import { Command as $Command } from "@smithy/smithy-client"; import { MetadataBearer as __MetadataBearer } from "@smithy/types"; import { GetBucketPolicyOutput, GetBucketPolicyRequest } from "../models/models_0"; import { S3ClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../S3Client"; /** * @public */ export type { __MetadataBearer }; export { $Command }; /** * @public * * The input for {@link GetBucketPolicyCommand}. */ export interface GetBucketPolicyCommandInput extends GetBucketPolicyRequest { } /** * @public * * The output of {@link GetBucketPolicyCommand}. */ export interface GetBucketPolicyCommandOutput extends GetBucketPolicyOutput, __MetadataBearer { } declare const GetBucketPolicyCommand_base: { new (input: GetBucketPolicyCommandInput): import("@smithy/smithy-client").CommandImpl; new (__0_0: GetBucketPolicyCommandInput): import("@smithy/smithy-client").CommandImpl; getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions; }; /** *

Returns the policy of a specified bucket.

* *

* Directory buckets - For directory buckets, you must make requests for this API operation to the Regional endpoint. These endpoints support path-style requests in the format https://s3express-control.region_code.amazonaws.com/bucket-name * . Virtual-hosted-style requests aren't supported. * For more information, see Regional and Zonal endpoints in the * Amazon S3 User Guide.

*
*
*
Permissions
*
*

If you are using an identity other than the * root user of the Amazon Web Services account that owns the bucket, the calling identity must both have the * GetBucketPolicy permissions on the specified bucket and belong to the * bucket owner's account in order to use this operation.

*

If you don't have GetBucketPolicy permissions, Amazon S3 returns a 403 * Access Denied error. If you have the correct permissions, but you're not using an * identity that belongs to the bucket owner's account, Amazon S3 returns a 405 Method Not * Allowed error.

* *

To ensure that bucket owners don't inadvertently lock themselves out of their own * buckets, the root principal in a bucket owner's Amazon Web Services account can perform the * GetBucketPolicy, PutBucketPolicy, and * DeleteBucketPolicy API actions, even if their bucket policy explicitly * denies the root principal's access. Bucket owner root principals can only be blocked * from performing these API actions by VPC endpoint policies and Amazon Web Services Organizations * policies.

*
*
    *
  • *

    * General purpose bucket permissions - The s3:GetBucketPolicy permission is required in a policy. * For more information about general purpose buckets bucket policies, see Using Bucket Policies and User * Policies in the Amazon S3 User Guide.

    *
  • *
  • *

    * Directory bucket permissions - To grant access to this API operation, you must have the s3express:GetBucketPolicy permission in an IAM identity-based policy instead of a bucket policy. Cross-account access to this API operation isn't supported. This operation can only be performed by the Amazon Web Services account that owns the resource. For more information about directory bucket policies and permissions, see Amazon Web Services Identity and Access Management (IAM) for S3 Express One Zone in the Amazon S3 User Guide.

    *
  • *
*
*
Example bucket policies
*
*

* General purpose buckets example bucket policies - See Bucket policy examples in the Amazon S3 User Guide.

*

* Directory bucket example bucket policies - See Example bucket policies for S3 Express One Zone in the Amazon S3 User Guide.

*
*
HTTP Host header syntax
*
*

* Directory buckets - The HTTP Host header syntax is s3express-control.region.amazonaws.com.

*
*
*

The following action is related to GetBucketPolicy:

* * @example * Use a bare-bones client and the command you need to make an API call. * ```javascript * import { S3Client, GetBucketPolicyCommand } from "@aws-sdk/client-s3"; // ES Modules import * // const { S3Client, GetBucketPolicyCommand } = require("@aws-sdk/client-s3"); // CommonJS import * const client = new S3Client(config); * const input = { // GetBucketPolicyRequest * Bucket: "STRING_VALUE", // required * ExpectedBucketOwner: "STRING_VALUE", * }; * const command = new GetBucketPolicyCommand(input); * const response = await client.send(command); * // { // GetBucketPolicyOutput * // Policy: "STRING_VALUE", * // }; * * ``` * * @param GetBucketPolicyCommandInput - {@link GetBucketPolicyCommandInput} * @returns {@link GetBucketPolicyCommandOutput} * @see {@link GetBucketPolicyCommandInput} for command's `input` shape. * @see {@link GetBucketPolicyCommandOutput} for command's `response` shape. * @see {@link S3ClientResolvedConfig | config} for S3Client's `config` shape. * * @throws {@link S3ServiceException} *

Base exception class for all service exceptions from S3 service.

* * @public * @example To get bucket policy * ```javascript * // The following example returns bucket policy associated with a bucket. * const input = { * "Bucket": "examplebucket" * }; * const command = new GetBucketPolicyCommand(input); * const response = await client.send(command); * /* response == * { * "Policy": "{\"Version\":\"2008-10-17\",\"Id\":\"LogPolicy\",\"Statement\":[{\"Sid\":\"Enables the log delivery group to publish logs to your bucket \",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"111122223333\"},\"Action\":[\"s3:GetBucketAcl\",\"s3:GetObjectAcl\",\"s3:PutObject\"],\"Resource\":[\"arn:aws:s3:::policytest1/*\",\"arn:aws:s3:::policytest1\"]}]}" * } * *\/ * // example id: to-get-bucket-policy-1481595098424 * ``` * */ export declare class GetBucketPolicyCommand extends GetBucketPolicyCommand_base { }