/**
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: Apache-2.0.
*/
#pragma once
#include Specifies the default server-side encryption configuration. General purpose buckets - If you're specifying a customer
* managed KMS key, we recommend using a fully qualified KMS key ARN. If you use a
* KMS key alias instead, then KMS resolves the key within the requester’s account.
* This behavior can result in data that's encrypted with a KMS key that belongs to
* the requester, and not the bucket owner. Directory
* buckets - When you specify an KMS
* customer managed key for encryption in your directory bucket, only use the
* key ID or key ARN. The key alias format of the KMS key isn't supported.
*
See Also:
AWS
* API Reference
Specifies the default server-side encryption to apply to new objects in the * bucket. If a PUT Object request doesn't specify any server-side encryption, this * default encryption will be applied.
*/ inline const ServerSideEncryptionByDefault& GetApplyServerSideEncryptionByDefault() const{ return m_applyServerSideEncryptionByDefault; } inline bool ApplyServerSideEncryptionByDefaultHasBeenSet() const { return m_applyServerSideEncryptionByDefaultHasBeenSet; } inline void SetApplyServerSideEncryptionByDefault(const ServerSideEncryptionByDefault& value) { m_applyServerSideEncryptionByDefaultHasBeenSet = true; m_applyServerSideEncryptionByDefault = value; } inline void SetApplyServerSideEncryptionByDefault(ServerSideEncryptionByDefault&& value) { m_applyServerSideEncryptionByDefaultHasBeenSet = true; m_applyServerSideEncryptionByDefault = std::move(value); } inline ServerSideEncryptionRule& WithApplyServerSideEncryptionByDefault(const ServerSideEncryptionByDefault& value) { SetApplyServerSideEncryptionByDefault(value); return *this;} inline ServerSideEncryptionRule& WithApplyServerSideEncryptionByDefault(ServerSideEncryptionByDefault&& value) { SetApplyServerSideEncryptionByDefault(std::move(value)); return *this;} ///@} ///@{ /** *Specifies whether Amazon S3 should use an S3 Bucket Key with server-side
* encryption using KMS (SSE-KMS) for new objects in the bucket. Existing objects
* are not affected. Setting the BucketKeyEnabled element to
* true causes Amazon S3 to use an S3 Bucket Key.
General purpose buckets - By default, S3 Bucket Key is not * enabled. For more information, see Amazon S3 * Bucket Keys in the Amazon S3 User Guide.
* Directory buckets - S3 Bucket Keys are always enabled for
* GET and PUT operations in a directory bucket and can’t
* be disabled. S3 Bucket Keys aren't supported, when you copy SSE-KMS encrypted
* objects from general purpose buckets to directory buckets, from directory
* buckets to general purpose buckets, or between directory buckets, through CopyObject,
* UploadPartCopy,
* the
* Copy operation in Batch Operations, or the
* import jobs. In this case, Amazon S3 makes a call to KMS every time a copy
* request is made for a KMS-encrypted object.