AbortMultipartUpload
:
/// Bad
/// Request
error. For more information about transfer acceleration, see Transfer
/// Acceleration.
/// Etag
/// matches or whether the object was modified before or after a specified date, use the
/// request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
/// x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
/// x-amz-
prefix, including x-amz-copy-source
,
/// must be signed.
/// StorageClass
parameter. For more information,
/// see Storage
/// Classes.
/// 200 OK
response. This means that
/// a 200 OK
response can contain either a success or an error. Design your
/// application to parse the contents of the response and handle it appropriately.
/// x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
/// headers are present in the request and evaluate as follows, Amazon S3 returns 200
/// OK and copies the data:
/// x-amz-copy-source-if-match
condition evaluates to true
/// x-amz-copy-source-if-unmodified-since
condition evaluates to false
/// x-amz-copy-source-if-none-match
and
/// x-amz-copy-source-if-modified-since
headers are present in the request
/// and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
/// response code:
/// x-amz-copy-source-if-none-match
condition evaluates to false
/// x-amz-copy-source-if-modified-since
condition evaluates to true
/// CopyObject
:
/// x-amz-copy-source
identifies the current version of an object
/// to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
/// was deleted.) To copy a different version, use the versionId
subresource.
/// x-amz-version-id
/// response header in the response.
/// x-amz-acl
request header. For more information,
/// see Canned
/// ACL.
/// x-amz-grant-read
, x-amz-grant-read-acp
,
/// x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
/// These parameters map to the set of permissions that Amazon S3 supports in an ACL.
/// For more information, see Access
/// Control List (ACL) Overview.
/// x-amz-server-side-encryption
/// x-amz-server-side-encryption-aws-kms-key-id
/// x-amz-server-side-encryption-context
/// x-amz-server-side-encryption:aws:kms
, but don't provide
/// x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
/// CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
/// CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
/// of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
/// not asymmetric CMKs. For more information, see Using
/// Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
/// x-amz-acl
) — Amazon S3 supports a set of predefined
/// ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
/// and permissions. For more information, see Canned
/// ACL.
/// emailAddress
– if the value specified is the email address of an AWS
/// account
/// id
– if the value specified is the canonical user ID of an AWS account
/// uri
– if you are granting permissions to a predefined group
/// x-amz-grant-read
header grants the AWS accounts
/// identified by email addresses permissions to read object data and its metadata:
/// x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
///
/// CopyObject
:
/// Bad
/// Request
error. For more information about transfer acceleration, see Transfer
/// Acceleration.
/// Etag
/// matches or whether the object was modified before or after a specified date, use the
/// request parameters x-amz-copy-source-if-match
, x-amz-copy-source-if-none-match
,
/// x-amz-copy-source-if-unmodified-since
, or x-amz-copy-source-if-modified-since
.
/// x-amz-
prefix, including x-amz-copy-source
,
/// must be signed.
/// StorageClass
parameter. For more information,
/// see Storage
/// Classes.
/// 200 OK
response. This means that
/// a 200 OK
response can contain either a success or an error. Design your
/// application to parse the contents of the response and handle it appropriately.
/// x-amz-copy-source-if-match
and x-amz-copy-source-if-unmodified-since
/// headers are present in the request and evaluate as follows, Amazon S3 returns 200
/// OK and copies the data:
/// x-amz-copy-source-if-match
condition evaluates to true
/// x-amz-copy-source-if-unmodified-since
condition evaluates to false
/// x-amz-copy-source-if-none-match
and
/// x-amz-copy-source-if-modified-since
headers are present in the request
/// and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
/// response code:
/// x-amz-copy-source-if-none-match
condition evaluates to false
/// x-amz-copy-source-if-modified-since
condition evaluates to true
/// CopyObject
:
/// x-amz-copy-source
identifies the current version of an object
/// to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
/// was deleted.) To copy a different version, use the versionId
subresource.
/// x-amz-version-id
/// response header in the response.
/// x-amz-acl
request header. For more information,
/// see Canned
/// ACL.
/// x-amz-grant-read
, x-amz-grant-read-acp
,
/// x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
/// These parameters map to the set of permissions that Amazon S3 supports in an ACL.
/// For more information, see Access
/// Control List (ACL) Overview.
/// x-amz-server-side-encryption
/// x-amz-server-side-encryption-aws-kms-key-id
/// x-amz-server-side-encryption-context
/// x-amz-server-side-encryption:aws:kms
, but don't provide
/// x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
/// CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
/// CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
/// of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
/// not asymmetric CMKs. For more information, see Using
/// Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
/// x-amz-acl
) — Amazon S3 supports a set of predefined
/// ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
/// and permissions. For more information, see Canned
/// ACL.
/// emailAddress
– if the value specified is the email address of an AWS
/// account
/// id
– if the value specified is the canonical user ID of an AWS account
/// uri
– if you are granting permissions to a predefined group
/// x-amz-grant-read
header grants the AWS accounts
/// identified by email addresses permissions to read object data and its metadata:
/// x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
///
/// CopyObject
:
/// x-amz-copy-source
in your
/// request and a byte range by adding the request header x-amz-copy-source-range
/// in your request.
///
///
/// UploadPartCopy
operation, see the
/// following:
/// x-amz-copy-source-if-match
,
/// x-amz-copy-source-if-none-match
, x-amz-copy-source-if-unmodified-since
,
/// and x-amz-copy-source-if-modified-since
:
/// x-amz-copy-source-if-match
and
/// x-amz-copy-source-if-unmodified-since
headers are present in the request
/// as follows:
/// x-amz-copy-source-if-match
condition evaluates to true
,
/// and;
/// x-amz-copy-source-if-unmodified-since
condition evaluates to false
;
/// 200 OK
and copies the data.
/// x-amz-copy-source-if-none-match
/// and x-amz-copy-source-if-modified-since
headers are present in the request
/// as follows:
/// x-amz-copy-source-if-none-match
condition evaluates to false
,
/// and;
/// x-amz-copy-source-if-modified-since
condition evaluates to true
;
/// 412 Precondition Failed
response code.
/// x-amz-copy-source
identifies the current version
/// of the object to copy. If the current version is a delete marker and you don't specify
/// a versionId in the x-amz-copy-source
, Amazon S3 returns a 404 error,
/// because the object does not exist. If you specify versionId in the x-amz-copy-source
/// and the versionId is a delete marker, Amazon S3 returns an HTTP 400 error, because
/// you are not allowed to specify a delete marker as a version for the x-amz-copy-source
.
///
/// versionId
subresource as shown in the following example:
/// x-amz-copy-source: /bucket/object?versionId=version id
/// Special Errors /// ///
/// ///
/// ///
Related Resources /// ///
x-amz-copy-source
in your
/// request and a byte range by adding the request header x-amz-copy-source-range
/// in your request.
///
///
/// UploadPartCopy
operation, see the
/// following:
/// x-amz-copy-source-if-match
,
/// x-amz-copy-source-if-none-match
, x-amz-copy-source-if-unmodified-since
,
/// and x-amz-copy-source-if-modified-since
:
/// x-amz-copy-source-if-match
and
/// x-amz-copy-source-if-unmodified-since
headers are present in the request
/// as follows:
/// x-amz-copy-source-if-match
condition evaluates to true
,
/// and;
/// x-amz-copy-source-if-unmodified-since
condition evaluates to false
;
/// 200 OK
and copies the data.
/// x-amz-copy-source-if-none-match
/// and x-amz-copy-source-if-modified-since
headers are present in the request
/// as follows:
/// x-amz-copy-source-if-none-match
condition evaluates to false
,
/// and;
/// x-amz-copy-source-if-modified-since
condition evaluates to true
;
/// 412 Precondition Failed
response code.
/// x-amz-copy-source
identifies the current version
/// of the object to copy. If the current version is a delete marker and you don't specify
/// a versionId in the x-amz-copy-source
, Amazon S3 returns a 404 error,
/// because the object does not exist. If you specify versionId in the x-amz-copy-source
/// and the versionId is a delete marker, Amazon S3 returns an HTTP 400 error, because
/// you are not allowed to specify a delete marker as a version for the x-amz-copy-source
.
///
/// versionId
subresource as shown in the following example:
/// x-amz-copy-source: /bucket/object?versionId=version id
/// Special Errors /// ///
/// ///
/// ///
Related Resources /// ///
Related Resources /// ///
DeleteBucketPolicy
/// permissions on the specified bucket and belong to the bucket owner's account to use
/// this operation.
///
///
/// DeleteBucketPolicy
permissions, Amazon S3 returns a
/// 403 Access Denied
error. If you have the correct permissions, but you're
/// not using an identity that belongs to the bucket owner's account, Amazon S3 returns
/// a 405 Method Not Allowed
error.
/// DeleteBucketPolicy
/// s3:PutBucketTagging
/// action. By default, the bucket owner has this permission and can grant this permission
/// to others.
/// DeleteBucketTagging
:
/// 200 OK
response upon successfully deleting a website configuration on
/// the specified bucket. You will get a 200 OK
response if the website configuration
/// you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
/// response if the bucket specified in the request does not exist.
///
///
/// S3:DeleteBucketWebsite
permission.
/// By default, only the bucket owner can delete the website configuration attached to
/// a bucket. However, bucket owners can grant other users permission to delete the website
/// configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
/// permission.
/// DeleteBucketWebsite
:
/// cors
configuration information set for the bucket.
///
///
/// s3:PutBucketCORS
/// action. The bucket owner has this permission by default and can grant this permission
/// to others.
/// cors
, see Enabling
/// Cross-Origin Resource Sharing in the Amazon Simple Storage Service Developer
/// Guide.
/// Related Resources: /// ///
cors
configuration is being deleted.
/// An Action delegate that is invoked when the operation completes.
///
/// A user-defined state object that is passed to the callback procedure. Retrieve this object from within the callback
/// procedure using the AsyncState property.
///
///
/// s3:PutLifecycleConfiguration
/// action. By default, the bucket owner has this permission and the bucket owner can
/// grant this permission to others.
/// x-amz-delete-marker
,
/// to true.
/// x-amz-mfa
request header
/// in the DELETE versionId
request. Requests that include x-amz-mfa
/// must use HTTPS.
/// s3:DeleteObject
, s3:DeleteObjectVersion
,
/// and s3:PutLifeCycleConfiguration
actions.
/// DeleteObject
:
/// x-amz-delete-marker
,
/// to true.
/// x-amz-mfa
request header
/// in the DELETE versionId
request. Requests that include x-amz-mfa
/// must use HTTPS.
/// s3:DeleteObject
, s3:DeleteObjectVersion
,
/// and s3:PutLifeCycleConfiguration
actions.
/// DeleteObject
:
/// GET
operation uses the acl
subresource
/// to return the access control list (ACL) of a bucket. To use GET
to return
/// the ACL of the bucket, you must have READ_ACP
access to the bucket. If
/// READ_ACP
permission is granted to the anonymous user, you can return
/// the ACL of the bucket without using an authorization header.
///
/// Related Resources /// ///
accelerate
subresource
/// to return the Transfer Acceleration state of a bucket, which is either Enabled
/// or Suspended
. Amazon S3 Transfer Acceleration is a bucket-level feature
/// that enables you to perform faster data transfers to and from Amazon S3.
///
///
/// s3:GetAccelerateConfiguration
/// action. The bucket owner has this permission by default. The bucket owner can grant
/// this permission to others. For more information about permissions, see Permissions
/// Related to Bucket Subresource Operations and Managing
/// Access Permissions to your Amazon S3 Resources in the Amazon Simple Storage
/// Service Developer Guide.
/// Enabled
/// or Suspended
by using the PutBucketAccelerateConfiguration operation.
///
/// accelerate
request does not return a state value for a bucket that
/// has no transfer acceleration state. A bucket has no Transfer Acceleration state if
/// a state has never been set on the bucket.
/// Related Resources /// ///
LocationConstraint
/// request parameter in a CreateBucket
request. For more information, see
/// CreateBucket.
///
///
/// GetBucketLocation
:
/// GetBucketLogging
:
/// NotificationConfiguration
/// element.
/// s3:GetBucketNotification
/// permission.
/// GetBucketNotification
:
/// GetBucketPolicy
permissions on the specified bucket and belong to
/// the bucket owner's account in order to use this operation.
///
///
/// GetBucketPolicy
permissions, Amazon S3 returns a 403
/// Access Denied
error. If you have the correct permissions, but you're not using
/// an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
/// Method Not Allowed
error.
/// GetBucketPolicy
:
/// GetBucketRequestPayment
:
/// enabled
, the bucket owner must use an authentication
/// device to change the versioning state of the bucket.
/// GetBucketVersioning
:
/// S3:GetBucketWebsite
permission. By default,
/// only the bucket owner can read the bucket website configuration. However, bucket owners
/// can allow other users to read the website configuration by writing a bucket policy
/// granting them the S3:GetBucketWebsite
permission.
/// DeleteBucketWebsite
:
/// GetBucketCors
:
/// s3:GetLifecycleConfiguration
/// action. The bucket owner has this permission, by default. The bucket owner can grant
/// this permission to others. For more information about permissions, see Permissions
/// Related to Bucket Subresource Operations and Managing
/// Access Permissions to Your Amazon S3 Resources.
/// GetBucketLifecycleConfiguration
has the following special error:
/// NoSuchLifecycleConfiguration
/// DeleteBucketMetricsConfiguration
:
/// GET
, you must have READ
/// access to the object. If you grant READ
access to the anonymous user,
/// you can return the object without using an authorization header.
///
///
/// sample.jpg
, you can name it photos/2006/February/sample.jpg
.
/// GET
operation. For a virtual hosted-style request example,
/// if you have the object photos/2006/February/sample.jpg
, specify the resource
/// as /photos/2006/February/sample.jpg
. For a path-style request example,
/// if you have the object photos/2006/February/sample.jpg
in the bucket
/// named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
/// For more information about request types, see HTTP
/// Host Header Bucket Specification.
/// InvalidObjectStateError
error. For
/// information about restoring archived objects, see Restoring
/// Archived Objects.
/// x-amz-server-side-encryption
, should
/// not be sent for GET requests if your object uses server-side encryption with CMKs
/// stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
/// keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
/// BadRequest error.
/// s3:GetObjectVersionTagging
/// action), the response also returns the x-amz-tagging-count
header that
/// provides the count of number of tags associated with the object. You can use GetObjectTagging
/// to retrieve the tag set associated with an object.
/// s3:GetObject
permission for this operation. For more information,
/// see Specifying
/// Permissions in a Policy. If the object you request does not exist, the error Amazon
/// S3 returns depends on whether you also have the s3:ListBucket
permission.
/// s3:ListBucket
permission on the bucket, Amazon S3 will
/// return an HTTP status code 404 ("no such key") error.
/// s3:ListBucket
permission, Amazon S3 will return
/// an HTTP status code 403 ("access denied") error.
/// versionId
subresource.
/// x-amz-delete-marker: true
in the response.
/// Content-Type
,
/// Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
/// and Content-Encoding
. To override these header values in the GET response,
/// you use the following request parameters.
/// response-content-type
/// response-content-language
/// response-expires
/// response-cache-control
/// response-content-disposition
/// response-content-encoding
/// If-Match
and If-Unmodified-Since
headers
/// are present in the request as follows: If-Match
condition evaluates to
/// true
, and; If-Unmodified-Since
condition evaluates to false
;
/// then, S3 returns 200 OK and the data requested.
/// If-None-Match
and If-Modified-Since
headers
/// are present in the request as follows: If-None-Match
condition evaluates
/// to false
, and; If-Modified-Since
condition evaluates to
/// true
; then, S3 returns 304 Not Modified response code.
/// GetObject
:
/// GET
, you must have READ
/// access to the object. If you grant READ
access to the anonymous user,
/// you can return the object without using an authorization header.
///
///
/// sample.jpg
, you can name it photos/2006/February/sample.jpg
.
/// GET
operation. For a virtual hosted-style request example,
/// if you have the object photos/2006/February/sample.jpg
, specify the resource
/// as /photos/2006/February/sample.jpg
. For a path-style request example,
/// if you have the object photos/2006/February/sample.jpg
in the bucket
/// named examplebucket
, specify the resource as /examplebucket/photos/2006/February/sample.jpg
.
/// For more information about request types, see HTTP
/// Host Header Bucket Specification.
/// InvalidObjectStateError
error. For
/// information about restoring archived objects, see Restoring
/// Archived Objects.
/// x-amz-server-side-encryption
, should
/// not be sent for GET requests if your object uses server-side encryption with CMKs
/// stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
/// keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
/// BadRequest error.
/// s3:GetObjectVersionTagging
/// action), the response also returns the x-amz-tagging-count
header that
/// provides the count of number of tags associated with the object. You can use GetObjectTagging
/// to retrieve the tag set associated with an object.
/// s3:GetObject
permission for this operation. For more information,
/// see Specifying
/// Permissions in a Policy. If the object you request does not exist, the error Amazon
/// S3 returns depends on whether you also have the s3:ListBucket
permission.
/// s3:ListBucket
permission on the bucket, Amazon S3 will
/// return an HTTP status code 404 ("no such key") error.
/// s3:ListBucket
permission, Amazon S3 will return
/// an HTTP status code 403 ("access denied") error.
/// versionId
subresource.
/// x-amz-delete-marker: true
in the response.
/// Content-Type
,
/// Content-Language
, Expires
, Cache-Control
, Content-Disposition
,
/// and Content-Encoding
. To override these header values in the GET response,
/// you use the following request parameters.
/// response-content-type
/// response-content-language
/// response-expires
/// response-cache-control
/// response-content-disposition
/// response-content-encoding
/// If-Match
and If-Unmodified-Since
headers
/// are present in the request as follows: If-Match
condition evaluates to
/// true
, and; If-Unmodified-Since
condition evaluates to false
;
/// then, S3 returns 200 OK and the data requested.
/// If-None-Match
and If-Modified-Since
headers
/// are present in the request as follows: If-None-Match
condition evaluates
/// to false
, and; If-Modified-Since
condition evaluates to
/// true
; then, S3 returns 304 Not Modified response code.
/// GetObject
:
/// HEAD
request has the same options as a GET
operation on
/// an object. The response is identical to the GET
response except that
/// there is no response body.
/// x-amz-server-side-encryption
, should
/// not be sent for GET requests if your object uses server-side encryption with CMKs
/// stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
/// keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
/// BadRequest error.
/// If-Match
and If-Unmodified-Since
/// headers are present in the request as follows:
/// If-Match
condition evaluates to true
, and;
/// If-Unmodified-Since
condition evaluates to false
;
/// 200 OK
and the data requested.
/// If-None-Match
and If-Modified-Since
/// headers are present in the request as follows:
/// If-None-Match
condition evaluates to false
, and;
/// If-Modified-Since
condition evaluates to true
;
/// 304 Not Modified
response code.
/// s3:GetObject
permission for this operation. For more information,
/// see Specifying
/// Permissions in a Policy. If the object you request does not exist, the error Amazon
/// S3 returns depends on whether you also have the s3:ListBucket permission.
/// s3:ListBucket
permission on the bucket, Amazon S3 returns
/// an HTTP status code 404 ("no such key") error.
/// s3:ListBucket
permission, Amazon S3 returns an
/// HTTP status code 403 ("access denied") error.
/// HeadObject
:
/// HEAD
request has the same options as a GET
operation on
/// an object. The response is identical to the GET
response except that
/// there is no response body.
/// x-amz-server-side-encryption
, should
/// not be sent for GET requests if your object uses server-side encryption with CMKs
/// stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
/// keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
/// BadRequest error.
/// If-Match
and If-Unmodified-Since
/// headers are present in the request as follows:
/// If-Match
condition evaluates to true
, and;
/// If-Unmodified-Since
condition evaluates to false
;
/// 200 OK
and the data requested.
/// If-None-Match
and If-Modified-Since
/// headers are present in the request as follows:
/// If-None-Match
condition evaluates to false
, and;
/// If-Modified-Since
condition evaluates to true
;
/// 304 Not Modified
response code.
/// s3:GetObject
permission for this operation. For more information,
/// see Specifying
/// Permissions in a Policy. If the object you request does not exist, the error Amazon
/// S3 returns depends on whether you also have the s3:ListBucket permission.
/// s3:ListBucket
permission on the bucket, Amazon S3 returns
/// an HTTP status code 404 ("no such key") error.
/// s3:ListBucket
permission, Amazon S3 returns an
/// HTTP status code 403 ("access denied") error.
/// HeadObject
:
/// GetObjectTorrent
:
/// CreateMultipartUpload
.
///
/// kms:Encrypt
, kms:Decrypt
, kms:ReEncrypt*
,
/// kms:GenerateDataKey*
, and kms:DescribeKey
actions on the
/// key. These permissions are required because Amazon S3 must decrypt and read data from
/// the encrypted file parts before it completes the multipart upload.
/// x-amz-acl
request header. For more information,
/// see Canned
/// ACL.
/// x-amz-grant-read
, x-amz-grant-read-acp
,
/// x-amz-grant-write-acp
, and x-amz-grant-full-control
headers.
/// These parameters map to the set of permissions that Amazon S3 supports in an ACL.
/// For more information, see Access
/// Control List (ACL) Overview.
/// x-amz-server-side-encryption:aws:kms
, but don't provide
/// x-amz-server-side-encryption-aws-kms-key-id
, Amazon S3 uses the AWS managed
/// CMK in AWS KMS to protect the data.
/// x-amz-acl
) — Amazon S3 supports a set of predefined
/// ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
/// and permissions. For more information, see Canned
/// ACL.
/// emailAddress
– if the value specified is the email address of an AWS
/// account
/// id
– if the value specified is the canonical user ID of an AWS account
/// uri
– if you are granting permissions to a predefined group
/// x-amz-grant-read
header grants the AWS accounts
/// identified by email addresses permissions to read object data and its metadata:
/// x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
///
/// CreateMultipartUpload
:
/// max-uploads
parameter in the response. If additional multipart uploads
/// satisfy the list criteria, the response will contain an IsTruncated
element
/// with the value true. To list the additional multipart uploads, use the key-marker
/// and upload-id-marker
request parameters.
/// ListMultipartUploads
:
/// max-uploads
parameter in the response. If additional multipart uploads
/// satisfy the list criteria, the response will contain an IsTruncated
element
/// with the value true. To list the additional multipart uploads, use the key-marker
/// and upload-id-marker
request parameters.
/// ListMultipartUploads
:
/// ListObjects
.
/// ListObjects
:
/// ListObjects
.
/// ListObjects
:
///