Dropshare User Guide

Search for answers to your questions by entering keywords below, or look through our knowledge base.

Contact Support | Community | Video Tutorials

How to set up Amazon S3 or S3 API-compatible connections

Terraform

See this official aws-ia repository to learn how to set up Dropshare with S3 and CloudFront with Terraform.

Manual Setup

To create an Amazon S3 connection in Dropshare for Mac, first enter the preferences. Switch to the Connection tab, and create a new or use an existing connetion.

Select the Amazon S3 tab for your connection, and enter all required information:

 

Bucket Name

Enter the name of the bucket you created in the Amazon S3 Console. You can optionally also enter a subfolder in that given bucket, e.g. bucketname/foldername

The bucket needs to be public. Therefore, unselect all options in the "Permissions" settings of your bucket.

Access Key ID

Enter the AWS Access Key ID you obtained

Secret Key

Enter the AWS Access Secret Key you obtained

Region

Select the bucket's region.

Domain Alias

Optional: Enter your bucket's domain alias. This requires a CNAME record to be set. (Learn more)

Storage Class Choose between Standard, Reduced Redundancy or Intelligent Tiering.
Misc
  • Choose whether to use HTTPS connections to Amazon S3
  • Choose whether to use Path-Style URLs
    • s3.amazonaws.com/bucketname/file.jpg instead of bucketname.s3.amazonaws.com/file.jpg
  • Choose whether to omit the ACL header (does not set files to public by default)

 

Press Save to update your information. We recommend to test the connection to make sure Dropshare is able to connect to Amazon S3 and successfully upload files.

Learn how to set up a restricted IAM user for Dropshare

In case you want to create an access restricted IAM user for Dropshare instead of using the general Access / Secret Keys for your AWS account, navigate to the IAM Users page on the AWS console. Create a new user there, and copy & paste the Access / Secret keys to your Dropshare connection.

Once the user is created, create a User Policy with the following JSON:

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Action": "s3:*",
            "Effect": "Allow",
            "Resource": [
             "arn:aws:s3:::BUCKETNAME",
             "arn:aws:s3:::BUCKETNAME/*"
            ]
        }
    ]
}

Replace BUCKETNAME with the name of the bucket you created for Dropshare. You should now be able to use an access restricted IAM user for Dropshare.

S3 API-compatible services

Was this article helpful?
3 out of 13 found this helpful