- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2">
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- <s3 useSignatureVersion4="true" />
- <proxy host="localhost" port="8888" username="1" password="1" />
-
- <dynamoDB>
- <dynamoDBContext tableNamePrefix="Prod-">
-
- <tableAliases>
- <alias fromTable="FakeTable" toTable="People" />
- <alias fromTable="Persons" toTable="People" />
- </tableAliases>
-
- <mappings>
- <map type="Sample.Tests.Author, SampleDLL" targetTable="People" />
- <map type="Sample.Tests.Editor, SampleDLL" targetTable="People">
- <property name="FullName" attribute="Name" />
- <property name="EmployeeId" attribute="Id" />
- <property name="ComplexData" converter="Sample.Tests.ComplexDataConverter, SampleDLL" />
- <property name="Version" version="true" />
- <property name="Password" ignore="true" />
- </map>
- </mappings>
-
- </dynamoDBContext>
- </dynamoDB>
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="development"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfilesLocation" value="c:\config"/>
- </appSettings>
- </configuration>
-
-
- <appSettings>
- <add key="AWSLogging" value="log4net"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSResponseLogging" value="OnError"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSLogMetrics" value="true"/>
- </appSettings>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws endpointDefinition="c:\config\endpoints.json" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws useSdkCache="true" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <proxy host="localhost" port="8888" username="1" password="1" bypassList="addressexpr1;addressexpr2;..." bypassOnLocal="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- Policy policy = new Policy("MyQueuePolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SQSActionIdentifiers.SendMessage)
- .WithResources(new Resource(myQueueArn))
- .WithConditions(ConditionFactory.NewSourceArnCondition(myTopicArn)));
-
-
- Policy policy = new Policy("MyTopicPolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SNSActionIdentifiers.Subscribe)
- .WithResources(new Resource(myTopicArn))
- .WithConditions(ConditionFactory.NewEndpointCondition("*@my-company.com")));
-
-
- JsonUnmarshallerContext context = new JsonUnmarshallerContext(jsonString);
- while (context.Read())
- {
- if (context.IsKey)
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- }
- }
-
-
- UnmarshallerContext context = new UnmarshallerContext(...);
- while (context.Read())
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- if (context.TestExpression("path/to/@attribute"))
- myObject.MyComplexTypeMember = MyComplexTypeUnmarshaller.GetInstance().Unmarshall(context);
- }
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2">
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- <s3 useSignatureVersion4="true" />
- <proxy host="localhost" port="8888" username="1" password="1" />
-
- <dynamoDB>
- <dynamoDBContext tableNamePrefix="Prod-">
-
- <tableAliases>
- <alias fromTable="FakeTable" toTable="People" />
- <alias fromTable="Persons" toTable="People" />
- </tableAliases>
-
- <mappings>
- <map type="Sample.Tests.Author, SampleDLL" targetTable="People" />
- <map type="Sample.Tests.Editor, SampleDLL" targetTable="People">
- <property name="FullName" attribute="Name" />
- <property name="EmployeeId" attribute="Id" />
- <property name="ComplexData" converter="Sample.Tests.ComplexDataConverter, SampleDLL" />
- <property name="Version" version="true" />
- <property name="Password" ignore="true" />
- </map>
- </mappings>
-
- </dynamoDBContext>
- </dynamoDB>
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="development"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfilesLocation" value="c:\config"/>
- </appSettings>
- </configuration>
-
-
- <appSettings>
- <add key="AWSLogging" value="log4net"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSResponseLogging" value="OnError"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSLogMetrics" value="true"/>
- </appSettings>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws endpointDefinition="c:\config\endpoints.json" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws useSdkCache="true" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <proxy host="localhost" port="8888" username="1" password="1" bypassList="addressexpr1;addressexpr2;..." bypassOnLocal="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- Policy policy = new Policy("MyQueuePolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SQSActionIdentifiers.SendMessage)
- .WithResources(new Resource(myQueueArn))
- .WithConditions(ConditionFactory.NewSourceArnCondition(myTopicArn)));
-
-
- Policy policy = new Policy("MyTopicPolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SNSActionIdentifiers.Subscribe)
- .WithResources(new Resource(myTopicArn))
- .WithConditions(ConditionFactory.NewEndpointCondition("*@my-company.com")));
-
-
- JsonUnmarshallerContext context = new JsonUnmarshallerContext(jsonString);
- while (context.Read())
- {
- if (context.IsKey)
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- }
- }
-
-
- UnmarshallerContext context = new UnmarshallerContext(...);
- while (context.Read())
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- if (context.TestExpression("path/to/@attribute"))
- myObject.MyComplexTypeMember = MyComplexTypeUnmarshaller.GetInstance().Unmarshall(context);
- }
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2">
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- <s3 useSignatureVersion4="true" />
- <proxy host="localhost" port="8888" username="1" password="1" />
-
- <dynamoDB>
- <dynamoDBContext tableNamePrefix="Prod-">
-
- <tableAliases>
- <alias fromTable="FakeTable" toTable="People" />
- <alias fromTable="Persons" toTable="People" />
- </tableAliases>
-
- <mappings>
- <map type="Sample.Tests.Author, SampleDLL" targetTable="People" />
- <map type="Sample.Tests.Editor, SampleDLL" targetTable="People">
- <property name="FullName" attribute="Name" />
- <property name="EmployeeId" attribute="Id" />
- <property name="ComplexData" converter="Sample.Tests.ComplexDataConverter, SampleDLL" />
- <property name="Version" version="true" />
- <property name="Password" ignore="true" />
- </map>
- </mappings>
-
- </dynamoDBContext>
- </dynamoDB>
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="development"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfilesLocation" value="c:\config"/>
- </appSettings>
- </configuration>
-
-
- <appSettings>
- <add key="AWSLogging" value="log4net"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSResponseLogging" value="OnError"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSLogMetrics" value="true"/>
- </appSettings>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws endpointDefinition="c:\config\endpoints.json" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws useSdkCache="true" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <proxy host="localhost" port="8888" username="1" password="1" bypassList="addressexpr1;addressexpr2;..." bypassOnLocal="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- Policy policy = new Policy("MyQueuePolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SQSActionIdentifiers.SendMessage)
- .WithResources(new Resource(myQueueArn))
- .WithConditions(ConditionFactory.NewSourceArnCondition(myTopicArn)));
-
-
- Policy policy = new Policy("MyTopicPolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SNSActionIdentifiers.Subscribe)
- .WithResources(new Resource(myTopicArn))
- .WithConditions(ConditionFactory.NewEndpointCondition("*@my-company.com")));
-
-
- JsonUnmarshallerContext context = new JsonUnmarshallerContext(jsonString);
- while (context.Read())
- {
- if (context.IsKey)
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- }
- }
-
-
- UnmarshallerContext context = new UnmarshallerContext(...);
- while (context.Read())
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- if (context.TestExpression("path/to/@attribute"))
- myObject.MyComplexTypeMember = MyComplexTypeUnmarshaller.GetInstance().Unmarshall(context);
- }
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2">
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- <s3 useSignatureVersion4="true" />
- <proxy host="localhost" port="8888" username="1" password="1" />
-
- <dynamoDB>
- <dynamoDBContext tableNamePrefix="Prod-">
-
- <tableAliases>
- <alias fromTable="FakeTable" toTable="People" />
- <alias fromTable="Persons" toTable="People" />
- </tableAliases>
-
- <mappings>
- <map type="Sample.Tests.Author, SampleDLL" targetTable="People" />
- <map type="Sample.Tests.Editor, SampleDLL" targetTable="People">
- <property name="FullName" attribute="Name" />
- <property name="EmployeeId" attribute="Id" />
- <property name="ComplexData" converter="Sample.Tests.ComplexDataConverter, SampleDLL" />
- <property name="Version" version="true" />
- <property name="Password" ignore="true" />
- </map>
- </mappings>
-
- </dynamoDBContext>
- </dynamoDB>
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="development"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfilesLocation" value="c:\config"/>
- </appSettings>
- </configuration>
-
-
- <appSettings>
- <add key="AWSLogging" value="log4net"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSResponseLogging" value="OnError"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSLogMetrics" value="true"/>
- </appSettings>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws endpointDefinition="c:\config\endpoints.json" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws useSdkCache="true" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <proxy host="localhost" port="8888" username="1" password="1" bypassList="addressexpr1;addressexpr2;..." bypassOnLocal="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- Policy policy = new Policy("MyQueuePolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SQSActionIdentifiers.SendMessage)
- .WithResources(new Resource(myQueueArn))
- .WithConditions(ConditionFactory.NewSourceArnCondition(myTopicArn)));
-
-
- Policy policy = new Policy("MyTopicPolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SNSActionIdentifiers.Subscribe)
- .WithResources(new Resource(myTopicArn))
- .WithConditions(ConditionFactory.NewEndpointCondition("*@my-company.com")));
-
-
- JsonUnmarshallerContext context = new JsonUnmarshallerContext(jsonString);
- while (context.Read())
- {
- if (context.IsKey)
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- }
- }
-
-
- UnmarshallerContext context = new UnmarshallerContext(...);
- while (context.Read())
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- if (context.TestExpression("path/to/@attribute"))
- myObject.MyComplexTypeMember = MyComplexTypeUnmarshaller.GetInstance().Unmarshall(context);
- }
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- Policy policy = new Policy("MyQueuePolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SQSActionIdentifiers.SendMessage)
- .WithResources(new Resource(myQueueArn))
- .WithConditions(ConditionFactory.NewSourceArnCondition(myTopicArn)));
-
-
- Policy policy = new Policy("MyTopicPolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SNSActionIdentifiers.Subscribe)
- .WithResources(new Resource(myTopicArn))
- .WithConditions(ConditionFactory.NewEndpointCondition("*@my-company.com")));
-
-
- JsonUnmarshallerContext context = new JsonUnmarshallerContext(jsonString);
- while (context.Read())
- {
- if (context.IsKey)
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- }
- }
-
-
- UnmarshallerContext context = new UnmarshallerContext(...);
- while (context.Read())
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- if (context.TestExpression("path/to/@attribute"))
- myObject.MyComplexTypeMember = MyComplexTypeUnmarshaller.GetInstance().Unmarshall(context);
- }
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
- 3600
seconds.
- DurationSeconds
parameter is separate from the duration of a console
- session that you might request using the returned credentials. The request to the
- federation endpoint for a console sign-in token takes a SessionDuration
- parameter that specifies the maximum length of the console session. For more information,
- see Creating
- a URL that Enables Federated Users to Access the AWS Management Console in the
- IAM User Guide.
- www.amazon.com
- and graph.facebook.com
are the only supported identity providers for
- OAuth 2.0 access tokens. Do not include URL schemes and port numbers.
- PackedPolicySize
- response element indicates by percentage how close the policy is to the upper size
- limit.
- PackedPolicySize
- response element indicates by percentage how close the policy is to the upper size
- limit.
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="development"/>
- </appSettings>
- </configuration>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2">
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- <s3 useSignatureVersion4="true" />
- <proxy host="localhost" port="8888" username="1" password="1" />
-
- <dynamoDB>
- <dynamoDBContext tableNamePrefix="Prod-">
-
- <tableAliases>
- <alias fromTable="FakeTable" toTable="People" />
- <alias fromTable="Persons" toTable="People" />
- </tableAliases>
-
- <mappings>
- <map type="Sample.Tests.Author, SampleDLL" targetTable="People" />
- <map type="Sample.Tests.Editor, SampleDLL" targetTable="People">
- <property name="FullName" attribute="Name" />
- <property name="EmployeeId" attribute="Id" />
- <property name="ComplexData" converter="Sample.Tests.ComplexDataConverter, SampleDLL" />
- <property name="Version" version="true" />
- <property name="Password" ignore="true" />
- </map>
- </mappings>
-
- </dynamoDBContext>
- </dynamoDB>
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="development"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfilesLocation" value="c:\config"/>
- </appSettings>
- </configuration>
-
-
- <appSettings>
- <add key="AWSLogging" value="log4net"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSResponseLogging" value="OnError"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSLogMetrics" value="true"/>
- </appSettings>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws endpointDefinition="c:\config\endpoints.json" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws useSdkCache="true" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <proxy host="localhost" port="8888" username="1" password="1" bypassList="addressexpr1;addressexpr2;..." bypassOnLocal="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws applicationName="" />
-
-
- Policy policy = new Policy("MyQueuePolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SQSActionIdentifiers.SendMessage)
- .WithResources(new Resource(myQueueArn))
- .WithConditions(ConditionFactory.NewSourceArnCondition(myTopicArn)));
-
-
- Policy policy = new Policy("MyTopicPolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SNSActionIdentifiers.Subscribe)
- .WithResources(new Resource(myTopicArn))
- .WithConditions(ConditionFactory.NewEndpointCondition("*@my-company.com")));
-
-
- JsonUnmarshallerContext context = new JsonUnmarshallerContext(jsonString);
- while (context.Read())
- {
- if (context.IsKey)
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- }
- }
-
-
- UnmarshallerContext context = new UnmarshallerContext(...);
- while (context.Read())
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- if (context.TestExpression("path/to/@attribute"))
- myObject.MyComplexTypeMember = MyComplexTypeUnmarshaller.GetInstance().Unmarshall(context);
- }
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
- 3600
seconds.
- DurationSeconds
parameter is separate from the duration of a console
- session that you might request using the returned credentials. The request to the
- federation endpoint for a console sign-in token takes a SessionDuration
- parameter that specifies the maximum length of the console session. For more information,
- see Creating
- a URL that Enables Federated Users to Access the AWS Management Console in the
- IAM User Guide.
- www.amazon.com
- and graph.facebook.com
are the only supported identity providers for
- OAuth 2.0 access tokens. Do not include URL schemes and port numbers.
- PackedPolicySize
- response element indicates by percentage how close the policy is to the upper size
- limit.
- PackedPolicySize
- response element indicates by percentage how close the policy is to the upper size
- limit.
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="development"/>
- </appSettings>
- </configuration>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2">
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- <s3 useSignatureVersion4="true" />
- <proxy host="localhost" port="8888" username="1" password="1" />
-
- <dynamoDB>
- <dynamoDBContext tableNamePrefix="Prod-">
-
- <tableAliases>
- <alias fromTable="FakeTable" toTable="People" />
- <alias fromTable="Persons" toTable="People" />
- </tableAliases>
-
- <mappings>
- <map type="Sample.Tests.Author, SampleDLL" targetTable="People" />
- <map type="Sample.Tests.Editor, SampleDLL" targetTable="People">
- <property name="FullName" attribute="Name" />
- <property name="EmployeeId" attribute="Id" />
- <property name="ComplexData" converter="Sample.Tests.ComplexDataConverter, SampleDLL" />
- <property name="Version" version="true" />
- <property name="Password" ignore="true" />
- </map>
- </mappings>
-
- </dynamoDBContext>
- </dynamoDB>
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="development"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfilesLocation" value="c:\config"/>
- </appSettings>
- </configuration>
-
-
- <appSettings>
- <add key="AWSLogging" value="log4net"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSResponseLogging" value="OnError"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSLogMetrics" value="true"/>
- </appSettings>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws endpointDefinition="c:\config\endpoints.json" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws useSdkCache="true" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <proxy host="localhost" port="8888" username="1" password="1" bypassList="addressexpr1;addressexpr2;..." bypassOnLocal="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws applicationName="" />
-
-
- Policy policy = new Policy("MyQueuePolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SQSActionIdentifiers.SendMessage)
- .WithResources(new Resource(myQueueArn))
- .WithConditions(ConditionFactory.NewSourceArnCondition(myTopicArn)));
-
-
- Policy policy = new Policy("MyTopicPolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SNSActionIdentifiers.Subscribe)
- .WithResources(new Resource(myTopicArn))
- .WithConditions(ConditionFactory.NewEndpointCondition("*@my-company.com")));
-
-
- JsonUnmarshallerContext context = new JsonUnmarshallerContext(jsonString);
- while (context.Read())
- {
- if (context.IsKey)
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- }
- }
-
-
- UnmarshallerContext context = new UnmarshallerContext(...);
- while (context.Read())
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- if (context.TestExpression("path/to/@attribute"))
- myObject.MyComplexTypeMember = MyComplexTypeUnmarshaller.GetInstance().Unmarshall(context);
- }
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
- 3600
seconds.
- DurationSeconds
parameter is separate from the duration of a console
- session that you might request using the returned credentials. The request to the
- federation endpoint for a console sign-in token takes a SessionDuration
- parameter that specifies the maximum length of the console session. For more information,
- see Creating
- a URL that Enables Federated Users to Access the AWS Management Console in the
- IAM User Guide.
- www.amazon.com
- and graph.facebook.com
are the only supported identity providers for
- OAuth 2.0 access tokens. Do not include URL schemes and port numbers.
- PackedPolicySize
- response element indicates by percentage how close the policy is to the upper size
- limit.
- PackedPolicySize
- response element indicates by percentage how close the policy is to the upper size
- limit.
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="development"/>
- </appSettings>
- </configuration>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2">
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- <s3 useSignatureVersion4="true" />
- <proxy host="localhost" port="8888" username="1" password="1" />
-
- <dynamoDB>
- <dynamoDBContext tableNamePrefix="Prod-">
-
- <tableAliases>
- <alias fromTable="FakeTable" toTable="People" />
- <alias fromTable="Persons" toTable="People" />
- </tableAliases>
-
- <mappings>
- <map type="Sample.Tests.Author, SampleDLL" targetTable="People" />
- <map type="Sample.Tests.Editor, SampleDLL" targetTable="People">
- <property name="FullName" attribute="Name" />
- <property name="EmployeeId" attribute="Id" />
- <property name="ComplexData" converter="Sample.Tests.ComplexDataConverter, SampleDLL" />
- <property name="Version" version="true" />
- <property name="Password" ignore="true" />
- </map>
- </mappings>
-
- </dynamoDBContext>
- </dynamoDB>
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="development"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfilesLocation" value="c:\config"/>
- </appSettings>
- </configuration>
-
-
- <appSettings>
- <add key="AWSLogging" value="log4net"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSResponseLogging" value="OnError"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSLogMetrics" value="true"/>
- </appSettings>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws endpointDefinition="c:\config\endpoints.json" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws useSdkCache="true" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <proxy host="localhost" port="8888" username="1" password="1" bypassList="addressexpr1;addressexpr2;..." bypassOnLocal="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- Policy policy = new Policy("MyQueuePolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SQSActionIdentifiers.SendMessage)
- .WithResources(new Resource(myQueueArn))
- .WithConditions(ConditionFactory.NewSourceArnCondition(myTopicArn)));
-
-
- Policy policy = new Policy("MyTopicPolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SNSActionIdentifiers.Subscribe)
- .WithResources(new Resource(myTopicArn))
- .WithConditions(ConditionFactory.NewEndpointCondition("*@my-company.com")));
-
-
- JsonUnmarshallerContext context = new JsonUnmarshallerContext(jsonString);
- while (context.Read())
- {
- if (context.IsKey)
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- }
- }
-
-
- UnmarshallerContext context = new UnmarshallerContext(...);
- while (context.Read())
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- if (context.TestExpression("path/to/@attribute"))
- myObject.MyComplexTypeMember = MyComplexTypeUnmarshaller.GetInstance().Unmarshall(context);
- }
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
- 3600
seconds.
- DurationSeconds
parameter is separate from the duration of a console
- session that you might request using the returned credentials. The request to the
- federation endpoint for a console sign-in token takes a SessionDuration
- parameter that specifies the maximum length of the console session. For more information,
- see Creating
- a URL that Enables Federated Users to Access the AWS Management Console in the
- IAM User Guide.
- www.amazon.com
- and graph.facebook.com
are the only supported identity providers for
- OAuth 2.0 access tokens. Do not include URL schemes and port numbers.
- PackedPolicySize
- response element indicates by percentage how close the policy is to the upper size
- limit.
- PackedPolicySize
- response element indicates by percentage how close the policy is to the upper size
- limit.
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="development"/>
- </appSettings>
- </configuration>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2">
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- <s3 useSignatureVersion4="true" />
- <proxy host="localhost" port="8888" username="1" password="1" />
-
- <dynamoDB>
- <dynamoDBContext tableNamePrefix="Prod-">
-
- <tableAliases>
- <alias fromTable="FakeTable" toTable="People" />
- <alias fromTable="Persons" toTable="People" />
- </tableAliases>
-
- <mappings>
- <map type="Sample.Tests.Author, SampleDLL" targetTable="People" />
- <map type="Sample.Tests.Editor, SampleDLL" targetTable="People">
- <property name="FullName" attribute="Name" />
- <property name="EmployeeId" attribute="Id" />
- <property name="ComplexData" converter="Sample.Tests.ComplexDataConverter, SampleDLL" />
- <property name="Version" version="true" />
- <property name="Password" ignore="true" />
- </map>
- </mappings>
-
- </dynamoDBContext>
- </dynamoDB>
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="development"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfilesLocation" value="c:\config"/>
- </appSettings>
- </configuration>
-
-
- <appSettings>
- <add key="AWSLogging" value="log4net"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSResponseLogging" value="OnError"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSLogMetrics" value="true"/>
- </appSettings>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws endpointDefinition="c:\config\endpoints.json" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws useSdkCache="true" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <proxy host="localhost" port="8888" username="1" password="1" bypassList="addressexpr1;addressexpr2;..." bypassOnLocal="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2">
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- <s3 useSignatureVersion4="true" />
- <proxy host="localhost" port="8888" username="1" password="1" />
-
- <dynamoDB>
- <dynamoDBContext tableNamePrefix="Prod-">
-
- <tableAliases>
- <alias fromTable="FakeTable" toTable="People" />
- <alias fromTable="Persons" toTable="People" />
- </tableAliases>
-
- <mappings>
- <map type="Sample.Tests.Author, SampleDLL" targetTable="People" />
- <map type="Sample.Tests.Editor, SampleDLL" targetTable="People">
- <property name="FullName" attribute="Name" />
- <property name="EmployeeId" attribute="Id" />
- <property name="ComplexData" converter="Sample.Tests.ComplexDataConverter, SampleDLL" />
- <property name="Version" version="true" />
- <property name="Password" ignore="true" />
- </map>
- </mappings>
-
- </dynamoDBContext>
- </dynamoDB>
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="development"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfilesLocation" value="c:\config"/>
- </appSettings>
- </configuration>
-
-
- <appSettings>
- <add key="AWSLogging" value="log4net"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSResponseLogging" value="OnError"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSLogMetrics" value="true"/>
- </appSettings>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws endpointDefinition="c:\config\endpoints.json" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws useSdkCache="true" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <proxy host="localhost" port="8888" username="1" password="1" bypassList="addressexpr1;addressexpr2;..." bypassOnLocal="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- Policy policy = new Policy("MyQueuePolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SQSActionIdentifiers.SendMessage)
- .WithResources(new Resource(myQueueArn))
- .WithConditions(ConditionFactory.NewSourceArnCondition(myTopicArn)));
-
-
- Policy policy = new Policy("MyTopicPolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SNSActionIdentifiers.Subscribe)
- .WithResources(new Resource(myTopicArn))
- .WithConditions(ConditionFactory.NewEndpointCondition("*@my-company.com")));
-
-
- JsonUnmarshallerContext context = new JsonUnmarshallerContext(jsonString);
- while (context.Read())
- {
- if (context.IsKey)
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- }
- }
-
-
- UnmarshallerContext context = new UnmarshallerContext(...);
- while (context.Read())
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- if (context.TestExpression("path/to/@attribute"))
- myObject.MyComplexTypeMember = MyComplexTypeUnmarshaller.GetInstance().Unmarshall(context);
- }
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2">
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- <s3 useSignatureVersion4="true" />
- <proxy host="localhost" port="8888" username="1" password="1" />
-
- <dynamoDB>
- <dynamoDBContext tableNamePrefix="Prod-">
-
- <tableAliases>
- <alias fromTable="FakeTable" toTable="People" />
- <alias fromTable="Persons" toTable="People" />
- </tableAliases>
-
- <mappings>
- <map type="Sample.Tests.Author, SampleDLL" targetTable="People" />
- <map type="Sample.Tests.Editor, SampleDLL" targetTable="People">
- <property name="FullName" attribute="Name" />
- <property name="EmployeeId" attribute="Id" />
- <property name="ComplexData" converter="Sample.Tests.ComplexDataConverter, SampleDLL" />
- <property name="Version" version="true" />
- <property name="Password" ignore="true" />
- </map>
- </mappings>
-
- </dynamoDBContext>
- </dynamoDB>
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="development"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfilesLocation" value="c:\config"/>
- </appSettings>
- </configuration>
-
-
- <appSettings>
- <add key="AWSLogging" value="log4net"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSResponseLogging" value="OnError"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSLogMetrics" value="true"/>
- </appSettings>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws endpointDefinition="c:\config\endpoints.json" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws useSdkCache="true" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <proxy host="localhost" port="8888" username="1" password="1" bypassList="addressexpr1;addressexpr2;..." bypassOnLocal="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- Policy policy = new Policy("MyQueuePolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SQSActionIdentifiers.SendMessage)
- .WithResources(new Resource(myQueueArn))
- .WithConditions(ConditionFactory.NewSourceArnCondition(myTopicArn)));
-
-
- Policy policy = new Policy("MyTopicPolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SNSActionIdentifiers.Subscribe)
- .WithResources(new Resource(myTopicArn))
- .WithConditions(ConditionFactory.NewEndpointCondition("*@my-company.com")));
-
-
- JsonUnmarshallerContext context = new JsonUnmarshallerContext(jsonString);
- while (context.Read())
- {
- if (context.IsKey)
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- }
- }
-
-
- UnmarshallerContext context = new UnmarshallerContext(...);
- while (context.Read())
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- if (context.TestExpression("path/to/@attribute"))
- myObject.MyComplexTypeMember = MyComplexTypeUnmarshaller.GetInstance().Unmarshall(context);
- }
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2">
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- <s3 useSignatureVersion4="true" />
- <proxy host="localhost" port="8888" username="1" password="1" />
-
- <dynamoDB>
- <dynamoDBContext tableNamePrefix="Prod-">
-
- <tableAliases>
- <alias fromTable="FakeTable" toTable="People" />
- <alias fromTable="Persons" toTable="People" />
- </tableAliases>
-
- <mappings>
- <map type="Sample.Tests.Author, SampleDLL" targetTable="People" />
- <map type="Sample.Tests.Editor, SampleDLL" targetTable="People">
- <property name="FullName" attribute="Name" />
- <property name="EmployeeId" attribute="Id" />
- <property name="ComplexData" converter="Sample.Tests.ComplexDataConverter, SampleDLL" />
- <property name="Version" version="true" />
- <property name="Password" ignore="true" />
- </map>
- </mappings>
-
- </dynamoDBContext>
- </dynamoDB>
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="development"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfilesLocation" value="c:\config"/>
- </appSettings>
- </configuration>
-
-
- <appSettings>
- <add key="AWSLogging" value="log4net"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSResponseLogging" value="OnError"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSLogMetrics" value="true"/>
- </appSettings>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws endpointDefinition="c:\config\endpoints.json" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws useSdkCache="true" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <proxy host="localhost" port="8888" username="1" password="1" bypassList="addressexpr1;addressexpr2;..." bypassOnLocal="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- Policy policy = new Policy("MyQueuePolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SQSActionIdentifiers.SendMessage)
- .WithResources(new Resource(myQueueArn))
- .WithConditions(ConditionFactory.NewSourceArnCondition(myTopicArn)));
-
-
- Policy policy = new Policy("MyTopicPolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SNSActionIdentifiers.Subscribe)
- .WithResources(new Resource(myTopicArn))
- .WithConditions(ConditionFactory.NewEndpointCondition("*@my-company.com")));
-
-
- JsonUnmarshallerContext context = new JsonUnmarshallerContext(jsonString);
- while (context.Read())
- {
- if (context.IsKey)
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- }
- }
-
-
- UnmarshallerContext context = new UnmarshallerContext(...);
- while (context.Read())
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- if (context.TestExpression("path/to/@attribute"))
- myObject.MyComplexTypeMember = MyComplexTypeUnmarshaller.GetInstance().Unmarshall(context);
- }
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2">
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- <s3 useSignatureVersion4="true" />
- <proxy host="localhost" port="8888" username="1" password="1" />
-
- <dynamoDB>
- <dynamoDBContext tableNamePrefix="Prod-">
-
- <tableAliases>
- <alias fromTable="FakeTable" toTable="People" />
- <alias fromTable="Persons" toTable="People" />
- </tableAliases>
-
- <mappings>
- <map type="Sample.Tests.Author, SampleDLL" targetTable="People" />
- <map type="Sample.Tests.Editor, SampleDLL" targetTable="People">
- <property name="FullName" attribute="Name" />
- <property name="EmployeeId" attribute="Id" />
- <property name="ComplexData" converter="Sample.Tests.ComplexDataConverter, SampleDLL" />
- <property name="Version" version="true" />
- <property name="Password" ignore="true" />
- </map>
- </mappings>
-
- </dynamoDBContext>
- </dynamoDB>
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="development"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfilesLocation" value="c:\config"/>
- </appSettings>
- </configuration>
-
-
- <appSettings>
- <add key="AWSLogging" value="log4net"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSResponseLogging" value="OnError"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSLogMetrics" value="true"/>
- </appSettings>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws endpointDefinition="c:\config\endpoints.json" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws useSdkCache="true" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <proxy host="localhost" port="8888" username="1" password="1" bypassList="addressexpr1;addressexpr2;..." bypassOnLocal="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- Policy policy = new Policy("MyQueuePolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SQSActionIdentifiers.SendMessage)
- .WithResources(new Resource(myQueueArn))
- .WithConditions(ConditionFactory.NewSourceArnCondition(myTopicArn)));
-
-
- Policy policy = new Policy("MyTopicPolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SNSActionIdentifiers.Subscribe)
- .WithResources(new Resource(myTopicArn))
- .WithConditions(ConditionFactory.NewEndpointCondition("*@my-company.com")));
-
-
- JsonUnmarshallerContext context = new JsonUnmarshallerContext(jsonString);
- while (context.Read())
- {
- if (context.IsKey)
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- }
- }
-
-
- UnmarshallerContext context = new UnmarshallerContext(...);
- while (context.Read())
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- if (context.TestExpression("path/to/@attribute"))
- myObject.MyComplexTypeMember = MyComplexTypeUnmarshaller.GetInstance().Unmarshall(context);
- }
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2">
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- <s3 useSignatureVersion4="true" />
- <proxy host="localhost" port="8888" username="1" password="1" />
-
- <dynamoDB>
- <dynamoDBContext tableNamePrefix="Prod-">
-
- <tableAliases>
- <alias fromTable="FakeTable" toTable="People" />
- <alias fromTable="Persons" toTable="People" />
- </tableAliases>
-
- <mappings>
- <map type="Sample.Tests.Author, SampleDLL" targetTable="People" />
- <map type="Sample.Tests.Editor, SampleDLL" targetTable="People">
- <property name="FullName" attribute="Name" />
- <property name="EmployeeId" attribute="Id" />
- <property name="ComplexData" converter="Sample.Tests.ComplexDataConverter, SampleDLL" />
- <property name="Version" version="true" />
- <property name="Password" ignore="true" />
- </map>
- </mappings>
-
- </dynamoDBContext>
- </dynamoDB>
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="development"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfilesLocation" value="c:\config"/>
- </appSettings>
- </configuration>
-
-
- <appSettings>
- <add key="AWSLogging" value="log4net"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSResponseLogging" value="OnError"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSLogMetrics" value="true"/>
- </appSettings>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws endpointDefinition="c:\config\endpoints.json" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws useSdkCache="true" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <proxy host="localhost" port="8888" username="1" password="1" bypassList="addressexpr1;addressexpr2;..." bypassOnLocal="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- Policy policy = new Policy("MyQueuePolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SQSActionIdentifiers.SendMessage)
- .WithResources(new Resource(myQueueArn))
- .WithConditions(ConditionFactory.NewSourceArnCondition(myTopicArn)));
-
-
- Policy policy = new Policy("MyTopicPolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SNSActionIdentifiers.Subscribe)
- .WithResources(new Resource(myTopicArn))
- .WithConditions(ConditionFactory.NewEndpointCondition("*@my-company.com")));
-
-
- JsonUnmarshallerContext context = new JsonUnmarshallerContext(jsonString);
- while (context.Read())
- {
- if (context.IsKey)
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- }
- }
-
-
- UnmarshallerContext context = new UnmarshallerContext(...);
- while (context.Read())
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- if (context.TestExpression("path/to/@attribute"))
- myObject.MyComplexTypeMember = MyComplexTypeUnmarshaller.GetInstance().Unmarshall(context);
- }
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- Policy policy = new Policy("MyQueuePolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SQSActionIdentifiers.SendMessage)
- .WithResources(new Resource(myQueueArn))
- .WithConditions(ConditionFactory.NewSourceArnCondition(myTopicArn)));
-
-
- Policy policy = new Policy("MyTopicPolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SNSActionIdentifiers.Subscribe)
- .WithResources(new Resource(myTopicArn))
- .WithConditions(ConditionFactory.NewEndpointCondition("*@my-company.com")));
-
-
- JsonUnmarshallerContext context = new JsonUnmarshallerContext(jsonString);
- while (context.Read())
- {
- if (context.IsKey)
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- }
- }
-
-
- UnmarshallerContext context = new UnmarshallerContext(...);
- while (context.Read())
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- if (context.TestExpression("path/to/@attribute"))
- myObject.MyComplexTypeMember = MyComplexTypeUnmarshaller.GetInstance().Unmarshall(context);
- }
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
- 3600
seconds.
- DurationSeconds
parameter is separate from the duration of a console
- session that you might request using the returned credentials. The request to the
- federation endpoint for a console sign-in token takes a SessionDuration
- parameter that specifies the maximum length of the console session. For more information,
- see Creating
- a URL that Enables Federated Users to Access the AWS Management Console in the
- IAM User Guide.
- www.amazon.com
- and graph.facebook.com
are the only supported identity providers for
- OAuth 2.0 access tokens. Do not include URL schemes and port numbers.
- PackedPolicySize
- response element indicates by percentage how close the policy is to the upper size
- limit.
- PackedPolicySize
- response element indicates by percentage how close the policy is to the upper size
- limit.
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="development"/>
- </appSettings>
- </configuration>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2">
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- <s3 useSignatureVersion4="true" />
- <proxy host="localhost" port="8888" username="1" password="1" />
-
- <dynamoDB>
- <dynamoDBContext tableNamePrefix="Prod-">
-
- <tableAliases>
- <alias fromTable="FakeTable" toTable="People" />
- <alias fromTable="Persons" toTable="People" />
- </tableAliases>
-
- <mappings>
- <map type="Sample.Tests.Author, SampleDLL" targetTable="People" />
- <map type="Sample.Tests.Editor, SampleDLL" targetTable="People">
- <property name="FullName" attribute="Name" />
- <property name="EmployeeId" attribute="Id" />
- <property name="ComplexData" converter="Sample.Tests.ComplexDataConverter, SampleDLL" />
- <property name="Version" version="true" />
- <property name="Password" ignore="true" />
- </map>
- </mappings>
-
- </dynamoDBContext>
- </dynamoDB>
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="development"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfilesLocation" value="c:\config"/>
- </appSettings>
- </configuration>
-
-
- <appSettings>
- <add key="AWSLogging" value="log4net"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSResponseLogging" value="OnError"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSLogMetrics" value="true"/>
- </appSettings>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws endpointDefinition="c:\config\endpoints.json" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws useSdkCache="true" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <proxy host="localhost" port="8888" username="1" password="1" bypassList="addressexpr1;addressexpr2;..." bypassOnLocal="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws applicationName="" />
-
-
- Policy policy = new Policy("MyQueuePolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SQSActionIdentifiers.SendMessage)
- .WithResources(new Resource(myQueueArn))
- .WithConditions(ConditionFactory.NewSourceArnCondition(myTopicArn)));
-
-
- Policy policy = new Policy("MyTopicPolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SNSActionIdentifiers.Subscribe)
- .WithResources(new Resource(myTopicArn))
- .WithConditions(ConditionFactory.NewEndpointCondition("*@my-company.com")));
-
-
- JsonUnmarshallerContext context = new JsonUnmarshallerContext(jsonString);
- while (context.Read())
- {
- if (context.IsKey)
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- }
- }
-
-
- UnmarshallerContext context = new UnmarshallerContext(...);
- while (context.Read())
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- if (context.TestExpression("path/to/@attribute"))
- myObject.MyComplexTypeMember = MyComplexTypeUnmarshaller.GetInstance().Unmarshall(context);
- }
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
- 3600
seconds.
- DurationSeconds
parameter is separate from the duration of a console
- session that you might request using the returned credentials. The request to the
- federation endpoint for a console sign-in token takes a SessionDuration
- parameter that specifies the maximum length of the console session. For more information,
- see Creating
- a URL that Enables Federated Users to Access the AWS Management Console in the
- IAM User Guide.
- www.amazon.com
- and graph.facebook.com
are the only supported identity providers for
- OAuth 2.0 access tokens. Do not include URL schemes and port numbers.
- PackedPolicySize
- response element indicates by percentage how close the policy is to the upper size
- limit.
- PackedPolicySize
- response element indicates by percentage how close the policy is to the upper size
- limit.
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="development"/>
- </appSettings>
- </configuration>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2">
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- <s3 useSignatureVersion4="true" />
- <proxy host="localhost" port="8888" username="1" password="1" />
-
- <dynamoDB>
- <dynamoDBContext tableNamePrefix="Prod-">
-
- <tableAliases>
- <alias fromTable="FakeTable" toTable="People" />
- <alias fromTable="Persons" toTable="People" />
- </tableAliases>
-
- <mappings>
- <map type="Sample.Tests.Author, SampleDLL" targetTable="People" />
- <map type="Sample.Tests.Editor, SampleDLL" targetTable="People">
- <property name="FullName" attribute="Name" />
- <property name="EmployeeId" attribute="Id" />
- <property name="ComplexData" converter="Sample.Tests.ComplexDataConverter, SampleDLL" />
- <property name="Version" version="true" />
- <property name="Password" ignore="true" />
- </map>
- </mappings>
-
- </dynamoDBContext>
- </dynamoDB>
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="development"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfilesLocation" value="c:\config"/>
- </appSettings>
- </configuration>
-
-
- <appSettings>
- <add key="AWSLogging" value="log4net"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSResponseLogging" value="OnError"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSLogMetrics" value="true"/>
- </appSettings>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws endpointDefinition="c:\config\endpoints.json" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws useSdkCache="true" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <proxy host="localhost" port="8888" username="1" password="1" bypassList="addressexpr1;addressexpr2;..." bypassOnLocal="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws applicationName="" />
-
-
- Policy policy = new Policy("MyQueuePolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SQSActionIdentifiers.SendMessage)
- .WithResources(new Resource(myQueueArn))
- .WithConditions(ConditionFactory.NewSourceArnCondition(myTopicArn)));
-
-
- Policy policy = new Policy("MyTopicPolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SNSActionIdentifiers.Subscribe)
- .WithResources(new Resource(myTopicArn))
- .WithConditions(ConditionFactory.NewEndpointCondition("*@my-company.com")));
-
-
- JsonUnmarshallerContext context = new JsonUnmarshallerContext(jsonString);
- while (context.Read())
- {
- if (context.IsKey)
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- }
- }
-
-
- UnmarshallerContext context = new UnmarshallerContext(...);
- while (context.Read())
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- if (context.TestExpression("path/to/@attribute"))
- myObject.MyComplexTypeMember = MyComplexTypeUnmarshaller.GetInstance().Unmarshall(context);
- }
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
- 3600
seconds.
- DurationSeconds
parameter is separate from the duration of a console
- session that you might request using the returned credentials. The request to the
- federation endpoint for a console sign-in token takes a SessionDuration
- parameter that specifies the maximum length of the console session. For more information,
- see Creating
- a URL that Enables Federated Users to Access the AWS Management Console in the
- IAM User Guide.
- www.amazon.com
- and graph.facebook.com
are the only supported identity providers for
- OAuth 2.0 access tokens. Do not include URL schemes and port numbers.
- PackedPolicySize
- response element indicates by percentage how close the policy is to the upper size
- limit.
- PackedPolicySize
- response element indicates by percentage how close the policy is to the upper size
- limit.
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="development"/>
- </appSettings>
- </configuration>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2">
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- <s3 useSignatureVersion4="true" />
- <proxy host="localhost" port="8888" username="1" password="1" />
-
- <dynamoDB>
- <dynamoDBContext tableNamePrefix="Prod-">
-
- <tableAliases>
- <alias fromTable="FakeTable" toTable="People" />
- <alias fromTable="Persons" toTable="People" />
- </tableAliases>
-
- <mappings>
- <map type="Sample.Tests.Author, SampleDLL" targetTable="People" />
- <map type="Sample.Tests.Editor, SampleDLL" targetTable="People">
- <property name="FullName" attribute="Name" />
- <property name="EmployeeId" attribute="Id" />
- <property name="ComplexData" converter="Sample.Tests.ComplexDataConverter, SampleDLL" />
- <property name="Version" version="true" />
- <property name="Password" ignore="true" />
- </map>
- </mappings>
-
- </dynamoDBContext>
- </dynamoDB>
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="development"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfilesLocation" value="c:\config"/>
- </appSettings>
- </configuration>
-
-
- <appSettings>
- <add key="AWSLogging" value="log4net"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSResponseLogging" value="OnError"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSLogMetrics" value="true"/>
- </appSettings>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws endpointDefinition="c:\config\endpoints.json" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws useSdkCache="true" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <proxy host="localhost" port="8888" username="1" password="1" bypassList="addressexpr1;addressexpr2;..." bypassOnLocal="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- Policy policy = new Policy("MyQueuePolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SQSActionIdentifiers.SendMessage)
- .WithResources(new Resource(myQueueArn))
- .WithConditions(ConditionFactory.NewSourceArnCondition(myTopicArn)));
-
-
- Policy policy = new Policy("MyTopicPolicy");
- policy.WithStatements(new Statement(Statement.StatementEffect.Allow)
- .WithPrincipals(new Principal("*")).WithActionIdentifiers(SNSActionIdentifiers.Subscribe)
- .WithResources(new Resource(myTopicArn))
- .WithConditions(ConditionFactory.NewEndpointCondition("*@my-company.com")));
-
-
- JsonUnmarshallerContext context = new JsonUnmarshallerContext(jsonString);
- while (context.Read())
- {
- if (context.IsKey)
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- }
- }
-
-
- UnmarshallerContext context = new UnmarshallerContext(...);
- while (context.Read())
- {
- if (context.TestExpresion("path/to/element"))
- {
- myObject.stringMember = stringUnmarshaller.GetInstance().Unmarshall(context);
- continue;
- }
- if (context.TestExpression("path/to/@attribute"))
- myObject.MyComplexTypeMember = MyComplexTypeUnmarshaller.GetInstance().Unmarshall(context);
- }
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
- 3600
seconds.
- DurationSeconds
parameter is separate from the duration of a console
- session that you might request using the returned credentials. The request to the
- federation endpoint for a console sign-in token takes a SessionDuration
- parameter that specifies the maximum length of the console session. For more information,
- see Creating
- a URL that Enables Federated Users to Access the AWS Management Console in the
- IAM User Guide.
- www.amazon.com
- and graph.facebook.com
are the only supported identity providers for
- OAuth 2.0 access tokens. Do not include URL schemes and port numbers.
- PackedPolicySize
- response element indicates by percentage how close the policy is to the upper size
- limit.
- PackedPolicySize
- response element indicates by percentage how close the policy is to the upper size
- limit.
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSLogMetrics" value"true"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="development"/>
- </appSettings>
- </configuration>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2">
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- <s3 useSignatureVersion4="true" />
- <proxy host="localhost" port="8888" username="1" password="1" />
-
- <dynamoDB>
- <dynamoDBContext tableNamePrefix="Prod-">
-
- <tableAliases>
- <alias fromTable="FakeTable" toTable="People" />
- <alias fromTable="Persons" toTable="People" />
- </tableAliases>
-
- <mappings>
- <map type="Sample.Tests.Author, SampleDLL" targetTable="People" />
- <map type="Sample.Tests.Editor, SampleDLL" targetTable="People">
- <property name="FullName" attribute="Name" />
- <property name="EmployeeId" attribute="Id" />
- <property name="ComplexData" converter="Sample.Tests.ComplexDataConverter, SampleDLL" />
- <property name="Version" version="true" />
- <property name="Password" ignore="true" />
- </map>
- </mappings>
-
- </dynamoDBContext>
- </dynamoDB>
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="development"/>
- </appSettings>
- </configuration>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfilesLocation" value="c:\config"/>
- </appSettings>
- </configuration>
-
-
- <appSettings>
- <add key="AWSLogging" value="log4net"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSResponseLogging" value="OnError"/>
- </appSettings>
-
-
- <appSettings>
- <add key="AWSLogMetrics" value="true"/>
- </appSettings>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws endpointDefinition="c:\config\endpoints.json" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws useSdkCache="true" />
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <logging logTo="Log4Net, SystemDiagnostics" logResponses="Always" logMetrics="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <proxy host="localhost" port="8888" username="1" password="1" bypassList="addressexpr1;addressexpr2;..." bypassOnLocal="true" />
- </aws>
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws region="us-west-2" />
-
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- CompleteMultipartUpload
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeletePublicAccessBlock
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- 200 OK
if the bucket exists and you
- have permission to access it. Otherwise, the operation might return responses such
- as 404 Not Found
and 403 Forbidden
.
-
-
- s3:ListBucket
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
- Deletes the replication subresource associated with the specified - bucket.
There is usually some time lag before - replication configuration deletion is fully propagated to all the - Amazon S3 systems.
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer - Guide.
-Specifies whether Amazon S3 should replicate delete makers.
-The status of the delete marker replication.
In the current implementation, Amazon S3 does not replicate
- the delete markers. Therefore, the status must be
- Disabled
.
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the Put Object Progress Event delegate's invocation list
-
- GetObjectResponse response = s3Client.GetObject(request);
- response.WriteObjectProgressEvent += displayProgress;
-
- ReplicationTime
block.
- s3:Replication:OperationMissedThreshold
event.
- TRUE
indicates that this bucket
- is public. FALSE
indicates that the bucket is not public.
- aws:SourceIp
. For more
- information on CIDR, see http://www.rfc-editor.org/rfc/rfc4632.txt
-
- aws:SourceArn
- aws:SourceVpc
- aws:SourceVpce
- aws:SourceOwner
- aws:SourceAccount
- s3:x-amz-server-side-encryption-aws-kms-key-id
- aws:userid
outside the pattern "AROLEID:*
"
- s3:Get*
, s3:List*
, s3:AbortMultipartUpload
,
- s3:Delete*
, s3:Put*
, and s3:RestoreObject
.
- s3:Get*
is a bad action, s3:GetObject
,
- s3:GetObjectVersion
, and s3:GetObjectAcl
are all bad actions.
- TRUE
causes the following behavior:
- TRUE
causes Amazon S3 to ignore all public ACLs on this bucket
- and any objects that it contains.
- TRUE
causes Amazon S3 to reject calls to PUT Bucket policy
- if the specified bucket policy allows public access.
- TRUE
, then only the bucket owner and AWS Services
- can access this bucket if it has a public policy.
- PutPublicBlock
request body.
- Amazon resource name (ARN) of the bucket where you want Amazon - S3 to store replicas of the object identified by the rule.
- If you have multiple rules in your replication configuration, all - rules must specify the same bucket as the destination. A replication - configuration can replicate objects only to one destination bucket.
-Account ID of the destination bucket. Currently Amazon S3 verifies this - value only if Access Control Translation is enabled.
In a cross-account
- scenario, if you tell Amazon S3 to change replica ownership to the AWS account
- that owns the destination bucket by adding the AccessControlTranslation
- element, this is the account ID of the destination bucket owner.
Container for information regarding the access control for replicas.
-Use only in a cross-account scenario, where source and destination bucket - owners are not the same, when you want to change replica ownership to the AWS - account that owns the destination bucket. If you don't add this element to the - replication configuration, the replicas are owned by same AWS account that - owns the source object.
- Container that provides encryption-related information. You must
- specify this element if the SourceSelectionCriteria
is
- specified.
Metrics
block.
- ReplicationTime
block.
- The priority associated with the rule. If you specify multiple rules in a - replication configuration, then Amazon S3 applies rule priority in the event - there are conflicts (two or more rules identify the same object based on - filter specified). The rule with higher priority takes precedence. For - example,
Same object quality prefix based filter criteria - If prefixes you specified in multiple rules overlap.
Same - object qualify tag based filter criteria specified in multiple rules
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer Guide.
-Container that describes additional filters in identifying source objects that - you want to replicate. Currently, Amazon S3 supports only the filter that you can - specify for objects created with server-side encryption using an AWS KMS-managed - key. You can choose to enable or disable replication of these objects.
if - you want Amazon S3 to replicate objects created with server-side encryption using - AWS KMS-managed keys.
-Filter
must specify exactly one Prefix
,
- Tag
, or an And
child element.
- Container for specifying a tag key and value.
-The rule applies only to objects having the tag in its tagset.
-Container for specifying rule filters. These filters determine the - subset of objects to which the rule applies. The element is required - only if you specify more than one filter. For example:
You specify both a Prefix
and a Tag
- filters. Then you wrap these in an And
tag.
You specify filter based on multiple tags. Then you wrap the
- Tag
elements in an And
tag.
Metrics
block.
- SourceSelectionCriteria
in the replication
- configuration.
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- CompleteMultipartUpload
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeletePublicAccessBlock
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
-
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the WriteObjectProgressEvent delegate's invocation list
-
- TransferUtilityDownloadRequest request = new TransferUtilityDownloadRequest();
- request.WriteObjectProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, UploadProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the UploadProgressEvent delegate's invocation list
-
- TransferUtilityUploadRequest request = new TransferUtilityUploadRequest();
- request.UploadProgressEvent += displayProgress;
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <s3 useSignatureVersion4="true" />
- </aws>
-
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- CompleteMultipartUpload
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeletePublicAccessBlock
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- 200 OK
if the bucket exists and you
- have permission to access it. Otherwise, the operation might return responses such
- as 404 Not Found
and 403 Forbidden
.
-
-
- s3:ListBucket
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
- Deletes the replication subresource associated with the specified - bucket.
There is usually some time lag before - replication configuration deletion is fully propagated to all the - Amazon S3 systems.
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer - Guide.
-Specifies whether Amazon S3 should replicate delete makers.
-The status of the delete marker replication.
In the current implementation, Amazon S3 does not replicate
- the delete markers. Therefore, the status must be
- Disabled
.
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the Put Object Progress Event delegate's invocation list
-
- GetObjectResponse response = s3Client.GetObject(request);
- response.WriteObjectProgressEvent += displayProgress;
-
- ReplicationTime
block.
- s3:Replication:OperationMissedThreshold
event.
- TRUE
indicates that this bucket
- is public. FALSE
indicates that the bucket is not public.
- aws:SourceIp
. For more
- information on CIDR, see http://www.rfc-editor.org/rfc/rfc4632.txt
-
- aws:SourceArn
- aws:SourceVpc
- aws:SourceVpce
- aws:SourceOwner
- aws:SourceAccount
- s3:x-amz-server-side-encryption-aws-kms-key-id
- aws:userid
outside the pattern "AROLEID:*
"
- s3:Get*
, s3:List*
, s3:AbortMultipartUpload
,
- s3:Delete*
, s3:Put*
, and s3:RestoreObject
.
- s3:Get*
is a bad action, s3:GetObject
,
- s3:GetObjectVersion
, and s3:GetObjectAcl
are all bad actions.
- TRUE
causes the following behavior:
- TRUE
causes Amazon S3 to ignore all public ACLs on this bucket
- and any objects that it contains.
- TRUE
causes Amazon S3 to reject calls to PUT Bucket policy
- if the specified bucket policy allows public access.
- TRUE
, then only the bucket owner and AWS Services
- can access this bucket if it has a public policy.
- PutPublicBlock
request body.
- Amazon resource name (ARN) of the bucket where you want Amazon - S3 to store replicas of the object identified by the rule.
- If you have multiple rules in your replication configuration, all - rules must specify the same bucket as the destination. A replication - configuration can replicate objects only to one destination bucket.
-Account ID of the destination bucket. Currently Amazon S3 verifies this - value only if Access Control Translation is enabled.
In a cross-account
- scenario, if you tell Amazon S3 to change replica ownership to the AWS account
- that owns the destination bucket by adding the AccessControlTranslation
- element, this is the account ID of the destination bucket owner.
Container for information regarding the access control for replicas.
-Use only in a cross-account scenario, where source and destination bucket - owners are not the same, when you want to change replica ownership to the AWS - account that owns the destination bucket. If you don't add this element to the - replication configuration, the replicas are owned by same AWS account that - owns the source object.
- Container that provides encryption-related information. You must
- specify this element if the SourceSelectionCriteria
is
- specified.
Metrics
block.
- ReplicationTime
block.
- The priority associated with the rule. If you specify multiple rules in a - replication configuration, then Amazon S3 applies rule priority in the event - there are conflicts (two or more rules identify the same object based on - filter specified). The rule with higher priority takes precedence. For - example,
Same object quality prefix based filter criteria - If prefixes you specified in multiple rules overlap.
Same - object qualify tag based filter criteria specified in multiple rules
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer Guide.
-Container that describes additional filters in identifying source objects that - you want to replicate. Currently, Amazon S3 supports only the filter that you can - specify for objects created with server-side encryption using an AWS KMS-managed - key. You can choose to enable or disable replication of these objects.
if - you want Amazon S3 to replicate objects created with server-side encryption using - AWS KMS-managed keys.
-Filter
must specify exactly one Prefix
,
- Tag
, or an And
child element.
- Container for specifying a tag key and value.
-The rule applies only to objects having the tag in its tagset.
-Container for specifying rule filters. These filters determine the - subset of objects to which the rule applies. The element is required - only if you specify more than one filter. For example:
You specify both a Prefix
and a Tag
- filters. Then you wrap these in an And
tag.
You specify filter based on multiple tags. Then you wrap the
- Tag
elements in an And
tag.
Metrics
block.
- SourceSelectionCriteria
in the replication
- configuration.
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- CompleteMultipartUpload
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeletePublicAccessBlock
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
-
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the WriteObjectProgressEvent delegate's invocation list
-
- TransferUtilityDownloadRequest request = new TransferUtilityDownloadRequest();
- request.WriteObjectProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, UploadProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the UploadProgressEvent delegate's invocation list
-
- TransferUtilityUploadRequest request = new TransferUtilityUploadRequest();
- request.UploadProgressEvent += displayProgress;
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <s3 useSignatureVersion4="true" />
- </aws>
-
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- CompleteMultipartUpload
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeletePublicAccessBlock
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- 200 OK
if the bucket exists and you
- have permission to access it. Otherwise, the operation might return responses such
- as 404 Not Found
and 403 Forbidden
.
-
-
- s3:ListBucket
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
- Deletes the replication subresource associated with the specified - bucket.
There is usually some time lag before - replication configuration deletion is fully propagated to all the - Amazon S3 systems.
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer - Guide.
-Specifies whether Amazon S3 should replicate delete makers.
-The status of the delete marker replication.
In the current implementation, Amazon S3 does not replicate
- the delete markers. Therefore, the status must be
- Disabled
.
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the Put Object Progress Event delegate's invocation list
-
- GetObjectResponse response = s3Client.GetObject(request);
- response.WriteObjectProgressEvent += displayProgress;
-
- ReplicationTime
block.
- s3:Replication:OperationMissedThreshold
event.
- TRUE
indicates that this bucket
- is public. FALSE
indicates that the bucket is not public.
- aws:SourceIp
. For more
- information on CIDR, see http://www.rfc-editor.org/rfc/rfc4632.txt
-
- aws:SourceArn
- aws:SourceVpc
- aws:SourceVpce
- aws:SourceOwner
- aws:SourceAccount
- s3:x-amz-server-side-encryption-aws-kms-key-id
- aws:userid
outside the pattern "AROLEID:*
"
- s3:Get*
, s3:List*
, s3:AbortMultipartUpload
,
- s3:Delete*
, s3:Put*
, and s3:RestoreObject
.
- s3:Get*
is a bad action, s3:GetObject
,
- s3:GetObjectVersion
, and s3:GetObjectAcl
are all bad actions.
- TRUE
causes the following behavior:
- TRUE
causes Amazon S3 to ignore all public ACLs on this bucket
- and any objects that it contains.
- TRUE
causes Amazon S3 to reject calls to PUT Bucket policy
- if the specified bucket policy allows public access.
- TRUE
, then only the bucket owner and AWS Services
- can access this bucket if it has a public policy.
- PutPublicBlock
request body.
- Amazon resource name (ARN) of the bucket where you want Amazon - S3 to store replicas of the object identified by the rule.
- If you have multiple rules in your replication configuration, all - rules must specify the same bucket as the destination. A replication - configuration can replicate objects only to one destination bucket.
-Account ID of the destination bucket. Currently Amazon S3 verifies this - value only if Access Control Translation is enabled.
In a cross-account
- scenario, if you tell Amazon S3 to change replica ownership to the AWS account
- that owns the destination bucket by adding the AccessControlTranslation
- element, this is the account ID of the destination bucket owner.
Container for information regarding the access control for replicas.
-Use only in a cross-account scenario, where source and destination bucket - owners are not the same, when you want to change replica ownership to the AWS - account that owns the destination bucket. If you don't add this element to the - replication configuration, the replicas are owned by same AWS account that - owns the source object.
- Container that provides encryption-related information. You must
- specify this element if the SourceSelectionCriteria
is
- specified.
Metrics
block.
- ReplicationTime
block.
- The priority associated with the rule. If you specify multiple rules in a - replication configuration, then Amazon S3 applies rule priority in the event - there are conflicts (two or more rules identify the same object based on - filter specified). The rule with higher priority takes precedence. For - example,
Same object quality prefix based filter criteria - If prefixes you specified in multiple rules overlap.
Same - object qualify tag based filter criteria specified in multiple rules
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer Guide.
-Container that describes additional filters in identifying source objects that - you want to replicate. Currently, Amazon S3 supports only the filter that you can - specify for objects created with server-side encryption using an AWS KMS-managed - key. You can choose to enable or disable replication of these objects.
if - you want Amazon S3 to replicate objects created with server-side encryption using - AWS KMS-managed keys.
-Filter
must specify exactly one Prefix
,
- Tag
, or an And
child element.
- Container for specifying a tag key and value.
-The rule applies only to objects having the tag in its tagset.
-Container for specifying rule filters. These filters determine the - subset of objects to which the rule applies. The element is required - only if you specify more than one filter. For example:
You specify both a Prefix
and a Tag
- filters. Then you wrap these in an And
tag.
You specify filter based on multiple tags. Then you wrap the
- Tag
elements in an And
tag.
Metrics
block.
- SourceSelectionCriteria
in the replication
- configuration.
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- CompleteMultipartUpload
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeletePublicAccessBlock
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
-
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the WriteObjectProgressEvent delegate's invocation list
-
- TransferUtilityDownloadRequest request = new TransferUtilityDownloadRequest();
- request.WriteObjectProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, UploadProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the UploadProgressEvent delegate's invocation list
-
- TransferUtilityUploadRequest request = new TransferUtilityUploadRequest();
- request.UploadProgressEvent += displayProgress;
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <s3 useSignatureVersion4="true" />
- </aws>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- CompleteMultipartUpload
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeletePublicAccessBlock
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- 200 OK
if the bucket exists and you
- have permission to access it. Otherwise, the operation might return responses such
- as 404 Not Found
and 403 Forbidden
.
-
-
- s3:ListBucket
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
- Deletes the replication subresource associated with the specified - bucket.
There is usually some time lag before - replication configuration deletion is fully propagated to all the - Amazon S3 systems.
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer - Guide.
-Specifies whether Amazon S3 should replicate delete makers.
-The status of the delete marker replication.
In the current implementation, Amazon S3 does not replicate
- the delete markers. Therefore, the status must be
- Disabled
.
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the Put Object Progress Event delegate's invocation list
-
- GetObjectResponse response = s3Client.GetObject(request);
- response.WriteObjectProgressEvent += displayProgress;
-
- ReplicationTime
block.
- s3:Replication:OperationMissedThreshold
event.
- TRUE
indicates that this bucket
- is public. FALSE
indicates that the bucket is not public.
- aws:SourceIp
. For more
- information on CIDR, see http://www.rfc-editor.org/rfc/rfc4632.txt
-
- aws:SourceArn
- aws:SourceVpc
- aws:SourceVpce
- aws:SourceOwner
- aws:SourceAccount
- s3:x-amz-server-side-encryption-aws-kms-key-id
- aws:userid
outside the pattern "AROLEID:*
"
- s3:Get*
, s3:List*
, s3:AbortMultipartUpload
,
- s3:Delete*
, s3:Put*
, and s3:RestoreObject
.
- s3:Get*
is a bad action, s3:GetObject
,
- s3:GetObjectVersion
, and s3:GetObjectAcl
are all bad actions.
- TRUE
causes the following behavior:
- TRUE
causes Amazon S3 to ignore all public ACLs on this bucket
- and any objects that it contains.
- TRUE
causes Amazon S3 to reject calls to PUT Bucket policy
- if the specified bucket policy allows public access.
- TRUE
, then only the bucket owner and AWS Services
- can access this bucket if it has a public policy.
- PutPublicBlock
request body.
- Amazon resource name (ARN) of the bucket where you want Amazon - S3 to store replicas of the object identified by the rule.
- If you have multiple rules in your replication configuration, all - rules must specify the same bucket as the destination. A replication - configuration can replicate objects only to one destination bucket.
-Account ID of the destination bucket. Currently Amazon S3 verifies this - value only if Access Control Translation is enabled.
In a cross-account
- scenario, if you tell Amazon S3 to change replica ownership to the AWS account
- that owns the destination bucket by adding the AccessControlTranslation
- element, this is the account ID of the destination bucket owner.
Container for information regarding the access control for replicas.
-Use only in a cross-account scenario, where source and destination bucket - owners are not the same, when you want to change replica ownership to the AWS - account that owns the destination bucket. If you don't add this element to the - replication configuration, the replicas are owned by same AWS account that - owns the source object.
- Container that provides encryption-related information. You must
- specify this element if the SourceSelectionCriteria
is
- specified.
Metrics
block.
- ReplicationTime
block.
- The priority associated with the rule. If you specify multiple rules in a - replication configuration, then Amazon S3 applies rule priority in the event - there are conflicts (two or more rules identify the same object based on - filter specified). The rule with higher priority takes precedence. For - example,
Same object quality prefix based filter criteria - If prefixes you specified in multiple rules overlap.
Same - object qualify tag based filter criteria specified in multiple rules
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer Guide.
-Container that describes additional filters in identifying source objects that - you want to replicate. Currently, Amazon S3 supports only the filter that you can - specify for objects created with server-side encryption using an AWS KMS-managed - key. You can choose to enable or disable replication of these objects.
if - you want Amazon S3 to replicate objects created with server-side encryption using - AWS KMS-managed keys.
-Filter
must specify exactly one Prefix
,
- Tag
, or an And
child element.
- Container for specifying a tag key and value.
-The rule applies only to objects having the tag in its tagset.
-Container for specifying rule filters. These filters determine the - subset of objects to which the rule applies. The element is required - only if you specify more than one filter. For example:
You specify both a Prefix
and a Tag
- filters. Then you wrap these in an And
tag.
You specify filter based on multiple tags. Then you wrap the
- Tag
elements in an And
tag.
Metrics
block.
- SourceSelectionCriteria
in the replication
- configuration.
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- CompleteMultipartUpload
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeletePublicAccessBlock
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
-
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the WriteObjectProgressEvent delegate's invocation list
-
- TransferUtilityDownloadRequest request = new TransferUtilityDownloadRequest();
- request.WriteObjectProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, UploadProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the UploadProgressEvent delegate's invocation list
-
- TransferUtilityUploadRequest request = new TransferUtilityUploadRequest();
- request.UploadProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, DownloadDirectoryProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the DownloadedDirectoryProgressEvent delegate's invocation list
-
- TransferUtilityDownloadDirectoryRequest request = new TransferUtilityDownloadDirectoryRequest();
- request.DownloadedDirectoryProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, UploadDirectoryProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the UploadDirectoryProgressEvent delegate's invocation list
-
- TransferUtilityUploadDirectoryRequest request = new TransferUtilityUploadDirectoryRequest();
- request.UploadDirectoryProgressEvent += displayProgress;
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <s3 useSignatureVersion4="true" />
- </aws>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- CompleteMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- CompleteMultipartUpload
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeletePublicAccessBlock
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeletePublicAccessBlock
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- 200 OK
if the bucket exists and you
- have permission to access it. Otherwise, the operation might return responses such
- as 404 Not Found
and 403 Forbidden
.
-
-
- s3:ListBucket
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- 200 OK
if the bucket exists and you
- have permission to access it. Otherwise, the operation might return responses such
- as 404 Not Found
and 403 Forbidden
.
-
-
- s3:ListBucket
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
- Deletes the replication subresource associated with the specified - bucket.
There is usually some time lag before - replication configuration deletion is fully propagated to all the - Amazon S3 systems.
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer - Guide.
-Specifies whether Amazon S3 should replicate delete makers.
-The status of the delete marker replication.
In the current implementation, Amazon S3 does not replicate
- the delete markers. Therefore, the status must be
- Disabled
.
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the Put Object Progress Event delegate's invocation list
-
- GetObjectResponse response = s3Client.GetObject(request);
- response.WriteObjectProgressEvent += displayProgress;
-
- ReplicationTime
block.
- s3:Replication:OperationMissedThreshold
event.
- TRUE
indicates that this bucket
- is public. FALSE
indicates that the bucket is not public.
- aws:SourceIp
. For more
- information on CIDR, see http://www.rfc-editor.org/rfc/rfc4632.txt
-
- aws:SourceArn
- aws:SourceVpc
- aws:SourceVpce
- aws:SourceOwner
- aws:SourceAccount
- s3:x-amz-server-side-encryption-aws-kms-key-id
- aws:userid
outside the pattern "AROLEID:*
"
- s3:Get*
, s3:List*
, s3:AbortMultipartUpload
,
- s3:Delete*
, s3:Put*
, and s3:RestoreObject
.
- s3:Get*
is a bad action, s3:GetObject
,
- s3:GetObjectVersion
, and s3:GetObjectAcl
are all bad actions.
- TRUE
causes the following behavior:
- TRUE
causes Amazon S3 to ignore all public ACLs on this bucket
- and any objects that it contains.
- TRUE
causes Amazon S3 to reject calls to PUT Bucket policy
- if the specified bucket policy allows public access.
- TRUE
, then only the bucket owner and AWS Services
- can access this bucket if it has a public policy.
- PutPublicBlock
request body.
- Amazon resource name (ARN) of the bucket where you want Amazon - S3 to store replicas of the object identified by the rule.
- If you have multiple rules in your replication configuration, all - rules must specify the same bucket as the destination. A replication - configuration can replicate objects only to one destination bucket.
-Account ID of the destination bucket. Currently Amazon S3 verifies this - value only if Access Control Translation is enabled.
In a cross-account
- scenario, if you tell Amazon S3 to change replica ownership to the AWS account
- that owns the destination bucket by adding the AccessControlTranslation
- element, this is the account ID of the destination bucket owner.
Container for information regarding the access control for replicas.
-Use only in a cross-account scenario, where source and destination bucket - owners are not the same, when you want to change replica ownership to the AWS - account that owns the destination bucket. If you don't add this element to the - replication configuration, the replicas are owned by same AWS account that - owns the source object.
- Container that provides encryption-related information. You must
- specify this element if the SourceSelectionCriteria
is
- specified.
Metrics
block.
- ReplicationTime
block.
- The priority associated with the rule. If you specify multiple rules in a - replication configuration, then Amazon S3 applies rule priority in the event - there are conflicts (two or more rules identify the same object based on - filter specified). The rule with higher priority takes precedence. For - example,
Same object quality prefix based filter criteria - If prefixes you specified in multiple rules overlap.
Same - object qualify tag based filter criteria specified in multiple rules
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer Guide.
-Container that describes additional filters in identifying source objects that - you want to replicate. Currently, Amazon S3 supports only the filter that you can - specify for objects created with server-side encryption using an AWS KMS-managed - key. You can choose to enable or disable replication of these objects.
if - you want Amazon S3 to replicate objects created with server-side encryption using - AWS KMS-managed keys.
-Filter
must specify exactly one Prefix
,
- Tag
, or an And
child element.
- Container for specifying a tag key and value.
-The rule applies only to objects having the tag in its tagset.
-Container for specifying rule filters. These filters determine the - subset of objects to which the rule applies. The element is required - only if you specify more than one filter. For example:
You specify both a Prefix
and a Tag
- filters. Then you wrap these in an And
tag.
You specify filter based on multiple tags. Then you wrap the
- Tag
elements in an And
tag.
Metrics
block.
- SourceSelectionCriteria
in the replication
- configuration.
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- CompleteMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- CompleteMultipartUpload
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeletePublicAccessBlock
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeletePublicAccessBlock
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
-
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the WriteObjectProgressEvent delegate's invocation list
-
- TransferUtilityDownloadRequest request = new TransferUtilityDownloadRequest();
- request.WriteObjectProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, UploadProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the UploadProgressEvent delegate's invocation list
-
- TransferUtilityUploadRequest request = new TransferUtilityUploadRequest();
- request.UploadProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, DownloadDirectoryProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the DownloadedDirectoryProgressEvent delegate's invocation list
-
- TransferUtilityDownloadDirectoryRequest request = new TransferUtilityDownloadDirectoryRequest();
- request.DownloadedDirectoryProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, UploadDirectoryProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the UploadDirectoryProgressEvent delegate's invocation list
-
- TransferUtilityUploadDirectoryRequest request = new TransferUtilityUploadDirectoryRequest();
- request.UploadDirectoryProgressEvent += displayProgress;
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <s3 useSignatureVersion4="true" />
- </aws>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- CompleteMultipartUpload
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeletePublicAccessBlock
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- 200 OK
if the bucket exists and you
- have permission to access it. Otherwise, the operation might return responses such
- as 404 Not Found
and 403 Forbidden
.
-
-
- s3:ListBucket
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
- Deletes the replication subresource associated with the specified - bucket.
There is usually some time lag before - replication configuration deletion is fully propagated to all the - Amazon S3 systems.
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer - Guide.
-Specifies whether Amazon S3 should replicate delete makers.
-The status of the delete marker replication.
In the current implementation, Amazon S3 does not replicate
- the delete markers. Therefore, the status must be
- Disabled
.
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the Put Object Progress Event delegate's invocation list
-
- GetObjectResponse response = s3Client.GetObject(request);
- response.WriteObjectProgressEvent += displayProgress;
-
- ReplicationTime
block.
- s3:Replication:OperationMissedThreshold
event.
- TRUE
indicates that this bucket
- is public. FALSE
indicates that the bucket is not public.
- aws:SourceIp
. For more
- information on CIDR, see http://www.rfc-editor.org/rfc/rfc4632.txt
-
- aws:SourceArn
- aws:SourceVpc
- aws:SourceVpce
- aws:SourceOwner
- aws:SourceAccount
- s3:x-amz-server-side-encryption-aws-kms-key-id
- aws:userid
outside the pattern "AROLEID:*
"
- s3:Get*
, s3:List*
, s3:AbortMultipartUpload
,
- s3:Delete*
, s3:Put*
, and s3:RestoreObject
.
- s3:Get*
is a bad action, s3:GetObject
,
- s3:GetObjectVersion
, and s3:GetObjectAcl
are all bad actions.
- TRUE
causes the following behavior:
- TRUE
causes Amazon S3 to ignore all public ACLs on this bucket
- and any objects that it contains.
- TRUE
causes Amazon S3 to reject calls to PUT Bucket policy
- if the specified bucket policy allows public access.
- TRUE
, then only the bucket owner and AWS Services
- can access this bucket if it has a public policy.
- PutPublicBlock
request body.
- Amazon resource name (ARN) of the bucket where you want Amazon - S3 to store replicas of the object identified by the rule.
- If you have multiple rules in your replication configuration, all - rules must specify the same bucket as the destination. A replication - configuration can replicate objects only to one destination bucket.
-Account ID of the destination bucket. Currently Amazon S3 verifies this - value only if Access Control Translation is enabled.
In a cross-account
- scenario, if you tell Amazon S3 to change replica ownership to the AWS account
- that owns the destination bucket by adding the AccessControlTranslation
- element, this is the account ID of the destination bucket owner.
Container for information regarding the access control for replicas.
-Use only in a cross-account scenario, where source and destination bucket - owners are not the same, when you want to change replica ownership to the AWS - account that owns the destination bucket. If you don't add this element to the - replication configuration, the replicas are owned by same AWS account that - owns the source object.
- Container that provides encryption-related information. You must
- specify this element if the SourceSelectionCriteria
is
- specified.
Metrics
block.
- ReplicationTime
block.
- The priority associated with the rule. If you specify multiple rules in a - replication configuration, then Amazon S3 applies rule priority in the event - there are conflicts (two or more rules identify the same object based on - filter specified). The rule with higher priority takes precedence. For - example,
Same object quality prefix based filter criteria - If prefixes you specified in multiple rules overlap.
Same - object qualify tag based filter criteria specified in multiple rules
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer Guide.
-Container that describes additional filters in identifying source objects that - you want to replicate. Currently, Amazon S3 supports only the filter that you can - specify for objects created with server-side encryption using an AWS KMS-managed - key. You can choose to enable or disable replication of these objects.
if - you want Amazon S3 to replicate objects created with server-side encryption using - AWS KMS-managed keys.
-Filter
must specify exactly one Prefix
,
- Tag
, or an And
child element.
- Container for specifying a tag key and value.
-The rule applies only to objects having the tag in its tagset.
-Container for specifying rule filters. These filters determine the - subset of objects to which the rule applies. The element is required - only if you specify more than one filter. For example:
You specify both a Prefix
and a Tag
- filters. Then you wrap these in an And
tag.
You specify filter based on multiple tags. Then you wrap the
- Tag
elements in an And
tag.
Metrics
block.
- SourceSelectionCriteria
in the replication
- configuration.
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- CompleteMultipartUpload
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeletePublicAccessBlock
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
-
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the WriteObjectProgressEvent delegate's invocation list
-
- TransferUtilityDownloadRequest request = new TransferUtilityDownloadRequest();
- request.WriteObjectProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, UploadProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the UploadProgressEvent delegate's invocation list
-
- TransferUtilityUploadRequest request = new TransferUtilityUploadRequest();
- request.UploadProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, DownloadDirectoryProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the DownloadedDirectoryProgressEvent delegate's invocation list
-
- TransferUtilityDownloadDirectoryRequest request = new TransferUtilityDownloadDirectoryRequest();
- request.DownloadedDirectoryProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, UploadDirectoryProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the UploadDirectoryProgressEvent delegate's invocation list
-
- TransferUtilityUploadDirectoryRequest request = new TransferUtilityUploadDirectoryRequest();
- request.UploadDirectoryProgressEvent += displayProgress;
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <s3 useSignatureVersion4="true" />
- </aws>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- CompleteMultipartUpload
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeletePublicAccessBlock
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- 200 OK
if the bucket exists and you
- have permission to access it. Otherwise, the operation might return responses such
- as 404 Not Found
and 403 Forbidden
.
-
-
- s3:ListBucket
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
- Deletes the replication subresource associated with the specified - bucket.
There is usually some time lag before - replication configuration deletion is fully propagated to all the - Amazon S3 systems.
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer - Guide.
-Specifies whether Amazon S3 should replicate delete makers.
-The status of the delete marker replication.
In the current implementation, Amazon S3 does not replicate
- the delete markers. Therefore, the status must be
- Disabled
.
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the Put Object Progress Event delegate's invocation list
-
- GetObjectResponse response = s3Client.GetObject(request);
- response.WriteObjectProgressEvent += displayProgress;
-
- ReplicationTime
block.
- s3:Replication:OperationMissedThreshold
event.
- TRUE
indicates that this bucket
- is public. FALSE
indicates that the bucket is not public.
- aws:SourceIp
. For more
- information on CIDR, see http://www.rfc-editor.org/rfc/rfc4632.txt
-
- aws:SourceArn
- aws:SourceVpc
- aws:SourceVpce
- aws:SourceOwner
- aws:SourceAccount
- s3:x-amz-server-side-encryption-aws-kms-key-id
- aws:userid
outside the pattern "AROLEID:*
"
- s3:Get*
, s3:List*
, s3:AbortMultipartUpload
,
- s3:Delete*
, s3:Put*
, and s3:RestoreObject
.
- s3:Get*
is a bad action, s3:GetObject
,
- s3:GetObjectVersion
, and s3:GetObjectAcl
are all bad actions.
- TRUE
causes the following behavior:
- TRUE
causes Amazon S3 to ignore all public ACLs on this bucket
- and any objects that it contains.
- TRUE
causes Amazon S3 to reject calls to PUT Bucket policy
- if the specified bucket policy allows public access.
- TRUE
, then only the bucket owner and AWS Services
- can access this bucket if it has a public policy.
- PutPublicBlock
request body.
- Amazon resource name (ARN) of the bucket where you want Amazon - S3 to store replicas of the object identified by the rule.
- If you have multiple rules in your replication configuration, all - rules must specify the same bucket as the destination. A replication - configuration can replicate objects only to one destination bucket.
-Account ID of the destination bucket. Currently Amazon S3 verifies this - value only if Access Control Translation is enabled.
In a cross-account
- scenario, if you tell Amazon S3 to change replica ownership to the AWS account
- that owns the destination bucket by adding the AccessControlTranslation
- element, this is the account ID of the destination bucket owner.
Container for information regarding the access control for replicas.
-Use only in a cross-account scenario, where source and destination bucket - owners are not the same, when you want to change replica ownership to the AWS - account that owns the destination bucket. If you don't add this element to the - replication configuration, the replicas are owned by same AWS account that - owns the source object.
- Container that provides encryption-related information. You must
- specify this element if the SourceSelectionCriteria
is
- specified.
Metrics
block.
- ReplicationTime
block.
- The priority associated with the rule. If you specify multiple rules in a - replication configuration, then Amazon S3 applies rule priority in the event - there are conflicts (two or more rules identify the same object based on - filter specified). The rule with higher priority takes precedence. For - example,
Same object quality prefix based filter criteria - If prefixes you specified in multiple rules overlap.
Same - object qualify tag based filter criteria specified in multiple rules
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer Guide.
-Container that describes additional filters in identifying source objects that - you want to replicate. Currently, Amazon S3 supports only the filter that you can - specify for objects created with server-side encryption using an AWS KMS-managed - key. You can choose to enable or disable replication of these objects.
if - you want Amazon S3 to replicate objects created with server-side encryption using - AWS KMS-managed keys.
-Filter
must specify exactly one Prefix
,
- Tag
, or an And
child element.
- Container for specifying a tag key and value.
-The rule applies only to objects having the tag in its tagset.
-Container for specifying rule filters. These filters determine the - subset of objects to which the rule applies. The element is required - only if you specify more than one filter. For example:
You specify both a Prefix
and a Tag
- filters. Then you wrap these in an And
tag.
You specify filter based on multiple tags. Then you wrap the
- Tag
elements in an And
tag.
Metrics
block.
- SourceSelectionCriteria
in the replication
- configuration.
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- CompleteMultipartUpload
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeletePublicAccessBlock
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
-
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the WriteObjectProgressEvent delegate's invocation list
-
- TransferUtilityDownloadRequest request = new TransferUtilityDownloadRequest();
- request.WriteObjectProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, UploadProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the UploadProgressEvent delegate's invocation list
-
- TransferUtilityUploadRequest request = new TransferUtilityUploadRequest();
- request.UploadProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, DownloadDirectoryProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the DownloadedDirectoryProgressEvent delegate's invocation list
-
- TransferUtilityDownloadDirectoryRequest request = new TransferUtilityDownloadDirectoryRequest();
- request.DownloadedDirectoryProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, UploadDirectoryProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the UploadDirectoryProgressEvent delegate's invocation list
-
- TransferUtilityUploadDirectoryRequest request = new TransferUtilityUploadDirectoryRequest();
- request.UploadDirectoryProgressEvent += displayProgress;
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <s3 useSignatureVersion4="true" />
- </aws>
-
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- CompleteMultipartUpload
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeletePublicAccessBlock
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- 200 OK
if the bucket exists and you
- have permission to access it. Otherwise, the operation might return responses such
- as 404 Not Found
and 403 Forbidden
.
-
-
- s3:ListBucket
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
- Deletes the replication subresource associated with the specified - bucket.
There is usually some time lag before - replication configuration deletion is fully propagated to all the - Amazon S3 systems.
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer - Guide.
-Specifies whether Amazon S3 should replicate delete makers.
-The status of the delete marker replication.
In the current implementation, Amazon S3 does not replicate
- the delete markers. Therefore, the status must be
- Disabled
.
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the Put Object Progress Event delegate's invocation list
-
- GetObjectResponse response = s3Client.GetObject(request);
- response.WriteObjectProgressEvent += displayProgress;
-
- ReplicationTime
block.
- s3:Replication:OperationMissedThreshold
event.
- TRUE
indicates that this bucket
- is public. FALSE
indicates that the bucket is not public.
- aws:SourceIp
. For more
- information on CIDR, see http://www.rfc-editor.org/rfc/rfc4632.txt
-
- aws:SourceArn
- aws:SourceVpc
- aws:SourceVpce
- aws:SourceOwner
- aws:SourceAccount
- s3:x-amz-server-side-encryption-aws-kms-key-id
- aws:userid
outside the pattern "AROLEID:*
"
- s3:Get*
, s3:List*
, s3:AbortMultipartUpload
,
- s3:Delete*
, s3:Put*
, and s3:RestoreObject
.
- s3:Get*
is a bad action, s3:GetObject
,
- s3:GetObjectVersion
, and s3:GetObjectAcl
are all bad actions.
- TRUE
causes the following behavior:
- TRUE
causes Amazon S3 to ignore all public ACLs on this bucket
- and any objects that it contains.
- TRUE
causes Amazon S3 to reject calls to PUT Bucket policy
- if the specified bucket policy allows public access.
- TRUE
, then only the bucket owner and AWS Services
- can access this bucket if it has a public policy.
- PutPublicBlock
request body.
- Amazon resource name (ARN) of the bucket where you want Amazon - S3 to store replicas of the object identified by the rule.
- If you have multiple rules in your replication configuration, all - rules must specify the same bucket as the destination. A replication - configuration can replicate objects only to one destination bucket.
-Account ID of the destination bucket. Currently Amazon S3 verifies this - value only if Access Control Translation is enabled.
In a cross-account
- scenario, if you tell Amazon S3 to change replica ownership to the AWS account
- that owns the destination bucket by adding the AccessControlTranslation
- element, this is the account ID of the destination bucket owner.
Container for information regarding the access control for replicas.
-Use only in a cross-account scenario, where source and destination bucket - owners are not the same, when you want to change replica ownership to the AWS - account that owns the destination bucket. If you don't add this element to the - replication configuration, the replicas are owned by same AWS account that - owns the source object.
- Container that provides encryption-related information. You must
- specify this element if the SourceSelectionCriteria
is
- specified.
Metrics
block.
- ReplicationTime
block.
- The priority associated with the rule. If you specify multiple rules in a - replication configuration, then Amazon S3 applies rule priority in the event - there are conflicts (two or more rules identify the same object based on - filter specified). The rule with higher priority takes precedence. For - example,
Same object quality prefix based filter criteria - If prefixes you specified in multiple rules overlap.
Same - object qualify tag based filter criteria specified in multiple rules
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer Guide.
-Container that describes additional filters in identifying source objects that - you want to replicate. Currently, Amazon S3 supports only the filter that you can - specify for objects created with server-side encryption using an AWS KMS-managed - key. You can choose to enable or disable replication of these objects.
if - you want Amazon S3 to replicate objects created with server-side encryption using - AWS KMS-managed keys.
-Filter
must specify exactly one Prefix
,
- Tag
, or an And
child element.
- Container for specifying a tag key and value.
-The rule applies only to objects having the tag in its tagset.
-Container for specifying rule filters. These filters determine the - subset of objects to which the rule applies. The element is required - only if you specify more than one filter. For example:
You specify both a Prefix
and a Tag
- filters. Then you wrap these in an And
tag.
You specify filter based on multiple tags. Then you wrap the
- Tag
elements in an And
tag.
Metrics
block.
- SourceSelectionCriteria
in the replication
- configuration.
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- CompleteMultipartUpload
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeletePublicAccessBlock
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
-
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the WriteObjectProgressEvent delegate's invocation list
-
- TransferUtilityDownloadRequest request = new TransferUtilityDownloadRequest();
- request.WriteObjectProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, UploadProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the UploadProgressEvent delegate's invocation list
-
- TransferUtilityUploadRequest request = new TransferUtilityUploadRequest();
- request.UploadProgressEvent += displayProgress;
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <s3 useSignatureVersion4="true" />
- </aws>
-
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- CompleteMultipartUpload
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeletePublicAccessBlock
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- 200 OK
if the bucket exists and you
- have permission to access it. Otherwise, the operation might return responses such
- as 404 Not Found
and 403 Forbidden
.
-
-
- s3:ListBucket
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
- Deletes the replication subresource associated with the specified - bucket.
There is usually some time lag before - replication configuration deletion is fully propagated to all the - Amazon S3 systems.
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer - Guide.
-Specifies whether Amazon S3 should replicate delete makers.
-The status of the delete marker replication.
In the current implementation, Amazon S3 does not replicate
- the delete markers. Therefore, the status must be
- Disabled
.
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the Put Object Progress Event delegate's invocation list
-
- GetObjectResponse response = s3Client.GetObject(request);
- response.WriteObjectProgressEvent += displayProgress;
-
- ReplicationTime
block.
- s3:Replication:OperationMissedThreshold
event.
- TRUE
indicates that this bucket
- is public. FALSE
indicates that the bucket is not public.
- aws:SourceIp
. For more
- information on CIDR, see http://www.rfc-editor.org/rfc/rfc4632.txt
-
- aws:SourceArn
- aws:SourceVpc
- aws:SourceVpce
- aws:SourceOwner
- aws:SourceAccount
- s3:x-amz-server-side-encryption-aws-kms-key-id
- aws:userid
outside the pattern "AROLEID:*
"
- s3:Get*
, s3:List*
, s3:AbortMultipartUpload
,
- s3:Delete*
, s3:Put*
, and s3:RestoreObject
.
- s3:Get*
is a bad action, s3:GetObject
,
- s3:GetObjectVersion
, and s3:GetObjectAcl
are all bad actions.
- TRUE
causes the following behavior:
- TRUE
causes Amazon S3 to ignore all public ACLs on this bucket
- and any objects that it contains.
- TRUE
causes Amazon S3 to reject calls to PUT Bucket policy
- if the specified bucket policy allows public access.
- TRUE
, then only the bucket owner and AWS Services
- can access this bucket if it has a public policy.
- PutPublicBlock
request body.
- Amazon resource name (ARN) of the bucket where you want Amazon - S3 to store replicas of the object identified by the rule.
- If you have multiple rules in your replication configuration, all - rules must specify the same bucket as the destination. A replication - configuration can replicate objects only to one destination bucket.
-Account ID of the destination bucket. Currently Amazon S3 verifies this - value only if Access Control Translation is enabled.
In a cross-account
- scenario, if you tell Amazon S3 to change replica ownership to the AWS account
- that owns the destination bucket by adding the AccessControlTranslation
- element, this is the account ID of the destination bucket owner.
Container for information regarding the access control for replicas.
-Use only in a cross-account scenario, where source and destination bucket - owners are not the same, when you want to change replica ownership to the AWS - account that owns the destination bucket. If you don't add this element to the - replication configuration, the replicas are owned by same AWS account that - owns the source object.
- Container that provides encryption-related information. You must
- specify this element if the SourceSelectionCriteria
is
- specified.
Metrics
block.
- ReplicationTime
block.
- The priority associated with the rule. If you specify multiple rules in a - replication configuration, then Amazon S3 applies rule priority in the event - there are conflicts (two or more rules identify the same object based on - filter specified). The rule with higher priority takes precedence. For - example,
Same object quality prefix based filter criteria - If prefixes you specified in multiple rules overlap.
Same - object qualify tag based filter criteria specified in multiple rules
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer Guide.
-Container that describes additional filters in identifying source objects that - you want to replicate. Currently, Amazon S3 supports only the filter that you can - specify for objects created with server-side encryption using an AWS KMS-managed - key. You can choose to enable or disable replication of these objects.
if - you want Amazon S3 to replicate objects created with server-side encryption using - AWS KMS-managed keys.
-Filter
must specify exactly one Prefix
,
- Tag
, or an And
child element.
- Container for specifying a tag key and value.
-The rule applies only to objects having the tag in its tagset.
-Container for specifying rule filters. These filters determine the - subset of objects to which the rule applies. The element is required - only if you specify more than one filter. For example:
You specify both a Prefix
and a Tag
- filters. Then you wrap these in an And
tag.
You specify filter based on multiple tags. Then you wrap the
- Tag
elements in an And
tag.
Metrics
block.
- SourceSelectionCriteria
in the replication
- configuration.
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- CompleteMultipartUpload
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- Bad
- Request
error. For more information, see Transfer
- Acceleration.
- x-amz-metadata-directive
- header. When you grant permissions, you can use the s3:x-amz-metadata-directive
- condition key to enforce certain metadata behavior when objects are uploaded. For
- more information, see Specifying
- Conditions in a Policy in the Amazon S3 Developer Guide. For a complete
- list of Amazon S3-specific condition keys, see Actions,
- Resources, and Condition Keys for Amazon S3.
- x-amz-copy-source-if
Headers
- Etag
- matches or whether the object was modified before or after a specified date, use the
- following request parameters:
- x-amz-copy-source-if-match
- x-amz-copy-source-if-none-match
- x-amz-copy-source-if-unmodified-since
- x-amz-copy-source-if-modified-since
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK
and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and x-amz-copy-source-if-modified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns the
- 412 Precondition Failed
response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- CopyObject
operation to change the storage class of an
- object that is already stored in Amazon S3 using the StorageClass
parameter.
- For more information, see Storage
- Classes in the Amazon S3 Service Developer Guide.
- x-amz-copy-source
identifies the current version of an object
- to copy. If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted. To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeletePublicAccessBlock
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- GetBucketLifecycleConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- emailAddress
– if the value specified is the email address of an AWS
- account
- x-amz-grant-read
header grants the AWS accounts
- identified by account IDs permissions to read object data and its metadata:
- x-amz-grant-read: id="11112222333", id="444455556666"
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
-
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the WriteObjectProgressEvent delegate's invocation list
-
- TransferUtilityDownloadRequest request = new TransferUtilityDownloadRequest();
- request.WriteObjectProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, UploadProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the UploadProgressEvent delegate's invocation list
-
- TransferUtilityUploadRequest request = new TransferUtilityUploadRequest();
- request.UploadProgressEvent += displayProgress;
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <s3 useSignatureVersion4="true" />
- </aws>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- DeleteBucketMetricsConfiguration
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeleteBucketMetricsConfiguration
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- DeleteBucketMetricsConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- DeleteBucketMetricsConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- 200 OK
if the bucket exists and you
- have permission to access it. Otherwise, the operation might return responses such
- as 404 Not Found
and 403 Forbidden
.
-
-
- s3:ListBucket
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- DeleteBucketMetricsConfiguration
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeleteBucketMetricsConfiguration
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- DeleteBucketMetricsConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- DeleteBucketMetricsConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
- Deletes the replication subresource associated with the specified - bucket.
There is usually some time lag before - replication configuration deletion is fully propagated to all the - Amazon S3 systems.
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer - Guide.
-Specifies whether Amazon S3 should replicate delete makers.
-The status of the delete marker replication.
In the current implementation, Amazon S3 does not replicate
- the delete markers. Therefore, the status must be
- Disabled
.
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the Put Object Progress Event delegate's invocation list
-
- GetObjectResponse response = s3Client.GetObject(request);
- response.WriteObjectProgressEvent += displayProgress;
-
- ReplicationTime
block.
- s3:Replication:OperationMissedThreshold
event.
- TRUE
indicates that this bucket
- is public. FALSE
indicates that the bucket is not public.
- aws:SourceIp
. For more
- information on CIDR, see http://www.rfc-editor.org/rfc/rfc4632.txt
-
- aws:SourceArn
- aws:SourceVpc
- aws:SourceVpce
- aws:SourceOwner
- aws:SourceAccount
- s3:x-amz-server-side-encryption-aws-kms-key-id
- aws:userid
outside the pattern "AROLEID:*
"
- s3:Get*
, s3:List*
, s3:AbortMultipartUpload
,
- s3:Delete*
, s3:Put*
, and s3:RestoreObject
.
- s3:Get*
is a bad action, s3:GetObject
,
- s3:GetObjectVersion
, and s3:GetObjectAcl
are all bad actions.
- TRUE
causes the following behavior:
- TRUE
causes Amazon S3 to ignore all public ACLs on this bucket
- and any objects that it contains.
- TRUE
causes Amazon S3 to reject calls to PUT Bucket policy
- if the specified bucket policy allows public access.
- TRUE
, then only the bucket owner and AWS Services
- can access this bucket if it has a public policy.
- PutPublicBlock
request body.
- Amazon resource name (ARN) of the bucket where you want Amazon - S3 to store replicas of the object identified by the rule.
- If you have multiple rules in your replication configuration, all - rules must specify the same bucket as the destination. A replication - configuration can replicate objects only to one destination bucket.
-Account ID of the destination bucket. Currently Amazon S3 verifies this - value only if Access Control Translation is enabled.
In a cross-account
- scenario, if you tell Amazon S3 to change replica ownership to the AWS account
- that owns the destination bucket by adding the AccessControlTranslation
- element, this is the account ID of the destination bucket owner.
Container for information regarding the access control for replicas.
-Use only in a cross-account scenario, where source and destination bucket - owners are not the same, when you want to change replica ownership to the AWS - account that owns the destination bucket. If you don't add this element to the - replication configuration, the replicas are owned by same AWS account that - owns the source object.
- Container that provides encryption-related information. You must
- specify this element if the SourceSelectionCriteria
is
- specified.
Metrics
block.
- ReplicationTime
block.
- The priority associated with the rule. If you specify multiple rules in a - replication configuration, then Amazon S3 applies rule priority in the event - there are conflicts (two or more rules identify the same object based on - filter specified). The rule with higher priority takes precedence. For - example,
Same object quality prefix based filter criteria - If prefixes you specified in multiple rules overlap.
Same - object qualify tag based filter criteria specified in multiple rules
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer Guide.
-Container that describes additional filters in identifying source objects that - you want to replicate. Currently, Amazon S3 supports only the filter that you can - specify for objects created with server-side encryption using an AWS KMS-managed - key. You can choose to enable or disable replication of these objects.
if - you want Amazon S3 to replicate objects created with server-side encryption using - AWS KMS-managed keys.
-Filter
must specify exactly one Prefix
,
- Tag
, or an And
child element.
- Container for specifying a tag key and value.
-The rule applies only to objects having the tag in its tagset.
-Container for specifying rule filters. These filters determine the - subset of objects to which the rule applies. The element is required - only if you specify more than one filter. For example:
You specify both a Prefix
and a Tag
- filters. Then you wrap these in an And
tag.
You specify filter based on multiple tags. Then you wrap the
- Tag
elements in an And
tag.
Metrics
block.
- SourceSelectionCriteria
in the replication
- configuration.
-
- private void displayProgress(object sender, DownloadDirectoryProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the DownloadedDirectoryProgressEvent delegate's invocation list
-
- TransferUtilityDownloadDirectoryRequest request = new TransferUtilityDownloadDirectoryRequest();
- request.DownloadedDirectoryProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the WriteObjectProgressEvent delegate's invocation list
-
- TransferUtilityDownloadRequest request = new TransferUtilityDownloadRequest();
- request.WriteObjectProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, UploadDirectoryProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the UploadDirectoryProgressEvent delegate's invocation list
-
- TransferUtilityUploadDirectoryRequest request = new TransferUtilityUploadDirectoryRequest();
- request.UploadDirectoryProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, UploadProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the UploadProgressEvent delegate's invocation list
-
- TransferUtilityUploadRequest request = new TransferUtilityUploadRequest();
- request.UploadProgressEvent += displayProgress;
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <s3 useSignatureVersion4="true" />
- </aws>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- DeleteBucketMetricsConfiguration
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- DeleteBucketMetricsConfiguration
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeleteBucketMetricsConfiguration
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- DeleteBucketMetricsConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- DeleteBucketMetricsConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- DeleteBucketMetricsConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- DeleteBucketMetricsConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- 200 OK
if the bucket exists and you
- have permission to access it. Otherwise, the operation might return responses such
- as 404 Not Found
and 403 Forbidden
.
-
-
- s3:ListBucket
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- 200 OK
if the bucket exists and you
- have permission to access it. Otherwise, the operation might return responses such
- as 404 Not Found
and 403 Forbidden
.
-
-
- s3:ListBucket
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- DeleteBucketMetricsConfiguration
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- DeleteBucketMetricsConfiguration
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeleteBucketMetricsConfiguration
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- DeleteBucketMetricsConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- DeleteBucketMetricsConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- DeleteBucketMetricsConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- DeleteBucketMetricsConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
- Deletes the replication subresource associated with the specified - bucket.
There is usually some time lag before - replication configuration deletion is fully propagated to all the - Amazon S3 systems.
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer - Guide.
-Specifies whether Amazon S3 should replicate delete makers.
-The status of the delete marker replication.
In the current implementation, Amazon S3 does not replicate
- the delete markers. Therefore, the status must be
- Disabled
.
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the Put Object Progress Event delegate's invocation list
-
- GetObjectResponse response = s3Client.GetObject(request);
- response.WriteObjectProgressEvent += displayProgress;
-
- ReplicationTime
block.
- s3:Replication:OperationMissedThreshold
event.
- TRUE
indicates that this bucket
- is public. FALSE
indicates that the bucket is not public.
- aws:SourceIp
. For more
- information on CIDR, see http://www.rfc-editor.org/rfc/rfc4632.txt
-
- aws:SourceArn
- aws:SourceVpc
- aws:SourceVpce
- aws:SourceOwner
- aws:SourceAccount
- s3:x-amz-server-side-encryption-aws-kms-key-id
- aws:userid
outside the pattern "AROLEID:*
"
- s3:Get*
, s3:List*
, s3:AbortMultipartUpload
,
- s3:Delete*
, s3:Put*
, and s3:RestoreObject
.
- s3:Get*
is a bad action, s3:GetObject
,
- s3:GetObjectVersion
, and s3:GetObjectAcl
are all bad actions.
- TRUE
causes the following behavior:
- TRUE
causes Amazon S3 to ignore all public ACLs on this bucket
- and any objects that it contains.
- TRUE
causes Amazon S3 to reject calls to PUT Bucket policy
- if the specified bucket policy allows public access.
- TRUE
, then only the bucket owner and AWS Services
- can access this bucket if it has a public policy.
- PutPublicBlock
request body.
- Amazon resource name (ARN) of the bucket where you want Amazon - S3 to store replicas of the object identified by the rule.
- If you have multiple rules in your replication configuration, all - rules must specify the same bucket as the destination. A replication - configuration can replicate objects only to one destination bucket.
-Account ID of the destination bucket. Currently Amazon S3 verifies this - value only if Access Control Translation is enabled.
In a cross-account
- scenario, if you tell Amazon S3 to change replica ownership to the AWS account
- that owns the destination bucket by adding the AccessControlTranslation
- element, this is the account ID of the destination bucket owner.
Container for information regarding the access control for replicas.
-Use only in a cross-account scenario, where source and destination bucket - owners are not the same, when you want to change replica ownership to the AWS - account that owns the destination bucket. If you don't add this element to the - replication configuration, the replicas are owned by same AWS account that - owns the source object.
- Container that provides encryption-related information. You must
- specify this element if the SourceSelectionCriteria
is
- specified.
Metrics
block.
- ReplicationTime
block.
- The priority associated with the rule. If you specify multiple rules in a - replication configuration, then Amazon S3 applies rule priority in the event - there are conflicts (two or more rules identify the same object based on - filter specified). The rule with higher priority takes precedence. For - example,
Same object quality prefix based filter criteria - If prefixes you specified in multiple rules overlap.
Same - object qualify tag based filter criteria specified in multiple rules
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer Guide.
-Container that describes additional filters in identifying source objects that - you want to replicate. Currently, Amazon S3 supports only the filter that you can - specify for objects created with server-side encryption using an AWS KMS-managed - key. You can choose to enable or disable replication of these objects.
if - you want Amazon S3 to replicate objects created with server-side encryption using - AWS KMS-managed keys.
-Filter
must specify exactly one Prefix
,
- Tag
, or an And
child element.
- Container for specifying a tag key and value.
-The rule applies only to objects having the tag in its tagset.
-Container for specifying rule filters. These filters determine the - subset of objects to which the rule applies. The element is required - only if you specify more than one filter. For example:
You specify both a Prefix
and a Tag
- filters. Then you wrap these in an And
tag.
You specify filter based on multiple tags. Then you wrap the
- Tag
elements in an And
tag.
Metrics
block.
- SourceSelectionCriteria
in the replication
- configuration.
-
- private void displayProgress(object sender, DownloadDirectoryProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the DownloadedDirectoryProgressEvent delegate's invocation list
-
- TransferUtilityDownloadDirectoryRequest request = new TransferUtilityDownloadDirectoryRequest();
- request.DownloadedDirectoryProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the WriteObjectProgressEvent delegate's invocation list
-
- TransferUtilityDownloadRequest request = new TransferUtilityDownloadRequest();
- request.WriteObjectProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, UploadDirectoryProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the UploadDirectoryProgressEvent delegate's invocation list
-
- TransferUtilityUploadDirectoryRequest request = new TransferUtilityUploadDirectoryRequest();
- request.UploadDirectoryProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, UploadProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the UploadProgressEvent delegate's invocation list
-
- TransferUtilityUploadRequest request = new TransferUtilityUploadRequest();
- request.UploadProgressEvent += displayProgress;
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <s3 useSignatureVersion4="true" />
- </aws>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- DeleteBucketMetricsConfiguration
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeleteBucketMetricsConfiguration
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- DeleteBucketMetricsConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- DeleteBucketMetricsConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- 200 OK
if the bucket exists and you
- have permission to access it. Otherwise, the operation might return responses such
- as 404 Not Found
and 403 Forbidden
.
-
-
- s3:ListBucket
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- DeleteBucketMetricsConfiguration
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeleteBucketMetricsConfiguration
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- DeleteBucketMetricsConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- DeleteBucketMetricsConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
- Deletes the replication subresource associated with the specified - bucket.
There is usually some time lag before - replication configuration deletion is fully propagated to all the - Amazon S3 systems.
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer - Guide.
-Specifies whether Amazon S3 should replicate delete makers.
-The status of the delete marker replication.
In the current implementation, Amazon S3 does not replicate
- the delete markers. Therefore, the status must be
- Disabled
.
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the Put Object Progress Event delegate's invocation list
-
- GetObjectResponse response = s3Client.GetObject(request);
- response.WriteObjectProgressEvent += displayProgress;
-
- ReplicationTime
block.
- s3:Replication:OperationMissedThreshold
event.
- TRUE
indicates that this bucket
- is public. FALSE
indicates that the bucket is not public.
- aws:SourceIp
. For more
- information on CIDR, see http://www.rfc-editor.org/rfc/rfc4632.txt
-
- aws:SourceArn
- aws:SourceVpc
- aws:SourceVpce
- aws:SourceOwner
- aws:SourceAccount
- s3:x-amz-server-side-encryption-aws-kms-key-id
- aws:userid
outside the pattern "AROLEID:*
"
- s3:Get*
, s3:List*
, s3:AbortMultipartUpload
,
- s3:Delete*
, s3:Put*
, and s3:RestoreObject
.
- s3:Get*
is a bad action, s3:GetObject
,
- s3:GetObjectVersion
, and s3:GetObjectAcl
are all bad actions.
- TRUE
causes the following behavior:
- TRUE
causes Amazon S3 to ignore all public ACLs on this bucket
- and any objects that it contains.
- TRUE
causes Amazon S3 to reject calls to PUT Bucket policy
- if the specified bucket policy allows public access.
- TRUE
, then only the bucket owner and AWS Services
- can access this bucket if it has a public policy.
- PutPublicBlock
request body.
- Amazon resource name (ARN) of the bucket where you want Amazon - S3 to store replicas of the object identified by the rule.
- If you have multiple rules in your replication configuration, all - rules must specify the same bucket as the destination. A replication - configuration can replicate objects only to one destination bucket.
-Account ID of the destination bucket. Currently Amazon S3 verifies this - value only if Access Control Translation is enabled.
In a cross-account
- scenario, if you tell Amazon S3 to change replica ownership to the AWS account
- that owns the destination bucket by adding the AccessControlTranslation
- element, this is the account ID of the destination bucket owner.
Container for information regarding the access control for replicas.
-Use only in a cross-account scenario, where source and destination bucket - owners are not the same, when you want to change replica ownership to the AWS - account that owns the destination bucket. If you don't add this element to the - replication configuration, the replicas are owned by same AWS account that - owns the source object.
- Container that provides encryption-related information. You must
- specify this element if the SourceSelectionCriteria
is
- specified.
Metrics
block.
- ReplicationTime
block.
- The priority associated with the rule. If you specify multiple rules in a - replication configuration, then Amazon S3 applies rule priority in the event - there are conflicts (two or more rules identify the same object based on - filter specified). The rule with higher priority takes precedence. For - example,
Same object quality prefix based filter criteria - If prefixes you specified in multiple rules overlap.
Same - object qualify tag based filter criteria specified in multiple rules
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer Guide.
-Container that describes additional filters in identifying source objects that - you want to replicate. Currently, Amazon S3 supports only the filter that you can - specify for objects created with server-side encryption using an AWS KMS-managed - key. You can choose to enable or disable replication of these objects.
if - you want Amazon S3 to replicate objects created with server-side encryption using - AWS KMS-managed keys.
-Filter
must specify exactly one Prefix
,
- Tag
, or an And
child element.
- Container for specifying a tag key and value.
-The rule applies only to objects having the tag in its tagset.
-Container for specifying rule filters. These filters determine the - subset of objects to which the rule applies. The element is required - only if you specify more than one filter. For example:
You specify both a Prefix
and a Tag
- filters. Then you wrap these in an And
tag.
You specify filter based on multiple tags. Then you wrap the
- Tag
elements in an And
tag.
Metrics
block.
- SourceSelectionCriteria
in the replication
- configuration.
-
- private void displayProgress(object sender, DownloadDirectoryProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the DownloadedDirectoryProgressEvent delegate's invocation list
-
- TransferUtilityDownloadDirectoryRequest request = new TransferUtilityDownloadDirectoryRequest();
- request.DownloadedDirectoryProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the WriteObjectProgressEvent delegate's invocation list
-
- TransferUtilityDownloadRequest request = new TransferUtilityDownloadRequest();
- request.WriteObjectProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, UploadDirectoryProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the UploadDirectoryProgressEvent delegate's invocation list
-
- TransferUtilityUploadDirectoryRequest request = new TransferUtilityUploadDirectoryRequest();
- request.UploadDirectoryProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, UploadProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the UploadProgressEvent delegate's invocation list
-
- TransferUtilityUploadRequest request = new TransferUtilityUploadRequest();
- request.UploadProgressEvent += displayProgress;
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <s3 useSignatureVersion4="true" />
- </aws>
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- DeleteBucketMetricsConfiguration
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeleteBucketMetricsConfiguration
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- DeleteBucketMetricsConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- DeleteBucketMetricsConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- 200 OK
if the bucket exists and you
- have permission to access it. Otherwise, the operation might return responses such
- as 404 Not Found
and 403 Forbidden
.
-
-
- s3:ListBucket
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
-
- <?xml version="1.0" encoding="utf-8" ?>
- <configuration>
- <appSettings>
- <add key="AWSProfileName" value="AWS Default"/>
- </appSettings>
- </configuration>
-
-
- AbortMultipartUpload
:
- AbortMultipartUpload
:
- ETag
- value, returned after that part was uploaded.
- CompleteMultipartUpload
fails, applications should be prepared
- to retry the failed requests. For more information, see Amazon
- S3 Error Best Practices.
- GetBucketLifecycle
has the following special errors:
- EntityTooSmall
- InvalidPart
- InvalidPartOrder
- NoSuchUpload
- DeleteBucketMetricsConfiguration
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- Bad
- Request
error. For more information about transfer acceleration, see Transfer
- Acceleration.
- Etag
- matches or whether the object was modified before or after a specified date, use the
- request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
- x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
- x-amz-
prefix, including x-amz-copy-source
,
- must be signed.
- StorageClass
parameter. For more information,
- see Storage
- Classes.
- 200 OK
response. This means that
- a 200 OK
response can contain either a success or an error. Design your
- application to parse the contents of the response and handle it appropriately.
- x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
- headers are present in the request and evaluate as follows, Amazon S3 returns 200
- OK and copies the data:
- x-amz-copy-source-if-match
condition evaluates to true
- x-amz-copy-source-if-unmodified-since
condition evaluates to false
- x-amz-copy-source-if-none-match
and
- x-amz-copy-source-if-modified-since
headers are present in the request
- and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
- response code:
- x-amz-copy-source-if-none-match
condition evaluates to false
- x-amz-copy-source-if-modified-since
condition evaluates to true
- CopyObject
:
- x-amz-copy-source
identifies the current version of an object
- to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
- was deleted.) To copy a different version, use the versionId
subresource.
- x-amz-version-id
- response header in the response.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption
- x-amz-server-side-encryption-aws-kms-key-id
- x-amz-server-side-encryption-context
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
- CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
- of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
- not asymmetric CMKs. For more information, see Using
- Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CopyObject
:
- s3:PutAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketAnalyticsConfiguration
:
- s3:PutInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketInventoryConfiguration
include:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketMetricsConfiguration
:
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- DeleteBucketPolicy
- permissions on the specified bucket and belong to the bucket owner's account to use
- this operation.
-
-
- DeleteBucketPolicy
permissions, Amazon S3 returns a
- 403 Access Denied
error. If you have the correct permissions, but you're
- not using an identity that belongs to the bucket owner's account, Amazon S3 returns
- a 405 Method Not Allowed
error.
- DeleteBucketPolicy
- s3:PutReplicationConfiguration
- action. The bucket owner has these permissions by default and can grant it to others.
- For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- DeleteBucketReplication
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- s3:PutBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- DeleteBucketTagging
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- 200 OK
response upon successfully deleting a website configuration on
- the specified bucket. You will get a 200 OK
response if the website configuration
- you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
- response if the bucket specified in the request does not exist.
-
-
- S3:DeleteBucketWebsite
permission.
- By default, only the bucket owner can delete the website configuration attached to
- a bucket. However, bucket owners can grant other users permission to delete the website
- configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
- permission.
- DeleteBucketWebsite
:
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- s3:PutLifecycleConfiguration
- action. By default, the bucket owner has this permission and the bucket owner can
- grant this permission to others.
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- x-amz-delete-marker
,
- to true.
- x-amz-mfa
request header
- in the DELETE versionId
request. Requests that include x-amz-mfa
- must use HTTPS.
- s3:DeleteObject
, s3:DeleteObjectVersion
,
- and s3:PutLifeCycleConfiguration
actions.
- DeleteObject
:
- DeleteObjects
:
- s3:DeleteObjectTagging
- action.
- versionId
query
- parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
- action.
- DeleteBucketMetricsConfiguration
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:PutBucketPublicAccessBlock
- permission. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
-
-
- DeleteBucketMetricsConfiguration
:
- s3:GetEncryptionConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketEncryption
:
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketInventoryConfiguration
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- LocationConstraint
- request parameter in a CreateBucket
request. For more information, see
- CreateBucket.
-
-
- GetBucketLocation
:
- GetBucketLogging
:
- GetBucketLogging
:
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketMetricsConfiguration
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- NotificationConfiguration
- element.
- s3:GetBucketNotification
- permission.
- GetBucketNotification
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- GetBucketPolicy
permissions on the specified bucket and belong to
- the bucket owner's account in order to use this operation.
-
-
- GetBucketPolicy
permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- GetBucketPolicy
:
- s3:GetBucketPolicyStatus
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
-
- GetBucketPolicyStatus
:
- GetBucketRequestPayment
:
- GetBucketRequestPayment
:
- s3:GetBucketTagging
- action. By default, the bucket owner has this permission and can grant this permission
- to others.
- GetBucketTagging
has the following special error:
- NoSuchTagSetError
- GetBucketTagging
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- enabled
, the bucket owner must use an authentication
- device to change the versioning state of the bucket.
- GetBucketVersioning
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- S3:GetBucketWebsite
permission. By default,
- only the bucket owner can read the bucket website configuration. However, bucket owners
- can allow other users to read the website configuration by writing a bucket policy
- granting them the S3:GetBucketWebsite
permission.
- DeleteBucketWebsite
:
- GetBucketCors
:
- GetBucketCors
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- DeleteBucketMetricsConfiguration
:
- s3:GetLifecycleConfiguration
- action. The bucket owner has this permission, by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- GetBucketLifecycleConfiguration
has the following special error:
- NoSuchLifecycleConfiguration
- DeleteBucketMetricsConfiguration
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- GET
, you must have READ
- access to the object. If you grant READ
access to the anonymous user,
- you can return the object without using an authorization header.
-
-
- sample.jpg
, you can name it photos/2006/February/sample.jpg
.
- GET
operation. For a virtual hosted-style request example,
- if you have the object photos/2006/February/sample.jpg
, specify the resource
- as /photos/2006/February/sample.jpg
. For a path-style request example,
- if you have the object photos/2006/February/sample.jpg
in the bucket
- named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
- For more information about request types, see HTTP
- Host Header Bucket Specification.
- InvalidObjectStateError
error. For
- information about restoring archived objects, see Restoring
- Archived Objects.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- s3:GetObjectVersionTagging
- action), the response also returns the x-amz-tagging-count
header that
- provides the count of number of tags associated with the object. You can use GetObjectTagging
- to retrieve the tag set associated with an object.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket
permission.
- s3:ListBucket
permission on the bucket, Amazon S3 will
- return an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 will return
- an HTTP status code 403 ("access denied") error.
- versionId
subresource.
- x-amz-delete-marker: true
in the response.
- Content-Type
,
- Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
- and Content-Encoding
. To override these header values in the GET response,
- you use the following request parameters.
- response-content-type
- response-content-language
- response-expires
- response-cache-control
- response-content-disposition
- response-content-encoding
- If-Match
and If-Unmodified-Since
headers
- are present in the request as follows: If-Match
condition evaluates to
- true
, and; If-Unmodified-Since
condition evaluates to false
;
- then, S3 returns 200 OK and the data requested.
- If-None-Match
and If-Modified-Since
headers
- are present in the request as follows: If-None-Match
condition evaluates
- to false
, and; If-Modified-Since
condition evaluates to
- true
; then, S3 returns 304 Not Modified response code.
- GetObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- HEAD
request has the same options as a GET
operation on
- an object. The response is identical to the GET
response except that
- there is no response body.
- x-amz-server-side-encryption
, should
- not be sent for GET requests if your object uses server-side encryption with CMKs
- stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
- keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
- BadRequest error.
- If-Match
and If-Unmodified-Since
- headers are present in the request as follows:
- If-Match
condition evaluates to true
, and;
- If-Unmodified-Since
condition evaluates to false
;
- 200 OK
and the data requested.
- If-None-Match
and If-Modified-Since
- headers are present in the request as follows:
- If-None-Match
condition evaluates to false
, and;
- If-Modified-Since
condition evaluates to true
;
- 304 Not Modified
response code.
- s3:GetObject
permission for this operation. For more information,
- see Specifying
- Permissions in a Policy. If the object you request does not exist, the error Amazon
- S3 returns depends on whether you also have the s3:ListBucket permission.
- s3:ListBucket
permission on the bucket, Amazon S3 returns
- an HTTP status code 404 ("no such key") error.
- s3:ListBucket
permission, Amazon S3 returns an
- HTTP status code 403 ("access denied") error.
- HeadObject
:
- s3:GetObjectTagging
- action. By default, the GET operation returns information about current version of
- an object. For a versioned bucket, you can have multiple versions of an object in
- your bucket. To retrieve tags of any other version, use the versionId query parameter.
- You also need permission for the s3:GetObjectVersionTagging
action.
- GetObjectTagging
:
- GetObjectTorrent
:
- GetObjectTorrent
:
- PublicAccessBlock
configuration for an Amazon S3 bucket.
- To use this operation, you must have the s3:GetBucketPublicAccessBlock
- permission. For more information about Amazon S3 permissions, see Specifying
- Permissions in a Policy.
-
- PublicAccessBlock
configuration for a bucket
- or an object, it checks the PublicAccessBlock
configuration for both
- the bucket (or the bucket that contains the object) and the bucket owner's account.
- If the PublicAccessBlock
settings are different between the bucket and
- the account, Amazon S3 uses the most restrictive combination of the bucket-level and
- account-level settings.
- GetPublicAccessBlock
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateMultipartUpload
:
- CreateMultipartUpload
.
-
- kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
- kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
- key. These permissions are required because Amazon S3 must decrypt and read data from
- the encrypted file parts before it completes the multipart upload.
- x-amz-acl
request header. For more information,
- see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-read-acp
,
- x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
- These parameters map to the set of permissions that Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- x-amz-server-side-encryption:aws:kms
, but don't provide
- x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
- CMK in AWS KMS to protect the data.
- x-amz-acl
) — Amazon S3 supports a set of predefined
- ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
- and permissions. For more information, see Canned
- ACL.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateMultipartUpload
:
- IsTruncated
element in the response.
- If there are no more configurations to list, IsTruncated
is set to false.
- If there are more configurations to list, IsTruncated
is set to true,
- and there will be a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetAnalyticsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketAnalyticsConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetInventoryConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketInventoryConfigurations
:
- IsTruncated
element in the response. If there
- are no more configurations to list, IsTruncated
is set to false. If there
- are more configurations to list, IsTruncated
is set to true, and there
- is a value in NextContinuationToken
. You use the NextContinuationToken
- value to continue the pagination of the list by passing the value in continuation-token
- in the request to GET
the next page.
- s3:GetMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListBucketMetricsConfigurations
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- max-uploads
parameter in the response. If additional multipart uploads
- satisfy the list criteria, the response will contain an IsTruncated
element
- with the value true. To list the additional multipart uploads, use the key-marker
- and upload-id-marker
request parameters.
- ListMultipartUploads
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- ListObjects
.
- ListObjects
:
- 200 OK
response can contain valid or invalid XML. Make sure to design
- your application to parse the contents of the response and handle it appropriately.
-
-
- s3:ListBucket
action. The bucket owner
- has this permission by default and can grant this permission to others. For more information
- about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- ListObjectsV2
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- max-parts
request parameter.
- If your multipart upload consists of more than 1,000 parts, the response returns an
- IsTruncated
field with the value of true, and a NextPartNumberMarker
- element. In subsequent ListParts
requests you can include the part-number-marker
- query string parameter and set its value to the NextPartNumberMarker
- field value from the previous response.
-
-
- ListParts
:
- ListObjectVersions
:
- ListObjectVersions
:
- ListObjectVersions
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateBucket
:
- s3.amazonaws.com
endpoint,
- the request goes to the us-east-1 Region. Accordingly, the signature calculations
- in Signature Version 4 must use us-east-1 as the Region, even if the location constraint
- in the request specifies another Region where the bucket is to be created. If you
- create a bucket in a Region other than US East (N. Virginia), your application must
- be able to handle 307 redirect. For more information, see Virtual
- Hosting of Buckets.
- x-amz-acl
request header. Amazon S3 supports
- a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
- set of grantees and permissions. For more information, see Canned
- ACL.
- x-amz-grant-read
, x-amz-grant-write
,
- x-amz-grant-read-acp
, x-amz-grant-write-acp
, and x-amz-grant-full-control
- headers. These headers map to the set of permissions Amazon S3 supports in an ACL.
- For more information, see Access
- Control List (ACL) Overview.
- emailAddress
– if the value specified is the email address of an AWS
- account
- id
– if the value specified is the canonical user ID of an AWS account
- uri
– if you are granting permissions to a predefined group
- x-amz-grant-read
header grants the AWS accounts
- identified by email addresses permissions to read object data and its metadata:
- x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
-
- CreateBucket
:
- PutBucketAccelerateConfiguration
:
- Grantee
- request element to grant access to other people. The Permissions
request
- element specifies the kind of access the grantee has to the logs.
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
- </Grantee>
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress></Grantee>
-
- <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
-
- <BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01" />
-
- PutBucketLogging
:
- s3:PutMetricsConfiguration
- action. The bucket owner has this permission by default. The bucket owner can grant
- this permission to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketMetricsConfiguration
:
- GetBucketLifecycle
has the following special error:
- TooManyConfigurations
- NotificationConfiguration
.
- <NotificationConfiguration>
- </NotificationConfiguration>
- s3:PutBucketNotification
permission.
- TopicConfiguration
- specifying only the s3:ReducedRedundancyLostObject
event type, the response
- will also include the x-amz-sns-test-message-id
header containing the
- message ID of the test notification sent to the topic.
- PutBucketNotificationConfiguration
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- PutBucketPolicy
permissions on the specified bucket and
- belong to the bucket owner's account in order to use this operation.
-
-
- PutBucketPolic
y permissions, Amazon S3 returns a 403
- Access Denied
error. If you have the correct permissions, but you're not using
- an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
- Method Not Allowed
error.
- PutBucketPolicy
:
- DeleteMarkerReplication
,
- Status
, and Priority
.
- SourceSelectionCriteria
, SseKmsEncryptedObjects
,
- Status
, EncryptionConfiguration
, and ReplicaKmsKeyID
.
- For information about replication configuration, see Replicating
- Objects Created with SSE Using CMKs stored in AWS KMS.
- PutBucketReplication
errors, see ReplicationErrorCodeList
-
- PutBucketReplication
:
- PutBucketRequestPayment
:
- PutBucketRequestPayment
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- s3:PutBucketTagging
- action. The bucket owner has this permission by default and can grant this permission
- to others. For more information about permissions, see Permissions
- Related to Bucket Subresource Operations and Managing
- Access Permissions to Your Amazon S3 Resources.
- PutBucketTagging
has the following special errors:
- InvalidTagError
- MalformedXMLError
- OperationAbortedError
- InternalError
- PutBucketTagging
:
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- website
- subresource. To configure a bucket as a website, you can add this subresource on the
- bucket with website configuration information such as the file name of the index document
- and any redirect rules. For more information, see Hosting
- Websites on Amazon S3.
-
-
- S3:PutBucketWebsite
permission. By default,
- only the bucket owner can configure the website attached to a bucket; however, bucket
- owners can allow other users to set the website configuration by writing a bucket
- policy that grants them the S3:PutBucketWebsite
permission.
- WebsiteConfiguration
- RedirectAllRequestsTo
- HostName
- Protocol
- WebsiteConfiguration
- IndexDocument
- Suffix
- ErrorDocument
- Key
- RoutingRules
- RoutingRule
- Condition
- HttpErrorCodeReturnedEquals
- KeyPrefixEquals
- Redirect
- Protocol
- HostName
- ReplaceKeyPrefixWith
- ReplaceKeyWith
- HttpRedirectCode
- PutBucketLifecycleConfiguration
:
- PutBucketLifecycleConfiguration
:
- Deletes the replication subresource associated with the specified - bucket.
There is usually some time lag before - replication configuration deletion is fully propagated to all the - Amazon S3 systems.
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer - Guide.
-Specifies whether Amazon S3 should replicate delete makers.
-The status of the delete marker replication.
In the current implementation, Amazon S3 does not replicate
- the delete markers. Therefore, the status must be
- Disabled
.
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the Put Object Progress Event delegate's invocation list
-
- GetObjectResponse response = s3Client.GetObject(request);
- response.WriteObjectProgressEvent += displayProgress;
-
- ReplicationTime
block.
- s3:Replication:OperationMissedThreshold
event.
- TRUE
indicates that this bucket
- is public. FALSE
indicates that the bucket is not public.
- aws:SourceIp
. For more
- information on CIDR, see http://www.rfc-editor.org/rfc/rfc4632.txt
-
- aws:SourceArn
- aws:SourceVpc
- aws:SourceVpce
- aws:SourceOwner
- aws:SourceAccount
- s3:x-amz-server-side-encryption-aws-kms-key-id
- aws:userid
outside the pattern "AROLEID:*
"
- s3:Get*
, s3:List*
, s3:AbortMultipartUpload
,
- s3:Delete*
, s3:Put*
, and s3:RestoreObject
.
- s3:Get*
is a bad action, s3:GetObject
,
- s3:GetObjectVersion
, and s3:GetObjectAcl
are all bad actions.
- TRUE
causes the following behavior:
- TRUE
causes Amazon S3 to ignore all public ACLs on this bucket
- and any objects that it contains.
- TRUE
causes Amazon S3 to reject calls to PUT Bucket policy
- if the specified bucket policy allows public access.
- TRUE
, then only the bucket owner and AWS Services
- can access this bucket if it has a public policy.
- PutPublicBlock
request body.
- Amazon resource name (ARN) of the bucket where you want Amazon - S3 to store replicas of the object identified by the rule.
- If you have multiple rules in your replication configuration, all - rules must specify the same bucket as the destination. A replication - configuration can replicate objects only to one destination bucket.
-Account ID of the destination bucket. Currently Amazon S3 verifies this - value only if Access Control Translation is enabled.
In a cross-account
- scenario, if you tell Amazon S3 to change replica ownership to the AWS account
- that owns the destination bucket by adding the AccessControlTranslation
- element, this is the account ID of the destination bucket owner.
Container for information regarding the access control for replicas.
-Use only in a cross-account scenario, where source and destination bucket - owners are not the same, when you want to change replica ownership to the AWS - account that owns the destination bucket. If you don't add this element to the - replication configuration, the replicas are owned by same AWS account that - owns the source object.
- Container that provides encryption-related information. You must
- specify this element if the SourceSelectionCriteria
is
- specified.
Metrics
block.
- ReplicationTime
block.
- The priority associated with the rule. If you specify multiple rules in a - replication configuration, then Amazon S3 applies rule priority in the event - there are conflicts (two or more rules identify the same object based on - filter specified). The rule with higher priority takes precedence. For - example,
Same object quality prefix based filter criteria - If prefixes you specified in multiple rules overlap.
Same - object qualify tag based filter criteria specified in multiple rules
For more information, see - - Cross-Region Replication (CRR) in the Amazon S3 Developer Guide.
-Container that describes additional filters in identifying source objects that - you want to replicate. Currently, Amazon S3 supports only the filter that you can - specify for objects created with server-side encryption using an AWS KMS-managed - key. You can choose to enable or disable replication of these objects.
if - you want Amazon S3 to replicate objects created with server-side encryption using - AWS KMS-managed keys.
-Filter
must specify exactly one Prefix
,
- Tag
, or an And
child element.
- Container for specifying a tag key and value.
-The rule applies only to objects having the tag in its tagset.
-Container for specifying rule filters. These filters determine the - subset of objects to which the rule applies. The element is required - only if you specify more than one filter. For example:
You specify both a Prefix
and a Tag
- filters. Then you wrap these in an And
tag.
You specify filter based on multiple tags. Then you wrap the
- Tag
elements in an And
tag.
Metrics
block.
- SourceSelectionCriteria
in the replication
- configuration.
-
- private void displayProgress(object sender, DownloadDirectoryProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the DownloadedDirectoryProgressEvent delegate's invocation list
-
- TransferUtilityDownloadDirectoryRequest request = new TransferUtilityDownloadDirectoryRequest();
- request.DownloadedDirectoryProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, WriteObjectProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the WriteObjectProgressEvent delegate's invocation list
-
- TransferUtilityDownloadRequest request = new TransferUtilityDownloadRequest();
- request.WriteObjectProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, UploadDirectoryProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the UploadDirectoryProgressEvent delegate's invocation list
-
- TransferUtilityUploadDirectoryRequest request = new TransferUtilityUploadDirectoryRequest();
- request.UploadDirectoryProgressEvent += displayProgress;
-
-
- private void displayProgress(object sender, UploadProgressArgs args)
- {
- Console.WriteLine(args);
- }
-
- 2. Add this method to the UploadProgressEvent delegate's invocation list
-
- TransferUtilityUploadRequest request = new TransferUtilityUploadRequest();
- request.UploadProgressEvent += displayProgress;
-
-
- <configSections>
- <section name="aws" type="Amazon.AWSSection, AWSSDK"/>
- </configSections>
- <aws>
- <s3 useSignatureVersion4="true" />
- </aws>
-
-