/// <?xml version="1.0" encoding="utf-8" ?>
/// <configuration>
/// <appSettings>
/// <add key="AWSProfileName" value="AWS Default"/>
/// </appSettings>
/// </configuration>
///
///
///
/// <?xml version="1.0" encoding="utf-8" ?>
/// <configuration>
/// <appSettings>
/// <add key="AWSProfileName" value="AWS Default"/>
/// </appSettings>
/// </configuration>
///
///
///
/// <?xml version="1.0" encoding="utf-8" ?>
/// <configuration>
/// <appSettings>
/// <add key="AWSProfileName" value="AWS Default"/>
/// </appSettings>
/// </configuration>
///
///
/// AbortMultipartUpload:
/// AccessPointName-AccountId.outpostID.s3-outposts.Region.amazonaws.com. When you use this action with S3 on Outposts through the Amazon Web Services SDKs, you provide the Outposts access point ARN in place of the bucket name. For more information about S3 on Outposts ARNs, see What is S3 on Outposts? in the Amazon S3 User Guide.
/// Key of the object for which the multipart upload was initiated.
/// Upload ID that identifies the multipart upload.
///
/// A cancellation token that can be used by other objects or threads to receive notice of cancellation.
///
///
/// AbortMultipartUpload:
/// ETag
/// value, returned after that part was uploaded.
/// 200
/// OK response can contain either a success or an error. If you call the S3 API
/// directly, make sure to design your application to parse the contents of the response
/// and handle it appropriately. If you use Amazon Web Services SDKs, SDKs handle this
/// condition. The SDKs detect the embedded error and apply error handling per your configuration
/// settings (including automatically retrying the request as appropriate). If the condition
/// persists, the SDKs throws an exception (or, for the SDKs that don't use exceptions,
/// they return the error).
/// CompleteMultipartUpload fails, applications should be prepared
/// to retry the failed requests. For more information, see Amazon
/// S3 Error Best Practices.
/// Content-Type: application/x-www-form-urlencoded with Complete
/// Multipart Upload requests. Also, if you do not provide a Content-Type
/// header, CompleteMultipartUpload returns a 200 OK response.
/// CompleteMultipartUpload has the following special errors:
/// EntityTooSmall
/// InvalidPart
/// InvalidPartOrder
/// NoSuchUpload
/// CompleteMultipartUpload:
/// 200 OK response. This means that
/// a 200 OK response can contain either a success or an error. If you call
/// the S3 API directly, make sure to design your application to parse the contents of
/// the response and handle it appropriately. If you use Amazon Web Services SDKs, SDKs
/// handle this condition. The SDKs detect the embedded error and apply error handling
/// per your configuration settings (including automatically retrying the request as appropriate).
/// If the condition persists, the SDKs throws an exception (or, for the SDKs that don't
/// use exceptions, they return the error).
/// Bad
/// Request error. For more information, see Transfer
/// Acceleration.
/// x-amz-metadata-directive
/// header. When you grant permissions, you can use the s3:x-amz-metadata-directive
/// condition key to enforce certain metadata behavior when objects are uploaded. For
/// more information, see Specifying
/// Conditions in a Policy in the Amazon S3 User Guide. For a complete list
/// of Amazon S3-specific condition keys, see Actions,
/// Resources, and Condition Keys for Amazon S3.
/// x-amz-website-redirect-location is unique to each object and must be
/// specified in the request headers to copy the value.
/// Etag
/// matches or whether the object was modified before or after a specified date, use the
/// following request parameters:
/// x-amz-copy-source-if-match
/// x-amz-copy-source-if-none-match
/// x-amz-copy-source-if-unmodified-since
/// x-amz-copy-source-if-modified-since
/// x-amz-copy-source-if-match and x-amz-copy-source-if-unmodified-since
/// headers are present in the request and evaluate as follows, Amazon S3 returns 200
/// OK and copies the data:
/// x-amz-copy-source-if-match condition evaluates to true
/// x-amz-copy-source-if-unmodified-since condition evaluates to false
/// x-amz-copy-source-if-none-match and x-amz-copy-source-if-modified-since
/// headers are present in the request and evaluate as follows, Amazon S3 returns the
/// 412 Precondition Failed response code:
/// x-amz-copy-source-if-none-match condition evaluates to false
/// x-amz-copy-source-if-modified-since condition evaluates to true
/// x-amz- prefix, including x-amz-copy-source,
/// must be signed.
/// CopyObject operation, if you want to use a different
/// type of encryption setting for the target object, you can use other appropriate encryption-related
/// headers to encrypt the target object with a KMS key, an Amazon S3 managed key, or
/// a customer-provided key. With server-side encryption, Amazon S3 encrypts your data
/// as it writes your data to disks in its data centers and decrypts the data when you
/// access it. If the encryption setting in your request is different from the default
/// encryption configuration of the destination bucket, the encryption setting in your
/// request takes precedence. If the source object for the copy is stored in Amazon S3
/// using SSE-C, you must provide the necessary encryption information in your request
/// so that Amazon S3 can decrypt the object for copying. For more information about server-side
/// encryption, see Using
/// Server-Side Encryption.
/// PUT requests that don't specify an
/// ACL or PUT requests that specify bucket owner full control ACLs, such
/// as the bucket-owner-full-control canned ACL or an equivalent form of
/// this ACL expressed in the XML format.
/// x-amz-checksum-algorithm
/// header.
/// CopyObject action to change the storage class of an object
/// that is already stored in Amazon S3 by using the StorageClass parameter.
/// For more information, see Storage
/// Classes in the Amazon S3 User Guide.
/// x-amz-copy-source header identifies the current version of
/// an object to copy. If the current version is a delete marker, Amazon S3 behaves as
/// if the object was deleted. To copy a different version, use the versionId
/// subresource.
/// x-amz-version-id
/// response header in the response.
/// CopyObject:
/// AccessPointName-AccountId.outpostID.s3-outposts.Region.amazonaws.com. When you use this action with S3 on Outposts through the Amazon Web Services SDKs, you provide the Outposts access point ARN in place of the bucket name. For more information about S3 on Outposts ARNs, see What is S3 on Outposts? in the Amazon S3 User Guide.
/// A property of CopyObjectRequest used to execute the CopyObject service method.
///
/// A cancellation token that can be used by other objects or threads to receive notice of cancellation.
///
///
/// 200 OK response. This means that
/// a 200 OK response can contain either a success or an error. If you call
/// the S3 API directly, make sure to design your application to parse the contents of
/// the response and handle it appropriately. If you use Amazon Web Services SDKs, SDKs
/// handle this condition. The SDKs detect the embedded error and apply error handling
/// per your configuration settings (including automatically retrying the request as appropriate).
/// If the condition persists, the SDKs throws an exception (or, for the SDKs that don't
/// use exceptions, they return the error).
/// Bad
/// Request error. For more information, see Transfer
/// Acceleration.
/// x-amz-metadata-directive
/// header. When you grant permissions, you can use the s3:x-amz-metadata-directive
/// condition key to enforce certain metadata behavior when objects are uploaded. For
/// more information, see Specifying
/// Conditions in a Policy in the Amazon S3 User Guide. For a complete list
/// of Amazon S3-specific condition keys, see Actions,
/// Resources, and Condition Keys for Amazon S3.
/// x-amz-website-redirect-location is unique to each object and must be
/// specified in the request headers to copy the value.
/// Etag
/// matches or whether the object was modified before or after a specified date, use the
/// following request parameters:
/// x-amz-copy-source-if-match
/// x-amz-copy-source-if-none-match
/// x-amz-copy-source-if-unmodified-since
/// x-amz-copy-source-if-modified-since
/// x-amz-copy-source-if-match and x-amz-copy-source-if-unmodified-since
/// headers are present in the request and evaluate as follows, Amazon S3 returns 200
/// OK and copies the data:
/// x-amz-copy-source-if-match condition evaluates to true
/// x-amz-copy-source-if-unmodified-since condition evaluates to false
/// x-amz-copy-source-if-none-match and x-amz-copy-source-if-modified-since
/// headers are present in the request and evaluate as follows, Amazon S3 returns the
/// 412 Precondition Failed response code:
/// x-amz-copy-source-if-none-match condition evaluates to false
/// x-amz-copy-source-if-modified-since condition evaluates to true
/// x-amz- prefix, including x-amz-copy-source,
/// must be signed.
/// CopyObject operation, if you want to use a different
/// type of encryption setting for the target object, you can use other appropriate encryption-related
/// headers to encrypt the target object with a KMS key, an Amazon S3 managed key, or
/// a customer-provided key. With server-side encryption, Amazon S3 encrypts your data
/// as it writes your data to disks in its data centers and decrypts the data when you
/// access it. If the encryption setting in your request is different from the default
/// encryption configuration of the destination bucket, the encryption setting in your
/// request takes precedence. If the source object for the copy is stored in Amazon S3
/// using SSE-C, you must provide the necessary encryption information in your request
/// so that Amazon S3 can decrypt the object for copying. For more information about server-side
/// encryption, see Using
/// Server-Side Encryption.
/// PUT requests that don't specify an
/// ACL or PUT requests that specify bucket owner full control ACLs, such
/// as the bucket-owner-full-control canned ACL or an equivalent form of
/// this ACL expressed in the XML format.
/// x-amz-checksum-algorithm
/// header.
/// CopyObject action to change the storage class of an object
/// that is already stored in Amazon S3 by using the StorageClass parameter.
/// For more information, see Storage
/// Classes in the Amazon S3 User Guide.
/// x-amz-copy-source header identifies the current version of
/// an object to copy. If the current version is a delete marker, Amazon S3 behaves as
/// if the object was deleted. To copy a different version, use the versionId
/// subresource.
/// x-amz-version-id
/// response header in the response.
/// CopyObject:
/// AccessPointName-AccountId.outpostID.s3-outposts.Region.amazonaws.com. When you use this action with S3 on Outposts through the Amazon Web Services SDKs, you provide the Outposts access point ARN in place of the bucket name. For more information about S3 on Outposts ARNs, see What is S3 on Outposts? in the Amazon S3 User Guide.
/// A property of CopyObjectRequest used to execute the CopyObject service method.
///
/// A cancellation token that can be used by other objects or threads to receive notice of cancellation.
///
///
/// 200 OK response. This means that
/// a 200 OK response can contain either a success or an error. If you call
/// the S3 API directly, make sure to design your application to parse the contents of
/// the response and handle it appropriately. If you use Amazon Web Services SDKs, SDKs
/// handle this condition. The SDKs detect the embedded error and apply error handling
/// per your configuration settings (including automatically retrying the request as appropriate).
/// If the condition persists, the SDKs throws an exception (or, for the SDKs that don't
/// use exceptions, they return the error).
/// Bad
/// Request error. For more information, see Transfer
/// Acceleration.
/// x-amz-metadata-directive
/// header. When you grant permissions, you can use the s3:x-amz-metadata-directive
/// condition key to enforce certain metadata behavior when objects are uploaded. For
/// more information, see Specifying
/// Conditions in a Policy in the Amazon S3 User Guide. For a complete list
/// of Amazon S3-specific condition keys, see Actions,
/// Resources, and Condition Keys for Amazon S3.
/// x-amz-website-redirect-location is unique to each object and must be
/// specified in the request headers to copy the value.
/// Etag
/// matches or whether the object was modified before or after a specified date, use the
/// following request parameters:
/// x-amz-copy-source-if-match
/// x-amz-copy-source-if-none-match
/// x-amz-copy-source-if-unmodified-since
/// x-amz-copy-source-if-modified-since
/// x-amz-copy-source-if-match and x-amz-copy-source-if-unmodified-since
/// headers are present in the request and evaluate as follows, Amazon S3 returns 200
/// OK and copies the data:
/// x-amz-copy-source-if-match condition evaluates to true
/// x-amz-copy-source-if-unmodified-since condition evaluates to false
/// x-amz-copy-source-if-none-match and x-amz-copy-source-if-modified-since
/// headers are present in the request and evaluate as follows, Amazon S3 returns the
/// 412 Precondition Failed response code:
/// x-amz-copy-source-if-none-match condition evaluates to false
/// x-amz-copy-source-if-modified-since condition evaluates to true
/// x-amz- prefix, including x-amz-copy-source,
/// must be signed.
/// CopyObject operation, if you want to use a different
/// type of encryption setting for the target object, you can use other appropriate encryption-related
/// headers to encrypt the target object with a KMS key, an Amazon S3 managed key, or
/// a customer-provided key. With server-side encryption, Amazon S3 encrypts your data
/// as it writes your data to disks in its data centers and decrypts the data when you
/// access it. If the encryption setting in your request is different from the default
/// encryption configuration of the destination bucket, the encryption setting in your
/// request takes precedence. If the source object for the copy is stored in Amazon S3
/// using SSE-C, you must provide the necessary encryption information in your request
/// so that Amazon S3 can decrypt the object for copying. For more information about server-side
/// encryption, see Using
/// Server-Side Encryption.
/// PUT requests that don't specify an
/// ACL or PUT requests that specify bucket owner full control ACLs, such
/// as the bucket-owner-full-control canned ACL or an equivalent form of
/// this ACL expressed in the XML format.
/// x-amz-checksum-algorithm
/// header.
/// CopyObject action to change the storage class of an object
/// that is already stored in Amazon S3 by using the StorageClass parameter.
/// For more information, see Storage
/// Classes in the Amazon S3 User Guide.
/// x-amz-copy-source header identifies the current version of
/// an object to copy. If the current version is a delete marker, Amazon S3 behaves as
/// if the object was deleted. To copy a different version, use the versionId
/// subresource.
/// x-amz-version-id
/// response header in the response.
/// CopyObject:
/// x-amz-copy-source in your
/// request and a byte range by adding the request header x-amz-copy-source-range
/// in your request.
///
///
/// UploadPartCopy operation, see the
/// following:
/// UploadPartCopy operation, see CopyObject
/// and UploadPart.
/// x-amz-copy-source-if-match,
/// x-amz-copy-source-if-none-match, x-amz-copy-source-if-unmodified-since,
/// and x-amz-copy-source-if-modified-since:
/// x-amz-copy-source-if-match and
/// x-amz-copy-source-if-unmodified-since headers are present in the request
/// as follows:
/// x-amz-copy-source-if-match condition evaluates to true,
/// and;
/// x-amz-copy-source-if-unmodified-since condition evaluates to false;
/// 200 OK and copies the data.
/// x-amz-copy-source-if-none-match
/// and x-amz-copy-source-if-modified-since headers are present in the request
/// as follows:
/// x-amz-copy-source-if-none-match condition evaluates to false,
/// and;
/// x-amz-copy-source-if-modified-since condition evaluates to true;
/// 412 Precondition Failed response code.
/// x-amz-copy-source identifies the current version
/// of the object to copy. If the current version is a delete marker and you don't specify
/// a versionId in the x-amz-copy-source, Amazon S3 returns a 404 error,
/// because the object does not exist. If you specify versionId in the x-amz-copy-source
/// and the versionId is a delete marker, Amazon S3 returns an HTTP 400 error, because
/// you are not allowed to specify a delete marker as a version for the x-amz-copy-source.
///
/// versionId subresource as shown in the following example:
/// x-amz-copy-source: /bucket/object?versionId=version id
/// UploadPartCopy:
/// AccessPointName-AccountId.outpostID.s3-outposts.Region.amazonaws.com. When you use this action with S3 on Outposts through the Amazon Web Services SDKs, you provide the Outposts access point ARN in place of the bucket name. For more information about S3 on Outposts ARNs, see What is S3 on Outposts? in the Amazon S3 User Guide.
/// A property of CopyPartRequest used to execute the CopyPart service method.
/// Upload ID identifying the multipart upload whose part is being copied.
///
/// A cancellation token that can be used by other objects or threads to receive notice of cancellation.
///
///
/// x-amz-copy-source in your
/// request and a byte range by adding the request header x-amz-copy-source-range
/// in your request.
///
///
/// UploadPartCopy operation, see the
/// following:
/// UploadPartCopy operation, see CopyObject
/// and UploadPart.
/// x-amz-copy-source-if-match,
/// x-amz-copy-source-if-none-match, x-amz-copy-source-if-unmodified-since,
/// and x-amz-copy-source-if-modified-since:
/// x-amz-copy-source-if-match and
/// x-amz-copy-source-if-unmodified-since headers are present in the request
/// as follows:
/// x-amz-copy-source-if-match condition evaluates to true,
/// and;
/// x-amz-copy-source-if-unmodified-since condition evaluates to false;
/// 200 OK and copies the data.
/// x-amz-copy-source-if-none-match
/// and x-amz-copy-source-if-modified-since headers are present in the request
/// as follows:
/// x-amz-copy-source-if-none-match condition evaluates to false,
/// and;
/// x-amz-copy-source-if-modified-since condition evaluates to true;
/// 412 Precondition Failed response code.
/// x-amz-copy-source identifies the current version
/// of the object to copy. If the current version is a delete marker and you don't specify
/// a versionId in the x-amz-copy-source, Amazon S3 returns a 404 error,
/// because the object does not exist. If you specify versionId in the x-amz-copy-source
/// and the versionId is a delete marker, Amazon S3 returns an HTTP 400 error, because
/// you are not allowed to specify a delete marker as a version for the x-amz-copy-source.
///
/// versionId subresource as shown in the following example:
/// x-amz-copy-source: /bucket/object?versionId=version id
/// UploadPartCopy:
/// AccessPointName-AccountId.outpostID.s3-outposts.Region.amazonaws.com. When you use this action with S3 on Outposts through the Amazon Web Services SDKs, you provide the Outposts access point ARN in place of the bucket name. For more information about S3 on Outposts ARNs, see What is S3 on Outposts? in the Amazon S3 User Guide.
/// A property of CopyPartRequest used to execute the CopyPart service method.
/// Upload ID identifying the multipart upload whose part is being copied.
///
/// A cancellation token that can be used by other objects or threads to receive notice of cancellation.
///
///
/// x-amz-copy-source in your
/// request and a byte range by adding the request header x-amz-copy-source-range
/// in your request.
///
///
/// UploadPartCopy operation, see the
/// following:
/// UploadPartCopy operation, see CopyObject
/// and UploadPart.
/// x-amz-copy-source-if-match,
/// x-amz-copy-source-if-none-match, x-amz-copy-source-if-unmodified-since,
/// and x-amz-copy-source-if-modified-since:
/// x-amz-copy-source-if-match and
/// x-amz-copy-source-if-unmodified-since headers are present in the request
/// as follows:
/// x-amz-copy-source-if-match condition evaluates to true,
/// and;
/// x-amz-copy-source-if-unmodified-since condition evaluates to false;
/// 200 OK and copies the data.
/// x-amz-copy-source-if-none-match
/// and x-amz-copy-source-if-modified-since headers are present in the request
/// as follows:
/// x-amz-copy-source-if-none-match condition evaluates to false,
/// and;
/// x-amz-copy-source-if-modified-since condition evaluates to true;
/// 412 Precondition Failed response code.
/// x-amz-copy-source identifies the current version
/// of the object to copy. If the current version is a delete marker and you don't specify
/// a versionId in the x-amz-copy-source, Amazon S3 returns a 404 error,
/// because the object does not exist. If you specify versionId in the x-amz-copy-source
/// and the versionId is a delete marker, Amazon S3 returns an HTTP 400 error, because
/// you are not allowed to specify a delete marker as a version for the x-amz-copy-source.
///
/// versionId subresource as shown in the following example:
/// x-amz-copy-source: /bucket/object?versionId=version id
/// UploadPartCopy:
/// DeleteBucket:
/// DeleteBucket:
/// s3:PutAnalyticsConfiguration
/// action. The bucket owner has this permission by default. The bucket owner can grant
/// this permission to others. For more information about permissions, see Permissions
/// Related to Bucket Subresource Operations and Managing
/// Access Permissions to Your Amazon S3 Resources.
/// DeleteBucketAnalyticsConfiguration:
/// s3:PutEncryptionConfiguration
/// action. The bucket owner has this permission by default. The bucket owner can grant
/// this permission to others. For more information about permissions, see Permissions
/// Related to Bucket Subresource Operations and Managing
/// Access Permissions to your Amazon S3 Resources in the Amazon S3 User Guide.
/// DeleteBucketEncryption:
/// DeleteBucketIntelligentTieringConfiguration include:
///
/// s3:PutInventoryConfiguration
/// action. The bucket owner has this permission by default. The bucket owner can grant
/// this permission to others. For more information about permissions, see Permissions
/// Related to Bucket Subresource Operations and Managing
/// Access Permissions to Your Amazon S3 Resources.
/// DeleteBucketInventoryConfiguration include:
/// s3:PutMetricsConfiguration
/// action. The bucket owner has this permission by default. The bucket owner can grant
/// this permission to others. For more information about permissions, see Permissions
/// Related to Bucket Subresource Operations and Managing
/// Access Permissions to Your Amazon S3 Resources.
/// DeleteBucketMetricsConfiguration:
/// OwnershipControls for an Amazon S3 bucket. To use this operation,
/// you must have the s3:PutBucketOwnershipControls permission. For more
/// information about Amazon S3 permissions, see Specifying
/// Permissions in a Policy.
///
///
/// DeleteBucketOwnershipControls:
/// DeleteBucketPolicy permissions on the specified bucket and belong
/// to the bucket owner's account to use this operation.
///
///
/// DeleteBucketPolicy permissions, Amazon S3 returns a
/// 403 Access Denied error. If you have the correct permissions, but you're
/// not using an identity that belongs to the bucket owner's account, Amazon S3 returns
/// a 405 Method Not Allowed error.
/// GetBucketPolicy, PutBucketPolicy, and DeleteBucketPolicy
/// API actions, even if their bucket policy explicitly denies the root principal's access.
/// Bucket owner root principals can only be blocked from performing these API actions
/// by VPC endpoint policies and Amazon Web Services Organizations policies.
/// DeleteBucketPolicy
/// DeleteBucketPolicy permissions on the specified bucket and belong
/// to the bucket owner's account to use this operation.
///
///
/// DeleteBucketPolicy permissions, Amazon S3 returns a
/// 403 Access Denied error. If you have the correct permissions, but you're
/// not using an identity that belongs to the bucket owner's account, Amazon S3 returns
/// a 405 Method Not Allowed error.
/// GetBucketPolicy, PutBucketPolicy, and DeleteBucketPolicy
/// API actions, even if their bucket policy explicitly denies the root principal's access.
/// Bucket owner root principals can only be blocked from performing these API actions
/// by VPC endpoint policies and Amazon Web Services Organizations policies.
/// DeleteBucketPolicy
/// s3:PutReplicationConfiguration
/// action. The bucket owner has these permissions by default and can grant it to others.
/// For more information about permissions, see Permissions
/// Related to Bucket Subresource Operations and Managing
/// Access Permissions to Your Amazon S3 Resources.
/// DeleteBucketReplication:
/// s3:PutBucketTagging
/// action. By default, the bucket owner has this permission and can grant this permission
/// to others.
/// DeleteBucketTagging:
/// s3:PutBucketTagging
/// action. By default, the bucket owner has this permission and can grant this permission
/// to others.
/// DeleteBucketTagging:
/// 200
/// OK response upon successfully deleting a website configuration on the specified
/// bucket. You will get a 200 OK response if the website configuration you
/// are trying to delete does not exist on the bucket. Amazon S3 returns a 404
/// response if the bucket specified in the request does not exist.
///
///
/// S3:DeleteBucketWebsite permission. By
/// default, only the bucket owner can delete the website configuration attached to a
/// bucket. However, bucket owners can grant other users permission to delete the website
/// configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
/// permission.
/// DeleteBucketWebsite:
/// 200
/// OK response upon successfully deleting a website configuration on the specified
/// bucket. You will get a 200 OK response if the website configuration you
/// are trying to delete does not exist on the bucket. Amazon S3 returns a 404
/// response if the bucket specified in the request does not exist.
///
///
/// S3:DeleteBucketWebsite permission. By
/// default, only the bucket owner can delete the website configuration attached to a
/// bucket. However, bucket owners can grant other users permission to delete the website
/// configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
/// permission.
/// DeleteBucketWebsite:
/// cors configuration information set for the bucket.
///
///
/// s3:PutBucketCORS
/// action. The bucket owner has this permission by default and can grant this permission
/// to others.
/// cors, see Enabling
/// Cross-Origin Resource Sharing in the Amazon S3 User Guide.
/// Related Resources /// ///
cors configuration is being deleted.
///
/// A cancellation token that can be used by other objects or threads to receive notice of cancellation.
///
///
/// cors configuration information set for the bucket.
///
///
/// s3:PutBucketCORS
/// action. The bucket owner has this permission by default and can grant this permission
/// to others.
/// cors, see Enabling
/// Cross-Origin Resource Sharing in the Amazon S3 User Guide.
/// Related Resources /// ///
s3:PutLifecycleConfiguration
/// action. By default, the bucket owner has this permission and the bucket owner can
/// grant this permission to others.
/// s3:PutLifecycleConfiguration
/// action. By default, the bucket owner has this permission and the bucket owner can
/// grant this permission to others.
/// x-amz-delete-marker, to true.
/// x-amz-mfa request header
/// in the DELETE versionId request. Requests that include x-amz-mfa
/// must use HTTPS.
/// s3:DeleteObject,
/// s3:DeleteObjectVersion, and s3:PutLifeCycleConfiguration
/// actions.
/// DeleteObject:
/// AccessPointName-AccountId.outpostID.s3-outposts.Region.amazonaws.com. When you use this action with S3 on Outposts through the Amazon Web Services SDKs, you provide the Outposts access point ARN in place of the bucket name. For more information about S3 on Outposts ARNs, see What is S3 on Outposts? in the Amazon S3 User Guide.
/// Key name of the object to delete.
///
/// A cancellation token that can be used by other objects or threads to receive notice of cancellation.
///
///
/// x-amz-delete-marker, to true.
/// x-amz-mfa request header
/// in the DELETE versionId request. Requests that include x-amz-mfa
/// must use HTTPS.
/// s3:DeleteObject,
/// s3:DeleteObjectVersion, and s3:PutLifeCycleConfiguration
/// actions.
/// DeleteObject:
/// AccessPointName-AccountId.outpostID.s3-outposts.Region.amazonaws.com. When you use this action with S3 on Outposts through the Amazon Web Services SDKs, you provide the Outposts access point ARN in place of the bucket name. For more information about S3 on Outposts ARNs, see What is S3 on Outposts? in the Amazon S3 User Guide.
/// Key name of the object to delete.
/// VersionId used to reference a specific version of the object.
///
/// A cancellation token that can be used by other objects or threads to receive notice of cancellation.
///
///
/// x-amz-delete-marker, to true.
/// x-amz-mfa request header
/// in the DELETE versionId request. Requests that include x-amz-mfa
/// must use HTTPS.
/// s3:DeleteObject,
/// s3:DeleteObjectVersion, and s3:PutLifeCycleConfiguration
/// actions.
/// DeleteObject:
/// DeleteObjects:
/// s3:DeleteObjectTagging
/// action.
/// versionId query
/// parameter in the request. You will need permission for the s3:DeleteObjectVersionTagging
/// action.
/// DeleteObjectTagging:
/// PublicAccessBlock configuration for an Amazon S3 bucket.
/// To use this operation, you must have the s3:PutBucketPublicAccessBlock
/// permission. For more information about permissions, see Permissions
/// Related to Bucket Subresource Operations and Managing
/// Access Permissions to Your Amazon S3 Resources.
///
///
/// DeletePublicAccessBlock:
/// GET action uses the acl subresource
/// to return the access control list (ACL) of a bucket. To use GET to return
/// the ACL of the bucket, you must have READ_ACP access to the bucket. If
/// READ_ACP permission is granted to the anonymous user, you can return
/// the ACL of the bucket without using an authorization header.
///
///
/// InvalidAccessPointAliasError
/// is returned. For more information about InvalidAccessPointAliasError,
/// see List
/// of Error Codes.
/// bucket-owner-full-control
/// ACL with the owner being the account that created the bucket. For more information,
/// see
/// Controlling object ownership and disabling ACLs in the Amazon S3 User Guide.
/// GetBucketAcl:
/// InvalidAccessPointAliasError is returned. For more information about InvalidAccessPointAliasError, see List of Error Codes.
///
/// A cancellation token that can be used by other objects or threads to receive notice of cancellation.
///
///
/// GET action uses the acl subresource
/// to return the access control list (ACL) of a bucket. To use GET to return
/// the ACL of the bucket, you must have READ_ACP access to the bucket. If
/// READ_ACP permission is granted to the anonymous user, you can return
/// the ACL of the bucket without using an authorization header.
///
///
/// InvalidAccessPointAliasError
/// is returned. For more information about InvalidAccessPointAliasError,
/// see List
/// of Error Codes.
/// bucket-owner-full-control
/// ACL with the owner being the account that created the bucket. For more information,
/// see
/// Controlling object ownership and disabling ACLs in the Amazon S3 User Guide.
/// GetBucketAcl:
/// accelerate subresource
/// to return the Transfer Acceleration state of a bucket, which is either Enabled
/// or Suspended. Amazon S3 Transfer Acceleration is a bucket-level feature
/// that enables you to perform faster data transfers to and from Amazon S3.
///
///
/// s3:GetAccelerateConfiguration
/// action. The bucket owner has this permission by default. The bucket owner can grant
/// this permission to others. For more information about permissions, see Permissions
/// Related to Bucket Subresource Operations and Managing
/// Access Permissions to your Amazon S3 Resources in the Amazon S3 User Guide.
/// Enabled
/// or Suspended by using the PutBucketAccelerateConfiguration
/// operation.
/// accelerate request does not return a state value for a bucket that
/// has no transfer acceleration state. A bucket has no Transfer Acceleration state if
/// a state has never been set on the bucket.
/// GetBucketAccelerateConfiguration:
/// accelerate subresource
/// to return the Transfer Acceleration state of a bucket, which is either Enabled
/// or Suspended. Amazon S3 Transfer Acceleration is a bucket-level feature
/// that enables you to perform faster data transfers to and from Amazon S3.
///
///
/// s3:GetAccelerateConfiguration
/// action. The bucket owner has this permission by default. The bucket owner can grant
/// this permission to others. For more information about permissions, see Permissions
/// Related to Bucket Subresource Operations and Managing
/// Access Permissions to your Amazon S3 Resources in the Amazon S3 User Guide.
/// Enabled
/// or Suspended by using the PutBucketAccelerateConfiguration
/// operation.
/// accelerate request does not return a state value for a bucket that
/// has no transfer acceleration state. A bucket has no Transfer Acceleration state if
/// a state has never been set on the bucket.
/// GetBucketAccelerateConfiguration:
/// s3:GetAnalyticsConfiguration
/// action. The bucket owner has this permission by default. The bucket owner can grant
/// this permission to others. For more information about permissions, see
/// Permissions Related to Bucket Subresource Operations and Managing
/// Access Permissions to Your Amazon S3 Resources in the Amazon S3 User Guide.
///
/// GetBucketAnalyticsConfiguration:
/// s3:GetEncryptionConfiguration
/// action. The bucket owner has this permission by default. The bucket owner can grant
/// this permission to others. For more information about permissions, see Permissions
/// Related to Bucket Subresource Operations and Managing
/// Access Permissions to Your Amazon S3 Resources.
/// GetBucketEncryption:
/// GetBucketIntelligentTieringConfiguration include:
///
/// s3:GetInventoryConfiguration
/// action. The bucket owner has this permission by default and can grant this permission
/// to others. For more information about permissions, see Permissions
/// Related to Bucket Subresource Operations and Managing
/// Access Permissions to Your Amazon S3 Resources.
/// GetBucketInventoryConfiguration:
/// LocationConstraint
/// request parameter in a CreateBucket request. For more information, see
/// CreateBucket.
///
///
/// InvalidAccessPointAliasError
/// is returned. For more information about InvalidAccessPointAliasError,
/// see List
/// of Error Codes.
/// GetBucketLocation:
/// InvalidAccessPointAliasError is returned. For more information about InvalidAccessPointAliasError, see List of Error Codes.
///
/// A cancellation token that can be used by other objects or threads to receive notice of cancellation.
///
///
/// LocationConstraint
/// request parameter in a CreateBucket request. For more information, see
/// CreateBucket.
///
///
/// InvalidAccessPointAliasError
/// is returned. For more information about InvalidAccessPointAliasError,
/// see List
/// of Error Codes.
/// GetBucketLocation:
/// GetBucketLogging:
/// GetBucketLogging:
/// s3:GetMetricsConfiguration
/// action. The bucket owner has this permission by default. The bucket owner can grant
/// this permission to others. For more information about permissions, see Permissions
/// Related to Bucket Subresource Operations and Managing
/// Access Permissions to Your Amazon S3 Resources.
/// GetBucketMetricsConfiguration:
/// NotificationConfiguration
/// element.
/// s3:GetBucketNotification
/// permission.
/// InvalidAccessPointAliasError
/// is returned. For more information about InvalidAccessPointAliasError,
/// see List
/// of Error Codes.
/// GetBucketNotification:
/// InvalidAccessPointAliasError is returned. For more information about InvalidAccessPointAliasError, see List of Error Codes.
///
/// A cancellation token that can be used by other objects or threads to receive notice of cancellation.
///
///
/// NotificationConfiguration
/// element.
/// s3:GetBucketNotification
/// permission.
/// InvalidAccessPointAliasError
/// is returned. For more information about InvalidAccessPointAliasError,
/// see List
/// of Error Codes.
/// GetBucketNotification:
/// OwnershipControls for an Amazon S3 bucket. To use this operation,
/// you must have the s3:GetBucketOwnershipControls permission. For more
/// information about Amazon S3 permissions, see Specifying
/// permissions in a policy.
///
///
/// GetBucketOwnershipControls:
/// GetBucketPolicy permissions on the specified bucket
/// and belong to the bucket owner's account in order to use this operation.
///
///
/// GetBucketPolicy permissions, Amazon S3 returns a 403
/// Access Denied error. If you have the correct permissions, but you're not using
/// an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
/// Method Not Allowed error.
/// GetBucketPolicy, PutBucketPolicy, and DeleteBucketPolicy
/// API actions, even if their bucket policy explicitly denies the root principal's access.
/// Bucket owner root principals can only be blocked from performing these API actions
/// by VPC endpoint policies and Amazon Web Services Organizations policies.
/// InvalidAccessPointAliasError
/// is returned. For more information about InvalidAccessPointAliasError,
/// see List
/// of Error Codes.
/// GetBucketPolicy:
/// InvalidAccessPointAliasError is returned. For more information about InvalidAccessPointAliasError, see List of Error Codes.
///
/// A cancellation token that can be used by other objects or threads to receive notice of cancellation.
///
///
/// GetBucketPolicy permissions on the specified bucket
/// and belong to the bucket owner's account in order to use this operation.
///
///
/// GetBucketPolicy permissions, Amazon S3 returns a 403
/// Access Denied error. If you have the correct permissions, but you're not using
/// an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
/// Method Not Allowed error.
/// GetBucketPolicy, PutBucketPolicy, and DeleteBucketPolicy
/// API actions, even if their bucket policy explicitly denies the root principal's access.
/// Bucket owner root principals can only be blocked from performing these API actions
/// by VPC endpoint policies and Amazon Web Services Organizations policies.
/// InvalidAccessPointAliasError
/// is returned. For more information about InvalidAccessPointAliasError,
/// see List
/// of Error Codes.
/// GetBucketPolicy:
/// s3:GetBucketPolicyStatus
/// permission. For more information about Amazon S3 permissions, see Specifying
/// Permissions in a Policy.
///
///
/// GetBucketPolicyStatus:
/// GetBucketRequestPayment:
/// GetBucketRequestPayment:
/// s3:GetBucketTagging
/// action. By default, the bucket owner has this permission and can grant this permission
/// to others.
/// GetBucketTagging has the following special error:
/// NoSuchTagSet
/// GetBucketTagging:
/// enabled, the bucket owner must use an authentication
/// device to change the versioning state of the bucket.
/// GetBucketVersioning:
/// enabled, the bucket owner must use an authentication
/// device to change the versioning state of the bucket.
/// GetBucketVersioning:
/// S3:GetBucketWebsite permission. By default,
/// only the bucket owner can read the bucket website configuration. However, bucket owners
/// can allow other users to read the website configuration by writing a bucket policy
/// granting them the S3:GetBucketWebsite permission.
/// GetBucketWebsite:
/// S3:GetBucketWebsite permission. By default,
/// only the bucket owner can read the bucket website configuration. However, bucket owners
/// can allow other users to read the website configuration by writing a bucket policy
/// granting them the S3:GetBucketWebsite permission.
/// GetBucketWebsite:
/// s3:GetBucketCORS
/// action. By default, the bucket owner has this permission and can grant it to others.
/// InvalidAccessPointAliasError
/// is returned. For more information about InvalidAccessPointAliasError,
/// see List
/// of Error Codes.
/// GetBucketCors:
/// InvalidAccessPointAliasError is returned. For more information about InvalidAccessPointAliasError, see List of Error Codes.
///
/// A cancellation token that can be used by other objects or threads to receive notice of cancellation.
///
///
/// s3:GetBucketCORS
/// action. By default, the bucket owner has this permission and can grant it to others.
/// InvalidAccessPointAliasError
/// is returned. For more information about InvalidAccessPointAliasError,
/// see List
/// of Error Codes.
/// GetBucketCors:
/// s3:GetLifecycleConfiguration
/// action. The bucket owner has this permission, by default. The bucket owner can grant
/// this permission to others. For more information about permissions, see Permissions
/// Related to Bucket Subresource Operations and Managing
/// Access Permissions to Your Amazon S3 Resources.
/// GetBucketLifecycleConfiguration has the following special error:
/// NoSuchLifecycleConfiguration
/// GetBucketLifecycleConfiguration:
/// s3:GetLifecycleConfiguration
/// action. The bucket owner has this permission, by default. The bucket owner can grant
/// this permission to others. For more information about permissions, see Permissions
/// Related to Bucket Subresource Operations and Managing
/// Access Permissions to Your Amazon S3 Resources.
/// GetBucketLifecycleConfiguration has the following special error:
/// NoSuchLifecycleConfiguration
/// GetBucketLifecycleConfiguration:
/// GET, you must have READ
/// access to the object. If you grant READ access to the anonymous user,
/// you can return the object without using an authorization header.
///
///
/// sample.jpg, you can name it photos/2006/February/sample.jpg.
/// GET operation. For a virtual hosted-style request example,
/// if you have the object photos/2006/February/sample.jpg, specify the resource
/// as /photos/2006/February/sample.jpg. For a path-style request example,
/// if you have the object photos/2006/February/sample.jpg in the bucket
/// named examplebucket, specify the resource as /examplebucket/photos/2006/February/sample.jpg.
/// For more information about request types, see HTTP
/// Host Header Bucket Specification.
/// InvalidObjectState error. For information
/// about restoring archived objects, see Restoring
/// Archived Objects.
/// x-amz-server-side-encryption, should
/// not be sent for GET requests if your object uses server-side encryption with Key Management
/// Service (KMS) keys (SSE-KMS), dual-layer server-side encryption with Amazon Web Services
/// KMS keys (DSSE-KMS), or server-side encryption with Amazon S3 managed encryption keys
/// (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400 Bad
/// Request error.
/// x-amz-server-side-encryption-customer-algorithm
/// x-amz-server-side-encryption-customer-key
/// x-amz-server-side-encryption-customer-key-MD5
/// x-amz-tagging-count header that provides the count of number of tags
/// associated with the object. You can use GetObjectTagging
/// to retrieve the tag set associated with an object.
/// s3:ListBucket
/// permission.
/// s3:ListBucket permission on the bucket, Amazon S3 returns
/// an HTTP status code 404 (Not Found) error.
/// s3:ListBucket permission, Amazon S3 returns an
/// HTTP status code 403 ("access denied") error.
/// GET action returns the current version of an object.
/// To return a different version, use the versionId subresource.
/// versionId, you need the s3:GetObjectVersion
/// permission to access a specific version of an object. If you request a specific version,
/// you do not need to have the s3:GetObject permission. If you request the
/// current version without a specific version ID, only s3:GetObject permission
/// is required. s3:GetObjectVersion permission won't be required.
/// x-amz-delete-marker: true in the response.
/// GET
/// response. For example, you might override the Content-Disposition response
/// header value in your GET request.
/// GET response are Content-Type,
/// Content-Language, Expires, Cache-Control, Content-Disposition,
/// and Content-Encoding. To override these header values in the GET
/// response, you use the following request parameters.
/// response-content-type
/// response-content-language
/// response-expires
/// response-cache-control
/// response-content-disposition
/// response-content-encoding
/// If-Match and If-Unmodified-Since headers
/// are present in the request as follows: If-Match condition evaluates to
/// true, and; If-Unmodified-Since condition evaluates to false;
/// then, S3 returns 200 OK and the data requested.
/// If-None-Match and If-Modified-Since headers
/// are present in the request as follows: If-None-Match condition evaluates
/// to false, and; If-Modified-Since condition evaluates to
/// true; then, S3 returns 304 Not Modified response code.
/// GetObject:
/// AccessPointName-AccountId.outpostID.s3-outposts.Region.amazonaws.com. When you use this action with S3 on Outposts through the Amazon Web Services SDKs, you provide the Outposts access point ARN in place of the bucket name. For more information about S3 on Outposts ARNs, see What is S3 on Outposts? in the Amazon S3 User Guide.
/// Key of the object to get.
///
/// A cancellation token that can be used by other objects or threads to receive notice of cancellation.
///
///
/// GET, you must have READ
/// access to the object. If you grant READ access to the anonymous user,
/// you can return the object without using an authorization header.
///
///
/// sample.jpg, you can name it photos/2006/February/sample.jpg.
/// GET operation. For a virtual hosted-style request example,
/// if you have the object photos/2006/February/sample.jpg, specify the resource
/// as /photos/2006/February/sample.jpg. For a path-style request example,
/// if you have the object photos/2006/February/sample.jpg in the bucket
/// named examplebucket, specify the resource as /examplebucket/photos/2006/February/sample.jpg.
/// For more information about request types, see HTTP
/// Host Header Bucket Specification.
/// InvalidObjectState error. For information
/// about restoring archived objects, see Restoring
/// Archived Objects.
/// x-amz-server-side-encryption, should
/// not be sent for GET requests if your object uses server-side encryption with Key Management
/// Service (KMS) keys (SSE-KMS), dual-layer server-side encryption with Amazon Web Services
/// KMS keys (DSSE-KMS), or server-side encryption with Amazon S3 managed encryption keys
/// (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400 Bad
/// Request error.
/// x-amz-server-side-encryption-customer-algorithm
/// x-amz-server-side-encryption-customer-key
/// x-amz-server-side-encryption-customer-key-MD5
/// x-amz-tagging-count header that provides the count of number of tags
/// associated with the object. You can use GetObjectTagging
/// to retrieve the tag set associated with an object.
/// s3:ListBucket
/// permission.
/// s3:ListBucket permission on the bucket, Amazon S3 returns
/// an HTTP status code 404 (Not Found) error.
/// s3:ListBucket permission, Amazon S3 returns an
/// HTTP status code 403 ("access denied") error.
/// GET action returns the current version of an object.
/// To return a different version, use the versionId subresource.
/// versionId, you need the s3:GetObjectVersion
/// permission to access a specific version of an object. If you request a specific version,
/// you do not need to have the s3:GetObject permission. If you request the
/// current version without a specific version ID, only s3:GetObject permission
/// is required. s3:GetObjectVersion permission won't be required.
/// x-amz-delete-marker: true in the response.
/// GET
/// response. For example, you might override the Content-Disposition response
/// header value in your GET request.
/// GET response are Content-Type,
/// Content-Language, Expires, Cache-Control, Content-Disposition,
/// and Content-Encoding. To override these header values in the GET
/// response, you use the following request parameters.
/// response-content-type
/// response-content-language
/// response-expires
/// response-cache-control
/// response-content-disposition
/// response-content-encoding
/// If-Match and If-Unmodified-Since headers
/// are present in the request as follows: If-Match condition evaluates to
/// true, and; If-Unmodified-Since condition evaluates to false;
/// then, S3 returns 200 OK and the data requested.
/// If-None-Match and If-Modified-Since headers
/// are present in the request as follows: If-None-Match condition evaluates
/// to false, and; If-Modified-Since condition evaluates to
/// true; then, S3 returns 304 Not Modified response code.
/// GetObject:
/// AccessPointName-AccountId.outpostID.s3-outposts.Region.amazonaws.com. When you use this action with S3 on Outposts through the Amazon Web Services SDKs, you provide the Outposts access point ARN in place of the bucket name. For more information about S3 on Outposts ARNs, see What is S3 on Outposts? in the Amazon S3 User Guide.
/// Key of the object to get.
/// VersionId used to reference a specific version of the object.
///
/// A cancellation token that can be used by other objects or threads to receive notice of cancellation.
///
///
/// GET, you must have READ
/// access to the object. If you grant READ access to the anonymous user,
/// you can return the object without using an authorization header.
///
///
/// sample.jpg, you can name it photos/2006/February/sample.jpg.
/// GET operation. For a virtual hosted-style request example,
/// if you have the object photos/2006/February/sample.jpg, specify the resource
/// as /photos/2006/February/sample.jpg. For a path-style request example,
/// if you have the object photos/2006/February/sample.jpg in the bucket
/// named examplebucket, specify the resource as /examplebucket/photos/2006/February/sample.jpg.
/// For more information about request types, see HTTP
/// Host Header Bucket Specification.
/// InvalidObjectState error. For information
/// about restoring archived objects, see Restoring
/// Archived Objects.
/// x-amz-server-side-encryption, should
/// not be sent for GET requests if your object uses server-side encryption with Key Management
/// Service (KMS) keys (SSE-KMS), dual-layer server-side encryption with Amazon Web Services
/// KMS keys (DSSE-KMS), or server-side encryption with Amazon S3 managed encryption keys
/// (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400 Bad
/// Request error.
/// x-amz-server-side-encryption-customer-algorithm
/// x-amz-server-side-encryption-customer-key
/// x-amz-server-side-encryption-customer-key-MD5
/// x-amz-tagging-count header that provides the count of number of tags
/// associated with the object. You can use GetObjectTagging
/// to retrieve the tag set associated with an object.
/// s3:ListBucket
/// permission.
/// s3:ListBucket permission on the bucket, Amazon S3 returns
/// an HTTP status code 404 (Not Found) error.
/// s3:ListBucket permission, Amazon S3 returns an
/// HTTP status code 403 ("access denied") error.
/// GET action returns the current version of an object.
/// To return a different version, use the versionId subresource.
/// versionId, you need the s3:GetObjectVersion
/// permission to access a specific version of an object. If you request a specific version,
/// you do not need to have the s3:GetObject permission. If you request the
/// current version without a specific version ID, only s3:GetObject permission
/// is required. s3:GetObjectVersion permission won't be required.
/// x-amz-delete-marker: true in the response.
/// GET
/// response. For example, you might override the Content-Disposition response
/// header value in your GET request.
/// GET response are Content-Type,
/// Content-Language, Expires, Cache-Control, Content-Disposition,
/// and Content-Encoding. To override these header values in the GET
/// response, you use the following request parameters.
/// response-content-type
/// response-content-language
/// response-expires
/// response-cache-control
/// response-content-disposition
/// response-content-encoding
/// If-Match and If-Unmodified-Since headers
/// are present in the request as follows: If-Match condition evaluates to
/// true, and; If-Unmodified-Since condition evaluates to false;
/// then, S3 returns 200 OK and the data requested.
/// If-None-Match and If-Modified-Since headers
/// are present in the request as follows: If-None-Match condition evaluates
/// to false, and; If-Modified-Since condition evaluates to
/// true; then, S3 returns 304 Not Modified response code.
/// GetObject:
/// GetObjectAttributes,
/// you must have READ access to the object.
///
///
/// GetObjectAttributes combines the functionality of HeadObject
/// and ListParts. All of the data returned with each of those individual
/// calls can be returned with a single call to GetObjectAttributes.
/// x-amz-server-side-encryption-customer-algorithm
/// x-amz-server-side-encryption-customer-key
/// x-amz-server-side-encryption-customer-key-MD5
/// x-amz-server-side-encryption, should
/// not be sent for GET requests if your object uses server-side encryption with Amazon
/// Web Services KMS keys stored in Amazon Web Services Key Management Service (SSE-KMS)
/// or server-side encryption with Amazon S3 managed keys (SSE-S3). If your object does
/// use these types of keys, you'll get an HTTP 400 Bad Request error.
/// If-Match and If-Unmodified-Since headers
/// are present in the request as follows, then Amazon S3 returns the HTTP status code
/// 200 OK and the data requested:
/// If-Match condition evaluates to true.
/// If-Unmodified-Since condition evaluates to false.
/// If-None-Match and If-Modified-Since headers
/// are present in the request as follows, then Amazon S3 returns the HTTP status code
/// 304 Not Modified:
/// If-None-Match condition evaluates to false.
/// If-Modified-Since condition evaluates to true.
/// s3:GetObjectVersion
/// and s3:GetObjectVersionAttributes permissions for this operation. If
/// the bucket is not versioned, you need the s3:GetObject and s3:GetObjectAttributes
/// permissions. For more information, see Specifying
/// Permissions in a Policy in the Amazon S3 User Guide. If the object that
/// you request does not exist, the error Amazon S3 returns depends on whether you also
/// have the s3:ListBucket permission.
/// s3:ListBucket permission on the bucket, Amazon S3 returns
/// an HTTP status code 404 Not Found ("no such key") error.
/// s3:ListBucket permission, Amazon S3 returns an
/// HTTP status code 403 Forbidden ("access denied") error.
/// GetObjectAttributes:
/// GetObjectLegalHold:
/// GetObjectLockConfiguration:
/// HEAD action retrieves metadata from an object without returning the
/// object itself. This action is useful if you're only interested in an object's metadata.
/// To use HEAD, you must have READ access to the object.
///
///
/// HEAD request has the same options as a GET action on an
/// object. The response is identical to the GET response except that there
/// is no response body. Because of this, if the HEAD request generates an
/// error, it returns a generic 400 Bad Request, 403 Forbidden
/// or 404 Not Found code. It is not possible to retrieve the exact exception
/// beyond these error codes.
/// x-amz-server-side-encryption-customer-algorithm
/// x-amz-server-side-encryption-customer-key
/// x-amz-server-side-encryption-customer-key-MD5
/// x-amz-server-side-encryption, should
/// not be sent for GET requests if your object uses server-side encryption
/// with Key Management Service (KMS) keys (SSE-KMS), dual-layer server-side encryption
/// with Amazon Web Services KMS keys (DSSE-KMS), or server-side encryption with Amazon
/// S3 managed encryption keys (SSE-S3). If your object does use these types of keys,
/// you’ll get an HTTP 400 Bad Request error.
/// If-Match and If-Unmodified-Since
/// headers are present in the request as follows:
/// If-Match condition evaluates to true, and;
/// If-Unmodified-Since condition evaluates to false;
/// 200 OK and the data requested.
/// If-None-Match and If-Modified-Since
/// headers are present in the request as follows:
/// If-None-Match condition evaluates to false, and;
/// If-Modified-Since condition evaluates to true;
/// 304 Not Modified response code.
/// s3:ListBucket permission on the bucket, Amazon S3 returns
/// an HTTP status code 404 error.
/// s3:ListBucket permission, Amazon S3 returns an
/// HTTP status code 403 error.
/// HeadObject:
/// AccessPointName-AccountId.outpostID.s3-outposts.Region.amazonaws.com. When you use this action with S3 on Outposts through the Amazon Web Services SDKs, you provide the Outposts access point ARN in place of the bucket name. For more information about S3 on Outposts ARNs, see What is S3 on Outposts? in the Amazon S3 User Guide.
/// The object key.
///
/// A cancellation token that can be used by other objects or threads to receive notice of cancellation.
///
///
/// HEAD action retrieves metadata from an object without returning the
/// object itself. This action is useful if you're only interested in an object's metadata.
/// To use HEAD, you must have READ access to the object.
///
///
/// HEAD request has the same options as a GET action on an
/// object. The response is identical to the GET response except that there
/// is no response body. Because of this, if the HEAD request generates an
/// error, it returns a generic 400 Bad Request, 403 Forbidden
/// or 404 Not Found code. It is not possible to retrieve the exact exception
/// beyond these error codes.
/// x-amz-server-side-encryption-customer-algorithm
/// x-amz-server-side-encryption-customer-key
/// x-amz-server-side-encryption-customer-key-MD5
/// x-amz-server-side-encryption, should
/// not be sent for GET requests if your object uses server-side encryption
/// with Key Management Service (KMS) keys (SSE-KMS), dual-layer server-side encryption
/// with Amazon Web Services KMS keys (DSSE-KMS), or server-side encryption with Amazon
/// S3 managed encryption keys (SSE-S3). If your object does use these types of keys,
/// you’ll get an HTTP 400 Bad Request error.
/// If-Match and If-Unmodified-Since
/// headers are present in the request as follows:
/// If-Match condition evaluates to true, and;
/// If-Unmodified-Since condition evaluates to false;
/// 200 OK and the data requested.
/// If-None-Match and If-Modified-Since
/// headers are present in the request as follows:
/// If-None-Match condition evaluates to false, and;
/// If-Modified-Since condition evaluates to true;
/// 304 Not Modified response code.
/// s3:ListBucket permission on the bucket, Amazon S3 returns
/// an HTTP status code 404 error.
/// s3:ListBucket permission, Amazon S3 returns an
/// HTTP status code 403 error.
/// HeadObject:
/// AccessPointName-AccountId.outpostID.s3-outposts.Region.amazonaws.com. When you use this action with S3 on Outposts through the Amazon Web Services SDKs, you provide the Outposts access point ARN in place of the bucket name. For more information about S3 on Outposts ARNs, see What is S3 on Outposts? in the Amazon S3 User Guide.
/// The object key.
/// VersionId used to reference a specific version of the object.
///
/// A cancellation token that can be used by other objects or threads to receive notice of cancellation.
///
///
/// HEAD action retrieves metadata from an object without returning the
/// object itself. This action is useful if you're only interested in an object's metadata.
/// To use HEAD, you must have READ access to the object.
///
///
/// HEAD request has the same options as a GET action on an
/// object. The response is identical to the GET response except that there
/// is no response body. Because of this, if the HEAD request generates an
/// error, it returns a generic 400 Bad Request, 403 Forbidden
/// or 404 Not Found code. It is not possible to retrieve the exact exception
/// beyond these error codes.
/// x-amz-server-side-encryption-customer-algorithm
/// x-amz-server-side-encryption-customer-key
/// x-amz-server-side-encryption-customer-key-MD5
/// x-amz-server-side-encryption, should
/// not be sent for GET requests if your object uses server-side encryption
/// with Key Management Service (KMS) keys (SSE-KMS), dual-layer server-side encryption
/// with Amazon Web Services KMS keys (DSSE-KMS), or server-side encryption with Amazon
/// S3 managed encryption keys (SSE-S3). If your object does use these types of keys,
/// you’ll get an HTTP 400 Bad Request error.
/// If-Match and If-Unmodified-Since
/// headers are present in the request as follows:
/// If-Match condition evaluates to true, and;
/// If-Unmodified-Since condition evaluates to false;
/// 200 OK and the data requested.
/// If-None-Match and If-Modified-Since
/// headers are present in the request as follows:
/// If-None-Match condition evaluates to false, and;
/// If-Modified-Since condition evaluates to true;
/// 304 Not Modified response code.
/// s3:ListBucket permission on the bucket, Amazon S3 returns
/// an HTTP status code 404 error.
/// s3:ListBucket permission, Amazon S3 returns an
/// HTTP status code 403 error.
/// HeadObject:
/// GetObjectRetention:
/// s3:GetObjectTagging
/// action. By default, the GET action returns information about current version of an
/// object. For a versioned bucket, you can have multiple versions of an object in your
/// bucket. To retrieve tags of any other version, use the versionId query parameter.
/// You also need permission for the s3:GetObjectVersionTagging action.
/// GetObjectTagging:
/// GetObjectTorrent:
/// GetObjectTorrent:
/// PublicAccessBlock configuration for an Amazon S3 bucket.
/// To use this operation, you must have the s3:GetBucketPublicAccessBlock
/// permission. For more information about Amazon S3 permissions, see Specifying
/// Permissions in a Policy.
///
/// PublicAccessBlock configuration for a bucket
/// or an object, it checks the PublicAccessBlock configuration for both
/// the bucket (or the bucket that contains the object) and the bucket owner's account.
/// If the PublicAccessBlock settings are different between the bucket and
/// the account, Amazon S3 uses the most restrictive combination of the bucket-level and
/// account-level settings.
/// GetPublicAccessBlock:
/// 200 OK if the bucket exists and you have permission
/// to access it.
///
///
/// HEAD
/// request returns a generic 400 Bad Request, 403 Forbidden
/// or 404 Not Found code. A message body is not included, so you cannot
/// determine the exception beyond these error codes.
/// s3:ListBucket
/// action. The bucket owner has this permission by default and can grant this permission
/// to others. For more information about permissions, see Permissions
/// Related to Bucket Subresource Operations and Managing
/// Access Permissions to Your Amazon S3 Resources.
/// InvalidAccessPointAliasError
/// is returned. For more information about InvalidAccessPointAliasError,
/// see List
/// of Error Codes.
/// CreateMultipartUpload. You can request that Amazon S3 save the
/// uploaded parts encrypted with server-side encryption with an Amazon S3 managed key
/// (SSE-S3), an Key Management Service (KMS) key (SSE-KMS), or a customer-provided encryption
/// key (SSE-C).
/// kms:Decrypt and kms:GenerateDataKey*
/// actions on the key. These permissions are required because Amazon S3 must decrypt
/// and read data from the encrypted file parts before it completes the multipart upload.
/// For more information, see Multipart
/// upload API and permissions and Protecting
/// data using server-side encryption with Amazon Web Services KMS in the Amazon
/// S3 User Guide.
/// x-amz-acl request header. For more information,
/// see Canned
/// ACL.
/// x-amz-grant-read, x-amz-grant-read-acp,
/// x-amz-grant-write-acp, and x-amz-grant-full-control headers.
/// These parameters map to the set of permissions that Amazon S3 supports in an ACL.
/// For more information, see Access
/// Control List (ACL) Overview.
/// aws/s3)
/// and KMS customer managed keys stored in Key Management Service (KMS) – If you want
/// Amazon Web Services to manage the keys used to encrypt data, specify the following
/// headers in the request.
/// x-amz-server-side-encryption
/// x-amz-server-side-encryption-aws-kms-key-id
/// x-amz-server-side-encryption-context
/// x-amz-server-side-encryption:aws:kms, but don't provide
/// x-amz-server-side-encryption-aws-kms-key-id, Amazon S3 uses the Amazon
/// Web Services managed key (aws/s3 key) in KMS to protect the data.
/// GET and PUT requests for an object protected by KMS
/// fail if you don't make them by using Secure Sockets Layer (SSL), Transport Layer Security
/// (TLS), or Signature Version 4.
/// x-amz-server-side-encryption-customer-algorithm
/// x-amz-server-side-encryption-customer-key
/// x-amz-server-side-encryption-customer-key-MD5
/// x-amz-acl) — Amazon S3 supports a set of predefined
/// ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
/// and permissions. For more information, see Canned
/// ACL.
/// x-amz-grant-read
/// x-amz-grant-write
/// x-amz-grant-read-acp
/// x-amz-grant-write-acp
/// x-amz-grant-full-control
/// id – if the value specified is the canonical user ID of an Amazon Web
/// Services account
/// uri – if you are granting permissions to a predefined group
/// emailAddress – if the value specified is the email address of an Amazon
/// Web Services account
/// x-amz-grant-read header grants the Amazon
/// Web Services accounts identified by account IDs permissions to read object data and
/// its metadata:
/// x-amz-grant-read: id="11112222333", id="444455556666"
/// CreateMultipartUpload:
/// AccessPointName-AccountId.outpostID.s3-outposts.Region.amazonaws.com. When you use this action with S3 on Outposts through the Amazon Web Services SDKs, you provide the Outposts access point ARN in place of the bucket name. For more information about S3 on Outposts ARNs, see What is S3 on Outposts? in the Amazon S3 User Guide.
/// Object key for which the multipart upload is to be initiated.
///
/// A cancellation token that can be used by other objects or threads to receive notice of cancellation.
///
///
/// CreateMultipartUpload. You can request that Amazon S3 save the
/// uploaded parts encrypted with server-side encryption with an Amazon S3 managed key
/// (SSE-S3), an Key Management Service (KMS) key (SSE-KMS), or a customer-provided encryption
/// key (SSE-C).
/// kms:Decrypt and kms:GenerateDataKey*
/// actions on the key. These permissions are required because Amazon S3 must decrypt
/// and read data from the encrypted file parts before it completes the multipart upload.
/// For more information, see Multipart
/// upload API and permissions and Protecting
/// data using server-side encryption with Amazon Web Services KMS in the Amazon
/// S3 User Guide.
/// x-amz-acl request header. For more information,
/// see Canned
/// ACL.
/// x-amz-grant-read, x-amz-grant-read-acp,
/// x-amz-grant-write-acp, and x-amz-grant-full-control headers.
/// These parameters map to the set of permissions that Amazon S3 supports in an ACL.
/// For more information, see Access
/// Control List (ACL) Overview.
/// aws/s3)
/// and KMS customer managed keys stored in Key Management Service (KMS) – If you want
/// Amazon Web Services to manage the keys used to encrypt data, specify the following
/// headers in the request.
/// x-amz-server-side-encryption
/// x-amz-server-side-encryption-aws-kms-key-id
/// x-amz-server-side-encryption-context
/// x-amz-server-side-encryption:aws:kms, but don't provide
/// x-amz-server-side-encryption-aws-kms-key-id, Amazon S3 uses the Amazon
/// Web Services managed key (aws/s3 key) in KMS to protect the data.
/// GET and PUT requests for an object protected by KMS
/// fail if you don't make them by using Secure Sockets Layer (SSL), Transport Layer Security
/// (TLS), or Signature Version 4.
/// x-amz-server-side-encryption-customer-algorithm
/// x-amz-server-side-encryption-customer-key
/// x-amz-server-side-encryption-customer-key-MD5
/// x-amz-acl) — Amazon S3 supports a set of predefined
/// ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
/// and permissions. For more information, see Canned
/// ACL.
/// x-amz-grant-read
/// x-amz-grant-write
/// x-amz-grant-read-acp
/// x-amz-grant-write-acp
/// x-amz-grant-full-control
/// id – if the value specified is the canonical user ID of an Amazon Web
/// Services account
/// uri – if you are granting permissions to a predefined group
/// emailAddress – if the value specified is the email address of an Amazon
/// Web Services account
/// x-amz-grant-read header grants the Amazon
/// Web Services accounts identified by account IDs permissions to read object data and
/// its metadata:
/// x-amz-grant-read: id="11112222333", id="444455556666"
/// CreateMultipartUpload:
/// IsTruncated element in the response.
/// If there are no more configurations to list, IsTruncated is set to false.
/// If there are more configurations to list, IsTruncated is set to true,
/// and there will be a value in NextContinuationToken. You use the NextContinuationToken
/// value to continue the pagination of the list by passing the value in continuation-token
/// in the request to GET the next page.
/// s3:GetAnalyticsConfiguration
/// action. The bucket owner has this permission by default. The bucket owner can grant
/// this permission to others. For more information about permissions, see Permissions
/// Related to Bucket Subresource Operations and Managing
/// Access Permissions to Your Amazon S3 Resources.
/// ListBucketAnalyticsConfigurations:
/// ListBucketIntelligentTieringConfigurations include:
///
/// IsTruncated element in the response. If there
/// are no more configurations to list, IsTruncated is set to false. If there
/// are more configurations to list, IsTruncated is set to true, and there
/// is a value in NextContinuationToken. You use the NextContinuationToken
/// value to continue the pagination of the list by passing the value in continuation-token
/// in the request to GET the next page.
/// s3:GetInventoryConfiguration
/// action. The bucket owner has this permission by default. The bucket owner can grant
/// this permission to others. For more information about permissions, see Permissions
/// Related to Bucket Subresource Operations and Managing
/// Access Permissions to Your Amazon S3 Resources.
/// ListBucketInventoryConfigurations:
/// IsTruncated element in the response. If there
/// are no more configurations to list, IsTruncated is set to false. If there
/// are more configurations to list, IsTruncated is set to true, and there
/// is a value in NextContinuationToken. You use the NextContinuationToken
/// value to continue the pagination of the list by passing the value in continuation-token
/// in the request to GET the next page.
/// s3:GetMetricsConfiguration
/// action. The bucket owner has this permission by default. The bucket owner can grant
/// this permission to others. For more information about permissions, see Permissions
/// Related to Bucket Subresource Operations and Managing
/// Access Permissions to Your Amazon S3 Resources.
/// ListBucketMetricsConfigurations:
/// s3:ListAllMyBuckets permission.
///
///
///
/// s3:ListAllMyBuckets permission.
///
///
///
/// max-uploads parameter in the response. If additional multipart uploads
/// satisfy the list criteria, the response will contain an IsTruncated element
/// with the value true. To list the additional multipart uploads, use the key-marker
/// and upload-id-marker request parameters.
/// ListMultipartUploads:
/// AccessPointName-AccountId.outpostID.s3-outposts.Region.amazonaws.com. When you use this action with S3 on Outposts through the Amazon Web Services SDKs, you provide the Outposts access point ARN in place of the bucket name. For more information about S3 on Outposts ARNs, see What is S3 on Outposts? in the Amazon S3 User Guide.
///
/// A cancellation token that can be used by other objects or threads to receive notice of cancellation.
///
///
/// max-uploads parameter in the response. If additional multipart uploads
/// satisfy the list criteria, the response will contain an IsTruncated element
/// with the value true. To list the additional multipart uploads, use the key-marker
/// and upload-id-marker request parameters.
/// ListMultipartUploads:
/// AccessPointName-AccountId.outpostID.s3-outposts.Region.amazonaws.com. When you use this action with S3 on Outposts through the Amazon Web Services SDKs, you provide the Outposts access point ARN in place of the bucket name. For more information about S3 on Outposts ARNs, see What is S3 on Outposts? in the Amazon S3 User Guide.
/// Lists in-progress uploads only for those keys that begin with the specified prefix. You can use prefixes to separate a bucket into different grouping of keys. (You can think of using prefix to make groups in the same way that you'd use a folder in a file system.)
///
/// A cancellation token that can be used by other objects or threads to receive notice of cancellation.
///
///
/// max-uploads parameter in the response. If additional multipart uploads
/// satisfy the list criteria, the response will contain an IsTruncated element
/// with the value true. To list the additional multipart uploads, use the key-marker
/// and upload-id-marker request parameters.
/// ListMultipartUploads:
/// ListObjects.
/// ListObjects:
/// AccessPointName-AccountId.outpostID.s3-outposts.Region.amazonaws.com. When you use this action with S3 on Outposts through the Amazon Web Services SDKs, you provide the Outposts access point ARN in place of the bucket name. For more information about S3 on Outposts ARNs, see What is S3 on Outposts? in the Amazon S3 User Guide.
///
/// A cancellation token that can be used by other objects or threads to receive notice of cancellation.
///
///
/// ListObjects.
/// ListObjects:
/// AccessPointName-AccountId.outpostID.s3-outposts.Region.amazonaws.com. When you use this action with S3 on Outposts through the Amazon Web Services SDKs, you provide the Outposts access point ARN in place of the bucket name. For more information about S3 on Outposts ARNs, see What is S3 on Outposts? in the Amazon S3 User Guide.
/// Limits the response to keys that begin with the specified prefix.
///
/// A cancellation token that can be used by other objects or threads to receive notice of cancellation.
///
///
/// ListObjects.
/// ListObjects:
/// 200 OK response can contain valid or invalid XML. Make
/// sure to design your application to parse the contents of the response and handle it
/// appropriately. Objects are returned sorted in an ascending order of the respective
/// key names in the list. For more information about listing objects, see Listing
/// object keys programmatically in the Amazon S3 User Guide.
///
///
/// s3:ListBucket action. The bucket owner has
/// this permission by default and can grant this permission to others. For more information
/// about permissions, see Permissions
/// Related to Bucket Subresource Operations and Managing
/// Access Permissions to Your Amazon S3 Resources in the Amazon S3 User Guide.
/// ListObjectsV2:
/// max-parts request parameter. If your multipart upload consists of
/// more than 1,000 parts, the response returns an IsTruncated field with
/// the value of true, and a NextPartNumberMarker element. In subsequent
/// ListParts requests you can include the part-number-marker query string
/// parameter and set its value to the NextPartNumberMarker field value from
/// the previous response.
///
///
/// kms:Decrypt action for the request to succeed.
/// ListParts:
/// AccessPointName-AccountId.outpostID.s3-outposts.Region.amazonaws.com. When you use this action with S3 on Outposts through the Amazon Web Services SDKs, you provide the Outposts access point ARN in place of the bucket name. For more information about S3 on Outposts ARNs, see What is S3 on Outposts? in the Amazon S3 User Guide.
/// Object key for which the multipart upload was initiated.
/// Upload ID identifying the multipart upload whose parts are being listed.
///
/// A cancellation token that can be used by other objects or threads to receive notice of cancellation.
///
///
/// max-parts request parameter. If your multipart upload consists of
/// more than 1,000 parts, the response returns an IsTruncated field with
/// the value of true, and a NextPartNumberMarker element. In subsequent
/// ListParts requests you can include the part-number-marker query string
/// parameter and set its value to the NextPartNumberMarker field value from
/// the previous response.
///
///
/// kms:Decrypt action for the request to succeed.
/// ListParts:
/// s3:ListBucketVersions
/// action. Be aware of the name difference.
/// 200 OK response can contain valid or invalid XML. Make sure to design
/// your application to parse the contents of the response and handle it appropriately.
/// ListObjectVersions:
/// s3:ListBucketVersions
/// action. Be aware of the name difference.
/// 200 OK response can contain valid or invalid XML. Make sure to design
/// your application to parse the contents of the response and handle it appropriately.
/// ListObjectVersions:
/// prefix to make groups in the same way that you'd use a folder in a file system.) You can use prefix with delimiter to roll up numerous objects into a single result under CommonPrefixes.
///
/// A cancellation token that can be used by other objects or threads to receive notice of cancellation.
///
///
/// s3:ListBucketVersions
/// action. Be aware of the name difference.
/// 200 OK response can contain valid or invalid XML. Make sure to design
/// your application to parse the contents of the response and handle it appropriately.
/// ListObjectVersions:
/// WRITE_ACP permission.
///
///
/// AccessControlListNotSupported error code. Requests to read
/// ACLs are still supported. For more information, see Controlling
/// object ownership in the Amazon S3 User Guide.
/// x-amz-acl request header. Amazon S3 supports
/// a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined
/// set of grantees and permissions. Specify the canned ACL name as the value of x-amz-acl.
/// If you use this header, you cannot use other access control-specific headers in your
/// request. For more information, see Canned
/// ACL.
/// x-amz-grant-read, x-amz-grant-read-acp,
/// x-amz-grant-write-acp, and x-amz-grant-full-control headers.
/// When using these headers, you specify explicit access permissions and grantees (Amazon
/// Web Services accounts or Amazon S3 groups) who will receive the permission. If you
/// use these ACL-specific headers, you cannot use the x-amz-acl header to
/// set a canned ACL. These parameters map to the set of permissions that Amazon S3 supports
/// in an ACL. For more information, see Access
/// Control List (ACL) Overview.
/// id – if the value specified is the canonical user ID of an Amazon Web
/// Services account
/// uri – if you are granting permissions to a predefined group
/// emailAddress – if the value specified is the email address of an Amazon
/// Web Services account
/// x-amz-grant-write header grants create, overwrite,
/// and delete objects permission to LogDelivery group predefined by Amazon S3 and two
/// Amazon Web Services accounts identified by their email addresses.
/// x-amz-grant-write: uri="http://acs.amazonaws.com/groups/s3/LogDelivery", id="111122223333",
/// id="555566667777"
/// <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName>
/// </Grantee>
/// <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.amazonaws.com/groups/global/AuthenticatedUsers<></URI></Grantee>
///
/// <Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress>&</Grantee>
///
/// PutBucketAcl:
/// s3.amazonaws.com endpoint,
/// the request goes to the us-east-1 Region. Accordingly, the signature
/// calculations in Signature Version 4 must use us-east-1 as the Region,
/// even if the location constraint in the request specifies another Region where the
/// bucket is to be created. If you create a bucket in a Region other than US East (N.
/// Virginia), your application must be able to handle 307 redirect. For more information,
/// see Virtual
/// hosting of buckets.
/// s3:CreateBucket, the following permissions are required
/// when your CreateBucket request includes specific headers:
/// CreateBucket request specifies
/// access control list (ACL) permissions and the ACL is public-read, public-read-write,
/// authenticated-read, or if you specify access permissions explicitly through any other
/// ACL, both s3:CreateBucket and s3:PutBucketAcl permissions
/// are needed. If the ACL for the CreateBucket request is private or if
/// the request doesn't specify any ACLs, only s3:CreateBucket permission
/// is needed.
/// ObjectLockEnabledForBucket is set to true in
/// your CreateBucket request, s3:PutBucketObjectLockConfiguration
/// and s3:PutBucketVersioning permissions are required.
/// CreateBucket request includes the
/// x-amz-object-ownership header, then the s3:PutBucketOwnershipControls
/// permission is required. By default, ObjectOwnership is set to BucketOWnerEnforced
/// and ACLs are disabled. We recommend keeping ACLs disabled, except in uncommon use
/// cases where you must control access for each object individually. If you want to change
/// the ObjectOwnership setting, you can use the x-amz-object-ownership
/// header in your CreateBucket request to set the ObjectOwnership
/// setting of your choice. For more information about S3 Object Ownership, see Controlling
/// object ownership in the Amazon S3 User Guide.
/// DeletePublicAccessBlock API. To use this operation, you must have
/// the s3:PutBucketPublicAccessBlock permission. By default, all Block Public
/// Access settings are enabled for new buckets. To avoid inadvertent exposure of your
/// resources, we recommend keeping the S3 Block Public Access settings enabled. For more
/// information about S3 Block Public Access, see Blocking
/// public access to your Amazon S3 storage in the Amazon S3 User Guide.
/// CreateBucket request sets BucketOwnerEnforced for
/// Amazon S3 Object Ownership and specifies a bucket ACL that provides access to an external
/// Amazon Web Services account, your request fails with a 400 error and
/// returns the InvalidBucketAcLWithObjectOwnership error code. For more
/// information, see Setting
/// Object Ownership on an existing bucket in the Amazon S3 User Guide.
/// CreateBucket:
/// s3.amazonaws.com endpoint,
/// the request goes to the us-east-1 Region. Accordingly, the signature
/// calculations in Signature Version 4 must use us-east-1 as the Region,
/// even if the location constraint in the request specifies another Region where the
/// bucket is to be created. If you create a bucket in a Region other than US East (N.
/// Virginia), your application must be able to handle 307 redirect. For more information,
/// see Virtual
/// hosting of buckets.
/// s3:CreateBucket, the following permissions are required
/// when your CreateBucket request includes specific headers:
/// CreateBucket request specifies
/// access control list (ACL) permissions and the ACL is public-read, public-read-write,
/// authenticated-read, or if you specify access permissions explicitly through any other
/// ACL, both s3:CreateBucket and s3:PutBucketAcl permissions
/// are needed. If the ACL for the CreateBucket request is private or if
/// the request doesn't specify any ACLs, only s3:CreateBucket permission
/// is needed.
/// ObjectLockEnabledForBucket is set to true in
/// your CreateBucket request, s3:PutBucketObjectLockConfiguration
/// and s3:PutBucketVersioning permissions are required.
/// CreateBucket request includes the
/// x-amz-object-ownership header, then the s3:PutBucketOwnershipControls
/// permission is required. By default, ObjectOwnership is set to BucketOWnerEnforced
/// and ACLs are disabled. We recommend keeping ACLs disabled, except in uncommon use
/// cases where you must control access for each object individually. If you want to change
/// the ObjectOwnership setting, you can use the x-amz-object-ownership
/// header in your CreateBucket request to set the ObjectOwnership
/// setting of your choice. For more information about S3 Object Ownership, see Controlling
/// object ownership in the Amazon S3 User Guide.
/// DeletePublicAccessBlock API. To use this operation, you must have
/// the s3:PutBucketPublicAccessBlock permission. By default, all Block Public
/// Access settings are enabled for new buckets. To avoid inadvertent exposure of your
/// resources, we recommend keeping the S3 Block Public Access settings enabled. For more
/// information about S3 Block Public Access, see Blocking
/// public access to your Amazon S3 storage in the Amazon S3 User Guide.
/// CreateBucket request sets BucketOwnerEnforced for
/// Amazon S3 Object Ownership and specifies a bucket ACL that provides access to an external
/// Amazon Web Services account, your request fails with a 400 error and
/// returns the InvalidBucketAcLWithObjectOwnership error code. For more
/// information, see Setting
/// Object Ownership on an existing bucket in the Amazon S3 User Guide.
/// CreateBucket:
/// s3:PutAccelerateConfiguration
/// action. The bucket owner has this permission by default. The bucket owner can grant
/// this permission to others. For more information about permissions, see Permissions
/// Related to Bucket Subresource Operations and Managing
/// Access Permissions to Your Amazon S3 Resources.
/// PutBucketAccelerateConfiguration:
/// DataExport request element. Reports are
/// updated daily and are based on the object filters that you configure. When selecting
/// data export, you specify a destination bucket and an optional destination prefix where
/// the file is written. You can export the data to a destination bucket in a different
/// account. However, the destination bucket must be in the same Region as the bucket
/// that you are making the PUT analytics configuration to. For more information, see
/// Amazon
/// S3 Analytics – Storage Class Analysis.
/// s3:PutAnalyticsConfiguration
/// action. The bucket owner has this permission by default. The bucket owner can grant
/// this permission to others. For more information about permissions, see Permissions
/// Related to Bucket Subresource Operations and Managing
/// Access Permissions to Your Amazon S3 Resources.
/// PutBucketAnalyticsConfiguration has the following special errors:
/// PutBucketAnalyticsConfiguration:
/// encryption subresource to configure default encryption
/// and Amazon S3 Bucket Keys for an existing bucket.
///
///
/// s3:PutEncryptionConfiguration
/// action. The bucket owner has this permission by default. The bucket owner can grant
/// this permission to others. For more information about permissions, see Permissions
/// Related to Bucket Subresource Operations and Managing
/// Access Permissions to Your Amazon S3 Resources in the Amazon S3 User Guide.
///
/// PutBucketEncryption:
/// PutBucketIntelligentTieringConfiguration include:
///
///