BucketServerSideEncryptionRuleArgs

data class BucketServerSideEncryptionRuleArgs(val bucketKeyEnabled: Output<Boolean>? = null, val serverSideEncryptionByDefault: Output<BucketServerSideEncryptionByDefaultArgs>? = null) : ConvertibleToJava<BucketServerSideEncryptionRuleArgs>

Specifies the default server-side encryption configuration. + General purpose buckets - If you're specifying a customer managed KMS key, we recommend using a fully qualified KMS key ARN. If you use a KMS key alias instead, then KMS resolves the key within the requester’s account. This behavior can result in data that's encrypted with a KMS key that belongs to the requester, and not the bucket owner.

  • Directory buckets - When you specify an customer managed key for encryption in your directory bucket, only use the key ID or key ARN. The key alias format of the KMS key isn't supported.

Constructors

Link copied to clipboard
constructor(bucketKeyEnabled: Output<Boolean>? = null, serverSideEncryptionByDefault: Output<BucketServerSideEncryptionByDefaultArgs>? = null)

Properties

Link copied to clipboard
val bucketKeyEnabled: Output<Boolean>? = null

Specifies whether Amazon S3 should use an S3 Bucket Key with server-side encryption using KMS (SSE-KMS) for new objects in the bucket. Existing objects are not affected. Setting the `BucketKeyEnabled` element to `true` causes Amazon S3 to use an S3 Bucket Key. By default, S3 Bucket Key is not enabled. For more information, see Amazon S3 Bucket Keys in the Amazon S3 User Guide.

Link copied to clipboard

Specifies the default server-side encryption to apply to new objects in the bucket. If a PUT Object request doesn't specify any server-side encryption, this default encryption will be applied.

Functions

Link copied to clipboard
open override fun toJava(): BucketServerSideEncryptionRuleArgs