aws-sdk-js-v3
You must generate an Access Key before getting started. All examples will utilize access_key_id and access_key_secret variables which represent the Access Key ID and Secret Access Key values you generated.
JavaScript or TypeScript users may continue to use the @aws-sdk/client-s3 ↗ npm package as per normal. You must pass in the R2 configuration credentials when instantiating your S3 service client.
import { S3Client, ListBucketsCommand, ListObjectsV2Command, GetObjectCommand, PutObjectCommand,} from "@aws-sdk/client-s3";
const S3 = new S3Client({ region: "auto", // Required by SDK but not used by R2 // Provide your Cloudflare account ID endpoint: `https://${ACCOUNT_ID}.r2.cloudflarestorage.com`, // Retrieve your S3 API credentials for your R2 bucket via API tokens (see: https://developers.cloudflare.com/r2/api/tokens) credentials: { accessKeyId: ACCESS_KEY_ID, secretAccessKey: SECRET_ACCESS_KEY, },});
console.log(await S3.send(new ListBucketsCommand({})));// {// '$metadata': {// httpStatusCode: 200,// requestId: undefined,// extendedRequestId: undefined,// cfId: undefined,// attempts: 1,// totalRetryDelay: 0// },// Buckets: [// { Name: 'user-uploads', CreationDate: 2022-04-13T21:23:47.102Z },// { Name: 'my-bucket', CreationDate: 2022-05-07T02:46:49.218Z }// ],// Owner: {// DisplayName: '...',// ID: '...'// }// }
console.log( await S3.send(new ListObjectsV2Command({ Bucket: "my-bucket" })),);// {// '$metadata': {// httpStatusCode: 200,// requestId: undefined,// extendedRequestId: undefined,// cfId: undefined,// attempts: 1,// totalRetryDelay: 0// },// CommonPrefixes: undefined,// Contents: [// {// Key: 'cat.png',// LastModified: 2022-05-07T02:50:45.616Z,// ETag: '"c4da329b38467509049e615c11b0c48a"',// ChecksumAlgorithm: undefined,// Size: 751832,// StorageClass: 'STANDARD',// Owner: undefined// },// {// Key: 'todos.txt',// LastModified: 2022-05-07T21:37:17.150Z,// ETag: '"29d911f495d1ba7cb3a4d7d15e63236a"',// ChecksumAlgorithm: undefined,// Size: 279,// StorageClass: 'STANDARD',// Owner: undefined// }// ],// ContinuationToken: undefined,// Delimiter: undefined,// EncodingType: undefined,// IsTruncated: false,// KeyCount: 8,// MaxKeys: 1000,// Name: 'my-bucket',// NextContinuationToken: undefined,// Prefix: undefined,// StartAfter: undefined// }You can also generate presigned links that can be used to share public read or write access to a bucket temporarily.
import { getSignedUrl } from "@aws-sdk/s3-request-presigner";
// Use the expiresIn property to determine how long the presigned link is valid.console.log( await getSignedUrl( S3, new GetObjectCommand({ Bucket: "my-bucket", Key: "dog.png" }), { expiresIn: 3600 }, ),);// You can also create links for operations such as PutObject to allow temporary write access to a specific key.// Specify ContentType to restrict uploads to a specific file type.console.log( await getSignedUrl( S3, new PutObjectCommand({ Bucket: "my-bucket", Key: "dog.png", ContentType: "image/png", }), { expiresIn: 3600 }, ),);https://my-bucket.<ACCOUNT_ID>.r2.cloudflarestorage.com/dog.png?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Credential=<credential>&X-Amz-Date=<timestamp>&X-Amz-Expires=3600&X-Amz-SignedHeaders=host&X-Amz-Signature=<signature>&x-id=GetObjecthttps://my-bucket.<ACCOUNT_ID>.r2.cloudflarestorage.com/dog.png?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Credential=<credential>&X-Amz-Date=<timestamp>&X-Amz-Expires=3600&X-Amz-SignedHeaders=content-type%3Bhost&X-Amz-Signature=<signature>&x-id=PutObjectYou can use the link generated by the PutObject example to upload to the specified bucket and key, until the presigned link expires. When using a presigned URL with ContentType, the client must include a matching Content-Type header in the request.
curl -X PUT "https://my-bucket.<ACCOUNT_ID>.r2.cloudflarestorage.com/dog.png?X-Amz-Algorithm=..." \ -H "Content-Type: image/png" \ --data-binary @dog.pngWhen generating presigned URLs for uploads, you can limit abuse and misuse by:
-
Restricting Content-Type: Specify the allowed content type in the
PutObjectCommand. The upload will fail if the client sends a differentContent-Typeheader. -
Configuring CORS: Set up CORS rules on your bucket to control which origins can upload files. Configure CORS via the Cloudflare dashboard ↗ by adding a JSON policy to your bucket settings:
[ { "AllowedOrigins": ["https://example.com"], "AllowedMethods": ["PUT"], "AllowedHeaders": ["Content-Type"], "ExposeHeaders": ["ETag"], "MaxAgeSeconds": 3600 }]Then generate a presigned URL with a Content-Type restriction:
const putUrl = await getSignedUrl( S3, new PutObjectCommand({ Bucket: "my-bucket", Key: "dog.png", ContentType: "image/png", }), { expiresIn: 3600 },);When a client uses this presigned URL, they must:
- Make the request from an allowed origin (enforced by CORS)
- Include the
Content-Type: image/pngheader (enforced by the signature)
Was this helpful?
- Resources
- API
- New to Cloudflare?
- Directory
- Sponsorships
- Open Source
- Support
- Help Center
- System Status
- Compliance
- GDPR
- Company
- cloudflare.com
- Our team
- Careers
- © 2025 Cloudflare, Inc.
- Privacy Policy
- Terms of Use
- Report Security Issues
- Trademark
-