Update access type to the bucket.
Pay attention, that bucket-owner-full-control ACL is strictly required for “bucket_policy” type of access.
Also, bucket should be whitelisted for mutation. All buckets created by creation endpoint are mutable by default.
Buckets created before 2023 could be immutable in case of customized policies.
You can call ‘Get buckets’ endpoint to check is_access_mutable property in response.
Bearer authentication header of the form Bearer <token>, where <token> is your auth token.
OK
An AWS S3 bucket created inside Narrative's AWS account assigned to a specific company.
Unique identifier for the bucket.
"4d5451ff-5fe6-4db3-9398-4075bbd275b0"
The ID of the company owning the bucket.
The AWS S3 bucket name. The bucket name is of the form nio-${resource_id}-${suffix} where resouce_id is the resource ID provided at bucket creation and suffix is 12 randomly chosen alphanumeric characters.
A random suffix is appended to the bucket name for two reasons:
nio-${resource_id} exists."nio-yourcompanyname-50ac58dabfa1"
ISO-8601 timestamp indicating when the bucket was created.
"2021-08-26T21:06:07.710357Z"
ISO-8601 timestamp indicating when the bucket was last updated.
"2021-08-26T21:06:07.710357Z"
Is it allowed to change access type. Changes are allowed by default. Restrictions could be applied in case bucket was manually config