Skip to content

Instantly share code, notes, and snippets.

@judell
Created August 18, 2022 00:40
Show Gist options
  • Save judell/09cdf74a46cc601f1eb25b2970be90dc to your computer and use it in GitHub Desktop.
Save judell/09cdf74a46cc601f1eb25b2970be90dc to your computer and use it in GitHub Desktop.
s3 dump
--
-- PostgreSQL database dump
--
-- Dumped from database version 14.2
-- Dumped by pg_dump version 14.2 (Ubuntu 14.2-1.pgdg20.04+1+b1)
SET statement_timeout = 0;
SET lock_timeout = 0;
SET idle_in_transaction_session_timeout = 0;
SET client_encoding = 'UTF8';
SET standard_conforming_strings = on;
SELECT pg_catalog.set_config('search_path', '', false);
SET check_function_bodies = false;
SET xmloption = content;
SET client_min_messages = warning;
SET row_security = off;
SET default_tablespace = '';
--
-- Name: aws_s3_bucket; Type: FOREIGN TABLE; Schema: aws_all; Owner: root
--
CREATE FOREIGN TABLE aws_all.aws_s3_bucket (
name text,
arn text,
creation_date timestamp with time zone,
bucket_policy_is_public boolean,
versioning_enabled boolean,
versioning_mfa_delete boolean,
block_public_acls boolean,
block_public_policy boolean,
ignore_public_acls boolean,
restrict_public_buckets boolean,
event_notification_configuration jsonb,
server_side_encryption_configuration jsonb,
acl jsonb,
lifecycle_rules jsonb,
logging jsonb,
object_lock_configuration jsonb,
policy jsonb,
policy_std jsonb,
replication jsonb,
tags_src jsonb,
tags jsonb,
title text,
akas jsonb,
region text,
partition text,
account_id text,
_ctx jsonb
)
SERVER steampipe
OPTIONS (
"table" 'aws_s3_bucket'
);
ALTER FOREIGN TABLE aws_all.aws_s3_bucket OWNER TO root;
--
-- Data for Name: aws_s3_bucket; Type: TABLE DATA; Schema: aws_all; Owner: root
--
COPY aws_all.aws_s3_bucket (name, arn, creation_date, bucket_policy_is_public, versioning_enabled, versioning_mfa_delete, block_public_acls, block_public_policy, ignore_public_acls, restrict_public_buckets, event_notification_configuration, server_side_encryption_configuration, acl, lifecycle_rules, logging, object_lock_configuration, policy, policy_std, replication, tags_src, tags, title, akas, region, partition, account_id, _ctx) FROM stdin;
jon-turbot-test-bucket-01 arn:aws:s3:::jon-turbot-test-bucket-01 2021-10-04 16:55:29+00 f f f f f f f {"QueueConfigurations": null, "TopicConfigurations": null, "EventBridgeConfiguration": null, "LambdaFunctionConfigurations": null} \N {"Owner": {"ID": "e46b1ad6057413cb0a6e5acac5f1f9a6f64db6e993c4ebd1d40afc43dc69a76e", "DisplayName": "aws+judell+aaa"}, "Grants": [{"Grantee": {"ID": "e46b1ad6057413cb0a6e5acac5f1f9a6f64db6e993c4ebd1d40afc43dc69a76e", "URI": null, "Type": "CanonicalUser", "DisplayName": "aws+judell+aaa", "EmailAddress": null}, "Permission": "FULL_CONTROL"}]} \N \N \N {"Id": "AWSLogDeliveryWrite20150319", "Version": "2012-10-17", "Statement": [{"Sid": "AWSLogDeliveryWrite", "Action": "s3:PutObject", "Effect": "Allow", "Resource": "arn:aws:s3:::jon-turbot-test-bucket-01/AWSLogs/605491513981/*", "Condition": {"ArnLike": {"aws:SourceArn": "arn:aws:logs:us-west-1:605491513981:*"}, "StringEquals": {"s3:x-amz-acl": "bucket-owner-full-control", "aws:SourceAccount": "605491513981"}}, "Principal": {"Service": "delivery.logs.amazonaws.com"}}, {"Sid": "AWSLogDeliveryAclCheck", "Action": "s3:GetBucketAcl", "Effect": "Allow", "Resource": "arn:aws:s3:::jon-turbot-test-bucket-01", "Condition": {"ArnLike": {"aws:SourceArn": "arn:aws:logs:us-west-1:605491513981:*"}, "StringEquals": {"aws:SourceAccount": "605491513981"}}, "Principal": {"Service": "delivery.logs.amazonaws.com"}}]} {"Id": "AWSLogDeliveryWrite20150319", "Version": "2012-10-17", "Statement": [{"Sid": "AWSLogDeliveryWrite", "Action": ["s3:putobject"], "Effect": "Allow", "Resource": ["arn:aws:s3:::jon-turbot-test-bucket-01/AWSLogs/605491513981/*"], "Condition": {"ArnLike": {"aws:sourcearn": ["arn:aws:logs:us-west-1:605491513981:*"]}, "StringEquals": {"s3:x-amz-acl": ["bucket-owner-full-control"], "aws:sourceaccount": ["605491513981"]}}, "Principal": {"Service": ["delivery.logs.amazonaws.com"]}}, {"Sid": "AWSLogDeliveryAclCheck", "Action": ["s3:getbucketacl"], "Effect": "Allow", "Resource": ["arn:aws:s3:::jon-turbot-test-bucket-01"], "Condition": {"ArnLike": {"aws:sourcearn": ["arn:aws:logs:us-west-1:605491513981:*"]}, "StringEquals": {"aws:sourceaccount": ["605491513981"]}}, "Principal": {"Service": ["delivery.logs.amazonaws.com"]}}]} \N \N \N jon-turbot-test-bucket-01 ["arn:aws:s3:::jon-turbot-test-bucket-01"] us-east-1 aws 605491513981 {"connection_name": "z_605491513981"}
cf-templates-1s5tzrjxv4j52-us-west-1 arn:aws:s3:::cf-templates-1s5tzrjxv4j52-us-west-1 2021-12-28 00:37:38+00 f f f f f f f {"QueueConfigurations": null, "TopicConfigurations": null, "EventBridgeConfiguration": null, "LambdaFunctionConfigurations": null} {"Rules": [{"BucketKeyEnabled": false, "ApplyServerSideEncryptionByDefault": {"SSEAlgorithm": "AES256", "KMSMasterKeyID": null}}]} {"Owner": {"ID": "e46b1ad6057413cb0a6e5acac5f1f9a6f64db6e993c4ebd1d40afc43dc69a76e", "DisplayName": "aws+judell+aaa"}, "Grants": [{"Grantee": {"ID": "e46b1ad6057413cb0a6e5acac5f1f9a6f64db6e993c4ebd1d40afc43dc69a76e", "URI": null, "Type": "CanonicalUser", "DisplayName": "aws+judell+aaa", "EmailAddress": null}, "Permission": "FULL_CONTROL"}]} \N \N \N \N \N \N \N \N cf-templates-1s5tzrjxv4j52-us-west-1 ["arn:aws:s3:::cf-templates-1s5tzrjxv4j52-us-west-1"] us-west-1 aws 605491513981 {"connection_name": "z_605491513981"}
aws-cloudtrail-logs-605491513981-45df8af0 arn:aws:s3:::aws-cloudtrail-logs-605491513981-45df8af0 2022-05-04 16:37:09+00 f f f t t t t {"QueueConfigurations": null, "TopicConfigurations": null, "EventBridgeConfiguration": null, "LambdaFunctionConfigurations": null} \N {"Owner": {"ID": "e46b1ad6057413cb0a6e5acac5f1f9a6f64db6e993c4ebd1d40afc43dc69a76e", "DisplayName": "aws+judell+aaa"}, "Grants": [{"Grantee": {"ID": "e46b1ad6057413cb0a6e5acac5f1f9a6f64db6e993c4ebd1d40afc43dc69a76e", "URI": null, "Type": "CanonicalUser", "DisplayName": "aws+judell+aaa", "EmailAddress": null}, "Permission": "FULL_CONTROL"}]} \N \N \N {"Version": "2012-10-17", "Statement": [{"Sid": "AWSCloudTrailAclCheck20150319", "Action": "s3:GetBucketAcl", "Effect": "Allow", "Resource": "arn:aws:s3:::aws-cloudtrail-logs-605491513981-45df8af0", "Condition": {"StringEquals": {"AWS:SourceArn": "arn:aws:cloudtrail:us-east-1:605491513981:trail/management-events"}}, "Principal": {"Service": "cloudtrail.amazonaws.com"}}, {"Sid": "AWSCloudTrailWrite20150319", "Action": "s3:PutObject", "Effect": "Allow", "Resource": "arn:aws:s3:::aws-cloudtrail-logs-605491513981-45df8af0/AWSLogs/605491513981/*", "Condition": {"StringEquals": {"s3:x-amz-acl": "bucket-owner-full-control", "AWS:SourceArn": "arn:aws:cloudtrail:us-east-1:605491513981:trail/management-events"}}, "Principal": {"Service": "cloudtrail.amazonaws.com"}}]} {"Version": "2012-10-17", "Statement": [{"Sid": "AWSCloudTrailAclCheck20150319", "Action": ["s3:getbucketacl"], "Effect": "Allow", "Resource": ["arn:aws:s3:::aws-cloudtrail-logs-605491513981-45df8af0"], "Condition": {"StringEquals": {"aws:sourcearn": ["arn:aws:cloudtrail:us-east-1:605491513981:trail/management-events"]}}, "Principal": {"Service": ["cloudtrail.amazonaws.com"]}}, {"Sid": "AWSCloudTrailWrite20150319", "Action": ["s3:putobject"], "Effect": "Allow", "Resource": ["arn:aws:s3:::aws-cloudtrail-logs-605491513981-45df8af0/AWSLogs/605491513981/*"], "Condition": {"StringEquals": {"s3:x-amz-acl": ["bucket-owner-full-control"], "aws:sourcearn": ["arn:aws:cloudtrail:us-east-1:605491513981:trail/management-events"]}}, "Principal": {"Service": ["cloudtrail.amazonaws.com"]}}]} \N \N \N aws-cloudtrail-logs-605491513981-45df8af0 ["arn:aws:s3:::aws-cloudtrail-logs-605491513981-45df8af0"] us-east-1 aws 605491513981 {"connection_name": "z_605491513981"}
\.
--
-- Name: TABLE aws_s3_bucket; Type: ACL; Schema: aws_all; Owner: root
--
GRANT SELECT ON TABLE aws_all.aws_s3_bucket TO steampipe_users;
--
-- PostgreSQL database dump complete
--
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment