aws-sdk-s3 1.167.0 → 1.168.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -57,6 +57,7 @@ module Aws::S3
57
57
  BucketLoggingStatus = Shapes::StructureShape.new(name: 'BucketLoggingStatus')
58
58
  BucketLogsPermission = Shapes::StringShape.new(name: 'BucketLogsPermission')
59
59
  BucketName = Shapes::StringShape.new(name: 'BucketName')
60
+ BucketRegion = Shapes::StringShape.new(name: 'BucketRegion')
60
61
  BucketType = Shapes::StringShape.new(name: 'BucketType')
61
62
  BucketVersioningStatus = Shapes::StringShape.new(name: 'BucketVersioningStatus')
62
63
  Buckets = Shapes::ListShape.new(name: 'Buckets')
@@ -680,6 +681,7 @@ module Aws::S3
680
681
 
681
682
  Bucket.add_member(:name, Shapes::ShapeRef.new(shape: BucketName, location_name: "Name"))
682
683
  Bucket.add_member(:creation_date, Shapes::ShapeRef.new(shape: CreationDate, location_name: "CreationDate"))
684
+ Bucket.add_member(:bucket_region, Shapes::ShapeRef.new(shape: BucketRegion, location_name: "BucketRegion"))
683
685
  Bucket.struct_class = Types::Bucket
684
686
 
685
687
  BucketAlreadyExists.struct_class = Types::BucketAlreadyExists
@@ -1723,10 +1725,13 @@ module Aws::S3
1723
1725
  ListBucketsOutput.add_member(:buckets, Shapes::ShapeRef.new(shape: Buckets, location_name: "Buckets"))
1724
1726
  ListBucketsOutput.add_member(:owner, Shapes::ShapeRef.new(shape: Owner, location_name: "Owner"))
1725
1727
  ListBucketsOutput.add_member(:continuation_token, Shapes::ShapeRef.new(shape: NextToken, location_name: "ContinuationToken"))
1728
+ ListBucketsOutput.add_member(:prefix, Shapes::ShapeRef.new(shape: Prefix, location_name: "Prefix"))
1726
1729
  ListBucketsOutput.struct_class = Types::ListBucketsOutput
1727
1730
 
1728
1731
  ListBucketsRequest.add_member(:max_buckets, Shapes::ShapeRef.new(shape: MaxBuckets, location: "querystring", location_name: "max-buckets"))
1729
1732
  ListBucketsRequest.add_member(:continuation_token, Shapes::ShapeRef.new(shape: Token, location: "querystring", location_name: "continuation-token"))
1733
+ ListBucketsRequest.add_member(:prefix, Shapes::ShapeRef.new(shape: Prefix, location: "querystring", location_name: "prefix"))
1734
+ ListBucketsRequest.add_member(:bucket_region, Shapes::ShapeRef.new(shape: BucketRegion, location: "querystring", location_name: "bucket-region"))
1730
1735
  ListBucketsRequest.struct_class = Types::ListBucketsRequest
1731
1736
 
1732
1737
  ListDirectoryBucketsOutput.add_member(:buckets, Shapes::ShapeRef.new(shape: Buckets, location_name: "Buckets"))
@@ -1073,17 +1073,17 @@ module Aws::S3
1073
1073
  # * To encrypt new object copies to a directory bucket with SSE-KMS, we
1074
1074
  # recommend you specify SSE-KMS as the directory bucket's default
1075
1075
  # encryption configuration with a KMS key (specifically, a [customer
1076
- # managed key][4]). [Amazon Web Services managed key][5] (`aws/s3`)
1077
- # isn't supported. Your SSE-KMS configuration can only support 1
1078
- # [customer managed key][4] per directory bucket for the lifetime of
1079
- # the bucket. After you specify a customer managed key for SSE-KMS,
1080
- # you can't override the customer managed key for the bucket's
1081
- # SSE-KMS configuration. Then, when you perform a `CopyObject`
1082
- # operation and want to specify server-side encryption settings for
1083
- # new object copies with SSE-KMS in the encryption-related request
1084
- # headers, you must ensure the encryption key is the same customer
1085
- # managed key that you specified for the directory bucket's default
1086
- # encryption configuration.
1076
+ # managed key][4]). The [Amazon Web Services managed key][5]
1077
+ # (`aws/s3`) isn't supported. Your SSE-KMS configuration can only
1078
+ # support 1 [customer managed key][4] per directory bucket for the
1079
+ # lifetime of the bucket. After you specify a customer managed key for
1080
+ # SSE-KMS, you can't override the customer managed key for the
1081
+ # bucket's SSE-KMS configuration. Then, when you perform a
1082
+ # `CopyObject` operation and want to specify server-side encryption
1083
+ # settings for new object copies with SSE-KMS in the
1084
+ # encryption-related request headers, you must ensure the encryption
1085
+ # key is the same customer managed key that you specified for the
1086
+ # directory bucket's default encryption configuration.
1087
1087
  #
1088
1088
  #
1089
1089
  #
@@ -1191,14 +1191,19 @@ module Aws::S3
1191
1191
  # Guide*.
1192
1192
  #
1193
1193
  # **Directory buckets** - If you specify `x-amz-server-side-encryption`
1194
- # with `aws:kms`, you must specify the `
1195
- # x-amz-server-side-encryption-aws-kms-key-id` header with the ID (Key
1196
- # ID or Key ARN) of the KMS symmetric encryption customer managed key to
1197
- # use. Otherwise, you get an HTTP `400 Bad Request` error. Only use the
1198
- # key ID or key ARN. The key alias format of the KMS key isn't
1199
- # supported. Your SSE-KMS configuration can only support 1 [customer
1200
- # managed key][2] per directory bucket for the lifetime of the bucket.
1201
- # [Amazon Web Services managed key][3] (`aws/s3`) isn't supported.
1194
+ # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
1195
+ # header is implicitly assigned the ID of the KMS symmetric encryption
1196
+ # customer managed key that's configured for your directory bucket's
1197
+ # default encryption setting. If you want to specify the `
1198
+ # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
1199
+ # can only specify it with the ID (Key ID or Key ARN) of the KMS
1200
+ # customer managed key that's configured for your directory bucket's
1201
+ # default encryption setting. Otherwise, you get an HTTP `400 Bad
1202
+ # Request` error. Only use the key ID or key ARN. The key alias format
1203
+ # of the KMS key isn't supported. Your SSE-KMS configuration can only
1204
+ # support 1 [customer managed key][2] per directory bucket for the
1205
+ # lifetime of the bucket. The [Amazon Web Services managed key][3]
1206
+ # (`aws/s3`) isn't supported.
1202
1207
  #
1203
1208
  #
1204
1209
  #
@@ -2176,14 +2181,19 @@ module Aws::S3
2176
2181
  # Amazon Web Services managed key (`aws/s3`) to protect the data.
2177
2182
  #
2178
2183
  # **Directory buckets** - If you specify `x-amz-server-side-encryption`
2179
- # with `aws:kms`, you must specify the `
2180
- # x-amz-server-side-encryption-aws-kms-key-id` header with the ID (Key
2181
- # ID or Key ARN) of the KMS symmetric encryption customer managed key to
2182
- # use. Otherwise, you get an HTTP `400 Bad Request` error. Only use the
2183
- # key ID or key ARN. The key alias format of the KMS key isn't
2184
- # supported. Your SSE-KMS configuration can only support 1 [customer
2185
- # managed key][1] per directory bucket for the lifetime of the bucket.
2186
- # [Amazon Web Services managed key][2] (`aws/s3`) isn't supported.
2184
+ # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
2185
+ # header is implicitly assigned the ID of the KMS symmetric encryption
2186
+ # customer managed key that's configured for your directory bucket's
2187
+ # default encryption setting. If you want to specify the `
2188
+ # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
2189
+ # can only specify it with the ID (Key ID or Key ARN) of the KMS
2190
+ # customer managed key that's configured for your directory bucket's
2191
+ # default encryption setting. Otherwise, you get an HTTP `400 Bad
2192
+ # Request` error. Only use the key ID or key ARN. The key alias format
2193
+ # of the KMS key isn't supported. Your SSE-KMS configuration can only
2194
+ # support 1 [customer managed key][1] per directory bucket for the
2195
+ # lifetime of the bucket. The [Amazon Web Services managed key][2]
2196
+ # (`aws/s3`) isn't supported.
2187
2197
  #
2188
2198
  #
2189
2199
  #
@@ -2423,10 +2433,11 @@ module Aws::S3
2423
2433
  # information about REST request authentication, see [REST
2424
2434
  # Authentication][1].
2425
2435
  #
2426
- # <note markdown="1"> The `Content-MD5` header is required for any request to upload an
2427
- # object with a retention period configured using Amazon S3 Object Lock.
2428
- # For more information about Amazon S3 Object Lock, see [Amazon S3
2429
- # Object Lock Overview][2] in the *Amazon S3 User Guide*.
2436
+ # <note markdown="1"> The `Content-MD5` or `x-amz-sdk-checksum-algorithm` header is required
2437
+ # for any request to upload an object with a retention period configured
2438
+ # using Amazon S3 Object Lock. For more information, see [Uploading
2439
+ # objects to an Object Lock enabled bucket ][2] in the *Amazon S3 User
2440
+ # Guide*.
2430
2441
  #
2431
2442
  # </note>
2432
2443
  #
@@ -2437,7 +2448,7 @@ module Aws::S3
2437
2448
  #
2438
2449
  #
2439
2450
  # [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/RESTAuthentication.html
2440
- # [2]: https://docs.aws.amazon.com/AmazonS3/latest/dev/object-lock-overview.html
2451
+ # [2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock-managing.html#object-lock-put-object
2441
2452
  # @option options [String] :content_type
2442
2453
  # A standard MIME type describing the format of the contents. For more
2443
2454
  # information, see
@@ -2474,14 +2485,21 @@ module Aws::S3
2474
2485
  # provided `ChecksumAlgorithm` parameter and uses the checksum algorithm
2475
2486
  # that matches the provided value in `x-amz-checksum-algorithm `.
2476
2487
  #
2477
- # <note markdown="1"> For directory buckets, when you use Amazon Web Services SDKs, `CRC32`
2478
- # is the default checksum algorithm that's used for performance.
2488
+ # <note markdown="1"> The `Content-MD5` or `x-amz-sdk-checksum-algorithm` header is required
2489
+ # for any request to upload an object with a retention period configured
2490
+ # using Amazon S3 Object Lock. For more information, see [Uploading
2491
+ # objects to an Object Lock enabled bucket ][2] in the *Amazon S3 User
2492
+ # Guide*.
2479
2493
  #
2480
2494
  # </note>
2481
2495
  #
2496
+ # For directory buckets, when you use Amazon Web Services SDKs, `CRC32`
2497
+ # is the default checksum algorithm that's used for performance.
2498
+ #
2482
2499
  #
2483
2500
  #
2484
2501
  # [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html
2502
+ # [2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock-managing.html#object-lock-put-object
2485
2503
  # @option options [String] :checksum_crc32
2486
2504
  # This header can be used as a data integrity check to verify that the
2487
2505
  # data received is the same data that was originally sent. This header
@@ -2734,14 +2752,19 @@ module Aws::S3
2734
2752
  # Amazon Web Services managed key (`aws/s3`) to protect the data.
2735
2753
  #
2736
2754
  # **Directory buckets** - If you specify `x-amz-server-side-encryption`
2737
- # with `aws:kms`, you must specify the `
2738
- # x-amz-server-side-encryption-aws-kms-key-id` header with the ID (Key
2739
- # ID or Key ARN) of the KMS symmetric encryption customer managed key to
2740
- # use. Otherwise, you get an HTTP `400 Bad Request` error. Only use the
2741
- # key ID or key ARN. The key alias format of the KMS key isn't
2742
- # supported. Your SSE-KMS configuration can only support 1 [customer
2743
- # managed key][1] per directory bucket for the lifetime of the bucket.
2744
- # [Amazon Web Services managed key][2] (`aws/s3`) isn't supported.
2755
+ # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
2756
+ # header is implicitly assigned the ID of the KMS symmetric encryption
2757
+ # customer managed key that's configured for your directory bucket's
2758
+ # default encryption setting. If you want to specify the `
2759
+ # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
2760
+ # can only specify it with the ID (Key ID or Key ARN) of the KMS
2761
+ # customer managed key that's configured for your directory bucket's
2762
+ # default encryption setting. Otherwise, you get an HTTP `400 Bad
2763
+ # Request` error. Only use the key ID or key ARN. The key alias format
2764
+ # of the KMS key isn't supported. Your SSE-KMS configuration can only
2765
+ # support 1 [customer managed key][1] per directory bucket for the
2766
+ # lifetime of the bucket. The [Amazon Web Services managed key][2]
2767
+ # (`aws/s3`) isn't supported.
2745
2768
  #
2746
2769
  #
2747
2770
  #
@@ -723,17 +723,17 @@ module Aws::S3
723
723
  # * To encrypt new object copies to a directory bucket with SSE-KMS, we
724
724
  # recommend you specify SSE-KMS as the directory bucket's default
725
725
  # encryption configuration with a KMS key (specifically, a [customer
726
- # managed key][4]). [Amazon Web Services managed key][5] (`aws/s3`)
727
- # isn't supported. Your SSE-KMS configuration can only support 1
728
- # [customer managed key][4] per directory bucket for the lifetime of
729
- # the bucket. After you specify a customer managed key for SSE-KMS,
730
- # you can't override the customer managed key for the bucket's
731
- # SSE-KMS configuration. Then, when you perform a `CopyObject`
732
- # operation and want to specify server-side encryption settings for
733
- # new object copies with SSE-KMS in the encryption-related request
734
- # headers, you must ensure the encryption key is the same customer
735
- # managed key that you specified for the directory bucket's default
736
- # encryption configuration.
726
+ # managed key][4]). The [Amazon Web Services managed key][5]
727
+ # (`aws/s3`) isn't supported. Your SSE-KMS configuration can only
728
+ # support 1 [customer managed key][4] per directory bucket for the
729
+ # lifetime of the bucket. After you specify a customer managed key for
730
+ # SSE-KMS, you can't override the customer managed key for the
731
+ # bucket's SSE-KMS configuration. Then, when you perform a
732
+ # `CopyObject` operation and want to specify server-side encryption
733
+ # settings for new object copies with SSE-KMS in the
734
+ # encryption-related request headers, you must ensure the encryption
735
+ # key is the same customer managed key that you specified for the
736
+ # directory bucket's default encryption configuration.
737
737
  #
738
738
  #
739
739
  #
@@ -841,14 +841,19 @@ module Aws::S3
841
841
  # Guide*.
842
842
  #
843
843
  # **Directory buckets** - If you specify `x-amz-server-side-encryption`
844
- # with `aws:kms`, you must specify the `
845
- # x-amz-server-side-encryption-aws-kms-key-id` header with the ID (Key
846
- # ID or Key ARN) of the KMS symmetric encryption customer managed key to
847
- # use. Otherwise, you get an HTTP `400 Bad Request` error. Only use the
848
- # key ID or key ARN. The key alias format of the KMS key isn't
849
- # supported. Your SSE-KMS configuration can only support 1 [customer
850
- # managed key][2] per directory bucket for the lifetime of the bucket.
851
- # [Amazon Web Services managed key][3] (`aws/s3`) isn't supported.
844
+ # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
845
+ # header is implicitly assigned the ID of the KMS symmetric encryption
846
+ # customer managed key that's configured for your directory bucket's
847
+ # default encryption setting. If you want to specify the `
848
+ # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
849
+ # can only specify it with the ID (Key ID or Key ARN) of the KMS
850
+ # customer managed key that's configured for your directory bucket's
851
+ # default encryption setting. Otherwise, you get an HTTP `400 Bad
852
+ # Request` error. Only use the key ID or key ARN. The key alias format
853
+ # of the KMS key isn't supported. Your SSE-KMS configuration can only
854
+ # support 1 [customer managed key][2] per directory bucket for the
855
+ # lifetime of the bucket. The [Amazon Web Services managed key][3]
856
+ # (`aws/s3`) isn't supported.
852
857
  #
853
858
  #
854
859
  #
@@ -1826,14 +1831,19 @@ module Aws::S3
1826
1831
  # Amazon Web Services managed key (`aws/s3`) to protect the data.
1827
1832
  #
1828
1833
  # **Directory buckets** - If you specify `x-amz-server-side-encryption`
1829
- # with `aws:kms`, you must specify the `
1830
- # x-amz-server-side-encryption-aws-kms-key-id` header with the ID (Key
1831
- # ID or Key ARN) of the KMS symmetric encryption customer managed key to
1832
- # use. Otherwise, you get an HTTP `400 Bad Request` error. Only use the
1833
- # key ID or key ARN. The key alias format of the KMS key isn't
1834
- # supported. Your SSE-KMS configuration can only support 1 [customer
1835
- # managed key][1] per directory bucket for the lifetime of the bucket.
1836
- # [Amazon Web Services managed key][2] (`aws/s3`) isn't supported.
1834
+ # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
1835
+ # header is implicitly assigned the ID of the KMS symmetric encryption
1836
+ # customer managed key that's configured for your directory bucket's
1837
+ # default encryption setting. If you want to specify the `
1838
+ # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
1839
+ # can only specify it with the ID (Key ID or Key ARN) of the KMS
1840
+ # customer managed key that's configured for your directory bucket's
1841
+ # default encryption setting. Otherwise, you get an HTTP `400 Bad
1842
+ # Request` error. Only use the key ID or key ARN. The key alias format
1843
+ # of the KMS key isn't supported. Your SSE-KMS configuration can only
1844
+ # support 1 [customer managed key][1] per directory bucket for the
1845
+ # lifetime of the bucket. The [Amazon Web Services managed key][2]
1846
+ # (`aws/s3`) isn't supported.
1837
1847
  #
1838
1848
  #
1839
1849
  #
@@ -2073,10 +2083,11 @@ module Aws::S3
2073
2083
  # information about REST request authentication, see [REST
2074
2084
  # Authentication][1].
2075
2085
  #
2076
- # <note markdown="1"> The `Content-MD5` header is required for any request to upload an
2077
- # object with a retention period configured using Amazon S3 Object Lock.
2078
- # For more information about Amazon S3 Object Lock, see [Amazon S3
2079
- # Object Lock Overview][2] in the *Amazon S3 User Guide*.
2086
+ # <note markdown="1"> The `Content-MD5` or `x-amz-sdk-checksum-algorithm` header is required
2087
+ # for any request to upload an object with a retention period configured
2088
+ # using Amazon S3 Object Lock. For more information, see [Uploading
2089
+ # objects to an Object Lock enabled bucket ][2] in the *Amazon S3 User
2090
+ # Guide*.
2080
2091
  #
2081
2092
  # </note>
2082
2093
  #
@@ -2087,7 +2098,7 @@ module Aws::S3
2087
2098
  #
2088
2099
  #
2089
2100
  # [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/RESTAuthentication.html
2090
- # [2]: https://docs.aws.amazon.com/AmazonS3/latest/dev/object-lock-overview.html
2101
+ # [2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock-managing.html#object-lock-put-object
2091
2102
  # @option options [String] :content_type
2092
2103
  # A standard MIME type describing the format of the contents. For more
2093
2104
  # information, see
@@ -2124,14 +2135,21 @@ module Aws::S3
2124
2135
  # provided `ChecksumAlgorithm` parameter and uses the checksum algorithm
2125
2136
  # that matches the provided value in `x-amz-checksum-algorithm `.
2126
2137
  #
2127
- # <note markdown="1"> For directory buckets, when you use Amazon Web Services SDKs, `CRC32`
2128
- # is the default checksum algorithm that's used for performance.
2138
+ # <note markdown="1"> The `Content-MD5` or `x-amz-sdk-checksum-algorithm` header is required
2139
+ # for any request to upload an object with a retention period configured
2140
+ # using Amazon S3 Object Lock. For more information, see [Uploading
2141
+ # objects to an Object Lock enabled bucket ][2] in the *Amazon S3 User
2142
+ # Guide*.
2129
2143
  #
2130
2144
  # </note>
2131
2145
  #
2146
+ # For directory buckets, when you use Amazon Web Services SDKs, `CRC32`
2147
+ # is the default checksum algorithm that's used for performance.
2148
+ #
2132
2149
  #
2133
2150
  #
2134
2151
  # [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html
2152
+ # [2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock-managing.html#object-lock-put-object
2135
2153
  # @option options [String] :checksum_crc32
2136
2154
  # This header can be used as a data integrity check to verify that the
2137
2155
  # data received is the same data that was originally sent. This header
@@ -2384,14 +2402,19 @@ module Aws::S3
2384
2402
  # Amazon Web Services managed key (`aws/s3`) to protect the data.
2385
2403
  #
2386
2404
  # **Directory buckets** - If you specify `x-amz-server-side-encryption`
2387
- # with `aws:kms`, you must specify the `
2388
- # x-amz-server-side-encryption-aws-kms-key-id` header with the ID (Key
2389
- # ID or Key ARN) of the KMS symmetric encryption customer managed key to
2390
- # use. Otherwise, you get an HTTP `400 Bad Request` error. Only use the
2391
- # key ID or key ARN. The key alias format of the KMS key isn't
2392
- # supported. Your SSE-KMS configuration can only support 1 [customer
2393
- # managed key][1] per directory bucket for the lifetime of the bucket.
2394
- # [Amazon Web Services managed key][2] (`aws/s3`) isn't supported.
2405
+ # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
2406
+ # header is implicitly assigned the ID of the KMS symmetric encryption
2407
+ # customer managed key that's configured for your directory bucket's
2408
+ # default encryption setting. If you want to specify the `
2409
+ # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
2410
+ # can only specify it with the ID (Key ID or Key ARN) of the KMS
2411
+ # customer managed key that's configured for your directory bucket's
2412
+ # default encryption setting. Otherwise, you get an HTTP `400 Bad
2413
+ # Request` error. Only use the key ID or key ARN. The key alias format
2414
+ # of the KMS key isn't supported. Your SSE-KMS configuration can only
2415
+ # support 1 [customer managed key][1] per directory bucket for the
2416
+ # lifetime of the bucket. The [Amazon Web Services managed key][2]
2417
+ # (`aws/s3`) isn't supported.
2395
2418
  #
2396
2419
  #
2397
2420
  #
@@ -188,8 +188,32 @@ module Aws::S3
188
188
 
189
189
  # @example Request syntax with placeholder values
190
190
  #
191
- # s3.buckets()
191
+ # buckets = s3.buckets({
192
+ # prefix: "Prefix",
193
+ # bucket_region: "BucketRegion",
194
+ # })
192
195
  # @param [Hash] options ({})
196
+ # @option options [String] :prefix
197
+ # Limits the response to bucket names that begin with the specified
198
+ # bucket name prefix.
199
+ # @option options [String] :bucket_region
200
+ # Limits the response to buckets that are located in the specified
201
+ # Amazon Web Services Region. The Amazon Web Services Region must be
202
+ # expressed according to the Amazon Web Services Region code, such as
203
+ # `us-west-2` for the US West (Oregon) Region. For a list of the valid
204
+ # values for all of the Amazon Web Services Regions, see [Regions and
205
+ # Endpoints][1].
206
+ #
207
+ # <note markdown="1"> Requests made to a Regional endpoint that is different from the
208
+ # `bucket-region` parameter are not supported. For example, if you want
209
+ # to limit the response to your buckets in Region `us-west-2`, the
210
+ # request must be made to an endpoint in Region `us-west-2`.
211
+ #
212
+ # </note>
213
+ #
214
+ #
215
+ #
216
+ # [1]: https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region
193
217
  # @return [Bucket::Collection]
194
218
  def buckets(options = {})
195
219
  batches = Enumerator.new do |y|