aws-sdk-transfer 1.105.0 → 1.107.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: cada85840ed32ce20f5f4774c814bac6d9ca7190670f142d33fa78cc31b1716c
4
- data.tar.gz: 8f6ba01de571827f8fafc05e984ac612bca61e86ba0e2a78f3f6f52baa3bdb79
3
+ metadata.gz: '08f1cb0dd360dccba723592acd89e76c082d67bef8cdec6665054b762ffcb3b2'
4
+ data.tar.gz: 99ad08e00c80e9f501a658d0e405e876caba4ff6098f1d9b9423f35a9807bb3c
5
5
  SHA512:
6
- metadata.gz: dcd755713b5cfab286ac2210e14250b612a9e3e8201b7ed202c0618a4300595737ebe9c0b07f8e18c23ef6f4804076773e7f9cfc726834a0bcaab92ac34aa477
7
- data.tar.gz: d1eb3bd557e48081d9c4b50021decfbcd03ec64fcb1e079f961a7606c4e242e01a4882fe3a211f8cd20555af8dead4901e41e99055b3e80e4e8de096ce5474a0
6
+ metadata.gz: 044037dc05ab2dd2e476472aa01fe4dbf15d75553bb84b0dd0d3118ece6efe6910509aab51877405de3a3f996448295e56d0afbe401d030c832189cb7648c53b
7
+ data.tar.gz: 3d9cbff53948092592824b4e3b391791c831fb4c87118929d69ceb0f92682ca7ceee5c71b9a72d856e0c900dbd0bdb8a6842b27c934b1d94cb7ae5bba060d549
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.107.0 (2024-11-06)
5
+ ------------------
6
+
7
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
8
+
9
+ 1.106.0 (2024-10-18)
10
+ ------------------
11
+
12
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
13
+
4
14
  1.105.0 (2024-10-14)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.105.0
1
+ 1.107.0
@@ -502,8 +502,8 @@ module Aws::Transfer
502
502
  #
503
503
  # The following is an `Entry` and `Target` pair example.
504
504
  #
505
- # `[ \{ "Entry": "/directory1", "Target":
506
- # "/bucket_name/home/mydirectory" \} ]`
505
+ # `[ { "Entry": "/directory1", "Target": "/bucket_name/home/mydirectory"
506
+ # } ]`
507
507
  #
508
508
  # In most cases, you can use this value instead of the session policy to
509
509
  # lock down your user to the designated home directory ("`chroot`").
@@ -512,15 +512,15 @@ module Aws::Transfer
512
512
  #
513
513
  # The following is an `Entry` and `Target` pair example for `chroot`.
514
514
  #
515
- # `[ \{ "Entry": "/", "Target": "/bucket_name/home/mydirectory" \} ]`
515
+ # `[ { "Entry": "/", "Target": "/bucket_name/home/mydirectory" } ]`
516
516
  #
517
517
  # @option params [String] :policy
518
518
  # A session policy for your user so that you can use the same Identity
519
519
  # and Access Management (IAM) role across multiple users. This policy
520
520
  # scopes down a user's access to portions of their Amazon S3 bucket.
521
521
  # Variables that you can use inside this policy include
522
- # `$\{Transfer:UserName\}`, `$\{Transfer:HomeDirectory\}`, and
523
- # `$\{Transfer:HomeBucket\}`.
522
+ # `${Transfer:UserName}`, `${Transfer:HomeDirectory}`, and
523
+ # `${Transfer:HomeBucket}`.
524
524
  #
525
525
  # <note markdown="1"> This policy applies only when the domain of `ServerId` is Amazon S3.
526
526
  # Amazon EFS does not use session policies.
@@ -571,7 +571,7 @@ module Aws::Transfer
571
571
  # view the SID values by running the following command using Windows
572
572
  # PowerShell.
573
573
  #
574
- # `Get-ADGroup -Filter \{samAccountName -like "YourGroupName*"\}
574
+ # `Get-ADGroup -Filter {samAccountName -like "YourGroupName*"}
575
575
  # -Properties * | Select SamAccountName,ObjectSid`
576
576
  #
577
577
  # In that command, replace *YourGroupName* with the name of your Active
@@ -1324,8 +1324,8 @@ module Aws::Transfer
1324
1324
  #
1325
1325
  # The following is an `Entry` and `Target` pair example.
1326
1326
  #
1327
- # `[ \{ "Entry": "/directory1", "Target":
1328
- # "/bucket_name/home/mydirectory" \} ]`
1327
+ # `[ { "Entry": "/directory1", "Target": "/bucket_name/home/mydirectory"
1328
+ # } ]`
1329
1329
  #
1330
1330
  # In most cases, you can use this value instead of the session policy to
1331
1331
  # lock your user down to the designated home directory ("`chroot`").
@@ -1334,15 +1334,15 @@ module Aws::Transfer
1334
1334
  #
1335
1335
  # The following is an `Entry` and `Target` pair example for `chroot`.
1336
1336
  #
1337
- # `[ \{ "Entry": "/", "Target": "/bucket_name/home/mydirectory" \} ]`
1337
+ # `[ { "Entry": "/", "Target": "/bucket_name/home/mydirectory" } ]`
1338
1338
  #
1339
1339
  # @option params [String] :policy
1340
1340
  # A session policy for your user so that you can use the same Identity
1341
1341
  # and Access Management (IAM) role across multiple users. This policy
1342
1342
  # scopes down a user's access to portions of their Amazon S3 bucket.
1343
1343
  # Variables that you can use inside this policy include
1344
- # `$\{Transfer:UserName\}`, `$\{Transfer:HomeDirectory\}`, and
1345
- # `$\{Transfer:HomeBucket\}`.
1344
+ # `${Transfer:UserName}`, `${Transfer:HomeDirectory}`, and
1345
+ # `${Transfer:HomeBucket}`.
1346
1346
  #
1347
1347
  # <note markdown="1"> This policy applies only when the domain of `ServerId` is Amazon S3.
1348
1348
  # Amazon EFS does not use session policies.
@@ -1669,7 +1669,7 @@ module Aws::Transfer
1669
1669
  # view the SID values by running the following command using Windows
1670
1670
  # PowerShell.
1671
1671
  #
1672
- # `Get-ADGroup -Filter \{samAccountName -like "YourGroupName*"\}
1672
+ # `Get-ADGroup -Filter {samAccountName -like "YourGroupName*"}
1673
1673
  # -Properties * | Select SamAccountName,ObjectSid`
1674
1674
  #
1675
1675
  # In that command, replace *YourGroupName* with the name of your Active
@@ -1952,7 +1952,7 @@ module Aws::Transfer
1952
1952
  # view the SID values by running the following command using Windows
1953
1953
  # PowerShell.
1954
1954
  #
1955
- # `Get-ADGroup -Filter \{samAccountName -like "YourGroupName*"\}
1955
+ # `Get-ADGroup -Filter {samAccountName -like "YourGroupName*"}
1956
1956
  # -Properties * | Select SamAccountName,ObjectSid`
1957
1957
  #
1958
1958
  # In that command, replace *YourGroupName* with the name of your Active
@@ -3961,8 +3961,8 @@ module Aws::Transfer
3961
3961
  #
3962
3962
  # The following is an `Entry` and `Target` pair example.
3963
3963
  #
3964
- # `[ \{ "Entry": "/directory1", "Target":
3965
- # "/bucket_name/home/mydirectory" \} ]`
3964
+ # `[ { "Entry": "/directory1", "Target": "/bucket_name/home/mydirectory"
3965
+ # } ]`
3966
3966
  #
3967
3967
  # In most cases, you can use this value instead of the session policy to
3968
3968
  # lock down your user to the designated home directory ("`chroot`").
@@ -3971,15 +3971,15 @@ module Aws::Transfer
3971
3971
  #
3972
3972
  # The following is an `Entry` and `Target` pair example for `chroot`.
3973
3973
  #
3974
- # `[ \{ "Entry": "/", "Target": "/bucket_name/home/mydirectory" \} ]`
3974
+ # `[ { "Entry": "/", "Target": "/bucket_name/home/mydirectory" } ]`
3975
3975
  #
3976
3976
  # @option params [String] :policy
3977
3977
  # A session policy for your user so that you can use the same Identity
3978
3978
  # and Access Management (IAM) role across multiple users. This policy
3979
3979
  # scopes down a user's access to portions of their Amazon S3 bucket.
3980
3980
  # Variables that you can use inside this policy include
3981
- # `$\{Transfer:UserName\}`, `$\{Transfer:HomeDirectory\}`, and
3982
- # `$\{Transfer:HomeBucket\}`.
3981
+ # `${Transfer:UserName}`, `${Transfer:HomeDirectory}`, and
3982
+ # `${Transfer:HomeBucket}`.
3983
3983
  #
3984
3984
  # <note markdown="1"> This policy applies only when the domain of `ServerId` is Amazon S3.
3985
3985
  # Amazon EFS does not use session policies.
@@ -4030,7 +4030,7 @@ module Aws::Transfer
4030
4030
  # view the SID values by running the following command using Windows
4031
4031
  # PowerShell.
4032
4032
  #
4033
- # `Get-ADGroup -Filter \{samAccountName -like "YourGroupName*"\}
4033
+ # `Get-ADGroup -Filter {samAccountName -like "YourGroupName*"}
4034
4034
  # -Properties * | Select SamAccountName,ObjectSid`
4035
4035
  #
4036
4036
  # In that command, replace *YourGroupName* with the name of your Active
@@ -4628,7 +4628,7 @@ module Aws::Transfer
4628
4628
  # empty `OnUpload` object, as in the following example.
4629
4629
  #
4630
4630
  # `aws transfer update-server --server-id s-01234567890abcdef
4631
- # --workflow-details '\{"OnUpload":[]\}'`
4631
+ # --workflow-details '{"OnUpload":[]}'`
4632
4632
  #
4633
4633
  # @option params [Array<String>] :structured_log_destinations
4634
4634
  # Specifies the log groups to which your server logs are sent.
@@ -4747,7 +4747,7 @@ module Aws::Transfer
4747
4747
  #
4748
4748
  # ` aws transfer update-user --server-id <server-id> --user-name
4749
4749
  # admin-user --home-directory-type LOGICAL --home-directory-mappings
4750
- # "[\{"Entry":"/", "Target":"/test/admin-user"\}]"`
4750
+ # "[{"Entry":"/", "Target":"/test/admin-user"}]"`
4751
4751
  #
4752
4752
  # @option params [String] :home_directory
4753
4753
  # The landing directory (folder) for a user when they log in to the
@@ -4789,8 +4789,8 @@ module Aws::Transfer
4789
4789
  #
4790
4790
  # The following is an `Entry` and `Target` pair example.
4791
4791
  #
4792
- # `[ \{ "Entry": "/directory1", "Target":
4793
- # "/bucket_name/home/mydirectory" \} ]`
4792
+ # `[ { "Entry": "/directory1", "Target": "/bucket_name/home/mydirectory"
4793
+ # } ]`
4794
4794
  #
4795
4795
  # In most cases, you can use this value instead of the session policy to
4796
4796
  # lock down your user to the designated home directory ("`chroot`").
@@ -4799,15 +4799,15 @@ module Aws::Transfer
4799
4799
  #
4800
4800
  # The following is an `Entry` and `Target` pair example for `chroot`.
4801
4801
  #
4802
- # `[ \{ "Entry": "/", "Target": "/bucket_name/home/mydirectory" \} ]`
4802
+ # `[ { "Entry": "/", "Target": "/bucket_name/home/mydirectory" } ]`
4803
4803
  #
4804
4804
  # @option params [String] :policy
4805
4805
  # A session policy for your user so that you can use the same Identity
4806
4806
  # and Access Management (IAM) role across multiple users. This policy
4807
4807
  # scopes down a user's access to portions of their Amazon S3 bucket.
4808
4808
  # Variables that you can use inside this policy include
4809
- # `$\{Transfer:UserName\}`, `$\{Transfer:HomeDirectory\}`, and
4810
- # `$\{Transfer:HomeBucket\}`.
4809
+ # `${Transfer:UserName}`, `${Transfer:HomeDirectory}`, and
4810
+ # `${Transfer:HomeBucket}`.
4811
4811
  #
4812
4812
  # <note markdown="1"> This policy applies only when the domain of `ServerId` is Amazon S3.
4813
4813
  # Amazon EFS does not use session policies.
@@ -4919,7 +4919,7 @@ module Aws::Transfer
4919
4919
  tracer: tracer
4920
4920
  )
4921
4921
  context[:gem_name] = 'aws-sdk-transfer'
4922
- context[:gem_version] = '1.105.0'
4922
+ context[:gem_version] = '1.107.0'
4923
4923
  Seahorse::Client::Request.new(handlers, context)
4924
4924
  end
4925
4925
 
@@ -52,15 +52,18 @@ module Aws::Transfer
52
52
  self[:region] = options[:region]
53
53
  self[:use_dual_stack] = options[:use_dual_stack]
54
54
  self[:use_dual_stack] = false if self[:use_dual_stack].nil?
55
- if self[:use_dual_stack].nil?
56
- raise ArgumentError, "Missing required EndpointParameter: :use_dual_stack"
57
- end
58
55
  self[:use_fips] = options[:use_fips]
59
56
  self[:use_fips] = false if self[:use_fips].nil?
60
- if self[:use_fips].nil?
61
- raise ArgumentError, "Missing required EndpointParameter: :use_fips"
62
- end
63
57
  self[:endpoint] = options[:endpoint]
64
58
  end
59
+
60
+ def self.create(config, options={})
61
+ new({
62
+ region: config.region,
63
+ use_dual_stack: config.use_dualstack_endpoint,
64
+ use_fips: config.use_fips_endpoint,
65
+ endpoint: (config.endpoint.to_s unless config.regional_endpoint),
66
+ }.merge(options))
67
+ end
65
68
  end
66
69
  end