| Name |
Last commit
|
Last update |
|---|---|---|
| edx | ||
| requirements | ||
| share | ||
| .coveragerc | ||
| .gitignore | ||
| .gitreview | ||
| .pep8 | ||
| MANIFEST.in | ||
| Makefile | ||
| README.md | ||
| default.cfg | ||
| logging.cfg | ||
| pylintrc | ||
| setup.cfg | ||
| setup.py | ||
| tox.ini |
By default, AWS does not apply an ACL to keys that are put into a bucket from another account. Having no ACL at all effectively renders the object useless since it cannot be read or anything. The only workaround we found was to explicitly set the ACL policy when putting the object. Additionally boto will list all of the keys in the bucket if it is passed "validate=True" this requires an additional permission. We want to minimize the set of required permissions so we get a reference to the bucket without validating that it exists. Change-Id: I0f4d6919c7d2817acb1eb55314191648599c3a0f
| Name |
Last commit
|
Last update |
|---|---|---|
| edx | Loading commit data... | |
| requirements | Loading commit data... | |
| share | Loading commit data... | |
| .coveragerc | Loading commit data... | |
| .gitignore | Loading commit data... | |
| .gitreview | Loading commit data... | |
| .pep8 | Loading commit data... | |
| MANIFEST.in | Loading commit data... | |
| Makefile | Loading commit data... | |
| README.md | Loading commit data... | |
| default.cfg | Loading commit data... | |
| logging.cfg | Loading commit data... | |
| pylintrc | Loading commit data... | |
| setup.cfg | Loading commit data... | |
| setup.py | Loading commit data... | |
| tox.ini | Loading commit data... |