Skip to content

Commit 9af0c1c

Browse files
Update generated code (#1908)
update generated code
1 parent 623ce12 commit 9af0c1c

16 files changed

+56
-14
lines changed

manifest.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"variables": {
3-
"${LATEST}": "3.346.2"
3+
"${LATEST}": "3.347.2"
44
},
55
"endpoints": "https://raw.githubusercontent.com/aws/aws-sdk-php/${LATEST}/src/data/endpoints.json",
66
"services": {

src/Service/S3/CHANGELOG.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@
66

77
- AWS api-change: Rework regions configuration
88
- AWS api-change: Added `tagCount` property to the HeadObject response
9+
- AWS api-change: Adds support for additional server-side encryption mode and storage class values for accessing Amazon FSx data from Amazon S3 using S3 Access Points
910

1011
## 2.9.1
1112

src/Service/S3/src/Enum/ObjectStorageClass.php

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ final class ObjectStorageClass
66
{
77
public const DEEP_ARCHIVE = 'DEEP_ARCHIVE';
88
public const EXPRESS_ONEZONE = 'EXPRESS_ONEZONE';
9+
public const FSX_OPENZFS = 'FSX_OPENZFS';
910
public const GLACIER = 'GLACIER';
1011
public const GLACIER_IR = 'GLACIER_IR';
1112
public const INTELLIGENT_TIERING = 'INTELLIGENT_TIERING';
@@ -21,6 +22,7 @@ public static function exists(string $value): bool
2122
return isset([
2223
self::DEEP_ARCHIVE => true,
2324
self::EXPRESS_ONEZONE => true,
25+
self::FSX_OPENZFS => true,
2426
self::GLACIER => true,
2527
self::GLACIER_IR => true,
2628
self::INTELLIGENT_TIERING => true,

src/Service/S3/src/Enum/ServerSideEncryption.php

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,15 @@
55
final class ServerSideEncryption
66
{
77
public const AES256 = 'AES256';
8+
public const AWS_FSX = 'aws:fsx';
89
public const AWS_KMS = 'aws:kms';
910
public const AWS_KMS_DSSE = 'aws:kms:dsse';
1011

1112
public static function exists(string $value): bool
1213
{
1314
return isset([
1415
self::AES256 => true,
16+
self::AWS_FSX => true,
1517
self::AWS_KMS => true,
1618
self::AWS_KMS_DSSE => true,
1719
][$value]);

src/Service/S3/src/Enum/StorageClass.php

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ final class StorageClass
66
{
77
public const DEEP_ARCHIVE = 'DEEP_ARCHIVE';
88
public const EXPRESS_ONEZONE = 'EXPRESS_ONEZONE';
9+
public const FSX_OPENZFS = 'FSX_OPENZFS';
910
public const GLACIER = 'GLACIER';
1011
public const GLACIER_IR = 'GLACIER_IR';
1112
public const INTELLIGENT_TIERING = 'INTELLIGENT_TIERING';
@@ -21,6 +22,7 @@ public static function exists(string $value): bool
2122
return isset([
2223
self::DEEP_ARCHIVE => true,
2324
self::EXPRESS_ONEZONE => true,
25+
self::FSX_OPENZFS => true,
2426
self::GLACIER => true,
2527
self::GLACIER_IR => true,
2628
self::INTELLIGENT_TIERING => true,

src/Service/S3/src/Input/CopyObjectRequest.php

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -417,6 +417,10 @@ final class CopyObjectRequest extends Input
417417
* a `CopyObject` operation and want to specify server-side encryption settings for new object copies with SSE-KMS in
418418
* the encryption-related request headers, you must ensure the encryption key is the same customer managed key that
419419
* you specified for the directory bucket's default encryption configuration.
420+
* - **S3 access points for Amazon FSx ** - When accessing data stored in Amazon FSx file systems using S3 access
421+
* points, the only valid server side encryption option is `aws:fsx`. All Amazon FSx file systems have encryption
422+
* configured by default and are encrypted at rest. Data is automatically encrypted before being written to the file
423+
* system, and automatically decrypted as it is read. These processes are handled transparently by Amazon FSx.
420424
*
421425
* [^1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/serv-side-encryption.html
422426
* [^2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-serv-side-encryption.html

src/Service/S3/src/Input/CreateMultipartUploadRequest.php

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -317,7 +317,7 @@ final class CreateMultipartUploadRequest extends Input
317317
private $metadata;
318318

319319
/**
320-
* The server-side encryption algorithm used when you store this object in Amazon S3 (for example, `AES256`, `aws:kms`).
320+
* The server-side encryption algorithm used when you store this object in Amazon S3 or Amazon FSx.
321321
*
322322
* - **Directory buckets ** - For directory buckets, there are only two supported options for server-side encryption:
323323
* server-side encryption with Amazon S3 managed keys (SSE-S3) (`AES256`) and server-side encryption with KMS keys
@@ -343,6 +343,11 @@ final class CreateMultipartUploadRequest extends Input
343343
* > [^5] and UploadPartCopy [^6]), the encryption request headers must match the default encryption configuration of
344344
* > the directory bucket.
345345
*
346+
* - **S3 access points for Amazon FSx ** - When accessing data stored in Amazon FSx file systems using S3 access
347+
* points, the only valid server side encryption option is `aws:fsx`. All Amazon FSx file systems have encryption
348+
* configured by default and are encrypted at rest. Data is automatically encrypted before being written to the file
349+
* system, and automatically decrypted as it is read. These processes are handled transparently by Amazon FSx.
350+
*
346351
* [^1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-serv-side-encryption.html
347352
* [^2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-specifying-kms-encryption.html
348353
* [^3]: https://docs.aws.amazon.com/AmazonS3/latest/API/API_CopyObject.html

src/Service/S3/src/Input/PutObjectRequest.php

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -375,8 +375,7 @@ final class PutObjectRequest extends Input
375375
private $metadata;
376376

377377
/**
378-
* The server-side encryption algorithm that was used when you store this object in Amazon S3 (for example, `AES256`,
379-
* `aws:kms`, `aws:kms:dsse`).
378+
* The server-side encryption algorithm that was used when you store this object in Amazon S3 or Amazon FSx.
380379
*
381380
* - **General purpose buckets ** - You have four mutually exclusive options to protect data using server-side
382381
* encryption in Amazon S3, depending on how you choose to manage the encryption keys. Specifically, the encryption
@@ -408,6 +407,11 @@ final class PutObjectRequest extends Input
408407
* > [^6] and UploadPartCopy [^7]), the encryption request headers must match the default encryption configuration of
409408
* > the directory bucket.
410409
*
410+
* - **S3 access points for Amazon FSx ** - When accessing data stored in Amazon FSx file systems using S3 access
411+
* points, the only valid server side encryption option is `aws:fsx`. All Amazon FSx file systems have encryption
412+
* configured by default and are encrypted at rest. Data is automatically encrypted before being written to the file
413+
* system, and automatically decrypted as it is read. These processes are handled transparently by Amazon FSx.
414+
*
411415
* [^1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html
412416
* [^2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-serv-side-encryption.html
413417
* [^3]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-specifying-kms-encryption.html

src/Service/S3/src/Result/CompleteMultipartUploadOutput.php

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,10 @@ class CompleteMultipartUploadOutput extends Result
134134
private $checksumType;
135135

136136
/**
137-
* The server-side encryption algorithm used when storing this object in Amazon S3 (for example, `AES256`, `aws:kms`).
137+
* The server-side encryption algorithm used when storing this object in Amazon S3.
138+
*
139+
* > When accessing data stored in Amazon FSx file systems using S3 access points, the only valid server side encryption
140+
* > option is `aws:fsx`.
138141
*
139142
* @var ServerSideEncryption::*|null
140143
*/

src/Service/S3/src/Result/CopyObjectOutput.php

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,8 +46,10 @@ class CopyObjectOutput extends Result
4646
private $versionId;
4747

4848
/**
49-
* The server-side encryption algorithm used when you store this object in Amazon S3 (for example, `AES256`, `aws:kms`,
50-
* `aws:kms:dsse`).
49+
* The server-side encryption algorithm used when you store this object in Amazon S3 or Amazon FSx.
50+
*
51+
* > When accessing data stored in Amazon FSx file systems using S3 access points, the only valid server side encryption
52+
* > option is `aws:fsx`.
5153
*
5254
* @var ServerSideEncryption::*|null
5355
*/

0 commit comments

Comments
 (0)