Put Bucket Policy
s3_put_bucket_policy | R Documentation |
Applies an Amazon S3 bucket policy to an Amazon S3 bucket¶
Description¶
Applies an Amazon S3 bucket policy to an Amazon S3 bucket.
Directory buckets - For directory buckets, you must make requests
for this API operation to the Regional endpoint. These endpoints support
path-style requests in the format
https://s3express-control.region-code.amazonaws.com/bucket-name
.
Virtual-hosted-style requests aren't supported. For more information
about endpoints in Availability Zones, see Regional and Zonal endpoints
for directory buckets in Availability
Zones
in the Amazon S3 User Guide. For more information about endpoints in
Local Zones, see Concepts for directory buckets in Local
Zones
in the Amazon S3 User Guide.
Permissions¶
If you are using an identity other than the root user of the Amazon Web
Services account that owns the bucket, the calling identity must both
have the put_bucket_policy
permissions on the specified bucket and
belong to the bucket owner's account in order to use this operation.
If you don't have put_bucket_policy
permissions, Amazon S3 returns a
403 Access Denied
error. If you have the correct permissions, but
you're not using an identity that belongs to the bucket owner's account,
Amazon S3 returns a 405 Method Not Allowed
error.
To ensure that bucket owners don't inadvertently lock themselves out of
their own buckets, the root principal in a bucket owner's Amazon Web
Services account can perform the get_bucket_policy
,
put_bucket_policy
, and delete_bucket_policy
API actions, even if
their bucket policy explicitly denies the root principal's access.
Bucket owner root principals can only be blocked from performing these
API actions by VPC endpoint policies and Amazon Web Services
Organizations policies.
-
General purpose bucket permissions - The
s3:PutBucketPolicy
permission is required in a policy. For more information about general purpose buckets bucket policies, see Using Bucket Policies and User Policies in the Amazon S3 User Guide. -
Directory bucket permissions - To grant access to this API operation, you must have the
s3express:PutBucketPolicy
permission in an IAM identity-based policy instead of a bucket policy. Cross-account access to this API operation isn't supported. This operation can only be performed by the Amazon Web Services account that owns the resource. For more information about directory bucket policies and permissions, see Amazon Web Services Identity and Access Management (IAM) for S3 Express One Zone in the Amazon S3 User Guide.
Example bucket policies¶
General purpose buckets example bucket policies - See Bucket policy examples in the Amazon S3 User Guide.
Directory bucket example bucket policies - See Example bucket policies for S3 Express One Zone in the Amazon S3 User Guide.
HTTP Host header syntax¶
Directory buckets - The HTTP Host header syntax is
s3express-control.region-code.amazonaws.com
.
The following operations are related to put_bucket_policy
:
-
create_bucket
-
delete_bucket
Usage¶
s3_put_bucket_policy(Bucket, ContentMD5, ChecksumAlgorithm,
ConfirmRemoveSelfBucketAccess, Policy, ExpectedBucketOwner)
Arguments¶
Bucket |
[required] The name of the bucket. Directory buckets - When you use this operation with
a directory bucket, you must use path-style requests in the format |
ContentMD5 |
The MD5 hash of the request body. For requests made using the Amazon Web Services Command Line Interface (CLI) or Amazon Web Services SDKs, this field is calculated automatically. This functionality is not supported for directory buckets. |
ChecksumAlgorithm |
Indicates the algorithm used to create the checksum for the
request when you use the SDK. This header will not provide any
additional functionality if you don't use the SDK. When you send this
header, there must be a corresponding
For the
For more information, see Checking object integrity in the Amazon S3 User Guide. If the individual checksum value you provide through
For directory buckets, when you use Amazon Web Services SDKs,
|
ConfirmRemoveSelfBucketAccess |
Set this parameter to true to confirm that you want to remove your permissions to change this bucket policy in the future. This functionality is not supported for directory buckets. |
Policy |
[required] The bucket policy as a JSON document. For directory buckets, the only IAM action supported in the bucket
policy is |
ExpectedBucketOwner |
The account ID of the expected bucket owner. If the account ID
that you provide does not match the actual owner of the bucket, the
request fails with the HTTP status code For directory buckets, this header is not supported in this API
operation. If you specify this header, the request fails with the HTTP
status code |
Value¶
An empty list.
Request syntax¶
svc$put_bucket_policy(
Bucket = "string",
ContentMD5 = "string",
ChecksumAlgorithm = "CRC32"|"CRC32C"|"SHA1"|"SHA256"|"CRC64NVME",
ConfirmRemoveSelfBucketAccess = TRUE|FALSE,
Policy = "string",
ExpectedBucketOwner = "string"
)
Examples¶
## Not run:
# The following example sets a permission policy on a bucket.
svc$put_bucket_policy(
Bucket = "examplebucket",
Policy = "{\"Version\": \"2012-10-17\", \"Statement\": [{ \"Sid\": \"id-1\",\"Effect..."
)
## End(Not run)