Skip to main content

bucket_policies

Creates, updates, deletes or gets a bucket_policy resource or lists bucket_policies in a region

Overview

Namebucket_policies
TypeResource
DescriptionApplies an Amazon S3 bucket policy to an Amazon S3 bucket. If you are using an identity other than the root user of the AWS-account that owns the bucket, the calling identity must have the PutBucketPolicy permissions on the specified bucket and belong to the bucket owner's account in order to use this operation.
If you don't have PutBucketPolicy permissions, Amazon S3 returns a 403 Access Denied error. If you have the correct permissions, but you're not using an identity that belongs to the bucket owner's account, Amazon S3 returns a 405 Method Not Allowed error.
As a security precaution, the root user of the AWS-account that owns a bucket can always use this operation, even if the policy explicitly denies the root user the ability to perform this action.
For more information, see [Bucket policy examples](https://docs.aws.amazon.com/AmazonS3/latest/userguide/example-bucket-policies.html).
The following operations are related to PutBucketPolicy:
+ [CreateBucket](https://docs.aws.amazon.com/AmazonS3/latest/API/API_CreateBucket.html)
+ [DeleteBucket](https://docs.aws.amazon.com/AmazonS3/latest/API/API_DeleteBucket.html)
Idaws.s3.bucket_policies

Fields

NameDatatypeDescription
bucketstringThe name of the Amazon S3 bucket to which the policy applies.
policy_documentobjectA policy document containing permissions to add to the specified bucket. In IAM, you must provide policy documents in JSON format. However, in CloudFormation you can provide the policy in JSON or YAML format because CloudFormation converts YAML to JSON before submitting it to IAM. For more information, see the AWS::IAM::Policy [PolicyDocument](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-policy.html#cfn-iam-policy-policydocument) resource description in this guide and [Access Policy Language Overview](https://docs.aws.amazon.com/AmazonS3/latest/dev/access-policy-language-overview.html) in the *Amazon S3 User Guide*.
regionstringAWS region.

Methods

NameAccessible byRequired Params
create_resourceINSERTBucket, PolicyDocument, region
delete_resourceDELETEdata__Identifier, region
update_resourceUPDATEdata__Identifier, data__PatchDocument, region
list_resourcesSELECTregion
get_resourceSELECTdata__Identifier, region

SELECT examples

Gets all bucket_policies in a region.

SELECT
region,
bucket,
policy_document
FROM aws.s3.bucket_policies
WHERE region = 'us-east-1';

Gets all properties from an individual bucket_policy.

SELECT
region,
bucket,
policy_document
FROM aws.s3.bucket_policies
WHERE region = 'us-east-1' AND data__Identifier = '<Bucket>';

INSERT example

Use the following StackQL query and manifest file to create a new bucket_policy resource, using stack-deploy.

/*+ create */
INSERT INTO aws.s3.bucket_policies (
Bucket,
PolicyDocument,
region
)
SELECT
'{{ Bucket }}',
'{{ PolicyDocument }}',
'{{ region }}';

DELETE example

/*+ delete */
DELETE FROM aws.s3.bucket_policies
WHERE data__Identifier = '<Bucket>'
AND region = 'us-east-1';

Permissions

To operate on the bucket_policies resource, the following permissions are required:

Read

s3:GetBucketPolicy

Create

s3:GetBucketPolicy,
s3:PutBucketPolicy

Update

s3:GetBucketPolicy,
s3:PutBucketPolicy

List

s3:GetBucketPolicy,
s3:ListAllMyBuckets

Delete

s3:GetBucketPolicy,
s3:DeleteBucketPolicy