }
505 /// <p>Object key for which the multipart upload is to be initiated.</p>
506 pub fn key(&self) -> ::std::option::Option<&str> {
507 self.key.as_deref()
508 }
509 /// <p>A map of metadata to store with the object in S3.</p>
510 pub fn metadata(&self) -> ::std::option::Option<&::std::collections::HashMap<::std::string::String, ::std::string::String>> {
511 self.metadata.as_ref()
512 }
513 /// <p>The server-side encryption algorithm used when you store this object in Amazon S3 (for example, <code>AES256</code>, <code>aws:kms</code>).</p>
514 /// <ul>
515 /// <li>
516 /// <p><b>Directory buckets </b> - For directory buckets, there are only two supported options for server-side encryption: server-side encryption with Amazon S3 managed keys (SSE-S3) (<code>AES256</code>) and server-side encryption with KMS keys (SSE-KMS) (<code>aws:kms</code>). We recommend that the bucket's default encryption uses the desired encryption configuration and you don't override the bucket default encryption in your <code>CreateSession</code> requests or <code>PUT</code> object requests. Then, new objects are automatically encrypted with the desired encryption settings. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-serv-side-encryption.html">Protecting data with server-side encryption</a> in the <i>Amazon S3 User Guide</i>. For more information about the encryption overriding behaviors in directory buckets, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-specifying-kms-encryption.html">Specifying server-side encryption with KMS for new object uploads</a>.</p>
517 /// <p>In the Zonal endpoint API calls (except <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>) using the REST API, the encryption request headers must match the encryption settings that are specified in the <code>CreateSession</code> request. You can't override the values of the encryption settings (<code>x-amz-server-side-encryption</code>, <code>x-amz-server-side-encryption-aws-kms-key-id</code>, <code>x-amz-server-side-encryption-context</code>, and <code>x-amz-server-side-encryption-bucket-key-enabled</code>) that are specified in the <code>CreateSession</code> request. You don't need to explicitly specify these encryption settings values in Zonal endpoint API calls, and Amazon S3 will use the encryption settings values from the <code>CreateSession</code> request to protect new objects in the directory bucket.</p><note>
518 /// <p>When you use the CLI or the Amazon Web Services SDKs, for <code>CreateSession</code>, the session token refreshes automatically to avoid service interruptions when a session expires. The CLI or the Amazon Web Services SDKs use the bucket's default encryption configuration for the <code>CreateSession</code> request. It's not supported to override the encryption settings values in the <code>CreateSession</code> request. So in the Zonal endpoint API calls (except <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>), the encryption request headers must match the default encryption configuration of the directory bucket.</p>
519 /// </note></li>
520 /// </ul>
521 pub fn server_side_encryption(&self) -> ::std::option::Option<&crate::types::ServerSideEncryption> {
522 self.server_side_encryption.as_ref()
523 }
524 /// <p>By default, Amazon S3 uses the STANDARD Storage Class to store newly created objects. The STANDARD storage class provides high durability and high availability. Depending on performance needs, you can specify a different Storage Class. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/storage-class-intro.html">Storage Classes</a> in the <i>Amazon S3 User Guide</i>.</p><note>
525 /// <ul>
526 /// <li>
527 /// <p>For directory buckets, only the S3 Express One Zone storage class is supported to store newly created objects.</p></li>
528 /// <li>
529 /// <p>Amazon S3 on Outposts only uses the OUTPOSTS Storage Class.</p></li>
530 /// </ul>
531 /// </note>
532 pub fn storage_class(&self) -> ::std::option::Option<&crate::types::StorageClass> {
533 self.storage_class.as_ref()
534 }
535 /// <p>If the bucket is configured as a website, redirects requests for this object to another object in the same bucket or to an external URL. Amazon S3 stores the value of this header in the object metadata.</p><note>
536 /// <p>This functionality is not supported for directory buckets.</p>
537 /// </note>
538 pub fn website_redirect_location(&self) -> ::std::option::Option<&str> {
539 self.website_redirect_location.as_deref()
540 }
541 /// <p>Specifies the algorithm to use when encrypting the object (for example, AES256).</p><note>
542 /// <p>This functionality is not supported for directory buckets.</p>
543 /// </note>
544 pub fn sse_customer_algorithm(&self) -> ::std::option::Option<&str> {
545 self.sse_customer_algorithm.as_deref()
546 }
547 /// <p>Specifies the customer-provided encryption key for Amazon S3 to use in encrypting data. This value is used to store the object and then it is discarded; Amazon S3 does not store the encryption key. The key must be appropriate for use with the algorithm specified in the <code>x-amz-server-side-encryption-customer-algorithm</code> header.</p><note>
548 /// <p>This functionality is not supported for directory buckets.</p>
549 /// </note>
550 pub fn sse_customer_key(&self) -> ::std::option::Option<&str> {
551 self.sse_customer_key.as_deref()
552 }
553 /// <p>Specifies the 128-bit MD5 digest of the customer-provided encryption key according to RFC 1321. Amazon S3 uses this header for a message integrity check to ensure that the encryption key was transmitted without error.</p><note>
554 /// <p>This functionality is not supported for directory buckets.</p>
555 /// </note>
556 pub fn sse_customer_key_md5(&self) -> ::std::option::Option<&str> {
557 self.sse_customer_key_md5.as_deref()
558 }
559 /// <p>Specifies the KMS key ID (Key ID, Key ARN, or Key Alias) to use for object encryption. If the KMS key doesn't exist in the same account that's issuing the command, you must use the full Key ARN not the Key ID.</p>
560 /// <p><b>General purpose buckets</b> - If you specify <code>x-amz-server-side-encryption</code> with <code>aws:kms</code> or <code>aws:kms:dsse</code>, this header specifies the ID (Key ID, Key ARN, or Key Alias) of the KMS key to use. If you specify <code>x-amz-server-side-encryption:aws:kms</code> or <code>x-amz-server-side-encryption:aws:kms:dsse</code>, but do not provide <code>x-amz-server-side-encryption-aws-kms-key-id</code>, Amazon S3 uses the Amazon Web Services managed key (<code>aws/s3</code>) to protect the data.</p>
561 /// <p><b>Directory buckets</b> - To encrypt data using SSE-KMS, it's recommended to specify the <code>x-amz-server-side-encryption</code> header to <code>aws:kms</code>. Then, the <code>x-amz-server-side-encryption-aws-kms-key-id</code> header implicitly uses the bucket's default KMS customer managed key ID. If you want to explicitly set the <code> x-amz-server-side-encryption-aws-kms-key-id</code> header, it must match the bucket's default customer managed key (using key ID or ARN, not alias). Your SSE-KMS configuration can only support 1 <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#customer-cmk">customer managed key</a> per directory bucket's lifetime. The <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-managed-cmk">Amazon Web Services managed key</a> (<code>aws/s3</code>) isn't supported. Incorrect key specification results in an HTTP <code>400 Bad Request</code> error.</p>
562 pub fn ssekms_key_id(&self) -> ::std::option::Option<&str> {
563 self.ssekms_key_id.as_deref()
564 }
565 /// <p>Specifies the Amazon Web Services KMS Encryption Context to use for object encryption. The value of this header is a Base64 encoded string of a UTF-8 encoded JSON, which contains the encryption context as key-value pairs.</p>
566 /// <p><b>Directory buckets</b> - You can optionally provide an explicit encryption context value. The value must match the default encryption context - the bucket Amazon Resource Name (ARN). An additional encryption context value is not supported.</p>
567 pub fn ssekms_encryption_context(&self) -> ::std::option::Option<&str> {
568 self.ssekms_encryption_context.as_deref()
569 }
570 /// <p>Specifies whether Amazon S3 should use an S3 Bucket Key for object encryption with server-side encryption using Key Management Service (KMS) keys (SSE-KMS).</p>
571 /// <p><b>General purpose buckets</b> - Setting this header to <code>true</code> causes Amazon S3 to use an S3 Bucket Key for object encryption with SSE-KMS. Also, specifying this header with a PUT action doesn't affect bucket-level settings for S3 Bucket Key.</p>
572 /// <p><b>Directory buckets</b> - S3 Bucket Keys are always enabled for <code>GET</code> and <code>PUT</code> operations in a directory bucket and can’t be disabled. S3 Bucket Keys aren't supported, when you copy SSE-KMS encrypted objects from general purpose buckets to directory buckets, from directory buckets to general purpose buckets, or between directory buckets, through <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a>, <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>, <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-buckets-objects-Batch-Ops">the Copy operation in Batch Operations</a>, or <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/create-import-job">the import jobs</a>. In this case, Amazon S3 makes a call to KMS every time a copy request is made for a KMS-encrypted object.</p>
573 pub fn bucket_key_enabled(&self) -> ::std::option::Option<bool> {
574 self.bucket_key_enabled
575 }
576 /// <p>Confirms that the requester knows that they will be charged for the request. Bucket owners need not specify this parameter in their requests. If either the source or destination S3 bucket has Requester Pays enabled, the requester will pay for corresponding charges to copy the object. For information about downloading objects from Requester Pays buckets, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/ObjectsinRequesterPaysBuckets.html">Downloading Objects in Requester Pays Buckets</a> in the <i>Amazon S3 User Guide</i>.</p><note>
577 /// <p>This functionality is not supported for directory buckets.</p>
578 /// </note>
579 pub fn request_payer(&self) -> ::std::option::Option<&crate::types::RequestPayer> {
580 self.request_payer.as_ref()
581 }
582 /// <p>The tag-set for the object. The tag-set must be encoded as URL Query parameters.</p><note>
583 /// <p>This functionality is not supported for directory buckets.</p>
584 /// </note>
585 pub fn tagging(&self) -> ::std::option::Option<&str> {
586 self.tagging.as_deref()
587 }
588 /// <p>Specifies the Object Lock mode that you want to apply to the uploaded object.</p><note>
589 /// <p>This functionality is not supported for directory buckets.</p>
590 /// </note>
591 pub fn object_lock_mode(&self) -> ::std::option::Option<&crate::types::ObjectLockMode> {
592 self.object_lock_mode.as_ref()
593 }
594 /// <p>Specifies the date and time when you want the Object Lock to expire.</p><note>
595 /// <p>This functionality is not supported for directory buckets.</p>
596 /// </note>
597 pub fn object_lock_retain_until_date(&self) -> ::std::option::Option<&::aws_smithy_types::DateTime> {
598 self.object_lock_retain_until_date.as_ref()
599 }
600 /// <p>Specifies whether you want to apply a legal hold to the uploaded object.</p><note>
601 /// <p>This functionality is not supported for directory buckets.</p>
602 /// </note>
603 pub fn object_lock_legal_hold_status(&self) -> ::std::option::Option<&crate::types::ObjectLockLegalHoldStatus> {
604 self.object_lock_legal_hold_status.as_ref()
605 }
606 /// <p>The account ID of the expected bucket owner. If the account ID that you provide does not match the actual owner of the bucket, the request fails with the HTTP status code <code>403 Forbidden</code> (access denied).</p>
607 pub fn expected_bucket_owner(&self) -> ::std::option::Option<&str> {
608 self.expected_bucket_owner.as_deref()
609 }
610 /// <p>Indicates the algorithm that you want Amazon S3 to use to create the checksum for the object. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html">Checking object integrity</a> in the <i>Amazon S3 User Guide</i>.</p>
611 pub fn checksum_algorithm(&self) -> ::std::option::Option<&crate::types::ChecksumAlgorithm> {
612 self.checksum_algorithm.as_ref()
613 }
614 /// <p>Indicates the checksum type that you want Amazon S3 to use to calculate the object’s checksum value. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html">Checking object integrity in the Amazon S3 User Guide</a>.</p>
615 pub fn checksum_type(&self) -> ::std::option::Option<&crate::types::ChecksumType> {
616 self.checksum_type.as_ref()
617 }
618}
619impl ::std::fmt::Debug for CreateMultipartUploadInput {
620 fn fmt(&self, f: &mut ::std::fmt::Formatter<'_>) -> ::std::fmt::Result {
621 let mut formatter = f.debug_struct("CreateMultipartUploadInput");
622 formatter.field("acl", &self.acl);
623 formatter.field("bucket", &self.bucket);
624 formatter.field("cache_control", &self.cache_control);
625 formatter.field("content_disposition", &self.content_disposition);
626 formatter.field("content_encoding", &self.content_encoding);
627 formatter.field("content_language", &self.content_language);
628 formatter.field("content_type", &self.content_type);
629 formatter.field("expires", &self.expires);
630 formatter.field("grant_full_control", &self.grant_full_control);
631 formatter.field("grant_read", &self.grant_read);
632 formatter.field("grant_read_acp", &self.grant_read_acp);
633 formatter.field("grant_write_acp", &self.grant_write_acp);
634 formatter.field("key", &self.key);
635 formatter.field("metadata", &self.metadata);
636 formatter.field("server_side_encryption", &self.server_side_encryption);
637 formatter.field("storage_class", &self.storage_class);
638 formatter.field("website_redirect_location", &self.website_redirect_location);
639 formatter.field("sse_customer_algorithm", &self.sse_customer_algorithm);
640 formatter.field("sse_customer_key", &"*** Sensitive Data Redacted ***");
641 formatter.field("sse_customer_key_md5", &self.sse_customer_key_md5);
642 formatter.field("ssekms_key_id", &"*** Sensitive Data Redacted ***");
643 formatter.field("ssekms_encryption_context", &"*** Sensitive Data Redacted ***");
644 formatter.field("bucket_key_enabled", &self.bucket_key_enabled);
645 formatter.field("request_payer", &self.request_payer);
646 formatter.field("tagging", &self.tagging);
647 formatter.field("object_lock_mode", &self.object_lock_mode);
648 formatter.field("object_lock_retain_until_date", &self.object_lock_retain_until_date);
649 formatter.field("object_lock_legal_hold_status", &self.object_lock_legal_hold_status);
650 formatter.field("expected_bucket_owner", &self.expected_bucket_owner);
651 formatter.field("checksum_algorithm", &self.checksum_algorithm);
652 formatter.field("checksum_type", &self.checksum_type);
653 formatter.finish()
654 }
655}
656impl CreateMultipartUploadInput {
657 /// Creates a new builder-style object to manufacture [`CreateMultipartUploadInput`](crate::operation::create_multipart_upload::CreateMultipartUploadInput).
658 pub fn builder() -> crate::operation::create_multipart_upload::builders::CreateMultipartUploadInputBuilder {
659 crate::operation::create_multipart_upload::builders::CreateMultipartUploadInputBuilder::default()
660 }
661}
662
663/// A builder for [`CreateMultipartUploadInput`](crate::operation::create_multipart_upload::CreateMultipartUploadInput).
664#[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default)]
665#[non_exhaustive]
666pub struct CreateMultipartUploadInputBuilder {
667 pub(crate) acl: ::std::option::Option<crate::types::ObjectCannedAcl>,
668 pub(crate) bucket: ::std::option::Option<::std::string::String>,
669 pub(crate) cache_control: ::std::option::Option<::std::string::String>,
670 pub(crate) content_disposition: ::std::option::Option<::std::string::String>,
671 pub(crate) content_encoding: ::std::option::Option<::std::string::String>,
672 pub(crate) content_language: ::std::option::Option<::std::string::String>,
673 pub(crate) content_type: ::std::option::Option<::std::string::String>,
674 pub(crate) expires: ::std::option::Option<::aws_smithy_types::DateTime>,
675 pub(crate) grant_full_control: ::std::option::Option<::std::string::String>,
676 pub(crate) grant_read: ::std::option::Option<::std::string::String>,
677 pub(crate) grant_read_acp: ::std::option::Option<::std::string::String>,
678 pub(crate) grant_write_acp: ::std::option::Option<::std::string::String>,
679 pub(crate) key: ::std::option::Option<::std::string::String>,
680 pub(crate) metadata: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>,
681 pub(crate) server_side_encryption: ::std::option::Option<crate::types::ServerSideEncryption>,
682 pub(crate) storage_class: ::std::option::Option<crate::types::StorageClass>,
683 pub(crate) website_redirect_location: ::std::option::Option<::std::string::String>,
684 pub(crate) sse_customer_algorithm: ::std::option::Option<::std::string::String>,
685 pub(crate) sse_customer_key: ::std::option::Option<::std::string::String>,
686 pub(crate) sse_customer_key_md5: ::std::option::Option<::std::string::String>,
687 pub(crate) ssekms_key_id: ::std::option::Option<::std::string::String>,
688 pub(crate) ssekms_encryption_context: ::std::option::Option<::std::string::String>,
689 pub(crate) bucket_key_enabled: ::std::option::Option<bool>,
690 pub(crate) request_payer: ::std::option::Option<crate::types::RequestPayer>,
691 pub(crate) tagging: ::std::option::Option<::std::string::String>,
692 pub(crate) object_lock_mode: ::std::option::Option<crate::types::ObjectLockMode>,
693 pub(crate) object_lock_retain_until_date: ::std::option::Option<::aws_smithy_types::DateTime>,
694 pub(crate) object_lock_legal_hold_status: ::std::option::Option<crate::types::ObjectLockLegalHoldStatus>,
695 pub(crate) expected_bucket_owner: ::std::option::Option<::std::string::String>,
696 pub(crate) checksum_algorithm: ::std::option::Option<crate::types::ChecksumAlgorithm>,
697 pub(crate) checksum_type: ::std::option::Option<crate::types::ChecksumType>,
698}
699impl CreateMultipartUploadInputBuilder {
700 /// <p>The canned ACL to apply to the object. Amazon S3 supports a set of predefined ACLs, known as <i>canned ACLs</i>. Each canned ACL has a predefined set of grantees and permissions. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html#CannedACL">Canned ACL</a> in the <i>Amazon S3 User Guide</i>.</p>
701 /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can grant access permissions to individual Amazon Web Services accounts or to predefined groups defined by Amazon S3. These permissions are then added to the access control list (ACL) on the new object. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/S3_ACLs_UsingACLs.html">Using ACLs</a>. One way to grant the permissions using the request headers is to specify a canned ACL with the <code>x-amz-acl</code> request header.</p><note>
702 /// <ul>
703 /// <li>
704 /// <p>This functionality is not supported for directory buckets.</p></li>
705 /// <li>
706 /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
707 /// </ul>
708 /// </note>
709 pub fn acl(mut self, input: crate::types::ObjectCannedAcl) -> Self {
710 self.acl = ::std::option::Option::Some(input);
711 self
712 }
713 /// <p>The canned ACL to apply to the object. Amazon S3 supports a set of predefined ACLs, known as <i>canned ACLs</i>. Each canned ACL has a predefined set of grantees and permissions. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html#CannedACL">Canned ACL</a> in the <i>Amazon S3 User Guide</i>.</p>
714 /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can grant access permissions to individual Amazon Web Services accounts or to predefined groups defined by Amazon S3. These permissions are then added to the access control list (ACL) on the new object. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/S3_ACLs_UsingACLs.html">Using ACLs</a>. One way to grant the permissions using the request headers is to specify a canned ACL with the <code>x-amz-acl</code> request header.</p><note>
715 /// <ul>
716 /// <li>
717 /// <p>This functionality is not supported for directory buckets.</p></li>
718 /// <li>
719 /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
720 /// </ul>
721 /// </note>
722 pub fn set_acl(mut self, input: ::std::option::Option<crate::types::ObjectCannedAcl>) -> Self {
723 self.acl = input;
724 self
725 }
726 /// <p>The canned ACL to apply to the object. Amazon S3 supports a set of predefined ACLs, known as <i>canned ACLs</i>. Each canned ACL has a predefined set of grantees and permissions. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html#CannedACL">Canned ACL</a> in the <i>Amazon S3 User Guide</i>.</p>
727 /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can grant access permissions to individual Amazon Web Services accounts or to predefined groups defined by Amazon S3. These permissions are then added to the access control list (ACL) on the new object. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/S3_ACLs_UsingACLs.html">Using ACLs</a>. One way to grant the permissions using the request headers is to specify a canned ACL with the <code>x-amz-acl</code> request header.</p><note>
728 /// <ul>
729 /// <li>
730 /// <p>This functionality is not supported for directory buckets.</p></li>
731 /// <li>
732 /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
733 /// </ul>
734 /// </note>
735 pub fn get_acl(&self) -> &::std::option::Option<crate::types::ObjectCannedAcl> {
736 &self.acl
737 }
738 /// <p>The name of the bucket where the multipart upload is initiated and where the object is uploaded.</p>
739 /// <p><b>Directory buckets</b> - When you use this operation with a directory bucket, you must use virtual-hosted-style requests in the format <code> <i>Bucket-name</i>.s3express-<i>zone-id</i>.<i>region-code</i>.amazonaws.com</code>. Path-style requests are not supported. Directory bucket names must be unique in the chosen Zone (Availability Zone or Local Zone). Bucket names must follow the format <code> <i>bucket-base-name</i>--<i>zone-id</i>--x-s3</code> (for example, <code> <i>amzn-s3-demo-bucket</i>--<i>usw2-az1</i>--x-s3</code>). For information about bucket naming restrictions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-bucket-naming-rules.html">Directory bucket naming rules</a> in the <i>Amazon S3 User Guide</i>.</p>
740 /// <p><b>Access points</b> - When you use this action with an access point, you must provide the alias of the access point in place of the bucket name or specify the access point ARN. When using the access point ARN, you must direct requests to the access point hostname. The access point hostname takes the form <i>AccessPointName</i>-<i>AccountId</i>.s3-accesspoint.<i>Region</i>.amazonaws.com. When using this action with an access point through the Amazon Web Services SDKs, you provide the access point ARN in place of the bucket name. For more information about access point ARNs, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-access-points.html">Using access points</a> in the <i>Amazon S3 User Guide</i>.</p><note>
741 /// <p>Access points and Object Lambda access points are not supported by directory buckets.</p>
742 /// </note>
743 /// <p><b>S3 on Outposts</b> - When you use this action with S3 on Outposts, you must direct requests to the S3 on Outposts hostname. The S3 on Outposts hostname takes the form <code> <i>AccessPointName</i>-<i>AccountId</i>.<i>outpostID</i>.s3-outposts.<i>Region</i>.amazonaws.com</code>. When you use this action with S3 on Outposts, the destination bucket must be the Outposts access point ARN or the access point alias. For more information about S3 on Outposts, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/S3onOutposts.html">What is S3 on Outposts?</a> in the <i>Amazon S3 User Guide</i>.</p>
744 /// This field is required.
745 pub fn bucket(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
746 self.bucket = ::std::option::Option::Some(input.into());
747 self
748 }
749 /// <p>The name of the bucket where the multipart upload is initiated and where the object is uploaded.</p>
750 /// <p><b>Directory buckets</b> - When you use this operation with a directory bucket, you must use virtual-hosted-style requests in the format <code> <i>Bucket-name</i>.s3express-<i>zone-id</i>.<i>region-code</i>.amazonaws.com</code>. Path-style requests are not supported. Directory bucket names must be unique in the chosen Zone (Availability Zone or Local Zone). Bucket names must follow the format <code> <i>bucket-base-name</i>--<i>zone-id</i>--x-s3</code> (for example, <code> <i>amzn-s3-demo-bucket</i>--<i>usw2-az1</i>--x-s3</code>). For information about bucket naming restrictions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-bucket-naming-rules.html">Directory bucket naming rules</a> in the <i>Amazon S3 User Guide</i>.</p>
751 /// <p><b>Access points</b> - When you use this action with an access point, you must provide the alias of the access point in place of the bucket name or specify the access point ARN. When using the access point ARN, you must direct requests to the access point hostname. The access point hostname takes the form <i>AccessPointName</i>-<i>AccountId</i>.s3-accesspoint.<i>Region</i>.amazonaws.com. When using this action with an access point through the Amazon Web Services SDKs, you provide the access point ARN in place of the bucket name. For more information about access point ARNs, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-access-points.html">Using access points</a> in the <i>Amazon S3 User Guide</i>.</p><note>
752 /// <p>Access points and Object Lambda access points are not supported by directory buckets.</p>
753 /// </note>
754 /// <p><b>S3 on Outposts</b> - When you use this action with S3 on Outposts, you must direct requests to the S3 on Outposts hostname. The S3 on Outposts hostname takes the form <code> <i>AccessPointName</i>-<i>AccountId</i>.<i>outpostID</i>.s3-outposts.<i>Region</i>.amazonaws.com</code>. When you use this action with S3 on Outposts, the destination bucket must be the Outposts access point ARN or the access point alias. For more information about S3 on Outposts, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/S3onOutposts.html">What is S3 on Outposts?</a> in the <i>Amazon S3 User Guide</i>.</p>
755 pub fn set_bucket(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
756 self.bucket = input;
757 self
758 }
759 /// <p>The name of the bucket where the multipart upload is initiated and where the object is uploaded.</p>
760 /// <p><b>Directory buckets</b> - When you use this operation with a directory bucket, you must use virtual-hosted-style requests in the format <code> <i>Bucket-name</i>.s3express-<i>zone-id</i>.<i>region-code</i>.amazonaws.com</code>. Path-style requests are not supported. Directory bucket names must be unique in the chosen Zone (Availability Zone or Local Zone). Bucket names must follow the format <code> <i>bucket-base-name</i>--<i>zone-id</i>--x-s3</code> (for example, <code> <i>amzn-s3-demo-bucket</i>--<i>usw2-az1</i>--x-s3</code>). For information about bucket naming restrictions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-bucket-naming-rules.html">Directory bucket naming rules</a> in the <i>Amazon S3 User Guide</i>.</p>
761 /// <p><b>Access points</b> - When you use this action with an access point, you must provide the alias of the access point in place of the bucket name or specify the access point ARN. When using the access point ARN, you must direct requests to the access point hostname. The access point hostname takes the form <i>AccessPointName</i>-<i>AccountId</i>.s3-accesspoint.<i>Region</i>.amazonaws.com. When using this action with an access point through the Amazon Web Services SDKs, you provide the access point ARN in place of the bucket name. For more information about access point ARNs, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-access-points.html">Using access points</a> in the <i>Amazon S3 User Guide</i>.</p><note>
762 /// <p>Access points and Object Lambda access points are not supported by directory buckets.</p>
763 /// </note>
764 /// <p><b>S3 on Outposts</b> - When you use this action with S3 on Outposts, you must direct requests to the S3 on Outposts hostname. The S3 on Outposts hostname takes the form <code> <i>AccessPointName</i>-<i>AccountId</i>.<i>outpostID</i>.s3-outposts.<i>Region</i>.amazonaws.com</code>. When you use this action with S3 on Outposts, the destination bucket must be the Outposts access point ARN or the access point alias. For more information about S3 on Outposts, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/S3onOutposts.html">What is S3 on Outposts?</a> in the <i>Amazon S3 User Guide</i>.</p>
765 pub fn get_bucket(&self) -> &::std::option::Option<::std::string::String> {
766 &self.bucket
767 }
768 /// <p>Specifies caching behavior along the request/reply chain.</p>
769 pub fn cache_control(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
770 self.cache_control = ::std::option::Option::Some(input.into());
771 self
772 }
773 /// <p>Specifies caching behavior along the request/reply chain.</p>
774 pub fn set_cache_control(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
775 self.cache_control = input;
776 self
777 }
778 /// <p>Specifies caching behavior along the request/reply chain.</p>
779 pub fn get_cache_control(&self) -> &::std::option::Option<::std::string::String> {
780 &self.cache_control
781 }
782 /// <p>Specifies presentational information for the object.</p>
783 pub fn content_disposition(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
784 self.content_disposition = ::std::option::Option::Some(input.into());
785 self
786 }
787 /// <p>Specifies presentational information for the object.</p>
788 pub fn set_content_disposition(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
789 self.content_disposition = input;
790 self
791 }
792 /// <p>Specifies presentational information for the object.</p>
793 pub fn get_content_disposition(&self) -> &::std::option::Option<::std::string::String> {
794 &self.content_disposition
795 }
796 /// <p>Specifies what content encodings have been applied to the object and thus what decoding mechanisms must be applied to obtain the media-type referenced by the Content-Type header field.</p><note>
797 /// <p>For directory buckets, only the <code>aws-chunked</code> value is supported in this header field.</p>
798 /// </note>
799 pub fn content_encoding(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
800 self.content_encoding = ::std::option::Option::Some(input.into());
801 self
802 }
803 /// <p>Specifies what content encodings have been applied to the object and thus what decoding mechanisms must be applied to obtain the media-type referenced by the Content-Type header field.</p><note>
804 /// <p>For directory buckets, only the <code>aws-chunked</code> value is supported in this header field.</p>
805 /// </note>
806 pub fn set_content_encoding(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
807 self.content_encoding = input;
808 self
809 }
810 /// <p>Specifies what content encodings have been applied to the object and thus what decoding mechanisms must be applied to obtain the media-type referenced by the Content-Type header field.</p><note>
811 /// <p>For directory buckets, only the <code>aws-chunked</code> value is supported in this header field.</p>
812 /// </note>
813 pub fn get_content_encoding(&self) -> &::std::option::Option<::std::string::String> {
814 &self.content_encoding
815 }
816 /// <p>The language that the content is in.</p>
817 pub fn content_language(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
818 self.content_language = ::std::option::Option::Some(input.into());
819 self
820 }
821 /// <p>The language that the content is in.</p>
822 pub fn set_content_language(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
823 self.content_language = input;
824 self
825 }
826 /// <p>The language that the content is in.</p>
827 pub fn get_content_language(&self) -> &::std::option::Option<::std::string::String> {
828 &self.content_language
829 }
830 /// <p>A standard MIME type describing the format of the object data.</p>
831 pub fn content_type(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
832 self.content_type = ::std::option::Option::Some(input.into());
833 self
834 }
835 /// <p>A standard MIME type describing the format of the object data.</p>
836 pub fn set_content_type(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
837 self.content_type = input;
838 self
839 }
840 /// <p>A standard MIME type describing the format of the object data.</p>
841 pub fn get_content_type(&self) -> &::std::option::Option<::std::string::String> {
842 &self.content_type
843 }
844 /// <p>The date and time at which the object is no longer cacheable.</p>
845 pub fn expires(mut self, input: ::aws_smithy_types::DateTime) -> Self {
846 self.expires = ::std::option::Option::Some(input);
847 self
848 }
849 /// <p>The date and time at which the object is no longer cacheable.</p>
850 pub fn set_expires(mut self, input: ::std::option::Option<::aws_smithy_types::DateTime>) -> Self {
851 self.expires = input;
852 self
853 }
854 /// <p>The date and time at which the object is no longer cacheable.</p>
855 pub fn get_expires(&self) -> &::std::option::Option<::aws_smithy_types::DateTime> {
856 &self.expires
857 }
858 /// <p>Specify access permissions explicitly to give the grantee READ, READ_ACP, and WRITE_ACP permissions on the object.</p>
859 /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
860 /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
861 /// <ul>
862 /// <li>
863 /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
864 /// <li>
865 /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
866 /// <li>
867 /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
868 /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
869 /// <ul>
870 /// <li>
871 /// <p>US East (N. Virginia)</p></li>
872 /// <li>
873 /// <p>US West (N. California)</p></li>
874 /// <li>
875 /// <p>US West (Oregon)</p></li>
876 /// <li>
877 /// <p>Asia Pacific (Singapore)</p></li>
878 /// <li>
879 /// <p>Asia Pacific (Sydney)</p></li>
880 /// <li>
881 /// <p>Asia Pacific (Tokyo)</p></li>
882 /// <li>
883 /// <p>Europe (Ireland)</p></li>
884 /// <li>
885 /// <p>South America (São Paulo)</p></li>
886 /// </ul>
887 /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
888 /// </note></li>
889 /// </ul>
890 /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
891 /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
892 /// <ul>
893 /// <li>
894 /// <p>This functionality is not supported for directory buckets.</p></li>
895 /// <li>
896 /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
897 /// </ul>
898 /// </note>
899 pub fn grant_full_control(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
900 self.grant_full_control = ::std::option::Option::Some(input.into());
901 self
902 }
903 /// <p>Specify access permissions explicitly to give the grantee READ, READ_ACP, and WRITE_ACP permissions on the object.</p>
904 /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
905 /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
906 /// <ul>
907 /// <li>
908 /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
909 /// <li>
910 /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
911 /// <li>
912 /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
913 /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
914 /// <ul>
915 /// <li>
916 /// <p>US East (N. Virginia)</p></li>
917 /// <li>
918 /// <p>US West (N. California)</p></li>
919 /// <li>
920 /// <p>US West (Oregon)</p></li>
921 /// <li>
922 /// <p>Asia Pacific (Singapore)</p></li>
923 /// <li>
924 /// <p>Asia Pacific (Sydney)</p></li>
925 /// <li>
926 /// <p>Asia Pacific (Tokyo)</p></li>
927 /// <li>
928 /// <p>Europe (Ireland)</p></li>
929 /// <li>
930 /// <p>South America (São Paulo)</p></li>
931 /// </ul>
932 /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
933 /// </note></li>
934 /// </ul>
935 /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
936 /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
937 /// <ul>
938 /// <li>
939 /// <p>This functionality is not supported for directory buckets.</p></li>
940 /// <li>
941 /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
942 /// </ul>
943 /// </note>
944 pub fn set_grant_full_control(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
945 self.grant_full_control = input;
946 self
947 }
948 /// <p>Specify access permissions explicitly to give the grantee READ, READ_ACP, and WRITE_ACP permissions on the object.</p>
949 /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
950 /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
951 /// <ul>
952 /// <li>
953 /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
954 /// <li>
955 /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
956 /// <li>
957 /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
958 /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
959 /// <ul>
960 /// <li>
961 /// <p>US East (N. Virginia)</p></li>
962 /// <li>
963 /// <p>US West (N. California)</p></li>
964 /// <li>
965 /// <p>US West (Oregon)</p></li>
966 /// <li>
967 /// <p>Asia Pacific (Singapore)</p></li>
968 /// <li>
969 /// <p>Asia Pacific (Sydney)</p></li>
970 /// <li>
971 /// <p>Asia Pacific (Tokyo)</p></li>
972 /// <li>
973 /// <p>Europe (Ireland)</p></li>
974 /// <li>
975 /// <p>South America (São Paulo)</p></li>
976 /// </ul>
977 /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
978 /// </note></li>
979 /// </ul>
980 /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
981 /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
982 /// <ul>
983 /// <li>
984 /// <p>This functionality is not supported for directory buckets.</p></li>
985 /// <li>
986 /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
987 /// </ul>
988 /// </note>
989 pub fn get_grant_full_control(&self) -> &::std::option::Option<::std::string::String> {
990 &self.grant_full_control
991 }
992 /// <p>Specify access permissions explicitly to allow grantee to read the object data and its metadata.</p>
993 /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
994 /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
995 /// <ul>
996 /// <li>
997 /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
998 /// <li>
999 /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
1000 /// <li>
1001 /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
1002 /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
1003 /// <ul>
1004 /// <li>
1005 /// <p>US East (N. Virginia)</p></li>
1006 /// <li>
1007 /// <p>US West (N. California)</p></li>
1008 /// <li>
1009 /// <p>US West (Oregon)</p></li>
1010 /// <li>
1011 /// <p>Asia Pacific (Singapore)</p></li>
1012 /// <li>
1013 /// <p>Asia Pacific (Sydney)</p></li>
1014 /// <li>
1015 /// <p>Asia Pacific (Tokyo)</p></li>
1016 /// <li>
1017 /// <p>Europe (Ireland)</p></li>
1018 /// <li>
1019 /// <p>South America (São Paulo)</p></li>
1020 /// </ul>
1021 /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
1022 /// </note></li>
1023 /// </ul>
1024 /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
1025 /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
1026 /// <ul>
1027 /// <li>
1028 /// <p>This functionality is not supported for directory buckets.</p></li>
1029 /// <li>
1030 /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
1031 /// </ul>
1032 /// </note>
1033 pub fn grant_read(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
1034 self.grant_read = ::std::option::Option::Some(input.into());
1035 self
1036 }
1037 /// <p>Specify access permissions explicitly to allow grantee to read the object data and its metadata.</p>
1038 /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
1039 /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
1040 /// <ul>
1041 /// <li>
1042 /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
1043 /// <li>
1044 /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
1045 /// <li>
1046 /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
1047 /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
1048 /// <ul>
1049 /// <li>
1050 /// <p>US East (N. Virginia)</p></li>
1051 /// <li>
1052 /// <p>US West (N. California)</p></li>
1053 /// <li>
1054 /// <p>US West (Oregon)</p></li>
1055 /// <li>
1056 /// <p>Asia Pacific (Singapore)</p></li>
1057 /// <li>
1058 /// <p>Asia Pacific (Sydney)</p></li>
1059 /// <li>
1060 /// <p>Asia Pacific (Tokyo)</p></li>
1061 /// <li>
1062 /// <p>Europe (Ireland)</p></li>
1063 /// <li>
1064 /// <p>South America (São Paulo)</p></li>
1065 /// </ul>
1066 /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
1067 /// </note></li>
1068 /// </ul>
1069 /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
1070 /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
1071 /// <ul>
1072 /// <li>
1073 /// <p>This functionality is not supported for directory buckets.</p></li>
1074 /// <li>
1075 /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
1076 /// </ul>
1077 /// </note>
1078 pub fn set_grant_read(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
1079 self.grant_read = input;
1080 self
1081 }
1082 /// <p>Specify access permissions explicitly to allow grantee to read the object data and its metadata.</p>
1083 /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
1084 /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
1085 /// <ul>
1086 /// <li>
1087 /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
1088 /// <li>
1089 /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
1090 /// <li>
1091 /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
1092 /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
1093 /// <ul>
1094 /// <li>
1095 /// <p>US East (N. Virginia)</p></li>
1096 /// <li>
1097 /// <p>US West (N. California)</p></li>
1098 /// <li>
1099 /// <p>US West (Oregon)</p></li>
1100 /// <li>
1101 /// <p>Asia Pacific (Singapore)</p></li>
1102 /// <li>
1103 /// <p>Asia Pacific (Sydney)</p></li>
1104 /// <li>
1105 /// <p>Asia Pacific (Tokyo)</p></li>
1106 /// <li>
1107 /// <p>Europe (Ireland)</p></li>
1108 /// <li>
1109 /// <p>South America (São Paulo)</p></li>
1110 /// </ul>
1111 /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
1112 /// </note></li>
1113 /// </ul>
1114 /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
1115 /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
1116 /// <ul>
1117 /// <li>
1118 /// <p>This functionality is not supported for directory buckets.</p></li>
1119 /// <li>
1120 /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
1121 /// </ul>
1122 /// </note>
1123 pub fn get_grant_read(&self) -> &::std::option::Option<::std::string::String> {
1124 &self.grant_read
1125 }
1126 /// <p>Specify access permissions explicitly to allows grantee to read the object ACL.</p>
1127 /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
1128 /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
1129 /// <ul>
1130 /// <li>
1131 /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
1132 /// <li>
1133 /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
1134 /// <li>
1135 /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
1136 /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
1137 /// <ul>
1138 /// <li>
1139 /// <p>US East (N. Virginia)</p></li>
1140 /// <li>
1141 /// <p>US West (N. California)</p></li>
1142 /// <li>
1143 /// <p>US West (Oregon)</p></li>
1144 /// <li>
1145 /// <p>Asia Pacific (Singapore)</p></li>
1146 /// <li>
1147 /// <p>Asia Pacific (Sydney)</p></li>
1148 /// <li>
1149 /// <p>Asia Pacific (Tokyo)</p></li>
1150 /// <li>
1151 /// <p>Europe (Ireland)</p></li>
1152 /// <li>
1153 /// <p>South America (São Paulo)</p></li>
1154 /// </ul>
1155 /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
1156 /// </note></li>
1157 /// </ul>
1158 /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
1159 /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
1160 /// <ul>
1161 /// <li>
1162 /// <p>This functionality is not supported for directory buckets.</p></li>
1163 /// <li>
1164 /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
1165 /// </ul>
1166 /// </note>
1167 pub fn grant_read_acp(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
1168 self.grant_read_acp = ::std::option::Option::Some(input.into());
1169 self
1170 }
1171 /// <p>Specify access permissions explicitly to allows grantee to read the object ACL.</p>
1172 /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
1173 /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
1174 /// <ul>
1175 /// <li>
1176 /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
1177 /// <li>
1178 /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
1179 /// <li>
1180 /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
1181 /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
1182 /// <ul>
1183 /// <li>
1184 /// <p>US East (N. Virginia)</p></li>
1185 /// <li>
1186 /// <p>US West (N. California)</p></li>
1187 /// <li>
1188 /// <p>US West (Oregon)</p></li>
1189 /// <li>
1190 /// <p>Asia Pacific (Singapore)</p></li>
1191 /// <li>
1192 /// <p>Asia Pacific (Sydney)</p></li>
1193 /// <li>
1194 /// <p>Asia Pacific (Tokyo)</p></li>
1195 /// <li>
1196 /// <p>Europe (Ireland)</p></li>
1197 /// <li>
1198 /// <p>South America (São Paulo)</p></li>
1199 /// </ul>
1200 /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
1201 /// </note></li>
1202 /// </ul>
1203 /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
1204 /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
1205 /// <ul>
1206 /// <li>
1207 /// <p>This functionality is not supported for directory buckets.</p></li>
1208 /// <li>
1209 /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
1210 /// </ul>
1211 /// </note>
1212 pub fn set_grant_read_acp(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
1213 self.grant_read_acp = input;
1214 self
1215 }
1216 /// <p>Specify access permissions explicitly to allows grantee to read the object ACL.</p>
1217 /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
1218 /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
1219 /// <ul>
1220 /// <li>
1221 /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
1222 /// <li>
1223 /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
1224 /// <li>
1225 /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
1226 /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
1227 /// <ul>
1228 /// <li>
1229 /// <p>US East (N. Virginia)</p></li>
1230 /// <li>
1231 /// <p>US West (N. California)</p></li>
1232 /// <li>
1233 /// <p>US West (Oregon)</p></li>
1234 /// <li>
1235 /// <p>Asia Pacific (Singapore)</p></li>
1236 /// <li>
1237 /// <p>Asia Pacific (Sydney)</p></li>
1238 /// <li>
1239 /// <p>Asia Pacific (Tokyo)</p></li>
1240 /// <li>
1241 /// <p>Europe (Ireland)</p></li>
1242 /// <li>
1243 /// <p>South America (São Paulo)</p></li>
1244 /// </ul>
1245 /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
1246 /// </note></li>
1247 /// </ul>
1248 /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
1249 /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
1250 /// <ul>
1251 /// <li>
1252 /// <p>This functionality is not supported for directory buckets.</p></li>
1253 /// <li>
1254 /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
1255 /// </ul>
1256 /// </note>
1257 pub fn get_grant_read_acp(&self) -> &::std::option::Option<::std::string::String> {
1258 &self.grant_read_acp
1259 }
1260 /// <p>Specify access permissions explicitly to allows grantee to allow grantee to write the ACL for the applicable object.</p>
1261 /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
1262 /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
1263 /// <ul>
1264 /// <li>
1265 /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
1266 /// <li>
1267 /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
1268 /// <li>
1269 /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
1270 /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
1271 /// <ul>
1272 /// <li>
1273 /// <p>US East (N. Virginia)</p></li>
1274 /// <li>
1275 /// <p>US West (N. California)</p></li>
1276 /// <li>
1277 /// <p>US West (Oregon)</p></li>
1278 /// <li>
1279 /// <p>Asia Pacific (Singapore)</p></li>
1280 /// <li>
1281 /// <p>Asia Pacific (Sydney)</p></li>
1282 /// <li>
1283 /// <p>Asia Pacific (Tokyo)</p></li>
1284 /// <li>
1285 /// <p>Europe (Ireland)</p></li>
1286 /// <li>
1287 /// <p>South America (São Paulo)</p></li>
1288 /// </ul>
1289 /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
1290 /// </note></li>
1291 /// </ul>
1292 /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
1293 /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
1294 /// <ul>
1295 /// <li>
1296 /// <p>This functionality is not supported for directory buckets.</p></li>
1297 /// <li>
1298 /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
1299 /// </ul>
1300 /// </note>
1301 pub fn grant_write_acp(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
1302 self.grant_write_acp = ::std::option::Option::Some(input.into());
1303 self
1304 }
1305 /// <p>Specify access permissions explicitly to allows grantee to allow grantee to write the ACL for the applicable object.</p>
1306 /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
1307 /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
1308 /// <ul>
1309 /// <li>
1310 /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
1311 /// <li>
1312 /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
1313 /// <li>
1314 /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
1315 /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
1316 /// <ul>
1317 /// <li>
1318 /// <p>US East (N. Virginia)</p></li>
1319 /// <li>
1320 /// <p>US West (N. California)</p></li>
1321 /// <li>
1322 /// <p>US West (Oregon)</p></li>
1323 /// <li>
1324 /// <p>Asia Pacific (Singapore)</p></li>
1325 /// <li>
1326 /// <p>Asia Pacific (Sydney)</p></li>
1327 /// <li>
1328 /// <p>Asia Pacific (Tokyo)</p></li>
1329 /// <li>
1330 /// <p>Europe (Ireland)</p></li>
1331 /// <li>
1332 /// <p>South America (São Paulo)</p></li>
1333 /// </ul>
1334 /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
1335 /// </note></li>
1336 /// </ul>
1337 /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
1338 /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
1339 /// <ul>
1340 /// <li>
1341 /// <p>This functionality is not supported for directory buckets.</p></li>
1342 /// <li>
1343 /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
1344 /// </ul>
1345 /// </note>
1346 pub fn set_grant_write_acp(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
1347 self.grant_write_acp = input;
1348 self
1349 }
1350 /// <p>Specify access permissions explicitly to allows grantee to allow grantee to write the ACL for the applicable object.</p>
1351 /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
1352 /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
1353 /// <ul>
1354 /// <li>
1355 /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
1356 /// <li>
1357 /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
1358 /// <li>
1359 /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
1360 /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
1361 /// <ul>
1362 /// <li>
1363 /// <p>US East (N. Virginia)</p></li>
1364 /// <li>
1365 /// <p>US West (N. California)</p></li>
1366 /// <li>
1367 /// <p>US West (Oregon)</p></li>
1368 /// <li>
1369 /// <p>Asia Pacific (Singapore)</p></li>
1370 /// <li>
1371 /// <p>Asia Pacific (Sydney)</p></li>
1372 /// <li>
1373 /// <p>Asia Pacific (Tokyo)</p></li>
1374 /// <li>
1375 /// <p>Europe (Ireland)</p></li>
1376 /// <li>
1377 /// <p>South America (São Paulo)</p></li>
1378 /// </ul>
1379 /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
1380 /// </note></li>
1381 /// </ul>
1382 /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
1383 /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
1384 /// <ul>
1385 /// <li>
1386 /// <p>This functionality is not supported for directory buckets.</p></li>
1387 /// <li>
1388 /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
1389 /// </ul>
1390 /// </note>
1391 pub fn get_grant_write_acp(&self) -> &::std::option::Option<::std::string::String> {
1392 &self.grant_write_acp
1393 }
1394 /// <p>Object key for which the multipart upload is to be initiated.</p>
1395 /// This field is required.
1396 pub fn key(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
1397 self.key = ::std::option::Option::Some(input.into());
1398 self
1399 }
1400 /// <p>Object key for which the multipart upload is to be initiated.</p>
1401 pub fn set_key(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
1402 self.key = input;
1403 self
1404 }
1405 /// <p>Object key for which the multipart upload is to be initiated.</p>
1406 pub fn get_key(&self) -> &::std::option::Option<::std::string::String> {
1407 &self.key
1408 }
1409 /// Adds a key-value pair to `metadata`.
1410 ///
1411 /// To override the contents of this collection use [`set_metadata`](Self::set_metadata).
1412 ///
1413 /// <p>A map of metadata to store with the object in S3.</p>
1414 pub fn metadata(mut self, k: impl ::std::convert::Into<::std::string::String>, v: impl ::std::convert::Into<::std::string::String>) -> Self {
1415 let mut hash_map = self.metadata.unwrap_or_default();
1416 hash_map.insert(k.into(), v.into());
1417 self.metadata = ::std::option::Option::Some(hash_map);
1418 self
1419 }
1420 /// <p>A map of metadata to store with the object in S3.</p>
1421 pub fn set_metadata(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self {
1422 self.metadata = input;
1423 self
1424 }
1425 /// <p>A map of metadata to store with the object in S3.</p>
1426 pub fn get_metadata(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> {
1427 &self.metadata
1428 }
1429 /// <p>The server-side encryption algorithm used when you store this object in Amazon S3 (for example, <code>AES256</code>, <code>aws:kms</code>).</p>
1430 /// <ul>
1431 /// <li>
1432 /// <p><b>Directory buckets </b> - For directory buckets, there are only two supported options for server-side encryption: server-side encryption with Amazon S3 managed keys (SSE-S3) (<code>AES256</code>) and server-side encryption with KMS keys (SSE-KMS) (<code>aws:kms</code>). We recommend that the bucket's default encryption uses the desired encryption configuration and you don't override the bucket default encryption in your <code>CreateSession</code> requests or <code>PUT</code> object requests. Then, new objects are automatically encrypted with the desired encryption settings. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-serv-side-encryption.html">Protecting data with server-side encryption</a> in the <i>Amazon S3 User Guide</i>. For more information about the encryption overriding behaviors in directory buckets, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-specifying-kms-encryption.html">Specifying server-side encryption with KMS for new object uploads</a>.</p>
1433 /// <p>In the Zonal endpoint API calls (except <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>) using the REST API, the encryption request headers must match the encryption settings that are specified in the <code>CreateSession</code> request. You can't override the values of the encryption settings (<code>x-amz-server-side-encryption</code>, <code>x-amz-server-side-encryption-aws-kms-key-id</code>, <code>x-amz-server-side-encryption-context</code>, and <code>x-amz-server-side-encryption-bucket-key-enabled</code>) that are specified in the <code>CreateSession</code> request. You don't need to explicitly specify these encryption settings values in Zonal endpoint API calls, and Amazon S3 will use the encryption settings values from the <code>CreateSession</code> request to protect new objects in the directory bucket.</p><note>
1434 /// <p>When you use the CLI or the Amazon Web Services SDKs, for <code>CreateSession</code>, the session token refreshes automatically to avoid service interruptions when a session expires. The CLI or the Amazon Web Services SDKs use the bucket's default encryption configuration for the <code>CreateSession</code> request. It's not supported to override the encryption settings values in the <code>CreateSession</code> request. So in the Zonal endpoint API calls (except <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>), the encryption request headers must match the default encryption configuration of the directory bucket.</p>
1435 /// </note></li>
1436 /// </ul>
1437 pub fn server_side_encryption(mut self, input: crate::types::ServerSideEncryption) -> Self {
1438 self.server_side_encryption = ::std::option::Option::Some(input);
1439 self
1440 }
1441 /// <p>The server-side encryption algorithm used when you store this object in Amazon S3 (for example, <code>AES256</code>, <code>aws:kms</code>).</p>
1442 /// <ul>
1443 /// <li>
1444 /// <p><b>Directory buckets </b> - For directory buckets, there are only two supported options for server-side encryption: server-side encryption with Amazon S3 managed keys (SSE-S3) (<code>AES256</code>) and server-side encryption with KMS keys (SSE-KMS) (<code>aws:kms</code>). We recommend that the bucket's default encryption uses the desired encryption configuration and you don't override the bucket default encryption in your <code>CreateSession</code> requests or <code>PUT</code> object requests. Then, new objects are automatically encrypted with the desired encryption settings. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-serv-side-encryption.html">Protecting data with server-side encryption</a> in the <i>Amazon S3 User Guide</i>. For more information about the encryption overriding behaviors in directory buckets, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-specifying-kms-encryption.html">Specifying server-side encryption with KMS for new object uploads</a>.</p>
1445 /// <p>In the Zonal endpoint API calls (except <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>) using the REST API, the encryption request headers must match the encryption settings that are specified in the <code>CreateSession</code> request. You can't override the values of the encryption settings (<code>x-amz-server-side-encryption</code>, <code>x-amz-server-side-encryption-aws-kms-key-id</code>, <code>x-amz-server-side-encryption-context</code>, and <code>x-amz-server-side-encryption-bucket-key-enabled</code>) that are specified in the <code>CreateSession</code> request. You don't need to explicitly specify these encryption settings values in Zonal endpoint API calls, and Amazon S3 will use the encryption settings values from the <code>CreateSession</code> request to protect new objects in the directory bucket.</p><note>
1446 /// <p>When you use the CLI or the Amazon Web Services SDKs, for <code>CreateSession</code>, the session token refreshes automatically to avoid service interruptions when a session expires. The CLI or the Amazon Web Services SDKs use the bucket's default encryption configuration for the <code>CreateSession</code> request. It's not supported to override the encryption settings values in the <code>CreateSession</code> request. So in the Zonal endpoint API calls (except <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>), the encryption request headers must match the default encryption configuration of the directory bucket.</p>
1447 /// </note></li>
1448 /// </ul>
1449 pub fn set_server_side_encryption(mut self, input: ::std::option::Option<crate::types::ServerSideEncryption>) -> Self {
1450 self.server_side_encryption = input;
1451 self
1452 }
1453 /// <p>The server-side encryption algorithm used when you store this object in Amazon S3 (for example, <code>AES256</code>, <code>aws:kms</code>).</p>
1454 /// <ul>
1455 /// <li>
1456 /// <p><b>Directory buckets </b> - For directory buckets, there are only two supported options for server-side encryption: server-side encryption with Amazon S3 managed keys (SSE-S3) (<code>AES256</code>) and server-side encryption with KMS keys (SSE-KMS) (<code>aws:kms</code>). We recommend that the bucket's default encryption uses the desired encryption configuration and you don't override the bucket default encryption in your <code>CreateSession</code> requests or <code>PUT</code> object requests. Then, new objects are automatically encrypted with the desired encryption settings. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-serv-side-encryption.html">Protecting data with server-side encryption</a> in the <i>Amazon S3 User Guide</i>. For more information about the encryption overriding behaviors in directory buckets, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-specifying-kms-encryption.html">Specifying server-side encryption with KMS for new object uploads</a>.</p>
1457 /// <p>In the Zonal endpoint API calls (except <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>) using the REST API, the encryption request headers must match the encryption settings that are specified in the <code>CreateSession</code> request. You can't override the values of the encryption settings (<code>x-amz-server-side-encryption</code>, <code>x-amz-server-side-encryption-aws-kms-key-id</code>, <code>x-amz-server-side-encryption-context</code>, and <code>x-amz-server-side-encryption-bucket-key-enabled</code>) that are specified in the <code>CreateSession</code> request. You don't need to explicitly specify these encryption settings values in Zonal endpoint API calls, and Amazon S3 will use the encryption settings values from the <code>CreateSession</code> request to protect new objects in the directory bucket.</p><note>
1458 /// <p>When you use the CLI or the Amazon Web Services SDKs, for <code>CreateSession</code>, the session token refreshes automatically to avoid service interruptions when a session expires. The CLI or the Amazon Web Services SDKs use the bucket's default encryption configuration for the <code>CreateSession</code> request. It's not supported to override the encryption settings values in the <code>CreateSession</code> request. So in the Zonal endpoint API calls (except <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>), the encryption request headers must match the default encryption configuration of the directory bucket.</p>
1459 /// </note></li>
1460 /// </ul>
1461 pub fn get_server_side_encryption(&self) -> &::std::option::Option<crate::types::ServerSideEncryption> {
1462 &self.server_side_encryption
1463 }
1464 /// <p>By default, Amazon S3 uses the STANDARD Storage Class to store newly created objects. The STANDARD storage class provides high durability and high availability. Depending on performance needs, you can specify a different Storage Class. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/storage-class-intro.html">Storage Classes</a> in the <i>Amazon S3 User Guide</i>.</p><note>
1465 /// <ul>
1466 /// <li>
1467 /// <p>For directory buckets, only the S3 Express One Zone storage class is supported to store newly created objects.</p></li>
1468 /// <li>
1469 /// <p>Amazon S3 on Outposts only uses the OUTPOSTS Storage Class.</p></li>
1470 /// </ul>
1471 /// </note>
1472 pub fn storage_class(mut self, input: crate::types::StorageClass) -> Self {
1473 self.storage_class = ::std::option::Option::Some(input);
1474 self
1475 }
1476 /// <p>By default, Amazon S3 uses the STANDARD Storage Class to store newly created objects. The STANDARD storage class provides high durability and high availability. Depending on performance needs, you can specify a different Storage Class. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/storage-class-intro.html">Storage Classes</a> in the <i>Amazon S3 User Guide</i>.</p><note>
1477 /// <ul>
1478 /// <li>
1479 /// <p>For directory buckets, only the S3 Express One Zone storage class is supported to store newly created objects.</p></li>
1480 /// <li>
1481 /// <p>Amazon S3 on Outposts only uses the OUTPOSTS Storage Class.</p></li>
1482 /// </ul>
1483 /// </note>
1484 pub fn set_storage_class(mut self, input: ::std::option::Option<crate::types::StorageClass>) -> Self {
1485 self.storage_class = input;
1486 self
1487 }
1488 /// <p>By default, Amazon S3 uses the STANDARD Storage Class to store newly created objects. The STANDARD storage class provides high durability and high availability. Depending on performance needs, you can specify a different Storage Class. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/storage-class-intro.html">Storage Classes</a> in the <i>Amazon S3 User Guide</i>.</p><note>
1489 /// <ul>
1490 /// <li>
1491 /// <p>For directory buckets, only the S3 Express One Zone storage class is supported to store newly created objects.</p></li>
1492 /// <li>
1493 /// <p>Amazon S3 on Outposts only uses the OUTPOSTS Storage Class.</p></li>
1494 /// </ul>
1495 /// </note>
1496 pub fn get_storage_class(&self) -> &::std::option::Option<crate::types::StorageClass> {
1497 &self.storage_class
1498 }
1499 /// <p>If the bucket is configured as a website, redirects requests for this object to another object in the same bucket or to an external URL. Amazon S3 stores the value of this header in the object metadata.</p><note>
1500 /// <p>This functionality is not supported for directory buckets.</p>
1501 /// </note>
1502 pub fn website_redirect_location(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
1503 self.website_redirect_location = ::std::option::Option::Some(input.into());
1504 self
1505 }
1506 /// <p>If the bucket is configured as a website, redirects requests for this object to another object in the same bucket or to an external URL. Amazon S3 stores the value of this header in the object metadata.</p><note>
1507 /// <p>This functionality is not supported for directory buckets.</p>
1508 /// </note>
1509 pub fn set_website_redirect_location(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
1510 self.website_redirect_location = input;
1511 self
1512 }
1513 /// <p>If the bucket is configured as a website, redirects requests for this object to another object in the same bucket or to an external URL. Amazon S3 stores the value of this header in the object metadata.</p><note>
1514 /// <p>This functionality is not supported for directory buckets.</p>
1515 /// </note>
1516 pub fn get_website_redirect_location(&self) -> &::std::option::Option<::std::string::String> {
1517 &self.website_redirect_location
1518 }
1519 /// <p>Specifies the algorithm to use when encrypting the object (for example, AES256).</p><note>
1520 /// <p>This functionality is not supported for directory buckets.</p>
1521 /// </note>
1522 pub fn sse_customer_algorithm(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
1523 self.sse_customer_algorithm = ::std::option::Option::Some(input.into());
1524 self
1525 }
1526 /// <p>Specifies the algorithm to use when encrypting the object (for example, AES256).</p><note>
1527 /// <p>This functionality is not supported for directory buckets.</p>
1528 /// </note>
1529 pub fn set_sse_customer_algorithm(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
1530 self.sse_customer_algorithm = input;
1531 self
1532 }
1533 /// <p>Specifies the algorithm to use when encrypting the object (for example, AES256).</p><note>
1534 /// <p>This functionality is not supported for directory buckets.</p>
1535 /// </note>
1536 pub fn get_sse_customer_algorithm(&self) -> &::std::option::Option<::std::string::String> {
1537 &self.sse_customer_algorithm
1538 }
1539 /// <p>Specifies the customer-provided encryption key for Amazon S3 to use in encrypting data. This value is used to store the object and then it is discarded; Amazon S3 does not store the encryption key. The key must be appropriate for use with the algorithm specified in the <code>x-amz-server-side-encryption-customer-algorithm</code> header.</p><note>
1540 /// <p>This functionality is not supported for directory buckets.</p>
1541 /// </note>
1542 pub fn sse_customer_key(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
1543 self.sse_customer_key = ::std::option::Option::Some(input.into());
1544 self
1545 }
1546 /// <p>Specifies the customer-provided encryption key for Amazon S3 to use in encrypting data. This value is used to store the object and then it is discarded; Amazon S3 does not store the encryption key. The key must be appropriate for use with the algorithm specified in the <code>x-amz-server-side-encryption-customer-algorithm</code> header.</p><note>
1547 /// <p>This functionality is not supported for directory buckets.</p>
1548 /// </note>
1549 pub fn set_sse_customer_key(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
1550 self.sse_customer_key = input;
1551 self
1552 }
1553 /// <p>Specifies the customer-provided encryption key for Amazon S3 to use in encrypting data. This value is used to store the object and then it is discarded; Amazon S3 does not store the encryption key. The key must be appropriate for use with the algorithm specified in the <code>x-amz-server-side-encryption-customer-algorithm</code> header.</p><note>
1554 /// <p>This functionality is not supported for directory buckets.</p>
1555 /// </note>
1556 pub fn get_sse_customer_key(&self) -> &::std::option::Option<::std::string::String> {
1557 &self.sse_customer_key
1558 }
1559 /// <p>Specifies the 128-bit MD5 digest of the customer-provided encryption key according to RFC 1321. Amazon S3 uses this header for a message integrity check to ensure that the encryption key was transmitted without error.</p><note>
1560 /// <p>This functionality is not supported for directory buckets.</p>
1561 /// </note>
1562 pub fn sse_customer_key_md5(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
1563 self.sse_customer_key_md5 = ::std::option::Option::Some(input.into());
1564 self
1565 }
1566 /// <p>Specifies the 128-bit MD5 digest of the customer-provided encryption key according to RFC 1321. Amazon S3 uses this header for a message integrity check to ensure that the encryption key was transmitted without error.</p><note>
1567 /// <p>This functionality is not supported for directory buckets.</p>
1568 /// </note>
1569 pub fn set_sse_customer_key_md5(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
1570 self.sse_customer_key_md5 = input;
1571 self
1572 }
1573 /// <p>Specifies the 128-bit MD5 digest of the customer-provided encryption key according to RFC 1321. Amazon S3 uses this header for a message integrity check to ensure that the encryption key was transmitted without error.</p><note>
1574 /// <p>This functionality is not supported for directory buckets.</p>
1575 /// </note>
1576 pub fn get_sse_customer_key_md5(&self) -> &::std::option::Option<::std::string::String> {
1577 &self.sse_customer_key_md5
1578 }
1579 /// <p>Specifies the KMS key ID (Key ID, Key ARN, or Key Alias) to use for object encryption. If the KMS key doesn't exist in the same account that's issuing the command, you must use the full Key ARN not the Key ID.</p>
1580 /// <p><b>General purpose buckets</b> - If you specify <code>x-amz-server-side-encryption</code> with <code>aws:kms</code> or <code>aws:kms:dsse</code>, this header specifies the ID (Key ID, Key ARN, or Key Alias) of the KMS key to use. If you specify <code>x-amz-server-side-encryption:aws:kms</code> or <code>x-amz-server-side-encryption:aws:kms:dsse</code>, but do not provide <code>x-amz-server-side-encryption-aws-kms-key-id</code>, Amazon S3 uses the Amazon Web Services managed key (<code>aws/s3</code>) to protect the data.</p>
1581 /// <p><b>Directory buckets</b> - To encrypt data using SSE-KMS, it's recommended to specify the <code>x-amz-server-side-encryption</code> header to <code>aws:kms</code>. Then, the <code>x-amz-server-side-encryption-aws-kms-key-id</code> header implicitly uses the bucket's default KMS customer managed key ID. If you want to explicitly set the <code> x-amz-server-side-encryption-aws-kms-key-id</code> header, it must match the bucket's default customer managed key (using key ID or ARN, not alias). Your SSE-KMS configuration can only support 1 <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#customer-cmk">customer managed key</a> per directory bucket's lifetime. The <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-managed-cmk">Amazon Web Services managed key</a> (<code>aws/s3</code>) isn't supported. Incorrect key specification results in an HTTP <code>400 Bad Request</code> error.</p>
1582 pub fn ssekms_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
1583 self.ssekms_key_id = ::std::option::Option::Some(input.into());
1584 self
1585 }
1586 /// <p>Specifies the KMS key ID (Key ID, Key ARN, or Key Alias) to use for object encryption. If the KMS key doesn't exist in the same account that's issuing the command, you must use the full Key ARN not the Key ID.</p>
1587 /// <p><b>General purpose buckets</b> - If you specify <code>x-amz-server-side-encryption</code> with <code>aws:kms</code> or <code>aws:kms:dsse</code>, this header specifies the ID (Key ID, Key ARN, or Key Alias) of the KMS key to use. If you specify <code>x-amz-server-side-encryption:aws:kms</code> or <code>x-amz-server-side-encryption:aws:kms:dsse</code>, but do not provide <code>x-amz-server-side-encryption-aws-kms-key-id</code>, Amazon S3 uses the Amazon Web Services managed key (<code>aws/s3</code>) to protect the data.</p>
1588 /// <p><b>Directory buckets</b> - To encrypt data using SSE-KMS, it's recommended to specify the <code>x-amz-server-side-encryption</code> header to <code>aws:kms</code>. Then, the <code>x-amz-server-side-encryption-aws-kms-key-id</code> header implicitly uses the bucket's default KMS customer managed key ID. If you want to explicitly set the <code> x-amz-server-side-encryption-aws-kms-key-id</code> header, it must match the bucket's default customer managed key (using key ID or ARN, not alias). Your SSE-KMS configuration can only support 1 <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#customer-cmk">customer managed key</a> per directory bucket's lifetime. The <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-managed-cmk">Amazon Web Services managed key</a> (<code>aws/s3</code>) isn't supported. Incorrect key specification results in an HTTP <code>400 Bad Request</code> error.</p>
1589 pub fn set_ssekms_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
1590 self.ssekms_key_id = input;
1591 self
1592 }
1593 /// <p>Specifies the KMS key ID (Key ID, Key ARN, or Key Alias) to use for object encryption. If the KMS key doesn't exist in the same account that's issuing the command, you must use the full Key ARN not the Key ID.</p>
1594 /// <p><b>General purpose buckets</b> - If you specify <code>x-amz-server-side-encryption</code> with <code>aws:kms</code> or <code>aws:kms:dsse</code>, this header specifies the ID (Key ID, Key ARN, or Key Alias) of the KMS key to use. If you specify <code>x-amz-server-side-encryption:aws:kms</code> or <code>x-amz-server-side-encryption:aws:kms:dsse</code>, but do not provide <code>x-amz-server-side-encryption-aws-kms-key-id</code>, Amazon S3 uses the Amazon Web Services managed key (<code>aws/s3</code>) to protect the data.</p>
1595 /// <p><b>Directory buckets</b> - To encrypt data using SSE-KMS, it's recommended to specify the <code>x-amz-server-side-encryption</code> header to <code>aws:kms</code>. Then, the <code>x-amz-server-side-encryption-aws-kms-key-id</code> header implicitly uses the bucket's default KMS customer managed key ID. If you want to explicitly set the <code> x-amz-server-side-encryption-aws-kms-key-id</code> header, it must match the bucket's default customer managed key (using key ID or ARN, not alias). Your SSE-KMS configuration can only support 1 <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#customer-cmk">customer managed key</a> per directory bucket's lifetime. The <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-managed-cmk">Amazon Web Services managed key</a> (<code>aws/s3</code>) isn't supported. Incorrect key specification results in an HTTP <code>400 Bad Request</code> error.</p>
1596 pub fn get_ssekms_key_id(&self) -> &::std::option::Option<::std::string::String> {
1597 &self.ssekms_key_id
1598 }
1599 /// <p>Specifies the Amazon Web Services KMS Encryption Context to use for object encryption. The value of this header is a Base64 encoded string of a UTF-8 encoded JSON, which contains the encryption context as key-value pairs.</p>
1600 /// <p><b>Directory buckets</b> - You can optionally provide an explicit encryption context value. The value must match the default encryption context - the bucket Amazon Resource Name (ARN). An additional encryption context value is not supported.</p>
1601 pub fn ssekms_encryption_context(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
1602 self.ssekms_encryption_context = ::std::option::Option::Some(input.into());
1603 self
1604 }
1605 /// <p>Specifies the Amazon Web Services KMS Encryption Context to use for object encryption. The value of this header is a Base64 encoded string of a UTF-8 encoded JSON, which contains the encryption context as key-value pairs.</p>
1606 /// <p><b>Directory buckets</b> - You can optionally provide an explicit encryption context value. The value must match the default encryption context - the bucket Amazon Resource Name (ARN). An additional encryption context value is not supported.</p>
1607 pub fn set_ssekms_encryption_context(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
1608 self.ssekms_encryption_context = input;
1609 self
1610 }
1611 /// <p>Specifies the Amazon Web Services KMS Encryption Context to use for object encryption. The value of this header is a Base64 encoded string of a UTF-8 encoded JSON, which contains the encryption context as key-value pairs.</p>
1612 /// <p><b>Directory buckets</b> - You can optionally provide an explicit encryption context value. The value must match the default encryption context - the bucket Amazon Resource Name (ARN). An additional encryption context value is not supported.</p>
1613 pub fn get_ssekms_encryption_context(&self) -> &::std::option::Option<::std::string::String> {
1614 &self.ssekms_encryption_context
1615 }
1616 /// <p>Specifies whether Amazon S3 should use an S3 Bucket Key for object encryption with server-side encryption using Key Management Service (KMS) keys (SSE-KMS).</p>
1617 /// <p><b>General purpose buckets</b> - Setting this header to <code>true</code> causes Amazon S3 to use an S3 Bucket Key for object encryption with SSE-KMS. Also, specifying this header with a PUT action doesn't affect bucket-level settings for S3 Bucket Key.</p>
1618 /// <p><b>Directory buckets</b> - S3 Bucket Keys are always enabled for <code>GET</code> and <code>PUT</code> operations in a directory bucket and can’t be disabled. S3 Bucket Keys aren't supported, when you copy SSE-KMS encrypted objects from general purpose buckets to directory buckets, from directory buckets to general purpose buckets, or between directory buckets, through <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a>, <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>, <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-buckets-objects-Batch-Ops">the Copy operation in Batch Operations</a>, or <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/create-import-job">the import jobs</a>. In this case, Amazon S3 makes a call to KMS every time a copy request is made for a KMS-encrypted object.</p>
1619 pub fn bucket_key_enabled(mut self, input: bool) -> Self {
1620 self.bucket_key_enabled = ::std::option::Option::Some(input);
1621 self
1622 }
1623 /// <p>Specifies whether Amazon S3 should use an S3 Bucket Key for object encryption with server-side encryption using Key Management Service (KMS) keys (SSE-KMS).</p>
1624 /// <p><b>General purpose buckets</b> - Setting this header to <code>true</code> causes Amazon S3 to use an S3 Bucket Key for object encryption with SSE-KMS. Also, specifying this header with a PUT action doesn't affect bucket-level settings for S3 Bucket Key.</p>
1625 /// <p><b>Directory buckets</b> - S3 Bucket Keys are always enabled for <code>GET</code> and <code>PUT</code> operations in a directory bucket and can’t be disabled. S3 Bucket Keys aren't supported, when you copy SSE-KMS encrypted objects from general purpose buckets to directory buckets, from directory buckets to general purpose buckets, or between directory buckets, through <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a>, <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>, <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-buckets-objects-Batch-Ops">the Copy operation in Batch Operations</a>, or <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/create-import-job">the import jobs</a>. In this case, Amazon S3 makes a call to KMS every time a copy request is made for a KMS-encrypted object.</p>
1626 pub fn set_bucket_key_enabled(mut self, input: ::std::option::Option<bool>) -> Self {
1627 self.bucket_key_enabled = input;
1628 self
1629 }
1630 /// <p>Specifies whether Amazon S3 should use an S3 Bucket Key for object encryption with server-side encryption using Key Management Service (KMS) keys (SSE-KMS).</p>
1631 /// <p><b>General purpose buckets</b> - Setting this header to <code>true</code> causes Amazon S3 to use an S3 Bucket Key for object encryption with SSE-KMS. Also, specifying this header with a PUT action doesn't affect bucket-level settings for S3 Bucket Key.</p>
1632 /// <p><b>Directory buckets</b> - S3 Bucket Keys are always enabled for <code>GET</code> and <code>PUT</code> operations in a directory bucket and can’t be disabled. S3 Bucket Keys aren't supported, when you copy SSE-KMS encrypted objects from general purpose buckets to directory buckets, from directory buckets to general purpose buckets, or between directory buckets, through <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a>, <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>, <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-buckets-objects-Batch-Ops">the Copy operation in Batch Operations</a>, or <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/create-import-job">the import jobs</a>. In this case, Amazon S3 makes a call to KMS every time a copy request is made for a KMS-encrypted object.</p>
1633 pub fn get_bucket_key_enabled(&self) -> &::std::option::Option<bool> {
1634 &self.bucket_key_enabled
1635 }
1636 /// <p>Confirms that the requester knows that they will be charged for the request. Bucket owners need not specify this parameter in their requests. If either the source or destination S3 bucket has Requester Pays enabled, the requester will pay for corresponding charges to copy the object. For information about downloading objects from Requester Pays buckets, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/ObjectsinRequesterPaysBuckets.html">Downloading Objects in Requester Pays Buckets</a> in the <i>Amazon S3 User Guide</i>.</p><note>
1637 /// <p>This functionality is not supported for directory buckets.</p>
1638 /// </note>
1639 pub fn request_payer(mut self, input: crate::types::RequestPayer) -> Self {
1640 self.request_payer = ::std::option::Option::Some(input);
1641 self
1642 }
1643 /// <p>Confirms that the requester knows that they will be charged for the request. Bucket owners need not specify this parameter in their requests. If either the source or destination S3 bucket has Requester Pays enabled, the requester will pay for corresponding charges to copy the object. For information about downloading objects from Requester Pays buckets, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/ObjectsinRequesterPaysBuckets.html">Downloading Objects in Requester Pays Buckets</a> in the <i>Amazon S3 User Guide</i>.</p><note>
1644 /// <p>This functionality is not supported for directory buckets.</p>
1645 /// </note>
1646 pub fn set_request_payer(mut self, input: ::std::option::Option<crate::types::RequestPayer>) -> Self {
1647 self.request_payer = input;
1648 self
1649 }
1650 /// <p>Confirms that the requester knows that they will be charged for the request. Bucket owners need not specify this parameter in their requests. If either the source or destination S3 bucket has Requester Pays enabled, the requester will pay for corresponding charges to copy the object. For information about downloading objects from Requester Pays buckets, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/ObjectsinRequesterPaysBuckets.html">Downloading Objects in Requester Pays Buckets</a> in the <i>Amazon S3 User Guide</i>.</p><note>
1651 /// <p>This functionality is not supported for directory buckets.</p>
1652 /// </note>
1653 pub fn get_request_payer(&self) -> &::std::option::Option<crate::types::RequestPayer> {
1654 &self.request_payer
1655 }
1656 /// <p>The tag-set for the object. The tag-set must be encoded as URL Query parameters.</p><note>
1657 /// <p>This functionality is not supported for directory buckets.</p>
1658 /// </note>
1659 pub fn tagging(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
1660 self.tagging = ::std::option::Option::Some(input.into());
1661 self
1662 }
1663 /// <p>The tag-set for the object. The tag-set must be encoded as URL Query parameters.</p><note>
1664 /// <p>This functionality is not supported for directory buckets.</p>
1665 /// </note>
1666 pub fn set_tagging(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
1667 self.tagging = input;
1668 self
1669 }
1670 /// <p>The tag-set for the object. The tag-set must be encoded as URL Query parameters.</p><note>
1671 /// <p>This functionality is not supported for directory buckets.</p>
1672 /// </note>
1673 pub fn get_tagging(&self) -> &::std::option::Option<::std::string::String> {
1674 &self.tagging
1675 }
1676 /// <p>Specifies the Object Lock mode that you want to apply to the uploaded object.</p><note>
1677 /// <p>This functionality is not supported for directory buckets.</p>
1678 /// </note>
1679 pub fn object_lock_mode(mut self, input: crate::types::ObjectLockMode) -> Self {
1680 self.object_lock_mode = ::std::option::Option::Some(input);
1681 self
1682 }
1683 /// <p>Specifies the Object Lock mode that you want to apply to the uploaded object.</p><note>
1684 /// <p>This functionality is not supported for directory buckets.</p>
1685 /// </note>
1686 pub fn set_object_lock_mode(mut self, input: ::std::option::Option<crate::types::ObjectLockMode>) -> Self {
1687 self.object_lock_mode = input;
1688 self
1689 }
1690 /// <p>Specifies the Object Lock mode that you want to apply to the uploaded object.</p><note>
1691 /// <p>This functionality is not supported for directory buckets.</p>
1692 /// </note>
1693 pub fn get_object_lock_mode(&self) -> &::std::option::Option<crate::types::ObjectLockMode> {
1694 &self.object_lock_mode
1695 }
1696 /// <p>Specifies the date and time when you want the Object Lock to expire.</p><note>
1697 /// <p>This functionality is not supported for directory buckets.</p>
1698 /// </note>
1699 pub fn object_lock_retain_until_date(mut self, input: ::aws_smithy_types::DateTime) -> Self {
1700 self.object_lock_retain_until_date = ::std::option::Option::Some(input);
1701 self
1702 }
1703 /// <p>Specifies the date and time when you want the Object Lock to expire.</p><note>
1704 /// <p>This functionality is not supported for directory buckets.</p>
1705 /// </note>
1706 pub fn set_object_lock_retain_until_date(mut self, input: ::std::option::Option<::aws_smithy_types::DateTime>) -> Self {
1707 self.object_lock_retain_until_date = input;
1708 self
1709 }
1710 /// <p>Specifies the date and time when you want the Object Lock to expire.</p><note>
1711 /// <p>This functionality is not supported for directory buckets.</p>
1712 /// </note>
1713 pub fn get_object_lock_retain_until_date(&self) -> &::std::option::Option<::aws_smithy_types::DateTime> {
1714 &self.object_lock_retain_until_date
1715 }
1716 /// <p>Specifies whether you want to apply a legal hold to the uploaded object.</p><note>
1717 /// <p>This functionality is not supported for directory buckets.</p>
1718 /// </note>
1719 pub fn object_lock_legal_hold_status(mut self, input: crate::types::ObjectLockLegalHoldStatus) -> Self {
1720 self.object_lock_legal_hold_status = ::std::option::Option::Some(input);
1721 self
1722 }
1723 /// <p>Specifies whether you want to apply a legal hold to the uploaded object.</p><note>
1724 /// <p>This functionality is not supported for directory buckets.</p>
1725 /// </note>
1726 pub fn set_object_lock_legal_hold_status(mut self, input: ::std::option::Option<crate::types::ObjectLockLegalHoldStatus>) -> Self {
1727 self.object_lock_legal_hold_status = input;
1728 self
1729 }
1730 /// <p>Specifies whether you want to apply a legal hold to the uploaded object.</p><note>
1731 /// <p>This functionality is not supported for directory buckets.</p>
1732 /// </note>
1733 pub fn get_object_lock_legal_hold_status(&self) -> &::std::option::Option<crate::types::ObjectLockLegalHoldStatus> {
1734 &self.object_lock_legal_hold_status
1735 }
1736 /// <p>The account ID of the expected bucket owner. If the account ID that you provide does not match the actual owner of the bucket, the request fails with the HTTP status code <code>403 Forbidden</code> (access denied).</p>
1737 pub fn expected_bucket_owner(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
1738 self.expected_bucket_owner = ::std::option::Option::Some(input.into());
1739 self
1740 }
1741 /// <p>The account ID of the expected bucket owner. If the account ID that you provide does not match the actual owner of the bucket, the request fails with the HTTP status code <code>403 Forbidden</code> (access denied).</p>
1742 pub fn set_expected_bucket_owner(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
1743 self.expected_bucket_owner = input;
1744 self
1745 }
1746 /// <p>The account ID of the expected bucket owner. If the account ID that you provide does not match the actual owner of the bucket, the request fails with the HTTP status code <code>403 Forbidden</code> (access denied).</p>
1747 pub fn get_expected_bucket_owner(&self) -> &::std::option::Option<::std::string::String> {
1748 &self.expected_bucket_owner
1749 }
1750 /// <p>Indicates the algorithm that you want Amazon S3 to use to create the checksum for the object. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html">Checking object integrity</a> in the <i>Amazon S3 User Guide</i>.</p>
1751 pub fn checksum_algorithm(mut self, input: crate::types::ChecksumAlgorithm) -> Self {
1752 self.checksum_algorithm = ::std::option::Option::Some(input);
1753 self
1754 }
1755 /// <p>Indicates the algorithm that you want Amazon S3 to use to create the checksum for the object. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html">Checking object integrity</a> in the <i>Amazon S3 User Guide</i>.</p>
1756 pub fn set_checksum_algorithm(mut self, input: ::std::option::Option<crate::types::ChecksumAlgorithm>) -> Self {
1757 self.checksum_algorithm = input;
1758 self
1759 }
1760 /// <p>Indicates the algorithm that you want Amazon S3 to use to create the checksum for the object. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html">Checking object integrity</a> in the <i>Amazon S3 User Guide</i>.</p>
1761 pub fn get_checksum_algorithm(&self) -> &::std::option::Option<crate::types::ChecksumAlgorithm> {
1762 &self.checksum_algorithm
1763 }
1764 /// <p>Indicates the checksum type that you want Amazon S3 to use to calculate the object’s checksum value. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html">Checking object integrity in the Amazon S3 User Guide</a>.</p>
1765 pub fn checksum_type(mut self, input: crate::types::ChecksumType) -> Self {
1766 self.checksum_type = ::std::option::Option::Some(input);
1767 self
1768 }
1769 /// <p>Indicates the checksum type that you want Amazon S3 to use to calculate the object’s checksum value. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html">Checking object integrity in the Amazon S3 User Guide</a>.</p>
1770 pub fn set_checksum_type(mut self, input: ::std::option::Option<crate::types::ChecksumType>) -> Self {
1771 self.checksum_type = input;
1772 self
1773 }
1774 /// <p>Indicates the checksum type that you want Amazon S3 to use to calculate the object’s checksum value. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html">Checking object integrity in the Amazon S3 User Guide</a>.</p>
1775 pub fn get_checksum_type(&self) -> &::std::option::Option<crate::types::ChecksumType> {
1776 &self.checksum_type
1777 }
1778 /// Consumes the builder and constructs a [`CreateMultipartUploadInput`](crate::operation::create_multipart_upload::CreateMultipartUploadInput).
1779 pub fn build(
1780 self,
1781 ) -> ::std::result::Result<crate::operation::create_multipart_upload::CreateMultipartUploadInput, ::aws_smithy_types::error::operation::BuildError>
1782 {
1783 ::std::result::Result::Ok(crate::operation::create_multipart_upload::CreateMultipartUploadInput {
1784 acl: self.acl,
1785 bucket: self.bucket,
1786 cache_control: self.cache_control,
1787 content_disposition: self.content_disposition,
1788 content_encoding: self.content_encoding,
1789 content_language: self.content_language,
1790 content_type: self.content_type,
1791 expires: self.expires,
1792 grant_full_control: self.grant_full_control,
1793 grant_read: self.grant_read,
1794 grant_read_acp: self.grant_read_acp,
1795 grant_write_acp: self.grant_write_acp,
1796 key: self.key,
1797 metadata: self.metadata,
1798 server_side_encryption: self.server_side_encryption,
1799 storage_class: self.storage_class,
1800 website_redirect_location: self.website_redirect_location,
1801 sse_customer_algorithm: self.sse_customer_algorithm,
1802 sse_customer_key: self.sse_customer_key,
1803 sse_customer_key_md5: self.sse_customer_key_md5,
1804 ssekms_key_id: self.ssekms_key_id,
1805 ssekms_encryption_context: self.ssekms_encryption_context,
1806 bucket_key_enabled: self.bucket_key_enabled,
1807 request_payer: self.request_payer,
1808 tagging: self.tagging,
1809 object_lock_mode: self.object_lock_mode,
1810 object_lock_retain_until_date: self.object_lock_retain_until_date,
1811 object_lock_legal_hold_status: self.object_lock_legal_hold_status,
1812 expected_bucket_owner: self.expected_bucket_owner,
1813 checksum_algorithm: self.checksum_algorithm,
1814 checksum_type: self.checksum_type,
1815 })
1816 }
1817}
1818impl ::std::fmt::Debug for CreateMultipartUploadInputBuilder {
1819 fn fmt(&self, f: &mut ::std::fmt::Formatter<'_>) -> ::std::fmt::Result {
1820 let mut formatter = f.debug_struct("CreateMultipartUploadInputBuilder");
1821 formatter.field("acl", &self.acl);
1822 formatter.field("bucket", &self.bucket);
1823 formatter.field("cache_control", &self.cache_control);
1824 formatter.field("content_disposition", &self.content_disposition);
1825 formatter.field("content_encoding", &self.content_encoding);
1826 formatter.field("content_language", &self.content_language);
1827 formatter.field("content_type", &self.content_type);
1828 formatter.field("expires", &self.expires);
1829 formatter.field("grant_full_control", &self.grant_full_control);
1830 formatter.field("grant_read", &self.grant_read);
1831 formatter.field("grant_read_acp", &self.grant_read_acp);
1832 formatter.field("grant_write_acp", &self.grant_write_acp);
1833 formatter.field("key", &self.key);
1834 formatter.field("metadata", &self.metadata);
1835 formatter.field("server_side_encryption", &self.server_side_encryption);
1836 formatter.field("storage_class", &self.storage_class);
1837 formatter.field("website_redirect_location", &self.website_redirect_location);
1838 formatter.field("sse_customer_algorithm", &self.sse_customer_algorithm);
1839 formatter.field("sse_customer_key", &"*** Sensitive Data Redacted ***");
1840 formatter.field("sse_customer_key_md5", &self.sse_customer_key_md5);
1841 formatter.field("ssekms_key_id", &"*** Sensitive Data Redacted ***");
1842 formatter.field("ssekms_encryption_context", &"*** Sensitive Data Redacted ***");
1843 formatter.field("bucket_key_enabled", &self.bucket_key_enabled);
1844 formatter.field("request_payer", &self.request_payer);
1845 formatter.field("tagging", &self.tagging);
1846 formatter.field("object_lock_mode", &self.object_lock_mode);
1847 formatter.field("object_lock_retain_until_date", &self.object_lock_retain_until_date);
1848 formatter.field("object_lock_legal_hold_status", &self.object_lock_legal_hold_status);
1849 formatter.field("expected_bucket_owner", &self.expected_bucket_owner);
1850 formatter.field("checksum_algorithm", &self.checksum_algorithm);
1851 formatter.field("checksum_type", &self.checksum_type);
1852 formatter.finish()
1853 }
1854}