aws-sdk-s3 1.167.0 → 1.170.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -1073,17 +1073,17 @@ module Aws::S3
1073
1073
  # * To encrypt new object copies to a directory bucket with SSE-KMS, we
1074
1074
  # recommend you specify SSE-KMS as the directory bucket's default
1075
1075
  # encryption configuration with a KMS key (specifically, a [customer
1076
- # managed key][4]). [Amazon Web Services managed key][5] (`aws/s3`)
1077
- # isn't supported. Your SSE-KMS configuration can only support 1
1078
- # [customer managed key][4] per directory bucket for the lifetime of
1079
- # the bucket. After you specify a customer managed key for SSE-KMS,
1080
- # you can't override the customer managed key for the bucket's
1081
- # SSE-KMS configuration. Then, when you perform a `CopyObject`
1082
- # operation and want to specify server-side encryption settings for
1083
- # new object copies with SSE-KMS in the encryption-related request
1084
- # headers, you must ensure the encryption key is the same customer
1085
- # managed key that you specified for the directory bucket's default
1086
- # encryption configuration.
1076
+ # managed key][4]). The [Amazon Web Services managed key][5]
1077
+ # (`aws/s3`) isn't supported. Your SSE-KMS configuration can only
1078
+ # support 1 [customer managed key][4] per directory bucket for the
1079
+ # lifetime of the bucket. After you specify a customer managed key for
1080
+ # SSE-KMS, you can't override the customer managed key for the
1081
+ # bucket's SSE-KMS configuration. Then, when you perform a
1082
+ # `CopyObject` operation and want to specify server-side encryption
1083
+ # settings for new object copies with SSE-KMS in the
1084
+ # encryption-related request headers, you must ensure the encryption
1085
+ # key is the same customer managed key that you specified for the
1086
+ # directory bucket's default encryption configuration.
1087
1087
  #
1088
1088
  #
1089
1089
  #
@@ -1191,14 +1191,19 @@ module Aws::S3
1191
1191
  # Guide*.
1192
1192
  #
1193
1193
  # **Directory buckets** - If you specify `x-amz-server-side-encryption`
1194
- # with `aws:kms`, you must specify the `
1195
- # x-amz-server-side-encryption-aws-kms-key-id` header with the ID (Key
1196
- # ID or Key ARN) of the KMS symmetric encryption customer managed key to
1197
- # use. Otherwise, you get an HTTP `400 Bad Request` error. Only use the
1198
- # key ID or key ARN. The key alias format of the KMS key isn't
1199
- # supported. Your SSE-KMS configuration can only support 1 [customer
1200
- # managed key][2] per directory bucket for the lifetime of the bucket.
1201
- # [Amazon Web Services managed key][3] (`aws/s3`) isn't supported.
1194
+ # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
1195
+ # header is implicitly assigned the ID of the KMS symmetric encryption
1196
+ # customer managed key that's configured for your directory bucket's
1197
+ # default encryption setting. If you want to specify the `
1198
+ # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
1199
+ # can only specify it with the ID (Key ID or Key ARN) of the KMS
1200
+ # customer managed key that's configured for your directory bucket's
1201
+ # default encryption setting. Otherwise, you get an HTTP `400 Bad
1202
+ # Request` error. Only use the key ID or key ARN. The key alias format
1203
+ # of the KMS key isn't supported. Your SSE-KMS configuration can only
1204
+ # support 1 [customer managed key][2] per directory bucket for the
1205
+ # lifetime of the bucket. The [Amazon Web Services managed key][3]
1206
+ # (`aws/s3`) isn't supported.
1202
1207
  #
1203
1208
  #
1204
1209
  #
@@ -2176,14 +2181,19 @@ module Aws::S3
2176
2181
  # Amazon Web Services managed key (`aws/s3`) to protect the data.
2177
2182
  #
2178
2183
  # **Directory buckets** - If you specify `x-amz-server-side-encryption`
2179
- # with `aws:kms`, you must specify the `
2180
- # x-amz-server-side-encryption-aws-kms-key-id` header with the ID (Key
2181
- # ID or Key ARN) of the KMS symmetric encryption customer managed key to
2182
- # use. Otherwise, you get an HTTP `400 Bad Request` error. Only use the
2183
- # key ID or key ARN. The key alias format of the KMS key isn't
2184
- # supported. Your SSE-KMS configuration can only support 1 [customer
2185
- # managed key][1] per directory bucket for the lifetime of the bucket.
2186
- # [Amazon Web Services managed key][2] (`aws/s3`) isn't supported.
2184
+ # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
2185
+ # header is implicitly assigned the ID of the KMS symmetric encryption
2186
+ # customer managed key that's configured for your directory bucket's
2187
+ # default encryption setting. If you want to specify the `
2188
+ # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
2189
+ # can only specify it with the ID (Key ID or Key ARN) of the KMS
2190
+ # customer managed key that's configured for your directory bucket's
2191
+ # default encryption setting. Otherwise, you get an HTTP `400 Bad
2192
+ # Request` error. Only use the key ID or key ARN. The key alias format
2193
+ # of the KMS key isn't supported. Your SSE-KMS configuration can only
2194
+ # support 1 [customer managed key][1] per directory bucket for the
2195
+ # lifetime of the bucket. The [Amazon Web Services managed key][2]
2196
+ # (`aws/s3`) isn't supported.
2187
2197
  #
2188
2198
  #
2189
2199
  #
@@ -2423,10 +2433,11 @@ module Aws::S3
2423
2433
  # information about REST request authentication, see [REST
2424
2434
  # Authentication][1].
2425
2435
  #
2426
- # <note markdown="1"> The `Content-MD5` header is required for any request to upload an
2427
- # object with a retention period configured using Amazon S3 Object Lock.
2428
- # For more information about Amazon S3 Object Lock, see [Amazon S3
2429
- # Object Lock Overview][2] in the *Amazon S3 User Guide*.
2436
+ # <note markdown="1"> The `Content-MD5` or `x-amz-sdk-checksum-algorithm` header is required
2437
+ # for any request to upload an object with a retention period configured
2438
+ # using Amazon S3 Object Lock. For more information, see [Uploading
2439
+ # objects to an Object Lock enabled bucket ][2] in the *Amazon S3 User
2440
+ # Guide*.
2430
2441
  #
2431
2442
  # </note>
2432
2443
  #
@@ -2437,7 +2448,7 @@ module Aws::S3
2437
2448
  #
2438
2449
  #
2439
2450
  # [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/RESTAuthentication.html
2440
- # [2]: https://docs.aws.amazon.com/AmazonS3/latest/dev/object-lock-overview.html
2451
+ # [2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock-managing.html#object-lock-put-object
2441
2452
  # @option options [String] :content_type
2442
2453
  # A standard MIME type describing the format of the contents. For more
2443
2454
  # information, see
@@ -2474,14 +2485,21 @@ module Aws::S3
2474
2485
  # provided `ChecksumAlgorithm` parameter and uses the checksum algorithm
2475
2486
  # that matches the provided value in `x-amz-checksum-algorithm `.
2476
2487
  #
2477
- # <note markdown="1"> For directory buckets, when you use Amazon Web Services SDKs, `CRC32`
2478
- # is the default checksum algorithm that's used for performance.
2488
+ # <note markdown="1"> The `Content-MD5` or `x-amz-sdk-checksum-algorithm` header is required
2489
+ # for any request to upload an object with a retention period configured
2490
+ # using Amazon S3 Object Lock. For more information, see [Uploading
2491
+ # objects to an Object Lock enabled bucket ][2] in the *Amazon S3 User
2492
+ # Guide*.
2479
2493
  #
2480
2494
  # </note>
2481
2495
  #
2496
+ # For directory buckets, when you use Amazon Web Services SDKs, `CRC32`
2497
+ # is the default checksum algorithm that's used for performance.
2498
+ #
2482
2499
  #
2483
2500
  #
2484
2501
  # [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html
2502
+ # [2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock-managing.html#object-lock-put-object
2485
2503
  # @option options [String] :checksum_crc32
2486
2504
  # This header can be used as a data integrity check to verify that the
2487
2505
  # data received is the same data that was originally sent. This header
@@ -2734,14 +2752,19 @@ module Aws::S3
2734
2752
  # Amazon Web Services managed key (`aws/s3`) to protect the data.
2735
2753
  #
2736
2754
  # **Directory buckets** - If you specify `x-amz-server-side-encryption`
2737
- # with `aws:kms`, you must specify the `
2738
- # x-amz-server-side-encryption-aws-kms-key-id` header with the ID (Key
2739
- # ID or Key ARN) of the KMS symmetric encryption customer managed key to
2740
- # use. Otherwise, you get an HTTP `400 Bad Request` error. Only use the
2741
- # key ID or key ARN. The key alias format of the KMS key isn't
2742
- # supported. Your SSE-KMS configuration can only support 1 [customer
2743
- # managed key][1] per directory bucket for the lifetime of the bucket.
2744
- # [Amazon Web Services managed key][2] (`aws/s3`) isn't supported.
2755
+ # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
2756
+ # header is implicitly assigned the ID of the KMS symmetric encryption
2757
+ # customer managed key that's configured for your directory bucket's
2758
+ # default encryption setting. If you want to specify the `
2759
+ # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
2760
+ # can only specify it with the ID (Key ID or Key ARN) of the KMS
2761
+ # customer managed key that's configured for your directory bucket's
2762
+ # default encryption setting. Otherwise, you get an HTTP `400 Bad
2763
+ # Request` error. Only use the key ID or key ARN. The key alias format
2764
+ # of the KMS key isn't supported. Your SSE-KMS configuration can only
2765
+ # support 1 [customer managed key][1] per directory bucket for the
2766
+ # lifetime of the bucket. The [Amazon Web Services managed key][2]
2767
+ # (`aws/s3`) isn't supported.
2745
2768
  #
2746
2769
  #
2747
2770
  #
@@ -723,17 +723,17 @@ module Aws::S3
723
723
  # * To encrypt new object copies to a directory bucket with SSE-KMS, we
724
724
  # recommend you specify SSE-KMS as the directory bucket's default
725
725
  # encryption configuration with a KMS key (specifically, a [customer
726
- # managed key][4]). [Amazon Web Services managed key][5] (`aws/s3`)
727
- # isn't supported. Your SSE-KMS configuration can only support 1
728
- # [customer managed key][4] per directory bucket for the lifetime of
729
- # the bucket. After you specify a customer managed key for SSE-KMS,
730
- # you can't override the customer managed key for the bucket's
731
- # SSE-KMS configuration. Then, when you perform a `CopyObject`
732
- # operation and want to specify server-side encryption settings for
733
- # new object copies with SSE-KMS in the encryption-related request
734
- # headers, you must ensure the encryption key is the same customer
735
- # managed key that you specified for the directory bucket's default
736
- # encryption configuration.
726
+ # managed key][4]). The [Amazon Web Services managed key][5]
727
+ # (`aws/s3`) isn't supported. Your SSE-KMS configuration can only
728
+ # support 1 [customer managed key][4] per directory bucket for the
729
+ # lifetime of the bucket. After you specify a customer managed key for
730
+ # SSE-KMS, you can't override the customer managed key for the
731
+ # bucket's SSE-KMS configuration. Then, when you perform a
732
+ # `CopyObject` operation and want to specify server-side encryption
733
+ # settings for new object copies with SSE-KMS in the
734
+ # encryption-related request headers, you must ensure the encryption
735
+ # key is the same customer managed key that you specified for the
736
+ # directory bucket's default encryption configuration.
737
737
  #
738
738
  #
739
739
  #
@@ -841,14 +841,19 @@ module Aws::S3
841
841
  # Guide*.
842
842
  #
843
843
  # **Directory buckets** - If you specify `x-amz-server-side-encryption`
844
- # with `aws:kms`, you must specify the `
845
- # x-amz-server-side-encryption-aws-kms-key-id` header with the ID (Key
846
- # ID or Key ARN) of the KMS symmetric encryption customer managed key to
847
- # use. Otherwise, you get an HTTP `400 Bad Request` error. Only use the
848
- # key ID or key ARN. The key alias format of the KMS key isn't
849
- # supported. Your SSE-KMS configuration can only support 1 [customer
850
- # managed key][2] per directory bucket for the lifetime of the bucket.
851
- # [Amazon Web Services managed key][3] (`aws/s3`) isn't supported.
844
+ # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
845
+ # header is implicitly assigned the ID of the KMS symmetric encryption
846
+ # customer managed key that's configured for your directory bucket's
847
+ # default encryption setting. If you want to specify the `
848
+ # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
849
+ # can only specify it with the ID (Key ID or Key ARN) of the KMS
850
+ # customer managed key that's configured for your directory bucket's
851
+ # default encryption setting. Otherwise, you get an HTTP `400 Bad
852
+ # Request` error. Only use the key ID or key ARN. The key alias format
853
+ # of the KMS key isn't supported. Your SSE-KMS configuration can only
854
+ # support 1 [customer managed key][2] per directory bucket for the
855
+ # lifetime of the bucket. The [Amazon Web Services managed key][3]
856
+ # (`aws/s3`) isn't supported.
852
857
  #
853
858
  #
854
859
  #
@@ -1826,14 +1831,19 @@ module Aws::S3
1826
1831
  # Amazon Web Services managed key (`aws/s3`) to protect the data.
1827
1832
  #
1828
1833
  # **Directory buckets** - If you specify `x-amz-server-side-encryption`
1829
- # with `aws:kms`, you must specify the `
1830
- # x-amz-server-side-encryption-aws-kms-key-id` header with the ID (Key
1831
- # ID or Key ARN) of the KMS symmetric encryption customer managed key to
1832
- # use. Otherwise, you get an HTTP `400 Bad Request` error. Only use the
1833
- # key ID or key ARN. The key alias format of the KMS key isn't
1834
- # supported. Your SSE-KMS configuration can only support 1 [customer
1835
- # managed key][1] per directory bucket for the lifetime of the bucket.
1836
- # [Amazon Web Services managed key][2] (`aws/s3`) isn't supported.
1834
+ # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
1835
+ # header is implicitly assigned the ID of the KMS symmetric encryption
1836
+ # customer managed key that's configured for your directory bucket's
1837
+ # default encryption setting. If you want to specify the `
1838
+ # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
1839
+ # can only specify it with the ID (Key ID or Key ARN) of the KMS
1840
+ # customer managed key that's configured for your directory bucket's
1841
+ # default encryption setting. Otherwise, you get an HTTP `400 Bad
1842
+ # Request` error. Only use the key ID or key ARN. The key alias format
1843
+ # of the KMS key isn't supported. Your SSE-KMS configuration can only
1844
+ # support 1 [customer managed key][1] per directory bucket for the
1845
+ # lifetime of the bucket. The [Amazon Web Services managed key][2]
1846
+ # (`aws/s3`) isn't supported.
1837
1847
  #
1838
1848
  #
1839
1849
  #
@@ -2073,10 +2083,11 @@ module Aws::S3
2073
2083
  # information about REST request authentication, see [REST
2074
2084
  # Authentication][1].
2075
2085
  #
2076
- # <note markdown="1"> The `Content-MD5` header is required for any request to upload an
2077
- # object with a retention period configured using Amazon S3 Object Lock.
2078
- # For more information about Amazon S3 Object Lock, see [Amazon S3
2079
- # Object Lock Overview][2] in the *Amazon S3 User Guide*.
2086
+ # <note markdown="1"> The `Content-MD5` or `x-amz-sdk-checksum-algorithm` header is required
2087
+ # for any request to upload an object with a retention period configured
2088
+ # using Amazon S3 Object Lock. For more information, see [Uploading
2089
+ # objects to an Object Lock enabled bucket ][2] in the *Amazon S3 User
2090
+ # Guide*.
2080
2091
  #
2081
2092
  # </note>
2082
2093
  #
@@ -2087,7 +2098,7 @@ module Aws::S3
2087
2098
  #
2088
2099
  #
2089
2100
  # [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/RESTAuthentication.html
2090
- # [2]: https://docs.aws.amazon.com/AmazonS3/latest/dev/object-lock-overview.html
2101
+ # [2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock-managing.html#object-lock-put-object
2091
2102
  # @option options [String] :content_type
2092
2103
  # A standard MIME type describing the format of the contents. For more
2093
2104
  # information, see
@@ -2124,14 +2135,21 @@ module Aws::S3
2124
2135
  # provided `ChecksumAlgorithm` parameter and uses the checksum algorithm
2125
2136
  # that matches the provided value in `x-amz-checksum-algorithm `.
2126
2137
  #
2127
- # <note markdown="1"> For directory buckets, when you use Amazon Web Services SDKs, `CRC32`
2128
- # is the default checksum algorithm that's used for performance.
2138
+ # <note markdown="1"> The `Content-MD5` or `x-amz-sdk-checksum-algorithm` header is required
2139
+ # for any request to upload an object with a retention period configured
2140
+ # using Amazon S3 Object Lock. For more information, see [Uploading
2141
+ # objects to an Object Lock enabled bucket ][2] in the *Amazon S3 User
2142
+ # Guide*.
2129
2143
  #
2130
2144
  # </note>
2131
2145
  #
2146
+ # For directory buckets, when you use Amazon Web Services SDKs, `CRC32`
2147
+ # is the default checksum algorithm that's used for performance.
2148
+ #
2132
2149
  #
2133
2150
  #
2134
2151
  # [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/checking-object-integrity.html
2152
+ # [2]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock-managing.html#object-lock-put-object
2135
2153
  # @option options [String] :checksum_crc32
2136
2154
  # This header can be used as a data integrity check to verify that the
2137
2155
  # data received is the same data that was originally sent. This header
@@ -2384,14 +2402,19 @@ module Aws::S3
2384
2402
  # Amazon Web Services managed key (`aws/s3`) to protect the data.
2385
2403
  #
2386
2404
  # **Directory buckets** - If you specify `x-amz-server-side-encryption`
2387
- # with `aws:kms`, you must specify the `
2388
- # x-amz-server-side-encryption-aws-kms-key-id` header with the ID (Key
2389
- # ID or Key ARN) of the KMS symmetric encryption customer managed key to
2390
- # use. Otherwise, you get an HTTP `400 Bad Request` error. Only use the
2391
- # key ID or key ARN. The key alias format of the KMS key isn't
2392
- # supported. Your SSE-KMS configuration can only support 1 [customer
2393
- # managed key][1] per directory bucket for the lifetime of the bucket.
2394
- # [Amazon Web Services managed key][2] (`aws/s3`) isn't supported.
2405
+ # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
2406
+ # header is implicitly assigned the ID of the KMS symmetric encryption
2407
+ # customer managed key that's configured for your directory bucket's
2408
+ # default encryption setting. If you want to specify the `
2409
+ # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
2410
+ # can only specify it with the ID (Key ID or Key ARN) of the KMS
2411
+ # customer managed key that's configured for your directory bucket's
2412
+ # default encryption setting. Otherwise, you get an HTTP `400 Bad
2413
+ # Request` error. Only use the key ID or key ARN. The key alias format
2414
+ # of the KMS key isn't supported. Your SSE-KMS configuration can only
2415
+ # support 1 [customer managed key][1] per directory bucket for the
2416
+ # lifetime of the bucket. The [Amazon Web Services managed key][2]
2417
+ # (`aws/s3`) isn't supported.
2395
2418
  #
2396
2419
  #
2397
2420
  #
@@ -36,7 +36,7 @@ Parameter to indicate whether S3Express session auth should be disabled
36
36
  class Handler < Seahorse::Client::Handler
37
37
  def call(context)
38
38
  unless context[:discovered_endpoint]
39
- params = parameters_for_operation(context)
39
+ params = Aws::S3::Endpoints.parameters_for_operation(context)
40
40
  endpoint = context.config.endpoint_provider.resolve_endpoint(params)
41
41
 
42
42
  context.http_request.endpoint = endpoint.url
@@ -76,209 +76,6 @@ Parameter to indicate whether S3Express session auth should be disabled
76
76
  context.http_request.headers[key] = value
77
77
  end
78
78
  end
79
-
80
- def parameters_for_operation(context)
81
- case context.operation_name
82
- when :abort_multipart_upload
83
- Aws::S3::Endpoints::AbortMultipartUpload.build(context)
84
- when :complete_multipart_upload
85
- Aws::S3::Endpoints::CompleteMultipartUpload.build(context)
86
- when :copy_object
87
- Aws::S3::Endpoints::CopyObject.build(context)
88
- when :create_bucket
89
- Aws::S3::Endpoints::CreateBucket.build(context)
90
- when :create_multipart_upload
91
- Aws::S3::Endpoints::CreateMultipartUpload.build(context)
92
- when :create_session
93
- Aws::S3::Endpoints::CreateSession.build(context)
94
- when :delete_bucket
95
- Aws::S3::Endpoints::DeleteBucket.build(context)
96
- when :delete_bucket_analytics_configuration
97
- Aws::S3::Endpoints::DeleteBucketAnalyticsConfiguration.build(context)
98
- when :delete_bucket_cors
99
- Aws::S3::Endpoints::DeleteBucketCors.build(context)
100
- when :delete_bucket_encryption
101
- Aws::S3::Endpoints::DeleteBucketEncryption.build(context)
102
- when :delete_bucket_intelligent_tiering_configuration
103
- Aws::S3::Endpoints::DeleteBucketIntelligentTieringConfiguration.build(context)
104
- when :delete_bucket_inventory_configuration
105
- Aws::S3::Endpoints::DeleteBucketInventoryConfiguration.build(context)
106
- when :delete_bucket_lifecycle
107
- Aws::S3::Endpoints::DeleteBucketLifecycle.build(context)
108
- when :delete_bucket_metrics_configuration
109
- Aws::S3::Endpoints::DeleteBucketMetricsConfiguration.build(context)
110
- when :delete_bucket_ownership_controls
111
- Aws::S3::Endpoints::DeleteBucketOwnershipControls.build(context)
112
- when :delete_bucket_policy
113
- Aws::S3::Endpoints::DeleteBucketPolicy.build(context)
114
- when :delete_bucket_replication
115
- Aws::S3::Endpoints::DeleteBucketReplication.build(context)
116
- when :delete_bucket_tagging
117
- Aws::S3::Endpoints::DeleteBucketTagging.build(context)
118
- when :delete_bucket_website
119
- Aws::S3::Endpoints::DeleteBucketWebsite.build(context)
120
- when :delete_object
121
- Aws::S3::Endpoints::DeleteObject.build(context)
122
- when :delete_object_tagging
123
- Aws::S3::Endpoints::DeleteObjectTagging.build(context)
124
- when :delete_objects
125
- Aws::S3::Endpoints::DeleteObjects.build(context)
126
- when :delete_public_access_block
127
- Aws::S3::Endpoints::DeletePublicAccessBlock.build(context)
128
- when :get_bucket_accelerate_configuration
129
- Aws::S3::Endpoints::GetBucketAccelerateConfiguration.build(context)
130
- when :get_bucket_acl
131
- Aws::S3::Endpoints::GetBucketAcl.build(context)
132
- when :get_bucket_analytics_configuration
133
- Aws::S3::Endpoints::GetBucketAnalyticsConfiguration.build(context)
134
- when :get_bucket_cors
135
- Aws::S3::Endpoints::GetBucketCors.build(context)
136
- when :get_bucket_encryption
137
- Aws::S3::Endpoints::GetBucketEncryption.build(context)
138
- when :get_bucket_intelligent_tiering_configuration
139
- Aws::S3::Endpoints::GetBucketIntelligentTieringConfiguration.build(context)
140
- when :get_bucket_inventory_configuration
141
- Aws::S3::Endpoints::GetBucketInventoryConfiguration.build(context)
142
- when :get_bucket_lifecycle
143
- Aws::S3::Endpoints::GetBucketLifecycle.build(context)
144
- when :get_bucket_lifecycle_configuration
145
- Aws::S3::Endpoints::GetBucketLifecycleConfiguration.build(context)
146
- when :get_bucket_location
147
- Aws::S3::Endpoints::GetBucketLocation.build(context)
148
- when :get_bucket_logging
149
- Aws::S3::Endpoints::GetBucketLogging.build(context)
150
- when :get_bucket_metrics_configuration
151
- Aws::S3::Endpoints::GetBucketMetricsConfiguration.build(context)
152
- when :get_bucket_notification
153
- Aws::S3::Endpoints::GetBucketNotification.build(context)
154
- when :get_bucket_notification_configuration
155
- Aws::S3::Endpoints::GetBucketNotificationConfiguration.build(context)
156
- when :get_bucket_ownership_controls
157
- Aws::S3::Endpoints::GetBucketOwnershipControls.build(context)
158
- when :get_bucket_policy
159
- Aws::S3::Endpoints::GetBucketPolicy.build(context)
160
- when :get_bucket_policy_status
161
- Aws::S3::Endpoints::GetBucketPolicyStatus.build(context)
162
- when :get_bucket_replication
163
- Aws::S3::Endpoints::GetBucketReplication.build(context)
164
- when :get_bucket_request_payment
165
- Aws::S3::Endpoints::GetBucketRequestPayment.build(context)
166
- when :get_bucket_tagging
167
- Aws::S3::Endpoints::GetBucketTagging.build(context)
168
- when :get_bucket_versioning
169
- Aws::S3::Endpoints::GetBucketVersioning.build(context)
170
- when :get_bucket_website
171
- Aws::S3::Endpoints::GetBucketWebsite.build(context)
172
- when :get_object
173
- Aws::S3::Endpoints::GetObject.build(context)
174
- when :get_object_acl
175
- Aws::S3::Endpoints::GetObjectAcl.build(context)
176
- when :get_object_attributes
177
- Aws::S3::Endpoints::GetObjectAttributes.build(context)
178
- when :get_object_legal_hold
179
- Aws::S3::Endpoints::GetObjectLegalHold.build(context)
180
- when :get_object_lock_configuration
181
- Aws::S3::Endpoints::GetObjectLockConfiguration.build(context)
182
- when :get_object_retention
183
- Aws::S3::Endpoints::GetObjectRetention.build(context)
184
- when :get_object_tagging
185
- Aws::S3::Endpoints::GetObjectTagging.build(context)
186
- when :get_object_torrent
187
- Aws::S3::Endpoints::GetObjectTorrent.build(context)
188
- when :get_public_access_block
189
- Aws::S3::Endpoints::GetPublicAccessBlock.build(context)
190
- when :head_bucket
191
- Aws::S3::Endpoints::HeadBucket.build(context)
192
- when :head_object
193
- Aws::S3::Endpoints::HeadObject.build(context)
194
- when :list_bucket_analytics_configurations
195
- Aws::S3::Endpoints::ListBucketAnalyticsConfigurations.build(context)
196
- when :list_bucket_intelligent_tiering_configurations
197
- Aws::S3::Endpoints::ListBucketIntelligentTieringConfigurations.build(context)
198
- when :list_bucket_inventory_configurations
199
- Aws::S3::Endpoints::ListBucketInventoryConfigurations.build(context)
200
- when :list_bucket_metrics_configurations
201
- Aws::S3::Endpoints::ListBucketMetricsConfigurations.build(context)
202
- when :list_buckets
203
- Aws::S3::Endpoints::ListBuckets.build(context)
204
- when :list_directory_buckets
205
- Aws::S3::Endpoints::ListDirectoryBuckets.build(context)
206
- when :list_multipart_uploads
207
- Aws::S3::Endpoints::ListMultipartUploads.build(context)
208
- when :list_object_versions
209
- Aws::S3::Endpoints::ListObjectVersions.build(context)
210
- when :list_objects
211
- Aws::S3::Endpoints::ListObjects.build(context)
212
- when :list_objects_v2
213
- Aws::S3::Endpoints::ListObjectsV2.build(context)
214
- when :list_parts
215
- Aws::S3::Endpoints::ListParts.build(context)
216
- when :put_bucket_accelerate_configuration
217
- Aws::S3::Endpoints::PutBucketAccelerateConfiguration.build(context)
218
- when :put_bucket_acl
219
- Aws::S3::Endpoints::PutBucketAcl.build(context)
220
- when :put_bucket_analytics_configuration
221
- Aws::S3::Endpoints::PutBucketAnalyticsConfiguration.build(context)
222
- when :put_bucket_cors
223
- Aws::S3::Endpoints::PutBucketCors.build(context)
224
- when :put_bucket_encryption
225
- Aws::S3::Endpoints::PutBucketEncryption.build(context)
226
- when :put_bucket_intelligent_tiering_configuration
227
- Aws::S3::Endpoints::PutBucketIntelligentTieringConfiguration.build(context)
228
- when :put_bucket_inventory_configuration
229
- Aws::S3::Endpoints::PutBucketInventoryConfiguration.build(context)
230
- when :put_bucket_lifecycle
231
- Aws::S3::Endpoints::PutBucketLifecycle.build(context)
232
- when :put_bucket_lifecycle_configuration
233
- Aws::S3::Endpoints::PutBucketLifecycleConfiguration.build(context)
234
- when :put_bucket_logging
235
- Aws::S3::Endpoints::PutBucketLogging.build(context)
236
- when :put_bucket_metrics_configuration
237
- Aws::S3::Endpoints::PutBucketMetricsConfiguration.build(context)
238
- when :put_bucket_notification
239
- Aws::S3::Endpoints::PutBucketNotification.build(context)
240
- when :put_bucket_notification_configuration
241
- Aws::S3::Endpoints::PutBucketNotificationConfiguration.build(context)
242
- when :put_bucket_ownership_controls
243
- Aws::S3::Endpoints::PutBucketOwnershipControls.build(context)
244
- when :put_bucket_policy
245
- Aws::S3::Endpoints::PutBucketPolicy.build(context)
246
- when :put_bucket_replication
247
- Aws::S3::Endpoints::PutBucketReplication.build(context)
248
- when :put_bucket_request_payment
249
- Aws::S3::Endpoints::PutBucketRequestPayment.build(context)
250
- when :put_bucket_tagging
251
- Aws::S3::Endpoints::PutBucketTagging.build(context)
252
- when :put_bucket_versioning
253
- Aws::S3::Endpoints::PutBucketVersioning.build(context)
254
- when :put_bucket_website
255
- Aws::S3::Endpoints::PutBucketWebsite.build(context)
256
- when :put_object
257
- Aws::S3::Endpoints::PutObject.build(context)
258
- when :put_object_acl
259
- Aws::S3::Endpoints::PutObjectAcl.build(context)
260
- when :put_object_legal_hold
261
- Aws::S3::Endpoints::PutObjectLegalHold.build(context)
262
- when :put_object_lock_configuration
263
- Aws::S3::Endpoints::PutObjectLockConfiguration.build(context)
264
- when :put_object_retention
265
- Aws::S3::Endpoints::PutObjectRetention.build(context)
266
- when :put_object_tagging
267
- Aws::S3::Endpoints::PutObjectTagging.build(context)
268
- when :put_public_access_block
269
- Aws::S3::Endpoints::PutPublicAccessBlock.build(context)
270
- when :restore_object
271
- Aws::S3::Endpoints::RestoreObject.build(context)
272
- when :select_object_content
273
- Aws::S3::Endpoints::SelectObjectContent.build(context)
274
- when :upload_part
275
- Aws::S3::Endpoints::UploadPart.build(context)
276
- when :upload_part_copy
277
- Aws::S3::Endpoints::UploadPartCopy.build(context)
278
- when :write_get_object_response
279
- Aws::S3::Endpoints::WriteGetObjectResponse.build(context)
280
- end
281
- end
282
79
  end
283
80
 
284
81
  def add_handlers(handlers, _config)
@@ -188,8 +188,32 @@ module Aws::S3
188
188
 
189
189
  # @example Request syntax with placeholder values
190
190
  #
191
- # s3.buckets()
191
+ # buckets = s3.buckets({
192
+ # prefix: "Prefix",
193
+ # bucket_region: "BucketRegion",
194
+ # })
192
195
  # @param [Hash] options ({})
196
+ # @option options [String] :prefix
197
+ # Limits the response to bucket names that begin with the specified
198
+ # bucket name prefix.
199
+ # @option options [String] :bucket_region
200
+ # Limits the response to buckets that are located in the specified
201
+ # Amazon Web Services Region. The Amazon Web Services Region must be
202
+ # expressed according to the Amazon Web Services Region code, such as
203
+ # `us-west-2` for the US West (Oregon) Region. For a list of the valid
204
+ # values for all of the Amazon Web Services Regions, see [Regions and
205
+ # Endpoints][1].
206
+ #
207
+ # <note markdown="1"> Requests made to a Regional endpoint that is different from the
208
+ # `bucket-region` parameter are not supported. For example, if you want
209
+ # to limit the response to your buckets in Region `us-west-2`, the
210
+ # request must be made to an endpoint in Region `us-west-2`.
211
+ #
212
+ # </note>
213
+ #
214
+ #
215
+ #
216
+ # [1]: https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region
193
217
  # @return [Bucket::Collection]
194
218
  def buckets(options = {})
195
219
  batches = Enumerator.new do |y|