Class CreateSessionRequest
- All Implemented Interfaces:
SdkPojo,ToCopyableBuilder<CreateSessionRequest.Builder,CreateSessionRequest>
-
Nested Class Summary
Nested Classes -
Method Summary
Modifier and TypeMethodDescriptionfinal Stringbucket()The name of the bucket that you create a session for.final BooleanSpecifies whether Amazon S3 should use an S3 Bucket Key for object encryption with server-side encryption using KMS keys (SSE-KMS).static CreateSessionRequest.Builderbuilder()final booleanfinal booleanequalsBySdkFields(Object obj) final <T> Optional<T>getValueForField(String fieldName, Class<T> clazz) final inthashCode()static Class<? extends CreateSessionRequest.Builder>final ServerSideEncryptionThe server-side encryption algorithm to use when you store objects in the directory bucket.final StringThe server-side encryption algorithm to use when you store objects in the directory bucket.final SessionModeSpecifies the mode of the session that will be created, eitherReadWriteorReadOnly.final StringSpecifies the mode of the session that will be created, eitherReadWriteorReadOnly.final StringSpecifies the Amazon Web Services KMS Encryption Context as an additional encryption context to use for object encryption.final StringIf you specifyx-amz-server-side-encryptionwithaws:kms, you must specify thex-amz-server-side-encryption-aws-kms-key-idheader with the ID (Key ID or Key ARN) of the KMS symmetric encryption customer managed key to use.final StringtoString()Returns a string representation of this object.Methods inherited from class software.amazon.awssdk.awscore.AwsRequest
overrideConfigurationMethods inherited from class java.lang.Object
clone, finalize, getClass, notify, notifyAll, wait, wait, waitMethods inherited from interface software.amazon.awssdk.utils.builder.ToCopyableBuilder
copy
-
Method Details
-
sessionMode
Specifies the mode of the session that will be created, either
ReadWriteorReadOnly. If no session mode is specified, the default behavior attempts to create a session with the maximum allowable privilege. It will first attempt to create aReadWritesession, and if that is not allowed by permissions, it will attempt to create aReadOnlysession. If neither session type is allowed, the request will return an Access Denied error. AReadWritesession is capable of executing all the Zonal endpoint API operations on a directory bucket. AReadOnlysession is constrained to execute the following Zonal endpoint API operations:GetObject,HeadObject,ListObjectsV2,GetObjectAttributes,ListParts, andListMultipartUploads.If the service returns an enum value that is not available in the current SDK version,
sessionModewill returnSessionMode.UNKNOWN_TO_SDK_VERSION. The raw value returned by the service is available fromsessionModeAsString().- Returns:
- Specifies the mode of the session that will be created, either
ReadWriteorReadOnly. If no session mode is specified, the default behavior attempts to create a session with the maximum allowable privilege. It will first attempt to create aReadWritesession, and if that is not allowed by permissions, it will attempt to create aReadOnlysession. If neither session type is allowed, the request will return an Access Denied error. AReadWritesession is capable of executing all the Zonal endpoint API operations on a directory bucket. AReadOnlysession is constrained to execute the following Zonal endpoint API operations:GetObject,HeadObject,ListObjectsV2,GetObjectAttributes,ListParts, andListMultipartUploads. - See Also:
-
sessionModeAsString
Specifies the mode of the session that will be created, either
ReadWriteorReadOnly. If no session mode is specified, the default behavior attempts to create a session with the maximum allowable privilege. It will first attempt to create aReadWritesession, and if that is not allowed by permissions, it will attempt to create aReadOnlysession. If neither session type is allowed, the request will return an Access Denied error. AReadWritesession is capable of executing all the Zonal endpoint API operations on a directory bucket. AReadOnlysession is constrained to execute the following Zonal endpoint API operations:GetObject,HeadObject,ListObjectsV2,GetObjectAttributes,ListParts, andListMultipartUploads.If the service returns an enum value that is not available in the current SDK version,
sessionModewill returnSessionMode.UNKNOWN_TO_SDK_VERSION. The raw value returned by the service is available fromsessionModeAsString().- Returns:
- Specifies the mode of the session that will be created, either
ReadWriteorReadOnly. If no session mode is specified, the default behavior attempts to create a session with the maximum allowable privilege. It will first attempt to create aReadWritesession, and if that is not allowed by permissions, it will attempt to create aReadOnlysession. If neither session type is allowed, the request will return an Access Denied error. AReadWritesession is capable of executing all the Zonal endpoint API operations on a directory bucket. AReadOnlysession is constrained to execute the following Zonal endpoint API operations:GetObject,HeadObject,ListObjectsV2,GetObjectAttributes,ListParts, andListMultipartUploads. - See Also:
-
bucket
The name of the bucket that you create a session for.
- Returns:
- The name of the bucket that you create a session for.
-
serverSideEncryption
The server-side encryption algorithm to use when you store objects in the directory bucket.
For directory buckets, there are only two supported options for server-side encryption: server-side encryption with Amazon S3 managed keys (SSE-S3) (
AES256) and server-side encryption with KMS keys (SSE-KMS) (aws:kms). By default, Amazon S3 encrypts data with SSE-S3. For more information, see Protecting data with server-side encryption in the Amazon S3 User Guide.S3 access points for Amazon FSx - When accessing data stored in Amazon FSx file systems using S3 access points, the only valid server side encryption option is
aws:fsx. All Amazon FSx file systems have encryption configured by default and are encrypted at rest. Data is automatically encrypted before being written to the file system, and automatically decrypted as it is read. These processes are handled transparently by Amazon FSx.If the service returns an enum value that is not available in the current SDK version,
serverSideEncryptionwill returnServerSideEncryption.UNKNOWN_TO_SDK_VERSION. The raw value returned by the service is available fromserverSideEncryptionAsString().- Returns:
- The server-side encryption algorithm to use when you store objects in the directory bucket.
For directory buckets, there are only two supported options for server-side encryption: server-side encryption with Amazon S3 managed keys (SSE-S3) (
AES256) and server-side encryption with KMS keys (SSE-KMS) (aws:kms). By default, Amazon S3 encrypts data with SSE-S3. For more information, see Protecting data with server-side encryption in the Amazon S3 User Guide.S3 access points for Amazon FSx - When accessing data stored in Amazon FSx file systems using S3 access points, the only valid server side encryption option is
aws:fsx. All Amazon FSx file systems have encryption configured by default and are encrypted at rest. Data is automatically encrypted before being written to the file system, and automatically decrypted as it is read. These processes are handled transparently by Amazon FSx. - See Also:
-
serverSideEncryptionAsString
The server-side encryption algorithm to use when you store objects in the directory bucket.
For directory buckets, there are only two supported options for server-side encryption: server-side encryption with Amazon S3 managed keys (SSE-S3) (
AES256) and server-side encryption with KMS keys (SSE-KMS) (aws:kms). By default, Amazon S3 encrypts data with SSE-S3. For more information, see Protecting data with server-side encryption in the Amazon S3 User Guide.S3 access points for Amazon FSx - When accessing data stored in Amazon FSx file systems using S3 access points, the only valid server side encryption option is
aws:fsx. All Amazon FSx file systems have encryption configured by default and are encrypted at rest. Data is automatically encrypted before being written to the file system, and automatically decrypted as it is read. These processes are handled transparently by Amazon FSx.If the service returns an enum value that is not available in the current SDK version,
serverSideEncryptionwill returnServerSideEncryption.UNKNOWN_TO_SDK_VERSION. The raw value returned by the service is available fromserverSideEncryptionAsString().- Returns:
- The server-side encryption algorithm to use when you store objects in the directory bucket.
For directory buckets, there are only two supported options for server-side encryption: server-side encryption with Amazon S3 managed keys (SSE-S3) (
AES256) and server-side encryption with KMS keys (SSE-KMS) (aws:kms). By default, Amazon S3 encrypts data with SSE-S3. For more information, see Protecting data with server-side encryption in the Amazon S3 User Guide.S3 access points for Amazon FSx - When accessing data stored in Amazon FSx file systems using S3 access points, the only valid server side encryption option is
aws:fsx. All Amazon FSx file systems have encryption configured by default and are encrypted at rest. Data is automatically encrypted before being written to the file system, and automatically decrypted as it is read. These processes are handled transparently by Amazon FSx. - See Also:
-
ssekmsKeyId
If you specify
x-amz-server-side-encryptionwithaws:kms, you must specify thex-amz-server-side-encryption-aws-kms-key-idheader with the ID (Key ID or Key ARN) of the KMS symmetric encryption customer managed key to use. Otherwise, you get an HTTP400 Bad Requesterror. Only use the key ID or key ARN. The key alias format of the KMS key isn't supported. Also, if the KMS key doesn't exist in the same account that't issuing the command, you must use the full Key ARN not the Key ID.Your SSE-KMS configuration can only support 1 customer managed key per directory bucket's lifetime. The Amazon Web Services managed key (
aws/s3) isn't supported.- Returns:
- If you specify
x-amz-server-side-encryptionwithaws:kms, you must specify thex-amz-server-side-encryption-aws-kms-key-idheader with the ID (Key ID or Key ARN) of the KMS symmetric encryption customer managed key to use. Otherwise, you get an HTTP400 Bad Requesterror. Only use the key ID or key ARN. The key alias format of the KMS key isn't supported. Also, if the KMS key doesn't exist in the same account that't issuing the command, you must use the full Key ARN not the Key ID.Your SSE-KMS configuration can only support 1 customer managed key per directory bucket's lifetime. The Amazon Web Services managed key (
aws/s3) isn't supported.
-
ssekmsEncryptionContext
Specifies the Amazon Web Services KMS Encryption Context as an additional encryption context to use for object encryption. The value of this header is a Base64 encoded string of a UTF-8 encoded JSON, which contains the encryption context as key-value pairs. This value is stored as object metadata and automatically gets passed on to Amazon Web Services KMS for future
GetObjectoperations on this object.General purpose buckets - This value must be explicitly added during
CopyObjectoperations if you want an additional encryption context for your object. For more information, see Encryption context in the Amazon S3 User Guide.Directory buckets - You can optionally provide an explicit encryption context value. The value must match the default encryption context - the bucket Amazon Resource Name (ARN). An additional encryption context value is not supported.
- Returns:
- Specifies the Amazon Web Services KMS Encryption Context as an additional encryption context to use for
object encryption. The value of this header is a Base64 encoded string of a UTF-8 encoded JSON, which
contains the encryption context as key-value pairs. This value is stored as object metadata and
automatically gets passed on to Amazon Web Services KMS for future
GetObjectoperations on this object.General purpose buckets - This value must be explicitly added during
CopyObjectoperations if you want an additional encryption context for your object. For more information, see Encryption context in the Amazon S3 User Guide.Directory buckets - You can optionally provide an explicit encryption context value. The value must match the default encryption context - the bucket Amazon Resource Name (ARN). An additional encryption context value is not supported.
-
bucketKeyEnabled
Specifies whether Amazon S3 should use an S3 Bucket Key for object encryption with server-side encryption using KMS keys (SSE-KMS).
S3 Bucket Keys are always enabled for
GETandPUToperations in a directory bucket and can’t be disabled. S3 Bucket Keys aren't supported, when you copy SSE-KMS encrypted objects from general purpose buckets to directory buckets, from directory buckets to general purpose buckets, or between directory buckets, through CopyObject, UploadPartCopy, the Copy operation in Batch Operations, or the import jobs. In this case, Amazon S3 makes a call to KMS every time a copy request is made for a KMS-encrypted object.- Returns:
- Specifies whether Amazon S3 should use an S3 Bucket Key for object encryption with server-side encryption
using KMS keys (SSE-KMS).
S3 Bucket Keys are always enabled for
GETandPUToperations in a directory bucket and can’t be disabled. S3 Bucket Keys aren't supported, when you copy SSE-KMS encrypted objects from general purpose buckets to directory buckets, from directory buckets to general purpose buckets, or between directory buckets, through CopyObject, UploadPartCopy, the Copy operation in Batch Operations, or the import jobs. In this case, Amazon S3 makes a call to KMS every time a copy request is made for a KMS-encrypted object.
-
toBuilder
- Specified by:
toBuilderin interfaceToCopyableBuilder<CreateSessionRequest.Builder,CreateSessionRequest> - Specified by:
toBuilderin classS3Request
-
builder
-
serializableBuilderClass
-
hashCode
public final int hashCode()- Overrides:
hashCodein classAwsRequest
-
equals
- Overrides:
equalsin classAwsRequest
-
equalsBySdkFields
- Specified by:
equalsBySdkFieldsin interfaceSdkPojo
-
toString
Returns a string representation of this object. This is useful for testing and debugging. Sensitive data will be redacted from this string using a placeholder value. -
getValueForField
- Overrides:
getValueForFieldin classSdkRequest
-
sdkFields
-
sdkFieldNameToField
- Specified by:
sdkFieldNameToFieldin interfaceSdkPojo
-