Add aws-exec-read to S3's canned ACL list

https://github.com/boto/boto/pull/3332
f38
Garrett Holmstrom 9 years ago
parent 1b3e70df5c
commit b96aa7f477

@ -0,0 +1,13 @@
Index: boto-2.40.0/boto/s3/acl.py
===================================================================
--- boto-2.40.0.orig/boto/s3/acl.py
+++ boto-2.40.0/boto/s3/acl.py
@@ -25,7 +25,7 @@ from boto.s3.user import User
CannedACLStrings = ['private', 'public-read',
'public-read-write', 'authenticated-read',
'bucket-owner-read', 'bucket-owner-full-control',
- 'log-delivery-write']
+ 'log-delivery-write', 'aws-exec-read']
class Policy(object):

@ -47,6 +47,10 @@ Patch3: boto-2.40.0-sigv4-protocol.patch
# https://github.com/boto/boto/pull/3508
Patch4: boto-2.40.0-retry-float.patch
# Add aws-exec-read to S3's canned ACL list
# https://github.com/boto/boto/pull/3332
Patch5: boto-2.40.0-aws-exec-read.patch
BuildRequires: python2-devel
BuildRequires: python-setuptools
BuildRequires: python-six
@ -130,6 +134,7 @@ cloud systems like Eucalyptus, OpenStack and Open Nebula.
%patch2 -p1
%patch3 -p1
%patch4 -p1
%patch5 -p1
rm -r boto/vendored
@ -193,6 +198,7 @@ mv $RPM_BUILD_ROOT/%{_bindir} examples
- Added NAT gateway support
- Fixed sigv4 protocol selection
- Fixed max_retry_delay config option
- Added aws-exec-read to S3's canned ACL list
* Mon May 23 2016 Jon Ciesla <limburgher@gmail.com> - 2.40.0-1
- 2.40.0.

Loading…
Cancel
Save