line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
|
2
|
|
|
|
|
|
|
package Paws::S3::UploadPartCopyOutput; |
3
|
1
|
|
|
1
|
|
421
|
use Moose; |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
7
|
|
4
|
|
|
|
|
|
|
has CopyPartResult => (is => 'ro', isa => 'Paws::S3::CopyPartResult'); |
5
|
|
|
|
|
|
|
has CopySourceVersionId => (is => 'ro', isa => 'Str', traits => ['ParamInHeader'], header_name => 'x-amz-copy-source-version-id'); |
6
|
|
|
|
|
|
|
has RequestCharged => (is => 'ro', isa => 'Str', traits => ['ParamInHeader'], header_name => 'x-amz-request-charged'); |
7
|
|
|
|
|
|
|
has ServerSideEncryption => (is => 'ro', isa => 'Str', traits => ['ParamInHeader'], header_name => 'x-amz-server-side-encryption'); |
8
|
|
|
|
|
|
|
has SSECustomerAlgorithm => (is => 'ro', isa => 'Str', traits => ['ParamInHeader'], header_name => 'x-amz-server-side-encryption-customer-algorithm'); |
9
|
|
|
|
|
|
|
has SSECustomerKeyMD5 => (is => 'ro', isa => 'Str', traits => ['ParamInHeader'], header_name => 'x-amz-server-side-encryption-customer-key-MD5'); |
10
|
|
|
|
|
|
|
has SSEKMSKeyId => (is => 'ro', isa => 'Str', traits => ['ParamInHeader'], header_name => 'x-amz-server-side-encryption-aws-kms-key-id'); |
11
|
|
|
|
|
|
|
|
12
|
|
|
|
|
|
|
has _request_id => (is => 'ro', isa => 'Str'); |
13
|
|
|
|
|
|
|
1; |
14
|
|
|
|
|
|
|
|
15
|
|
|
|
|
|
|
### main pod documentation begin ### |
16
|
|
|
|
|
|
|
|
17
|
|
|
|
|
|
|
=head1 NAME |
18
|
|
|
|
|
|
|
|
19
|
|
|
|
|
|
|
Paws::S3::UploadPartCopyOutput |
20
|
|
|
|
|
|
|
|
21
|
|
|
|
|
|
|
=head1 ATTRIBUTES |
22
|
|
|
|
|
|
|
|
23
|
|
|
|
|
|
|
|
24
|
|
|
|
|
|
|
=head2 CopyPartResult => L<Paws::S3::CopyPartResult> |
25
|
|
|
|
|
|
|
|
26
|
|
|
|
|
|
|
|
27
|
|
|
|
|
|
|
|
28
|
|
|
|
|
|
|
|
29
|
|
|
|
|
|
|
|
30
|
|
|
|
|
|
|
=head2 CopySourceVersionId => Str |
31
|
|
|
|
|
|
|
|
32
|
|
|
|
|
|
|
The version of the source object that was copied, if you have enabled |
33
|
|
|
|
|
|
|
versioning on the source bucket. |
34
|
|
|
|
|
|
|
|
35
|
|
|
|
|
|
|
|
36
|
|
|
|
|
|
|
|
37
|
|
|
|
|
|
|
=head2 RequestCharged => Str |
38
|
|
|
|
|
|
|
|
39
|
|
|
|
|
|
|
|
40
|
|
|
|
|
|
|
|
41
|
|
|
|
|
|
|
Valid values are: C<"requester"> |
42
|
|
|
|
|
|
|
|
43
|
|
|
|
|
|
|
=head2 ServerSideEncryption => Str |
44
|
|
|
|
|
|
|
|
45
|
|
|
|
|
|
|
The Server-side encryption algorithm used when storing this object in |
46
|
|
|
|
|
|
|
S3 (e.g., AES256, aws:kms). |
47
|
|
|
|
|
|
|
|
48
|
|
|
|
|
|
|
Valid values are: C<"AES256">, C<"aws:kms"> |
49
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
|
=head2 SSECustomerAlgorithm => Str |
51
|
|
|
|
|
|
|
|
52
|
|
|
|
|
|
|
If server-side encryption with a customer-provided encryption key was |
53
|
|
|
|
|
|
|
requested, the response will include this header confirming the |
54
|
|
|
|
|
|
|
encryption algorithm used. |
55
|
|
|
|
|
|
|
|
56
|
|
|
|
|
|
|
|
57
|
|
|
|
|
|
|
|
58
|
|
|
|
|
|
|
=head2 SSECustomerKeyMD5 => Str |
59
|
|
|
|
|
|
|
|
60
|
|
|
|
|
|
|
If server-side encryption with a customer-provided encryption key was |
61
|
|
|
|
|
|
|
requested, the response will include this header to provide round trip |
62
|
|
|
|
|
|
|
message integrity verification of the customer-provided encryption key. |
63
|
|
|
|
|
|
|
|
64
|
|
|
|
|
|
|
|
65
|
|
|
|
|
|
|
|
66
|
|
|
|
|
|
|
=head2 SSEKMSKeyId => Str |
67
|
|
|
|
|
|
|
|
68
|
|
|
|
|
|
|
If present, specifies the ID of the AWS Key Management Service (KMS) |
69
|
|
|
|
|
|
|
master encryption key that was used for the object. |
70
|
|
|
|
|
|
|
|
71
|
|
|
|
|
|
|
|
72
|
|
|
|
|
|
|
|
73
|
|
|
|
|
|
|
|
74
|
|
|
|
|
|
|
=cut |
75
|
|
|
|
|
|
|
|