pub struct ServerSideEncryptionRule {
pub apply_server_side_encryption_by_default: Option<ServerSideEncryptionByDefault>,
pub bucket_key_enabled: Option<bool>,
}Expand description
Specifies the default server-side encryption configuration. General purpose buckets
- If you’re specifying a customer managed KMS key, we recommend using a fully qualified KMS key ARN. If you use a KMS key alias instead, then KMS resolves the key within the requester’s account. This behavior can result in data that’s encrypted with a KMS key that belongs to the requester, and not the bucket owner. Directory buckets
- When you specify an KMS customer managed key for encryption in your directory bucket, only use the key ID or key ARN. The key alias format of the KMS key isn’t supported.
AWS API: s3.v1.ServerSideEncryptionRule
§Coverage
2 of 3 fields included. Omitted fields:
BlockedEncryptionTypes— not selected in manifest
Fields§
§apply_server_side_encryption_by_default: Option<ServerSideEncryptionByDefault>Specifies the default server-side encryption to apply to new objects in the bucket. If a PUT Object request doesn’t specify any server-side encryption, this default encryption will be applied.
bucket_key_enabled: Option<bool>Specifies whether Amazon S3 should use an S3 Bucket Key with server-side encryption using KMS (SSE-KMS) for new objects in the bucket. Existing objects are not affected. Setting the BucketKeyEnabled element to true causes Amazon S3 to use an S3 Bucket Key. General purpose buckets
- By default, S3 Bucket Key is not enabled. For more information, see Amazon S3 Bucket Keys in the Amazon S3 User Guide. Directory buckets
- S3 Bucket Keys are always enabled for GET and PUT operations in a directory bucket and can’t be disabled. S3 Bucket Keys aren’t supported, when you copy SSE-KMS encrypted objects from general purpose buckets to directory buckets, from directory buckets to general purpose buckets, or between directory buckets, through CopyObject, UploadPartCopy, the Copy operation in Batch Operations, or the import jobs. In this case, Amazon S3 makes a call to KMS every time a copy request is made for a KMS- encrypted object.
Trait Implementations§
Source§impl Clone for ServerSideEncryptionRule
impl Clone for ServerSideEncryptionRule
Source§fn clone(&self) -> ServerSideEncryptionRule
fn clone(&self) -> ServerSideEncryptionRule
Returns a duplicate of the value. Read more
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
Performs copy-assignment from
source. Read moreSource§impl Debug for ServerSideEncryptionRule
impl Debug for ServerSideEncryptionRule
Source§impl Default for ServerSideEncryptionRule
impl Default for ServerSideEncryptionRule
Source§fn default() -> ServerSideEncryptionRule
fn default() -> ServerSideEncryptionRule
Returns the “default value” for a type. Read more
Source§impl<'de> Deserialize<'de> for ServerSideEncryptionRule
impl<'de> Deserialize<'de> for ServerSideEncryptionRule
Source§fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where
__D: Deserializer<'de>,
fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where
__D: Deserializer<'de>,
Deserialize this value from the given Serde deserializer. Read more
Auto Trait Implementations§
impl Freeze for ServerSideEncryptionRule
impl RefUnwindSafe for ServerSideEncryptionRule
impl Send for ServerSideEncryptionRule
impl Sync for ServerSideEncryptionRule
impl Unpin for ServerSideEncryptionRule
impl UnsafeUnpin for ServerSideEncryptionRule
impl UnwindSafe for ServerSideEncryptionRule
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more