fluent-plugin-s3 0.6.5 → 0.6.6

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: e306f719d4a60dcbfbbc48db85ee403a9865b054
4
- data.tar.gz: bef798f3e37dde338873bd3697b5388e04e032bd
3
+ metadata.gz: 563ab768bef3f13148f841becf15b1d7e8e88ed2
4
+ data.tar.gz: b3b54160a015d14b801914e522fef06ad5d7bb1a
5
5
  SHA512:
6
- metadata.gz: 0bc0a0c6daa1c762097aecc94828d59a79e15a9abf514938a0d3a4e412205c4681f2fc8235d40425f36adbbf25daf903a147c34426af7bbb9e9865625b0220d5
7
- data.tar.gz: 6883277b81e496c02673038c3f83118050e7c38c2f42391b4168dc80b0a73889fd81906462ab1d3914036eece8a34f913cfec32fd4a0bf529ff4426c37111f91
6
+ metadata.gz: 27b44ab95d94a7cf93cd1337aea917326bf596693b7af529a75cfb343c7a65e97311c9345d21ee8bf3983c69b84a2773f26081c4cc6f928fb6f25ba9a621b285
7
+ data.tar.gz: 205930d50c3e1d1d42383e149b870aa4e8b8232780288026fcdeb214624626927b3e68601a1f361aaa1dd3632e3a81119d9e964615e890bbf19ebe94733ecd06
data/ChangeLog CHANGED
@@ -1,3 +1,8 @@
1
+ Release 0.6.6 - 2016/03/16
2
+
3
+ * Fix ACL handling in PUT operation
4
+
5
+
1
6
  Release 0.6.5 - 2016/01/13
2
7
 
3
8
  * Add description to parameters
data/README.md CHANGED
@@ -25,7 +25,7 @@ Simply use RubyGems:
25
25
  ## Configuration
26
26
 
27
27
  <match pattern>
28
- type s3
28
+ @type s3
29
29
 
30
30
  aws_key_id YOUR_AWS_KEY_ID
31
31
  aws_sec_key YOUR_AWS_SECRET_KEY
@@ -98,8 +98,8 @@ now.
98
98
  assured to be unique. This is used to follow a way of peformance tuning, `Add
99
99
  a Hex Hash Prefix to Key Name`, written in [Request Rate and Performance
100
100
  Considerations - Amazon Simple Storage
101
- Service](https://docs.aws.amazon.com/AmazonS3/latest/dev/request-rate-perf-con
102
- siderations.html). You can configure the length of string with a
101
+ Service](https://docs.aws.amazon.com/AmazonS3/latest/dev/request-rate-perf-considerations.html).
102
+ You can configure the length of string with a
103
103
  `hex_random_length` parameter (Default: 4).
104
104
 
105
105
  The default format is `%{path}%{time_slice}_%{index}.%{file_extension}`.
@@ -252,18 +252,17 @@ Permission for the object in S3. This is useful for cross-account access
252
252
  using IAM roles. Valid values are:
253
253
 
254
254
  * private (default)
255
- * public_read
256
- * public_read_write (not recommended - see [Canned
255
+ * public-read
256
+ * public-read-write (not recommended - see [Canned
257
257
  ACL](http://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html#cann
258
258
  ed-acl))
259
- * authenticated_read
260
- * bucket_owner_read
261
- * bucket_owner_full_control
259
+ * authenticated-read
260
+ * bucket-owner-read
261
+ * bucket-owner-full-control
262
262
 
263
263
  To use cross-account access, you will need to create a bucket policy granting
264
264
  the specific access required. Refer to the [AWS
265
- documentation](http://docs.aws.amazon.com/AmazonS3/latest/dev/example-walkthro
266
- ughs-managing-access-example3.html) for examples.
265
+ documentation](http://docs.aws.amazon.com/AmazonS3/latest/dev/example-walkthroughs-managing-access-example3.html) for examples.
267
266
 
268
267
  **hex_random_length**
269
268
 
@@ -299,7 +298,7 @@ this plugin on FIPS enabled environment, set `compute_checksums false`.
299
298
  Typically, you use AssumeRole for cross-account access or federation.
300
299
 
301
300
  <match *>
302
- type s3
301
+ @type s3
303
302
 
304
303
  <assume_role_credentials>
305
304
  role_arn ROLE_ARN
@@ -346,7 +345,7 @@ Retrieve temporary security credentials via HTTP request. This is useful on
346
345
  EC2 instance.
347
346
 
348
347
  <match *>
349
- type s3
348
+ @type s3
350
349
 
351
350
  <instance_profile_credentials>
352
351
  ip_address IP_ADDRESS
@@ -391,7 +390,7 @@ This loads AWS access credentials from local ini file. This is useful for
391
390
  local developing.
392
391
 
393
392
  <match *>
394
- type s3
393
+ @type s3
395
394
 
396
395
  <shared_credentials>
397
396
  path PATH
data/VERSION CHANGED
@@ -1 +1 @@
1
- 0.6.5
1
+ 0.6.6
@@ -96,7 +96,7 @@ module Fluent
96
96
  desc "Change one line format in the S3 object (out_file,json,ltsv,single_value)"
97
97
  config_param :format, :string, :default => 'out_file'
98
98
  desc "Permission for the object in S3"
99
- config_param :acl, :string, :default => :private
99
+ config_param :acl, :string, :default => nil
100
100
  desc "The length of `%{hex_random}` placeholder(4-16)"
101
101
  config_param :hex_random_length, :integer, :default => 4
102
102
  desc "Overwrite already existing path"
@@ -216,9 +216,14 @@ module Fluent
216
216
  tmp.rewind
217
217
  log.debug { "out_s3: write chunk: {key:#{chunk.key},tsuffix:#{tsuffix(chunk)}} to s3://#{@s3_bucket}/#{s3path}" }
218
218
 
219
- put_options = {:body => tmp, :content_type => @compressor.content_type, :storage_class => @storage_class}
219
+ put_options = {
220
+ :body => tmp,
221
+ :content_type => @compressor.content_type,
222
+ :storage_class => @storage_class,
223
+ }
220
224
  put_options[:server_side_encryption] = @use_server_side_encryption if @use_server_side_encryption
221
225
  put_options[:ssekms_key_id] = @ssekms_key_id if @ssekms_key_id
226
+ put_options[:acl] = @acl if @acl
222
227
  @bucket.object(s3path).put(put_options)
223
228
 
224
229
  @values_for_s3_object_chunk.delete(chunk.unique_id)
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: fluent-plugin-s3
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.6.5
4
+ version: 0.6.6
5
5
  platform: ruby
6
6
  authors:
7
7
  - Sadayuki Furuhashi
@@ -9,7 +9,7 @@ authors:
9
9
  autorequire:
10
10
  bindir: bin
11
11
  cert_chain: []
12
- date: 2016-01-13 00:00:00.000000000 Z
12
+ date: 2016-03-17 00:00:00.000000000 Z
13
13
  dependencies:
14
14
  - !ruby/object:Gem::Dependency
15
15
  name: fluentd