All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.amazonaws.services.macie2.model.BucketCountPolicyAllowsUnencryptedObjectUploads Maven / Gradle / Ivy

Go to download

The AWS Java SDK for Amazon Macie 2 module holds the client classes that are used for communicating with Amazon Macie 2 Service

There is a newer version: 1.12.780
Show newest version
/*
 * Copyright 2018-2023 Amazon.com, Inc. or its affiliates. All Rights Reserved.
 * 
 * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with
 * the License. A copy of the License is located at
 * 
 * http://aws.amazon.com/apache2.0
 * 
 * or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
 * CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions
 * and limitations under the License.
 */
package com.amazonaws.services.macie2.model;

import java.io.Serializable;
import javax.annotation.Generated;
import com.amazonaws.protocol.StructuredPojo;
import com.amazonaws.protocol.ProtocolMarshaller;

/**
 * 

* Provides information about the number of S3 buckets whose bucket policies do or don't require server-side encryption * of objects when objects are added to the buckets. *

* * @see AWS API Documentation */ @Generated("com.amazonaws:aws-java-sdk-code-generator") public class BucketCountPolicyAllowsUnencryptedObjectUploads implements Serializable, Cloneable, StructuredPojo { /** *

* The total number of buckets that don't have a bucket policy or have a bucket policy that doesn't require * server-side encryption of new objects. If a bucket policy exists, the policy doesn't require PutObject requests * to include a valid server-side encryption header: the x-amz-server-side-encryption header with a value of AES256 * or aws:kms, or the x-amz-server-side-encryption-customer-algorithm header with a value of AES256. *

*/ private Long allowsUnencryptedObjectUploads; /** *

* The total number of buckets whose bucket policies require server-side encryption of new objects. PutObject * requests for these buckets must include a valid server-side encryption header: the x-amz-server-side-encryption * header with a value of AES256 or aws:kms, or the x-amz-server-side-encryption-customer-algorithm header with a * value of AES256. *

*/ private Long deniesUnencryptedObjectUploads; /** *

* The total number of buckets that Amazon Macie wasn't able to evaluate server-side encryption requirements for. * Macie can't determine whether the bucket policies for these buckets require server-side encryption of new * objects. *

*/ private Long unknown; /** *

* The total number of buckets that don't have a bucket policy or have a bucket policy that doesn't require * server-side encryption of new objects. If a bucket policy exists, the policy doesn't require PutObject requests * to include a valid server-side encryption header: the x-amz-server-side-encryption header with a value of AES256 * or aws:kms, or the x-amz-server-side-encryption-customer-algorithm header with a value of AES256. *

* * @param allowsUnencryptedObjectUploads * The total number of buckets that don't have a bucket policy or have a bucket policy that doesn't require * server-side encryption of new objects. If a bucket policy exists, the policy doesn't require PutObject * requests to include a valid server-side encryption header: the x-amz-server-side-encryption header with a * value of AES256 or aws:kms, or the x-amz-server-side-encryption-customer-algorithm header with a value of * AES256. */ public void setAllowsUnencryptedObjectUploads(Long allowsUnencryptedObjectUploads) { this.allowsUnencryptedObjectUploads = allowsUnencryptedObjectUploads; } /** *

* The total number of buckets that don't have a bucket policy or have a bucket policy that doesn't require * server-side encryption of new objects. If a bucket policy exists, the policy doesn't require PutObject requests * to include a valid server-side encryption header: the x-amz-server-side-encryption header with a value of AES256 * or aws:kms, or the x-amz-server-side-encryption-customer-algorithm header with a value of AES256. *

* * @return The total number of buckets that don't have a bucket policy or have a bucket policy that doesn't require * server-side encryption of new objects. If a bucket policy exists, the policy doesn't require PutObject * requests to include a valid server-side encryption header: the x-amz-server-side-encryption header with a * value of AES256 or aws:kms, or the x-amz-server-side-encryption-customer-algorithm header with a value of * AES256. */ public Long getAllowsUnencryptedObjectUploads() { return this.allowsUnencryptedObjectUploads; } /** *

* The total number of buckets that don't have a bucket policy or have a bucket policy that doesn't require * server-side encryption of new objects. If a bucket policy exists, the policy doesn't require PutObject requests * to include a valid server-side encryption header: the x-amz-server-side-encryption header with a value of AES256 * or aws:kms, or the x-amz-server-side-encryption-customer-algorithm header with a value of AES256. *

* * @param allowsUnencryptedObjectUploads * The total number of buckets that don't have a bucket policy or have a bucket policy that doesn't require * server-side encryption of new objects. If a bucket policy exists, the policy doesn't require PutObject * requests to include a valid server-side encryption header: the x-amz-server-side-encryption header with a * value of AES256 or aws:kms, or the x-amz-server-side-encryption-customer-algorithm header with a value of * AES256. * @return Returns a reference to this object so that method calls can be chained together. */ public BucketCountPolicyAllowsUnencryptedObjectUploads withAllowsUnencryptedObjectUploads(Long allowsUnencryptedObjectUploads) { setAllowsUnencryptedObjectUploads(allowsUnencryptedObjectUploads); return this; } /** *

* The total number of buckets whose bucket policies require server-side encryption of new objects. PutObject * requests for these buckets must include a valid server-side encryption header: the x-amz-server-side-encryption * header with a value of AES256 or aws:kms, or the x-amz-server-side-encryption-customer-algorithm header with a * value of AES256. *

* * @param deniesUnencryptedObjectUploads * The total number of buckets whose bucket policies require server-side encryption of new objects. PutObject * requests for these buckets must include a valid server-side encryption header: the * x-amz-server-side-encryption header with a value of AES256 or aws:kms, or the * x-amz-server-side-encryption-customer-algorithm header with a value of AES256. */ public void setDeniesUnencryptedObjectUploads(Long deniesUnencryptedObjectUploads) { this.deniesUnencryptedObjectUploads = deniesUnencryptedObjectUploads; } /** *

* The total number of buckets whose bucket policies require server-side encryption of new objects. PutObject * requests for these buckets must include a valid server-side encryption header: the x-amz-server-side-encryption * header with a value of AES256 or aws:kms, or the x-amz-server-side-encryption-customer-algorithm header with a * value of AES256. *

* * @return The total number of buckets whose bucket policies require server-side encryption of new objects. * PutObject requests for these buckets must include a valid server-side encryption header: the * x-amz-server-side-encryption header with a value of AES256 or aws:kms, or the * x-amz-server-side-encryption-customer-algorithm header with a value of AES256. */ public Long getDeniesUnencryptedObjectUploads() { return this.deniesUnencryptedObjectUploads; } /** *

* The total number of buckets whose bucket policies require server-side encryption of new objects. PutObject * requests for these buckets must include a valid server-side encryption header: the x-amz-server-side-encryption * header with a value of AES256 or aws:kms, or the x-amz-server-side-encryption-customer-algorithm header with a * value of AES256. *

* * @param deniesUnencryptedObjectUploads * The total number of buckets whose bucket policies require server-side encryption of new objects. PutObject * requests for these buckets must include a valid server-side encryption header: the * x-amz-server-side-encryption header with a value of AES256 or aws:kms, or the * x-amz-server-side-encryption-customer-algorithm header with a value of AES256. * @return Returns a reference to this object so that method calls can be chained together. */ public BucketCountPolicyAllowsUnencryptedObjectUploads withDeniesUnencryptedObjectUploads(Long deniesUnencryptedObjectUploads) { setDeniesUnencryptedObjectUploads(deniesUnencryptedObjectUploads); return this; } /** *

* The total number of buckets that Amazon Macie wasn't able to evaluate server-side encryption requirements for. * Macie can't determine whether the bucket policies for these buckets require server-side encryption of new * objects. *

* * @param unknown * The total number of buckets that Amazon Macie wasn't able to evaluate server-side encryption requirements * for. Macie can't determine whether the bucket policies for these buckets require server-side encryption of * new objects. */ public void setUnknown(Long unknown) { this.unknown = unknown; } /** *

* The total number of buckets that Amazon Macie wasn't able to evaluate server-side encryption requirements for. * Macie can't determine whether the bucket policies for these buckets require server-side encryption of new * objects. *

* * @return The total number of buckets that Amazon Macie wasn't able to evaluate server-side encryption requirements * for. Macie can't determine whether the bucket policies for these buckets require server-side encryption * of new objects. */ public Long getUnknown() { return this.unknown; } /** *

* The total number of buckets that Amazon Macie wasn't able to evaluate server-side encryption requirements for. * Macie can't determine whether the bucket policies for these buckets require server-side encryption of new * objects. *

* * @param unknown * The total number of buckets that Amazon Macie wasn't able to evaluate server-side encryption requirements * for. Macie can't determine whether the bucket policies for these buckets require server-side encryption of * new objects. * @return Returns a reference to this object so that method calls can be chained together. */ public BucketCountPolicyAllowsUnencryptedObjectUploads withUnknown(Long unknown) { setUnknown(unknown); return this; } /** * Returns a string representation of this object. This is useful for testing and debugging. Sensitive data will be * redacted from this string using a placeholder value. * * @return A string representation of this object. * * @see java.lang.Object#toString() */ @Override public String toString() { StringBuilder sb = new StringBuilder(); sb.append("{"); if (getAllowsUnencryptedObjectUploads() != null) sb.append("AllowsUnencryptedObjectUploads: ").append(getAllowsUnencryptedObjectUploads()).append(","); if (getDeniesUnencryptedObjectUploads() != null) sb.append("DeniesUnencryptedObjectUploads: ").append(getDeniesUnencryptedObjectUploads()).append(","); if (getUnknown() != null) sb.append("Unknown: ").append(getUnknown()); sb.append("}"); return sb.toString(); } @Override public boolean equals(Object obj) { if (this == obj) return true; if (obj == null) return false; if (obj instanceof BucketCountPolicyAllowsUnencryptedObjectUploads == false) return false; BucketCountPolicyAllowsUnencryptedObjectUploads other = (BucketCountPolicyAllowsUnencryptedObjectUploads) obj; if (other.getAllowsUnencryptedObjectUploads() == null ^ this.getAllowsUnencryptedObjectUploads() == null) return false; if (other.getAllowsUnencryptedObjectUploads() != null && other.getAllowsUnencryptedObjectUploads().equals(this.getAllowsUnencryptedObjectUploads()) == false) return false; if (other.getDeniesUnencryptedObjectUploads() == null ^ this.getDeniesUnencryptedObjectUploads() == null) return false; if (other.getDeniesUnencryptedObjectUploads() != null && other.getDeniesUnencryptedObjectUploads().equals(this.getDeniesUnencryptedObjectUploads()) == false) return false; if (other.getUnknown() == null ^ this.getUnknown() == null) return false; if (other.getUnknown() != null && other.getUnknown().equals(this.getUnknown()) == false) return false; return true; } @Override public int hashCode() { final int prime = 31; int hashCode = 1; hashCode = prime * hashCode + ((getAllowsUnencryptedObjectUploads() == null) ? 0 : getAllowsUnencryptedObjectUploads().hashCode()); hashCode = prime * hashCode + ((getDeniesUnencryptedObjectUploads() == null) ? 0 : getDeniesUnencryptedObjectUploads().hashCode()); hashCode = prime * hashCode + ((getUnknown() == null) ? 0 : getUnknown().hashCode()); return hashCode; } @Override public BucketCountPolicyAllowsUnencryptedObjectUploads clone() { try { return (BucketCountPolicyAllowsUnencryptedObjectUploads) super.clone(); } catch (CloneNotSupportedException e) { throw new IllegalStateException("Got a CloneNotSupportedException from Object.clone() " + "even though we're Cloneable!", e); } } @com.amazonaws.annotation.SdkInternalApi @Override public void marshall(ProtocolMarshaller protocolMarshaller) { com.amazonaws.services.macie2.model.transform.BucketCountPolicyAllowsUnencryptedObjectUploadsMarshaller.getInstance() .marshall(this, protocolMarshaller); } }




© 2015 - 2025 Weber Informatics LLC | Privacy Policy