¿Le pareció útil este contenido?
¿Cómo podríamos hacer que este artículo sea más útil?
The Lyve S3 endpoint (https://s3.example.lyve.seagate.com) allows to perform operations on files and buckets. Requests to this endpoint must be signed with AWS Signature V4 or V2, specifying s3 as the service. Note that only path-style requests are supported.
The following api calls are supported:
GET /
Returns a list of all the buckets the current user has access to
<?xml version="1.0" encoding="UTF-8"?>
<ListAllMyBucketsResult xmlns="http://s3.amazonaws.com/doc/2006-03-01">
<Buckets>
<Bucket>
<Name>private-bucket</Name>
<CreationDate>2019-04-24T17:20:01.997Z</CreationDate>
</Bucket>
<Bucket>
<Name>public-bucket</Name>
<CreationDate>2019-04-24T17:18:59.552Z</CreationDate>
</Bucket>
</Buckets>
<Owner>
<ID>100000000013</ID>
<DisplayName>example</DisplayName>
</Owner>
</ListAllMyBucketsResult>
PUT /mybucket
Creates a new bucket mybucket
. Anonymous requests are not allowed to create buckets. The additional replication-policy
parameter can be used to specify the list of regions where to replicate the bucket. If not specified, buckets are replicated in every region.
The following optional PUT parameters can be specified:
Form Parameter | Description |
---|---|
replication-policy | Specify a comma separated list of regions identifiers (Eg. DCA02,DEN02,SJC03) |
HTTP/1.1 200 OK
Date: Mon, 22 Jul 2019 09:48:09 GMT
Content-Length: 0
Headers | Description |
---|---|
x-amz-bucket-object-lock-enabled | If set to true create the bucket in locking mode and activate the versioning |
x-amz-grant-read | |
x-amz-grant-write |
Returns 200 in case of success, 400 in case the bucket name is not valid, or 409 conflict error when you try to create a bucket which is already present.
DELETE /mybucket
Deletes the bucket mybucket
. Anonymous requests are not allowed to delete buckets.
Returns 200 in case of success, 404 in case the bucket does not exists, or 409 conflict error in case bucket is not empty.
HTTP/1.1 200 OK
Date: Mon, 22 Jul 2019 09:48:09 GMT
Content-Length: 0
GET /
or GET /?list-type=2
The following optional GET parameters can be specified:
Parameter | Description |
---|---|
list-type | When set to "2", specifies that the ListObjectsV2 format should be used |
max-keys | Specifies a maximum number of keys to be returned. Defaults to the maximum value of 1000. |
prefix | Filters the returned keys by prefix. Can be used to specify a directory. |
continuation-token | Pagination token, which can be set to the NextContinuationToken element of the previous result page. (If list-type is not set, "marker" should be used instead.) |
fetch-owner | Returns owner field with each key in the result |
start-after | Space will start listing after this specified key. It can be any key in the bucket. |
On success, an XML document is returned, containing the first max-keys
items of the requested listing. When the listing contains more than max-keys
items, then the response contains the elements <IsTruncated>true</IsTruncated>
, and a pagination token (either <NextContinuationToken>
if list-type=2
, or NextMarker
) which can be used to retrieve the next page.
If the prefix parameter is specified and has a trailing slash, the contents of the listing are the files and folder in that directory. If the prefix parameter does not contain a slash, it is used to filter the contents of the parent folder. The listing is sorted in lexicographical order.
GET /abc-bucket/?list-type=2&delimiter=/&max-keys=300&prefix=test-a/
<?xml version="1.0" encoding="UTF-8"?>
<ListBucketResult xmlns="http://s3.amazonaws.com/doc/2006-03-01/">
<Name>abc-bucket</Name>
<Prefix></Prefix>
<ContinuationToken></ContinuationToken>
<MaxKeys>300</MaxKeys>
<KeyCount>4</KeyCount>
<Delimiter>/</Delimiter>
<IsTruncated>false</IsTruncated>
<Contents>
<Key>files.zip</Key>
<LastModified>2019-02-23T12:41:11.000Z</LastModified>
<Size>25617859</Size>
<Owner>
<ID>0</ID>
</Owner>
<StorageClass>STANDARD</StorageClass>
</Contents>
<CommonPrefixes>
<Prefix>example-directory/</Prefix>
</CommonPrefixes>
<CommonPrefixes>
<Prefix>other-directory/</Prefix>
</CommonPrefixes>
</ListBucketResult>
Is similar to List Object on a non-versioned bucket but return all the versions for a specified prefix including all elements markerd as DeleteMarker
. A delete marker is a marker that points to a specific object in the bucket and indicates that this object is deleted. Every deleted object has a specific VersionId
.
On success, an XML document is returned, containing the first max-keys
items of the requested listing. When the listing contains more than max-keys
items, then the response contains the elements <IsTruncated>true</IsTruncated>
. Every versions for the specified prefix is returned. The latest version is marked using the element <IsLatest>true</IsLatest>
.
GET /abc-bucket/?prefix=myprefix&versions=
aws s3api list-object-versions --bucket examplebucket --prefix myprefix
{
"DeleteMarkers": [
{
"Owner": {
"ID": "100000000001"
},
"IsLatest": true,
"VersionId": "itdou5ddl1j558z4",
"Key": "doc2.jpg",
"LastModified": "2019-07-18T09:58:58.1718141Z"
}
],
"Versions": [
{
"LastModified": "2019-07-18T09:58:42.7619115Z",
"VersionId": "s343opv4r1hv2vx3",
"ETag": ""324f6cbcfdf2420dd63890234a9f2f14"",
"StorageClass": "STANDARD",
"Key": "doc2.jpg",
"Owner": {
"ID": "100000000001"
},
"IsLatest": true,
"Size": 149951
},
{
"LastModified": "2019-07-18T09:58:28.3141363Z",
"VersionId": "scmsdt1jl0395uby",
"ETag": ""324f6cbcfdf2420dd63890234a9f2f14"",
"StorageClass": "STANDARD",
"Key": "doc1.jpg",
"Owner": {
"ID": "100000000001"
},
"IsLatest": true,
"Size": 149951
},
{
"LastModified": "2019-07-18T09:58:12.0506257Z",
"VersionId": "536znyl9hzlgczh3",
"ETag": ""f3658d735ac33d68a23909b1d2583421"",
"StorageClass": "STANDARD",
"Key": "doc3.jpg",
"Owner": {
"ID": "100000000001"
},
"IsLatest": true,
"Size": 578504
}
],
}
HEAD /<bucket>
Returns 200 if the bucket exists, 404 otherwise. If available, the X-Rstor-Size
header is returned, reporting the current size of the bucket in bytes.
HTTP/2.0 200 OK
Connection: close
Date: Tue, 30 Apr 2019 09:24:41 GMT
X-Lyve-Size: 35342254
POST /<bucket>?delete
The request body must contain a XML document in the format specified by the example, with a list of keys to delete (up to 1000).
The response is a XML document, containing, for each key, either a <Deleted>
element or an <Error>
element, according to the result of the operation.
<Delete>
<Object>
<Key>example1</Key>
</Object>
<Object>
<Key>example2</Key>
</Object>
</Delete>
<?xml version="1.0" encoding="UTF-8"?>
<DeleteResult xmlns="http://s3.amazonaws.com/doc/2006-03-01/">
<Deleted>
<Key>example1</Key>
</Deleted>
<Error>
<Key>example2</Key>
<Code>AccessDenied</Code>
<Message>Access Denied</Message>
</Error>
</DeleteResult>
DELETE /<bucket>/<object>
Deletes the requested object or empty directory. Deleting a non-empty directory causes an error. Deleting an object that does not exist returns no error. HTTP Response code of 204 is normal and indicates that the object was successfully deleted.
In case of a versioned bucket is possible to:
versionId
: in this case a DeleteMarker
is createdversionId
If the versioning, in a specific bucket, is in Suspend State
then the Delete
operation can remove the object only if his version ID is null
. In any case it add a new DeleteMarker
with versionId
set to null
.
To remove a specific versionId
: DELETE /<bucket>/<object>?versionId=<version_id>
GET /<bucket>/<object>
or GET /<bucket>/<object>?versionId=<versionId>
Retrieve an object in a bucket. In case the bucket has versioning enabled we can specify the versionId
. If the current version of the object is a delete marker, the object was deleted, the flag x-amz-delete-marker: true is in included in the response. The API provides the replication status in the X-Rstor-Replication-Status
header as a list of regions.
Header | Description |
---|---|
Range | Specifies a byte range to be retrieved, in the format bytes:<start>-<end> |
x-amz-server-side-encryption-customer-algorithm | SSE-C algorithm (supported: AES256) |
x-amz-server-side-encryption-customer-key | SSE-C base64-encoded decryption key |
x-amz-server-side-encryption-customer-key-MD5 | SSE-C base64-encoded key hash (MD5) |
x-rstor-replication-status | If specified, the replication status is returned back as a list of regions |
x-amz-checksum-mode | If specified, the checksum mode will be returned on headers, valid value: ENABLED |
The following query parameters can be used to set or override the corresponding headers in the response the server sends back.
Parameter | Description |
---|---|
response-content-type | Sets the "Content-Type" header on the response |
response-content-language | Sets the "Content-Language" header on the response |
response-expires | Sets the "Expires" header on the response |
response-cache-control | Sets the "Cache-Control" header on the response |
response-content-disposition | Sets the "Cache-Disposition" header on the response |
response-content-encoding | Sets the "Content-Encoding" header on the response |
On success, a status code of 200 is returned. An error code is returned otherwise. In case this operation is performed in a bucket that has the versioning enabled the corresponding VersionId
is returned. Moreover, in case the bucket has one or more lifecycle Expiration rules that apply to newly created object, the corresponding Expiration
is returned. Finally, if object was uploaded with SSE-S3 or SS3-C encryption, ServerSideEncryption
is returned.
HTTP/1.1 200 OK
content-length: 25617859
content-type: binary/octet-stream
date: Mon, 25 Feb 2019 10:49:59 GMT
etag: "918a4f4a76bfa69c193fd4365bc12622"
last-modified: Mon, 25 Feb 2019 10:49:59 GMT
X-Lyve-Replication-Status: DEN02,SJC03
Object contents
HEAD /<bucket>/<object>
Allows retrieving metadata about a given object. It supports the same parameters and returns the same response as the "GET Object" call, but with an empty body. If the x-rstor-replication-status: true
header is specified in the request, the API provides the replication status in the X-Rstor-Replication-Status
header as a list of regions. This request support x-amz-checksum-mode: ENABLED
to retrieve checksum stored if using custom checksum algorithm (x-amz-checksum-algorithm
or x-amz-checksum-*
).
HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Length: 57301
Content-Type: text/plain
ETag: "18e20a76b174f184fad0febced4dbc51"
Last-Modified: Fri, 19 Jul 2019 17:14:35 GMT
X-Lyve-Replication-Status: DEN02,SJC03
Date: Mon, 22 Jul 2019 10:45:57 GMT
PUT /<bucket>/<object>
Sets the contents of an object to the contents of the request's body, creating the object if it does not exists. If the x-amz-copy-source
header is specified, the object is copied from the one specified in the header, and the body of the PUT request is ignored.
Object keys must be valid UTF8 strings and must not end with a trailing slash. However, a request with an empty body can specify a key with a trailing slash, in this case an empty directory is created.
The PutObject API supports the following optional headers
Header | Description |
---|---|
Content-Md5 | The MD5 hash of the content. If present, it is checked as an additional guarantee that the object was correctly received |
x-amz-copy-source | The object specified in the header is copied to the target key |
x-amz-tagging | The tag-set to assign to the uploaded object, formatted as a query string (for example, "Key1=Value1") |
x-amz-tagging-directive | Specifies whether the object tag-set are copied from the source object or replaced with tag-set provided in the request. Valid Values: COPY or REPLACE |
x-amz-server-side-encryption | SSE-S3 Algorithm (supported: AES256) |
x-amz-server-side-encryption-customer-algorithm | SSE-C algorithm (supported: AES256) |
x-amz-server-side-encryption-customer-key | SSE-C base64-encoded encryption key |
x-amz-server-side-encryption-customer-key-MD5 | SSE-C base64-encoded encryption key hash (MD5) |
x-amz-copy-source-server-side-encryption-customer-algorithm | SSE-C algorithm of the source object (supported: AES256) |
x-amz-copy-source-server-side-encryption-customer-key | SSE-C base64-encoded decryption key of the source object |
x-amz-copy-source-server-side-encryption-customer-key-MD5 | SSE-C base64-encoded decryption key hash (MD5) of the source object |
x-amz-checksum-algorithm or x-amz-sdk-checksum-algorithm | Custom checksum algorithm (valid values: CRC32 , CRC32C , SHA1 , SHA256 ), stored checksum can be retrieved by calling GetObject |
x-amz-checksum | Optional base64-encoded checksum for custom checksum algorithm |
x-amz-trailer | Optional compatibility header, may contain value: x-amz-checksum-crc32 , x-amz-checksum-crc32c , x-amz-checksum-sha1 , or x-amz-checksum-sha256 |
x-amz-checksum-crc32 | CRC32 checksum of the object (base64-encoded) |
x-amz-checksum-crc32c | CRC32C checksum of the object (base64-encoded) |
x-amz-checksum-sha1 | SHA1 checksum of the object (base64-encoded) |
x-amz-checksum-sha256 | SHA256 checksum of the object (base64-encoded) |
If the checksum is calculated on the client side, it should be sent to the server in the x-amz-checksum-crc32
, x-amz-checksum-crc32c
, x-amz-checksum-sha1
, or x-amz-checksum-sha256
headers or a combination of x-amz-checksum
and x-amz-checksum-algorithm
or x-amz-sdk-checksum-algorithm
. The server will verify the checksum, and will return an error if the checksums do not match.
Example valid base64-encoded checksum values for "Hello world\n123\n
" without quotes
uWvPlg==
Cy8XOQ==
LupGMeUw441P/33BhJlOZVSBpVg=
uzbBRoYAgN7yiuoYiZFk6kfOPcFad8E8uxFLXfuKVsA=
If specified, the value of the following headers will be stored alongside the object, and then returned on the HeadObject or GetObject APIs:
Custom metadata can be specified by means of headers with the x-amz-meta-
prefix, up to a total of 2KB of data (counting both header names and values).
On success, a status code of 200 is returned. An error code is returned otherwise. In case this operation is performed in a bucket that has the versioning enabled the corresponding VersionId
is returned. Moreover, in case the bucket has one or more lifecycle expiration rules that apply to newly created object, the corresponding Expiration
is returned. Finally, if object was uploaded with SSE-S3 or SS3-C encryption, ServerSideEncryption
is returned.
{
"ETag": "\"324f6cbcfdf2420dd63890234a9f2f14\""
}
{
"VersionId": "khd1pmwdgewhlnd2",
"ETag": "\"324f6cbcfdf2420dd63890234a9f2f14\""
}
package main
import (
"context"
_ "embed"
"encoding/json"
"strings"
"log"
"github.com/aws/aws-sdk-go-v2/aws"
"github.com/aws/aws-sdk-go-v2/aws/middleware"
"github.com/aws/aws-sdk-go-v2/config"
"github.com/aws/aws-sdk-go-v2/credentials"
"github.com/aws/aws-sdk-go-v2/service/s3"
"github.com/aws/aws-sdk-go-v2/service/s3/types"
"github.com/aws/smithy-go/transport/http"
)
// the secret file will be embedded on compile time
// the file should contain something like this:
/*
"url":"https://BUCKET.s3.RESELLER.lyve.seagate.com",
"accessKey": "STX...",
"secretKey": "..."
*/
// REGION: sjc03, dca02, den02, lon01, lon02, toy01, osa01
// BUCKET: bucket name
//go:embed secret.json
var secret []byte
type Cfg struct {
Url string `json:"url"`
AccessKey string `json:"accessKey"`
SecretKey string `json:"secretKey"`
}
// helper function for exit early CLI and print stack trace
// do not use for long-running service
func panicIf(err error, str string) {
if err != nil {
log.Println(str)
panic(err)
}
}
func main() {
// load secrets from configuration
var jsonCfg Cfg
err := json.Unmarshal(secret, &jsonCfg)
panicIf(err, `secret.json parsing failed`)
// file name to upload
key := aws.String(`FILENAME`)
// example content of the file to be uploaded
const helloWorld = "Hello world\n123\n"
// retrieve bucket from config
dotPos := strings.Index(jsonCfg.Url,".")
bucketName := jsonCfg.Url[8:dotPos] // "https://" have length of 8
log.Println(`bucket name:`, bucketName)
bucket := aws.String(bucketName)
usingPF := strings.Contains(jsonCfg.Url, `lyve.seagate.com`) ||
strings.Contains(jsonCfg.Url, `lyve-storage.com`)
// connection configuration
ctx := context.Background()
opts := [](func(options *config.LoadOptions) error){}
opts = append(opts, config.WithRegion(region))
cred := credentials.NewStaticCredentialsProvider(jsonCfg.AccessKey, jsonCfg.SecretKey, "")
opts = append(opts, config.WithCredentialsProvider(cred))
var awsCfg aws.Config
if usingPF { // override AWS default URL
resolver := aws.EndpointResolverWithOptionsFunc(func(service, region string, options ...any) (aws.Endpoint, error) {
return aws.Endpoint{
SigningRegion: region,
URL: jsonCfg.Url,
HostnameImmutable: true,
}, nil
})
opts = append(opts, config.WithEndpointResolverWithOptions(resolver))
}
awsCfg, err = config.LoadDefaultConfig(ctx, opts...)
panicIf(err, `failed config.LoadDefaultConfig`)
// create s3 client
s3Client := s3.NewFromConfig(awsCfg)
// create bucket
_, err := s3Client.CreateBucket(ctx, &s3.CreateBucketInput{
Bucket: bucket,
})
if err != nil {
log.Printf(`s3Client.CreateBucket failed %s: %s`, *bucket, err)
} else {
log.Printf(`bucket %v created`, *bucket)
}
{
log.Println(`PutObject start`)
out, err := s3Client.PutObject(ctx, &s3.PutObjectInput{
Bucket: bucket,
Key: key,
Body: strings.NewReader(helloWorld),
// enable one of these to do checksum verification:
//ChecksumCRC32: aws.String(`uWvPlg==`),
//ChecksumCRC32C: aws.String(`Cy8XOQ==`),
//ChecksumSHA1: aws.String(`LupGMeUw441P/33BhJlOZVSBpVg=`),
//ChecksumSHA256: aws.String(`uzbBRoYAgN7yiuoYiZFk6kfOPcFad8E8uxFLXfuKVsA=`),
})
panicIf(err, `failed s3Client.PutObject`)
log.Println(`PutObject success`)
log.Println(middleware.GetRawResponse(out.ResultMetadata).(*http.Response).Header)
}
{
log.Println(`GetObject start`)
out, err := s3Client.GetObject(ctx, &s3.GetObjectInput{
Bucket: bucket,
Key: key,
// checksum always returned by default
//ChecksumMode: types.ChecksumModeEnabled, // X-Amz-Checksum-Mode
})
panicIf(err, `failed s3Client.GetObject`)
log.Println(`GetObject success`)
log.Println(middleware.GetRawResponse(out.ResultMetadata).(*http.Response).Header)
}
}
POST /<bucket>/<object>?uploads
Initiates a new multipart upload, returning a new upload ID.
No request parameters used
The following optional headers are supported:
Header | Description |
---|---|
x-amz-tagging | The tag-set to assign to the uploaded object, formatted as a query string (for example, "Key1=Value1") |
x-amz-server-side-encryption | SSE-S3 Algorithm (supported: AES256) |
x-amz-server-side-encryption-customer-algorithm | SSE-C algorithm (supported: AES256) |
x-amz-server-side-encryption-customer-key | SSE-C base64-encoded encryption key |
x-amz-server-side-encryption-customer-key-MD5 | SSE-C base64-encoded encryption key hash (MD5) |
x-amz-checksum-algorithm or x-amz-sdk-checksum-algorithm | Custom checksum algorithm for the uploaded part, valid values: CRC32 , CRC32C , SHA1 , SHA256 ) |
Additionally the following metadata headers are supported, and will be stored together with the object once the upload is completed.
x-amz-meta-
metadata headers (see PutObject)
<?xml version="1.0" encoding="UTF-8"?>
<InitiateMultipartUploadResult xmlns="http://s3.amazonaws.com/doc/2006-03-01/">
<Bucket>bucketA</Bucket>
<Key>objectKey</Key>
<UploadId>ifWDmLwLgAR8QDN/tg67DObvjR4=</UploadId>
</InitiateMultipartUploadResult>
// connection part see PutObject example above
out, err := s3Client.CreateMultipartUpload(ctx, &s3.CreateMultipartUploadInput{
Bucket: bucket,
Key: key,
//ChecksumAlgorithm: types.ChecksumAlgorithmCRC32,
})
panicIf(err, `failed s3Client.CreateMultipartUpload`)
PUT /<bucket>/<object>?partNumber=<partNumber>&uploadID=<uploadID>
The request is analogous to "Put Object", but specifies two additional query parameters: partNumber
and uploadId
. The parameters object
and uploadID
must be equal respectively to the ones provided and returned in the "Initiate Multipart Upload" call. The partNumber will be used to reassemble the uploaded parts.
The UploadPart operation supports the following optional headers:
Header | Description |
---|---|
Content-Md5 | The MD5 hash of the content. If present, it is checked as an additional guarantee that the object was correctly received |
x-amz-copy-source | The object specified in the header is copied to the target partNumber for specified uploadId multipart |
x-amz-server-side-encryption-customer-algorithm | SSE-C algorithm (supported: AES256) |
x-amz-server-side-encryption-customer-key | SSE-C base64-encoded encryption key |
x-amz-server-side-encryption-customer-key-MD5 | SSE-C base64-encoded encryption key hash (MD5) |
x-amz-copy-source-server-side-encryption-customer-algorithm | SSE-C algorithm of the source object (supported: AES256) |
x-amz-copy-source-server-side-encryption-customer-key | SSE-C base64-encoded decryption key of the source object |
x-amz-copy-source-server-side-encryption-customer-key-MD5 | SSE-C base64-encoded decryption key hash (MD5) of the source object |
x-amz-checksum-algorithm or x-amz-sdk-checksum-algorithm | Custom checksum algorithm for the uploaded part, valid values: CRC32 , CRC32C , SHA1 , SHA256 ) |
x-amz-checksum | Optional base64-encoded checksum for custom checksum-algorithm |
x-amz-trailer | Optional compatibility header, may contain value: x-amz-checksum-crc32 , x-amz-checksum-crc32c , x-amz-checksum-sha1 , or x-amz-checksum-sha256 |
x-amz-checksum-crc32 | CRC32 checksum of the object (base64-encoded) |
x-amz-checksum-crc32c | CRC32C checksum of the object (base64-encoded) |
x-amz-checksum-sha1 | SHA1 checksum of the object (base64-encoded) |
x-amz-checksum-sha256 | SHA256 checksum of the object (base64-encoded) |
If checksum-algorithm supplied, it would behave the same as Put Object. Optionally if checksum calculation done on client side, x-amz-checksum-crc32
or x-amz-cheecksum-crc32c
, x-amz-checksum-sha1
or x-amz-checksum-sha256
can be sent, server will verify the checksum and return error if it does not match. If x-amz-checksum-*
not set, server will calculate the checksum that can be used optionally on Complete Multiple Upload.
The response has an empty body, and specifies a status code (reflecting the outcome of the operation), and the ETag of the uploaded object as a header. The returned ETag must be noted, as it is required in the Complete Multipart Upload request.
HTTP/1.0 200 OK
date: Mon, 25 Feb 2019 12:10:46 GMT
etag: "a2f4f30ec726440bcc748981e82f43fc"
On each part, there's optional ChecksumCRC32
, ChecksumCRC32C
, ChecksumSHA1
, ChecksumSHA256
fields, for example: <ChecksumCRC32>abcdef==</ChecksumCRC32>
, which is used to verify the integrity of the concatenated checksum of the uploaded parts, this should match with the custom checksum-algorithm (x-amz-checksum-algorithm
or x-amz-sdk-checksum-algorithm
) that started in Initiate Multipart Upload phase. PartNumber must be in sequential order or the server will return an error.
<?xml version="1.0" encoding="UTF-8"?>
<CompleteMultipartUploadResult xmlns="http://s3.amazonaws.com/doc/2006-03-01/">
<Location>http://s3.amazonaws.com/abc-bucket/gparted-live-0.33.0-1-amd64.iso</Location>
<Bucket>abc-bucket</Bucket>
<Key>gparted-live-0.33.0-1-amd64.iso</Key>
<ETag>"7b2ca2b72d990a59a6ac992e5a7f910c-9"</ETag>
</CompleteMultipartUploadResult>
<Error>
<Code>InternalError</Code>
<Message>We encountered an internal error. Please try again.</Message>
</Error>
POST /<bucket/<object>?uploadId=<uploadId>
Completes a multipart upload, assembling the parts in ascending partNumber order.
The request body is an XML document listing the parts to assemble, each with the partNumber and ETag respectively in the "Upload Part" request and response.
The response is an XML document, which specifies the outcome of the upload, and either the reassembled file key and ETag, or an error. Moreover, in case the bucket has one or more lifecycle Expiration rules that apply to newly created object, the corresponding Expiration
is returned.
<CompleteMultipartUpload xmlns="http://s3.amazonaws.com/doc/2006-03-01/">
<Part>
<ETag>"a2f4f30ec726440bcc748981e82f43fc"</ETag>
<PartNumber>1</PartNumber>
</Part>
<Part>
<ETag>"d12b6b5a7f8f850c39f32a96e36b5f69"</ETag>
<PartNumber>2</PartNumber>
</Part>
<Part>
<ETag>"e882613760157a24939f87a210043d47"</ETag>
<PartNumber>3</PartNumber>
</Part>
</CompleteMultipartUpload>
<?xml version="1.0" encoding="UTF-8"?>
<CompleteMultipartUploadResult xmlns="http://s3.amazonaws.com/doc/2006-03-01/">
<Location>http://s3.amazonaws.com/abc-bucket/gparted-live-0.33.0-1-amd64.iso</Location>
<Bucket>abc-bucket</Bucket>
<Key>gparted-live-0.33.0-1-amd64.iso</Key>
<ETag>"7b2ca2b72d990a59a6ac992e5a7f910c-9"</ETag>
</CompleteMultipartUploadResult>
<Error>
<Code>InternalError</Code>
<Message>We encountered an internal error. Please try again.</Message>
</Error>
DELETE /<bucket>/<object>?uploadId=<uploadId>
Removes a multipart upload and all the parts that have been uploaded up to that moment.
Returns a status code reflecting the outcome of the operation.
GET /<bucket>?uploads
Lists the multipart uploads for a given bucket that have been initialized but not yet completed or aborted.
<ListMultipartUploadsResult xmlns="http://s3.amazonaws.com/doc/2006-03-01">
<Bucket>examplebucket</Bucket>
<Upload>
<Key>testMultipartTest.txt</Key>
<UploadId>sNyryKj9Jzd5T1gdFpotuiRRcAASIz4nBNa24NSOYgHZYdl5aN</UploadId>
<Initiator>
<ID>99woic3r@example.com</ID>
<DisplayName>99woic3r@example.com</DisplayName>
</Initiator>
<Owner>
<ID>100000000001</ID>
<DisplayName>example</DisplayName>
</Owner>
<StorageClass>STANDARD</StorageClass>
<Initiated>2019-04-29T13:35:48.420Z</Initiated>
</Upload>
</ListMultipartUploadsResult>
GET /<bucket>/<object>?uploadID=<uploadId>
Lists the uploaded parts for a given multipart upload, with their ETag, part number, upload id, size and last modified time. It does not support pagination-related parameters: max-parts
and NextPartNumberMarker
.
<ListPartsResult xmlns="http://s3.amazonaws.com/doc/2006-03-01">
<Bucket>examplebucket</Bucket>
<IsTruncated>false</IsTruncated>
<Part>
<ETag>"3e7bb4a9c59d736603a0b764f1696b7d"</ETag>
<PartNumber>1</PartNumber>
<LastModified>2019-04-29T13:35:48.425Z</LastModified>
<Size>5</Size>
</Part>
<Part>
<ETag>"3e7bb4a9c59d736603a0b764f1696b7d"</ETag>
<PartNumber>2</PartNumber>
<LastModified>2019-04-29T13:35:48.430Z</LastModified>
<Size>5</Size>
</Part>
<Key>testMultipartTest.txt</Key>
<UploadId>sNyryKj9Jzd5T1gdFpotuiRRcAASIz4nBNa24NSOYgHZYdl5aN</UploadId>
<Initiator>
<ID>99woic3r@example.com</ID>
<DisplayName>99woic3r@example.com</DisplayName>
</Initiator>
<Owner>
<ID>100000000001</ID>
<DisplayName>example</DisplayName>
</Owner>
<StorageClass>STANDARD</StorageClass>
<Initiated>2019-04-29T13:35:48.420Z</Initiated>
</ListPartsResult>
PUT /<bucket>?policy
Sets the access policy for a given bucket. Currently, we only support using bucket policies to make a bucket publicly accessible.
In the example, a policy allowing anonymous GetObject requests is assigned to the bucket abc-bucket
.
Returns a status code indicating whether the operation was successful.
{
"Version": "2012-10-17",
"Statement": [
{
"Action": ["s3:GetBucketLocation"],
"Effect": "Allow",
"Principal": { "AWS": ["*] },
"Resource": ["arn:aws:s3:::abc-bucket"],
"Sid": ""
},
{
"Action": ["s3:GetObject"],
"Effect": "Allow",
"Principal": { "AWS": ["*] },
"Resource": ["arn:aws:s3:::abc-bucket/*"],
"Sid": ""
}
]
}
GET /<bucket>?policy
Returns the current bucket policy. If no bucket policy is set, a 404 error is returned.
DELETE /<bucket>?policy
Removes the access policy set for a given bucket.
Returns a status code indicating whether the operation was successful.
aws s3api put-bucket-versioning --bucket test --versioning-configuration "Status=Enabled"
aws s3api put-bucket-versioning --bucket test --versioning-configuration "Status=Suspended"
<VersioningConfiguration xmlns="http://s3.amazonaws.com/doc/2006-03-01/">
<Status>[Enabled | Suspended]</Status>
</VersioningConfiguration>
GET /<bucket>/?versioning
Return the status of versioning for the given bucket
The possible value for status are:
aws s3api get-bucket-versioning --bucket test
{
"Status": "Enabled"
}
GET /examplebucket?rs-info= HTTP/1.1
Host: 127.0.0.1:44355
User-Agent: Go-http-client/1.1
Authorization: AWS4-HMAC-SHA256 Credential=STX1ARO9Y8B0272GA5LAERGU/20190722/any/s3/aws4_request, SignedHeaders=host;x-amz-content-sha256;x-amz-date, Signature=000e8c03d6afe31c96bb616a8f67e29b7cf1308ab196adb2fa757d27750b66aa
X-Amz-Content-Sha256: e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
X-Amz-Date: 20190722T110035Z
Accept-Encoding: gzip
HTTP/1.1 200 OK
Content-Type: application/json
Date: Mon, 22 Jul 2019 11:00:35 GMT
Content-Length: 73
{
"bucketSize": 57300,
"replicationPolicy": [
"DEN02",
"SJC03"
],
"isPublic": false
}
GetBucketPolicyStatus
is currently unsupported.PUT /<bucket>/?lifecycle
Store a Lifecycle configuration for a given bucket. A lifecycle configuration is a set of rules that describes how lifecycle management for a specific object is perfomed. The following kind of rules are supported:
Note
HTTP/1.1 200 OK
x-amz-id-2: aXQ+KbIrmMmoO//3bMdDTw/CnjArwje+J49Hf+j44yRb/VmbIkgIO5A+PT98Cp/6k07hf+LD2mY=
x-amz-request-id: 02D7EC4C10381EB1
Date: Wed, 14 May 2014 02:21:50 GMT
Content-Length: 0
Server: AmazonS3
Note:
Transitions
action is not supportedTag
is not supported in filter conditionsAnd
is not supported in filter conditionsDate
must be in "YYYY-MM-DDT00:00:00Z" formatNote that RSTOR Space does not currently return the object expiration date in the x-amz-expiration
header. To compute the object expiration date for an object, you can proceed as follows:
GET /<bucket>/?lifecycle
Days
field among the ones whose Filter applies to the current objectLast-Modified
header with the Days
indicated in the Expiration policyDate
field are being used, find lowest between all Date
fields whose Filter applies to the current object
aws s3api put-bucket-lifecycle-configuration --bucket examplebucket --lifecycle-configuration file://lifecycle.json
{
"Rules": [
{
"ID": "Delete logs",
"Status": "Enabled",
"Filter": {
"Prefix": "myapp_"
},
"Expiration": {
"Days": 10
},
},
{
"Status": "Enabled",
"Filter": {},
"Expiration": {
"ExpiredObjectDeleteMarker": true
},
},
{
"ID": "Delete aborted multipart",
"Status": "Enabled",
"Filter": {},
"AbortIncompleteMultipartUpload": {
"DaysAfterInitiation": 7
},
},
{
"Status": "Disabled",
"Filter": {
"Prefix": "logs/"
},
"NoncurrentVersionExpiration": {
"NoncurrentDays": 2
},
"ID": "Delete old versions"
}
]
}
HTTP/1.1 200 OK
x-amz-id-2: aXQ+KbIrmMmoO//3bMdDTw/CnjArwje+J49Hf+j44yRb/VmbIkgIO5A+PT98Cp/6k07hf+LD2mY=
x-amz-request-id: 02D7EC4C10381EB1
Date: Wed, 14 May 2014 02:21:50 GMT
Content-Length: 0
Server: AmazonS3
GET /<bucket>/?lifecycle
Return, if present, the current lifecycle configuration for a bucket.
Note: lifecycle configuration returned may differ from the PUTed one, as it may be enriched with some more informations.
aws s3api get-bucket-lifecycle-configuration --bucket examplebucket
GET /examplebucket/?lifecycle HTTP/1.1
Host: s3.lyve.seagate.com
x-amz-date: Thu, 15 Nov 2012 00:17:21 GMT
Authorization: signatureValue
HTTP/1.1 200 OK
x-amz-id-2: ITnGT1y4RyTmXa3rPi4hklTXouTf0hccUjo0iCPjz6FnfIutBj3M7fPGlWO2SEWp
x-amz-request-id: 51991C342C575321
Date: Thu, 15 Nov 2012 00:17:23 GMT
Server: AmazonS3
Content-Length: 358
<?xml version="1.0" encoding="UTF-8"?>
<LifecycleConfiguration xmlns="http://s3.amazonaws.com/doc/2006-03-01/">
<Rule>
<ID>Archive and then delete rule</ID>
<Filter>
<Prefix>projectdocs/</Prefix>
</Filter>
<Status>Enabled</Status>
<Expiration>
<Days>3650</Days>
</Expiration>
</Rule>
</LifecycleConfiguration>
DELETE /<bucket>/?lifecycle
Delete, if present, a lifecycle configuration for a bucket.
aws s3api delete-bucket-lifecycle-configuration --bucket examplebucket
DELETE /examplebucket/?lifecycle HTTP/1.1
Host: s3.lyve.seagate.com
Date: date
Authorization: authorization string
HTTP/1.1 204 No Content
x-amz-id-2: Uuag1LuByRx9e6j5OnimrSAMPLEtRPfTaOAa==
x-amz-request-id: 656c76696e672SAMPLE5657374
Date: Wed, 14 Dec 2011 05:37:16 GMT
Connection: keep-alive
Obtain a link to the object, pre-signed with your most recently used Access Key
Parameter | Description |
---|---|
ExpirationDate | Expiration date for the pre-signed URL. Cannot be more than 30 days (720h) in the future. |
POST /bucket/path/to/object?rs-presign= HTTP/1.1
Host: [...]
Authorization: [...]
Content-Type: application/x-www-form-urlencoded
X-Amz-Content-Sha256: [...]
X-Amz-Date: [...]
ExpirationDate=2019-10-24T07%3A04%3A47.123Z
HTTP/1.1 200 OK
Content-Type: application/json
Date: [...]
Content-Length: [...]
{
"link": "https://s3.example.com/bucket/...",
"accessKeyId": "STX1JH..."
}
Add tagging to an object version. Overwrites tags if existing, to update tagging first get the old tagging, modify them locally and upload the new tagging.
Tagging are in the form of key-value pair: Format=Image
At most 10 tags per object version can be specified.
The length of a tag key can be up to to 128 unicode characters long. The length of a tag value can be up to to 256 unicode characters long.
PUT /bucket/objectkey?tagging&versionId=objectVersion HTTP/1.1
Host: [...]
Authorization: [...]
X-Amz-Content-SHA256: [...]
X-Amz-Date: [...]
<Tagging xmlns="http://s3.amazonaws.com/doc/2006-03-01/">
<TagSet>
<Tag>
<Key>KEYTEXT</Key>
<Value>VALUETEXT</Value>
</Tag>
<Tag>
<Key>Type</Key>
<Value>Script</Value>
</Tag>
</TagSet>
</Tagging>
HTTP/1.1 200 OK
x-amz-version-id: 01DVAXPTT7XFVAMQ7P248ZNWNQ
Date: Thu, 05 Dec 2019 13:00:58 GMT
Content-Length: 0
Return, if present, the tagging of an object.
GET /bucket/objectkey?tagging&versionId=objectVersion HTTP/1.1
Host: [...]
Authorization: [...]
X-Amz-Content-SHA256: [...]
X-Amz-Date: [...]
HTTP/1.1 200 OK
Content-Type: application/xml
Date: [...]
Content-Length: 184
<?xml version="1.0" encoding="UTF-8"?>
<Tagging xmlns="">
<TagSet>
<Tag>
<Key>KEYTEXT</Key>
<Value>VALUETEXT</Value>
</Tag>
<Tag>
<Key>Type</Key>
<Value>Script</Value>
</Tag>
</TagSet>
</Tagging>
Delete, if present, the tagging of an object.
DELETE /bucket/objectkey?tagging&versionId=objectVersion HTTP/1.1
Host: [...]
Authorization: [...]
X-Amz-Content-SHA256: [...]
X-Amz-Date: [...]
Content-Length: 0
HTTP/1.1 204 No Content
x-amz-version-id: [...]
Date: [...]
Places an Object Lock configuration on the specified bucket. The rules specified in the Object Lock configuration will be applied by default to every new object placed in the specified bucket.
The ObjectLockEnabled field is optional and indicates whether the bucket has an Object Lock configuration enabled (valid values: Enabled).
DefaultRetention
requires either Days or Years. You can't specify both at the same time.
PUT /?object-lock HTTP/1.1
Host: bucketName.s3.lyve.seagate.com
<?xml version="1.0" encoding="UTF-8">
<ObjectLockConfiguration xmlns="http://s3.amazonaws.com/doc/2006-03-01/">
<ObjectLockEnabled>string</ObjectLockEnabled>
<Rule>
<DefaultRetention>
<Days>integer</Days>
<Mode>string</Mode>
<Years>integer</Years>
</DefaultRetention>
</Rule>
</ObjectLockConfiguration>
HTTP/1.1 200 OK
Retrieve the Object Lock configuration for a bucket. The rule specified in this Object Lock configuration will be applied by default to every new object placed in the specified bucket.
GET /?object-lock HTTP/1.1
Host: bucketName.s3.lyve.seagate.com
HTTP/1.1 200 OK
<?xml version="1.0" encoding="UTF-8"?>
<ObjectLockConfiguration>
<ObjectLockEnabled>Enabled</ObjectLockEnabled>
<Rule>
<DefaultRetention>
<Days>15</Days>
</DefaultRetention>
</Rule>
</ObjectLockConfiguration>
Set a Legal-Hold lock on an existent object in a specific bucket where the S3-Locking (see CreateBucket
) is enabled.
Parameter | Description |
---|---|
VersionId | specify, if present, the version of the resource where to apply the lock |
The body of the request is an XML, formatted as in the example, where the field Status
could assume only two values: ON, OFF
PUT /{Key+}?legal-hold&VersionId=VersionId HTTP/1.1
Host: s3.lyve.seagate.com
x-amz-date: Thu, 15 Nov 2012 00:17:21 GMT
Content-MD5: ContentMD5
<?xml version="1.0" encoding="UTF-8"?>
<LegalHold xmlns="http://s3.amazonaws.com/doc/2006-03-01/">
<Status>ON</Status>
</LegalHold>
HTTP/1.1 200
Set a retention lock on an existent object in a specific bucket where the S3-Locking (see CreateBucket
) is enabled.
Parameter | Description |
---|---|
VersionId | specify, if present, the version of the resource where to apply the lock |
The body of the request is an XML, formatted as in the example, where the field Mode
could assume only two values: GOVERNANCE, COMPLIANCE.
The RetainUntilDate
field is the timestamp: should be set in the future (see RFC3339 as a format reference).
PUT /{Key+}?retention&VersionId=VersionId HTTP/1.1
Host: s3.lyve.seagate.com
x-amz-bypass-governance-retention: BypassGovernanceRetention
Content-MD5: ContentMD5
<?xml version="1.0" encoding="UTF-8"?>
<Retention xmlns="http://s3.amazonaws.com/doc/2006-03-01/">
<Mode>GOVERNANCE</Mode>
<RetainUntilDate>2020-10-02T15:00:00.05Z</RetainUntilDate>
</Retention>
HTTP/1.1 200
Gets an object's current Legal Hold status.
Parameter | Description |
---|---|
versionId | specify, if present, the version of the resource where to apply the lock |
The body of the response is an XML, formatted as in the example, where the field Status
could assume only two values: ON, OFF
GET /<object-key>?legal-hold&versionId=<version-id> HTTP/1.1
HTTP/1.1 200
<?xml version="1.0" encoding="UTF-8"?>
<LegalHold>
<Status>ON</Status>
</LegalHold>
Retrieves an object's retention settings.
Parameter | Description |
---|---|
versionId | specify, if present, the version of the resource where to apply the lock |
The body of the response is an XML, formatted as in the example, where the field Mode
could assume only two values: GOVERNANCE, COMPLIANCE
GET /<object-key>?legal-hold&versionId=<version-id> HTTP/1.1
HTTP/1.1 200
<?xml version="1.0" encoding="UTF-8"?>
<Retention>
<Mode>GOVERNANCE</Mode>
<RetainUntilDate>2020-10-02T15:00:00.05Z</RetainUntilDate>
</Retention>
Add tagging to a bucket. Overwrites tags if existing, to update tagging first get the old tagging, modify them locally and upload the new tagging.
Tagging are in the form of key-value pair: Format=Image
At most 10 tags per bucket can be specified. The length of a tag key can be up to to 128 unicode characters long. The length of a tag value can be up to to 256 unicode characters long.
PUT /bucket?tagging HTTP/1.1
Host: […]
Authorization: […]
X-Amz-Content-SHA256: […]
X-Amz-Date: […]
<Tagging xmlns="http://s3.amazonaws.com/doc/2006-03-01/">
<TagSet>
<Tag>
<Key>KEYTEXT</Key>
<Value>VALUETEXT</Value>
</Tag>
<Tag>
<Key>Type</Key>
<Value>Script</Value>
</Tag>
</TagSet>
</Tagging>
HTTP/1.1 200 OK
Date: […]
Content-Length: 0
Return, if present, the tagging of a bucket.
GET /bucket?tagging HTTP/1.1
Host: […]
Authorization: […]
X-Amz-Content-SHA256: […]
X-Amz-Date: […]
HTTP/1.1 200 OK
Content-Type: application/xml
Date: […]
Content-Length: 184
<?xml version="1.0" encoding="UTF-8"?>
<Tagging xmlns="">
<TagSet>
<Tag>
<Key>KEYTEXT</Key>
<Value>VALUETEXT</Value>
</Tag>
<Tag>
<Key>Type</Key>
<Value>Script</Value>
</Tag>
</TagSet>
</Tagging>
Delete, if present, the tagging of a bucket.
DELETE /bucket?tagging HTTP/1.1
Host: […]
Authorization: […]
X-Amz-Content-SHA256: […]
X-Amz-Date: […]
Content-Length: 0
HTTP/1.1 204 No Content
x-amz-version-id: […]
Date: […]
Set the logging configuration for a bucket and to specify. All logs are saved to the specified target bucket using the provided access key. To set the logging status of a bucket, you must be the bucket owner.
To delete a Bucket Logging configuration you can make a PUT passing an empty LoggingEnabledelement.
TargetBucket
: is the destination bucket (where the logs will be uploaded) TargetPrefix
: is the prefix of the file contains the log that will be uploaded in the TargetBucket
Then you should compose the TargetGrants
. The TargetGrants
must contains the Grantee
element with xsi:type="AccessKey"
and as a child an ID
element contains the AccessKey used to perform the upload.
Field | Description |
---|---|
BucketOwner | The owner id of the monitored bucket |
Bucket | The monitored bucket |
Ts | The timestamp of the action [06/Feb/2019:00:00:38 +0000] |
RemoteIp | The apparent IP of the requester. Intermediate proxies and firewalls might obscure the actual address of the machine making the request |
Requester | The AccessKey used to perform the action |
RequestId | The Request ID |
Operation | The kind of operarion (ex.: s3.PuObject, s3.GetObject) |
Key | The object Key (if present) |
RequestUri | The Request-URI part of the HTTP request message |
HttpStatus | The numeric HTTP status code of the response |
ErrorCode | The S3 Error Code, or "-" if no error occurred |
BytesSent | The transferred bytes |
ObjectSize | The size of the object transferred |
TotalTime | The number of milliseconds the request was in flight from the server's perspective |
TurnAroundTime | The number of milliseconds spent processing the request |
Referer | The value of the HTTP Referer header, if present |
UserAgent | The value of the HTTP User-Agent header |
VersionId | The version ID in the request (if present) |
HostId | Not used (is always "-") |
SignatureVersion | The signature version, "SigV2" or "SigV4", that was used to authenticate the request or a "-" in the other case |
CipherSuite | The value is SSL if the session was encrypted |
Auth | The type of request authentication used, "AuthHeader" for authentication headers, "QueryString" or "-" for the other cases |
HostHeader | Not used (is always "-") |
TlsVer | The TLS version used |
PUT /mybucketlog?logging HTTP/1.1
Host: 127.0.0.1:32005
Accept-Encoding: identity
User-Agent: aws-cli/1.16.287 Python/3.7.3 Linux/4.19.0-8-amd64 botocore/1.13.23
Content-MD5: NKhuLiQuQT2Icj+AzLFcTQ==
X-Amz-Date: 20200212T203404Z
X-Amz-Content-SHA256: 265e84e2b334e5566fcacffc9277caf252adc4cd4ff835bbc02df1266e116085
Content-Length: 399
<BucketLoggingStatus xmlns="http://s3.amazonaws.com/doc/2006-03-01/">
<LoggingEnabled>
<TargetBucket>targetlog</TargetBucket>
<TargetPrefix>logs/</TargetPrefix>
<TargetGrants>
<Grant>
<Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AccessKey">
<ID>AWS4XZUHH4DVBPMSZB7ODUFVVHGUXMXLY4VRJRJ4BFHJ7CGJACI4LPLA</ID>
</Grantee>
</Grant>
</TargetGrants>
</LoggingEnabled>
</BucketLoggingStatus>
HTTP/1.1 200 OK
Date: [...]
Content-Length: 0
100000000001 testlog [12/Feb/2020:20:28:02 +0100] "[::1]:34178" "AWS4XZUHH4DVBPMSZB7ODUFVVHGUXMXLY4VRJRJ4BFHJ7CGJACI4LPLA" "qfqun6v6dido" s3:PutObject "Everest" "/testlog/Everest" "200" "-" 125829120 "0" 279 274 "" "aws-sdk-go/1.28.13 (go1.13.7; linux; amd64)" 01E0XDYR0H0DA24AYE1DV1PK5S - SigV4 SSL AuthHeader - "-"
100000000001 testlog [12/Feb/2020:20:28:02 +0100] "[::1]:34178" "AWS4XZUHH4DVBPMSZB7ODUFVVHGUXMXLY4VRJRJ4BFHJ7CGJACI4LPLA" "50gzg1qj4ftt" s3:HeadObject "Everest" "/testlog/Everest" "200" "-" 125829120 125829120 1 0 "" "aws-sdk-go/1.28.13 (go1.13.7; linux; amd64)" 01E0XDYR0H0DA24AYE1DV1PK5S - SigV4 SSL AuthHeader - "-"
100000000001 testlog [12/Feb/2020:20:28:02 +0100] "[::1]:34178" "AWS4XZUHH4DVBPMSZB7ODUFVVHGUXMXLY4VRJRJ4BFHJ7CGJACI4LPLA" "eybjzx8hvf5s" s3:DeleteObject "Everest" "/testlog/Everest" "200" "-" "0" "0" 2 0 "" "aws-sdk-go/1.28.13 (go1.13.7; linux; amd64)" "-" - SigV4 SSL AuthHeader - "-"
100000000001 testlog [12/Feb/2020:20:28:02 +0100] "[::1]:34178" "AWS4XZUHH4DVBPMSZB7ODUFVVHGUXMXLY4VRJRJ4BFHJ7CGJACI4LPLA" "69srbt1hije2" s3:PutObject "foo" "/testlog/foo" "200" "-" 20 "0" 3 1 "" "aws-sdk-go/1.28.13 (go1.13.7; linux; amd64)" 01E0XDYR0TABEJXCHQ300Z8BHE - SigV4 SSL AuthHeader - "-"
Retrieve a bucket logging configuration.
GET /mybucketlog?logging HTTP/1.1
Host: 127.0.0.1:32005
Accept-Encoding: identity
User-Agent: aws-cli/1.16.287 Python/3.7.3 Linux/4.19.0-8-amd64 botocore/1.13.23
Content-MD5: NKhuLiQuQT2Icj+AzLFcTQ==
X-Amz-Date: 20200212T203404Z
X-Amz-Content-SHA256: 265e84e2b334e5566fcacffc9277caf252adc4cd4ff835bbc02df1266e116085
Content-Length: 0
<?xml version="1.0" encoding="UTF-8"?>
<BucketLoggingStatus>
<LoggingEnabled>
<TargetBucket>targetlog</TargetBucket>
<TargetPrefix>logs/</TargetPrefix>
<TargetGrants>
<Grant>
<Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="AccessKey">
<ID>STX_KEY_123</ID>
</Grantee>
</Grant>
</TargetGrants>
</LoggingEnabled>
</BucketLoggingStatus>
Perform a download speed test. Backend sends random binary data for 10 seconds. Available only to resellers.
GET /speedtest/download HTTP/1.1
Host: [...]
Accept-Encoding: [...]
Authorization: [...]
User-Agent: [...]
X-Lyve-Speedtest: 1
HTTP/1.1 200 OK
Date: [...]
Content-Type: application/octet-stream
(random binary data)
Perform an upload speed test, probably through a pre-signed link. Backend reads request body for up to 10 seconds. Available only to resellers.
PUT /speedtest/upload HTTP/1.1
Host: [...]
Accept-Encoding: [...]
Authorization: [...]
Content-Length: [...]
Content-Type: application/octet-stream
User-Agent: [...]
X-Lyve-Speedteest: 1
(random binary data)
HTTP/1.1 204 No Content
Date: [...]
Serves per-bucket storage metrics.
GET /?rs-bucket-stats HTTP/1.1
Host: s3.example.lyve.seagate.com
Authorization: [...]
{
"abc-images": {
"size": 6304387203,
"objects": 74854,
"replicationPolicy": [
"DCA02",
"DEN02",
"SJC03"
]
},
"abc-backups": {
"size": 729808896,
"objects": 229,
"replicationPolicy": [
"DCA02",
"DEN02",
"SJC03"
]
}
}
Sets the cors configuration for your bucket. If the configuration exists, it replaces it.
To use this operation, you must be allowed to perform the s3:PutBucketCORS
action. By default, the bucket owner has this permission and can grant it to others.
You set this configuration on a bucket so that the bucket can service cross-origin requests. For example, you might want to enable a request whose origin is http://www.example.com
to access your Lyve bucket at my.example.bucket.com
by using the browser's XMLHttpRequest capability.
To enable cross-origin resource sharing (CORS) on a bucket, you add the cors
subresource to the bucket. The cors
subresource is an XML document in which you configure rules that identify origins and the HTTP methods that can be executed on your bucket. The document is limited to 64 KB in size.
When Lyve Cloud receives a cross-origin request (or a pre-flight OPTIONS request) against a bucket, it evaluates the cors
configuration on the bucket and uses the first CORSRule rule that matches the incoming browser request to enable a cross-origin request. For a rule to match, the following conditions must be met:
Origin
header must match AllowedOrigin
elements.Access-Control-Request-Method
header in case of a pre-flight OPTIONS request must be one of the AllowedMethod
elements.Access-Control-Request-Headers
request header of a pre-flight request must match an AllowedHeader
element.In CORS Configuration example #1
the first CORSRule
allows cross-origin PUT, POST, and DELETE requests whose origin is http://www.example.com
origins. The rule also allows all headers in a pre-flight OPTIONS request through the Access-Control-Request-Headers
header. Therefore, in response to any pre-flight OPTIONS request, Lyve S3 will return any requested headers. The second rule allows cross-origin GET requests from all the origins. The '*' wildcard character refers to all origins.
In CORS Configuration example #2
, the single CORSRule
includes the following additional optional parameters:
MaxAgeSeconds
- Specifies the time in seconds that the browser will cache a Lyve Cloud response to a pre-flight OPTIONS request for the specified resource. In this example, this parameter is 3000 seconds. Caching enables the browsers to avoid sending pre-flight OPTIONS request to Lyve Cloud for repeated requests.ExposeHeader
- Identifies the response header (in this case x-lyve-example
) that you want customers to be able to access from their applications (for example, from a JavaScript XMLHttpRequest object).
PUT / ?cors HTTP/1.1
Host: Bucket.s3.amazonaws.com
Content-MD5: ContentMD5
<?xml version="1.0" encoding="UTF-8"?>
<CORSConfiguration xmlns="http://s3.amazonaws.com/doc/2006-03-01/">
<CORSRule>
<AllowedHeader>string</AllowedHeader>
...
<AllowedMethod>string</AllowedMethod>
...
<AllowedOrigin>string</AllowedOrigin>
...
<ExposeHeader>string</ExposeHeader>
...
<MaxAgeSeconds>integer</MaxAgeSeconds>
</CORSRule>
...
</CORSConfiguration>
<CORSConfiguration>
<CORSRule>
<AllowedOrigin>http://www.example.com</AllowedOrigin>
<AllowedMethod>PUT</AllowedMethod>
<AllowedMethod>POST</AllowedMethod>
<AllowedMethod>DELETE</AllowedMethod>
<AllowedHeader>*</AllowedHeader>
</CORSRule>
<CORSRule>
<AllowedOrigin>*</AllowedOrigin>
<AllowedMethod>GET</AllowedMethod>
</CORSRule>
</CORSConfiguration>
Returns the cors configuration information set for the bucket.
To use this operation, you must have permission to perform the s3:GetBucketCORS
action. By default, the bucket owner has this permission and can grant it to others.
GET /?cors HTTP/1.1
Host: Bucket.s3.lyve.seagate.com
HTTP/1.1 200
Content-Type: application/xml
<?xml version="1.0" encoding="UTF-8"?>
<CORSConfiguration>
<CORSRule>
<AllowedHeader>string</AllowedHeader>
...
<AllowedMethod>string</AllowedMethod>
...
<AllowedOrigin>string</AllowedOrigin>
...
<ExposeHeader>string</ExposeHeader>
...
<MaxAgeSeconds>integer</MaxAgeSeconds>
</CORSRule>
...
</CORSConfiguration>
If the action is successful, the service sends back an HTTP 204 response with an empty HTTP body.
Deletes the cors configuration information set for the bucket.
To use this operation, you must have permission to perform the s3:PutBucketCORS
action. The bucket owner has this permission by default and can grant this permission to others.
DELETE /?cors HTTP/1.1
Host: Bucket.s3.lyve.seagate.com
HTTP/1.1 204
The POST
operation adds an object to a specified bucket using HTML forms. POST
is an alternate form of PUT that enables browser-based uploads as a way of putting objects in buckets. Parameters that are passed to PUT
via HTTP Headers are instead passed as form fields to POST
in the multipart/form-data
encoded message body. You must have WRITE
access on a bucket to add an object to it. Lyve Cloud never stores partial objects: if you receive a successful response, you can be confident the entire object was stored.
Lyve Cloud is a distributed system. If Lyve Cloud receives multiple write requests for the same object simultaneously, all but the last object written is overwritten.
To ensure that data is not corrupted traversing the network, use the Content-MD5
form field. When you use this form field, Lyve Cloud checks the object against the provided MD5 value. If they do not match, Lyve Cloud returns an error. Additionally, you can calculate the MD5 value while posting an object to Lyve Cloud and compare the returned ETag to the calculated MD5 value. The ETag only reflects changes to the contents of an object, not its metadata.
The policy required for making authenticated requests using HTTP POST is a UTF-8 and base64-encoded document written in JavaScript Object Notation (JSON) that specifies conditions that the request must meet. Depending on how you design your policy document, you can control the access granularity per-upload, per-user, for all uploads, or according to other designs that meet your needs.
The POST policy always contains the expiration
and conditions
elements. The example policy uses two condition matching types (exact matching and starts-with matching). The following sections describe these elements.
The expiration
element specifies the expiration date and time of the POST policy in ISO8601 GMT date format. For example, 2013-08-01T12:00:00.000Z
specifies that the POST policy is not valid after midnight GMT on August 1, 2013.
Following is a table that describes condition matching types that you can use to specify POST policy conditions (described in the next section). Although you must specify one condition for each form field that you specify in the form, you can create more complex matching criteria by specifying multiple conditions for a form field.
Condition Match Type | Description |
---|---|
Exact Matches | The form field value must match the value specified. This example indicates that the ACL must be set to public-read:{"acl": "public-read" } This example is an alternate way to indicate that the ACL must be set to public-read: [ "eq", "$acl", "public-read" ] |
Starts With | The value must start with the specified value. This example indicates that the object key must start with user/user1:["starts-with", "$key", "user/user1/"] |
Matching Content-Types in a Comma-Separated List | Content-Types values for a starts-with condition that include commas are interpreted as lists. Each value in the list must meet the condition for the whole condition to pass. For example, given the following condition:["starts-with", "$Content-Type", "image/"] The following value would pass the condition: "image/jpg,image/png,image/gif" The following value would not pass the condition: ["image/jpg,text/plain"] Note: data elements other than Content-Type are treated as strings, regardless of the presence of commas. |
Matching Any Content | To configure the POST policy to allow any content within a form field, use starts-with with an empty value (""). This example allows any value for success_action_redirect:["starts-with", "$success_action_redirect", ""] |
Specifying Ranges | For form fields that accept a range, separate the upper and lower limit with a comma. This example allows a file size from 1 to 10 MiB:["content-length-range", 1048576, 10485760] |
The conditions
in a POST policy is an array of objects, each of which is used to validate the request. You can use these conditions to restrict what is allowed in the request. For example, the provided example policy conditions require the following:
mybucket
bucket name.user/paul
prefix.Each form field that you specify in a form (except x-amz-signature
, file
, policy
, and field names that have an x-ignore-
prefix) must appear in the list of conditions.
user/user1
). In this case, you set the key form field to user/user1/${filename}
. Your POST policy should be [ "starts-with", "$key", "user/user1/" ]
(do not enter [ "starts-with", "$key", "user/user1/${filename}" ]
).Policy document conditions are described in the following table.
Element Name | Description |
---|---|
acl | Specifies the ACL value that must be used in the form submission. This condition supports exact matching and starts-with condition match type discussed in the preceding section. |
bucket | Specifies the acceptable bucket name. This condition supports exact matching condition match type. |
content-length-range | The minimum and maximum allowable size for the uploaded content. This condition supports content-length-range condition match type. |
Cache-Control Content-Type Content-Disposition Content-Encoding Expires |
REST-specific headers. For more information, see POST Object. This condition supports exact matching and starts-with condition match type. |
key | The acceptable key name or a prefix of the uploaded object. This condition supports exact matching and starts-with condition match type. |
success_action_redirect redirect |
The URL to which the client is redirected upon successful upload. This condition supports exact matching and starts-with condition match type. |
success_action_status | The status code returned to the client upon successful upload if success_action_redirect is not specified.This condition supports exact matching. |
x-amz-algorithm | The signing algorithm that must be used during signature calculation. For AWS Signature Version 4, the value is AWS4-HMAC-SHA256 .This condition supports exact matching. |
x-amz-credential | The credentials that you used to calculate the signature. It provides access key ID and scope information identifying region and service for which the signature is valid. This should be the same scope you used in calculating the signing key for signature calculation. It is a string of the following form: <your-access-key-id>/<date>/<optional-lyve-region>/s3/aws4_request For example: LyveACCESSKEY92724/20130728/us-east-1/s3/aws4_request For Lyve Cloud, the service string is always s3. Regions are specified for compatibility reasons, although multi-geographical distribution is automatically enforced. This is required if a POST policy document is included with the request. This condition supports exact matching. |
x-amz-date | The date value specified in the ISO8601 formatted string. For example, 20130728T000000Z . The date must be same that you used in creating the signing key for signature calculation.This is required if a POST policy document is included with the request. This condition supports exact matching. |
x-lyve-meta-* | User-specified metadata. This condition supports exact matching and starts-with condition match type. |
x-lyve-* | Any other documented Lyve-specific meta This condition supports exact matching. |
Characters that must be escaped within a POST policy document are described in the following table.
Escape Sequence | Description |
---|---|
\ | Backslash |
\$ | Dollar symbol |
\b | Backspace |
\f | Form feed |
\n | New line |
\r | Carriage return |
\t | Horizontal tab |
\v | Vertical tab |
\uxxxx | All Unicode characters |
<form action="http://s3.lyve.seagate.com/bucketname"
target="s3target"
enctype="multipart/form-data"
method="POST">
<!-- Key is required (key name of uploaded object) -->
<input id="key"
type="hidden"
name="key"
value="test_browser_myfile.txt" />
<!-- Policy is required for authenticated requests -->
<input id="Policy"
type="hidden"
name="Policy"
value="[BASE64_ENCODED_SECURITY_POLICY]" />
<!-- X-Amz-Algorithm is required for authenticated requests -->
<input id="X-Amz-Algorithm"
type="hidden"
name="X-Amz-Algorithm"
value="AWS4-HMAC-SHA256" />
<!-- X-Amz-Credential is required for authenticated requests -->
<input id="X-Amz-Credential"
type="hidden"
name="X-Amz-Credential"
value="AWS4XZUHH4DVBPMSZB7ODUFVVHGUXMXLY4VRJRJ4BFHJ7CGJACI4LPLA/20200819/eu-east-1/s3/aws4_request" />
<!-- X-Amz-Date is required for authenticated requests -->
<input id="X-Amz-Date"
type="hidden"
name="X-Amz-Date"
value="20200819T142942Z" />
<!-- X-Amz-Signature is required for authenticated requests -->
<input id="X-Amz-Signature"
type="hidden"
name="X-Amz-Signature"
value="[HMAC_SHA256_HASH]" />
<!-- optional sample fields -->
<input id="acl"
type="hidden"
name="acl"
value="public-read" />
<input id="success_action_redirect"
type="hidden"
name="success_action_redirect"
value="http://somewhere.com/redir/redirect" />
<input id="x-lyve-meta-something"
type="hidden"
name="x-lyve-meta-something"
value="c25f87c5-2a43-4da6-901c-b3fac171e572" />
<input id="Content-Type"
type="hidden"
name="Content-Type"
value="text/plain" />
<!-- the file content (mandatory) -->
<input id="file"
type="file"
name="file"/>
<button type="submit"
class="btn btn-default">Upload</button>
</form>
{
"expiration": "2007-12-01T12:00:00.000Z",
"conditions": [
{
"acl": "public-read"
},
{
"bucket": "mybucket"
},
[
"starts-with", "$key", "user/paul/"
]
]
}
POST / HTTP/1.1
Host: destinationBucket.s3.lyve.seagate.com
User-Agent: browser_dataAmazon
Accept: file_types
Accept-Language: Regions
Accept-Encoding: encoding
Accept-Charset: character_set
Keep-Alive: 300
Connection: keep-alive
Content-Type: multipart/form-data; boundary=9431149156168
Content-Length: length
--9431149156168
Content-Disposition: form-data; name="key"
acl
--9431149156168
Content-Disposition: form-data; name="tagging"
<Tagging><TagSet><Tag><Key>Tag Name</Key><Value>Tag Value</Value></Tag></TagSet></Tagging>
--9431149156168
Content-Disposition: form-data; name="success_action_redirect"
success_redirect
--9431149156168
Content-Disposition: form-data; name="Content-Type"
content_type
--9431149156168
Content-Disposition: form-data; name="x-amz-meta-uuid"
uuid
--9431149156168
Content-Disposition: form-data; name="x-amz-meta-tag"
metadata
--9431149156168
Content-Disposition: form-data; name="LyveAccessKeyId"
access-key-id
--9431149156168
Content-Disposition: form-data; name="Policy"
encoded_policy
--9431149156168
Content-Disposition: form-data; name="Signature"
signature=
--9431149156168
Content-Disposition: form-data; name="file"; filename="MyFilename.jpg"
Content-Type: image/jpeg
file_content
--9431149156168
Content-Disposition: form-data; name="submit"
Upload to Lyve Cloud
--9431149156168--