Sha256: e5eb7dd45b24dae833a0c68fc18bd9ef9d0f4f768c0b3623ecc6aca5acd6c73e

Contents?: true

Size: 526 Bytes

Versions: 72

Compression:

Stored size: 526 Bytes

Contents

Attach this as a bucket policy to allow unauthenticated writes. Then you can set "s3_db_backup_bucket" to upload backups to your s3 bucket instead of keeping backups on the local machine.
#TODO: add authentication option
{
    "Version": "2012-10-17",
    "Id": "Policy1477442935689",
    "Statement": [
        {
            "Sid": "Stmt1477442933718",
            "Effect": "Allow",
            "Principal": "*",
            "Action": "s3:PutObject",
            "Resource": "arn:aws:s3:::<BUCKET_NAME>/*"
        }
    ]
}

Version data entries

72 entries across 72 versions & 1 rubygems

Version Path
subspace-3.0.13 ansible/roles/postgresql/README.md
subspace-3.0.12 ansible/roles/postgresql/README.md
subspace-3.0.11 ansible/roles/postgresql/README.md
subspace-3.0.10 ansible/roles/postgresql/README.md
subspace-3.0.9 ansible/roles/postgresql/README.md
subspace-3.0.6 ansible/roles/postgresql/README.md
subspace-3.0.5 ansible/roles/postgresql/README.md
subspace-3.0.4 ansible/roles/postgresql/README.md
subspace-3.0.3 ansible/roles/postgresql/README.md
subspace-3.0.2 ansible/roles/postgresql/README.md
subspace-3.0.0 ansible/roles/postgresql/README.md
subspace-2.5.10 ansible/roles/postgresql/README.md
subspace-3.0.0.rc1 ansible/roles/postgresql/README.md
subspace-2.5.9 ansible/roles/postgresql/README.md
subspace-2.5.8 ansible/roles/postgresql/README.md
subspace-2.5.7 ansible/roles/postgresql/README.md
subspace-2.5.6 ansible/roles/postgresql/README.md
subspace-2.5.5 ansible/roles/postgresql/README.md
subspace-2.5.4 ansible/roles/postgresql/README.md
subspace-2.5.3 ansible/roles/postgresql/README.md