fluent-plugin-s3 0.6.5 → 0.6.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: e306f719d4a60dcbfbbc48db85ee403a9865b054
4
- data.tar.gz: bef798f3e37dde338873bd3697b5388e04e032bd
3
+ metadata.gz: 563ab768bef3f13148f841becf15b1d7e8e88ed2
4
+ data.tar.gz: b3b54160a015d14b801914e522fef06ad5d7bb1a
5
5
  SHA512:
6
- metadata.gz: 0bc0a0c6daa1c762097aecc94828d59a79e15a9abf514938a0d3a4e412205c4681f2fc8235d40425f36adbbf25daf903a147c34426af7bbb9e9865625b0220d5
7
- data.tar.gz: 6883277b81e496c02673038c3f83118050e7c38c2f42391b4168dc80b0a73889fd81906462ab1d3914036eece8a34f913cfec32fd4a0bf529ff4426c37111f91
6
+ metadata.gz: 27b44ab95d94a7cf93cd1337aea917326bf596693b7af529a75cfb343c7a65e97311c9345d21ee8bf3983c69b84a2773f26081c4cc6f928fb6f25ba9a621b285
7
+ data.tar.gz: 205930d50c3e1d1d42383e149b870aa4e8b8232780288026fcdeb214624626927b3e68601a1f361aaa1dd3632e3a81119d9e964615e890bbf19ebe94733ecd06
data/ChangeLog CHANGED
@@ -1,3 +1,8 @@
1
+ Release 0.6.6 - 2016/03/16
2
+
3
+ * Fix ACL handling in PUT operation
4
+
5
+
1
6
  Release 0.6.5 - 2016/01/13
2
7
 
3
8
  * Add description to parameters
data/README.md CHANGED
@@ -25,7 +25,7 @@ Simply use RubyGems:
25
25
  ## Configuration
26
26
 
27
27
  <match pattern>
28
- type s3
28
+ @type s3
29
29
 
30
30
  aws_key_id YOUR_AWS_KEY_ID
31
31
  aws_sec_key YOUR_AWS_SECRET_KEY
@@ -98,8 +98,8 @@ now.
98
98
  assured to be unique. This is used to follow a way of peformance tuning, `Add
99
99
  a Hex Hash Prefix to Key Name`, written in [Request Rate and Performance
100
100
  Considerations - Amazon Simple Storage
101
- Service](https://docs.aws.amazon.com/AmazonS3/latest/dev/request-rate-perf-con
102
- siderations.html). You can configure the length of string with a
101
+ Service](https://docs.aws.amazon.com/AmazonS3/latest/dev/request-rate-perf-considerations.html).
102
+ You can configure the length of string with a
103
103
  `hex_random_length` parameter (Default: 4).
104
104
 
105
105
  The default format is `%{path}%{time_slice}_%{index}.%{file_extension}`.
@@ -252,18 +252,17 @@ Permission for the object in S3. This is useful for cross-account access
252
252
  using IAM roles. Valid values are:
253
253
 
254
254
  * private (default)
255
- * public_read
256
- * public_read_write (not recommended - see [Canned
255
+ * public-read
256
+ * public-read-write (not recommended - see [Canned
257
257
  ACL](http://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html#cann
258
258
  ed-acl))
259
- * authenticated_read
260
- * bucket_owner_read
261
- * bucket_owner_full_control
259
+ * authenticated-read
260
+ * bucket-owner-read
261
+ * bucket-owner-full-control
262
262
 
263
263
  To use cross-account access, you will need to create a bucket policy granting
264
264
  the specific access required. Refer to the [AWS
265
- documentation](http://docs.aws.amazon.com/AmazonS3/latest/dev/example-walkthro
266
- ughs-managing-access-example3.html) for examples.
265
+ documentation](http://docs.aws.amazon.com/AmazonS3/latest/dev/example-walkthroughs-managing-access-example3.html) for examples.
267
266
 
268
267
  **hex_random_length**
269
268
 
@@ -299,7 +298,7 @@ this plugin on FIPS enabled environment, set `compute_checksums false`.
299
298
  Typically, you use AssumeRole for cross-account access or federation.
300
299
 
301
300
  <match *>
302
- type s3
301
+ @type s3
303
302
 
304
303
  <assume_role_credentials>
305
304
  role_arn ROLE_ARN
@@ -346,7 +345,7 @@ Retrieve temporary security credentials via HTTP request. This is useful on
346
345
  EC2 instance.
347
346
 
348
347
  <match *>
349
- type s3
348
+ @type s3
350
349
 
351
350
  <instance_profile_credentials>
352
351
  ip_address IP_ADDRESS
@@ -391,7 +390,7 @@ This loads AWS access credentials from local ini file. This is useful for
391
390
  local developing.
392
391
 
393
392
  <match *>
394
- type s3
393
+ @type s3
395
394
 
396
395
  <shared_credentials>
397
396
  path PATH
data/VERSION CHANGED
@@ -1 +1 @@
1
- 0.6.5
1
+ 0.6.6
@@ -96,7 +96,7 @@ module Fluent
96
96
  desc "Change one line format in the S3 object (out_file,json,ltsv,single_value)"
97
97
  config_param :format, :string, :default => 'out_file'
98
98
  desc "Permission for the object in S3"
99
- config_param :acl, :string, :default => :private
99
+ config_param :acl, :string, :default => nil
100
100
  desc "The length of `%{hex_random}` placeholder(4-16)"
101
101
  config_param :hex_random_length, :integer, :default => 4
102
102
  desc "Overwrite already existing path"
@@ -216,9 +216,14 @@ module Fluent
216
216
  tmp.rewind
217
217
  log.debug { "out_s3: write chunk: {key:#{chunk.key},tsuffix:#{tsuffix(chunk)}} to s3://#{@s3_bucket}/#{s3path}" }
218
218
 
219
- put_options = {:body => tmp, :content_type => @compressor.content_type, :storage_class => @storage_class}
219
+ put_options = {
220
+ :body => tmp,
221
+ :content_type => @compressor.content_type,
222
+ :storage_class => @storage_class,
223
+ }
220
224
  put_options[:server_side_encryption] = @use_server_side_encryption if @use_server_side_encryption
221
225
  put_options[:ssekms_key_id] = @ssekms_key_id if @ssekms_key_id
226
+ put_options[:acl] = @acl if @acl
222
227
  @bucket.object(s3path).put(put_options)
223
228
 
224
229
  @values_for_s3_object_chunk.delete(chunk.unique_id)
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: fluent-plugin-s3
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.6.5
4
+ version: 0.6.6
5
5
  platform: ruby
6
6
  authors:
7
7
  - Sadayuki Furuhashi
@@ -9,7 +9,7 @@ authors:
9
9
  autorequire:
10
10
  bindir: bin
11
11
  cert_chain: []
12
- date: 2016-01-13 00:00:00.000000000 Z
12
+ date: 2016-03-17 00:00:00.000000000 Z
13
13
  dependencies:
14
14
  - !ruby/object:Gem::Dependency
15
15
  name: fluentd