@aws-sdk/client-s3 3.303.0 → 3.304.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (91) hide show
  1. package/dist-cjs/endpoint/ruleset.js +3 -3
  2. package/dist-cjs/models/models_0.js +31 -2
  3. package/dist-es/endpoint/ruleset.js +3 -3
  4. package/dist-es/models/models_0.js +29 -0
  5. package/dist-types/S3.d.ts +751 -662
  6. package/dist-types/commands/AbortMultipartUploadCommand.d.ts +2 -2
  7. package/dist-types/commands/CompleteMultipartUploadCommand.d.ts +22 -14
  8. package/dist-types/commands/CopyObjectCommand.d.ts +53 -30
  9. package/dist-types/commands/CreateBucketCommand.d.ts +22 -14
  10. package/dist-types/commands/CreateMultipartUploadCommand.d.ts +74 -48
  11. package/dist-types/commands/DeleteBucketAnalyticsConfigurationCommand.d.ts +2 -2
  12. package/dist-types/commands/DeleteBucketCorsCommand.d.ts +2 -2
  13. package/dist-types/commands/DeleteBucketEncryptionCommand.d.ts +7 -5
  14. package/dist-types/commands/DeleteBucketIntelligentTieringConfigurationCommand.d.ts +1 -2
  15. package/dist-types/commands/DeleteBucketInventoryConfigurationCommand.d.ts +2 -2
  16. package/dist-types/commands/DeleteBucketLifecycleCommand.d.ts +1 -2
  17. package/dist-types/commands/DeleteBucketMetricsConfigurationCommand.d.ts +5 -5
  18. package/dist-types/commands/DeleteBucketOwnershipControlsCommand.d.ts +2 -2
  19. package/dist-types/commands/DeleteBucketReplicationCommand.d.ts +4 -3
  20. package/dist-types/commands/DeleteObjectCommand.d.ts +11 -11
  21. package/dist-types/commands/DeleteObjectTaggingCommand.d.ts +2 -4
  22. package/dist-types/commands/DeleteObjectsCommand.d.ts +13 -14
  23. package/dist-types/commands/DeletePublicAccessBlockCommand.d.ts +2 -2
  24. package/dist-types/commands/GetBucketAccelerateConfigurationCommand.d.ts +5 -4
  25. package/dist-types/commands/GetBucketAclCommand.d.ts +9 -7
  26. package/dist-types/commands/GetBucketAnalyticsConfigurationCommand.d.ts +5 -4
  27. package/dist-types/commands/GetBucketCorsCommand.d.ts +1 -0
  28. package/dist-types/commands/GetBucketEncryptionCommand.d.ts +7 -7
  29. package/dist-types/commands/GetBucketIntelligentTieringConfigurationCommand.d.ts +1 -2
  30. package/dist-types/commands/GetBucketInventoryConfigurationCommand.d.ts +2 -2
  31. package/dist-types/commands/GetBucketLifecycleConfigurationCommand.d.ts +4 -4
  32. package/dist-types/commands/GetBucketLocationCommand.d.ts +4 -0
  33. package/dist-types/commands/GetBucketLoggingCommand.d.ts +1 -1
  34. package/dist-types/commands/GetBucketMetricsConfigurationCommand.d.ts +5 -6
  35. package/dist-types/commands/GetBucketNotificationConfigurationCommand.d.ts +3 -2
  36. package/dist-types/commands/GetBucketOwnershipControlsCommand.d.ts +4 -3
  37. package/dist-types/commands/GetBucketPolicyCommand.d.ts +1 -0
  38. package/dist-types/commands/GetBucketPolicyStatusCommand.d.ts +1 -1
  39. package/dist-types/commands/GetBucketRequestPaymentCommand.d.ts +2 -1
  40. package/dist-types/commands/GetBucketWebsiteCommand.d.ts +1 -2
  41. package/dist-types/commands/GetObjectAclCommand.d.ts +5 -4
  42. package/dist-types/commands/GetObjectAttributesCommand.d.ts +23 -28
  43. package/dist-types/commands/GetObjectCommand.d.ts +20 -18
  44. package/dist-types/commands/GetObjectLockConfigurationCommand.d.ts +1 -2
  45. package/dist-types/commands/GetObjectRetentionCommand.d.ts +2 -1
  46. package/dist-types/commands/GetObjectTaggingCommand.d.ts +5 -5
  47. package/dist-types/commands/GetObjectTorrentCommand.d.ts +1 -1
  48. package/dist-types/commands/GetPublicAccessBlockCommand.d.ts +1 -1
  49. package/dist-types/commands/HeadBucketCommand.d.ts +15 -9
  50. package/dist-types/commands/HeadObjectCommand.d.ts +20 -19
  51. package/dist-types/commands/ListBucketAnalyticsConfigurationsCommand.d.ts +4 -4
  52. package/dist-types/commands/ListBucketIntelligentTieringConfigurationsCommand.d.ts +1 -2
  53. package/dist-types/commands/ListBucketInventoryConfigurationsCommand.d.ts +5 -5
  54. package/dist-types/commands/ListBucketMetricsConfigurationsCommand.d.ts +6 -7
  55. package/dist-types/commands/ListBucketsCommand.d.ts +3 -1
  56. package/dist-types/commands/ListMultipartUploadsCommand.d.ts +2 -2
  57. package/dist-types/commands/ListObjectVersionsCommand.d.ts +3 -6
  58. package/dist-types/commands/ListObjectsV2Command.d.ts +11 -12
  59. package/dist-types/commands/ListPartsCommand.d.ts +3 -4
  60. package/dist-types/commands/PutBucketAccelerateConfigurationCommand.d.ts +4 -3
  61. package/dist-types/commands/PutBucketAclCommand.d.ts +15 -12
  62. package/dist-types/commands/PutBucketAnalyticsConfigurationCommand.d.ts +4 -4
  63. package/dist-types/commands/PutBucketCorsCommand.d.ts +2 -2
  64. package/dist-types/commands/PutBucketEncryptionCommand.d.ts +16 -14
  65. package/dist-types/commands/PutBucketIntelligentTieringConfigurationCommand.d.ts +7 -8
  66. package/dist-types/commands/PutBucketInventoryConfigurationCommand.d.ts +20 -8
  67. package/dist-types/commands/PutBucketLifecycleConfigurationCommand.d.ts +8 -8
  68. package/dist-types/commands/PutBucketLoggingCommand.d.ts +11 -7
  69. package/dist-types/commands/PutBucketMetricsConfigurationCommand.d.ts +4 -4
  70. package/dist-types/commands/PutBucketNotificationConfigurationCommand.d.ts +12 -12
  71. package/dist-types/commands/PutBucketOwnershipControlsCommand.d.ts +4 -2
  72. package/dist-types/commands/PutBucketPolicyCommand.d.ts +2 -1
  73. package/dist-types/commands/PutBucketReplicationCommand.d.ts +12 -11
  74. package/dist-types/commands/PutBucketRequestPaymentCommand.d.ts +1 -1
  75. package/dist-types/commands/PutBucketTaggingCommand.d.ts +12 -12
  76. package/dist-types/commands/PutBucketVersioningCommand.d.ts +4 -4
  77. package/dist-types/commands/PutObjectAclCommand.d.ts +17 -13
  78. package/dist-types/commands/PutObjectCommand.d.ts +44 -53
  79. package/dist-types/commands/PutObjectLockConfigurationCommand.d.ts +7 -8
  80. package/dist-types/commands/PutObjectRetentionCommand.d.ts +3 -4
  81. package/dist-types/commands/PutObjectTaggingCommand.d.ts +4 -3
  82. package/dist-types/commands/PutPublicAccessBlockCommand.d.ts +1 -1
  83. package/dist-types/commands/RestoreObjectCommand.d.ts +49 -68
  84. package/dist-types/commands/SelectObjectContentCommand.d.ts +13 -17
  85. package/dist-types/commands/UploadPartCommand.d.ts +23 -16
  86. package/dist-types/commands/UploadPartCopyCommand.d.ts +7 -5
  87. package/dist-types/commands/WriteGetObjectResponseCommand.d.ts +32 -21
  88. package/dist-types/models/models_0.d.ts +460 -362
  89. package/dist-types/models/models_1.d.ts +81 -76
  90. package/dist-types/ts3.4/models/models_0.d.ts +30 -28
  91. package/package.json +1 -1
@@ -20,8 +20,8 @@ export interface PutBucketAclCommandOutput extends __MetadataBearer {
20
20
  /**
21
21
  * @public
22
22
  * <p>Sets the permissions on an existing bucket using access control lists (ACL). For more
23
- * information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/S3_ACLs_UsingACLs.html">Using ACLs</a>. To set
24
- * the ACL of a bucket, you must have <code>WRITE_ACP</code> permission.</p>
23
+ * information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/S3_ACLs_UsingACLs.html">Using ACLs</a>. To set the ACL of a
24
+ * bucket, you must have <code>WRITE_ACP</code> permission.</p>
25
25
  * <p>You can use one of the following two ways to set a bucket's permissions:</p>
26
26
  * <ul>
27
27
  * <li>
@@ -40,11 +40,12 @@ export interface PutBucketAclCommandOutput extends __MetadataBearer {
40
40
  * that updates a bucket ACL using the request body, then you can continue to use that
41
41
  * approach.</p>
42
42
  * <important>
43
- * <p>If your bucket uses the bucket owner enforced setting for S3 Object Ownership, ACLs are disabled and no longer affect permissions.
44
- * You must use policies to grant access to your bucket and the objects in it. Requests to set ACLs or update ACLs fail and
45
- * return the <code>AccessControlListNotSupported</code> error code. Requests to read ACLs are still supported.
46
- * For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/about-object-ownership.html">Controlling object ownership</a>
47
- * in the <i>Amazon S3 User Guide</i>.</p>
43
+ * <p>If your bucket uses the bucket owner enforced setting for S3 Object Ownership, ACLs
44
+ * are disabled and no longer affect permissions. You must use policies to grant access to
45
+ * your bucket and the objects in it. Requests to set ACLs or update ACLs fail and return
46
+ * the <code>AccessControlListNotSupported</code> error code. Requests to read ACLs are
47
+ * still supported. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/about-object-ownership.html">Controlling object
48
+ * ownership</a> in the <i>Amazon S3 User Guide</i>.</p>
48
49
  * </important>
49
50
  * <p>
50
51
  * <b>Access Permissions</b>
@@ -56,7 +57,8 @@ export interface PutBucketAclCommandOutput extends __MetadataBearer {
56
57
  * a set of predefined ACLs, known as <i>canned ACLs</i>. Each canned ACL
57
58
  * has a predefined set of grantees and permissions. Specify the canned ACL name as the
58
59
  * value of <code>x-amz-acl</code>. If you use this header, you cannot use other access
59
- * control-specific headers in your request. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html#CannedACL">Canned ACL</a>.</p>
60
+ * control-specific headers in your request. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html#CannedACL">Canned
61
+ * ACL</a>.</p>
60
62
  * </li>
61
63
  * <li>
62
64
  * <p>Specify access permissions explicitly with the <code>x-amz-grant-read</code>,
@@ -65,14 +67,15 @@ export interface PutBucketAclCommandOutput extends __MetadataBearer {
65
67
  * specify explicit access permissions and grantees (Amazon Web Services accounts or Amazon S3 groups) who
66
68
  * will receive the permission. If you use these ACL-specific headers, you cannot use
67
69
  * the <code>x-amz-acl</code> header to set a canned ACL. These parameters map to the
68
- * set of permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control List (ACL)
69
- * Overview</a>.</p>
70
+ * set of permissions that Amazon S3 supports in an ACL. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html">Access Control
71
+ * List (ACL) Overview</a>.</p>
70
72
  * <p>You specify each grantee as a type=value pair, where the type is one of the
71
73
  * following:</p>
72
74
  * <ul>
73
75
  * <li>
74
76
  * <p>
75
- * <code>id</code> – if the value specified is the canonical user ID of an Amazon Web Services account</p>
77
+ * <code>id</code> – if the value specified is the canonical user ID of an
78
+ * Amazon Web Services account</p>
76
79
  * </li>
77
80
  * <li>
78
81
  * <p>
@@ -152,7 +155,7 @@ export interface PutBucketAclCommandOutput extends __MetadataBearer {
152
155
  * <p>By Email address:</p>
153
156
  * <p>
154
157
  * <code><Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
155
- * xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress>lt;/Grantee></code>
158
+ * xsi:type="AmazonCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress>&</Grantee></code>
156
159
  * </p>
157
160
  * <p>The grantee is resolved to the CanonicalUser and, in a response to a GET Object
158
161
  * acl request, appears as the CanonicalUser. </p>
@@ -27,8 +27,8 @@ export interface PutBucketAnalyticsConfigurationCommandOutput extends __Metadata
27
27
  * selecting data export, you specify a destination bucket and an optional destination prefix
28
28
  * where the file is written. You can export the data to a destination bucket in a different
29
29
  * account. However, the destination bucket must be in the same Region as the bucket that you
30
- * are making the PUT analytics configuration to. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/analytics-storage-class.html">Amazon S3 Analytics – Storage Class
31
- * Analysis</a>. </p>
30
+ * are making the PUT analytics configuration to. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/analytics-storage-class.html">Amazon S3
31
+ * Analytics – Storage Class Analysis</a>. </p>
32
32
  * <important>
33
33
  * <p>You must create a bucket policy on the destination bucket where the exported file is
34
34
  * written to grant permissions to Amazon S3 to write objects to the bucket. For an example
@@ -37,8 +37,8 @@ export interface PutBucketAnalyticsConfigurationCommandOutput extends __Metadata
37
37
  * <p>To use this operation, you must have permissions to perform the
38
38
  * <code>s3:PutAnalyticsConfiguration</code> action. The bucket owner has this permission
39
39
  * by default. The bucket owner can grant this permission to others. For more information
40
- * about permissions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-with-s3-actions.html#using-with-s3-actions-related-to-bucket-subresources">Permissions Related to Bucket Subresource Operations</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-access-control.html">Managing Access Permissions to Your Amazon S3
41
- * Resources</a>.</p>
40
+ * about permissions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-with-s3-actions.html#using-with-s3-actions-related-to-bucket-subresources">Permissions Related to Bucket Subresource Operations</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-access-control.html">Managing
41
+ * Access Permissions to Your Amazon S3 Resources</a>.</p>
42
42
  * <p class="title">
43
43
  * <b>Special Errors</b>
44
44
  * </p>
@@ -53,8 +53,8 @@ export interface PutBucketCorsCommandOutput extends __MetadataBearer {
53
53
  * </p>
54
54
  * </li>
55
55
  * </ul>
56
- * <p> For more information about CORS, go to <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/cors.html">Enabling
57
- * Cross-Origin Resource Sharing</a> in the <i>Amazon S3 User Guide</i>.</p>
56
+ * <p> For more information about CORS, go to <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/cors.html">Enabling Cross-Origin Resource Sharing</a> in
57
+ * the <i>Amazon S3 User Guide</i>.</p>
58
58
  * <p class="title">
59
59
  * <b>Related Resources</b>
60
60
  * </p>
@@ -19,25 +19,27 @@ export interface PutBucketEncryptionCommandOutput extends __MetadataBearer {
19
19
  }
20
20
  /**
21
21
  * @public
22
- * <p>This action uses the <code>encryption</code> subresource to configure default
23
- * encryption and Amazon S3 Bucket Key for an existing bucket.</p>
24
- * <p>Default encryption for a bucket can use server-side encryption with Amazon S3-managed keys
25
- * (SSE-S3) or customer managed keys (SSE-KMS). If you specify default encryption
26
- * using SSE-KMS, you can also configure Amazon S3 Bucket Key. When the default encryption is SSE-KMS, if
27
- * you upload an object to the bucket and do not specify the KMS key to use for encryption, Amazon S3
28
- * uses the default Amazon Web Services managed KMS key for your account. For information about default
29
- * encryption, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/bucket-encryption.html">Amazon S3 default bucket encryption</a>
30
- * in the <i>Amazon S3 User Guide</i>. For more information about S3 Bucket Keys,
31
- * see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/bucket-key.html">Amazon S3 Bucket Keys</a> in the <i>Amazon S3 User Guide</i>.</p>
22
+ * <p>This action uses the <code>encryption</code> subresource to configure default encryption
23
+ * and Amazon S3 Bucket Keys for an existing bucket.</p>
24
+ * <p>By default, all buckets have a default encryption configuration that
25
+ * uses server-side encryption with Amazon S3 managed keys (SSE-S3).
26
+ * You can optionally configure default encryption for a bucket by using server-side
27
+ * encryption with an Amazon Web Services KMS key (SSE-KMS) or a customer-provided key (SSE-C). If you specify default encryption by using
28
+ * SSE-KMS, you can also configure Amazon S3 Bucket Keys. For information about bucket default encryption,
29
+ * see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/bucket-encryption.html">Amazon S3
30
+ * bucket default encryption</a> in the <i>Amazon S3 User Guide</i>. For more
31
+ * information about S3 Bucket Keys, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/bucket-key.html">Amazon S3 Bucket Keys</a> in the
32
+ * <i>Amazon S3 User Guide</i>.</p>
32
33
  * <important>
33
- * <p>This action requires Amazon Web Services Signature Version 4. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/sig-v4-authenticating-requests.html"> Authenticating Requests (Amazon Web Services Signature
34
- * Version 4)</a>. </p>
34
+ * <p>This action requires Amazon Web Services Signature Version 4. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/sig-v4-authenticating-requests.html">
35
+ * Authenticating Requests (Amazon Web Services Signature Version 4)</a>. </p>
35
36
  * </important>
36
37
  * <p>To use this operation, you must have permissions to perform the
37
38
  * <code>s3:PutEncryptionConfiguration</code> action. The bucket owner has this permission
38
39
  * by default. The bucket owner can grant this permission to others. For more information
39
- * about permissions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-with-s3-actions.html#using-with-s3-actions-related-to-bucket-subresources">Permissions Related to Bucket Subresource Operations</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-access-control.html">Managing Access Permissions to Your Amazon S3
40
- * Resources</a> in the Amazon S3 User Guide. </p>
40
+ * about permissions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-with-s3-actions.html#using-with-s3-actions-related-to-bucket-subresources">Permissions Related to Bucket Subresource Operations</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-access-control.html">Managing
41
+ * Access Permissions to Your Amazon S3 Resources</a> in the
42
+ * <i>Amazon S3 User Guide</i>. </p>
41
43
  * <p class="title">
42
44
  * <b>Related Resources</b>
43
45
  * </p>
@@ -19,13 +19,12 @@ export interface PutBucketIntelligentTieringConfigurationCommandOutput extends _
19
19
  }
20
20
  /**
21
21
  * @public
22
- * <p>Puts a S3 Intelligent-Tiering configuration to the specified bucket.
23
- * You can have up to 1,000 S3 Intelligent-Tiering configurations per bucket.</p>
22
+ * <p>Puts a S3 Intelligent-Tiering configuration to the specified bucket. You can have up to
23
+ * 1,000 S3 Intelligent-Tiering configurations per bucket.</p>
24
24
  * <p>The S3 Intelligent-Tiering storage class is designed to optimize storage costs by automatically moving data to the most cost-effective storage access tier, without performance impact or operational overhead. S3 Intelligent-Tiering delivers automatic cost savings in three low latency and high throughput access tiers. To get the lowest storage cost on data that can be accessed in minutes to hours, you can choose to activate additional archiving capabilities.</p>
25
25
  * <p>The S3 Intelligent-Tiering storage class is the ideal storage class for data with unknown, changing, or unpredictable access patterns, independent of object size or retention period. If the size of an object is less than 128 KB, it is not monitored and not eligible for auto-tiering. Smaller objects can be stored, but they are always charged at the Frequent Access tier rates in the S3 Intelligent-Tiering storage class.</p>
26
26
  * <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/storage-class-intro.html#sc-dynamic-data-access">Storage class for automatically optimizing frequently and infrequently accessed objects</a>.</p>
27
- * <p>Operations related to
28
- * <code>PutBucketIntelligentTieringConfiguration</code> include: </p>
27
+ * <p>Operations related to <code>PutBucketIntelligentTieringConfiguration</code> include: </p>
29
28
  * <ul>
30
29
  * <li>
31
30
  * <p>
@@ -45,8 +44,8 @@ export interface PutBucketIntelligentTieringConfigurationCommandOutput extends _
45
44
  * </ul>
46
45
  * <note>
47
46
  * <p>You only need S3 Intelligent-Tiering enabled on a bucket if you want to automatically
48
- * move objects stored in the S3 Intelligent-Tiering storage class to the
49
- * Archive Access or Deep Archive Access tier.</p>
47
+ * move objects stored in the S3 Intelligent-Tiering storage class to the Archive Access
48
+ * or Deep Archive Access tier.</p>
50
49
  * </note>
51
50
  * <p class="title">
52
51
  * <b>Special Errors</b>
@@ -95,8 +94,8 @@ export interface PutBucketIntelligentTieringConfigurationCommandOutput extends _
95
94
  * <li>
96
95
  * <p>
97
96
  * <i>Cause:</i> You are not the owner of the specified bucket,
98
- * or you do not have the <code>s3:PutIntelligentTieringConfiguration</code> bucket
99
- * permission to set the configuration on the bucket. </p>
97
+ * or you do not have the <code>s3:PutIntelligentTieringConfiguration</code>
98
+ * bucket permission to set the configuration on the bucket. </p>
100
99
  * </li>
101
100
  * </ul>
102
101
  * </li>
@@ -32,19 +32,31 @@ export interface PutBucketInventoryConfigurationCommandOutput extends __Metadata
32
32
  * the <i>destination</i> bucket where you want the inventory to be stored, and
33
33
  * whether to generate the inventory daily or weekly. You can also configure what object
34
34
  * metadata to include and whether to inventory all object versions or only current versions.
35
- * For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/storage-inventory.html">Amazon S3
36
- * Inventory</a> in the Amazon S3 User Guide.</p>
35
+ * For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/storage-inventory.html">Amazon S3 Inventory</a> in the
36
+ * Amazon S3 User Guide.</p>
37
37
  * <important>
38
38
  * <p>You must create a bucket policy on the <i>destination</i> bucket to
39
39
  * grant permissions to Amazon S3 to write objects to the bucket in the defined location. For an
40
- * example policy, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html#example-bucket-policies-use-case-9">
41
- * Granting Permissions for Amazon S3 Inventory and Storage Class Analysis</a>.</p>
40
+ * example policy, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html#example-bucket-policies-use-case-9"> Granting Permissions for Amazon S3 Inventory and Storage Class Analysis</a>.</p>
42
41
  * </important>
43
- * <p>To use this operation, you must have permissions to perform the
42
+ * <p>
43
+ * <b>Permissions</b>
44
+ * </p>
45
+ * <p>To use this operation, you must have permission to perform the
44
46
  * <code>s3:PutInventoryConfiguration</code> action. The bucket owner has this permission
45
- * by default and can grant this permission to others. For more information about permissions,
46
- * see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-with-s3-actions.html#using-with-s3-actions-related-to-bucket-subresources">Permissions Related to Bucket Subresource Operations</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-access-control.html">Managing Access Permissions to Your Amazon S3
47
- * Resources</a> in the Amazon S3 User Guide.</p>
47
+ * by default and can grant this permission to others. </p>
48
+ * <p>The <code>s3:PutInventoryConfiguration</code> permission allows a user to create an
49
+ * <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/storage-inventory.html">S3
50
+ * Inventory</a> report that includes all object metadata fields available and to
51
+ * specify the destination bucket to store the inventory. A user with read access to objects
52
+ * in the destination bucket can also access all object metadata fields that are available in
53
+ * the inventory report. </p>
54
+ * <p>To restrict access to an inventory report, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/example-bucket-policies.html#example-bucket-policies-use-case-10">Restricting access to an Amazon S3 Inventory report</a> in the
55
+ * <i>Amazon S3 User Guide</i>. For more information about the metadata fields
56
+ * available in S3 Inventory, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/storage-inventory.html#storage-inventory-contents">Amazon S3
57
+ * Inventory lists</a> in the <i>Amazon S3 User Guide</i>. For more
58
+ * information about permissions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-with-s3-actions.html#using-with-s3-actions-related-to-bucket-subresources">Permissions related to bucket subresource operations</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-access-control.html">Identity and
59
+ * access management in Amazon S3</a> in the <i>Amazon S3 User Guide</i>.</p>
48
60
  * <p class="title">
49
61
  * <b>Special Errors</b>
50
62
  * </p>
@@ -20,10 +20,10 @@ export interface PutBucketLifecycleConfigurationCommandOutput extends __Metadata
20
20
  /**
21
21
  * @public
22
22
  * <p>Creates a new lifecycle configuration for the bucket or replaces an existing lifecycle
23
- * configuration. Keep in mind that this will overwrite an existing lifecycle configuration, so if
24
- * you want to retain any configuration details, they must be included in the new lifecycle
25
- * configuration. For information about lifecycle configuration, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lifecycle-mgmt.html">Managing your storage
26
- * lifecycle</a>.</p>
23
+ * configuration. Keep in mind that this will overwrite an existing lifecycle configuration,
24
+ * so if you want to retain any configuration details, they must be included in the new
25
+ * lifecycle configuration. For information about lifecycle configuration, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lifecycle-mgmt.html">Managing
26
+ * your storage lifecycle</a>.</p>
27
27
  * <note>
28
28
  * <p>Bucket lifecycle configuration now supports specifying a lifecycle rule using an
29
29
  * object key name prefix, one or more object tags, or a combination of both. Accordingly,
@@ -55,8 +55,8 @@ export interface PutBucketLifecycleConfigurationCommandOutput extends __Metadata
55
55
  * versions.</p>
56
56
  * </li>
57
57
  * </ul>
58
- * <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/object-lifecycle-mgmt.html">Object
59
- * Lifecycle Management</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/intro-lifecycle-rules.html">Lifecycle Configuration Elements</a>.</p>
58
+ * <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/object-lifecycle-mgmt.html">Object Lifecycle Management</a>
59
+ * and <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/intro-lifecycle-rules.html">Lifecycle Configuration Elements</a>.</p>
60
60
  * <p>
61
61
  * <b>Permissions</b>
62
62
  * </p>
@@ -86,8 +86,8 @@ export interface PutBucketLifecycleConfigurationCommandOutput extends __Metadata
86
86
  * </p>
87
87
  * </li>
88
88
  * </ul>
89
- * <p>For more information about permissions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-access-control.html">Managing Access Permissions to Your Amazon S3
90
- * Resources</a>.</p>
89
+ * <p>For more information about permissions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-access-control.html">Managing Access Permissions to
90
+ * Your Amazon S3 Resources</a>.</p>
91
91
  * <p>The following are related to <code>PutBucketLifecycleConfiguration</code>:</p>
92
92
  * <ul>
93
93
  * <li>
@@ -20,15 +20,18 @@ export interface PutBucketLoggingCommandOutput extends __MetadataBearer {
20
20
  /**
21
21
  * @public
22
22
  * <p>Set the logging parameters for a bucket and to specify permissions for who can view and
23
- * modify the logging parameters. All logs are saved to buckets in the same Amazon Web Services Region as the
24
- * source bucket. To set the logging status of a bucket, you must be the bucket owner.</p>
25
- * <p>The bucket owner is automatically granted FULL_CONTROL to all logs. You use the <code>Grantee</code> request element to grant access to other people. The
23
+ * modify the logging parameters. All logs are saved to buckets in the same Amazon Web Services Region as
24
+ * the source bucket. To set the logging status of a bucket, you must be the bucket
25
+ * owner.</p>
26
+ * <p>The bucket owner is automatically granted FULL_CONTROL to all logs. You use the
27
+ * <code>Grantee</code> request element to grant access to other people. The
26
28
  * <code>Permissions</code> request element specifies the kind of access the grantee has to
27
29
  * the logs.</p>
28
30
  * <important>
29
- * <p>If the target bucket for log delivery uses the bucket owner enforced
30
- * setting for S3 Object Ownership, you can't use the <code>Grantee</code> request element
31
- * to grant access to others. Permissions can only be granted using policies. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html#grant-log-delivery-permissions-general">Permissions for server access log delivery</a> in the
31
+ * <p>If the target bucket for log delivery uses the bucket owner enforced setting for S3
32
+ * Object Ownership, you can't use the <code>Grantee</code> request element to grant access
33
+ * to others. Permissions can only be granted using policies. For more information, see
34
+ * <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html#grant-log-delivery-permissions-general">Permissions for server access log delivery</a> in the
32
35
  * <i>Amazon S3 User Guide</i>.</p>
33
36
  * </important>
34
37
  * <p>
@@ -69,7 +72,8 @@ export interface PutBucketLoggingCommandOutput extends __MetadataBearer {
69
72
  * <code><BucketLoggingStatus xmlns="http://doc.s3.amazonaws.com/2006-03-01"
70
73
  * /></code>
71
74
  * </p>
72
- * <p>For more information about server access logging, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/ServerLogs.html">Server Access Logging</a> in the <i>Amazon S3 User Guide</i>. </p>
75
+ * <p>For more information about server access logging, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/ServerLogs.html">Server Access Logging</a> in the
76
+ * <i>Amazon S3 User Guide</i>. </p>
73
77
  * <p>For more information about creating a bucket, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_CreateBucket.html">CreateBucket</a>. For more
74
78
  * information about returning the logging status of a bucket, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketLogging.html">GetBucketLogging</a>.</p>
75
79
  * <p>The following operations are related to <code>PutBucketLogging</code>:</p>
@@ -26,10 +26,10 @@ export interface PutBucketMetricsConfigurationCommandOutput extends __MetadataBe
26
26
  * <p>To use this operation, you must have permissions to perform the
27
27
  * <code>s3:PutMetricsConfiguration</code> action. The bucket owner has this permission by
28
28
  * default. The bucket owner can grant this permission to others. For more information about
29
- * permissions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-with-s3-actions.html#using-with-s3-actions-related-to-bucket-subresources">Permissions Related to Bucket Subresource Operations</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-access-control.html">Managing Access Permissions to Your Amazon S3
30
- * Resources</a>.</p>
31
- * <p>For information about CloudWatch request metrics for Amazon S3, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/cloudwatch-monitoring.html">Monitoring Metrics with Amazon
32
- * CloudWatch</a>.</p>
29
+ * permissions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-with-s3-actions.html#using-with-s3-actions-related-to-bucket-subresources">Permissions Related to Bucket Subresource Operations</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-access-control.html">Managing
30
+ * Access Permissions to Your Amazon S3 Resources</a>.</p>
31
+ * <p>For information about CloudWatch request metrics for Amazon S3, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/cloudwatch-monitoring.html">Monitoring
32
+ * Metrics with Amazon CloudWatch</a>.</p>
33
33
  * <p>The following operations are related to
34
34
  * <code>PutBucketMetricsConfiguration</code>:</p>
35
35
  * <ul>
@@ -21,7 +21,7 @@ export interface PutBucketNotificationConfigurationCommandOutput extends __Metad
21
21
  * @public
22
22
  * <p>Enables notifications of specified events for a bucket. For more information about event
23
23
  * notifications, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/NotificationHowTo.html">Configuring Event
24
- * Notifications</a>.</p>
24
+ * Notifications</a>.</p>
25
25
  * <p>Using this API, you can replace an existing notification configuration. The
26
26
  * configuration is an XML file that defines the event types that you want Amazon S3 to publish and
27
27
  * the destination where you want Amazon S3 to publish an event notification when it detects an
@@ -34,19 +34,19 @@ export interface PutBucketNotificationConfigurationCommandOutput extends __Metad
34
34
  * <p>
35
35
  * <code></NotificationConfiguration></code>
36
36
  * </p>
37
- * <p>This action replaces the existing notification configuration with the configuration
38
- * you include in the request body.</p>
37
+ * <p>This action replaces the existing notification configuration with the configuration you
38
+ * include in the request body.</p>
39
39
  * <p>After Amazon S3 receives this request, it first verifies that any Amazon Simple Notification
40
40
  * Service (Amazon SNS) or Amazon Simple Queue Service (Amazon SQS) destination exists, and
41
41
  * that the bucket owner has permission to publish to it by sending a test notification. In
42
42
  * the case of Lambda destinations, Amazon S3 verifies that the Lambda function permissions
43
43
  * grant Amazon S3 permission to invoke the function from the Amazon S3 bucket. For more information,
44
- * see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/NotificationHowTo.html">Configuring Notifications for Amazon S3
45
- * Events</a>.</p>
44
+ * see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/NotificationHowTo.html">Configuring Notifications for Amazon S3 Events</a>.</p>
46
45
  * <p>You can disable notifications by adding the empty NotificationConfiguration
47
46
  * element.</p>
48
- * <p>For more information about the number of event notification configurations that you can create per bucket, see
49
- * <a href="https://docs.aws.amazon.com/general/latest/gr/s3.html#limits_s3">Amazon S3 service quotas</a> in <i>Amazon Web Services General Reference</i>.</p>
47
+ * <p>For more information about the number of event notification configurations that you can
48
+ * create per bucket, see <a href="https://docs.aws.amazon.com/general/latest/gr/s3.html#limits_s3">Amazon S3 service quotas</a> in <i>Amazon Web Services
49
+ * General Reference</i>.</p>
50
50
  * <p>By default, only the bucket owner can configure notifications on a bucket. However,
51
51
  * bucket owners can use a bucket policy to grant permission to other users to set this
52
52
  * configuration with <code>s3:PutBucketNotification</code> permission.</p>
@@ -54,8 +54,8 @@ export interface PutBucketNotificationConfigurationCommandOutput extends __Metad
54
54
  * <p>The PUT notification is an atomic operation. For example, suppose your notification
55
55
  * configuration includes SNS topic, SQS queue, and Lambda function configurations. When
56
56
  * you send a PUT request with this configuration, Amazon S3 sends test messages to your SNS
57
- * topic. If the message fails, the entire PUT action will fail, and Amazon S3 will not add
58
- * the configuration to your bucket.</p>
57
+ * topic. If the message fails, the entire PUT action will fail, and Amazon S3 will not add the
58
+ * configuration to your bucket.</p>
59
59
  * </note>
60
60
  * <p>
61
61
  * <b>Responses</b>
@@ -88,7 +88,7 @@ export interface PutBucketNotificationConfigurationCommandOutput extends __Metad
88
88
  * Id: "STRING_VALUE",
89
89
  * TopicArn: "STRING_VALUE", // required
90
90
  * Events: [ // EventList // required
91
- * "STRING_VALUE",
91
+ * "s3:ReducedRedundancyLostObject" || "s3:ObjectCreated:*" || "s3:ObjectCreated:Put" || "s3:ObjectCreated:Post" || "s3:ObjectCreated:Copy" || "s3:ObjectCreated:CompleteMultipartUpload" || "s3:ObjectRemoved:*" || "s3:ObjectRemoved:Delete" || "s3:ObjectRemoved:DeleteMarkerCreated" || "s3:ObjectRestore:*" || "s3:ObjectRestore:Post" || "s3:ObjectRestore:Completed" || "s3:Replication:*" || "s3:Replication:OperationFailedReplication" || "s3:Replication:OperationNotTracked" || "s3:Replication:OperationMissedThreshold" || "s3:Replication:OperationReplicatedAfterThreshold" || "s3:ObjectRestore:Delete" || "s3:LifecycleTransition" || "s3:IntelligentTiering" || "s3:ObjectAcl:Put" || "s3:LifecycleExpiration:*" || "s3:LifecycleExpiration:Delete" || "s3:LifecycleExpiration:DeleteMarkerCreated" || "s3:ObjectTagging:*" || "s3:ObjectTagging:Put" || "s3:ObjectTagging:Delete",
92
92
  * ],
93
93
  * Filter: { // NotificationConfigurationFilter
94
94
  * Key: { // S3KeyFilter
@@ -107,7 +107,7 @@ export interface PutBucketNotificationConfigurationCommandOutput extends __Metad
107
107
  * Id: "STRING_VALUE",
108
108
  * QueueArn: "STRING_VALUE", // required
109
109
  * Events: [ // required
110
- * "STRING_VALUE",
110
+ * "s3:ReducedRedundancyLostObject" || "s3:ObjectCreated:*" || "s3:ObjectCreated:Put" || "s3:ObjectCreated:Post" || "s3:ObjectCreated:Copy" || "s3:ObjectCreated:CompleteMultipartUpload" || "s3:ObjectRemoved:*" || "s3:ObjectRemoved:Delete" || "s3:ObjectRemoved:DeleteMarkerCreated" || "s3:ObjectRestore:*" || "s3:ObjectRestore:Post" || "s3:ObjectRestore:Completed" || "s3:Replication:*" || "s3:Replication:OperationFailedReplication" || "s3:Replication:OperationNotTracked" || "s3:Replication:OperationMissedThreshold" || "s3:Replication:OperationReplicatedAfterThreshold" || "s3:ObjectRestore:Delete" || "s3:LifecycleTransition" || "s3:IntelligentTiering" || "s3:ObjectAcl:Put" || "s3:LifecycleExpiration:*" || "s3:LifecycleExpiration:Delete" || "s3:LifecycleExpiration:DeleteMarkerCreated" || "s3:ObjectTagging:*" || "s3:ObjectTagging:Put" || "s3:ObjectTagging:Delete",
111
111
  * ],
112
112
  * Filter: {
113
113
  * Key: {
@@ -126,7 +126,7 @@ export interface PutBucketNotificationConfigurationCommandOutput extends __Metad
126
126
  * Id: "STRING_VALUE",
127
127
  * LambdaFunctionArn: "STRING_VALUE", // required
128
128
  * Events: [ // required
129
- * "STRING_VALUE",
129
+ * "s3:ReducedRedundancyLostObject" || "s3:ObjectCreated:*" || "s3:ObjectCreated:Put" || "s3:ObjectCreated:Post" || "s3:ObjectCreated:Copy" || "s3:ObjectCreated:CompleteMultipartUpload" || "s3:ObjectRemoved:*" || "s3:ObjectRemoved:Delete" || "s3:ObjectRemoved:DeleteMarkerCreated" || "s3:ObjectRestore:*" || "s3:ObjectRestore:Post" || "s3:ObjectRestore:Completed" || "s3:Replication:*" || "s3:Replication:OperationFailedReplication" || "s3:Replication:OperationNotTracked" || "s3:Replication:OperationMissedThreshold" || "s3:Replication:OperationReplicatedAfterThreshold" || "s3:ObjectRestore:Delete" || "s3:LifecycleTransition" || "s3:IntelligentTiering" || "s3:ObjectAcl:Put" || "s3:LifecycleExpiration:*" || "s3:LifecycleExpiration:Delete" || "s3:LifecycleExpiration:DeleteMarkerCreated" || "s3:ObjectTagging:*" || "s3:ObjectTagging:Put" || "s3:ObjectTagging:Delete",
130
130
  * ],
131
131
  * Filter: {
132
132
  * Key: {
@@ -21,8 +21,10 @@ export interface PutBucketOwnershipControlsCommandOutput extends __MetadataBeare
21
21
  * @public
22
22
  * <p>Creates or modifies <code>OwnershipControls</code> for an Amazon S3 bucket. To use this
23
23
  * operation, you must have the <code>s3:PutBucketOwnershipControls</code> permission. For
24
- * more information about Amazon S3 permissions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/user-guide/using-with-s3-actions.html">Specifying permissions in a policy</a>. </p>
25
- * <p>For information about Amazon S3 Object Ownership, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/user-guide/about-object-ownership.html">Using object ownership</a>. </p>
24
+ * more information about Amazon S3 permissions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/user-guide/using-with-s3-actions.html">Specifying permissions in a
25
+ * policy</a>. </p>
26
+ * <p>For information about Amazon S3 Object Ownership, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/user-guide/about-object-ownership.html">Using object
27
+ * ownership</a>. </p>
26
28
  * <p>The following operations are related to <code>PutBucketOwnershipControls</code>:</p>
27
29
  * <ul>
28
30
  * <li>
@@ -32,7 +32,8 @@ export interface PutBucketPolicyCommandOutput extends __MetadataBearer {
32
32
  * always use this operation, even if the policy explicitly denies the root user the
33
33
  * ability to perform this action. </p>
34
34
  * </important>
35
- * <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/example-bucket-policies.html">Bucket policy examples</a>.</p>
35
+ * <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/example-bucket-policies.html">Bucket policy
36
+ * examples</a>.</p>
36
37
  * <p>The following operations are related to <code>PutBucketPolicy</code>:</p>
37
38
  * <ul>
38
39
  * <li>
@@ -44,26 +44,27 @@ export interface PutBucketReplicationCommandOutput extends __MetadataBearer {
44
44
  * <b>Handling Replication of Encrypted Objects</b>
45
45
  * </p>
46
46
  * <p>By default, Amazon S3 doesn't replicate objects that are stored at rest using server-side
47
- * encryption with KMS keys. To replicate Amazon Web Services KMS-encrypted objects, add the
48
- * following: <code>SourceSelectionCriteria</code>, <code>SseKmsEncryptedObjects</code>,
47
+ * encryption with KMS keys. To replicate Amazon Web Services KMS-encrypted objects, add the following:
48
+ * <code>SourceSelectionCriteria</code>, <code>SseKmsEncryptedObjects</code>,
49
49
  * <code>Status</code>, <code>EncryptionConfiguration</code>, and
50
50
  * <code>ReplicaKmsKeyID</code>. For information about replication configuration, see
51
51
  * <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/replication-config-for-kms-objects.html">Replicating Objects
52
- * Created with SSE Using KMS keys</a>.</p>
52
+ * Created with SSE Using KMS keys</a>.</p>
53
53
  * <p>For information on <code>PutBucketReplication</code> errors, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/ErrorResponses.html#ReplicationErrorCodeList">List of
54
54
  * replication-related error codes</a>
55
55
  * </p>
56
56
  * <p>
57
57
  * <b>Permissions</b>
58
58
  * </p>
59
- * <p>To create a <code>PutBucketReplication</code> request, you must have <code>s3:PutReplicationConfiguration</code>
60
- * permissions for the bucket.
61
- * </p>
62
- * <p>By default, a resource owner, in this case the Amazon Web Services account that created the bucket, can
63
- * perform this operation. The resource owner can also grant others permissions to perform the
64
- * operation. For more information about permissions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/using-with-s3-actions.html">Specifying Permissions in a Policy</a>
65
- * and <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-access-control.html">Managing Access Permissions to Your
66
- * Amazon S3 Resources</a>.</p>
59
+ * <p>To create a <code>PutBucketReplication</code> request, you must have
60
+ * <code>s3:PutReplicationConfiguration</code> permissions for the bucket.
61
+ *
62
+ * </p>
63
+ * <p>By default, a resource owner, in this case the Amazon Web Services account that created the bucket,
64
+ * can perform this operation. The resource owner can also grant others permissions to perform
65
+ * the operation. For more information about permissions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/using-with-s3-actions.html">Specifying Permissions in a
66
+ * Policy</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-access-control.html">Managing Access Permissions to
67
+ * Your Amazon S3 Resources</a>.</p>
67
68
  * <note>
68
69
  * <p>To perform this operation, the user or role performing the action must have the
69
70
  * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_passrole.html">iam:PassRole</a> permission.</p>
@@ -23,7 +23,7 @@ export interface PutBucketRequestPaymentCommandOutput extends __MetadataBearer {
23
23
  * for downloads from the bucket. This configuration parameter enables the bucket owner (only)
24
24
  * to specify that the person requesting the download will be charged for the download. For
25
25
  * more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/RequesterPaysBuckets.html">Requester Pays
26
- * Buckets</a>.</p>
26
+ * Buckets</a>.</p>
27
27
  * <p>The following operations are related to <code>PutBucketRequestPayment</code>:</p>
28
28
  * <ul>
29
29
  * <li>
@@ -20,23 +20,23 @@ export interface PutBucketTaggingCommandOutput extends __MetadataBearer {
20
20
  /**
21
21
  * @public
22
22
  * <p>Sets the tags for a bucket.</p>
23
- * <p>Use tags to organize your Amazon Web Services bill to reflect your own cost structure. To do this, sign
24
- * up to get your Amazon Web Services account bill with tag key values included. Then, to see the cost of
25
- * combined resources, organize your billing information according to resources with the same
26
- * tag key values. For example, you can tag several resources with a specific application
23
+ * <p>Use tags to organize your Amazon Web Services bill to reflect your own cost structure. To do this,
24
+ * sign up to get your Amazon Web Services account bill with tag key values included. Then, to see the cost
25
+ * of combined resources, organize your billing information according to resources with the
26
+ * same tag key values. For example, you can tag several resources with a specific application
27
27
  * name, and then organize your billing information to see the total cost of that application
28
- * across several services. For more information, see <a href="https://docs.aws.amazon.com/awsaccountbilling/latest/aboutv2/cost-alloc-tags.html">Cost Allocation
29
- * and Tagging</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/CostAllocTagging.html">Using Cost Allocation in Amazon S3 Bucket
30
- * Tags</a>.</p>
28
+ * across several services. For more information, see <a href="https://docs.aws.amazon.com/awsaccountbilling/latest/aboutv2/cost-alloc-tags.html">Cost Allocation and
29
+ * Tagging</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/CostAllocTagging.html">Using Cost Allocation in Amazon S3 Bucket
30
+ * Tags</a>.</p>
31
31
  * <note>
32
- * <p>
33
- * When this operation sets the tags for a bucket, it will overwrite any current tags the
34
- * bucket already has. You cannot use this operation to add tags to an existing list of tags.</p>
32
+ * <p> When this operation sets the tags for a bucket, it will overwrite any current tags
33
+ * the bucket already has. You cannot use this operation to add tags to an existing list of
34
+ * tags.</p>
35
35
  * </note>
36
36
  * <p>To use this operation, you must have permissions to perform the
37
37
  * <code>s3:PutBucketTagging</code> action. The bucket owner has this permission by default
38
- * and can grant this permission to others. For more information about permissions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-with-s3-actions.html#using-with-s3-actions-related-to-bucket-subresources">Permissions Related to Bucket Subresource Operations</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-access-control.html">Managing Access Permissions to Your Amazon S3
39
- * Resources</a>.</p>
38
+ * and can grant this permission to others. For more information about permissions, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-with-s3-actions.html#using-with-s3-actions-related-to-bucket-subresources">Permissions Related to Bucket Subresource Operations</a> and <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-access-control.html">Managing
39
+ * Access Permissions to Your Amazon S3 Resources</a>.</p>
40
40
  * <p>
41
41
  * <code>PutBucketTagging</code> has the following special errors:</p>
42
42
  * <ul>
@@ -30,10 +30,10 @@ export interface PutBucketVersioningCommandOutput extends __MetadataBearer {
30
30
  * <p>If the versioning state has never been set on a bucket, it has no versioning state; a
31
31
  * <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketVersioning.html">GetBucketVersioning</a> request does not return a versioning state value.</p>
32
32
  * <p>In order to enable MFA Delete, you must be the bucket owner. If you are the bucket owner
33
- * and want to enable MFA Delete in the bucket versioning configuration, you must
34
- * include the <code>x-amz-mfa request</code> header and the
35
- * <code>Status</code> and the <code>MfaDelete</code> request elements in a request to set
36
- * the versioning state of the bucket.</p>
33
+ * and want to enable MFA Delete in the bucket versioning configuration, you must include the
34
+ * <code>x-amz-mfa request</code> header and the <code>Status</code> and the
35
+ * <code>MfaDelete</code> request elements in a request to set the versioning state of the
36
+ * bucket.</p>
37
37
  * <important>
38
38
  * <p>If you have an object expiration lifecycle policy in your non-versioned bucket and
39
39
  * you want to maintain the same permanent delete behavior when you enable versioning, you