import { EndpointParameterInstructions } from "@aws-sdk/middleware-endpoint"; import { Command as $Command } from "@aws-sdk/smithy-client"; import { Handler, HttpHandlerOptions as __HttpHandlerOptions, MetadataBearer as __MetadataBearer, MiddlewareStack } from "@aws-sdk/types"; import { PutBucketEncryptionRequest } from "../models/models_0"; import { S3ClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../S3Client"; /** * @public * * The input for {@link PutBucketEncryptionCommand}. */ export interface PutBucketEncryptionCommandInput extends PutBucketEncryptionRequest { } /** * @public * * The output of {@link PutBucketEncryptionCommand}. */ export interface PutBucketEncryptionCommandOutput extends __MetadataBearer { } /** * @public *

This action uses the encryption subresource to configure default * encryption and Amazon S3 Bucket Key for an existing bucket.

*

Default encryption for a bucket can use server-side encryption with Amazon S3-managed keys * (SSE-S3) or customer managed keys (SSE-KMS). If you specify default encryption * using SSE-KMS, you can also configure Amazon S3 Bucket Key. When the default encryption is SSE-KMS, if * you upload an object to the bucket and do not specify the KMS key to use for encryption, Amazon S3 * uses the default Amazon Web Services managed KMS key for your account. For information about default * encryption, see Amazon S3 default bucket encryption * in the Amazon S3 User Guide. For more information about S3 Bucket Keys, * see Amazon S3 Bucket Keys in the Amazon S3 User Guide.

* *

This action requires Amazon Web Services Signature Version 4. For more information, see Authenticating Requests (Amazon Web Services Signature * Version 4).

*
*

To use this operation, you must have permissions to perform the * s3:PutEncryptionConfiguration action. The bucket owner has this permission * by default. The bucket owner can grant this permission to others. For more information * about permissions, see Permissions Related to Bucket Subresource Operations and Managing Access Permissions to Your Amazon S3 * Resources in the Amazon S3 User Guide.

*

* Related Resources *

* * @example * Use a bare-bones client and the command you need to make an API call. * ```javascript * import { S3Client, PutBucketEncryptionCommand } from "@aws-sdk/client-s3"; // ES Modules import * // const { S3Client, PutBucketEncryptionCommand } = require("@aws-sdk/client-s3"); // CommonJS import * const client = new S3Client(config); * const input = { // PutBucketEncryptionRequest * Bucket: "STRING_VALUE", // required * ContentMD5: "STRING_VALUE", * ChecksumAlgorithm: "CRC32" || "CRC32C" || "SHA1" || "SHA256", * ServerSideEncryptionConfiguration: { // ServerSideEncryptionConfiguration * Rules: [ // ServerSideEncryptionRules // required * { // ServerSideEncryptionRule * ApplyServerSideEncryptionByDefault: { // ServerSideEncryptionByDefault * SSEAlgorithm: "AES256" || "aws:kms", // required * KMSMasterKeyID: "STRING_VALUE", * }, * BucketKeyEnabled: true || false, * }, * ], * }, * ExpectedBucketOwner: "STRING_VALUE", * }; * const command = new PutBucketEncryptionCommand(input); * const response = await client.send(command); * ``` * * @param PutBucketEncryptionCommandInput - {@link PutBucketEncryptionCommandInput} * @returns {@link PutBucketEncryptionCommandOutput} * @see {@link PutBucketEncryptionCommandInput} for command's `input` shape. * @see {@link PutBucketEncryptionCommandOutput} for command's `response` shape. * @see {@link S3ClientResolvedConfig | config} for S3Client's `config` shape. * * */ export declare class PutBucketEncryptionCommand extends $Command { readonly input: PutBucketEncryptionCommandInput; static getEndpointParameterInstructions(): EndpointParameterInstructions; /** * @public */ constructor(input: PutBucketEncryptionCommandInput); /** * @internal */ resolveMiddleware(clientStack: MiddlewareStack, configuration: S3ClientResolvedConfig, options?: __HttpHandlerOptions): Handler; /** * @internal */ private serialize; /** * @internal */ private deserialize; }