Class CreateMultipartUploadRequest
- All Implemented Interfaces:
SdkPojo,ToCopyableBuilder<CreateMultipartUploadRequest.Builder,CreateMultipartUploadRequest>
-
Nested Class Summary
Nested Classes -
Method Summary
Modifier and TypeMethodDescriptionfinal ObjectCannedACLacl()The canned ACL to apply to the object.final StringThe canned ACL to apply to the object.final Stringbucket()The name of the bucket where the multipart upload is initiated and where the object is uploaded.final BooleanSpecifies whether Amazon S3 should use an S3 Bucket Key for object encryption with server-side encryption using Key Management Service (KMS) keys (SSE-KMS).builder()final StringSpecifies caching behavior along the request/reply chain.final ChecksumAlgorithmIndicates the algorithm that you want Amazon S3 to use to create the checksum for the object.final StringIndicates the algorithm that you want Amazon S3 to use to create the checksum for the object.final StringSpecifies presentational information for the object.final StringSpecifies what content encodings have been applied to the object and thus what decoding mechanisms must be applied to obtain the media-type referenced by the Content-Type header field.final StringThe language that the content is in.final StringA standard MIME type describing the format of the object data.final booleanfinal booleanequalsBySdkFields(Object obj) Indicates whether some other object is "equal to" this one by SDK fields.final StringThe account ID of the expected bucket owner.final Instantexpires()The date and time at which the object is no longer cacheable.final <T> Optional<T> getValueForField(String fieldName, Class<T> clazz) Used to retrieve the value of a field from any class that extendsSdkRequest.final StringSpecify access permissions explicitly to give the grantee READ, READ_ACP, and WRITE_ACP permissions on the object.final StringSpecify access permissions explicitly to allow grantee to read the object data and its metadata.final StringSpecify access permissions explicitly to allows grantee to read the object ACL.final StringSpecify access permissions explicitly to allows grantee to allow grantee to write the ACL for the applicable object.final inthashCode()final booleanFor responses, this returns true if the service returned a value for the Metadata property.final Stringkey()Object key for which the multipart upload is to be initiated.metadata()A map of metadata to store with the object in S3.Specifies whether you want to apply a legal hold to the uploaded object.final StringSpecifies whether you want to apply a legal hold to the uploaded object.final ObjectLockModeSpecifies the Object Lock mode that you want to apply to the uploaded object.final StringSpecifies the Object Lock mode that you want to apply to the uploaded object.final InstantSpecifies the date and time when you want the Object Lock to expire.final RequestPayerReturns the value of the RequestPayer property for this object.final StringReturns the value of the RequestPayer property for this object.static Class<? extends CreateMultipartUploadRequest.Builder> final ServerSideEncryptionThe server-side encryption algorithm used when you store this object in Amazon S3 (for example,AES256,aws:kms).final StringThe server-side encryption algorithm used when you store this object in Amazon S3 (for example,AES256,aws:kms).final StringSpecifies the algorithm to use when encrypting the object (for example, AES256).final StringSpecifies the customer-provided encryption key for Amazon S3 to use in encrypting data.final StringSpecifies the 128-bit MD5 digest of the customer-provided encryption key according to RFC 1321.final StringSpecifies the Amazon Web Services KMS Encryption Context to use for object encryption.final StringSpecifies the KMS key ID (Key ID, Key ARN, or Key Alias) to use for object encryption.final StorageClassBy default, Amazon S3 uses the STANDARD Storage Class to store newly created objects.final StringBy default, Amazon S3 uses the STANDARD Storage Class to store newly created objects.final Stringtagging()The tag-set for the object.Take this object and create a builder that contains all of the current property values of this object.final StringtoString()Returns a string representation of this object.final StringIf the bucket is configured as a website, redirects requests for this object to another object in the same bucket or to an external URL.Methods inherited from class software.amazon.awssdk.awscore.AwsRequest
overrideConfigurationMethods inherited from interface software.amazon.awssdk.utils.builder.ToCopyableBuilder
copy
-
Method Details
-
acl
The canned ACL to apply to the object. Amazon S3 supports a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees and permissions. For more information, see Canned ACL in the Amazon S3 User Guide.
By default, all objects are private. Only the owner has full access control. When uploading an object, you can grant access permissions to individual Amazon Web Services accounts or to predefined groups defined by Amazon S3. These permissions are then added to the access control list (ACL) on the new object. For more information, see Using ACLs. One way to grant the permissions using the request headers is to specify a canned ACL with the
x-amz-aclrequest header.-
This functionality is not supported for directory buckets.
-
This functionality is not supported for Amazon S3 on Outposts.
If the service returns an enum value that is not available in the current SDK version,
aclwill returnObjectCannedACL.UNKNOWN_TO_SDK_VERSION. The raw value returned by the service is available fromaclAsString().- Returns:
- The canned ACL to apply to the object. Amazon S3 supports a set of predefined ACLs, known as canned
ACLs. Each canned ACL has a predefined set of grantees and permissions. For more information, see Canned ACL in the
Amazon S3 User Guide.
By default, all objects are private. Only the owner has full access control. When uploading an object, you can grant access permissions to individual Amazon Web Services accounts or to predefined groups defined by Amazon S3. These permissions are then added to the access control list (ACL) on the new object. For more information, see Using ACLs. One way to grant the permissions using the request headers is to specify a canned ACL with the
x-amz-aclrequest header.-
This functionality is not supported for directory buckets.
-
This functionality is not supported for Amazon S3 on Outposts.
-
- See Also:
-
-
aclAsString
The canned ACL to apply to the object. Amazon S3 supports a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees and permissions. For more information, see Canned ACL in the Amazon S3 User Guide.
By default, all objects are private. Only the owner has full access control. When uploading an object, you can grant access permissions to individual Amazon Web Services accounts or to predefined groups defined by Amazon S3. These permissions are then added to the access control list (ACL) on the new object. For more information, see Using ACLs. One way to grant the permissions using the request headers is to specify a canned ACL with the
x-amz-aclrequest header.-
This functionality is not supported for directory buckets.
-
This functionality is not supported for Amazon S3 on Outposts.
If the service returns an enum value that is not available in the current SDK version,
aclwill returnObjectCannedACL.UNKNOWN_TO_SDK_VERSION. The raw value returned by the service is available fromaclAsString().- Returns:
- The canned ACL to apply to the object. Amazon S3 supports a set of predefined ACLs, known as canned
ACLs. Each canned ACL has a predefined set of grantees and permissions. For more information, see Canned ACL in the
Amazon S3 User Guide.
By default, all objects are private. Only the owner has full access control. When uploading an object, you can grant access permissions to individual Amazon Web Services accounts or to predefined groups defined by Amazon S3. These permissions are then added to the access control list (ACL) on the new object. For more information, see Using ACLs. One way to grant the permissions using the request headers is to specify a canned ACL with the
x-amz-aclrequest header.-
This functionality is not supported for directory buckets.
-
This functionality is not supported for Amazon S3 on Outposts.
-
- See Also:
-
-
bucket
The name of the bucket where the multipart upload is initiated and where the object is uploaded.
Directory buckets - When you use this operation with a directory bucket, you must use virtual-hosted-style requests in the format
Bucket_name.s3express-az_id.region.amazonaws.com. Path-style requests are not supported. Directory bucket names must be unique in the chosen Availability Zone. Bucket names must follow the formatbucket_base_name--az-id--x-s3(for example,DOC-EXAMPLE-BUCKET--usw2-az1--x-s3). For information about bucket naming restrictions, see Directory bucket naming rules in the Amazon S3 User Guide.Access points - When you use this action with an access point, you must provide the alias of the access point in place of the bucket name or specify the access point ARN. When using the access point ARN, you must direct requests to the access point hostname. The access point hostname takes the form AccessPointName-AccountId.s3-accesspoint.Region.amazonaws.com. When using this action with an access point through the Amazon Web Services SDKs, you provide the access point ARN in place of the bucket name. For more information about access point ARNs, see Using access points in the Amazon S3 User Guide.
Access points and Object Lambda access points are not supported by directory buckets.
S3 on Outposts - When you use this action with Amazon S3 on Outposts, you must direct requests to the S3 on Outposts hostname. The S3 on Outposts hostname takes the form
AccessPointName-AccountId.outpostID.s3-outposts.Region.amazonaws.com. When you use this action with S3 on Outposts through the Amazon Web Services SDKs, you provide the Outposts access point ARN in place of the bucket name. For more information about S3 on Outposts ARNs, see What is S3 on Outposts? in the Amazon S3 User Guide.- Returns:
- The name of the bucket where the multipart upload is initiated and where the object is uploaded.
Directory buckets - When you use this operation with a directory bucket, you must use virtual-hosted-style requests in the format
Bucket_name.s3express-az_id.region.amazonaws.com. Path-style requests are not supported. Directory bucket names must be unique in the chosen Availability Zone. Bucket names must follow the formatbucket_base_name--az-id--x-s3(for example,DOC-EXAMPLE-BUCKET--usw2-az1--x-s3). For information about bucket naming restrictions, see Directory bucket naming rules in the Amazon S3 User Guide.Access points - When you use this action with an access point, you must provide the alias of the access point in place of the bucket name or specify the access point ARN. When using the access point ARN, you must direct requests to the access point hostname. The access point hostname takes the form AccessPointName-AccountId.s3-accesspoint.Region.amazonaws.com. When using this action with an access point through the Amazon Web Services SDKs, you provide the access point ARN in place of the bucket name. For more information about access point ARNs, see Using access points in the Amazon S3 User Guide.
Access points and Object Lambda access points are not supported by directory buckets.
S3 on Outposts - When you use this action with Amazon S3 on Outposts, you must direct requests to the S3 on Outposts hostname. The S3 on Outposts hostname takes the form
AccessPointName-AccountId.outpostID.s3-outposts.Region.amazonaws.com. When you use this action with S3 on Outposts through the Amazon Web Services SDKs, you provide the Outposts access point ARN in place of the bucket name. For more information about S3 on Outposts ARNs, see What is S3 on Outposts? in the Amazon S3 User Guide.
-
cacheControl
Specifies caching behavior along the request/reply chain.
- Returns:
- Specifies caching behavior along the request/reply chain.
-
contentDisposition
Specifies presentational information for the object.
- Returns:
- Specifies presentational information for the object.
-
contentEncoding
Specifies what content encodings have been applied to the object and thus what decoding mechanisms must be applied to obtain the media-type referenced by the Content-Type header field.
For directory buckets, only the
aws-chunkedvalue is supported in this header field.- Returns:
- Specifies what content encodings have been applied to the object and thus what decoding mechanisms must
be applied to obtain the media-type referenced by the Content-Type header field.
For directory buckets, only the
aws-chunkedvalue is supported in this header field.
-
contentLanguage
The language that the content is in.
- Returns:
- The language that the content is in.
-
contentType
A standard MIME type describing the format of the object data.
- Returns:
- A standard MIME type describing the format of the object data.
-
expires
The date and time at which the object is no longer cacheable.
- Returns:
- The date and time at which the object is no longer cacheable.
-
grantFullControl
Specify access permissions explicitly to give the grantee READ, READ_ACP, and WRITE_ACP permissions on the object.
By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see Access Control List (ACL) Overview in the Amazon S3 User Guide.
You specify each grantee as a type=value pair, where the type is one of the following:
-
id– if the value specified is the canonical user ID of an Amazon Web Services account -
uri– if you are granting permissions to a predefined group -
emailAddress– if the value specified is the email address of an Amazon Web Services accountUsing email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:
-
US East (N. Virginia)
-
US West (N. California)
-
US West (Oregon)
-
Asia Pacific (Singapore)
-
Asia Pacific (Sydney)
-
Asia Pacific (Tokyo)
-
Europe (Ireland)
-
South America (São Paulo)
For a list of all the Amazon S3 supported Regions and endpoints, see Regions and Endpoints in the Amazon Web Services General Reference.
-
For example, the following
x-amz-grant-readheader grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:x-amz-grant-read: id="11112222333", id="444455556666"-
This functionality is not supported for directory buckets.
-
This functionality is not supported for Amazon S3 on Outposts.
- Returns:
- Specify access permissions explicitly to give the grantee READ, READ_ACP, and WRITE_ACP permissions on
the object.
By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see Access Control List (ACL) Overview in the Amazon S3 User Guide.
You specify each grantee as a type=value pair, where the type is one of the following:
-
id– if the value specified is the canonical user ID of an Amazon Web Services account -
uri– if you are granting permissions to a predefined group -
emailAddress– if the value specified is the email address of an Amazon Web Services accountUsing email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:
-
US East (N. Virginia)
-
US West (N. California)
-
US West (Oregon)
-
Asia Pacific (Singapore)
-
Asia Pacific (Sydney)
-
Asia Pacific (Tokyo)
-
Europe (Ireland)
-
South America (São Paulo)
For a list of all the Amazon S3 supported Regions and endpoints, see Regions and Endpoints in the Amazon Web Services General Reference.
-
For example, the following
x-amz-grant-readheader grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:x-amz-grant-read: id="11112222333", id="444455556666"-
This functionality is not supported for directory buckets.
-
This functionality is not supported for Amazon S3 on Outposts.
-
-
-
grantRead
Specify access permissions explicitly to allow grantee to read the object data and its metadata.
By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see Access Control List (ACL) Overview in the Amazon S3 User Guide.
You specify each grantee as a type=value pair, where the type is one of the following:
-
id– if the value specified is the canonical user ID of an Amazon Web Services account -
uri– if you are granting permissions to a predefined group -
emailAddress– if the value specified is the email address of an Amazon Web Services accountUsing email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:
-
US East (N. Virginia)
-
US West (N. California)
-
US West (Oregon)
-
Asia Pacific (Singapore)
-
Asia Pacific (Sydney)
-
Asia Pacific (Tokyo)
-
Europe (Ireland)
-
South America (São Paulo)
For a list of all the Amazon S3 supported Regions and endpoints, see Regions and Endpoints in the Amazon Web Services General Reference.
-
For example, the following
x-amz-grant-readheader grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:x-amz-grant-read: id="11112222333", id="444455556666"-
This functionality is not supported for directory buckets.
-
This functionality is not supported for Amazon S3 on Outposts.
- Returns:
- Specify access permissions explicitly to allow grantee to read the object data and its metadata.
By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see Access Control List (ACL) Overview in the Amazon S3 User Guide.
You specify each grantee as a type=value pair, where the type is one of the following:
-
id– if the value specified is the canonical user ID of an Amazon Web Services account -
uri– if you are granting permissions to a predefined group -
emailAddress– if the value specified is the email address of an Amazon Web Services accountUsing email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:
-
US East (N. Virginia)
-
US West (N. California)
-
US West (Oregon)
-
Asia Pacific (Singapore)
-
Asia Pacific (Sydney)
-
Asia Pacific (Tokyo)
-
Europe (Ireland)
-
South America (São Paulo)
For a list of all the Amazon S3 supported Regions and endpoints, see Regions and Endpoints in the Amazon Web Services General Reference.
-
For example, the following
x-amz-grant-readheader grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:x-amz-grant-read: id="11112222333", id="444455556666"-
This functionality is not supported for directory buckets.
-
This functionality is not supported for Amazon S3 on Outposts.
-
-
-
grantReadACP
Specify access permissions explicitly to allows grantee to read the object ACL.
By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see Access Control List (ACL) Overview in the Amazon S3 User Guide.
You specify each grantee as a type=value pair, where the type is one of the following:
-
id– if the value specified is the canonical user ID of an Amazon Web Services account -
uri– if you are granting permissions to a predefined group -
emailAddress– if the value specified is the email address of an Amazon Web Services accountUsing email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:
-
US East (N. Virginia)
-
US West (N. California)
-
US West (Oregon)
-
Asia Pacific (Singapore)
-
Asia Pacific (Sydney)
-
Asia Pacific (Tokyo)
-
Europe (Ireland)
-
South America (São Paulo)
For a list of all the Amazon S3 supported Regions and endpoints, see Regions and Endpoints in the Amazon Web Services General Reference.
-
For example, the following
x-amz-grant-readheader grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:x-amz-grant-read: id="11112222333", id="444455556666"-
This functionality is not supported for directory buckets.
-
This functionality is not supported for Amazon S3 on Outposts.
- Returns:
- Specify access permissions explicitly to allows grantee to read the object ACL.
By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see Access Control List (ACL) Overview in the Amazon S3 User Guide.
You specify each grantee as a type=value pair, where the type is one of the following:
-
id– if the value specified is the canonical user ID of an Amazon Web Services account -
uri– if you are granting permissions to a predefined group -
emailAddress– if the value specified is the email address of an Amazon Web Services accountUsing email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:
-
US East (N. Virginia)
-
US West (N. California)
-
US West (Oregon)
-
Asia Pacific (Singapore)
-
Asia Pacific (Sydney)
-
Asia Pacific (Tokyo)
-
Europe (Ireland)
-
South America (São Paulo)
For a list of all the Amazon S3 supported Regions and endpoints, see Regions and Endpoints in the Amazon Web Services General Reference.
-
For example, the following
x-amz-grant-readheader grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:x-amz-grant-read: id="11112222333", id="444455556666"-
This functionality is not supported for directory buckets.
-
This functionality is not supported for Amazon S3 on Outposts.
-
-
-
grantWriteACP
Specify access permissions explicitly to allows grantee to allow grantee to write the ACL for the applicable object.
By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see Access Control List (ACL) Overview in the Amazon S3 User Guide.
You specify each grantee as a type=value pair, where the type is one of the following:
-
id– if the value specified is the canonical user ID of an Amazon Web Services account -
uri– if you are granting permissions to a predefined group -
emailAddress– if the value specified is the email address of an Amazon Web Services accountUsing email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:
-
US East (N. Virginia)
-
US West (N. California)
-
US West (Oregon)
-
Asia Pacific (Singapore)
-
Asia Pacific (Sydney)
-
Asia Pacific (Tokyo)
-
Europe (Ireland)
-
South America (São Paulo)
For a list of all the Amazon S3 supported Regions and endpoints, see Regions and Endpoints in the Amazon Web Services General Reference.
-
For example, the following
x-amz-grant-readheader grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:x-amz-grant-read: id="11112222333", id="444455556666"-
This functionality is not supported for directory buckets.
-
This functionality is not supported for Amazon S3 on Outposts.
- Returns:
- Specify access permissions explicitly to allows grantee to allow grantee to write the ACL for the
applicable object.
By default, all objects are private. Only the owner has full access control. When uploading an object, you can use this header to explicitly grant access permissions to specific Amazon Web Services accounts or groups. This header maps to specific permissions that Amazon S3 supports in an ACL. For more information, see Access Control List (ACL) Overview in the Amazon S3 User Guide.
You specify each grantee as a type=value pair, where the type is one of the following:
-
id– if the value specified is the canonical user ID of an Amazon Web Services account -
uri– if you are granting permissions to a predefined group -
emailAddress– if the value specified is the email address of an Amazon Web Services accountUsing email addresses to specify a grantee is only supported in the following Amazon Web Services Regions:
-
US East (N. Virginia)
-
US West (N. California)
-
US West (Oregon)
-
Asia Pacific (Singapore)
-
Asia Pacific (Sydney)
-
Asia Pacific (Tokyo)
-
Europe (Ireland)
-
South America (São Paulo)
For a list of all the Amazon S3 supported Regions and endpoints, see Regions and Endpoints in the Amazon Web Services General Reference.
-
For example, the following
x-amz-grant-readheader grants the Amazon Web Services accounts identified by account IDs permissions to read object data and its metadata:x-amz-grant-read: id="11112222333", id="444455556666"-
This functionality is not supported for directory buckets.
-
This functionality is not supported for Amazon S3 on Outposts.
-
-
-
key
Object key for which the multipart upload is to be initiated.
- Returns:
- Object key for which the multipart upload is to be initiated.
-
hasMetadata
public final boolean hasMetadata()For responses, this returns true if the service returned a value for the Metadata property. This DOES NOT check that the value is non-empty (for which, you should check theisEmpty()method on the property). This is useful because the SDK will never return a null collection or map, but you may need to differentiate between the service returning nothing (or null) and the service returning an empty collection or map. For requests, this returns true if a value for the property was specified in the request builder, and false if a value was not specified. -
metadata
A map of metadata to store with the object in S3.
Attempts to modify the collection returned by this method will result in an UnsupportedOperationException.
This method will never return null. If you would like to know whether the service returned this field (so that you can differentiate between null and empty), you can use the
hasMetadata()method.- Returns:
- A map of metadata to store with the object in S3.
-
serverSideEncryption
The server-side encryption algorithm used when you store this object in Amazon S3 (for example,
AES256,aws:kms).-
Directory buckets - For directory buckets, there are only two supported options for server-side encryption: server-side encryption with Amazon S3 managed keys (SSE-S3) (
AES256) and server-side encryption with KMS keys (SSE-KMS) (aws:kms). We recommend that the bucket's default encryption uses the desired encryption configuration and you don't override the bucket default encryption in yourCreateSessionrequests orPUTobject requests. Then, new objects are automatically encrypted with the desired encryption settings. For more information, see Protecting data with server-side encryption in the Amazon S3 User Guide. For more information about the encryption overriding behaviors in directory buckets, see Specifying server-side encryption with KMS for new object uploads.In the Zonal endpoint API calls (except CopyObject and UploadPartCopy) using the REST API, the encryption request headers must match the encryption settings that are specified in the
CreateSessionrequest. You can't override the values of the encryption settings (x-amz-server-side-encryption,x-amz-server-side-encryption-aws-kms-key-id,x-amz-server-side-encryption-context, andx-amz-server-side-encryption-bucket-key-enabled) that are specified in theCreateSessionrequest. You don't need to explicitly specify these encryption settings values in Zonal endpoint API calls, and Amazon S3 will use the encryption settings values from theCreateSessionrequest to protect new objects in the directory bucket.When you use the CLI or the Amazon Web Services SDKs, for
CreateSession, the session token refreshes automatically to avoid service interruptions when a session expires. The CLI or the Amazon Web Services SDKs use the bucket's default encryption configuration for theCreateSessionrequest. It's not supported to override the encryption settings values in theCreateSessionrequest. So in the Zonal endpoint API calls (except CopyObject and UploadPartCopy), the encryption request headers must match the default encryption configuration of the directory bucket.
If the service returns an enum value that is not available in the current SDK version,
serverSideEncryptionwill returnServerSideEncryption.UNKNOWN_TO_SDK_VERSION. The raw value returned by the service is available fromserverSideEncryptionAsString().- Returns:
- The server-side encryption algorithm used when you store this object in Amazon S3 (for example,
AES256,aws:kms).-
Directory buckets - For directory buckets, there are only two supported options for server-side encryption: server-side encryption with Amazon S3 managed keys (SSE-S3) (
AES256) and server-side encryption with KMS keys (SSE-KMS) (aws:kms). We recommend that the bucket's default encryption uses the desired encryption configuration and you don't override the bucket default encryption in yourCreateSessionrequests orPUTobject requests. Then, new objects are automatically encrypted with the desired encryption settings. For more information, see Protecting data with server-side encryption in the Amazon S3 User Guide. For more information about the encryption overriding behaviors in directory buckets, see Specifying server-side encryption with KMS for new object uploads.In the Zonal endpoint API calls (except CopyObject and UploadPartCopy) using the REST API, the encryption request headers must match the encryption settings that are specified in the
CreateSessionrequest. You can't override the values of the encryption settings (x-amz-server-side-encryption,x-amz-server-side-encryption-aws-kms-key-id,x-amz-server-side-encryption-context, andx-amz-server-side-encryption-bucket-key-enabled) that are specified in theCreateSessionrequest. You don't need to explicitly specify these encryption settings values in Zonal endpoint API calls, and Amazon S3 will use the encryption settings values from theCreateSessionrequest to protect new objects in the directory bucket.When you use the CLI or the Amazon Web Services SDKs, for
CreateSession, the session token refreshes automatically to avoid service interruptions when a session expires. The CLI or the Amazon Web Services SDKs use the bucket's default encryption configuration for theCreateSessionrequest. It's not supported to override the encryption settings values in theCreateSessionrequest. So in the Zonal endpoint API calls (except CopyObject and UploadPartCopy), the encryption request headers must match the default encryption configuration of the directory bucket.
-
- See Also:
-
-
serverSideEncryptionAsString
The server-side encryption algorithm used when you store this object in Amazon S3 (for example,
AES256,aws:kms).-
Directory buckets - For directory buckets, there are only two supported options for server-side encryption: server-side encryption with Amazon S3 managed keys (SSE-S3) (
AES256) and server-side encryption with KMS keys (SSE-KMS) (aws:kms). We recommend that the bucket's default encryption uses the desired encryption configuration and you don't override the bucket default encryption in yourCreateSessionrequests orPUTobject requests. Then, new objects are automatically encrypted with the desired encryption settings. For more information, see Protecting data with server-side encryption in the Amazon S3 User Guide. For more information about the encryption overriding behaviors in directory buckets, see Specifying server-side encryption with KMS for new object uploads.In the Zonal endpoint API calls (except CopyObject and UploadPartCopy) using the REST API, the encryption request headers must match the encryption settings that are specified in the
CreateSessionrequest. You can't override the values of the encryption settings (x-amz-server-side-encryption,x-amz-server-side-encryption-aws-kms-key-id,x-amz-server-side-encryption-context, andx-amz-server-side-encryption-bucket-key-enabled) that are specified in theCreateSessionrequest. You don't need to explicitly specify these encryption settings values in Zonal endpoint API calls, and Amazon S3 will use the encryption settings values from theCreateSessionrequest to protect new objects in the directory bucket.When you use the CLI or the Amazon Web Services SDKs, for
CreateSession, the session token refreshes automatically to avoid service interruptions when a session expires. The CLI or the Amazon Web Services SDKs use the bucket's default encryption configuration for theCreateSessionrequest. It's not supported to override the encryption settings values in theCreateSessionrequest. So in the Zonal endpoint API calls (except CopyObject and UploadPartCopy), the encryption request headers must match the default encryption configuration of the directory bucket.
If the service returns an enum value that is not available in the current SDK version,
serverSideEncryptionwill returnServerSideEncryption.UNKNOWN_TO_SDK_VERSION. The raw value returned by the service is available fromserverSideEncryptionAsString().- Returns:
- The server-side encryption algorithm used when you store this object in Amazon S3 (for example,
AES256,aws:kms).-
Directory buckets - For directory buckets, there are only two supported options for server-side encryption: server-side encryption with Amazon S3 managed keys (SSE-S3) (
AES256) and server-side encryption with KMS keys (SSE-KMS) (aws:kms). We recommend that the bucket's default encryption uses the desired encryption configuration and you don't override the bucket default encryption in yourCreateSessionrequests orPUTobject requests. Then, new objects are automatically encrypted with the desired encryption settings. For more information, see Protecting data with server-side encryption in the Amazon S3 User Guide. For more information about the encryption overriding behaviors in directory buckets, see Specifying server-side encryption with KMS for new object uploads.In the Zonal endpoint API calls (except CopyObject and UploadPartCopy) using the REST API, the encryption request headers must match the encryption settings that are specified in the
CreateSessionrequest. You can't override the values of the encryption settings (x-amz-server-side-encryption,x-amz-server-side-encryption-aws-kms-key-id,x-amz-server-side-encryption-context, andx-amz-server-side-encryption-bucket-key-enabled) that are specified in theCreateSessionrequest. You don't need to explicitly specify these encryption settings values in Zonal endpoint API calls, and Amazon S3 will use the encryption settings values from theCreateSessionrequest to protect new objects in the directory bucket.When you use the CLI or the Amazon Web Services SDKs, for
CreateSession, the session token refreshes automatically to avoid service interruptions when a session expires. The CLI or the Amazon Web Services SDKs use the bucket's default encryption configuration for theCreateSessionrequest. It's not supported to override the encryption settings values in theCreateSessionrequest. So in the Zonal endpoint API calls (except CopyObject and UploadPartCopy), the encryption request headers must match the default encryption configuration of the directory bucket.
-
- See Also:
-
-
storageClass
By default, Amazon S3 uses the STANDARD Storage Class to store newly created objects. The STANDARD storage class provides high durability and high availability. Depending on performance needs, you can specify a different Storage Class. For more information, see Storage Classes in the Amazon S3 User Guide.
-
For directory buckets, only the S3 Express One Zone storage class is supported to store newly created objects.
-
Amazon S3 on Outposts only uses the OUTPOSTS Storage Class.
If the service returns an enum value that is not available in the current SDK version,
storageClasswill returnStorageClass.UNKNOWN_TO_SDK_VERSION. The raw value returned by the service is available fromstorageClassAsString().- Returns:
- By default, Amazon S3 uses the STANDARD Storage Class to store newly created objects. The STANDARD
storage class provides high durability and high availability. Depending on performance needs, you can
specify a different Storage Class. For more information, see Storage Classes in
the Amazon S3 User Guide.
-
For directory buckets, only the S3 Express One Zone storage class is supported to store newly created objects.
-
Amazon S3 on Outposts only uses the OUTPOSTS Storage Class.
-
- See Also:
-
-
storageClassAsString
By default, Amazon S3 uses the STANDARD Storage Class to store newly created objects. The STANDARD storage class provides high durability and high availability. Depending on performance needs, you can specify a different Storage Class. For more information, see Storage Classes in the Amazon S3 User Guide.
-
For directory buckets, only the S3 Express One Zone storage class is supported to store newly created objects.
-
Amazon S3 on Outposts only uses the OUTPOSTS Storage Class.
If the service returns an enum value that is not available in the current SDK version,
storageClasswill returnStorageClass.UNKNOWN_TO_SDK_VERSION. The raw value returned by the service is available fromstorageClassAsString().- Returns:
- By default, Amazon S3 uses the STANDARD Storage Class to store newly created objects. The STANDARD
storage class provides high durability and high availability. Depending on performance needs, you can
specify a different Storage Class. For more information, see Storage Classes in
the Amazon S3 User Guide.
-
For directory buckets, only the S3 Express One Zone storage class is supported to store newly created objects.
-
Amazon S3 on Outposts only uses the OUTPOSTS Storage Class.
-
- See Also:
-
-
websiteRedirectLocation
If the bucket is configured as a website, redirects requests for this object to another object in the same bucket or to an external URL. Amazon S3 stores the value of this header in the object metadata.
This functionality is not supported for directory buckets.
- Returns:
- If the bucket is configured as a website, redirects requests for this object to another object in the
same bucket or to an external URL. Amazon S3 stores the value of this header in the object metadata.
This functionality is not supported for directory buckets.
-
sseCustomerAlgorithm
Specifies the algorithm to use when encrypting the object (for example, AES256).
This functionality is not supported for directory buckets.
- Returns:
- Specifies the algorithm to use when encrypting the object (for example, AES256).
This functionality is not supported for directory buckets.
-
sseCustomerKey
Specifies the customer-provided encryption key for Amazon S3 to use in encrypting data. This value is used to store the object and then it is discarded; Amazon S3 does not store the encryption key. The key must be appropriate for use with the algorithm specified in the
x-amz-server-side-encryption-customer-algorithmheader.This functionality is not supported for directory buckets.
- Returns:
- Specifies the customer-provided encryption key for Amazon S3 to use in encrypting data. This value is
used to store the object and then it is discarded; Amazon S3 does not store the encryption key. The key
must be appropriate for use with the algorithm specified in the
x-amz-server-side-encryption-customer-algorithmheader.This functionality is not supported for directory buckets.
-
sseCustomerKeyMD5
Specifies the 128-bit MD5 digest of the customer-provided encryption key according to RFC 1321. Amazon S3 uses this header for a message integrity check to ensure that the encryption key was transmitted without error.
This functionality is not supported for directory buckets.
- Returns:
- Specifies the 128-bit MD5 digest of the customer-provided encryption key according to RFC 1321. Amazon S3
uses this header for a message integrity check to ensure that the encryption key was transmitted without
error.
This functionality is not supported for directory buckets.
-
ssekmsKeyId
Specifies the KMS key ID (Key ID, Key ARN, or Key Alias) to use for object encryption. If the KMS key doesn't exist in the same account that's issuing the command, you must use the full Key ARN not the Key ID.
General purpose buckets - If you specify
x-amz-server-side-encryptionwithaws:kmsoraws:kms:dsse, this header specifies the ID (Key ID, Key ARN, or Key Alias) of the KMS key to use. If you specifyx-amz-server-side-encryption:aws:kmsorx-amz-server-side-encryption:aws:kms:dsse, but do not providex-amz-server-side-encryption-aws-kms-key-id, Amazon S3 uses the Amazon Web Services managed key (aws/s3) to protect the data.Directory buckets - If you specify
x-amz-server-side-encryptionwithaws:kms, thex-amz-server-side-encryption-aws-kms-key-idheader is implicitly assigned the ID of the KMS symmetric encryption customer managed key that's configured for your directory bucket's default encryption setting. If you want to specify thex-amz-server-side-encryption-aws-kms-key-idheader explicitly, you can only specify it with the ID (Key ID or Key ARN) of the KMS customer managed key that's configured for your directory bucket's default encryption setting. Otherwise, you get an HTTP400 Bad Requesterror. Only use the key ID or key ARN. The key alias format of the KMS key isn't supported. Your SSE-KMS configuration can only support 1 customer managed key per directory bucket for the lifetime of the bucket. The Amazon Web Services managed key (aws/s3) isn't supported.- Returns:
- Specifies the KMS key ID (Key ID, Key ARN, or Key Alias) to use for object encryption. If the KMS key
doesn't exist in the same account that's issuing the command, you must use the full Key ARN not the Key
ID.
General purpose buckets - If you specify
x-amz-server-side-encryptionwithaws:kmsoraws:kms:dsse, this header specifies the ID (Key ID, Key ARN, or Key Alias) of the KMS key to use. If you specifyx-amz-server-side-encryption:aws:kmsorx-amz-server-side-encryption:aws:kms:dsse, but do not providex-amz-server-side-encryption-aws-kms-key-id, Amazon S3 uses the Amazon Web Services managed key (aws/s3) to protect the data.Directory buckets - If you specify
x-amz-server-side-encryptionwithaws:kms, thex-amz-server-side-encryption-aws-kms-key-idheader is implicitly assigned the ID of the KMS symmetric encryption customer managed key that's configured for your directory bucket's default encryption setting. If you want to specify thex-amz-server-side-encryption-aws-kms-key-idheader explicitly, you can only specify it with the ID (Key ID or Key ARN) of the KMS customer managed key that's configured for your directory bucket's default encryption setting. Otherwise, you get an HTTP400 Bad Requesterror. Only use the key ID or key ARN. The key alias format of the KMS key isn't supported. Your SSE-KMS configuration can only support 1 customer managed key per directory bucket for the lifetime of the bucket. The Amazon Web Services managed key (aws/s3) isn't supported.
-
ssekmsEncryptionContext
Specifies the Amazon Web Services KMS Encryption Context to use for object encryption. The value of this header is a Base64-encoded string of a UTF-8 encoded JSON, which contains the encryption context as key-value pairs.
Directory buckets - You can optionally provide an explicit encryption context value. The value must match the default encryption context - the bucket Amazon Resource Name (ARN). An additional encryption context value is not supported.
- Returns:
- Specifies the Amazon Web Services KMS Encryption Context to use for object encryption. The value of this
header is a Base64-encoded string of a UTF-8 encoded JSON, which contains the encryption context as
key-value pairs.
Directory buckets - You can optionally provide an explicit encryption context value. The value must match the default encryption context - the bucket Amazon Resource Name (ARN). An additional encryption context value is not supported.
-
bucketKeyEnabled
Specifies whether Amazon S3 should use an S3 Bucket Key for object encryption with server-side encryption using Key Management Service (KMS) keys (SSE-KMS).
General purpose buckets - Setting this header to
truecauses Amazon S3 to use an S3 Bucket Key for object encryption with SSE-KMS. Also, specifying this header with a PUT action doesn't affect bucket-level settings for S3 Bucket Key.Directory buckets - S3 Bucket Keys are always enabled for
GETandPUToperations in a directory bucket and can’t be disabled. S3 Bucket Keys aren't supported, when you copy SSE-KMS encrypted objects from general purpose buckets to directory buckets, from directory buckets to general purpose buckets, or between directory buckets, through CopyObject, UploadPartCopy, the Copy operation in Batch Operations, or the import jobs. In this case, Amazon S3 makes a call to KMS every time a copy request is made for a KMS-encrypted object.- Returns:
- Specifies whether Amazon S3 should use an S3 Bucket Key for object encryption with server-side encryption
using Key Management Service (KMS) keys (SSE-KMS).
General purpose buckets - Setting this header to
truecauses Amazon S3 to use an S3 Bucket Key for object encryption with SSE-KMS. Also, specifying this header with a PUT action doesn't affect bucket-level settings for S3 Bucket Key.Directory buckets - S3 Bucket Keys are always enabled for
GETandPUToperations in a directory bucket and can’t be disabled. S3 Bucket Keys aren't supported, when you copy SSE-KMS encrypted objects from general purpose buckets to directory buckets, from directory buckets to general purpose buckets, or between directory buckets, through CopyObject, UploadPartCopy, the Copy operation in Batch Operations, or the import jobs. In this case, Amazon S3 makes a call to KMS every time a copy request is made for a KMS-encrypted object.
-
requestPayer
Returns the value of the RequestPayer property for this object.If the service returns an enum value that is not available in the current SDK version,
requestPayerwill returnRequestPayer.UNKNOWN_TO_SDK_VERSION. The raw value returned by the service is available fromrequestPayerAsString().- Returns:
- The value of the RequestPayer property for this object.
- See Also:
-
requestPayerAsString
Returns the value of the RequestPayer property for this object.If the service returns an enum value that is not available in the current SDK version,
requestPayerwill returnRequestPayer.UNKNOWN_TO_SDK_VERSION. The raw value returned by the service is available fromrequestPayerAsString().- Returns:
- The value of the RequestPayer property for this object.
- See Also:
-
tagging
The tag-set for the object. The tag-set must be encoded as URL Query parameters.
This functionality is not supported for directory buckets.
- Returns:
- The tag-set for the object. The tag-set must be encoded as URL Query parameters.
This functionality is not supported for directory buckets.
-
objectLockMode
Specifies the Object Lock mode that you want to apply to the uploaded object.
This functionality is not supported for directory buckets.
If the service returns an enum value that is not available in the current SDK version,
objectLockModewill returnObjectLockMode.UNKNOWN_TO_SDK_VERSION. The raw value returned by the service is available fromobjectLockModeAsString().- Returns:
- Specifies the Object Lock mode that you want to apply to the uploaded object.
This functionality is not supported for directory buckets.
- See Also:
-
objectLockModeAsString
Specifies the Object Lock mode that you want to apply to the uploaded object.
This functionality is not supported for directory buckets.
If the service returns an enum value that is not available in the current SDK version,
objectLockModewill returnObjectLockMode.UNKNOWN_TO_SDK_VERSION. The raw value returned by the service is available fromobjectLockModeAsString().- Returns:
- Specifies the Object Lock mode that you want to apply to the uploaded object.
This functionality is not supported for directory buckets.
- See Also:
-
objectLockRetainUntilDate
Specifies the date and time when you want the Object Lock to expire.
This functionality is not supported for directory buckets.
- Returns:
- Specifies the date and time when you want the Object Lock to expire.
This functionality is not supported for directory buckets.
-
objectLockLegalHoldStatus
Specifies whether you want to apply a legal hold to the uploaded object.
This functionality is not supported for directory buckets.
If the service returns an enum value that is not available in the current SDK version,
objectLockLegalHoldStatuswill returnObjectLockLegalHoldStatus.UNKNOWN_TO_SDK_VERSION. The raw value returned by the service is available fromobjectLockLegalHoldStatusAsString().- Returns:
- Specifies whether you want to apply a legal hold to the uploaded object.
This functionality is not supported for directory buckets.
- See Also:
-
objectLockLegalHoldStatusAsString
Specifies whether you want to apply a legal hold to the uploaded object.
This functionality is not supported for directory buckets.
If the service returns an enum value that is not available in the current SDK version,
objectLockLegalHoldStatuswill returnObjectLockLegalHoldStatus.UNKNOWN_TO_SDK_VERSION. The raw value returned by the service is available fromobjectLockLegalHoldStatusAsString().- Returns:
- Specifies whether you want to apply a legal hold to the uploaded object.
This functionality is not supported for directory buckets.
- See Also:
-
expectedBucketOwner
The account ID of the expected bucket owner. If the account ID that you provide does not match the actual owner of the bucket, the request fails with the HTTP status code
403 Forbidden(access denied).- Returns:
- The account ID of the expected bucket owner. If the account ID that you provide does not match the actual
owner of the bucket, the request fails with the HTTP status code
403 Forbidden(access denied).
-
checksumAlgorithm
Indicates the algorithm that you want Amazon S3 to use to create the checksum for the object. For more information, see Checking object integrity in the Amazon S3 User Guide.
If the service returns an enum value that is not available in the current SDK version,
checksumAlgorithmwill returnChecksumAlgorithm.UNKNOWN_TO_SDK_VERSION. The raw value returned by the service is available fromchecksumAlgorithmAsString().- Returns:
- Indicates the algorithm that you want Amazon S3 to use to create the checksum for the object. For more information, see Checking object integrity in the Amazon S3 User Guide.
- See Also:
-
checksumAlgorithmAsString
Indicates the algorithm that you want Amazon S3 to use to create the checksum for the object. For more information, see Checking object integrity in the Amazon S3 User Guide.
If the service returns an enum value that is not available in the current SDK version,
checksumAlgorithmwill returnChecksumAlgorithm.UNKNOWN_TO_SDK_VERSION. The raw value returned by the service is available fromchecksumAlgorithmAsString().- Returns:
- Indicates the algorithm that you want Amazon S3 to use to create the checksum for the object. For more information, see Checking object integrity in the Amazon S3 User Guide.
- See Also:
-
toBuilder
Description copied from interface:ToCopyableBuilderTake this object and create a builder that contains all of the current property values of this object.- Specified by:
toBuilderin interfaceToCopyableBuilder<CreateMultipartUploadRequest.Builder,CreateMultipartUploadRequest> - Specified by:
toBuilderin classS3Request- Returns:
- a builder for type T
-
builder
-
serializableBuilderClass
-
hashCode
public final int hashCode()- Overrides:
hashCodein classAwsRequest
-
equals
- Overrides:
equalsin classAwsRequest
-
equalsBySdkFields
Description copied from interface:SdkPojoIndicates whether some other object is "equal to" this one by SDK fields. An SDK field is a modeled, non-inherited field in anSdkPojoclass, and is generated based on a service model.If an
SdkPojoclass does not have any inherited fields,equalsBySdkFieldsandequalsare essentially the same.- Specified by:
equalsBySdkFieldsin interfaceSdkPojo- Parameters:
obj- the object to be compared with- Returns:
- true if the other object equals to this object by sdk fields, false otherwise.
-
toString
-
getValueForField
Description copied from class:SdkRequestUsed to retrieve the value of a field from any class that extendsSdkRequest. The field name specified should match the member name from the corresponding service-2.json model specified in the codegen-resources folder for a given service. The class specifies what class to cast the returned value to. If the returned value is also a modeled class, theSdkRequest.getValueForField(String, Class)method will again be available.- Overrides:
getValueForFieldin classSdkRequest- Parameters:
fieldName- The name of the member to be retrieved.clazz- The class to cast the returned object to.- Returns:
- Optional containing the casted return value
-
sdkFields
-