PutBucketAcl
Sets the permissions on an existing bucket using access control lists (ACL)
You can use one of the following two ways to set a bucket's permissions:
Specify the ACL in the request body
Specify permissions using request headers
Note
You cannot specify access permission using both the body and the request headers.
Depending on your application needs, you may choose to set the ACL on a bucket using either the request body or the headers. For example, if you have an existing application that updates a bucket ACL using the request body, then you can continue to use that approach.
Important
If your bucket uses the bucket owner enforced setting for S3 Object Ownership, ACLs are disabled and no longer affect permissions. You must use policies to grant access to your bucket and the objects in it. Requests to set ACLs or update ACLs fail and return the AccessControlListNotSupported
error code. Requests to read ACLs are still supported.
Permissions
You can set access permissions by using one of the following methods:
Specify a canned ACL with the
x-amz-acl
request header. Petabox supports a set of predefined ACLs, known as canned ACLs. Each canned ACL has a predefined set of grantees and permissions. Specify the canned ACL name as the value ofx-amz-acl
. If you use this header, you cannot use other access control-specific headers in your request.Specify access permissions explicitly with the
x-amz-grant-read
,x-amz-grant-read-acp
,x-amz-grant-write-acp
, andx-amz-grant-full-control
headers. When using these headers, you specify explicit access permissions and grantees (Petabox accounts or Petabox groups) who will receive the permission. If you use these ACL-specific headers, you cannot use thex-amz-acl
header to set a canned ACL. These parameters map to the set of permissions that Petabox supports in an ACL.
You specify each grantee as a type=value pair, where the type is one of the following:
id
– if the value specified is the canonical user ID of a Petabox accounturi
– if you are granting permissions to a predefined groupemailAddress
– if the value specified is the email address of a Petabox account
For example, the following x-amz-grant-write
header grants create, overwrite, and delete objects permission to LogDelivery group predefined by Petabox and two Petabox accounts identified by their email addresses.
x-amz-grant-write: uri="http://acs.petabox.io/groups/s3/LogDelivery", id="111122223333", id="555566667777"
You can use either a canned ACL or specify access permissions explicitly. You cannot do both.
Grantee Values
You can specify the person (grantee) to whom you're assigning access rights (using request elements) in the following ways:
By the person's ID:
<Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID><>ID<></ID><DisplayName><>GranteesEmail<></DisplayName> </Grantee>
DisplayName is optional and ignored in the request
By URI:
<Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Group"><URI><>http://acs.petabox.io/groups/global/AuthenticatedUsers<></URI></Grantee>
By Email address:
<Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="PetaboxCustomerByEmail"><EmailAddress><>Grantees@email.com<></EmailAddress>&</Grantee>
The grantee is resolved to the CanonicalUser and, in a response to a GET Object acl request, appears as the CanonicalUser.
Request Syntax
URI Request Parameters
The request uses the following URI parameters.
Bucket
The bucket to which to apply the ACL.
Required: Yes
Content-MD5
The base64-encoded 128-bit MD5 digest of the data. This header must be used as a message integrity check to verify that the request body was not corrupted in transit. For more information, go to RFC 1864.
For requests made using the Command Line Interface (CLI) or SDKs, this field is calculated automatically.
x-amz-acl
The canned ACL to apply to the bucket.
Valid Values: private | public-read | public-read-write | authenticated-read
x-amz-expected-bucket-owner
The account ID of the expected bucket owner. If the bucket is owned by a different account, the request fails with the HTTP status code 403 Forbidden
(access denied).
x-amz-grant-full-control
Allows grantee the read, write, read ACP, and write ACP permissions on the bucket.
x-amz-grant-read
Allows grantee to list the objects in the bucket.
x-amz-grant-read-acp
Allows grantee to read the bucket ACL.
x-amz-grant-write
Allows grantee to create new objects in the bucket.
For the bucket and object owners of existing objects, also allows deletions and overwrites of those objects.
x-amz-grant-write-acp
Allows grantee to write the ACL for the applicable bucket.
Request Body
The request accepts the following data in XML format.
AccessControlPolicy
Root level tag for the AccessControlPolicy parameters.
Required: Yes
Grants
A list of grants.
Type: Array of Grant data types
Required: No
Owner
Container for the bucket owner's display name and ID.
Type: Owner data type
Required: No
Response Syntax
Response Elements
If the action is successful, the service sends back an HTTP 200 response with an empty HTTP body.
Examples
Sample Request: Access permissions specified in the body
The following request grants access permission to the existing examplebucket
bucket. The request specifies the ACL in the body. In addition to granting full control to the bucket owner, the XML specifies the following grants.
Grant the
AllUsers
group READ permission on the bucket.Grant the
LogDelivery
group WRITE permission on the bucket.Grant a Petabox account, identified by email address, WRITE_ACP permission.
Grant a Petabox account, identified by canonical user ID, READ_ACP permission.
Sample Response
This example illustrates one usage of PutBucketAcl.
Sample Request: Access permissions specified using headers
The following request uses ACL-specific request headers to grant the following permissions:
Write permission to the Petabox
LogDelivery
group and a Petabox account identified by the emailxyz@example.com
.Read permission to the Petabox
AllUsers
group.
Sample Response
This example illustrates one usage of PutBucketAcl.
Last updated