CopyObject
Creates a copy of an object that is already stored in Amazon S3.
Note
You can store individual objects of up to 5 TB in Amazon S3. You create a copy of your object up to 5 GB in size in a single atomic action using this API. However, to copy an object greater than 5 GB, you must use the multipart upload Upload Part - Copy (UploadPartCopy) API. For more information, see Copy Object Using the REST Multipart Upload API.
All copy requests must be authenticated. Additionally, you must have read access to the source object and write access to the destination bucket. For more information, see REST Authentication. Both the Region that you want to copy the object from and the Region that you want to copy the object to must be enabled for your account.
A copy request might return an error when Amazon S3 receives the copy request or while Amazon S3
is copying the files. If the error occurs before the copy action starts, you receive a
standard Amazon S3 error. If the error occurs during the copy operation, the error response is
embedded in the 200 OK
response. This means that a 200 OK
response can contain either a success or an error. If you call the S3 API directly, make
sure to design your application to parse the contents of the response and handle it
appropriately. If you use Amazon SDKs, SDKs handle this condition. The SDKs detect the
embedded error and apply error handling per your configuration settings (including
automatically retrying the request as appropriate). If the condition persists, the SDKs
throws an exception (or, for the SDKs that don't use exceptions, they return the
error).
If the copy is successful, you receive a response with information about the copied object.
Note
If the request is an HTTP 1.1 request, the response is chunk encoded. If it were not, it would not contain the content-length, and you would need to read the entire body.
The copy request charge is based on the storage class and Region that you specify for
the destination object. For pricing information, see Amazon S3 pricing
Important
Amazon S3 transfer acceleration does not support cross-Region copies. If you request a
cross-Region copy using a transfer acceleration endpoint, you get a 400 Bad
Request
error. For more information, see Transfer
Acceleration.
- Metadata
-
When copying an object, you can preserve all metadata (the default) or specify new metadata. However, the access control list (ACL) is not preserved and is set to private for the user making the request. To override the default ACL setting, specify a new ACL when generating a copy request. For more information, see Using ACLs.
To specify whether you want the object metadata copied from the source object or replaced with metadata provided in the request, you can optionally add the
x-amz-metadata-directive
header. When you grant permissions, you can use thes3:x-amz-metadata-directive
condition key to enforce certain metadata behavior when objects are uploaded. For more information, see Specifying Conditions in a Policy in the Amazon S3 User Guide. For a complete list of Amazon S3-specific condition keys, see Actions, Resources, and Condition Keys for Amazon S3.Note
x-amz-website-redirect-location
is unique to each object and must be specified in the request headers to copy the value. - x-amz-copy-source-if Headers
-
To only copy an object under certain conditions, such as whether the
Etag
matches or whether the object was modified before or after a specified date, use the following request parameters:-
x-amz-copy-source-if-match
-
x-amz-copy-source-if-none-match
-
x-amz-copy-source-if-unmodified-since
-
x-amz-copy-source-if-modified-since
If both the
x-amz-copy-source-if-match
andx-amz-copy-source-if-unmodified-since
headers are present in the request and evaluate as follows, Amazon S3 returns200 OK
and copies the data:-
x-amz-copy-source-if-match
condition evaluates to true -
x-amz-copy-source-if-unmodified-since
condition evaluates to false
If both the
x-amz-copy-source-if-none-match
andx-amz-copy-source-if-modified-since
headers are present in the request and evaluate as follows, Amazon S3 returns the412 Precondition Failed
response code:-
x-amz-copy-source-if-none-match
condition evaluates to false -
x-amz-copy-source-if-modified-since
condition evaluates to true
Note
All headers with the
x-amz-
prefix, includingx-amz-copy-source
, must be signed. -
- Server-side encryption
-
Amazon S3 automatically encrypts all new objects that are copied to an S3 bucket. When copying an object, if you don't specify encryption information in your copy request, the encryption setting of the target object is set to the default encryption configuration of the destination bucket. By default, all buckets have a base level of encryption configuration that uses server-side encryption with Amazon S3 managed keys (SSE-S3). If the destination bucket has a default encryption configuration that uses server-side encryption with an Amazon Key Management Service (Amazon KMS) key (SSE-KMS) or a customer-provided encryption key (SSE-C), Amazon S3 uses the corresponding KMS key, or a customer-provided key to encrypt the target object copy.
When you perform a
CopyObject
operation, if you want to use a different type of encryption setting for the target object, you can use other appropriate encryption-related headers to encrypt the target object with a KMS key, an Amazon S3 managed key, or a customer-provided key. With server-side encryption, Amazon S3 encrypts your data as it writes your data to disks in its data centers and decrypts the data when you access it. If the encryption setting in your request is different from the default encryption configuration of the destination bucket, the encryption setting in your request takes precedence. If the source object for the copy is stored in Amazon S3 using SSE-C, you must provide the necessary encryption information in your request so that Amazon S3 can decrypt the object for copying. For more information about server-side encryption, see Using Server-Side Encryption.If a target object uses SSE-KMS, you can enable an S3 Bucket Key for the object. For more information, see Amazon S3 Bucket Keys in the Amazon S3 User Guide.
- Access Control List (ACL)-Specific Request Headers
-
When copying an object, you can optionally use headers to grant ACL-based permissions. By default, all objects are private. Only the owner has full access control. When adding a new object, you can grant permissions to individual Amazon Web Services accounts or to predefined groups that are defined by Amazon S3. These permissions are then added to the ACL on the object. For more information, see Access Control List (ACL) Overview and Managing ACLs Using the REST API.
If the bucket that you're copying objects to uses the bucket owner enforced setting for S3 Object Ownership, ACLs are disabled and no longer affect permissions. Buckets that use this setting only accept
PUT
requests that don't specify an ACL orPUT
requests that specify bucket owner full control ACLs, such as thebucket-owner-full-control
canned ACL or an equivalent form of this ACL expressed in the XML format.For more information, see Controlling ownership of objects and disabling ACLs in the Amazon S3 User Guide.
Note
If your bucket uses the bucket owner enforced setting for Object Ownership, all objects written to the bucket by any account will be owned by the bucket owner.
- Checksums
-
When copying an object, if it has a checksum, that checksum will be copied to the new object by default. When you copy the object over, you can optionally specify a different checksum algorithm to use with the
x-amz-checksum-algorithm
header. - Storage Class Options
-
You can use the
CopyObject
action to change the storage class of an object that is already stored in Amazon S3 by using theStorageClass
parameter. For more information, see Storage Classes in the Amazon S3 User Guide.If the source object's storage class is GLACIER, you must restore a copy of this object before you can use it as a source object for the copy operation. For more information, see RestoreObject. For more information, see Copying Objects.
- Versioning
-
By default,
x-amz-copy-source
header identifies the current version of an object to copy. If the current version is a delete marker, Amazon S3 behaves as if the object was deleted. To copy a different version, use theversionId
subresource.If you enable versioning on the target bucket, Amazon S3 generates a unique version ID for the object being copied. This version ID is different from the version ID of the source object. Amazon S3 returns the version ID of the copied object in the
x-amz-version-id
response header in the response.If you do not enable versioning or suspend it on the target bucket, the version ID that Amazon S3 generates is always null.
The following operations are related to CopyObject
:
Request Syntax
PUT /Key+
HTTP/1.1
Host: Bucket
.s3.amazonaws.com
x-amz-acl: ACL
Cache-Control: CacheControl
x-amz-checksum-algorithm: ChecksumAlgorithm
Content-Disposition: ContentDisposition
Content-Encoding: ContentEncoding
Content-Language: ContentLanguage
Content-Type: ContentType
x-amz-copy-source: CopySource
x-amz-copy-source-if-match: CopySourceIfMatch
x-amz-copy-source-if-modified-since: CopySourceIfModifiedSince
x-amz-copy-source-if-none-match: CopySourceIfNoneMatch
x-amz-copy-source-if-unmodified-since: CopySourceIfUnmodifiedSince
Expires: Expires
x-amz-grant-full-control: GrantFullControl
x-amz-grant-read: GrantRead
x-amz-grant-read-acp: GrantReadACP
x-amz-grant-write-acp: GrantWriteACP
x-amz-metadata-directive: MetadataDirective
x-amz-tagging-directive: TaggingDirective
x-amz-server-side-encryption: ServerSideEncryption
x-amz-storage-class: StorageClass
x-amz-website-redirect-location: WebsiteRedirectLocation
x-amz-server-side-encryption-customer-algorithm: SSECustomerAlgorithm
x-amz-server-side-encryption-customer-key: SSECustomerKey
x-amz-server-side-encryption-customer-key-MD5: SSECustomerKeyMD5
x-amz-server-side-encryption-aws-kms-key-id: SSEKMSKeyId
x-amz-server-side-encryption-context: SSEKMSEncryptionContext
x-amz-server-side-encryption-bucket-key-enabled: BucketKeyEnabled
x-amz-copy-source-server-side-encryption-customer-algorithm: CopySourceSSECustomerAlgorithm
x-amz-copy-source-server-side-encryption-customer-key: CopySourceSSECustomerKey
x-amz-copy-source-server-side-encryption-customer-key-MD5: CopySourceSSECustomerKeyMD5
x-amz-request-payer: RequestPayer
x-amz-tagging: Tagging
x-amz-object-lock-mode: ObjectLockMode
x-amz-object-lock-retain-until-date: ObjectLockRetainUntilDate
x-amz-object-lock-legal-hold: ObjectLockLegalHoldStatus
x-amz-expected-bucket-owner: ExpectedBucketOwner
x-amz-source-expected-bucket-owner: ExpectedSourceBucketOwner
URI Request Parameters
The request uses the following URI parameters.
- Bucket
-
The name of the destination bucket.
When using this action with an access point, you must direct requests to the access point hostname. The access point hostname takes the form AccessPointName-AccountId.s3-accesspoint.Region.amazonaws.com. When using this action with an access point through the Amazon SDKs, you provide the access point ARN in place of the bucket name. For more information about access point ARNs, see Using access points in the Amazon S3 User Guide.
When you use this action with Amazon S3 on Outposts, you must direct requests to the S3 on Outposts hostname. The S3 on Outposts hostname takes the form
AccessPointName-AccountId.outpostID.s3-outposts.Region.amazonaws.com
. When you use this action with S3 on Outposts through the Amazon SDKs, you provide the Outposts access point ARN in place of the bucket name. For more information about S3 on Outposts ARNs, see What is S3 on Outposts in the Amazon S3 User Guide.Required: Yes
- Cache-Control
-
Specifies caching behavior along the request/reply chain.
- Content-Disposition
-
Specifies presentational information for the object.
- Content-Encoding
-
Specifies what content encodings have been applied to the object and thus what decoding mechanisms must be applied to obtain the media-type referenced by the Content-Type header field.
- Content-Language
-
The language the content is in.
- Content-Type
-
A standard MIME type describing the format of the object data.
- Expires
-
The date and time at which the object is no longer cacheable.
- Key
-
The key of the destination object.
Length Constraints: Minimum length of 1.
Required: Yes
- x-amz-acl
-
The canned ACL to apply to the object.
This action is not supported by Amazon S3 on Outposts.
Valid Values:
private | public-read | public-read-write | authenticated-read | aws-exec-read | bucket-owner-read | bucket-owner-full-control
- x-amz-checksum-algorithm
-
Indicates the algorithm you want Amazon S3 to use to create the checksum for the object. For more information, see Checking object integrity in the Amazon S3 User Guide.
Valid Values:
CRC32 | CRC32C | SHA1 | SHA256
- x-amz-copy-source
-
Specifies the source object for the copy operation. You specify the value in one of two formats, depending on whether you want to access the source object through an access point:
-
For objects not accessed through an access point, specify the name of the source bucket and the key of the source object, separated by a slash (/). For example, to copy the object
reports/january.pdf
from the bucketawsexamplebucket
, useawsexamplebucket/reports/january.pdf
. The value must be URL-encoded. -
For objects accessed through access points, specify the Amazon Resource Name (ARN) of the object as accessed through the access point, in the format
arn:aws:s3:<Region>:<account-id>:accesspoint/<access-point-name>/object/<key>
. For example, to copy the objectreports/january.pdf
through access pointmy-access-point
owned by account123456789012
in Regionus-west-2
, use the URL encoding ofarn:aws:s3:us-west-2:123456789012:accesspoint/my-access-point/object/reports/january.pdf
. The value must be URL encoded.Note
Amazon S3 supports copy operations using access points only when the source and destination buckets are in the same Amazon Region.
Alternatively, for objects accessed through Amazon S3 on Outposts, specify the ARN of the object as accessed in the format
arn:aws:s3-outposts:<Region>:<account-id>:outpost/<outpost-id>/object/<key>
. For example, to copy the objectreports/january.pdf
through outpostmy-outpost
owned by account123456789012
in Regionus-west-2
, use the URL encoding ofarn:aws:s3-outposts:us-west-2:123456789012:outpost/my-outpost/object/reports/january.pdf
. The value must be URL-encoded.
To copy a specific version of an object, append
?versionId=<version-id>
to the value (for example,awsexamplebucket/reports/january.pdf?versionId=QUpfdndhfd8438MNFDN93jdnJFkdmqnh893
). If you don't specify a version ID, Amazon S3 copies the latest version of the source object.Pattern:
\/.+\/.+
Required: Yes
-
- x-amz-copy-source-if-match
-
Copies the object if its entity tag (ETag) matches the specified tag.
- x-amz-copy-source-if-modified-since
-
Copies the object if it has been modified since the specified time.
- x-amz-copy-source-if-none-match
-
Copies the object if its entity tag (ETag) is different than the specified ETag.
- x-amz-copy-source-if-unmodified-since
-
Copies the object if it hasn't been modified since the specified time.
- x-amz-copy-source-server-side-encryption-customer-algorithm
-
Specifies the algorithm to use when decrypting the source object (for example, AES256).
- x-amz-copy-source-server-side-encryption-customer-key
-
Specifies the customer-provided encryption key for Amazon S3 to use to decrypt the source object. The encryption key provided in this header must be one that was used when the source object was created.
- x-amz-copy-source-server-side-encryption-customer-key-MD5
-
Specifies the 128-bit MD5 digest of the encryption key according to RFC 1321. Amazon S3 uses this header for a message integrity check to ensure that the encryption key was transmitted without error.
- x-amz-expected-bucket-owner
-
The account ID of the expected destination bucket owner. If the destination bucket is owned by a different account, the request fails with the HTTP status code
403 Forbidden
(access denied). - x-amz-grant-full-control
-
Gives the grantee READ, READ_ACP, and WRITE_ACP permissions on the object.
This action is not supported by Amazon S3 on Outposts.
- x-amz-grant-read
-
Allows grantee to read the object data and its metadata.
This action is not supported by Amazon S3 on Outposts.
- x-amz-grant-read-acp
-
Allows grantee to read the object ACL.
This action is not supported by Amazon S3 on Outposts.
- x-amz-grant-write-acp
-
Allows grantee to write the ACL for the applicable object.
This action is not supported by Amazon S3 on Outposts.
- x-amz-metadata-directive
-
Specifies whether the metadata is copied from the source object or replaced with metadata provided in the request.
Valid Values:
COPY | REPLACE
- x-amz-object-lock-legal-hold
-
Specifies whether you want to apply a legal hold to the copied object.
Valid Values:
ON | OFF
- x-amz-object-lock-mode
-
The Object Lock mode that you want to apply to the copied object.
Valid Values:
GOVERNANCE | COMPLIANCE
- x-amz-object-lock-retain-until-date
-
The date and time when you want the copied object's Object Lock to expire.
- x-amz-request-payer
-
Confirms that the requester knows that they will be charged for the request. Bucket owners need not specify this parameter in their requests. For information about downloading objects from Requester Pays buckets, see Downloading Objects in Requester Pays Buckets in the Amazon S3 User Guide.
Valid Values:
requester
- x-amz-server-side-encryption
-
The server-side encryption algorithm used when storing this object in Amazon S3 (for example, AES256,
aws:kms
).Valid Values:
AES256 | aws:kms
- x-amz-server-side-encryption-aws-kms-key-id
-
Specifies the Amazon KMS key ID to use for object encryption. All GET and PUT requests for an object protected by Amazon KMS will fail if not made via SSL or using SigV4. For information about configuring using any of the officially supported Amazon SDKs and Amazon CLI, see Specifying the Signature Version in Request Authentication in the Amazon S3 User Guide.
- x-amz-server-side-encryption-bucket-key-enabled
-
Specifies whether Amazon S3 should use an S3 Bucket Key for object encryption with server-side encryption using AWS KMS (SSE-KMS). Setting this header to
true
causes Amazon S3 to use an S3 Bucket Key for object encryption with SSE-KMS.Specifying this header with a COPY action doesn’t affect bucket-level settings for S3 Bucket Key.
- x-amz-server-side-encryption-context
-
Specifies the Amazon KMS Encryption Context to use for object encryption. The value of this header is a base64-encoded UTF-8 string holding JSON with the encryption context key-value pairs.
- x-amz-server-side-encryption-customer-algorithm
-
Specifies the algorithm to use to when encrypting the object (for example, AES256).
- x-amz-server-side-encryption-customer-key
-
Specifies the customer-provided encryption key for Amazon S3 to use in encrypting data. This value is used to store the object and then it is discarded; Amazon S3 does not store the encryption key. The key must be appropriate for use with the algorithm specified in the
x-amz-server-side-encryption-customer-algorithm
header. - x-amz-server-side-encryption-customer-key-MD5
-
Specifies the 128-bit MD5 digest of the encryption key according to RFC 1321. Amazon S3 uses this header for a message integrity check to ensure that the encryption key was transmitted without error.
- x-amz-source-expected-bucket-owner
-
The account ID of the expected source bucket owner. If the source bucket is owned by a different account, the request fails with the HTTP status code
403 Forbidden
(access denied). - x-amz-storage-class
-
By default, Amazon S3 uses the STANDARD Storage Class to store newly created objects. The STANDARD storage class provides high durability and high availability. Depending on performance needs, you can specify a different Storage Class. Amazon S3 on Outposts only uses the OUTPOSTS Storage Class. For more information, see Storage Classes in the Amazon S3 User Guide.
Valid Values:
STANDARD | REDUCED_REDUNDANCY | STANDARD_IA | ONEZONE_IA | INTELLIGENT_TIERING | GLACIER | DEEP_ARCHIVE | OUTPOSTS | GLACIER_IR | SNOW
- x-amz-tagging
-
The tag-set for the object destination object this value must be used in conjunction with the
TaggingDirective
. The tag-set must be encoded as URL Query parameters. - x-amz-tagging-directive
-
Specifies whether the object tag-set are copied from the source object or replaced with tag-set provided in the request.
Valid Values:
COPY | REPLACE
- x-amz-website-redirect-location
-
If the bucket is configured as a website, redirects requests for this object to another object in the same bucket or to an external URL. Amazon S3 stores the value of this header in the object metadata. This value is unique to each object and is not copied when using the
x-amz-metadata-directive
header. Instead, you may opt to provide this header in combination with the directive.
Request Body
The request does not have a request body.
Response Syntax
HTTP/1.1 200
x-amz-expiration: Expiration
x-amz-copy-source-version-id: CopySourceVersionId
x-amz-version-id: VersionId
x-amz-server-side-encryption: ServerSideEncryption
x-amz-server-side-encryption-customer-algorithm: SSECustomerAlgorithm
x-amz-server-side-encryption-customer-key-MD5: SSECustomerKeyMD5
x-amz-server-side-encryption-aws-kms-key-id: SSEKMSKeyId
x-amz-server-side-encryption-context: SSEKMSEncryptionContext
x-amz-server-side-encryption-bucket-key-enabled: BucketKeyEnabled
x-amz-request-charged: RequestCharged
<?xml version="1.0" encoding="UTF-8"?>
<CopyObjectResult>
<ETag>string</ETag>
<LastModified>timestamp</LastModified>
<ChecksumCRC32>string</ChecksumCRC32>
<ChecksumCRC32C>string</ChecksumCRC32C>
<ChecksumSHA1>string</ChecksumSHA1>
<ChecksumSHA256>string</ChecksumSHA256>
</CopyObjectResult>
Response Elements
If the action is successful, the service sends back an HTTP 200 response.
The response returns the following HTTP headers.
- x-amz-copy-source-version-id
-
Version of the copied object in the destination bucket.
- x-amz-expiration
-
If the object expiration is configured, the response includes this header.
- x-amz-request-charged
-
If present, indicates that the requester was successfully charged for the request.
Valid Values:
requester
- x-amz-server-side-encryption
-
The server-side encryption algorithm used when storing this object in Amazon S3 (for example, AES256,
aws:kms
).Valid Values:
AES256 | aws:kms
- x-amz-server-side-encryption-aws-kms-key-id
-
If present, specifies the ID of the Amazon Key Management Service (Amazon KMS) symmetric encryption customer managed key that was used for the object.
- x-amz-server-side-encryption-bucket-key-enabled
-
Indicates whether the copied object uses an S3 Bucket Key for server-side encryption with Amazon KMS (SSE-KMS).
- x-amz-server-side-encryption-context
-
If present, specifies the Amazon KMS Encryption Context to use for object encryption. The value of this header is a base64-encoded UTF-8 string holding JSON with the encryption context key-value pairs.
- x-amz-server-side-encryption-customer-algorithm
-
If server-side encryption with a customer-provided encryption key was requested, the response will include this header confirming the encryption algorithm used.
- x-amz-server-side-encryption-customer-key-MD5
-
If server-side encryption with a customer-provided encryption key was requested, the response will include this header to provide round-trip message integrity verification of the customer-provided encryption key.
- x-amz-version-id
-
Version ID of the newly created copy.
The following data is returned in XML format by the service.
- CopyObjectResult
-
Root level tag for the CopyObjectResult parameters.
Required: Yes
- ChecksumCRC32
-
The base64-encoded, 32-bit CRC32 checksum of the object. This will only be present if it was uploaded with the object. With multipart uploads, this may not be a checksum value of the object. For more information about how checksums are calculated with multipart uploads, see Checking object integrity in the Amazon S3 User Guide.
Type: String
- ChecksumCRC32C
-
The base64-encoded, 32-bit CRC32C checksum of the object. This will only be present if it was uploaded with the object. With multipart uploads, this may not be a checksum value of the object. For more information about how checksums are calculated with multipart uploads, see Checking object integrity in the Amazon S3 User Guide.
Type: String
- ChecksumSHA1
-
The base64-encoded, 160-bit SHA-1 digest of the object. This will only be present if it was uploaded with the object. With multipart uploads, this may not be a checksum value of the object. For more information about how checksums are calculated with multipart uploads, see Checking object integrity in the Amazon S3 User Guide.
Type: String
- ChecksumSHA256
-
The base64-encoded, 256-bit SHA-256 digest of the object. This will only be present if it was uploaded with the object. With multipart uploads, this may not be a checksum value of the object. For more information about how checksums are calculated with multipart uploads, see Checking object integrity in the Amazon S3 User Guide.
Type: String
- ETag
-
Returns the ETag of the new object. The ETag reflects only changes to the contents of an object, not its metadata.
Type: String
- LastModified
-
Creation date of the object.
Type: Timestamp
Examples
Sample Request
This example copies my-image.jpg
into the bucket
bucket,
with the key name my-second-image.jpg
.
PUT /my-second-image.jpg HTTP/1.1 Host: bucket.s3.<Region>.amazonaws.com Date: Wed, 28 Oct 2009 22:32:00 GMT x-amz-copy-source: /bucket/my-image.jpg Authorization: authorization string
Sample Response
This example illustrates one usage of CopyObject.
HTTP/1.1 200 OK x-amz-id-2: eftixk72aD6Ap51TnqcoF8eFidJG9Z/2mkiDFu8yU9AS1ed4OpIszj7UDNEHGran x-amz-request-id: 318BC8BC148832E5 x-amz-copy-source-version-id: 3/L4kqtJlcpXroDTDmJ+rmSpXd3dIbrHY+MTRCxf3vjVBH40Nr8X8gdRQBpUMLUo x-amz-version-id: QUpfdndhfd8438MNFDN93jdnJFkdmqnh893 Date: Wed, 28 Oct 2009 22:32:00 GMT Connection: close Server: AmazonS3 <CopyObjectResult> <LastModified>2009-10-12T17:50:30.000Z</LastModified> <ETag>"9b2cf535f27731c974343645a3985328"</ETag> </CopyObjectResult>
Sample Request: Copying a Specified Version of an Object
The following request copies the my-image.jpg
key with the specified
version ID, copies it into the bucket
bucket, and gives it the
my-second-image.jpg
key.
PUT /my-second-image.jpg HTTP/1.1 Host: bucket.s3.<Region>.amazonaws.com Date: Wed, 28 Oct 2009 22:32:00 GMT x-amz-copy-source: /bucket/my-image.jpg?versionId=3/L4kqtJlcpXroDTDmJ+rmSpXd3dIbrHY+MTRCxf3vjVBH40Nr8X8gdRQBpUMLUo Authorization: authorization string
Success Response: Copying a versioned object into a version-enabled bucket
The following response shows that an object was copied into a target bucket where versioning is enabled.
HTTP/1.1 200 OK x-amz-id-2: eftixk72aD6Ap51TnqcoF8eFidJG9Z/2mkiDFu8yU9AS1ed4OpIszj7UDNEHGran x-amz-request-id: 318BC8BC148832E5 x-amz-version-id: QUpfdndhfd8438MNFDN93jdnJFkdmqnh893 x-amz-copy-source-version-id: 09df8234529fjs0dfi0w52935029wefdj Date: Wed, 28 Oct 2009 22:32:00 GMT Connection: close Server: AmazonS3 <?xml version="1.0" encoding="UTF-8"?> <CopyObjectResult> <LastModified>2009-10-12T17:50:30.000Z</LastModified> <ETag>"9b2cf535f27731c974343645a3985328"</ETag> </CopyObjectResult>
Success Response: Copying a versioned object into a version-suspended bucket
The following response shows that an object was copied into a target bucket where
versioning is suspended. The parameter VersionId
does not appear.
HTTP/1.1 200 OK x-amz-id-2: eftixk72aD6Ap51TnqcoF8eFidJG9Z/2mkiDFu8yU9AS1ed4OpIszj7UDNEHGran x-amz-request-id: 318BC8BC148832E5 x-amz-copy-source-version-id: 3/L4kqtJlcpXroDTDmJ+rmSpXd3dIbrHY+MTRCxf3vjVBH40Nr8X8gdRQBpUMLUo Date: Wed, 28 Oct 2009 22:32:00 GMT Connection: close Server: AmazonS3 <?xml version="1.0" encoding="UTF-8"?> <CopyObjectResult> <LastModified>2009-10-28T22:32:00</LastModified> <ETag>"9b2cf535f27731c974343645a3985328"</ETag> </CopyObjectResult>
Example: Copy from unencrypted object to an object encrypted with server-side encryption with customer-provided encryption keys
The following example specifies the HTTP PUT header to copy an unencrypted object to an object encrypted with server-side encryption with customer-provided encryption keys (SSE-C).
PUT /exampleDestinationObject HTTP/1.1 Host: example-destination-bucket.s3.<Region>.amazonaws.com x-amz-server-side-encryption-customer-algorithm: AES256 x-amz-server-side-encryption-customer-key: Base64(YourKey) x-amz-server-side-encryption-customer-key-MD5 : Base64(MD5(YourKey)) x-amz-metadata-directive: metadata_directive x-amz-copy-source: /example_source_bucket/exampleSourceObject x-amz-copy-source-if-match: etag x-amz-copy-source-if-none-match: etag x-amz-copy-source-if-unmodified-since: time_stamp x-amz-copy-source-if-modified-since: time_stamp <request metadata> Authorization: authorization string (see Authenticating Requests (Amazon Signature Version 4)) Date: date
Example: Copy from an object encrypted with SSE-C to an object encrypted with SSE-C
The following example specifies the HTTP PUT header to copy an object encrypted with server-side encryption with customer-provided encryption keys to an object encrypted with server-side encryption with customer-provided encryption keys for key rotation.
PUT /exampleDestinationObject HTTP/1.1 Host: example-destination-bucket.s3.<Region>.amazonaws.com x-amz-server-side-encryption-customer-algorithm: AES256 x-amz-server-side-encryption-customer-key: Base64(NewKey) x-amz-server-side-encryption-customer-key-MD5: Base64(MD5(NewKey)) x-amz-metadata-directive: metadata_directive x-amz-copy-source: /source_bucket/sourceObject x-amz-copy-source-if-match: etag x-amz-copy-source-if-none-match: etag x-amz-copy-source-if-unmodified-since: time_stamp x-amz-copy-source-if-modified-since: time_stamp x-amz-copy-source-server-side-encryption-customer-algorithm: AES256 x-amz-copy-source-server-side-encryption-customer-key: Base64(OldKey) x-amz-copy-source-server-side-encryption-customer-key-MD5: Base64(MD5(OldKey)) <request metadata> Authorization: authorization string (see Authenticating Requests (Amazon Signature Version 4)) Date: date
See Also
For more information about using this API in one of the language-specific Amazon SDKs, see the following: