Created
August 18, 2022 00:40
-
-
Save judell/09cdf74a46cc601f1eb25b2970be90dc to your computer and use it in GitHub Desktop.
s3 dump
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
-- | |
-- PostgreSQL database dump | |
-- | |
-- Dumped from database version 14.2 | |
-- Dumped by pg_dump version 14.2 (Ubuntu 14.2-1.pgdg20.04+1+b1) | |
SET statement_timeout = 0; | |
SET lock_timeout = 0; | |
SET idle_in_transaction_session_timeout = 0; | |
SET client_encoding = 'UTF8'; | |
SET standard_conforming_strings = on; | |
SELECT pg_catalog.set_config('search_path', '', false); | |
SET check_function_bodies = false; | |
SET xmloption = content; | |
SET client_min_messages = warning; | |
SET row_security = off; | |
SET default_tablespace = ''; | |
-- | |
-- Name: aws_s3_bucket; Type: FOREIGN TABLE; Schema: aws_all; Owner: root | |
-- | |
CREATE FOREIGN TABLE aws_all.aws_s3_bucket ( | |
name text, | |
arn text, | |
creation_date timestamp with time zone, | |
bucket_policy_is_public boolean, | |
versioning_enabled boolean, | |
versioning_mfa_delete boolean, | |
block_public_acls boolean, | |
block_public_policy boolean, | |
ignore_public_acls boolean, | |
restrict_public_buckets boolean, | |
event_notification_configuration jsonb, | |
server_side_encryption_configuration jsonb, | |
acl jsonb, | |
lifecycle_rules jsonb, | |
logging jsonb, | |
object_lock_configuration jsonb, | |
policy jsonb, | |
policy_std jsonb, | |
replication jsonb, | |
tags_src jsonb, | |
tags jsonb, | |
title text, | |
akas jsonb, | |
region text, | |
partition text, | |
account_id text, | |
_ctx jsonb | |
) | |
SERVER steampipe | |
OPTIONS ( | |
"table" 'aws_s3_bucket' | |
); | |
ALTER FOREIGN TABLE aws_all.aws_s3_bucket OWNER TO root; | |
-- | |
-- Data for Name: aws_s3_bucket; Type: TABLE DATA; Schema: aws_all; Owner: root | |
-- | |
COPY aws_all.aws_s3_bucket (name, arn, creation_date, bucket_policy_is_public, versioning_enabled, versioning_mfa_delete, block_public_acls, block_public_policy, ignore_public_acls, restrict_public_buckets, event_notification_configuration, server_side_encryption_configuration, acl, lifecycle_rules, logging, object_lock_configuration, policy, policy_std, replication, tags_src, tags, title, akas, region, partition, account_id, _ctx) FROM stdin; | |
jon-turbot-test-bucket-01 arn:aws:s3:::jon-turbot-test-bucket-01 2021-10-04 16:55:29+00 f f f f f f f {"QueueConfigurations": null, "TopicConfigurations": null, "EventBridgeConfiguration": null, "LambdaFunctionConfigurations": null} \N {"Owner": {"ID": "e46b1ad6057413cb0a6e5acac5f1f9a6f64db6e993c4ebd1d40afc43dc69a76e", "DisplayName": "aws+judell+aaa"}, "Grants": [{"Grantee": {"ID": "e46b1ad6057413cb0a6e5acac5f1f9a6f64db6e993c4ebd1d40afc43dc69a76e", "URI": null, "Type": "CanonicalUser", "DisplayName": "aws+judell+aaa", "EmailAddress": null}, "Permission": "FULL_CONTROL"}]} \N \N \N {"Id": "AWSLogDeliveryWrite20150319", "Version": "2012-10-17", "Statement": [{"Sid": "AWSLogDeliveryWrite", "Action": "s3:PutObject", "Effect": "Allow", "Resource": "arn:aws:s3:::jon-turbot-test-bucket-01/AWSLogs/605491513981/*", "Condition": {"ArnLike": {"aws:SourceArn": "arn:aws:logs:us-west-1:605491513981:*"}, "StringEquals": {"s3:x-amz-acl": "bucket-owner-full-control", "aws:SourceAccount": "605491513981"}}, "Principal": {"Service": "delivery.logs.amazonaws.com"}}, {"Sid": "AWSLogDeliveryAclCheck", "Action": "s3:GetBucketAcl", "Effect": "Allow", "Resource": "arn:aws:s3:::jon-turbot-test-bucket-01", "Condition": {"ArnLike": {"aws:SourceArn": "arn:aws:logs:us-west-1:605491513981:*"}, "StringEquals": {"aws:SourceAccount": "605491513981"}}, "Principal": {"Service": "delivery.logs.amazonaws.com"}}]} {"Id": "AWSLogDeliveryWrite20150319", "Version": "2012-10-17", "Statement": [{"Sid": "AWSLogDeliveryWrite", "Action": ["s3:putobject"], "Effect": "Allow", "Resource": ["arn:aws:s3:::jon-turbot-test-bucket-01/AWSLogs/605491513981/*"], "Condition": {"ArnLike": {"aws:sourcearn": ["arn:aws:logs:us-west-1:605491513981:*"]}, "StringEquals": {"s3:x-amz-acl": ["bucket-owner-full-control"], "aws:sourceaccount": ["605491513981"]}}, "Principal": {"Service": ["delivery.logs.amazonaws.com"]}}, {"Sid": "AWSLogDeliveryAclCheck", "Action": ["s3:getbucketacl"], "Effect": "Allow", "Resource": ["arn:aws:s3:::jon-turbot-test-bucket-01"], "Condition": {"ArnLike": {"aws:sourcearn": ["arn:aws:logs:us-west-1:605491513981:*"]}, "StringEquals": {"aws:sourceaccount": ["605491513981"]}}, "Principal": {"Service": ["delivery.logs.amazonaws.com"]}}]} \N \N \N jon-turbot-test-bucket-01 ["arn:aws:s3:::jon-turbot-test-bucket-01"] us-east-1 aws 605491513981 {"connection_name": "z_605491513981"} | |
cf-templates-1s5tzrjxv4j52-us-west-1 arn:aws:s3:::cf-templates-1s5tzrjxv4j52-us-west-1 2021-12-28 00:37:38+00 f f f f f f f {"QueueConfigurations": null, "TopicConfigurations": null, "EventBridgeConfiguration": null, "LambdaFunctionConfigurations": null} {"Rules": [{"BucketKeyEnabled": false, "ApplyServerSideEncryptionByDefault": {"SSEAlgorithm": "AES256", "KMSMasterKeyID": null}}]} {"Owner": {"ID": "e46b1ad6057413cb0a6e5acac5f1f9a6f64db6e993c4ebd1d40afc43dc69a76e", "DisplayName": "aws+judell+aaa"}, "Grants": [{"Grantee": {"ID": "e46b1ad6057413cb0a6e5acac5f1f9a6f64db6e993c4ebd1d40afc43dc69a76e", "URI": null, "Type": "CanonicalUser", "DisplayName": "aws+judell+aaa", "EmailAddress": null}, "Permission": "FULL_CONTROL"}]} \N \N \N \N \N \N \N \N cf-templates-1s5tzrjxv4j52-us-west-1 ["arn:aws:s3:::cf-templates-1s5tzrjxv4j52-us-west-1"] us-west-1 aws 605491513981 {"connection_name": "z_605491513981"} | |
aws-cloudtrail-logs-605491513981-45df8af0 arn:aws:s3:::aws-cloudtrail-logs-605491513981-45df8af0 2022-05-04 16:37:09+00 f f f t t t t {"QueueConfigurations": null, "TopicConfigurations": null, "EventBridgeConfiguration": null, "LambdaFunctionConfigurations": null} \N {"Owner": {"ID": "e46b1ad6057413cb0a6e5acac5f1f9a6f64db6e993c4ebd1d40afc43dc69a76e", "DisplayName": "aws+judell+aaa"}, "Grants": [{"Grantee": {"ID": "e46b1ad6057413cb0a6e5acac5f1f9a6f64db6e993c4ebd1d40afc43dc69a76e", "URI": null, "Type": "CanonicalUser", "DisplayName": "aws+judell+aaa", "EmailAddress": null}, "Permission": "FULL_CONTROL"}]} \N \N \N {"Version": "2012-10-17", "Statement": [{"Sid": "AWSCloudTrailAclCheck20150319", "Action": "s3:GetBucketAcl", "Effect": "Allow", "Resource": "arn:aws:s3:::aws-cloudtrail-logs-605491513981-45df8af0", "Condition": {"StringEquals": {"AWS:SourceArn": "arn:aws:cloudtrail:us-east-1:605491513981:trail/management-events"}}, "Principal": {"Service": "cloudtrail.amazonaws.com"}}, {"Sid": "AWSCloudTrailWrite20150319", "Action": "s3:PutObject", "Effect": "Allow", "Resource": "arn:aws:s3:::aws-cloudtrail-logs-605491513981-45df8af0/AWSLogs/605491513981/*", "Condition": {"StringEquals": {"s3:x-amz-acl": "bucket-owner-full-control", "AWS:SourceArn": "arn:aws:cloudtrail:us-east-1:605491513981:trail/management-events"}}, "Principal": {"Service": "cloudtrail.amazonaws.com"}}]} {"Version": "2012-10-17", "Statement": [{"Sid": "AWSCloudTrailAclCheck20150319", "Action": ["s3:getbucketacl"], "Effect": "Allow", "Resource": ["arn:aws:s3:::aws-cloudtrail-logs-605491513981-45df8af0"], "Condition": {"StringEquals": {"aws:sourcearn": ["arn:aws:cloudtrail:us-east-1:605491513981:trail/management-events"]}}, "Principal": {"Service": ["cloudtrail.amazonaws.com"]}}, {"Sid": "AWSCloudTrailWrite20150319", "Action": ["s3:putobject"], "Effect": "Allow", "Resource": ["arn:aws:s3:::aws-cloudtrail-logs-605491513981-45df8af0/AWSLogs/605491513981/*"], "Condition": {"StringEquals": {"s3:x-amz-acl": ["bucket-owner-full-control"], "aws:sourcearn": ["arn:aws:cloudtrail:us-east-1:605491513981:trail/management-events"]}}, "Principal": {"Service": ["cloudtrail.amazonaws.com"]}}]} \N \N \N aws-cloudtrail-logs-605491513981-45df8af0 ["arn:aws:s3:::aws-cloudtrail-logs-605491513981-45df8af0"] us-east-1 aws 605491513981 {"connection_name": "z_605491513981"} | |
\. | |
-- | |
-- Name: TABLE aws_s3_bucket; Type: ACL; Schema: aws_all; Owner: root | |
-- | |
GRANT SELECT ON TABLE aws_all.aws_s3_bucket TO steampipe_users; | |
-- | |
-- PostgreSQL database dump complete | |
-- | |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment