Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This is just a list of 'how to do x with awscli [and if the bucket allows unauthenticated users to do x then you will get a result]'.

Unless I'm missing something there's nothing particularly.. interesting or thought out here? May as well read the docs for available s3/s3api operations - there's more!



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: