aws_sdk_s3/operation/create_multipart_upload/
_create_multipart_upload_input.rs

1// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
2#[allow(missing_docs)] // documentation missing in model
3#[non_exhaustive]
4#[derive(::std::clone::Clone, ::std::cmp::PartialEq)]
5pub struct CreateMultipartUploadInput {
6    /// <p>The canned ACL to apply to the object. Amazon S3 supports a set of predefined ACLs, known as <i>canned ACLs</i>. Each canned ACL has a predefined set of grantees and permissions. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html#CannedACL">Canned ACL</a> in the <i>Amazon S3 User Guide</i>.</p>
7    /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can grant access permissions to individual Amazon Web Services accounts or to predefined groups defined by Amazon S3. These permissions are then added to the access control list (ACL) on the new object. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/S3_ACLs_UsingACLs.html">Using ACLs</a>. One way to grant the permissions using the request headers is to specify a canned ACL with the <code>x-amz-acl</code> request header.</p><note>
8    /// <ul>
9    /// <li>
10    /// <p>This functionality is not supported for directory buckets.</p></li>
11    /// <li>
12    /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
13    /// </ul>
14    /// </note>
15    pub acl: ::std::option::Option<crate::types::ObjectCannedAcl>,
16    /// <p>The name of the bucket where the multipart upload is initiated and where the object is uploaded.</p>
17    /// <p><b>Directory buckets</b> - When you use this operation with a directory bucket, you must use virtual-hosted-style requests in the format <code> <i>Bucket-name</i>.s3express-<i>zone-id</i>.<i>region-code</i>.amazonaws.com</code>. Path-style requests are not supported. Directory bucket names must be unique in the chosen Zone (Availability Zone or Local Zone). Bucket names must follow the format <code> <i>bucket-base-name</i>--<i>zone-id</i>--x-s3</code> (for example, <code> <i>amzn-s3-demo-bucket</i>--<i>usw2-az1</i>--x-s3</code>). For information about bucket naming restrictions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-bucket-naming-rules.html">Directory bucket naming rules</a> in the <i>Amazon S3 User Guide</i>.</p>
18    /// <p><b>Access points</b> - When you use this action with an access point, you must provide the alias of the access point in place of the bucket name or specify the access point ARN. When using the access point ARN, you must direct requests to the access point hostname. The access point hostname takes the form <i>AccessPointName</i>-<i>AccountId</i>.s3-accesspoint.<i>Region</i>.amazonaws.com. When using this action with an access point through the Amazon Web Services SDKs, you provide the access point ARN in place of the bucket name. For more information about access point ARNs, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-access-points.html">Using access points</a> in the <i>Amazon S3 User Guide</i>.</p><note>
19    /// <p>Access points and Object Lambda access points are not supported by directory buckets.</p>
20    /// </note>
21    /// <p><b>S3 on Outposts</b> - When you use this action with S3 on Outposts, you must direct requests to the S3 on Outposts hostname. The S3 on Outposts hostname takes the form <code> <i>AccessPointName</i>-<i>AccountId</i>.<i>outpostID</i>.s3-outposts.<i>Region</i>.amazonaws.com</code>. When you use this action with S3 on Outposts, the destination bucket must be the Outposts access point ARN or the access point alias. For more information about S3 on Outposts, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/S3onOutposts.html">What is S3 on Outposts?</a> in the <i>Amazon S3 User Guide</i>.</p>
22    pub bucket: ::std::option::Option<::std::string::String>,
23    /// <p>Specifies caching behavior along the request/reply chain.</p>
24    pub cache_control: ::std::option::Option<::std::string::String>,
25    /// <p>Specifies presentational information for the object.</p>
26    pub content_disposition: ::std::option::Option<::std::string::String>,
27    /// <p>Specifies what content encodings have been applied to the object and thus what decoding mechanisms must be applied to obtain the media-type referenced by the Content-Type header field.</p><note>
28    /// <p>For directory buckets, only the <code>aws-chunked</code> value is supported in this header field.</p>
29    /// </note>
30    pub content_encoding: ::std::option::Option<::std::string::String>,
31    /// <p>The language that the content is in.</p>
32    pub content_language: ::std::option::Option<::std::string::String>,
33    /// <p>A standard MIME type describing the format of the object data.</p>
34    pub content_type: ::std::option::Option<::std::string::String>,
35    /// <p>The date and time at which the object is no longer cacheable.</p>
36    pub expires: ::std::option::Option<::aws_smithy_types::DateTime>,
37    /// <p>Specify access permissions explicitly to give the grantee READ, READ_ACP, and WRITE_ACP permissions on the object.</p>
38    /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
39    /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
40    /// <ul>
41    /// <li>
42    /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
43    /// <li>
44    /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
45    /// <li>
46    /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
47    /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
48    /// <ul>
49    /// <li>
50    /// <p>US East (N. Virginia)</p></li>
51    /// <li>
52    /// <p>US West (N. California)</p></li>
53    /// <li>
54    /// <p>US West (Oregon)</p></li>
55    /// <li>
56    /// <p>Asia Pacific (Singapore)</p></li>
57    /// <li>
58    /// <p>Asia Pacific (Sydney)</p></li>
59    /// <li>
60    /// <p>Asia Pacific (Tokyo)</p></li>
61    /// <li>
62    /// <p>Europe (Ireland)</p></li>
63    /// <li>
64    /// <p>South America (São Paulo)</p></li>
65    /// </ul>
66    /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
67    /// </note></li>
68    /// </ul>
69    /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
70    /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
71    /// <ul>
72    /// <li>
73    /// <p>This functionality is not supported for directory buckets.</p></li>
74    /// <li>
75    /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
76    /// </ul>
77    /// </note>
78    pub grant_full_control: ::std::option::Option<::std::string::String>,
79    /// <p>Specify access permissions explicitly to allow grantee to read the object data and its metadata.</p>
80    /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
81    /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
82    /// <ul>
83    /// <li>
84    /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
85    /// <li>
86    /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
87    /// <li>
88    /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
89    /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
90    /// <ul>
91    /// <li>
92    /// <p>US East (N. Virginia)</p></li>
93    /// <li>
94    /// <p>US West (N. California)</p></li>
95    /// <li>
96    /// <p>US West (Oregon)</p></li>
97    /// <li>
98    /// <p>Asia Pacific (Singapore)</p></li>
99    /// <li>
100    /// <p>Asia Pacific (Sydney)</p></li>
101    /// <li>
102    /// <p>Asia Pacific (Tokyo)</p></li>
103    /// <li>
104    /// <p>Europe (Ireland)</p></li>
105    /// <li>
106    /// <p>South America (São Paulo)</p></li>
107    /// </ul>
108    /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
109    /// </note></li>
110    /// </ul>
111    /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
112    /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
113    /// <ul>
114    /// <li>
115    /// <p>This functionality is not supported for directory buckets.</p></li>
116    /// <li>
117    /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
118    /// </ul>
119    /// </note>
120    pub grant_read: ::std::option::Option<::std::string::String>,
121    /// <p>Specify access permissions explicitly to allows grantee to read the object ACL.</p>
122    /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
123    /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
124    /// <ul>
125    /// <li>
126    /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
127    /// <li>
128    /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
129    /// <li>
130    /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
131    /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
132    /// <ul>
133    /// <li>
134    /// <p>US East (N. Virginia)</p></li>
135    /// <li>
136    /// <p>US West (N. California)</p></li>
137    /// <li>
138    /// <p>US West (Oregon)</p></li>
139    /// <li>
140    /// <p>Asia Pacific (Singapore)</p></li>
141    /// <li>
142    /// <p>Asia Pacific (Sydney)</p></li>
143    /// <li>
144    /// <p>Asia Pacific (Tokyo)</p></li>
145    /// <li>
146    /// <p>Europe (Ireland)</p></li>
147    /// <li>
148    /// <p>South America (São Paulo)</p></li>
149    /// </ul>
150    /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
151    /// </note></li>
152    /// </ul>
153    /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
154    /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
155    /// <ul>
156    /// <li>
157    /// <p>This functionality is not supported for directory buckets.</p></li>
158    /// <li>
159    /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
160    /// </ul>
161    /// </note>
162    pub grant_read_acp: ::std::option::Option<::std::string::String>,
163    /// <p>Specify access permissions explicitly to allows grantee to allow grantee to write the ACL for the applicable object.</p>
164    /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
165    /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
166    /// <ul>
167    /// <li>
168    /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
169    /// <li>
170    /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
171    /// <li>
172    /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
173    /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
174    /// <ul>
175    /// <li>
176    /// <p>US East (N. Virginia)</p></li>
177    /// <li>
178    /// <p>US West (N. California)</p></li>
179    /// <li>
180    /// <p>US West (Oregon)</p></li>
181    /// <li>
182    /// <p>Asia Pacific (Singapore)</p></li>
183    /// <li>
184    /// <p>Asia Pacific (Sydney)</p></li>
185    /// <li>
186    /// <p>Asia Pacific (Tokyo)</p></li>
187    /// <li>
188    /// <p>Europe (Ireland)</p></li>
189    /// <li>
190    /// <p>South America (São Paulo)</p></li>
191    /// </ul>
192    /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
193    /// </note></li>
194    /// </ul>
195    /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
196    /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
197    /// <ul>
198    /// <li>
199    /// <p>This functionality is not supported for directory buckets.</p></li>
200    /// <li>
201    /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
202    /// </ul>
203    /// </note>
204    pub grant_write_acp: ::std::option::Option<::std::string::String>,
205    /// <p>Object key for which the multipart upload is to be initiated.</p>
206    pub key: ::std::option::Option<::std::string::String>,
207    /// <p>A map of metadata to store with the object in S3.</p>
208    pub metadata: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>,
209    /// <p>The server-side encryption algorithm used when you store this object in Amazon S3 (for example, <code>AES256</code>, <code>aws:kms</code>).</p>
210    /// <ul>
211    /// <li>
212    /// <p><b>Directory buckets </b> - For directory buckets, there are only two supported options for server-side encryption: server-side encryption with Amazon S3 managed keys (SSE-S3) (<code>AES256</code>) and server-side encryption with KMS keys (SSE-KMS) (<code>aws:kms</code>). We recommend that the bucket's default encryption uses the desired encryption configuration and you don't override the bucket default encryption in your <code>CreateSession</code> requests or <code>PUT</code> object requests. Then, new objects are automatically encrypted with the desired encryption settings. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-serv-side-encryption.html">Protecting data with server-side encryption</a> in the <i>Amazon S3 User Guide</i>. For more information about the encryption overriding behaviors in directory buckets, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-specifying-kms-encryption.html">Specifying server-side encryption with KMS for new object uploads</a>.</p>
213    /// <p>In the Zonal endpoint API calls (except <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>) using the REST API, the encryption request headers must match the encryption settings that are specified in the <code>CreateSession</code> request. You can't override the values of the encryption settings (<code>x-amz-server-side-encryption</code>, <code>x-amz-server-side-encryption-aws-kms-key-id</code>, <code>x-amz-server-side-encryption-context</code>, and <code>x-amz-server-side-encryption-bucket-key-enabled</code>) that are specified in the <code>CreateSession</code> request. You don't need to explicitly specify these encryption settings values in Zonal endpoint API calls, and Amazon S3 will use the encryption settings values from the <code>CreateSession</code> request to protect new objects in the directory bucket.</p><note>
214    /// <p>When you use the CLI or the Amazon Web Services SDKs, for <code>CreateSession</code>, the session token refreshes automatically to avoid service interruptions when a session expires. The CLI or the Amazon Web Services SDKs use the bucket's default encryption configuration for the <code>CreateSession</code> request. It's not supported to override the encryption settings values in the <code>CreateSession</code> request. So in the Zonal endpoint API calls (except <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>), the encryption request headers must match the default encryption configuration of the directory bucket.</p>
215    /// </note></li>
216    /// </ul>
217    pub server_side_encryption: ::std::option::Option<crate::types::ServerSideEncryption>,
218    /// <p>By default, Amazon S3 uses the STANDARD Storage Class to store newly created objects. The STANDARD storage class provides high durability and high availability. Depending on performance needs, you can specify a different Storage Class. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/storage-class-intro.html">Storage Classes</a> in the <i>Amazon S3 User Guide</i>.</p><note>
219    /// <ul>
220    /// <li>
221    /// <p>For directory buckets, only the S3 Express One Zone storage class is supported to store newly created objects.</p></li>
222    /// <li>
223    /// <p>Amazon S3 on Outposts only uses the OUTPOSTS Storage Class.</p></li>
224    /// </ul>
225    /// </note>
226    pub storage_class: ::std::option::Option<crate::types::StorageClass>,
227    /// <p>If the bucket is configured as a website, redirects requests for this object to another object in the same bucket or to an external URL. Amazon S3 stores the value of this header in the object metadata.</p><note>
228    /// <p>This functionality is not supported for directory buckets.</p>
229    /// </note>
230    pub website_redirect_location: ::std::option::Option<::std::string::String>,
231    /// <p>Specifies the algorithm to use when encrypting the object (for example, AES256).</p><note>
232    /// <p>This functionality is not supported for directory buckets.</p>
233    /// </note>
234    pub sse_customer_algorithm: ::std::option::Option<::std::string::String>,
235    /// <p>Specifies the customer-provided encryption key for Amazon S3 to use in encrypting data. This value is used to store the object and then it is discarded; Amazon S3 does not store the encryption key. The key must be appropriate for use with the algorithm specified in the <code>x-amz-server-side-encryption-customer-algorithm</code> header.</p><note>
236    /// <p>This functionality is not supported for directory buckets.</p>
237    /// </note>
238    pub sse_customer_key: ::std::option::Option<::std::string::String>,
239    /// <p>Specifies the 128-bit MD5 digest of the customer-provided encryption key according to RFC 1321. Amazon S3 uses this header for a message integrity check to ensure that the encryption key was transmitted without error.</p><note>
240    /// <p>This functionality is not supported for directory buckets.</p>
241    /// </note>
242    pub sse_customer_key_md5: ::std::option::Option<::std::string::String>,
243    /// <p>Specifies the KMS key ID (Key ID, Key ARN, or Key Alias) to use for object encryption. If the KMS key doesn't exist in the same account that's issuing the command, you must use the full Key ARN not the Key ID.</p>
244    /// <p><b>General purpose buckets</b> - If you specify <code>x-amz-server-side-encryption</code> with <code>aws:kms</code> or <code>aws:kms:dsse</code>, this header specifies the ID (Key ID, Key ARN, or Key Alias) of the KMS key to use. If you specify <code>x-amz-server-side-encryption:aws:kms</code> or <code>x-amz-server-side-encryption:aws:kms:dsse</code>, but do not provide <code>x-amz-server-side-encryption-aws-kms-key-id</code>, Amazon S3 uses the Amazon Web Services managed key (<code>aws/s3</code>) to protect the data.</p>
245    /// <p><b>Directory buckets</b> - To encrypt data using SSE-KMS, it's recommended to specify the <code>x-amz-server-side-encryption</code> header to <code>aws:kms</code>. Then, the <code>x-amz-server-side-encryption-aws-kms-key-id</code> header implicitly uses the bucket's default KMS customer managed key ID. If you want to explicitly set the <code> x-amz-server-side-encryption-aws-kms-key-id</code> header, it must match the bucket's default customer managed key (using key ID or ARN, not alias). Your SSE-KMS configuration can only support 1 <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#customer-cmk">customer managed key</a> per directory bucket's lifetime. The <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-managed-cmk">Amazon Web Services managed key</a> (<code>aws/s3</code>) isn't supported. Incorrect key specification results in an HTTP <code>400 Bad Request</code> error.</p>
246    pub ssekms_key_id: ::std::option::Option<::std::string::String>,
247    /// <p>Specifies the Amazon Web Services KMS Encryption Context to use for object encryption. The value of this header is a Base64 encoded string of a UTF-8 encoded JSON, which contains the encryption context as key-value pairs.</p>
248    /// <p><b>Directory buckets</b> - You can optionally provide an explicit encryption context value. The value must match the default encryption context - the bucket Amazon Resource Name (ARN). An additional encryption context value is not supported.</p>
249    pub ssekms_encryption_context: ::std::option::Option<::std::string::String>,
250    /// <p>Specifies whether Amazon S3 should use an S3 Bucket Key for object encryption with server-side encryption using Key Management Service (KMS) keys (SSE-KMS).</p>
251    /// <p><b>General purpose buckets</b> - Setting this header to <code>true</code> causes Amazon S3 to use an S3 Bucket Key for object encryption with SSE-KMS. Also, specifying this header with a PUT action doesn't affect bucket-level settings for S3 Bucket Key.</p>
252    /// <p><b>Directory buckets</b> - S3 Bucket Keys are always enabled for <code>GET</code> and <code>PUT</code> operations in a directory bucket and can’t be disabled. S3 Bucket Keys aren't supported, when you copy SSE-KMS encrypted objects from general purpose buckets to directory buckets, from directory buckets to general purpose buckets, or between directory buckets, through <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a>, <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>, <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-buckets-objects-Batch-Ops">the Copy operation in Batch Operations</a>, or <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/create-import-job">the import jobs</a>. In this case, Amazon S3 makes a call to KMS every time a copy request is made for a KMS-encrypted object.</p>
253    pub bucket_key_enabled: ::std::option::Option<bool>,
254    /// <p>Confirms that the requester knows that they will be charged for the request. Bucket owners need not specify this parameter in their requests. If either the source or destination S3 bucket has Requester Pays enabled, the requester will pay for corresponding charges to copy the object. For information about downloading objects from Requester Pays buckets, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/ObjectsinRequesterPaysBuckets.html">Downloading Objects in Requester Pays Buckets</a> in the <i>Amazon S3 User Guide</i>.</p><note>
255    /// <p>This functionality is not supported for directory buckets.</p>
256    /// </note>
257    pub request_payer: ::std::option::Option<crate::types::RequestPayer>,
258    /// <p>The tag-set for the object. The tag-set must be encoded as URL Query parameters.</p><note>
259    /// <p>This functionality is not supported for directory buckets.</p>
260    /// </note>
261    pub tagging: ::std::option::Option<::std::string::String>,
262    /// <p>Specifies the Object Lock mode that you want to apply to the uploaded object.</p><note>
263    /// <p>This functionality is not supported for directory buckets.</p>
264    /// </note>
265    pub object_lock_mode: ::std::option::Option<crate::types::ObjectLockMode>,
266    /// <p>Specifies the date and time when you want the Object Lock to expire.</p><note>
267    /// <p>This functionality is not supported for directory buckets.</p>
268    /// </note>
269    pub object_lock_retain_until_date: ::std::option::Option<::aws_smithy_types::DateTime>,
270    /// <p>Specifies whether you want to apply a legal hold to the uploaded object.</p><note>
271    /// <p>This functionality is not supported for directory buckets.</p>
272    /// </note>
273    pub object_lock_legal_hold_status: ::std::option::Option<crate::types::ObjectLockLegalHoldStatus>,
274    /// <p>The account ID of the expected bucket owner. If the account ID that you provide does not match the actual owner of the bucket, the request fails with the HTTP status code <code>403 Forbidden</code> (access denied).</p>
275    pub expected_bucket_owner: ::std::option::Option<::std::string::String>,
276    /// <p>Indicates the algorithm that you want Amazon S3 to use to create the checksum for the object. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html">Checking object integrity</a> in the <i>Amazon S3 User Guide</i>.</p>
277    pub checksum_algorithm: ::std::option::Option<crate::types::ChecksumAlgorithm>,
278    /// <p>Indicates the checksum type that you want Amazon S3 to use to calculate the object’s checksum value. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html">Checking object integrity in the Amazon S3 User Guide</a>.</p>
279    pub checksum_type: ::std::option::Option<crate::types::ChecksumType>,
280}
281impl CreateMultipartUploadInput {
282    /// <p>The canned ACL to apply to the object. Amazon S3 supports a set of predefined ACLs, known as <i>canned ACLs</i>. Each canned ACL has a predefined set of grantees and permissions. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html#CannedACL">Canned ACL</a> in the <i>Amazon S3 User Guide</i>.</p>
283    /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can grant access permissions to individual Amazon Web Services accounts or to predefined groups defined by Amazon S3. These permissions are then added to the access control list (ACL) on the new object. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/S3_ACLs_UsingACLs.html">Using ACLs</a>. One way to grant the permissions using the request headers is to specify a canned ACL with the <code>x-amz-acl</code> request header.</p><note>
284    /// <ul>
285    /// <li>
286    /// <p>This functionality is not supported for directory buckets.</p></li>
287    /// <li>
288    /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
289    /// </ul>
290    /// </note>
291    pub fn acl(&self) -> ::std::option::Option<&crate::types::ObjectCannedAcl> {
292        self.acl.as_ref()
293    }
294    /// <p>The name of the bucket where the multipart upload is initiated and where the object is uploaded.</p>
295    /// <p><b>Directory buckets</b> - When you use this operation with a directory bucket, you must use virtual-hosted-style requests in the format <code> <i>Bucket-name</i>.s3express-<i>zone-id</i>.<i>region-code</i>.amazonaws.com</code>. Path-style requests are not supported. Directory bucket names must be unique in the chosen Zone (Availability Zone or Local Zone). Bucket names must follow the format <code> <i>bucket-base-name</i>--<i>zone-id</i>--x-s3</code> (for example, <code> <i>amzn-s3-demo-bucket</i>--<i>usw2-az1</i>--x-s3</code>). For information about bucket naming restrictions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-bucket-naming-rules.html">Directory bucket naming rules</a> in the <i>Amazon S3 User Guide</i>.</p>
296    /// <p><b>Access points</b> - When you use this action with an access point, you must provide the alias of the access point in place of the bucket name or specify the access point ARN. When using the access point ARN, you must direct requests to the access point hostname. The access point hostname takes the form <i>AccessPointName</i>-<i>AccountId</i>.s3-accesspoint.<i>Region</i>.amazonaws.com. When using this action with an access point through the Amazon Web Services SDKs, you provide the access point ARN in place of the bucket name. For more information about access point ARNs, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-access-points.html">Using access points</a> in the <i>Amazon S3 User Guide</i>.</p><note>
297    /// <p>Access points and Object Lambda access points are not supported by directory buckets.</p>
298    /// </note>
299    /// <p><b>S3 on Outposts</b> - When you use this action with S3 on Outposts, you must direct requests to the S3 on Outposts hostname. The S3 on Outposts hostname takes the form <code> <i>AccessPointName</i>-<i>AccountId</i>.<i>outpostID</i>.s3-outposts.<i>Region</i>.amazonaws.com</code>. When you use this action with S3 on Outposts, the destination bucket must be the Outposts access point ARN or the access point alias. For more information about S3 on Outposts, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/S3onOutposts.html">What is S3 on Outposts?</a> in the <i>Amazon S3 User Guide</i>.</p>
300    pub fn bucket(&self) -> ::std::option::Option<&str> {
301        self.bucket.as_deref()
302    }
303    /// <p>Specifies caching behavior along the request/reply chain.</p>
304    pub fn cache_control(&self) -> ::std::option::Option<&str> {
305        self.cache_control.as_deref()
306    }
307    /// <p>Specifies presentational information for the object.</p>
308    pub fn content_disposition(&self) -> ::std::option::Option<&str> {
309        self.content_disposition.as_deref()
310    }
311    /// <p>Specifies what content encodings have been applied to the object and thus what decoding mechanisms must be applied to obtain the media-type referenced by the Content-Type header field.</p><note>
312    /// <p>For directory buckets, only the <code>aws-chunked</code> value is supported in this header field.</p>
313    /// </note>
314    pub fn content_encoding(&self) -> ::std::option::Option<&str> {
315        self.content_encoding.as_deref()
316    }
317    /// <p>The language that the content is in.</p>
318    pub fn content_language(&self) -> ::std::option::Option<&str> {
319        self.content_language.as_deref()
320    }
321    /// <p>A standard MIME type describing the format of the object data.</p>
322    pub fn content_type(&self) -> ::std::option::Option<&str> {
323        self.content_type.as_deref()
324    }
325    /// <p>The date and time at which the object is no longer cacheable.</p>
326    pub fn expires(&self) -> ::std::option::Option<&::aws_smithy_types::DateTime> {
327        self.expires.as_ref()
328    }
329    /// <p>Specify access permissions explicitly to give the grantee READ, READ_ACP, and WRITE_ACP permissions on the object.</p>
330    /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
331    /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
332    /// <ul>
333    /// <li>
334    /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
335    /// <li>
336    /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
337    /// <li>
338    /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
339    /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
340    /// <ul>
341    /// <li>
342    /// <p>US East (N. Virginia)</p></li>
343    /// <li>
344    /// <p>US West (N. California)</p></li>
345    /// <li>
346    /// <p>US West (Oregon)</p></li>
347    /// <li>
348    /// <p>Asia Pacific (Singapore)</p></li>
349    /// <li>
350    /// <p>Asia Pacific (Sydney)</p></li>
351    /// <li>
352    /// <p>Asia Pacific (Tokyo)</p></li>
353    /// <li>
354    /// <p>Europe (Ireland)</p></li>
355    /// <li>
356    /// <p>South America (São Paulo)</p></li>
357    /// </ul>
358    /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
359    /// </note></li>
360    /// </ul>
361    /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
362    /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
363    /// <ul>
364    /// <li>
365    /// <p>This functionality is not supported for directory buckets.</p></li>
366    /// <li>
367    /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
368    /// </ul>
369    /// </note>
370    pub fn grant_full_control(&self) -> ::std::option::Option<&str> {
371        self.grant_full_control.as_deref()
372    }
373    /// <p>Specify access permissions explicitly to allow grantee to read the object data and its metadata.</p>
374    /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
375    /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
376    /// <ul>
377    /// <li>
378    /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
379    /// <li>
380    /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
381    /// <li>
382    /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
383    /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
384    /// <ul>
385    /// <li>
386    /// <p>US East (N. Virginia)</p></li>
387    /// <li>
388    /// <p>US West (N. California)</p></li>
389    /// <li>
390    /// <p>US West (Oregon)</p></li>
391    /// <li>
392    /// <p>Asia Pacific (Singapore)</p></li>
393    /// <li>
394    /// <p>Asia Pacific (Sydney)</p></li>
395    /// <li>
396    /// <p>Asia Pacific (Tokyo)</p></li>
397    /// <li>
398    /// <p>Europe (Ireland)</p></li>
399    /// <li>
400    /// <p>South America (São Paulo)</p></li>
401    /// </ul>
402    /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
403    /// </note></li>
404    /// </ul>
405    /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
406    /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
407    /// <ul>
408    /// <li>
409    /// <p>This functionality is not supported for directory buckets.</p></li>
410    /// <li>
411    /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
412    /// </ul>
413    /// </note>
414    pub fn grant_read(&self) -> ::std::option::Option<&str> {
415        self.grant_read.as_deref()
416    }
417    /// <p>Specify access permissions explicitly to allows grantee to read the object ACL.</p>
418    /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
419    /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
420    /// <ul>
421    /// <li>
422    /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
423    /// <li>
424    /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
425    /// <li>
426    /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
427    /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
428    /// <ul>
429    /// <li>
430    /// <p>US East (N. Virginia)</p></li>
431    /// <li>
432    /// <p>US West (N. California)</p></li>
433    /// <li>
434    /// <p>US West (Oregon)</p></li>
435    /// <li>
436    /// <p>Asia Pacific (Singapore)</p></li>
437    /// <li>
438    /// <p>Asia Pacific (Sydney)</p></li>
439    /// <li>
440    /// <p>Asia Pacific (Tokyo)</p></li>
441    /// <li>
442    /// <p>Europe (Ireland)</p></li>
443    /// <li>
444    /// <p>South America (São Paulo)</p></li>
445    /// </ul>
446    /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
447    /// </note></li>
448    /// </ul>
449    /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
450    /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
451    /// <ul>
452    /// <li>
453    /// <p>This functionality is not supported for directory buckets.</p></li>
454    /// <li>
455    /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
456    /// </ul>
457    /// </note>
458    pub fn grant_read_acp(&self) -> ::std::option::Option<&str> {
459        self.grant_read_acp.as_deref()
460    }
461    /// <p>Specify access permissions explicitly to allows grantee to allow grantee to write the ACL for the applicable object.</p>
462    /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
463    /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
464    /// <ul>
465    /// <li>
466    /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
467    /// <li>
468    /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
469    /// <li>
470    /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
471    /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
472    /// <ul>
473    /// <li>
474    /// <p>US East (N. Virginia)</p></li>
475    /// <li>
476    /// <p>US West (N. California)</p></li>
477    /// <li>
478    /// <p>US West (Oregon)</p></li>
479    /// <li>
480    /// <p>Asia Pacific (Singapore)</p></li>
481    /// <li>
482    /// <p>Asia Pacific (Sydney)</p></li>
483    /// <li>
484    /// <p>Asia Pacific (Tokyo)</p></li>
485    /// <li>
486    /// <p>Europe (Ireland)</p></li>
487    /// <li>
488    /// <p>South America (São Paulo)</p></li>
489    /// </ul>
490    /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
491    /// </note></li>
492    /// </ul>
493    /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
494    /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
495    /// <ul>
496    /// <li>
497    /// <p>This functionality is not supported for directory buckets.</p></li>
498    /// <li>
499    /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
500    /// </ul>
501    /// </note>
502    pub fn grant_write_acp(&self) -> ::std::option::Option<&str> {
503        self.grant_write_acp.as_deref()
504    }
505    /// <p>Object key for which the multipart upload is to be initiated.</p>
506    pub fn key(&self) -> ::std::option::Option<&str> {
507        self.key.as_deref()
508    }
509    /// <p>A map of metadata to store with the object in S3.</p>
510    pub fn metadata(&self) -> ::std::option::Option<&::std::collections::HashMap<::std::string::String, ::std::string::String>> {
511        self.metadata.as_ref()
512    }
513    /// <p>The server-side encryption algorithm used when you store this object in Amazon S3 (for example, <code>AES256</code>, <code>aws:kms</code>).</p>
514    /// <ul>
515    /// <li>
516    /// <p><b>Directory buckets </b> - For directory buckets, there are only two supported options for server-side encryption: server-side encryption with Amazon S3 managed keys (SSE-S3) (<code>AES256</code>) and server-side encryption with KMS keys (SSE-KMS) (<code>aws:kms</code>). We recommend that the bucket's default encryption uses the desired encryption configuration and you don't override the bucket default encryption in your <code>CreateSession</code> requests or <code>PUT</code> object requests. Then, new objects are automatically encrypted with the desired encryption settings. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-serv-side-encryption.html">Protecting data with server-side encryption</a> in the <i>Amazon S3 User Guide</i>. For more information about the encryption overriding behaviors in directory buckets, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-specifying-kms-encryption.html">Specifying server-side encryption with KMS for new object uploads</a>.</p>
517    /// <p>In the Zonal endpoint API calls (except <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>) using the REST API, the encryption request headers must match the encryption settings that are specified in the <code>CreateSession</code> request. You can't override the values of the encryption settings (<code>x-amz-server-side-encryption</code>, <code>x-amz-server-side-encryption-aws-kms-key-id</code>, <code>x-amz-server-side-encryption-context</code>, and <code>x-amz-server-side-encryption-bucket-key-enabled</code>) that are specified in the <code>CreateSession</code> request. You don't need to explicitly specify these encryption settings values in Zonal endpoint API calls, and Amazon S3 will use the encryption settings values from the <code>CreateSession</code> request to protect new objects in the directory bucket.</p><note>
518    /// <p>When you use the CLI or the Amazon Web Services SDKs, for <code>CreateSession</code>, the session token refreshes automatically to avoid service interruptions when a session expires. The CLI or the Amazon Web Services SDKs use the bucket's default encryption configuration for the <code>CreateSession</code> request. It's not supported to override the encryption settings values in the <code>CreateSession</code> request. So in the Zonal endpoint API calls (except <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>), the encryption request headers must match the default encryption configuration of the directory bucket.</p>
519    /// </note></li>
520    /// </ul>
521    pub fn server_side_encryption(&self) -> ::std::option::Option<&crate::types::ServerSideEncryption> {
522        self.server_side_encryption.as_ref()
523    }
524    /// <p>By default, Amazon S3 uses the STANDARD Storage Class to store newly created objects. The STANDARD storage class provides high durability and high availability. Depending on performance needs, you can specify a different Storage Class. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/storage-class-intro.html">Storage Classes</a> in the <i>Amazon S3 User Guide</i>.</p><note>
525    /// <ul>
526    /// <li>
527    /// <p>For directory buckets, only the S3 Express One Zone storage class is supported to store newly created objects.</p></li>
528    /// <li>
529    /// <p>Amazon S3 on Outposts only uses the OUTPOSTS Storage Class.</p></li>
530    /// </ul>
531    /// </note>
532    pub fn storage_class(&self) -> ::std::option::Option<&crate::types::StorageClass> {
533        self.storage_class.as_ref()
534    }
535    /// <p>If the bucket is configured as a website, redirects requests for this object to another object in the same bucket or to an external URL. Amazon S3 stores the value of this header in the object metadata.</p><note>
536    /// <p>This functionality is not supported for directory buckets.</p>
537    /// </note>
538    pub fn website_redirect_location(&self) -> ::std::option::Option<&str> {
539        self.website_redirect_location.as_deref()
540    }
541    /// <p>Specifies the algorithm to use when encrypting the object (for example, AES256).</p><note>
542    /// <p>This functionality is not supported for directory buckets.</p>
543    /// </note>
544    pub fn sse_customer_algorithm(&self) -> ::std::option::Option<&str> {
545        self.sse_customer_algorithm.as_deref()
546    }
547    /// <p>Specifies the customer-provided encryption key for Amazon S3 to use in encrypting data. This value is used to store the object and then it is discarded; Amazon S3 does not store the encryption key. The key must be appropriate for use with the algorithm specified in the <code>x-amz-server-side-encryption-customer-algorithm</code> header.</p><note>
548    /// <p>This functionality is not supported for directory buckets.</p>
549    /// </note>
550    pub fn sse_customer_key(&self) -> ::std::option::Option<&str> {
551        self.sse_customer_key.as_deref()
552    }
553    /// <p>Specifies the 128-bit MD5 digest of the customer-provided encryption key according to RFC 1321. Amazon S3 uses this header for a message integrity check to ensure that the encryption key was transmitted without error.</p><note>
554    /// <p>This functionality is not supported for directory buckets.</p>
555    /// </note>
556    pub fn sse_customer_key_md5(&self) -> ::std::option::Option<&str> {
557        self.sse_customer_key_md5.as_deref()
558    }
559    /// <p>Specifies the KMS key ID (Key ID, Key ARN, or Key Alias) to use for object encryption. If the KMS key doesn't exist in the same account that's issuing the command, you must use the full Key ARN not the Key ID.</p>
560    /// <p><b>General purpose buckets</b> - If you specify <code>x-amz-server-side-encryption</code> with <code>aws:kms</code> or <code>aws:kms:dsse</code>, this header specifies the ID (Key ID, Key ARN, or Key Alias) of the KMS key to use. If you specify <code>x-amz-server-side-encryption:aws:kms</code> or <code>x-amz-server-side-encryption:aws:kms:dsse</code>, but do not provide <code>x-amz-server-side-encryption-aws-kms-key-id</code>, Amazon S3 uses the Amazon Web Services managed key (<code>aws/s3</code>) to protect the data.</p>
561    /// <p><b>Directory buckets</b> - To encrypt data using SSE-KMS, it's recommended to specify the <code>x-amz-server-side-encryption</code> header to <code>aws:kms</code>. Then, the <code>x-amz-server-side-encryption-aws-kms-key-id</code> header implicitly uses the bucket's default KMS customer managed key ID. If you want to explicitly set the <code> x-amz-server-side-encryption-aws-kms-key-id</code> header, it must match the bucket's default customer managed key (using key ID or ARN, not alias). Your SSE-KMS configuration can only support 1 <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#customer-cmk">customer managed key</a> per directory bucket's lifetime. The <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-managed-cmk">Amazon Web Services managed key</a> (<code>aws/s3</code>) isn't supported. Incorrect key specification results in an HTTP <code>400 Bad Request</code> error.</p>
562    pub fn ssekms_key_id(&self) -> ::std::option::Option<&str> {
563        self.ssekms_key_id.as_deref()
564    }
565    /// <p>Specifies the Amazon Web Services KMS Encryption Context to use for object encryption. The value of this header is a Base64 encoded string of a UTF-8 encoded JSON, which contains the encryption context as key-value pairs.</p>
566    /// <p><b>Directory buckets</b> - You can optionally provide an explicit encryption context value. The value must match the default encryption context - the bucket Amazon Resource Name (ARN). An additional encryption context value is not supported.</p>
567    pub fn ssekms_encryption_context(&self) -> ::std::option::Option<&str> {
568        self.ssekms_encryption_context.as_deref()
569    }
570    /// <p>Specifies whether Amazon S3 should use an S3 Bucket Key for object encryption with server-side encryption using Key Management Service (KMS) keys (SSE-KMS).</p>
571    /// <p><b>General purpose buckets</b> - Setting this header to <code>true</code> causes Amazon S3 to use an S3 Bucket Key for object encryption with SSE-KMS. Also, specifying this header with a PUT action doesn't affect bucket-level settings for S3 Bucket Key.</p>
572    /// <p><b>Directory buckets</b> - S3 Bucket Keys are always enabled for <code>GET</code> and <code>PUT</code> operations in a directory bucket and can’t be disabled. S3 Bucket Keys aren't supported, when you copy SSE-KMS encrypted objects from general purpose buckets to directory buckets, from directory buckets to general purpose buckets, or between directory buckets, through <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a>, <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>, <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-buckets-objects-Batch-Ops">the Copy operation in Batch Operations</a>, or <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/create-import-job">the import jobs</a>. In this case, Amazon S3 makes a call to KMS every time a copy request is made for a KMS-encrypted object.</p>
573    pub fn bucket_key_enabled(&self) -> ::std::option::Option<bool> {
574        self.bucket_key_enabled
575    }
576    /// <p>Confirms that the requester knows that they will be charged for the request. Bucket owners need not specify this parameter in their requests. If either the source or destination S3 bucket has Requester Pays enabled, the requester will pay for corresponding charges to copy the object. For information about downloading objects from Requester Pays buckets, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/ObjectsinRequesterPaysBuckets.html">Downloading Objects in Requester Pays Buckets</a> in the <i>Amazon S3 User Guide</i>.</p><note>
577    /// <p>This functionality is not supported for directory buckets.</p>
578    /// </note>
579    pub fn request_payer(&self) -> ::std::option::Option<&crate::types::RequestPayer> {
580        self.request_payer.as_ref()
581    }
582    /// <p>The tag-set for the object. The tag-set must be encoded as URL Query parameters.</p><note>
583    /// <p>This functionality is not supported for directory buckets.</p>
584    /// </note>
585    pub fn tagging(&self) -> ::std::option::Option<&str> {
586        self.tagging.as_deref()
587    }
588    /// <p>Specifies the Object Lock mode that you want to apply to the uploaded object.</p><note>
589    /// <p>This functionality is not supported for directory buckets.</p>
590    /// </note>
591    pub fn object_lock_mode(&self) -> ::std::option::Option<&crate::types::ObjectLockMode> {
592        self.object_lock_mode.as_ref()
593    }
594    /// <p>Specifies the date and time when you want the Object Lock to expire.</p><note>
595    /// <p>This functionality is not supported for directory buckets.</p>
596    /// </note>
597    pub fn object_lock_retain_until_date(&self) -> ::std::option::Option<&::aws_smithy_types::DateTime> {
598        self.object_lock_retain_until_date.as_ref()
599    }
600    /// <p>Specifies whether you want to apply a legal hold to the uploaded object.</p><note>
601    /// <p>This functionality is not supported for directory buckets.</p>
602    /// </note>
603    pub fn object_lock_legal_hold_status(&self) -> ::std::option::Option<&crate::types::ObjectLockLegalHoldStatus> {
604        self.object_lock_legal_hold_status.as_ref()
605    }
606    /// <p>The account ID of the expected bucket owner. If the account ID that you provide does not match the actual owner of the bucket, the request fails with the HTTP status code <code>403 Forbidden</code> (access denied).</p>
607    pub fn expected_bucket_owner(&self) -> ::std::option::Option<&str> {
608        self.expected_bucket_owner.as_deref()
609    }
610    /// <p>Indicates the algorithm that you want Amazon S3 to use to create the checksum for the object. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html">Checking object integrity</a> in the <i>Amazon S3 User Guide</i>.</p>
611    pub fn checksum_algorithm(&self) -> ::std::option::Option<&crate::types::ChecksumAlgorithm> {
612        self.checksum_algorithm.as_ref()
613    }
614    /// <p>Indicates the checksum type that you want Amazon S3 to use to calculate the object’s checksum value. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html">Checking object integrity in the Amazon S3 User Guide</a>.</p>
615    pub fn checksum_type(&self) -> ::std::option::Option<&crate::types::ChecksumType> {
616        self.checksum_type.as_ref()
617    }
618}
619impl ::std::fmt::Debug for CreateMultipartUploadInput {
620    fn fmt(&self, f: &mut ::std::fmt::Formatter<'_>) -> ::std::fmt::Result {
621        let mut formatter = f.debug_struct("CreateMultipartUploadInput");
622        formatter.field("acl", &self.acl);
623        formatter.field("bucket", &self.bucket);
624        formatter.field("cache_control", &self.cache_control);
625        formatter.field("content_disposition", &self.content_disposition);
626        formatter.field("content_encoding", &self.content_encoding);
627        formatter.field("content_language", &self.content_language);
628        formatter.field("content_type", &self.content_type);
629        formatter.field("expires", &self.expires);
630        formatter.field("grant_full_control", &self.grant_full_control);
631        formatter.field("grant_read", &self.grant_read);
632        formatter.field("grant_read_acp", &self.grant_read_acp);
633        formatter.field("grant_write_acp", &self.grant_write_acp);
634        formatter.field("key", &self.key);
635        formatter.field("metadata", &self.metadata);
636        formatter.field("server_side_encryption", &self.server_side_encryption);
637        formatter.field("storage_class", &self.storage_class);
638        formatter.field("website_redirect_location", &self.website_redirect_location);
639        formatter.field("sse_customer_algorithm", &self.sse_customer_algorithm);
640        formatter.field("sse_customer_key", &"*** Sensitive Data Redacted ***");
641        formatter.field("sse_customer_key_md5", &self.sse_customer_key_md5);
642        formatter.field("ssekms_key_id", &"*** Sensitive Data Redacted ***");
643        formatter.field("ssekms_encryption_context", &"*** Sensitive Data Redacted ***");
644        formatter.field("bucket_key_enabled", &self.bucket_key_enabled);
645        formatter.field("request_payer", &self.request_payer);
646        formatter.field("tagging", &self.tagging);
647        formatter.field("object_lock_mode", &self.object_lock_mode);
648        formatter.field("object_lock_retain_until_date", &self.object_lock_retain_until_date);
649        formatter.field("object_lock_legal_hold_status", &self.object_lock_legal_hold_status);
650        formatter.field("expected_bucket_owner", &self.expected_bucket_owner);
651        formatter.field("checksum_algorithm", &self.checksum_algorithm);
652        formatter.field("checksum_type", &self.checksum_type);
653        formatter.finish()
654    }
655}
656impl CreateMultipartUploadInput {
657    /// Creates a new builder-style object to manufacture [`CreateMultipartUploadInput`](crate::operation::create_multipart_upload::CreateMultipartUploadInput).
658    pub fn builder() -> crate::operation::create_multipart_upload::builders::CreateMultipartUploadInputBuilder {
659        crate::operation::create_multipart_upload::builders::CreateMultipartUploadInputBuilder::default()
660    }
661}
662
663/// A builder for [`CreateMultipartUploadInput`](crate::operation::create_multipart_upload::CreateMultipartUploadInput).
664#[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default)]
665#[non_exhaustive]
666pub struct CreateMultipartUploadInputBuilder {
667    pub(crate) acl: ::std::option::Option<crate::types::ObjectCannedAcl>,
668    pub(crate) bucket: ::std::option::Option<::std::string::String>,
669    pub(crate) cache_control: ::std::option::Option<::std::string::String>,
670    pub(crate) content_disposition: ::std::option::Option<::std::string::String>,
671    pub(crate) content_encoding: ::std::option::Option<::std::string::String>,
672    pub(crate) content_language: ::std::option::Option<::std::string::String>,
673    pub(crate) content_type: ::std::option::Option<::std::string::String>,
674    pub(crate) expires: ::std::option::Option<::aws_smithy_types::DateTime>,
675    pub(crate) grant_full_control: ::std::option::Option<::std::string::String>,
676    pub(crate) grant_read: ::std::option::Option<::std::string::String>,
677    pub(crate) grant_read_acp: ::std::option::Option<::std::string::String>,
678    pub(crate) grant_write_acp: ::std::option::Option<::std::string::String>,
679    pub(crate) key: ::std::option::Option<::std::string::String>,
680    pub(crate) metadata: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>,
681    pub(crate) server_side_encryption: ::std::option::Option<crate::types::ServerSideEncryption>,
682    pub(crate) storage_class: ::std::option::Option<crate::types::StorageClass>,
683    pub(crate) website_redirect_location: ::std::option::Option<::std::string::String>,
684    pub(crate) sse_customer_algorithm: ::std::option::Option<::std::string::String>,
685    pub(crate) sse_customer_key: ::std::option::Option<::std::string::String>,
686    pub(crate) sse_customer_key_md5: ::std::option::Option<::std::string::String>,
687    pub(crate) ssekms_key_id: ::std::option::Option<::std::string::String>,
688    pub(crate) ssekms_encryption_context: ::std::option::Option<::std::string::String>,
689    pub(crate) bucket_key_enabled: ::std::option::Option<bool>,
690    pub(crate) request_payer: ::std::option::Option<crate::types::RequestPayer>,
691    pub(crate) tagging: ::std::option::Option<::std::string::String>,
692    pub(crate) object_lock_mode: ::std::option::Option<crate::types::ObjectLockMode>,
693    pub(crate) object_lock_retain_until_date: ::std::option::Option<::aws_smithy_types::DateTime>,
694    pub(crate) object_lock_legal_hold_status: ::std::option::Option<crate::types::ObjectLockLegalHoldStatus>,
695    pub(crate) expected_bucket_owner: ::std::option::Option<::std::string::String>,
696    pub(crate) checksum_algorithm: ::std::option::Option<crate::types::ChecksumAlgorithm>,
697    pub(crate) checksum_type: ::std::option::Option<crate::types::ChecksumType>,
698}
699impl CreateMultipartUploadInputBuilder {
700    /// <p>The canned ACL to apply to the object. Amazon S3 supports a set of predefined ACLs, known as <i>canned ACLs</i>. Each canned ACL has a predefined set of grantees and permissions. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html#CannedACL">Canned ACL</a> in the <i>Amazon S3 User Guide</i>.</p>
701    /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can grant access permissions to individual Amazon Web Services accounts or to predefined groups defined by Amazon S3. These permissions are then added to the access control list (ACL) on the new object. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/S3_ACLs_UsingACLs.html">Using ACLs</a>. One way to grant the permissions using the request headers is to specify a canned ACL with the <code>x-amz-acl</code> request header.</p><note>
702    /// <ul>
703    /// <li>
704    /// <p>This functionality is not supported for directory buckets.</p></li>
705    /// <li>
706    /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
707    /// </ul>
708    /// </note>
709    pub fn acl(mut self, input: crate::types::ObjectCannedAcl) -> Self {
710        self.acl = ::std::option::Option::Some(input);
711        self
712    }
713    /// <p>The canned ACL to apply to the object. Amazon S3 supports a set of predefined ACLs, known as <i>canned ACLs</i>. Each canned ACL has a predefined set of grantees and permissions. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html#CannedACL">Canned ACL</a> in the <i>Amazon S3 User Guide</i>.</p>
714    /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can grant access permissions to individual Amazon Web Services accounts or to predefined groups defined by Amazon S3. These permissions are then added to the access control list (ACL) on the new object. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/S3_ACLs_UsingACLs.html">Using ACLs</a>. One way to grant the permissions using the request headers is to specify a canned ACL with the <code>x-amz-acl</code> request header.</p><note>
715    /// <ul>
716    /// <li>
717    /// <p>This functionality is not supported for directory buckets.</p></li>
718    /// <li>
719    /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
720    /// </ul>
721    /// </note>
722    pub fn set_acl(mut self, input: ::std::option::Option<crate::types::ObjectCannedAcl>) -> Self {
723        self.acl = input;
724        self
725    }
726    /// <p>The canned ACL to apply to the object. Amazon S3 supports a set of predefined ACLs, known as <i>canned ACLs</i>. Each canned ACL has a predefined set of grantees and permissions. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html#CannedACL">Canned ACL</a> in the <i>Amazon S3 User Guide</i>.</p>
727    /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can grant access permissions to individual Amazon Web Services accounts or to predefined groups defined by Amazon S3. These permissions are then added to the access control list (ACL) on the new object. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/S3_ACLs_UsingACLs.html">Using ACLs</a>. One way to grant the permissions using the request headers is to specify a canned ACL with the <code>x-amz-acl</code> request header.</p><note>
728    /// <ul>
729    /// <li>
730    /// <p>This functionality is not supported for directory buckets.</p></li>
731    /// <li>
732    /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
733    /// </ul>
734    /// </note>
735    pub fn get_acl(&self) -> &::std::option::Option<crate::types::ObjectCannedAcl> {
736        &self.acl
737    }
738    /// <p>The name of the bucket where the multipart upload is initiated and where the object is uploaded.</p>
739    /// <p><b>Directory buckets</b> - When you use this operation with a directory bucket, you must use virtual-hosted-style requests in the format <code> <i>Bucket-name</i>.s3express-<i>zone-id</i>.<i>region-code</i>.amazonaws.com</code>. Path-style requests are not supported. Directory bucket names must be unique in the chosen Zone (Availability Zone or Local Zone). Bucket names must follow the format <code> <i>bucket-base-name</i>--<i>zone-id</i>--x-s3</code> (for example, <code> <i>amzn-s3-demo-bucket</i>--<i>usw2-az1</i>--x-s3</code>). For information about bucket naming restrictions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-bucket-naming-rules.html">Directory bucket naming rules</a> in the <i>Amazon S3 User Guide</i>.</p>
740    /// <p><b>Access points</b> - When you use this action with an access point, you must provide the alias of the access point in place of the bucket name or specify the access point ARN. When using the access point ARN, you must direct requests to the access point hostname. The access point hostname takes the form <i>AccessPointName</i>-<i>AccountId</i>.s3-accesspoint.<i>Region</i>.amazonaws.com. When using this action with an access point through the Amazon Web Services SDKs, you provide the access point ARN in place of the bucket name. For more information about access point ARNs, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-access-points.html">Using access points</a> in the <i>Amazon S3 User Guide</i>.</p><note>
741    /// <p>Access points and Object Lambda access points are not supported by directory buckets.</p>
742    /// </note>
743    /// <p><b>S3 on Outposts</b> - When you use this action with S3 on Outposts, you must direct requests to the S3 on Outposts hostname. The S3 on Outposts hostname takes the form <code> <i>AccessPointName</i>-<i>AccountId</i>.<i>outpostID</i>.s3-outposts.<i>Region</i>.amazonaws.com</code>. When you use this action with S3 on Outposts, the destination bucket must be the Outposts access point ARN or the access point alias. For more information about S3 on Outposts, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/S3onOutposts.html">What is S3 on Outposts?</a> in the <i>Amazon S3 User Guide</i>.</p>
744    /// This field is required.
745    pub fn bucket(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
746        self.bucket = ::std::option::Option::Some(input.into());
747        self
748    }
749    /// <p>The name of the bucket where the multipart upload is initiated and where the object is uploaded.</p>
750    /// <p><b>Directory buckets</b> - When you use this operation with a directory bucket, you must use virtual-hosted-style requests in the format <code> <i>Bucket-name</i>.s3express-<i>zone-id</i>.<i>region-code</i>.amazonaws.com</code>. Path-style requests are not supported. Directory bucket names must be unique in the chosen Zone (Availability Zone or Local Zone). Bucket names must follow the format <code> <i>bucket-base-name</i>--<i>zone-id</i>--x-s3</code> (for example, <code> <i>amzn-s3-demo-bucket</i>--<i>usw2-az1</i>--x-s3</code>). For information about bucket naming restrictions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-bucket-naming-rules.html">Directory bucket naming rules</a> in the <i>Amazon S3 User Guide</i>.</p>
751    /// <p><b>Access points</b> - When you use this action with an access point, you must provide the alias of the access point in place of the bucket name or specify the access point ARN. When using the access point ARN, you must direct requests to the access point hostname. The access point hostname takes the form <i>AccessPointName</i>-<i>AccountId</i>.s3-accesspoint.<i>Region</i>.amazonaws.com. When using this action with an access point through the Amazon Web Services SDKs, you provide the access point ARN in place of the bucket name. For more information about access point ARNs, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-access-points.html">Using access points</a> in the <i>Amazon S3 User Guide</i>.</p><note>
752    /// <p>Access points and Object Lambda access points are not supported by directory buckets.</p>
753    /// </note>
754    /// <p><b>S3 on Outposts</b> - When you use this action with S3 on Outposts, you must direct requests to the S3 on Outposts hostname. The S3 on Outposts hostname takes the form <code> <i>AccessPointName</i>-<i>AccountId</i>.<i>outpostID</i>.s3-outposts.<i>Region</i>.amazonaws.com</code>. When you use this action with S3 on Outposts, the destination bucket must be the Outposts access point ARN or the access point alias. For more information about S3 on Outposts, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/S3onOutposts.html">What is S3 on Outposts?</a> in the <i>Amazon S3 User Guide</i>.</p>
755    pub fn set_bucket(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
756        self.bucket = input;
757        self
758    }
759    /// <p>The name of the bucket where the multipart upload is initiated and where the object is uploaded.</p>
760    /// <p><b>Directory buckets</b> - When you use this operation with a directory bucket, you must use virtual-hosted-style requests in the format <code> <i>Bucket-name</i>.s3express-<i>zone-id</i>.<i>region-code</i>.amazonaws.com</code>. Path-style requests are not supported. Directory bucket names must be unique in the chosen Zone (Availability Zone or Local Zone). Bucket names must follow the format <code> <i>bucket-base-name</i>--<i>zone-id</i>--x-s3</code> (for example, <code> <i>amzn-s3-demo-bucket</i>--<i>usw2-az1</i>--x-s3</code>). For information about bucket naming restrictions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-bucket-naming-rules.html">Directory bucket naming rules</a> in the <i>Amazon S3 User Guide</i>.</p>
761    /// <p><b>Access points</b> - When you use this action with an access point, you must provide the alias of the access point in place of the bucket name or specify the access point ARN. When using the access point ARN, you must direct requests to the access point hostname. The access point hostname takes the form <i>AccessPointName</i>-<i>AccountId</i>.s3-accesspoint.<i>Region</i>.amazonaws.com. When using this action with an access point through the Amazon Web Services SDKs, you provide the access point ARN in place of the bucket name. For more information about access point ARNs, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-access-points.html">Using access points</a> in the <i>Amazon S3 User Guide</i>.</p><note>
762    /// <p>Access points and Object Lambda access points are not supported by directory buckets.</p>
763    /// </note>
764    /// <p><b>S3 on Outposts</b> - When you use this action with S3 on Outposts, you must direct requests to the S3 on Outposts hostname. The S3 on Outposts hostname takes the form <code> <i>AccessPointName</i>-<i>AccountId</i>.<i>outpostID</i>.s3-outposts.<i>Region</i>.amazonaws.com</code>. When you use this action with S3 on Outposts, the destination bucket must be the Outposts access point ARN or the access point alias. For more information about S3 on Outposts, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/S3onOutposts.html">What is S3 on Outposts?</a> in the <i>Amazon S3 User Guide</i>.</p>
765    pub fn get_bucket(&self) -> &::std::option::Option<::std::string::String> {
766        &self.bucket
767    }
768    /// <p>Specifies caching behavior along the request/reply chain.</p>
769    pub fn cache_control(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
770        self.cache_control = ::std::option::Option::Some(input.into());
771        self
772    }
773    /// <p>Specifies caching behavior along the request/reply chain.</p>
774    pub fn set_cache_control(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
775        self.cache_control = input;
776        self
777    }
778    /// <p>Specifies caching behavior along the request/reply chain.</p>
779    pub fn get_cache_control(&self) -> &::std::option::Option<::std::string::String> {
780        &self.cache_control
781    }
782    /// <p>Specifies presentational information for the object.</p>
783    pub fn content_disposition(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
784        self.content_disposition = ::std::option::Option::Some(input.into());
785        self
786    }
787    /// <p>Specifies presentational information for the object.</p>
788    pub fn set_content_disposition(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
789        self.content_disposition = input;
790        self
791    }
792    /// <p>Specifies presentational information for the object.</p>
793    pub fn get_content_disposition(&self) -> &::std::option::Option<::std::string::String> {
794        &self.content_disposition
795    }
796    /// <p>Specifies what content encodings have been applied to the object and thus what decoding mechanisms must be applied to obtain the media-type referenced by the Content-Type header field.</p><note>
797    /// <p>For directory buckets, only the <code>aws-chunked</code> value is supported in this header field.</p>
798    /// </note>
799    pub fn content_encoding(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
800        self.content_encoding = ::std::option::Option::Some(input.into());
801        self
802    }
803    /// <p>Specifies what content encodings have been applied to the object and thus what decoding mechanisms must be applied to obtain the media-type referenced by the Content-Type header field.</p><note>
804    /// <p>For directory buckets, only the <code>aws-chunked</code> value is supported in this header field.</p>
805    /// </note>
806    pub fn set_content_encoding(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
807        self.content_encoding = input;
808        self
809    }
810    /// <p>Specifies what content encodings have been applied to the object and thus what decoding mechanisms must be applied to obtain the media-type referenced by the Content-Type header field.</p><note>
811    /// <p>For directory buckets, only the <code>aws-chunked</code> value is supported in this header field.</p>
812    /// </note>
813    pub fn get_content_encoding(&self) -> &::std::option::Option<::std::string::String> {
814        &self.content_encoding
815    }
816    /// <p>The language that the content is in.</p>
817    pub fn content_language(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
818        self.content_language = ::std::option::Option::Some(input.into());
819        self
820    }
821    /// <p>The language that the content is in.</p>
822    pub fn set_content_language(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
823        self.content_language = input;
824        self
825    }
826    /// <p>The language that the content is in.</p>
827    pub fn get_content_language(&self) -> &::std::option::Option<::std::string::String> {
828        &self.content_language
829    }
830    /// <p>A standard MIME type describing the format of the object data.</p>
831    pub fn content_type(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
832        self.content_type = ::std::option::Option::Some(input.into());
833        self
834    }
835    /// <p>A standard MIME type describing the format of the object data.</p>
836    pub fn set_content_type(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
837        self.content_type = input;
838        self
839    }
840    /// <p>A standard MIME type describing the format of the object data.</p>
841    pub fn get_content_type(&self) -> &::std::option::Option<::std::string::String> {
842        &self.content_type
843    }
844    /// <p>The date and time at which the object is no longer cacheable.</p>
845    pub fn expires(mut self, input: ::aws_smithy_types::DateTime) -> Self {
846        self.expires = ::std::option::Option::Some(input);
847        self
848    }
849    /// <p>The date and time at which the object is no longer cacheable.</p>
850    pub fn set_expires(mut self, input: ::std::option::Option<::aws_smithy_types::DateTime>) -> Self {
851        self.expires = input;
852        self
853    }
854    /// <p>The date and time at which the object is no longer cacheable.</p>
855    pub fn get_expires(&self) -> &::std::option::Option<::aws_smithy_types::DateTime> {
856        &self.expires
857    }
858    /// <p>Specify access permissions explicitly to give the grantee READ, READ_ACP, and WRITE_ACP permissions on the object.</p>
859    /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
860    /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
861    /// <ul>
862    /// <li>
863    /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
864    /// <li>
865    /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
866    /// <li>
867    /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
868    /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
869    /// <ul>
870    /// <li>
871    /// <p>US East (N. Virginia)</p></li>
872    /// <li>
873    /// <p>US West (N. California)</p></li>
874    /// <li>
875    /// <p>US West (Oregon)</p></li>
876    /// <li>
877    /// <p>Asia Pacific (Singapore)</p></li>
878    /// <li>
879    /// <p>Asia Pacific (Sydney)</p></li>
880    /// <li>
881    /// <p>Asia Pacific (Tokyo)</p></li>
882    /// <li>
883    /// <p>Europe (Ireland)</p></li>
884    /// <li>
885    /// <p>South America (São Paulo)</p></li>
886    /// </ul>
887    /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
888    /// </note></li>
889    /// </ul>
890    /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
891    /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
892    /// <ul>
893    /// <li>
894    /// <p>This functionality is not supported for directory buckets.</p></li>
895    /// <li>
896    /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
897    /// </ul>
898    /// </note>
899    pub fn grant_full_control(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
900        self.grant_full_control = ::std::option::Option::Some(input.into());
901        self
902    }
903    /// <p>Specify access permissions explicitly to give the grantee READ, READ_ACP, and WRITE_ACP permissions on the object.</p>
904    /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
905    /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
906    /// <ul>
907    /// <li>
908    /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
909    /// <li>
910    /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
911    /// <li>
912    /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
913    /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
914    /// <ul>
915    /// <li>
916    /// <p>US East (N. Virginia)</p></li>
917    /// <li>
918    /// <p>US West (N. California)</p></li>
919    /// <li>
920    /// <p>US West (Oregon)</p></li>
921    /// <li>
922    /// <p>Asia Pacific (Singapore)</p></li>
923    /// <li>
924    /// <p>Asia Pacific (Sydney)</p></li>
925    /// <li>
926    /// <p>Asia Pacific (Tokyo)</p></li>
927    /// <li>
928    /// <p>Europe (Ireland)</p></li>
929    /// <li>
930    /// <p>South America (São Paulo)</p></li>
931    /// </ul>
932    /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
933    /// </note></li>
934    /// </ul>
935    /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
936    /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
937    /// <ul>
938    /// <li>
939    /// <p>This functionality is not supported for directory buckets.</p></li>
940    /// <li>
941    /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
942    /// </ul>
943    /// </note>
944    pub fn set_grant_full_control(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
945        self.grant_full_control = input;
946        self
947    }
948    /// <p>Specify access permissions explicitly to give the grantee READ, READ_ACP, and WRITE_ACP permissions on the object.</p>
949    /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
950    /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
951    /// <ul>
952    /// <li>
953    /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
954    /// <li>
955    /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
956    /// <li>
957    /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
958    /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
959    /// <ul>
960    /// <li>
961    /// <p>US East (N. Virginia)</p></li>
962    /// <li>
963    /// <p>US West (N. California)</p></li>
964    /// <li>
965    /// <p>US West (Oregon)</p></li>
966    /// <li>
967    /// <p>Asia Pacific (Singapore)</p></li>
968    /// <li>
969    /// <p>Asia Pacific (Sydney)</p></li>
970    /// <li>
971    /// <p>Asia Pacific (Tokyo)</p></li>
972    /// <li>
973    /// <p>Europe (Ireland)</p></li>
974    /// <li>
975    /// <p>South America (São Paulo)</p></li>
976    /// </ul>
977    /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
978    /// </note></li>
979    /// </ul>
980    /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
981    /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
982    /// <ul>
983    /// <li>
984    /// <p>This functionality is not supported for directory buckets.</p></li>
985    /// <li>
986    /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
987    /// </ul>
988    /// </note>
989    pub fn get_grant_full_control(&self) -> &::std::option::Option<::std::string::String> {
990        &self.grant_full_control
991    }
992    /// <p>Specify access permissions explicitly to allow grantee to read the object data and its metadata.</p>
993    /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
994    /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
995    /// <ul>
996    /// <li>
997    /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
998    /// <li>
999    /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
1000    /// <li>
1001    /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
1002    /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
1003    /// <ul>
1004    /// <li>
1005    /// <p>US East (N. Virginia)</p></li>
1006    /// <li>
1007    /// <p>US West (N. California)</p></li>
1008    /// <li>
1009    /// <p>US West (Oregon)</p></li>
1010    /// <li>
1011    /// <p>Asia Pacific (Singapore)</p></li>
1012    /// <li>
1013    /// <p>Asia Pacific (Sydney)</p></li>
1014    /// <li>
1015    /// <p>Asia Pacific (Tokyo)</p></li>
1016    /// <li>
1017    /// <p>Europe (Ireland)</p></li>
1018    /// <li>
1019    /// <p>South America (São Paulo)</p></li>
1020    /// </ul>
1021    /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
1022    /// </note></li>
1023    /// </ul>
1024    /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
1025    /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
1026    /// <ul>
1027    /// <li>
1028    /// <p>This functionality is not supported for directory buckets.</p></li>
1029    /// <li>
1030    /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
1031    /// </ul>
1032    /// </note>
1033    pub fn grant_read(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
1034        self.grant_read = ::std::option::Option::Some(input.into());
1035        self
1036    }
1037    /// <p>Specify access permissions explicitly to allow grantee to read the object data and its metadata.</p>
1038    /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
1039    /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
1040    /// <ul>
1041    /// <li>
1042    /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
1043    /// <li>
1044    /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
1045    /// <li>
1046    /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
1047    /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
1048    /// <ul>
1049    /// <li>
1050    /// <p>US East (N. Virginia)</p></li>
1051    /// <li>
1052    /// <p>US West (N. California)</p></li>
1053    /// <li>
1054    /// <p>US West (Oregon)</p></li>
1055    /// <li>
1056    /// <p>Asia Pacific (Singapore)</p></li>
1057    /// <li>
1058    /// <p>Asia Pacific (Sydney)</p></li>
1059    /// <li>
1060    /// <p>Asia Pacific (Tokyo)</p></li>
1061    /// <li>
1062    /// <p>Europe (Ireland)</p></li>
1063    /// <li>
1064    /// <p>South America (São Paulo)</p></li>
1065    /// </ul>
1066    /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
1067    /// </note></li>
1068    /// </ul>
1069    /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
1070    /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
1071    /// <ul>
1072    /// <li>
1073    /// <p>This functionality is not supported for directory buckets.</p></li>
1074    /// <li>
1075    /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
1076    /// </ul>
1077    /// </note>
1078    pub fn set_grant_read(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
1079        self.grant_read = input;
1080        self
1081    }
1082    /// <p>Specify access permissions explicitly to allow grantee to read the object data and its metadata.</p>
1083    /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
1084    /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
1085    /// <ul>
1086    /// <li>
1087    /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
1088    /// <li>
1089    /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
1090    /// <li>
1091    /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
1092    /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
1093    /// <ul>
1094    /// <li>
1095    /// <p>US East (N. Virginia)</p></li>
1096    /// <li>
1097    /// <p>US West (N. California)</p></li>
1098    /// <li>
1099    /// <p>US West (Oregon)</p></li>
1100    /// <li>
1101    /// <p>Asia Pacific (Singapore)</p></li>
1102    /// <li>
1103    /// <p>Asia Pacific (Sydney)</p></li>
1104    /// <li>
1105    /// <p>Asia Pacific (Tokyo)</p></li>
1106    /// <li>
1107    /// <p>Europe (Ireland)</p></li>
1108    /// <li>
1109    /// <p>South America (São Paulo)</p></li>
1110    /// </ul>
1111    /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
1112    /// </note></li>
1113    /// </ul>
1114    /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
1115    /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
1116    /// <ul>
1117    /// <li>
1118    /// <p>This functionality is not supported for directory buckets.</p></li>
1119    /// <li>
1120    /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
1121    /// </ul>
1122    /// </note>
1123    pub fn get_grant_read(&self) -> &::std::option::Option<::std::string::String> {
1124        &self.grant_read
1125    }
1126    /// <p>Specify access permissions explicitly to allows grantee to read the object ACL.</p>
1127    /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
1128    /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
1129    /// <ul>
1130    /// <li>
1131    /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
1132    /// <li>
1133    /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
1134    /// <li>
1135    /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
1136    /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
1137    /// <ul>
1138    /// <li>
1139    /// <p>US East (N. Virginia)</p></li>
1140    /// <li>
1141    /// <p>US West (N. California)</p></li>
1142    /// <li>
1143    /// <p>US West (Oregon)</p></li>
1144    /// <li>
1145    /// <p>Asia Pacific (Singapore)</p></li>
1146    /// <li>
1147    /// <p>Asia Pacific (Sydney)</p></li>
1148    /// <li>
1149    /// <p>Asia Pacific (Tokyo)</p></li>
1150    /// <li>
1151    /// <p>Europe (Ireland)</p></li>
1152    /// <li>
1153    /// <p>South America (São Paulo)</p></li>
1154    /// </ul>
1155    /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
1156    /// </note></li>
1157    /// </ul>
1158    /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
1159    /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
1160    /// <ul>
1161    /// <li>
1162    /// <p>This functionality is not supported for directory buckets.</p></li>
1163    /// <li>
1164    /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
1165    /// </ul>
1166    /// </note>
1167    pub fn grant_read_acp(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
1168        self.grant_read_acp = ::std::option::Option::Some(input.into());
1169        self
1170    }
1171    /// <p>Specify access permissions explicitly to allows grantee to read the object ACL.</p>
1172    /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
1173    /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
1174    /// <ul>
1175    /// <li>
1176    /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
1177    /// <li>
1178    /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
1179    /// <li>
1180    /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
1181    /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
1182    /// <ul>
1183    /// <li>
1184    /// <p>US East (N. Virginia)</p></li>
1185    /// <li>
1186    /// <p>US West (N. California)</p></li>
1187    /// <li>
1188    /// <p>US West (Oregon)</p></li>
1189    /// <li>
1190    /// <p>Asia Pacific (Singapore)</p></li>
1191    /// <li>
1192    /// <p>Asia Pacific (Sydney)</p></li>
1193    /// <li>
1194    /// <p>Asia Pacific (Tokyo)</p></li>
1195    /// <li>
1196    /// <p>Europe (Ireland)</p></li>
1197    /// <li>
1198    /// <p>South America (São Paulo)</p></li>
1199    /// </ul>
1200    /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
1201    /// </note></li>
1202    /// </ul>
1203    /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
1204    /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
1205    /// <ul>
1206    /// <li>
1207    /// <p>This functionality is not supported for directory buckets.</p></li>
1208    /// <li>
1209    /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
1210    /// </ul>
1211    /// </note>
1212    pub fn set_grant_read_acp(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
1213        self.grant_read_acp = input;
1214        self
1215    }
1216    /// <p>Specify access permissions explicitly to allows grantee to read the object ACL.</p>
1217    /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
1218    /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
1219    /// <ul>
1220    /// <li>
1221    /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
1222    /// <li>
1223    /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
1224    /// <li>
1225    /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
1226    /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
1227    /// <ul>
1228    /// <li>
1229    /// <p>US East (N. Virginia)</p></li>
1230    /// <li>
1231    /// <p>US West (N. California)</p></li>
1232    /// <li>
1233    /// <p>US West (Oregon)</p></li>
1234    /// <li>
1235    /// <p>Asia Pacific (Singapore)</p></li>
1236    /// <li>
1237    /// <p>Asia Pacific (Sydney)</p></li>
1238    /// <li>
1239    /// <p>Asia Pacific (Tokyo)</p></li>
1240    /// <li>
1241    /// <p>Europe (Ireland)</p></li>
1242    /// <li>
1243    /// <p>South America (São Paulo)</p></li>
1244    /// </ul>
1245    /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
1246    /// </note></li>
1247    /// </ul>
1248    /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
1249    /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
1250    /// <ul>
1251    /// <li>
1252    /// <p>This functionality is not supported for directory buckets.</p></li>
1253    /// <li>
1254    /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
1255    /// </ul>
1256    /// </note>
1257    pub fn get_grant_read_acp(&self) -> &::std::option::Option<::std::string::String> {
1258        &self.grant_read_acp
1259    }
1260    /// <p>Specify access permissions explicitly to allows grantee to allow grantee to write the ACL for the applicable object.</p>
1261    /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
1262    /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
1263    /// <ul>
1264    /// <li>
1265    /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
1266    /// <li>
1267    /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
1268    /// <li>
1269    /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
1270    /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
1271    /// <ul>
1272    /// <li>
1273    /// <p>US East (N. Virginia)</p></li>
1274    /// <li>
1275    /// <p>US West (N. California)</p></li>
1276    /// <li>
1277    /// <p>US West (Oregon)</p></li>
1278    /// <li>
1279    /// <p>Asia Pacific (Singapore)</p></li>
1280    /// <li>
1281    /// <p>Asia Pacific (Sydney)</p></li>
1282    /// <li>
1283    /// <p>Asia Pacific (Tokyo)</p></li>
1284    /// <li>
1285    /// <p>Europe (Ireland)</p></li>
1286    /// <li>
1287    /// <p>South America (São Paulo)</p></li>
1288    /// </ul>
1289    /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
1290    /// </note></li>
1291    /// </ul>
1292    /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
1293    /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
1294    /// <ul>
1295    /// <li>
1296    /// <p>This functionality is not supported for directory buckets.</p></li>
1297    /// <li>
1298    /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
1299    /// </ul>
1300    /// </note>
1301    pub fn grant_write_acp(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
1302        self.grant_write_acp = ::std::option::Option::Some(input.into());
1303        self
1304    }
1305    /// <p>Specify access permissions explicitly to allows grantee to allow grantee to write the ACL for the applicable object.</p>
1306    /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
1307    /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
1308    /// <ul>
1309    /// <li>
1310    /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
1311    /// <li>
1312    /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
1313    /// <li>
1314    /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
1315    /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
1316    /// <ul>
1317    /// <li>
1318    /// <p>US East (N. Virginia)</p></li>
1319    /// <li>
1320    /// <p>US West (N. California)</p></li>
1321    /// <li>
1322    /// <p>US West (Oregon)</p></li>
1323    /// <li>
1324    /// <p>Asia Pacific (Singapore)</p></li>
1325    /// <li>
1326    /// <p>Asia Pacific (Sydney)</p></li>
1327    /// <li>
1328    /// <p>Asia Pacific (Tokyo)</p></li>
1329    /// <li>
1330    /// <p>Europe (Ireland)</p></li>
1331    /// <li>
1332    /// <p>South America (São Paulo)</p></li>
1333    /// </ul>
1334    /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
1335    /// </note></li>
1336    /// </ul>
1337    /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
1338    /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
1339    /// <ul>
1340    /// <li>
1341    /// <p>This functionality is not supported for directory buckets.</p></li>
1342    /// <li>
1343    /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
1344    /// </ul>
1345    /// </note>
1346    pub fn set_grant_write_acp(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
1347        self.grant_write_acp = input;
1348        self
1349    }
1350    /// <p>Specify access permissions explicitly to allows grantee to allow grantee to write the ACL for the applicable object.</p>
1351    /// <p>By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL) Overview</a> in the <i>Amazon S3 User Guide</i>.</p>
1352    /// <p>You specify each grantee as a type=value pair, where the type is one of the following:</p>
1353    /// <ul>
1354    /// <li>
1355    /// <p><code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p></li>
1356    /// <li>
1357    /// <p><code>uri</code> – if you are granting permissions to a predefined group</p></li>
1358    /// <li>
1359    /// <p><code>emailAddress</code> – if the value specified is the email address of an Amazon Web Services account</p><note>
1360    /// <p>Using email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:</p>
1361    /// <ul>
1362    /// <li>
1363    /// <p>US East (N. Virginia)</p></li>
1364    /// <li>
1365    /// <p>US West (N. California)</p></li>
1366    /// <li>
1367    /// <p>US West (Oregon)</p></li>
1368    /// <li>
1369    /// <p>Asia Pacific (Singapore)</p></li>
1370    /// <li>
1371    /// <p>Asia Pacific (Sydney)</p></li>
1372    /// <li>
1373    /// <p>Asia Pacific (Tokyo)</p></li>
1374    /// <li>
1375    /// <p>Europe (Ireland)</p></li>
1376    /// <li>
1377    /// <p>South America (São Paulo)</p></li>
1378    /// </ul>
1379    /// <p>For a list of all the Amazon S3 supported Regions and endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
1380    /// </note></li>
1381    /// </ul>
1382    /// <p>For example, the following <code>x-amz-grant-read</code> header grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:</p>
1383    /// <p><code>x-amz-grant-read: id="11112222333", id="444455556666" </code></p><note>
1384    /// <ul>
1385    /// <li>
1386    /// <p>This functionality is not supported for directory buckets.</p></li>
1387    /// <li>
1388    /// <p>This functionality is not supported for Amazon S3 on Outposts.</p></li>
1389    /// </ul>
1390    /// </note>
1391    pub fn get_grant_write_acp(&self) -> &::std::option::Option<::std::string::String> {
1392        &self.grant_write_acp
1393    }
1394    /// <p>Object key for which the multipart upload is to be initiated.</p>
1395    /// This field is required.
1396    pub fn key(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
1397        self.key = ::std::option::Option::Some(input.into());
1398        self
1399    }
1400    /// <p>Object key for which the multipart upload is to be initiated.</p>
1401    pub fn set_key(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
1402        self.key = input;
1403        self
1404    }
1405    /// <p>Object key for which the multipart upload is to be initiated.</p>
1406    pub fn get_key(&self) -> &::std::option::Option<::std::string::String> {
1407        &self.key
1408    }
1409    /// Adds a key-value pair to `metadata`.
1410    ///
1411    /// To override the contents of this collection use [`set_metadata`](Self::set_metadata).
1412    ///
1413    /// <p>A map of metadata to store with the object in S3.</p>
1414    pub fn metadata(mut self, k: impl ::std::convert::Into<::std::string::String>, v: impl ::std::convert::Into<::std::string::String>) -> Self {
1415        let mut hash_map = self.metadata.unwrap_or_default();
1416        hash_map.insert(k.into(), v.into());
1417        self.metadata = ::std::option::Option::Some(hash_map);
1418        self
1419    }
1420    /// <p>A map of metadata to store with the object in S3.</p>
1421    pub fn set_metadata(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self {
1422        self.metadata = input;
1423        self
1424    }
1425    /// <p>A map of metadata to store with the object in S3.</p>
1426    pub fn get_metadata(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> {
1427        &self.metadata
1428    }
1429    /// <p>The server-side encryption algorithm used when you store this object in Amazon S3 (for example, <code>AES256</code>, <code>aws:kms</code>).</p>
1430    /// <ul>
1431    /// <li>
1432    /// <p><b>Directory buckets </b> - For directory buckets, there are only two supported options for server-side encryption: server-side encryption with Amazon S3 managed keys (SSE-S3) (<code>AES256</code>) and server-side encryption with KMS keys (SSE-KMS) (<code>aws:kms</code>). We recommend that the bucket's default encryption uses the desired encryption configuration and you don't override the bucket default encryption in your <code>CreateSession</code> requests or <code>PUT</code> object requests. Then, new objects are automatically encrypted with the desired encryption settings. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-serv-side-encryption.html">Protecting data with server-side encryption</a> in the <i>Amazon S3 User Guide</i>. For more information about the encryption overriding behaviors in directory buckets, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-specifying-kms-encryption.html">Specifying server-side encryption with KMS for new object uploads</a>.</p>
1433    /// <p>In the Zonal endpoint API calls (except <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>) using the REST API, the encryption request headers must match the encryption settings that are specified in the <code>CreateSession</code> request. You can't override the values of the encryption settings (<code>x-amz-server-side-encryption</code>, <code>x-amz-server-side-encryption-aws-kms-key-id</code>, <code>x-amz-server-side-encryption-context</code>, and <code>x-amz-server-side-encryption-bucket-key-enabled</code>) that are specified in the <code>CreateSession</code> request. You don't need to explicitly specify these encryption settings values in Zonal endpoint API calls, and Amazon S3 will use the encryption settings values from the <code>CreateSession</code> request to protect new objects in the directory bucket.</p><note>
1434    /// <p>When you use the CLI or the Amazon Web Services SDKs, for <code>CreateSession</code>, the session token refreshes automatically to avoid service interruptions when a session expires. The CLI or the Amazon Web Services SDKs use the bucket's default encryption configuration for the <code>CreateSession</code> request. It's not supported to override the encryption settings values in the <code>CreateSession</code> request. So in the Zonal endpoint API calls (except <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>), the encryption request headers must match the default encryption configuration of the directory bucket.</p>
1435    /// </note></li>
1436    /// </ul>
1437    pub fn server_side_encryption(mut self, input: crate::types::ServerSideEncryption) -> Self {
1438        self.server_side_encryption = ::std::option::Option::Some(input);
1439        self
1440    }
1441    /// <p>The server-side encryption algorithm used when you store this object in Amazon S3 (for example, <code>AES256</code>, <code>aws:kms</code>).</p>
1442    /// <ul>
1443    /// <li>
1444    /// <p><b>Directory buckets </b> - For directory buckets, there are only two supported options for server-side encryption: server-side encryption with Amazon S3 managed keys (SSE-S3) (<code>AES256</code>) and server-side encryption with KMS keys (SSE-KMS) (<code>aws:kms</code>). We recommend that the bucket's default encryption uses the desired encryption configuration and you don't override the bucket default encryption in your <code>CreateSession</code> requests or <code>PUT</code> object requests. Then, new objects are automatically encrypted with the desired encryption settings. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-serv-side-encryption.html">Protecting data with server-side encryption</a> in the <i>Amazon S3 User Guide</i>. For more information about the encryption overriding behaviors in directory buckets, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-specifying-kms-encryption.html">Specifying server-side encryption with KMS for new object uploads</a>.</p>
1445    /// <p>In the Zonal endpoint API calls (except <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>) using the REST API, the encryption request headers must match the encryption settings that are specified in the <code>CreateSession</code> request. You can't override the values of the encryption settings (<code>x-amz-server-side-encryption</code>, <code>x-amz-server-side-encryption-aws-kms-key-id</code>, <code>x-amz-server-side-encryption-context</code>, and <code>x-amz-server-side-encryption-bucket-key-enabled</code>) that are specified in the <code>CreateSession</code> request. You don't need to explicitly specify these encryption settings values in Zonal endpoint API calls, and Amazon S3 will use the encryption settings values from the <code>CreateSession</code> request to protect new objects in the directory bucket.</p><note>
1446    /// <p>When you use the CLI or the Amazon Web Services SDKs, for <code>CreateSession</code>, the session token refreshes automatically to avoid service interruptions when a session expires. The CLI or the Amazon Web Services SDKs use the bucket's default encryption configuration for the <code>CreateSession</code> request. It's not supported to override the encryption settings values in the <code>CreateSession</code> request. So in the Zonal endpoint API calls (except <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>), the encryption request headers must match the default encryption configuration of the directory bucket.</p>
1447    /// </note></li>
1448    /// </ul>
1449    pub fn set_server_side_encryption(mut self, input: ::std::option::Option<crate::types::ServerSideEncryption>) -> Self {
1450        self.server_side_encryption = input;
1451        self
1452    }
1453    /// <p>The server-side encryption algorithm used when you store this object in Amazon S3 (for example, <code>AES256</code>, <code>aws:kms</code>).</p>
1454    /// <ul>
1455    /// <li>
1456    /// <p><b>Directory buckets </b> - For directory buckets, there are only two supported options for server-side encryption: server-side encryption with Amazon S3 managed keys (SSE-S3) (<code>AES256</code>) and server-side encryption with KMS keys (SSE-KMS) (<code>aws:kms</code>). We recommend that the bucket's default encryption uses the desired encryption configuration and you don't override the bucket default encryption in your <code>CreateSession</code> requests or <code>PUT</code> object requests. Then, new objects are automatically encrypted with the desired encryption settings. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-serv-side-encryption.html">Protecting data with server-side encryption</a> in the <i>Amazon S3 User Guide</i>. For more information about the encryption overriding behaviors in directory buckets, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-specifying-kms-encryption.html">Specifying server-side encryption with KMS for new object uploads</a>.</p>
1457    /// <p>In the Zonal endpoint API calls (except <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>) using the REST API, the encryption request headers must match the encryption settings that are specified in the <code>CreateSession</code> request. You can't override the values of the encryption settings (<code>x-amz-server-side-encryption</code>, <code>x-amz-server-side-encryption-aws-kms-key-id</code>, <code>x-amz-server-side-encryption-context</code>, and <code>x-amz-server-side-encryption-bucket-key-enabled</code>) that are specified in the <code>CreateSession</code> request. You don't need to explicitly specify these encryption settings values in Zonal endpoint API calls, and Amazon S3 will use the encryption settings values from the <code>CreateSession</code> request to protect new objects in the directory bucket.</p><note>
1458    /// <p>When you use the CLI or the Amazon Web Services SDKs, for <code>CreateSession</code>, the session token refreshes automatically to avoid service interruptions when a session expires. The CLI or the Amazon Web Services SDKs use the bucket's default encryption configuration for the <code>CreateSession</code> request. It's not supported to override the encryption settings values in the <code>CreateSession</code> request. So in the Zonal endpoint API calls (except <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>), the encryption request headers must match the default encryption configuration of the directory bucket.</p>
1459    /// </note></li>
1460    /// </ul>
1461    pub fn get_server_side_encryption(&self) -> &::std::option::Option<crate::types::ServerSideEncryption> {
1462        &self.server_side_encryption
1463    }
1464    /// <p>By default, Amazon S3 uses the STANDARD Storage Class to store newly created objects. The STANDARD storage class provides high durability and high availability. Depending on performance needs, you can specify a different Storage Class. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/storage-class-intro.html">Storage Classes</a> in the <i>Amazon S3 User Guide</i>.</p><note>
1465    /// <ul>
1466    /// <li>
1467    /// <p>For directory buckets, only the S3 Express One Zone storage class is supported to store newly created objects.</p></li>
1468    /// <li>
1469    /// <p>Amazon S3 on Outposts only uses the OUTPOSTS Storage Class.</p></li>
1470    /// </ul>
1471    /// </note>
1472    pub fn storage_class(mut self, input: crate::types::StorageClass) -> Self {
1473        self.storage_class = ::std::option::Option::Some(input);
1474        self
1475    }
1476    /// <p>By default, Amazon S3 uses the STANDARD Storage Class to store newly created objects. The STANDARD storage class provides high durability and high availability. Depending on performance needs, you can specify a different Storage Class. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/storage-class-intro.html">Storage Classes</a> in the <i>Amazon S3 User Guide</i>.</p><note>
1477    /// <ul>
1478    /// <li>
1479    /// <p>For directory buckets, only the S3 Express One Zone storage class is supported to store newly created objects.</p></li>
1480    /// <li>
1481    /// <p>Amazon S3 on Outposts only uses the OUTPOSTS Storage Class.</p></li>
1482    /// </ul>
1483    /// </note>
1484    pub fn set_storage_class(mut self, input: ::std::option::Option<crate::types::StorageClass>) -> Self {
1485        self.storage_class = input;
1486        self
1487    }
1488    /// <p>By default, Amazon S3 uses the STANDARD Storage Class to store newly created objects. The STANDARD storage class provides high durability and high availability. Depending on performance needs, you can specify a different Storage Class. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/storage-class-intro.html">Storage Classes</a> in the <i>Amazon S3 User Guide</i>.</p><note>
1489    /// <ul>
1490    /// <li>
1491    /// <p>For directory buckets, only the S3 Express One Zone storage class is supported to store newly created objects.</p></li>
1492    /// <li>
1493    /// <p>Amazon S3 on Outposts only uses the OUTPOSTS Storage Class.</p></li>
1494    /// </ul>
1495    /// </note>
1496    pub fn get_storage_class(&self) -> &::std::option::Option<crate::types::StorageClass> {
1497        &self.storage_class
1498    }
1499    /// <p>If the bucket is configured as a website, redirects requests for this object to another object in the same bucket or to an external URL. Amazon S3 stores the value of this header in the object metadata.</p><note>
1500    /// <p>This functionality is not supported for directory buckets.</p>
1501    /// </note>
1502    pub fn website_redirect_location(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
1503        self.website_redirect_location = ::std::option::Option::Some(input.into());
1504        self
1505    }
1506    /// <p>If the bucket is configured as a website, redirects requests for this object to another object in the same bucket or to an external URL. Amazon S3 stores the value of this header in the object metadata.</p><note>
1507    /// <p>This functionality is not supported for directory buckets.</p>
1508    /// </note>
1509    pub fn set_website_redirect_location(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
1510        self.website_redirect_location = input;
1511        self
1512    }
1513    /// <p>If the bucket is configured as a website, redirects requests for this object to another object in the same bucket or to an external URL. Amazon S3 stores the value of this header in the object metadata.</p><note>
1514    /// <p>This functionality is not supported for directory buckets.</p>
1515    /// </note>
1516    pub fn get_website_redirect_location(&self) -> &::std::option::Option<::std::string::String> {
1517        &self.website_redirect_location
1518    }
1519    /// <p>Specifies the algorithm to use when encrypting the object (for example, AES256).</p><note>
1520    /// <p>This functionality is not supported for directory buckets.</p>
1521    /// </note>
1522    pub fn sse_customer_algorithm(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
1523        self.sse_customer_algorithm = ::std::option::Option::Some(input.into());
1524        self
1525    }
1526    /// <p>Specifies the algorithm to use when encrypting the object (for example, AES256).</p><note>
1527    /// <p>This functionality is not supported for directory buckets.</p>
1528    /// </note>
1529    pub fn set_sse_customer_algorithm(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
1530        self.sse_customer_algorithm = input;
1531        self
1532    }
1533    /// <p>Specifies the algorithm to use when encrypting the object (for example, AES256).</p><note>
1534    /// <p>This functionality is not supported for directory buckets.</p>
1535    /// </note>
1536    pub fn get_sse_customer_algorithm(&self) -> &::std::option::Option<::std::string::String> {
1537        &self.sse_customer_algorithm
1538    }
1539    /// <p>Specifies the customer-provided encryption key for Amazon S3 to use in encrypting data. This value is used to store the object and then it is discarded; Amazon S3 does not store the encryption key. The key must be appropriate for use with the algorithm specified in the <code>x-amz-server-side-encryption-customer-algorithm</code> header.</p><note>
1540    /// <p>This functionality is not supported for directory buckets.</p>
1541    /// </note>
1542    pub fn sse_customer_key(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
1543        self.sse_customer_key = ::std::option::Option::Some(input.into());
1544        self
1545    }
1546    /// <p>Specifies the customer-provided encryption key for Amazon S3 to use in encrypting data. This value is used to store the object and then it is discarded; Amazon S3 does not store the encryption key. The key must be appropriate for use with the algorithm specified in the <code>x-amz-server-side-encryption-customer-algorithm</code> header.</p><note>
1547    /// <p>This functionality is not supported for directory buckets.</p>
1548    /// </note>
1549    pub fn set_sse_customer_key(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
1550        self.sse_customer_key = input;
1551        self
1552    }
1553    /// <p>Specifies the customer-provided encryption key for Amazon S3 to use in encrypting data. This value is used to store the object and then it is discarded; Amazon S3 does not store the encryption key. The key must be appropriate for use with the algorithm specified in the <code>x-amz-server-side-encryption-customer-algorithm</code> header.</p><note>
1554    /// <p>This functionality is not supported for directory buckets.</p>
1555    /// </note>
1556    pub fn get_sse_customer_key(&self) -> &::std::option::Option<::std::string::String> {
1557        &self.sse_customer_key
1558    }
1559    /// <p>Specifies the 128-bit MD5 digest of the customer-provided encryption key according to RFC 1321. Amazon S3 uses this header for a message integrity check to ensure that the encryption key was transmitted without error.</p><note>
1560    /// <p>This functionality is not supported for directory buckets.</p>
1561    /// </note>
1562    pub fn sse_customer_key_md5(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
1563        self.sse_customer_key_md5 = ::std::option::Option::Some(input.into());
1564        self
1565    }
1566    /// <p>Specifies the 128-bit MD5 digest of the customer-provided encryption key according to RFC 1321. Amazon S3 uses this header for a message integrity check to ensure that the encryption key was transmitted without error.</p><note>
1567    /// <p>This functionality is not supported for directory buckets.</p>
1568    /// </note>
1569    pub fn set_sse_customer_key_md5(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
1570        self.sse_customer_key_md5 = input;
1571        self
1572    }
1573    /// <p>Specifies the 128-bit MD5 digest of the customer-provided encryption key according to RFC 1321. Amazon S3 uses this header for a message integrity check to ensure that the encryption key was transmitted without error.</p><note>
1574    /// <p>This functionality is not supported for directory buckets.</p>
1575    /// </note>
1576    pub fn get_sse_customer_key_md5(&self) -> &::std::option::Option<::std::string::String> {
1577        &self.sse_customer_key_md5
1578    }
1579    /// <p>Specifies the KMS key ID (Key ID, Key ARN, or Key Alias) to use for object encryption. If the KMS key doesn't exist in the same account that's issuing the command, you must use the full Key ARN not the Key ID.</p>
1580    /// <p><b>General purpose buckets</b> - If you specify <code>x-amz-server-side-encryption</code> with <code>aws:kms</code> or <code>aws:kms:dsse</code>, this header specifies the ID (Key ID, Key ARN, or Key Alias) of the KMS key to use. If you specify <code>x-amz-server-side-encryption:aws:kms</code> or <code>x-amz-server-side-encryption:aws:kms:dsse</code>, but do not provide <code>x-amz-server-side-encryption-aws-kms-key-id</code>, Amazon S3 uses the Amazon Web Services managed key (<code>aws/s3</code>) to protect the data.</p>
1581    /// <p><b>Directory buckets</b> - To encrypt data using SSE-KMS, it's recommended to specify the <code>x-amz-server-side-encryption</code> header to <code>aws:kms</code>. Then, the <code>x-amz-server-side-encryption-aws-kms-key-id</code> header implicitly uses the bucket's default KMS customer managed key ID. If you want to explicitly set the <code> x-amz-server-side-encryption-aws-kms-key-id</code> header, it must match the bucket's default customer managed key (using key ID or ARN, not alias). Your SSE-KMS configuration can only support 1 <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#customer-cmk">customer managed key</a> per directory bucket's lifetime. The <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-managed-cmk">Amazon Web Services managed key</a> (<code>aws/s3</code>) isn't supported. Incorrect key specification results in an HTTP <code>400 Bad Request</code> error.</p>
1582    pub fn ssekms_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
1583        self.ssekms_key_id = ::std::option::Option::Some(input.into());
1584        self
1585    }
1586    /// <p>Specifies the KMS key ID (Key ID, Key ARN, or Key Alias) to use for object encryption. If the KMS key doesn't exist in the same account that's issuing the command, you must use the full Key ARN not the Key ID.</p>
1587    /// <p><b>General purpose buckets</b> - If you specify <code>x-amz-server-side-encryption</code> with <code>aws:kms</code> or <code>aws:kms:dsse</code>, this header specifies the ID (Key ID, Key ARN, or Key Alias) of the KMS key to use. If you specify <code>x-amz-server-side-encryption:aws:kms</code> or <code>x-amz-server-side-encryption:aws:kms:dsse</code>, but do not provide <code>x-amz-server-side-encryption-aws-kms-key-id</code>, Amazon S3 uses the Amazon Web Services managed key (<code>aws/s3</code>) to protect the data.</p>
1588    /// <p><b>Directory buckets</b> - To encrypt data using SSE-KMS, it's recommended to specify the <code>x-amz-server-side-encryption</code> header to <code>aws:kms</code>. Then, the <code>x-amz-server-side-encryption-aws-kms-key-id</code> header implicitly uses the bucket's default KMS customer managed key ID. If you want to explicitly set the <code> x-amz-server-side-encryption-aws-kms-key-id</code> header, it must match the bucket's default customer managed key (using key ID or ARN, not alias). Your SSE-KMS configuration can only support 1 <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#customer-cmk">customer managed key</a> per directory bucket's lifetime. The <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-managed-cmk">Amazon Web Services managed key</a> (<code>aws/s3</code>) isn't supported. Incorrect key specification results in an HTTP <code>400 Bad Request</code> error.</p>
1589    pub fn set_ssekms_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
1590        self.ssekms_key_id = input;
1591        self
1592    }
1593    /// <p>Specifies the KMS key ID (Key ID, Key ARN, or Key Alias) to use for object encryption. If the KMS key doesn't exist in the same account that's issuing the command, you must use the full Key ARN not the Key ID.</p>
1594    /// <p><b>General purpose buckets</b> - If you specify <code>x-amz-server-side-encryption</code> with <code>aws:kms</code> or <code>aws:kms:dsse</code>, this header specifies the ID (Key ID, Key ARN, or Key Alias) of the KMS key to use. If you specify <code>x-amz-server-side-encryption:aws:kms</code> or <code>x-amz-server-side-encryption:aws:kms:dsse</code>, but do not provide <code>x-amz-server-side-encryption-aws-kms-key-id</code>, Amazon S3 uses the Amazon Web Services managed key (<code>aws/s3</code>) to protect the data.</p>
1595    /// <p><b>Directory buckets</b> - To encrypt data using SSE-KMS, it's recommended to specify the <code>x-amz-server-side-encryption</code> header to <code>aws:kms</code>. Then, the <code>x-amz-server-side-encryption-aws-kms-key-id</code> header implicitly uses the bucket's default KMS customer managed key ID. If you want to explicitly set the <code> x-amz-server-side-encryption-aws-kms-key-id</code> header, it must match the bucket's default customer managed key (using key ID or ARN, not alias). Your SSE-KMS configuration can only support 1 <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#customer-cmk">customer managed key</a> per directory bucket's lifetime. The <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-managed-cmk">Amazon Web Services managed key</a> (<code>aws/s3</code>) isn't supported. Incorrect key specification results in an HTTP <code>400 Bad Request</code> error.</p>
1596    pub fn get_ssekms_key_id(&self) -> &::std::option::Option<::std::string::String> {
1597        &self.ssekms_key_id
1598    }
1599    /// <p>Specifies the Amazon Web Services KMS Encryption Context to use for object encryption. The value of this header is a Base64 encoded string of a UTF-8 encoded JSON, which contains the encryption context as key-value pairs.</p>
1600    /// <p><b>Directory buckets</b> - You can optionally provide an explicit encryption context value. The value must match the default encryption context - the bucket Amazon Resource Name (ARN). An additional encryption context value is not supported.</p>
1601    pub fn ssekms_encryption_context(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
1602        self.ssekms_encryption_context = ::std::option::Option::Some(input.into());
1603        self
1604    }
1605    /// <p>Specifies the Amazon Web Services KMS Encryption Context to use for object encryption. The value of this header is a Base64 encoded string of a UTF-8 encoded JSON, which contains the encryption context as key-value pairs.</p>
1606    /// <p><b>Directory buckets</b> - You can optionally provide an explicit encryption context value. The value must match the default encryption context - the bucket Amazon Resource Name (ARN). An additional encryption context value is not supported.</p>
1607    pub fn set_ssekms_encryption_context(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
1608        self.ssekms_encryption_context = input;
1609        self
1610    }
1611    /// <p>Specifies the Amazon Web Services KMS Encryption Context to use for object encryption. The value of this header is a Base64 encoded string of a UTF-8 encoded JSON, which contains the encryption context as key-value pairs.</p>
1612    /// <p><b>Directory buckets</b> - You can optionally provide an explicit encryption context value. The value must match the default encryption context - the bucket Amazon Resource Name (ARN). An additional encryption context value is not supported.</p>
1613    pub fn get_ssekms_encryption_context(&self) -> &::std::option::Option<::std::string::String> {
1614        &self.ssekms_encryption_context
1615    }
1616    /// <p>Specifies whether Amazon S3 should use an S3 Bucket Key for object encryption with server-side encryption using Key Management Service (KMS) keys (SSE-KMS).</p>
1617    /// <p><b>General purpose buckets</b> - Setting this header to <code>true</code> causes Amazon S3 to use an S3 Bucket Key for object encryption with SSE-KMS. Also, specifying this header with a PUT action doesn't affect bucket-level settings for S3 Bucket Key.</p>
1618    /// <p><b>Directory buckets</b> - S3 Bucket Keys are always enabled for <code>GET</code> and <code>PUT</code> operations in a directory bucket and can’t be disabled. S3 Bucket Keys aren't supported, when you copy SSE-KMS encrypted objects from general purpose buckets to directory buckets, from directory buckets to general purpose buckets, or between directory buckets, through <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a>, <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>, <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-buckets-objects-Batch-Ops">the Copy operation in Batch Operations</a>, or <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/create-import-job">the import jobs</a>. In this case, Amazon S3 makes a call to KMS every time a copy request is made for a KMS-encrypted object.</p>
1619    pub fn bucket_key_enabled(mut self, input: bool) -> Self {
1620        self.bucket_key_enabled = ::std::option::Option::Some(input);
1621        self
1622    }
1623    /// <p>Specifies whether Amazon S3 should use an S3 Bucket Key for object encryption with server-side encryption using Key Management Service (KMS) keys (SSE-KMS).</p>
1624    /// <p><b>General purpose buckets</b> - Setting this header to <code>true</code> causes Amazon S3 to use an S3 Bucket Key for object encryption with SSE-KMS. Also, specifying this header with a PUT action doesn't affect bucket-level settings for S3 Bucket Key.</p>
1625    /// <p><b>Directory buckets</b> - S3 Bucket Keys are always enabled for <code>GET</code> and <code>PUT</code> operations in a directory bucket and can’t be disabled. S3 Bucket Keys aren't supported, when you copy SSE-KMS encrypted objects from general purpose buckets to directory buckets, from directory buckets to general purpose buckets, or between directory buckets, through <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a>, <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>, <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-buckets-objects-Batch-Ops">the Copy operation in Batch Operations</a>, or <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/create-import-job">the import jobs</a>. In this case, Amazon S3 makes a call to KMS every time a copy request is made for a KMS-encrypted object.</p>
1626    pub fn set_bucket_key_enabled(mut self, input: ::std::option::Option<bool>) -> Self {
1627        self.bucket_key_enabled = input;
1628        self
1629    }
1630    /// <p>Specifies whether Amazon S3 should use an S3 Bucket Key for object encryption with server-side encryption using Key Management Service (KMS) keys (SSE-KMS).</p>
1631    /// <p><b>General purpose buckets</b> - Setting this header to <code>true</code> causes Amazon S3 to use an S3 Bucket Key for object encryption with SSE-KMS. Also, specifying this header with a PUT action doesn't affect bucket-level settings for S3 Bucket Key.</p>
1632    /// <p><b>Directory buckets</b> - S3 Bucket Keys are always enabled for <code>GET</code> and <code>PUT</code> operations in a directory bucket and can’t be disabled. S3 Bucket Keys aren't supported, when you copy SSE-KMS encrypted objects from general purpose buckets to directory buckets, from directory buckets to general purpose buckets, or between directory buckets, through <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html">CopyObject</a>, <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_UploadPartCopy.html">UploadPartCopy</a>, <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-buckets-objects-Batch-Ops">the Copy operation in Batch Operations</a>, or <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/create-import-job">the import jobs</a>. In this case, Amazon S3 makes a call to KMS every time a copy request is made for a KMS-encrypted object.</p>
1633    pub fn get_bucket_key_enabled(&self) -> &::std::option::Option<bool> {
1634        &self.bucket_key_enabled
1635    }
1636    /// <p>Confirms that the requester knows that they will be charged for the request. Bucket owners need not specify this parameter in their requests. If either the source or destination S3 bucket has Requester Pays enabled, the requester will pay for corresponding charges to copy the object. For information about downloading objects from Requester Pays buckets, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/ObjectsinRequesterPaysBuckets.html">Downloading Objects in Requester Pays Buckets</a> in the <i>Amazon S3 User Guide</i>.</p><note>
1637    /// <p>This functionality is not supported for directory buckets.</p>
1638    /// </note>
1639    pub fn request_payer(mut self, input: crate::types::RequestPayer) -> Self {
1640        self.request_payer = ::std::option::Option::Some(input);
1641        self
1642    }
1643    /// <p>Confirms that the requester knows that they will be charged for the request. Bucket owners need not specify this parameter in their requests. If either the source or destination S3 bucket has Requester Pays enabled, the requester will pay for corresponding charges to copy the object. For information about downloading objects from Requester Pays buckets, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/ObjectsinRequesterPaysBuckets.html">Downloading Objects in Requester Pays Buckets</a> in the <i>Amazon S3 User Guide</i>.</p><note>
1644    /// <p>This functionality is not supported for directory buckets.</p>
1645    /// </note>
1646    pub fn set_request_payer(mut self, input: ::std::option::Option<crate::types::RequestPayer>) -> Self {
1647        self.request_payer = input;
1648        self
1649    }
1650    /// <p>Confirms that the requester knows that they will be charged for the request. Bucket owners need not specify this parameter in their requests. If either the source or destination S3 bucket has Requester Pays enabled, the requester will pay for corresponding charges to copy the object. For information about downloading objects from Requester Pays buckets, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/ObjectsinRequesterPaysBuckets.html">Downloading Objects in Requester Pays Buckets</a> in the <i>Amazon S3 User Guide</i>.</p><note>
1651    /// <p>This functionality is not supported for directory buckets.</p>
1652    /// </note>
1653    pub fn get_request_payer(&self) -> &::std::option::Option<crate::types::RequestPayer> {
1654        &self.request_payer
1655    }
1656    /// <p>The tag-set for the object. The tag-set must be encoded as URL Query parameters.</p><note>
1657    /// <p>This functionality is not supported for directory buckets.</p>
1658    /// </note>
1659    pub fn tagging(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
1660        self.tagging = ::std::option::Option::Some(input.into());
1661        self
1662    }
1663    /// <p>The tag-set for the object. The tag-set must be encoded as URL Query parameters.</p><note>
1664    /// <p>This functionality is not supported for directory buckets.</p>
1665    /// </note>
1666    pub fn set_tagging(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
1667        self.tagging = input;
1668        self
1669    }
1670    /// <p>The tag-set for the object. The tag-set must be encoded as URL Query parameters.</p><note>
1671    /// <p>This functionality is not supported for directory buckets.</p>
1672    /// </note>
1673    pub fn get_tagging(&self) -> &::std::option::Option<::std::string::String> {
1674        &self.tagging
1675    }
1676    /// <p>Specifies the Object Lock mode that you want to apply to the uploaded object.</p><note>
1677    /// <p>This functionality is not supported for directory buckets.</p>
1678    /// </note>
1679    pub fn object_lock_mode(mut self, input: crate::types::ObjectLockMode) -> Self {
1680        self.object_lock_mode = ::std::option::Option::Some(input);
1681        self
1682    }
1683    /// <p>Specifies the Object Lock mode that you want to apply to the uploaded object.</p><note>
1684    /// <p>This functionality is not supported for directory buckets.</p>
1685    /// </note>
1686    pub fn set_object_lock_mode(mut self, input: ::std::option::Option<crate::types::ObjectLockMode>) -> Self {
1687        self.object_lock_mode = input;
1688        self
1689    }
1690    /// <p>Specifies the Object Lock mode that you want to apply to the uploaded object.</p><note>
1691    /// <p>This functionality is not supported for directory buckets.</p>
1692    /// </note>
1693    pub fn get_object_lock_mode(&self) -> &::std::option::Option<crate::types::ObjectLockMode> {
1694        &self.object_lock_mode
1695    }
1696    /// <p>Specifies the date and time when you want the Object Lock to expire.</p><note>
1697    /// <p>This functionality is not supported for directory buckets.</p>
1698    /// </note>
1699    pub fn object_lock_retain_until_date(mut self, input: ::aws_smithy_types::DateTime) -> Self {
1700        self.object_lock_retain_until_date = ::std::option::Option::Some(input);
1701        self
1702    }
1703    /// <p>Specifies the date and time when you want the Object Lock to expire.</p><note>
1704    /// <p>This functionality is not supported for directory buckets.</p>
1705    /// </note>
1706    pub fn set_object_lock_retain_until_date(mut self, input: ::std::option::Option<::aws_smithy_types::DateTime>) -> Self {
1707        self.object_lock_retain_until_date = input;
1708        self
1709    }
1710    /// <p>Specifies the date and time when you want the Object Lock to expire.</p><note>
1711    /// <p>This functionality is not supported for directory buckets.</p>
1712    /// </note>
1713    pub fn get_object_lock_retain_until_date(&self) -> &::std::option::Option<::aws_smithy_types::DateTime> {
1714        &self.object_lock_retain_until_date
1715    }
1716    /// <p>Specifies whether you want to apply a legal hold to the uploaded object.</p><note>
1717    /// <p>This functionality is not supported for directory buckets.</p>
1718    /// </note>
1719    pub fn object_lock_legal_hold_status(mut self, input: crate::types::ObjectLockLegalHoldStatus) -> Self {
1720        self.object_lock_legal_hold_status = ::std::option::Option::Some(input);
1721        self
1722    }
1723    /// <p>Specifies whether you want to apply a legal hold to the uploaded object.</p><note>
1724    /// <p>This functionality is not supported for directory buckets.</p>
1725    /// </note>
1726    pub fn set_object_lock_legal_hold_status(mut self, input: ::std::option::Option<crate::types::ObjectLockLegalHoldStatus>) -> Self {
1727        self.object_lock_legal_hold_status = input;
1728        self
1729    }
1730    /// <p>Specifies whether you want to apply a legal hold to the uploaded object.</p><note>
1731    /// <p>This functionality is not supported for directory buckets.</p>
1732    /// </note>
1733    pub fn get_object_lock_legal_hold_status(&self) -> &::std::option::Option<crate::types::ObjectLockLegalHoldStatus> {
1734        &self.object_lock_legal_hold_status
1735    }
1736    /// <p>The account ID of the expected bucket owner. If the account ID that you provide does not match the actual owner of the bucket, the request fails with the HTTP status code <code>403 Forbidden</code> (access denied).</p>
1737    pub fn expected_bucket_owner(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
1738        self.expected_bucket_owner = ::std::option::Option::Some(input.into());
1739        self
1740    }
1741    /// <p>The account ID of the expected bucket owner. If the account ID that you provide does not match the actual owner of the bucket, the request fails with the HTTP status code <code>403 Forbidden</code> (access denied).</p>
1742    pub fn set_expected_bucket_owner(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
1743        self.expected_bucket_owner = input;
1744        self
1745    }
1746    /// <p>The account ID of the expected bucket owner. If the account ID that you provide does not match the actual owner of the bucket, the request fails with the HTTP status code <code>403 Forbidden</code> (access denied).</p>
1747    pub fn get_expected_bucket_owner(&self) -> &::std::option::Option<::std::string::String> {
1748        &self.expected_bucket_owner
1749    }
1750    /// <p>Indicates the algorithm that you want Amazon S3 to use to create the checksum for the object. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html">Checking object integrity</a> in the <i>Amazon S3 User Guide</i>.</p>
1751    pub fn checksum_algorithm(mut self, input: crate::types::ChecksumAlgorithm) -> Self {
1752        self.checksum_algorithm = ::std::option::Option::Some(input);
1753        self
1754    }
1755    /// <p>Indicates the algorithm that you want Amazon S3 to use to create the checksum for the object. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html">Checking object integrity</a> in the <i>Amazon S3 User Guide</i>.</p>
1756    pub fn set_checksum_algorithm(mut self, input: ::std::option::Option<crate::types::ChecksumAlgorithm>) -> Self {
1757        self.checksum_algorithm = input;
1758        self
1759    }
1760    /// <p>Indicates the algorithm that you want Amazon S3 to use to create the checksum for the object. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html">Checking object integrity</a> in the <i>Amazon S3 User Guide</i>.</p>
1761    pub fn get_checksum_algorithm(&self) -> &::std::option::Option<crate::types::ChecksumAlgorithm> {
1762        &self.checksum_algorithm
1763    }
1764    /// <p>Indicates the checksum type that you want Amazon S3 to use to calculate the object’s checksum value. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html">Checking object integrity in the Amazon S3 User Guide</a>.</p>
1765    pub fn checksum_type(mut self, input: crate::types::ChecksumType) -> Self {
1766        self.checksum_type = ::std::option::Option::Some(input);
1767        self
1768    }
1769    /// <p>Indicates the checksum type that you want Amazon S3 to use to calculate the object’s checksum value. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html">Checking object integrity in the Amazon S3 User Guide</a>.</p>
1770    pub fn set_checksum_type(mut self, input: ::std::option::Option<crate::types::ChecksumType>) -> Self {
1771        self.checksum_type = input;
1772        self
1773    }
1774    /// <p>Indicates the checksum type that you want Amazon S3 to use to calculate the object’s checksum value. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html">Checking object integrity in the Amazon S3 User Guide</a>.</p>
1775    pub fn get_checksum_type(&self) -> &::std::option::Option<crate::types::ChecksumType> {
1776        &self.checksum_type
1777    }
1778    /// Consumes the builder and constructs a [`CreateMultipartUploadInput`](crate::operation::create_multipart_upload::CreateMultipartUploadInput).
1779    pub fn build(
1780        self,
1781    ) -> ::std::result::Result<crate::operation::create_multipart_upload::CreateMultipartUploadInput, ::aws_smithy_types::error::operation::BuildError>
1782    {
1783        ::std::result::Result::Ok(crate::operation::create_multipart_upload::CreateMultipartUploadInput {
1784            acl: self.acl,
1785            bucket: self.bucket,
1786            cache_control: self.cache_control,
1787            content_disposition: self.content_disposition,
1788            content_encoding: self.content_encoding,
1789            content_language: self.content_language,
1790            content_type: self.content_type,
1791            expires: self.expires,
1792            grant_full_control: self.grant_full_control,
1793            grant_read: self.grant_read,
1794            grant_read_acp: self.grant_read_acp,
1795            grant_write_acp: self.grant_write_acp,
1796            key: self.key,
1797            metadata: self.metadata,
1798            server_side_encryption: self.server_side_encryption,
1799            storage_class: self.storage_class,
1800            website_redirect_location: self.website_redirect_location,
1801            sse_customer_algorithm: self.sse_customer_algorithm,
1802            sse_customer_key: self.sse_customer_key,
1803            sse_customer_key_md5: self.sse_customer_key_md5,
1804            ssekms_key_id: self.ssekms_key_id,
1805            ssekms_encryption_context: self.ssekms_encryption_context,
1806            bucket_key_enabled: self.bucket_key_enabled,
1807            request_payer: self.request_payer,
1808            tagging: self.tagging,
1809            object_lock_mode: self.object_lock_mode,
1810            object_lock_retain_until_date: self.object_lock_retain_until_date,
1811            object_lock_legal_hold_status: self.object_lock_legal_hold_status,
1812            expected_bucket_owner: self.expected_bucket_owner,
1813            checksum_algorithm: self.checksum_algorithm,
1814            checksum_type: self.checksum_type,
1815        })
1816    }
1817}
1818impl ::std::fmt::Debug for CreateMultipartUploadInputBuilder {
1819    fn fmt(&self, f: &mut ::std::fmt::Formatter<'_>) -> ::std::fmt::Result {
1820        let mut formatter = f.debug_struct("CreateMultipartUploadInputBuilder");
1821        formatter.field("acl", &self.acl);
1822        formatter.field("bucket", &self.bucket);
1823        formatter.field("cache_control", &self.cache_control);
1824        formatter.field("content_disposition", &self.content_disposition);
1825        formatter.field("content_encoding", &self.content_encoding);
1826        formatter.field("content_language", &self.content_language);
1827        formatter.field("content_type", &self.content_type);
1828        formatter.field("expires", &self.expires);
1829        formatter.field("grant_full_control", &self.grant_full_control);
1830        formatter.field("grant_read", &self.grant_read);
1831        formatter.field("grant_read_acp", &self.grant_read_acp);
1832        formatter.field("grant_write_acp", &self.grant_write_acp);
1833        formatter.field("key", &self.key);
1834        formatter.field("metadata", &self.metadata);
1835        formatter.field("server_side_encryption", &self.server_side_encryption);
1836        formatter.field("storage_class", &self.storage_class);
1837        formatter.field("website_redirect_location", &self.website_redirect_location);
1838        formatter.field("sse_customer_algorithm", &self.sse_customer_algorithm);
1839        formatter.field("sse_customer_key", &"*** Sensitive Data Redacted ***");
1840        formatter.field("sse_customer_key_md5", &self.sse_customer_key_md5);
1841        formatter.field("ssekms_key_id", &"*** Sensitive Data Redacted ***");
1842        formatter.field("ssekms_encryption_context", &"*** Sensitive Data Redacted ***");
1843        formatter.field("bucket_key_enabled", &self.bucket_key_enabled);
1844        formatter.field("request_payer", &self.request_payer);
1845        formatter.field("tagging", &self.tagging);
1846        formatter.field("object_lock_mode", &self.object_lock_mode);
1847        formatter.field("object_lock_retain_until_date", &self.object_lock_retain_until_date);
1848        formatter.field("object_lock_legal_hold_status", &self.object_lock_legal_hold_status);
1849        formatter.field("expected_bucket_owner", &self.expected_bucket_owner);
1850        formatter.field("checksum_algorithm", &self.checksum_algorithm);
1851        formatter.field("checksum_type", &self.checksum_type);
1852        formatter.finish()
1853    }
1854}