#[non_exhaustive]pub struct ServerSideEncryptionRuleBuilder { /* private fields */ }
Expand description
A builder for ServerSideEncryptionRule
.
Implementations§
source§impl ServerSideEncryptionRuleBuilder
impl ServerSideEncryptionRuleBuilder
sourcepub fn apply_server_side_encryption_by_default(
self,
input: ServerSideEncryptionByDefault,
) -> Self
pub fn apply_server_side_encryption_by_default( self, input: ServerSideEncryptionByDefault, ) -> Self
Specifies the default server-side encryption to apply to new objects in the bucket. If a PUT Object request doesn't specify any server-side encryption, this default encryption will be applied.
sourcepub fn set_apply_server_side_encryption_by_default(
self,
input: Option<ServerSideEncryptionByDefault>,
) -> Self
pub fn set_apply_server_side_encryption_by_default( self, input: Option<ServerSideEncryptionByDefault>, ) -> Self
Specifies the default server-side encryption to apply to new objects in the bucket. If a PUT Object request doesn't specify any server-side encryption, this default encryption will be applied.
sourcepub fn get_apply_server_side_encryption_by_default(
&self,
) -> &Option<ServerSideEncryptionByDefault>
pub fn get_apply_server_side_encryption_by_default( &self, ) -> &Option<ServerSideEncryptionByDefault>
Specifies the default server-side encryption to apply to new objects in the bucket. If a PUT Object request doesn't specify any server-side encryption, this default encryption will be applied.
sourcepub fn bucket_key_enabled(self, input: bool) -> Self
pub fn bucket_key_enabled(self, input: bool) -> Self
Specifies whether Amazon S3 should use an S3 Bucket Key with server-side encryption using KMS (SSE-KMS) for new objects in the bucket. Existing objects are not affected. Setting the BucketKeyEnabled
element to true
causes Amazon S3 to use an S3 Bucket Key.
-
General purpose buckets - By default, S3 Bucket Key is not enabled. For more information, see Amazon S3 Bucket Keys in the Amazon S3 User Guide.
-
Directory buckets - S3 Bucket Keys are always enabled for
GET
andPUT
operations in a directory bucket and can’t be disabled. S3 Bucket Keys aren't supported, when you copy SSE-KMS encrypted objects from general purpose buckets to directory buckets, from directory buckets to general purpose buckets, or between directory buckets, through CopyObject, UploadPartCopy, the Copy operation in Batch Operations, or the import jobs. In this case, Amazon S3 makes a call to KMS every time a copy request is made for a KMS-encrypted object.
sourcepub fn set_bucket_key_enabled(self, input: Option<bool>) -> Self
pub fn set_bucket_key_enabled(self, input: Option<bool>) -> Self
Specifies whether Amazon S3 should use an S3 Bucket Key with server-side encryption using KMS (SSE-KMS) for new objects in the bucket. Existing objects are not affected. Setting the BucketKeyEnabled
element to true
causes Amazon S3 to use an S3 Bucket Key.
-
General purpose buckets - By default, S3 Bucket Key is not enabled. For more information, see Amazon S3 Bucket Keys in the Amazon S3 User Guide.
-
Directory buckets - S3 Bucket Keys are always enabled for
GET
andPUT
operations in a directory bucket and can’t be disabled. S3 Bucket Keys aren't supported, when you copy SSE-KMS encrypted objects from general purpose buckets to directory buckets, from directory buckets to general purpose buckets, or between directory buckets, through CopyObject, UploadPartCopy, the Copy operation in Batch Operations, or the import jobs. In this case, Amazon S3 makes a call to KMS every time a copy request is made for a KMS-encrypted object.
sourcepub fn get_bucket_key_enabled(&self) -> &Option<bool>
pub fn get_bucket_key_enabled(&self) -> &Option<bool>
Specifies whether Amazon S3 should use an S3 Bucket Key with server-side encryption using KMS (SSE-KMS) for new objects in the bucket. Existing objects are not affected. Setting the BucketKeyEnabled
element to true
causes Amazon S3 to use an S3 Bucket Key.
-
General purpose buckets - By default, S3 Bucket Key is not enabled. For more information, see Amazon S3 Bucket Keys in the Amazon S3 User Guide.
-
Directory buckets - S3 Bucket Keys are always enabled for
GET
andPUT
operations in a directory bucket and can’t be disabled. S3 Bucket Keys aren't supported, when you copy SSE-KMS encrypted objects from general purpose buckets to directory buckets, from directory buckets to general purpose buckets, or between directory buckets, through CopyObject, UploadPartCopy, the Copy operation in Batch Operations, or the import jobs. In this case, Amazon S3 makes a call to KMS every time a copy request is made for a KMS-encrypted object.
sourcepub fn build(self) -> ServerSideEncryptionRule
pub fn build(self) -> ServerSideEncryptionRule
Consumes the builder and constructs a ServerSideEncryptionRule
.
Trait Implementations§
source§impl Clone for ServerSideEncryptionRuleBuilder
impl Clone for ServerSideEncryptionRuleBuilder
source§fn clone(&self) -> ServerSideEncryptionRuleBuilder
fn clone(&self) -> ServerSideEncryptionRuleBuilder
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moresource§impl Default for ServerSideEncryptionRuleBuilder
impl Default for ServerSideEncryptionRuleBuilder
source§fn default() -> ServerSideEncryptionRuleBuilder
fn default() -> ServerSideEncryptionRuleBuilder
source§impl PartialEq for ServerSideEncryptionRuleBuilder
impl PartialEq for ServerSideEncryptionRuleBuilder
source§fn eq(&self, other: &ServerSideEncryptionRuleBuilder) -> bool
fn eq(&self, other: &ServerSideEncryptionRuleBuilder) -> bool
self
and other
values to be equal, and is used by ==
.impl StructuralPartialEq for ServerSideEncryptionRuleBuilder
Auto Trait Implementations§
impl Freeze for ServerSideEncryptionRuleBuilder
impl RefUnwindSafe for ServerSideEncryptionRuleBuilder
impl Send for ServerSideEncryptionRuleBuilder
impl Sync for ServerSideEncryptionRuleBuilder
impl Unpin for ServerSideEncryptionRuleBuilder
impl UnwindSafe for ServerSideEncryptionRuleBuilder
Blanket Implementations§
source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
source§unsafe fn clone_to_uninit(&self, dst: *mut T)
unsafe fn clone_to_uninit(&self, dst: *mut T)
clone_to_uninit
)source§impl<T> Instrument for T
impl<T> Instrument for T
source§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
source§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
source§impl<T> IntoEither for T
impl<T> IntoEither for T
source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left
is true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read moresource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left(&self)
returns true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read more