uploadPart method
Uploads a part in a multipart upload. You must initiate a multipart upload (see CreateMultipartUpload) before you can upload any part. In response to your initiate request, Amazon S3 returns an upload ID, a unique identifier, that you must include in your upload part request.
Part numbers can be any number from 1 to 10,000, inclusive. A part number uniquely identifies a part and also defines its position within the object being created. If you upload a new part using the same part number that was used with a previous part, the previously uploaded part is overwritten. Each part must be at least 5 MB in size, except the last part. There is no size limit on the last part of your multipart upload.
To ensure that data is not corrupted when traversing the network, specify
the Content-MD5
header in the upload part request. Amazon S3
checks the part data against the provided MD5 value. If they do not match,
Amazon S3 returns an error.
If the upload request is signed with Signature Version 4, then AWS S3 uses
the x-amz-content-sha256
header as a checksum instead of
Content-MD5
. For more information see Authenticating
Requests: Using the Authorization Header (AWS Signature Version 4).
Note: After you initiate multipart upload and upload one or more parts, you must either complete or abort multipart upload in order to stop getting charged for storage of the uploaded parts. Only after you either complete or abort multipart upload, Amazon S3 frees up the parts storage and stops charging you for the parts storage.
For more information on multipart uploads, go to Multipart Upload Overview in the Amazon Simple Storage Service Developer Guide .
For information on the permissions required to use the multipart upload API, go to Multipart Upload API and Permissions in the Amazon Simple Storage Service Developer Guide.
You can optionally request server-side encryption where Amazon S3 encrypts your data as it writes it to disks in its data centers and decrypts it for you when you access it. You have the option of providing your own encryption key, or you can use the AWS managed encryption keys. If you choose to provide your own encryption key, the request headers you provide in the request must match the headers you used in the request to initiate the upload by using CreateMultipartUpload. For more information, go to Using Server-Side Encryption in the Amazon Simple Storage Service Developer Guide.
Server-side encryption is supported by the S3 Multipart Upload actions. Unless you are using a customer-provided encryption key, you don't need to specify the encryption parameters in each UploadPart request. Instead, you only need to specify the server-side encryption parameters in the initial Initiate Multipart request. For more information, see CreateMultipartUpload.
If you requested server-side encryption using a customer-provided encryption key in your initiate multipart upload request, you must provide identical encryption information in each part upload using the following headers.
- x-amz-server-side-encryption-customer-algorithm
- x-amz-server-side-encryption-customer-key
- x-amz-server-side-encryption-customer-key-MD5
Special Errors
-
- Code: NoSuchUpload
- Cause: The specified multipart upload does not exist. The upload ID might be invalid, or the multipart upload might have been aborted or completed.
- HTTP Status Code: 404 Not Found
- SOAP Fault Code Prefix: Client
Related Resources
Parameter bucket
:
The name of the bucket to which the multipart upload was initiated.
When using this API with an access point, you must direct requests to the access point hostname. The access point hostname takes the form AccessPointName-AccountId.s3-accesspoint.Region.amazonaws.com. When using this operation with an access point through the AWS SDKs, you provide the access point ARN in place of the bucket name. For more information about access point ARNs, see Using Access Points in the Amazon Simple Storage Service Developer Guide.
When using this API with Amazon S3 on Outposts, you must direct requests to the S3 on Outposts hostname. The S3 on Outposts hostname takes the form AccessPointName-AccountId.outpostID.s3-outposts.Region.amazonaws.com. When using this operation using S3 on Outposts through the AWS SDKs, you provide the Outposts bucket ARN in place of the bucket name. For more information about S3 on Outposts ARNs, see Using S3 on Outposts in the Amazon Simple Storage Service Developer Guide.
Parameter key
:
Object key for which the multipart upload was initiated.
Parameter partNumber
:
Part number of part being uploaded. This is a positive integer between 1
and 10,000.
Parameter uploadId
:
Upload ID identifying the multipart upload whose part is being uploaded.
Parameter body
:
Object data.
Parameter contentLength
:
Size of the body in bytes. This parameter is useful when the size of the
body cannot be determined automatically.
Parameter contentMD5
:
The base64-encoded 128-bit MD5 digest of the part data. This parameter is
auto-populated when using the command from the CLI. This parameter is
required if object lock parameters are specified.
Parameter expectedBucketOwner
:
The account id of the expected bucket owner. If the bucket is owned by a
different account, the request will fail with an HTTP 403 (Access
Denied)
error.
Parameter sSECustomerAlgorithm
:
Specifies the algorithm to use to when encrypting the object (for example,
AES256).
Parameter sSECustomerKey
:
Specifies the customer-provided encryption key for Amazon S3 to use in
encrypting data. This value is used to store the object and then it is
discarded; Amazon S3 does not store the encryption key. The key must be
appropriate for use with the algorithm specified in the
x-amz-server-side-encryption-customer-algorithm header
. This
must be the same encryption key specified in the initiate multipart upload
request.
Parameter sSECustomerKeyMD5
:
Specifies the 128-bit MD5 digest of the encryption key according to RFC
1321. Amazon S3 uses this header for a message integrity check to ensure
that the encryption key was transmitted without error.
Implementation
Future<UploadPartOutput> uploadPart({
required String bucket,
required String key,
required int partNumber,
required String uploadId,
Uint8List? body,
int? contentLength,
String? contentMD5,
String? expectedBucketOwner,
RequestPayer? requestPayer,
String? sSECustomerAlgorithm,
Uint8List? sSECustomerKey,
String? sSECustomerKeyMD5,
}) async {
ArgumentError.checkNotNull(bucket, 'bucket');
ArgumentError.checkNotNull(key, 'key');
_s.validateStringLength(
'key',
key,
1,
1152921504606846976,
isRequired: true,
);
ArgumentError.checkNotNull(partNumber, 'partNumber');
ArgumentError.checkNotNull(uploadId, 'uploadId');
final headers = <String, String>{
if (contentLength != null) 'Content-Length': contentLength.toString(),
if (contentMD5 != null) 'Content-MD5': contentMD5.toString(),
if (expectedBucketOwner != null)
'x-amz-expected-bucket-owner': expectedBucketOwner.toString(),
if (requestPayer != null) 'x-amz-request-payer': requestPayer.toValue(),
if (sSECustomerAlgorithm != null)
'x-amz-server-side-encryption-customer-algorithm':
sSECustomerAlgorithm.toString(),
if (sSECustomerKey != null)
'x-amz-server-side-encryption-customer-key': sSECustomerKey.toString(),
if (sSECustomerKeyMD5 != null)
'x-amz-server-side-encryption-customer-key-MD5':
sSECustomerKeyMD5.toString(),
};
final $query = <String, List<String>>{
'partNumber': [partNumber.toString()],
'uploadId': [uploadId],
};
final $result = await _protocol.sendRaw(
method: 'PUT',
requestUri:
'/${Uri.encodeComponent(bucket)}/${key.split('/').map(Uri.encodeComponent).join('/')}',
queryParams: $query,
headers: headers,
payload: body,
exceptionFnMap: _exceptionFns,
);
final $elem = await _s.xmlFromResponse($result);
return UploadPartOutput(
bucketKeyEnabled: _s.extractHeaderBoolValue(
$result.headers, 'x-amz-server-side-encryption-bucket-key-enabled'),
eTag: _s.extractHeaderStringValue($result.headers, 'ETag'),
requestCharged: _s
.extractHeaderStringValue($result.headers, 'x-amz-request-charged')
?.toRequestCharged(),
sSECustomerAlgorithm: _s.extractHeaderStringValue(
$result.headers, 'x-amz-server-side-encryption-customer-algorithm'),
sSECustomerKeyMD5: _s.extractHeaderStringValue(
$result.headers, 'x-amz-server-side-encryption-customer-key-MD5'),
sSEKMSKeyId: _s.extractHeaderStringValue(
$result.headers, 'x-amz-server-side-encryption-aws-kms-key-id'),
serverSideEncryption: _s
.extractHeaderStringValue(
$result.headers, 'x-amz-server-side-encryption')
?.toServerSideEncryption(),
);
}