All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.amazonaws.services.ecr.model.EncryptionConfigurationForRepositoryCreationTemplate Maven / Gradle / Ivy

/*
 * Copyright 2019-2024 Amazon.com, Inc. or its affiliates. All Rights Reserved.
 * 
 * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with
 * the License. A copy of the License is located at
 * 
 * http://aws.amazon.com/apache2.0
 * 
 * or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
 * CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions
 * and limitations under the License.
 */
package com.amazonaws.services.ecr.model;

import java.io.Serializable;
import javax.annotation.Generated;
import com.amazonaws.protocol.StructuredPojo;
import com.amazonaws.protocol.ProtocolMarshaller;

/**
 * 

* The encryption configuration to associate with the repository creation template. *

* * @see AWS API Documentation */ @Generated("com.amazonaws:aws-java-sdk-code-generator") public class EncryptionConfigurationForRepositoryCreationTemplate implements Serializable, Cloneable, StructuredPojo { /** *

* The encryption type to use. *

*

* If you use the KMS encryption type, the contents of the repository will be encrypted using * server-side encryption with Key Management Service key stored in KMS. When you use KMS to encrypt your data, you * can either use the default Amazon Web Services managed KMS key for Amazon ECR, or specify your own KMS key, which * you already created. For more information, see Protecting data using server-side * encryption with an KMS key stored in Key Management Service (SSE-KMS) in the Amazon Simple Storage Service * Console Developer Guide. *

*

* If you use the AES256 encryption type, Amazon ECR uses server-side encryption with Amazon S3-managed * encryption keys which encrypts the images in the repository using an AES256 encryption algorithm. For more * information, see Protecting data using * server-side encryption with Amazon S3-managed encryption keys (SSE-S3) in the Amazon Simple Storage * Service Console Developer Guide. *

*/ private String encryptionType; /** *

* If you use the KMS encryption type, specify the KMS key to use for encryption. The full ARN of the * KMS key must be specified. The key must exist in the same Region as the repository. If no key is specified, the * default Amazon Web Services managed KMS key for Amazon ECR will be used. *

*/ private String kmsKey; /** *

* The encryption type to use. *

*

* If you use the KMS encryption type, the contents of the repository will be encrypted using * server-side encryption with Key Management Service key stored in KMS. When you use KMS to encrypt your data, you * can either use the default Amazon Web Services managed KMS key for Amazon ECR, or specify your own KMS key, which * you already created. For more information, see Protecting data using server-side * encryption with an KMS key stored in Key Management Service (SSE-KMS) in the Amazon Simple Storage Service * Console Developer Guide. *

*

* If you use the AES256 encryption type, Amazon ECR uses server-side encryption with Amazon S3-managed * encryption keys which encrypts the images in the repository using an AES256 encryption algorithm. For more * information, see Protecting data using * server-side encryption with Amazon S3-managed encryption keys (SSE-S3) in the Amazon Simple Storage * Service Console Developer Guide. *

* * @param encryptionType * The encryption type to use.

*

* If you use the KMS encryption type, the contents of the repository will be encrypted using * server-side encryption with Key Management Service key stored in KMS. When you use KMS to encrypt your * data, you can either use the default Amazon Web Services managed KMS key for Amazon ECR, or specify your * own KMS key, which you already created. For more information, see Protecting data using * server-side encryption with an KMS key stored in Key Management Service (SSE-KMS) in the Amazon * Simple Storage Service Console Developer Guide. *

*

* If you use the AES256 encryption type, Amazon ECR uses server-side encryption with Amazon * S3-managed encryption keys which encrypts the images in the repository using an AES256 encryption * algorithm. For more information, see Protecting data * using server-side encryption with Amazon S3-managed encryption keys (SSE-S3) in the Amazon Simple * Storage Service Console Developer Guide. * @see EncryptionType */ public void setEncryptionType(String encryptionType) { this.encryptionType = encryptionType; } /** *

* The encryption type to use. *

*

* If you use the KMS encryption type, the contents of the repository will be encrypted using * server-side encryption with Key Management Service key stored in KMS. When you use KMS to encrypt your data, you * can either use the default Amazon Web Services managed KMS key for Amazon ECR, or specify your own KMS key, which * you already created. For more information, see Protecting data using server-side * encryption with an KMS key stored in Key Management Service (SSE-KMS) in the Amazon Simple Storage Service * Console Developer Guide. *

*

* If you use the AES256 encryption type, Amazon ECR uses server-side encryption with Amazon S3-managed * encryption keys which encrypts the images in the repository using an AES256 encryption algorithm. For more * information, see Protecting data using * server-side encryption with Amazon S3-managed encryption keys (SSE-S3) in the Amazon Simple Storage * Service Console Developer Guide. *

* * @return The encryption type to use.

*

* If you use the KMS encryption type, the contents of the repository will be encrypted using * server-side encryption with Key Management Service key stored in KMS. When you use KMS to encrypt your * data, you can either use the default Amazon Web Services managed KMS key for Amazon ECR, or specify your * own KMS key, which you already created. For more information, see Protecting data using * server-side encryption with an KMS key stored in Key Management Service (SSE-KMS) in the Amazon * Simple Storage Service Console Developer Guide. *

*

* If you use the AES256 encryption type, Amazon ECR uses server-side encryption with Amazon * S3-managed encryption keys which encrypts the images in the repository using an AES256 encryption * algorithm. For more information, see Protecting data * using server-side encryption with Amazon S3-managed encryption keys (SSE-S3) in the Amazon Simple * Storage Service Console Developer Guide. * @see EncryptionType */ public String getEncryptionType() { return this.encryptionType; } /** *

* The encryption type to use. *

*

* If you use the KMS encryption type, the contents of the repository will be encrypted using * server-side encryption with Key Management Service key stored in KMS. When you use KMS to encrypt your data, you * can either use the default Amazon Web Services managed KMS key for Amazon ECR, or specify your own KMS key, which * you already created. For more information, see Protecting data using server-side * encryption with an KMS key stored in Key Management Service (SSE-KMS) in the Amazon Simple Storage Service * Console Developer Guide. *

*

* If you use the AES256 encryption type, Amazon ECR uses server-side encryption with Amazon S3-managed * encryption keys which encrypts the images in the repository using an AES256 encryption algorithm. For more * information, see Protecting data using * server-side encryption with Amazon S3-managed encryption keys (SSE-S3) in the Amazon Simple Storage * Service Console Developer Guide. *

* * @param encryptionType * The encryption type to use.

*

* If you use the KMS encryption type, the contents of the repository will be encrypted using * server-side encryption with Key Management Service key stored in KMS. When you use KMS to encrypt your * data, you can either use the default Amazon Web Services managed KMS key for Amazon ECR, or specify your * own KMS key, which you already created. For more information, see Protecting data using * server-side encryption with an KMS key stored in Key Management Service (SSE-KMS) in the Amazon * Simple Storage Service Console Developer Guide. *

*

* If you use the AES256 encryption type, Amazon ECR uses server-side encryption with Amazon * S3-managed encryption keys which encrypts the images in the repository using an AES256 encryption * algorithm. For more information, see Protecting data * using server-side encryption with Amazon S3-managed encryption keys (SSE-S3) in the Amazon Simple * Storage Service Console Developer Guide. * @return Returns a reference to this object so that method calls can be chained together. * @see EncryptionType */ public EncryptionConfigurationForRepositoryCreationTemplate withEncryptionType(String encryptionType) { setEncryptionType(encryptionType); return this; } /** *

* The encryption type to use. *

*

* If you use the KMS encryption type, the contents of the repository will be encrypted using * server-side encryption with Key Management Service key stored in KMS. When you use KMS to encrypt your data, you * can either use the default Amazon Web Services managed KMS key for Amazon ECR, or specify your own KMS key, which * you already created. For more information, see Protecting data using server-side * encryption with an KMS key stored in Key Management Service (SSE-KMS) in the Amazon Simple Storage Service * Console Developer Guide. *

*

* If you use the AES256 encryption type, Amazon ECR uses server-side encryption with Amazon S3-managed * encryption keys which encrypts the images in the repository using an AES256 encryption algorithm. For more * information, see Protecting data using * server-side encryption with Amazon S3-managed encryption keys (SSE-S3) in the Amazon Simple Storage * Service Console Developer Guide. *

* * @param encryptionType * The encryption type to use.

*

* If you use the KMS encryption type, the contents of the repository will be encrypted using * server-side encryption with Key Management Service key stored in KMS. When you use KMS to encrypt your * data, you can either use the default Amazon Web Services managed KMS key for Amazon ECR, or specify your * own KMS key, which you already created. For more information, see Protecting data using * server-side encryption with an KMS key stored in Key Management Service (SSE-KMS) in the Amazon * Simple Storage Service Console Developer Guide. *

*

* If you use the AES256 encryption type, Amazon ECR uses server-side encryption with Amazon * S3-managed encryption keys which encrypts the images in the repository using an AES256 encryption * algorithm. For more information, see Protecting data * using server-side encryption with Amazon S3-managed encryption keys (SSE-S3) in the Amazon Simple * Storage Service Console Developer Guide. * @return Returns a reference to this object so that method calls can be chained together. * @see EncryptionType */ public EncryptionConfigurationForRepositoryCreationTemplate withEncryptionType(EncryptionType encryptionType) { this.encryptionType = encryptionType.toString(); return this; } /** *

* If you use the KMS encryption type, specify the KMS key to use for encryption. The full ARN of the * KMS key must be specified. The key must exist in the same Region as the repository. If no key is specified, the * default Amazon Web Services managed KMS key for Amazon ECR will be used. *

* * @param kmsKey * If you use the KMS encryption type, specify the KMS key to use for encryption. The full ARN * of the KMS key must be specified. The key must exist in the same Region as the repository. If no key is * specified, the default Amazon Web Services managed KMS key for Amazon ECR will be used. */ public void setKmsKey(String kmsKey) { this.kmsKey = kmsKey; } /** *

* If you use the KMS encryption type, specify the KMS key to use for encryption. The full ARN of the * KMS key must be specified. The key must exist in the same Region as the repository. If no key is specified, the * default Amazon Web Services managed KMS key for Amazon ECR will be used. *

* * @return If you use the KMS encryption type, specify the KMS key to use for encryption. The full ARN * of the KMS key must be specified. The key must exist in the same Region as the repository. If no key is * specified, the default Amazon Web Services managed KMS key for Amazon ECR will be used. */ public String getKmsKey() { return this.kmsKey; } /** *

* If you use the KMS encryption type, specify the KMS key to use for encryption. The full ARN of the * KMS key must be specified. The key must exist in the same Region as the repository. If no key is specified, the * default Amazon Web Services managed KMS key for Amazon ECR will be used. *

* * @param kmsKey * If you use the KMS encryption type, specify the KMS key to use for encryption. The full ARN * of the KMS key must be specified. The key must exist in the same Region as the repository. If no key is * specified, the default Amazon Web Services managed KMS key for Amazon ECR will be used. * @return Returns a reference to this object so that method calls can be chained together. */ public EncryptionConfigurationForRepositoryCreationTemplate withKmsKey(String kmsKey) { setKmsKey(kmsKey); return this; } /** * Returns a string representation of this object. This is useful for testing and debugging. Sensitive data will be * redacted from this string using a placeholder value. * * @return A string representation of this object. * * @see java.lang.Object#toString() */ @Override public String toString() { StringBuilder sb = new StringBuilder(); sb.append("{"); if (getEncryptionType() != null) sb.append("EncryptionType: ").append(getEncryptionType()).append(","); if (getKmsKey() != null) sb.append("KmsKey: ").append(getKmsKey()); sb.append("}"); return sb.toString(); } @Override public boolean equals(Object obj) { if (this == obj) return true; if (obj == null) return false; if (obj instanceof EncryptionConfigurationForRepositoryCreationTemplate == false) return false; EncryptionConfigurationForRepositoryCreationTemplate other = (EncryptionConfigurationForRepositoryCreationTemplate) obj; if (other.getEncryptionType() == null ^ this.getEncryptionType() == null) return false; if (other.getEncryptionType() != null && other.getEncryptionType().equals(this.getEncryptionType()) == false) return false; if (other.getKmsKey() == null ^ this.getKmsKey() == null) return false; if (other.getKmsKey() != null && other.getKmsKey().equals(this.getKmsKey()) == false) return false; return true; } @Override public int hashCode() { final int prime = 31; int hashCode = 1; hashCode = prime * hashCode + ((getEncryptionType() == null) ? 0 : getEncryptionType().hashCode()); hashCode = prime * hashCode + ((getKmsKey() == null) ? 0 : getKmsKey().hashCode()); return hashCode; } @Override public EncryptionConfigurationForRepositoryCreationTemplate clone() { try { return (EncryptionConfigurationForRepositoryCreationTemplate) super.clone(); } catch (CloneNotSupportedException e) { throw new IllegalStateException("Got a CloneNotSupportedException from Object.clone() " + "even though we're Cloneable!", e); } } @com.amazonaws.annotation.SdkInternalApi @Override public void marshall(ProtocolMarshaller protocolMarshaller) { com.amazonaws.services.ecr.model.transform.EncryptionConfigurationForRepositoryCreationTemplateMarshaller.getInstance().marshall(this, protocolMarshaller); } }




© 2015 - 2025 Weber Informatics LLC | Privacy Policy