AbortMultipartUpload:
/// Bad
/// Request error. For more information about transfer acceleration, see Transfer
/// Acceleration.
/// Etag
/// matches or whether the object was modified before or after a specified date, use the
/// request parameters x-amz-copy-source-if-match, x-amz-copy-source-if-none-match,
/// x-amz-copy-source-if-unmodified-since, or x-amz-copy-source-if-modified-since.
/// x-amz- prefix, including x-amz-copy-source,
/// must be signed.
/// StorageClass parameter. For more information,
/// see Storage
/// Classes.
/// 200 OK response. This means that
/// a 200 OK response can contain either a success or an error. Design your
/// application to parse the contents of the response and handle it appropriately.
/// x-amz-copy-source-if-match and x-amz-copy-source-if-unmodified-since
/// headers are present in the request and evaluate as follows, Amazon S3 returns 200
/// OK and copies the data:
/// x-amz-copy-source-if-match condition evaluates to true
/// x-amz-copy-source-if-unmodified-since condition evaluates to false
/// x-amz-copy-source-if-none-match and
/// x-amz-copy-source-if-modified-since headers are present in the request
/// and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
/// response code:
/// x-amz-copy-source-if-none-match condition evaluates to false
/// x-amz-copy-source-if-modified-since condition evaluates to true
/// CopyObject:
/// x-amz-copy-source identifies the current version of an object
/// to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
/// was deleted.) To copy a different version, use the versionId subresource.
/// x-amz-version-id
/// response header in the response.
/// x-amz-acl request header. For more information,
/// see Canned
/// ACL.
/// x-amz-grant-read, x-amz-grant-read-acp,
/// x-amz-grant-write-acp, and x-amz-grant-full-control headers.
/// These parameters map to the set of permissions that Amazon S3 supports in an ACL.
/// For more information, see Access
/// Control List (ACL) Overview.
/// x-amz-server-side-encryption
/// x-amz-server-side-encryption-aws-kms-key-id
/// x-amz-server-side-encryption-context
/// x-amz-server-side-encryption:aws:kms, but don't provide
/// x-amz-server-side-encryption-aws-kms-key-id, Amazon S3 uses the AWS managed
/// CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
/// CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
/// of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
/// not asymmetric CMKs. For more information, see Using
/// Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
/// x-amz-acl) — Amazon S3 supports a set of predefined
/// ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
/// and permissions. For more information, see Canned
/// ACL.
/// emailAddress – if the value specified is the email address of an AWS
/// account
/// id – if the value specified is the canonical user ID of an AWS account
/// uri – if you are granting permissions to a predefined group
/// x-amz-grant-read header grants the AWS accounts
/// identified by email addresses permissions to read object data and its metadata:
/// x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
///
/// CopyObject:
/// Bad
/// Request error. For more information about transfer acceleration, see Transfer
/// Acceleration.
/// Etag
/// matches or whether the object was modified before or after a specified date, use the
/// request parameters x-amz-copy-source-if-match, x-amz-copy-source-if-none-match,
/// x-amz-copy-source-if-unmodified-since, or x-amz-copy-source-if-modified-since.
/// x-amz- prefix, including x-amz-copy-source,
/// must be signed.
/// StorageClass parameter. For more information,
/// see Storage
/// Classes.
/// 200 OK response. This means that
/// a 200 OK response can contain either a success or an error. Design your
/// application to parse the contents of the response and handle it appropriately.
/// x-amz-copy-source-if-match and x-amz-copy-source-if-unmodified-since
/// headers are present in the request and evaluate as follows, Amazon S3 returns 200
/// OK and copies the data:
/// x-amz-copy-source-if-match condition evaluates to true
/// x-amz-copy-source-if-unmodified-since condition evaluates to false
/// x-amz-copy-source-if-none-match and
/// x-amz-copy-source-if-modified-since headers are present in the request
/// and evaluate as follows, Amazon S3 returns the 412 Precondition Failed
/// response code:
/// x-amz-copy-source-if-none-match condition evaluates to false
/// x-amz-copy-source-if-modified-since condition evaluates to true
/// CopyObject:
/// x-amz-copy-source identifies the current version of an object
/// to copy. (If the current version is a delete marker, Amazon S3 behaves as if the object
/// was deleted.) To copy a different version, use the versionId subresource.
/// x-amz-version-id
/// response header in the response.
/// x-amz-acl request header. For more information,
/// see Canned
/// ACL.
/// x-amz-grant-read, x-amz-grant-read-acp,
/// x-amz-grant-write-acp, and x-amz-grant-full-control headers.
/// These parameters map to the set of permissions that Amazon S3 supports in an ACL.
/// For more information, see Access
/// Control List (ACL) Overview.
/// x-amz-server-side-encryption
/// x-amz-server-side-encryption-aws-kms-key-id
/// x-amz-server-side-encryption-context
/// x-amz-server-side-encryption:aws:kms, but don't provide
/// x-amz-server-side-encryption-aws-kms-key-id, Amazon S3 uses the AWS managed
/// CMK in AWS KMS to protect the data. If you want to use a customer managed AWS KMS
/// CMK, you must provide the x-amz-server-side-encryption-aws-kms-key-id
/// of the symmetric customer managed CMK. Amazon S3 only supports symmetric CMKs and
/// not asymmetric CMKs. For more information, see Using
/// Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.
/// x-amz-acl) — Amazon S3 supports a set of predefined
/// ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
/// and permissions. For more information, see Canned
/// ACL.
/// emailAddress – if the value specified is the email address of an AWS
/// account
/// id – if the value specified is the canonical user ID of an AWS account
/// uri – if you are granting permissions to a predefined group
/// x-amz-grant-read header grants the AWS accounts
/// identified by email addresses permissions to read object data and its metadata:
/// x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
///
/// CopyObject:
/// x-amz-copy-source in your
/// request and a byte range by adding the request header x-amz-copy-source-range
/// in your request.
///
///
/// UploadPartCopy operation, see the
/// following:
/// x-amz-copy-source-if-match,
/// x-amz-copy-source-if-none-match, x-amz-copy-source-if-unmodified-since,
/// and x-amz-copy-source-if-modified-since:
/// x-amz-copy-source-if-match and
/// x-amz-copy-source-if-unmodified-since headers are present in the request
/// as follows:
/// x-amz-copy-source-if-match condition evaluates to true,
/// and;
/// x-amz-copy-source-if-unmodified-since condition evaluates to false;
/// 200 OK and copies the data.
/// x-amz-copy-source-if-none-match
/// and x-amz-copy-source-if-modified-since headers are present in the request
/// as follows:
/// x-amz-copy-source-if-none-match condition evaluates to false,
/// and;
/// x-amz-copy-source-if-modified-since condition evaluates to true;
/// 412 Precondition Failed response code.
/// x-amz-copy-source identifies the current version
/// of the object to copy. If the current version is a delete marker and you don't specify
/// a versionId in the x-amz-copy-source, Amazon S3 returns a 404 error,
/// because the object does not exist. If you specify versionId in the x-amz-copy-source
/// and the versionId is a delete marker, Amazon S3 returns an HTTP 400 error, because
/// you are not allowed to specify a delete marker as a version for the x-amz-copy-source.
///
/// versionId subresource as shown in the following example:
/// x-amz-copy-source: /bucket/object?versionId=version id
/// Special Errors /// ///
/// ///
/// ///
Related Resources /// ///
x-amz-copy-source in your
/// request and a byte range by adding the request header x-amz-copy-source-range
/// in your request.
///
///
/// UploadPartCopy operation, see the
/// following:
/// x-amz-copy-source-if-match,
/// x-amz-copy-source-if-none-match, x-amz-copy-source-if-unmodified-since,
/// and x-amz-copy-source-if-modified-since:
/// x-amz-copy-source-if-match and
/// x-amz-copy-source-if-unmodified-since headers are present in the request
/// as follows:
/// x-amz-copy-source-if-match condition evaluates to true,
/// and;
/// x-amz-copy-source-if-unmodified-since condition evaluates to false;
/// 200 OK and copies the data.
/// x-amz-copy-source-if-none-match
/// and x-amz-copy-source-if-modified-since headers are present in the request
/// as follows:
/// x-amz-copy-source-if-none-match condition evaluates to false,
/// and;
/// x-amz-copy-source-if-modified-since condition evaluates to true;
/// 412 Precondition Failed response code.
/// x-amz-copy-source identifies the current version
/// of the object to copy. If the current version is a delete marker and you don't specify
/// a versionId in the x-amz-copy-source, Amazon S3 returns a 404 error,
/// because the object does not exist. If you specify versionId in the x-amz-copy-source
/// and the versionId is a delete marker, Amazon S3 returns an HTTP 400 error, because
/// you are not allowed to specify a delete marker as a version for the x-amz-copy-source.
///
/// versionId subresource as shown in the following example:
/// x-amz-copy-source: /bucket/object?versionId=version id
/// Special Errors /// ///
/// ///
/// ///
Related Resources /// ///
Related Resources /// ///
DeleteBucketPolicy
/// permissions on the specified bucket and belong to the bucket owner's account to use
/// this operation.
///
///
/// DeleteBucketPolicy permissions, Amazon S3 returns a
/// 403 Access Denied error. If you have the correct permissions, but you're
/// not using an identity that belongs to the bucket owner's account, Amazon S3 returns
/// a 405 Method Not Allowed error.
/// DeleteBucketPolicy
/// s3:PutBucketTagging
/// action. By default, the bucket owner has this permission and can grant this permission
/// to others.
/// DeleteBucketTagging:
/// 200 OK response upon successfully deleting a website configuration on
/// the specified bucket. You will get a 200 OK response if the website configuration
/// you are trying to delete does not exist on the bucket. Amazon S3 returns a 404
/// response if the bucket specified in the request does not exist.
///
///
/// S3:DeleteBucketWebsite permission.
/// By default, only the bucket owner can delete the website configuration attached to
/// a bucket. However, bucket owners can grant other users permission to delete the website
/// configuration by writing a bucket policy granting them the S3:DeleteBucketWebsite
/// permission.
/// DeleteBucketWebsite:
/// cors configuration information set for the bucket.
///
///
/// s3:PutBucketCORS
/// action. The bucket owner has this permission by default and can grant this permission
/// to others.
/// cors, see Enabling
/// Cross-Origin Resource Sharing in the Amazon Simple Storage Service Developer
/// Guide.
/// Related Resources: /// ///
cors configuration is being deleted.
/// An Action delegate that is invoked when the operation completes.
///
/// A user-defined state object that is passed to the callback procedure. Retrieve this object from within the callback
/// procedure using the AsyncState property.
///
///
/// s3:PutLifecycleConfiguration
/// action. By default, the bucket owner has this permission and the bucket owner can
/// grant this permission to others.
/// x-amz-delete-marker,
/// to true.
/// x-amz-mfa request header
/// in the DELETE versionId request. Requests that include x-amz-mfa
/// must use HTTPS.
/// s3:DeleteObject, s3:DeleteObjectVersion,
/// and s3:PutLifeCycleConfiguration actions.
/// DeleteObject:
/// x-amz-delete-marker,
/// to true.
/// x-amz-mfa request header
/// in the DELETE versionId request. Requests that include x-amz-mfa
/// must use HTTPS.
/// s3:DeleteObject, s3:DeleteObjectVersion,
/// and s3:PutLifeCycleConfiguration actions.
/// DeleteObject:
/// GET operation uses the acl subresource
/// to return the access control list (ACL) of a bucket. To use GET to return
/// the ACL of the bucket, you must have READ_ACP access to the bucket. If
/// READ_ACP permission is granted to the anonymous user, you can return
/// the ACL of the bucket without using an authorization header.
///
/// Related Resources /// ///
accelerate subresource
/// to return the Transfer Acceleration state of a bucket, which is either Enabled
/// or Suspended. Amazon S3 Transfer Acceleration is a bucket-level feature
/// that enables you to perform faster data transfers to and from Amazon S3.
///
///
/// s3:GetAccelerateConfiguration
/// action. The bucket owner has this permission by default. The bucket owner can grant
/// this permission to others. For more information about permissions, see Permissions
/// Related to Bucket Subresource Operations and Managing
/// Access Permissions to your Amazon S3 Resources in the Amazon Simple Storage
/// Service Developer Guide.
/// Enabled
/// or Suspended by using the PutBucketAccelerateConfiguration operation.
///
/// accelerate request does not return a state value for a bucket that
/// has no transfer acceleration state. A bucket has no Transfer Acceleration state if
/// a state has never been set on the bucket.
/// Related Resources /// ///
LocationConstraint
/// request parameter in a CreateBucket request. For more information, see
/// CreateBucket.
///
///
/// GetBucketLocation:
/// GetBucketLogging:
/// NotificationConfiguration
/// element.
/// s3:GetBucketNotification
/// permission.
/// GetBucketNotification:
/// GetBucketPolicy permissions on the specified bucket and belong to
/// the bucket owner's account in order to use this operation.
///
///
/// GetBucketPolicy permissions, Amazon S3 returns a 403
/// Access Denied error. If you have the correct permissions, but you're not using
/// an identity that belongs to the bucket owner's account, Amazon S3 returns a 405
/// Method Not Allowed error.
/// GetBucketPolicy:
/// GetBucketRequestPayment:
/// enabled, the bucket owner must use an authentication
/// device to change the versioning state of the bucket.
/// GetBucketVersioning:
/// S3:GetBucketWebsite permission. By default,
/// only the bucket owner can read the bucket website configuration. However, bucket owners
/// can allow other users to read the website configuration by writing a bucket policy
/// granting them the S3:GetBucketWebsite permission.
/// DeleteBucketWebsite:
/// GetBucketCors:
/// s3:GetLifecycleConfiguration
/// action. The bucket owner has this permission, by default. The bucket owner can grant
/// this permission to others. For more information about permissions, see Permissions
/// Related to Bucket Subresource Operations and Managing
/// Access Permissions to Your Amazon S3 Resources.
/// GetBucketLifecycleConfiguration has the following special error:
/// NoSuchLifecycleConfiguration
/// DeleteBucketMetricsConfiguration:
/// GET, you must have READ
/// access to the object. If you grant READ access to the anonymous user,
/// you can return the object without using an authorization header.
///
///
/// sample.jpg, you can name it photos/2006/February/sample.jpg.
/// GET operation. For a virtual hosted-style request example,
/// if you have the object photos/2006/February/sample.jpg, specify the resource
/// as /photos/2006/February/sample.jpg. For a path-style request example,
/// if you have the object photos/2006/February/sample.jpg in the bucket
/// named examplebucket, specify the resource as /examplebucket/photos/2006/February/sample.jpg.
/// For more information about request types, see HTTP
/// Host Header Bucket Specification.
/// InvalidObjectStateError error. For
/// information about restoring archived objects, see Restoring
/// Archived Objects.
/// x-amz-server-side-encryption, should
/// not be sent for GET requests if your object uses server-side encryption with CMKs
/// stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
/// keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
/// BadRequest error.
/// s3:GetObjectVersionTagging
/// action), the response also returns the x-amz-tagging-count header that
/// provides the count of number of tags associated with the object. You can use GetObjectTagging
/// to retrieve the tag set associated with an object.
/// s3:GetObject permission for this operation. For more information,
/// see Specifying
/// Permissions in a Policy. If the object you request does not exist, the error Amazon
/// S3 returns depends on whether you also have the s3:ListBucket permission.
/// s3:ListBucket permission on the bucket, Amazon S3 will
/// return an HTTP status code 404 ("no such key") error.
/// s3:ListBucket permission, Amazon S3 will return
/// an HTTP status code 403 ("access denied") error.
/// versionId subresource.
/// x-amz-delete-marker: true in the response.
/// Content-Type,
/// Content-Language, Expires, Cache-Control, Content-Disposition,
/// and Content-Encoding. To override these header values in the GET response,
/// you use the following request parameters.
/// response-content-type
/// response-content-language
/// response-expires
/// response-cache-control
/// response-content-disposition
/// response-content-encoding
/// If-Match and If-Unmodified-Since headers
/// are present in the request as follows: If-Match condition evaluates to
/// true, and; If-Unmodified-Since condition evaluates to false;
/// then, S3 returns 200 OK and the data requested.
/// If-None-Match and If-Modified-Since headers
/// are present in the request as follows: If-None-Match condition evaluates
/// to false, and; If-Modified-Since condition evaluates to
/// true; then, S3 returns 304 Not Modified response code.
/// GetObject:
/// GET, you must have READ
/// access to the object. If you grant READ access to the anonymous user,
/// you can return the object without using an authorization header.
///
///
/// sample.jpg, you can name it photos/2006/February/sample.jpg.
/// GET operation. For a virtual hosted-style request example,
/// if you have the object photos/2006/February/sample.jpg, specify the resource
/// as /photos/2006/February/sample.jpg. For a path-style request example,
/// if you have the object photos/2006/February/sample.jpg in the bucket
/// named examplebucket, specify the resource as /examplebucket/photos/2006/February/sample.jpg.
/// For more information about request types, see HTTP
/// Host Header Bucket Specification.
/// InvalidObjectStateError error. For
/// information about restoring archived objects, see Restoring
/// Archived Objects.
/// x-amz-server-side-encryption, should
/// not be sent for GET requests if your object uses server-side encryption with CMKs
/// stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
/// keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
/// BadRequest error.
/// s3:GetObjectVersionTagging
/// action), the response also returns the x-amz-tagging-count header that
/// provides the count of number of tags associated with the object. You can use GetObjectTagging
/// to retrieve the tag set associated with an object.
/// s3:GetObject permission for this operation. For more information,
/// see Specifying
/// Permissions in a Policy. If the object you request does not exist, the error Amazon
/// S3 returns depends on whether you also have the s3:ListBucket permission.
/// s3:ListBucket permission on the bucket, Amazon S3 will
/// return an HTTP status code 404 ("no such key") error.
/// s3:ListBucket permission, Amazon S3 will return
/// an HTTP status code 403 ("access denied") error.
/// versionId subresource.
/// x-amz-delete-marker: true in the response.
/// Content-Type,
/// Content-Language, Expires, Cache-Control, Content-Disposition,
/// and Content-Encoding. To override these header values in the GET response,
/// you use the following request parameters.
/// response-content-type
/// response-content-language
/// response-expires
/// response-cache-control
/// response-content-disposition
/// response-content-encoding
/// If-Match and If-Unmodified-Since headers
/// are present in the request as follows: If-Match condition evaluates to
/// true, and; If-Unmodified-Since condition evaluates to false;
/// then, S3 returns 200 OK and the data requested.
/// If-None-Match and If-Modified-Since headers
/// are present in the request as follows: If-None-Match condition evaluates
/// to false, and; If-Modified-Since condition evaluates to
/// true; then, S3 returns 304 Not Modified response code.
/// GetObject:
/// HEAD request has the same options as a GET operation on
/// an object. The response is identical to the GET response except that
/// there is no response body.
/// x-amz-server-side-encryption, should
/// not be sent for GET requests if your object uses server-side encryption with CMKs
/// stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
/// keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
/// BadRequest error.
/// If-Match and If-Unmodified-Since
/// headers are present in the request as follows:
/// If-Match condition evaluates to true, and;
/// If-Unmodified-Since condition evaluates to false;
/// 200 OK and the data requested.
/// If-None-Match and If-Modified-Since
/// headers are present in the request as follows:
/// If-None-Match condition evaluates to false, and;
/// If-Modified-Since condition evaluates to true;
/// 304 Not Modified response code.
/// s3:GetObject permission for this operation. For more information,
/// see Specifying
/// Permissions in a Policy. If the object you request does not exist, the error Amazon
/// S3 returns depends on whether you also have the s3:ListBucket permission.
/// s3:ListBucket permission on the bucket, Amazon S3 returns
/// an HTTP status code 404 ("no such key") error.
/// s3:ListBucket permission, Amazon S3 returns an
/// HTTP status code 403 ("access denied") error.
/// HeadObject:
/// HEAD request has the same options as a GET operation on
/// an object. The response is identical to the GET response except that
/// there is no response body.
/// x-amz-server-side-encryption, should
/// not be sent for GET requests if your object uses server-side encryption with CMKs
/// stored in AWS KMS (SSE-KMS) or server-side encryption with Amazon S3–managed encryption
/// keys (SSE-S3). If your object does use these types of keys, you’ll get an HTTP 400
/// BadRequest error.
/// If-Match and If-Unmodified-Since
/// headers are present in the request as follows:
/// If-Match condition evaluates to true, and;
/// If-Unmodified-Since condition evaluates to false;
/// 200 OK and the data requested.
/// If-None-Match and If-Modified-Since
/// headers are present in the request as follows:
/// If-None-Match condition evaluates to false, and;
/// If-Modified-Since condition evaluates to true;
/// 304 Not Modified response code.
/// s3:GetObject permission for this operation. For more information,
/// see Specifying
/// Permissions in a Policy. If the object you request does not exist, the error Amazon
/// S3 returns depends on whether you also have the s3:ListBucket permission.
/// s3:ListBucket permission on the bucket, Amazon S3 returns
/// an HTTP status code 404 ("no such key") error.
/// s3:ListBucket permission, Amazon S3 returns an
/// HTTP status code 403 ("access denied") error.
/// HeadObject:
/// GetObjectTorrent:
/// CreateMultipartUpload.
///
/// kms:Encrypt, kms:Decrypt, kms:ReEncrypt*,
/// kms:GenerateDataKey*, and kms:DescribeKey actions on the
/// key. These permissions are required because Amazon S3 must decrypt and read data from
/// the encrypted file parts before it completes the multipart upload.
/// x-amz-acl request header. For more information,
/// see Canned
/// ACL.
/// x-amz-grant-read, x-amz-grant-read-acp,
/// x-amz-grant-write-acp, and x-amz-grant-full-control headers.
/// These parameters map to the set of permissions that Amazon S3 supports in an ACL.
/// For more information, see Access
/// Control List (ACL) Overview.
/// x-amz-server-side-encryption:aws:kms, but don't provide
/// x-amz-server-side-encryption-aws-kms-key-id, Amazon S3 uses the AWS managed
/// CMK in AWS KMS to protect the data.
/// x-amz-acl) — Amazon S3 supports a set of predefined
/// ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees
/// and permissions. For more information, see Canned
/// ACL.
/// emailAddress – if the value specified is the email address of an AWS
/// account
/// id – if the value specified is the canonical user ID of an AWS account
/// uri – if you are granting permissions to a predefined group
/// x-amz-grant-read header grants the AWS accounts
/// identified by email addresses permissions to read object data and its metadata:
/// x-amz-grant-read: emailAddress="xyz@amazon.com", emailAddress="abc@amazon.com"
///
/// CreateMultipartUpload:
/// max-uploads parameter in the response. If additional multipart uploads
/// satisfy the list criteria, the response will contain an IsTruncated element
/// with the value true. To list the additional multipart uploads, use the key-marker
/// and upload-id-marker request parameters.
/// ListMultipartUploads:
/// max-uploads parameter in the response. If additional multipart uploads
/// satisfy the list criteria, the response will contain an IsTruncated element
/// with the value true. To list the additional multipart uploads, use the key-marker
/// and upload-id-marker request parameters.
/// ListMultipartUploads:
/// ListObjects.
/// ListObjects:
/// ListObjects.
/// ListObjects:
///