aws-sdk-transfer 1.71.0 → 1.73.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 021e1b195c51851066036d08c15d86d79f3a9a8155d0c9a163cb582579fed214
4
- data.tar.gz: 4940a8fe92a4015d1bb5b4bdac758a04386da439a80b85cd894f49a15b3d32be
3
+ metadata.gz: 644c1a05b06a92f4f7a401ec38dccfb66526e6578f5d2fc8d69943f920e3a011
4
+ data.tar.gz: d559b3cf83b493aa83e8737a794b558a9182f706b78b72446bc34ab97b970590
5
5
  SHA512:
6
- metadata.gz: 54f0f3c274ce2b3ffdb7ec2beea3a46be91e7eece21a42985301868472bb63da00bc63b4a006f050fe78bda42bd4790ba324b283cba752aa82e573d23292465e
7
- data.tar.gz: 27070f80c0bfbc5a9a95456248110bdec93bcef9ee331bdac7276a0d4ec9e1638d53927a859ac7f23aae6532e1578c603d80e860941f4b9f2adb0cf0849ebe66
6
+ metadata.gz: 8b1035f2cc82ad9afd45305978e0810f1290fbc4a08709b6ad03e0bc417123a8242023284d66eb1d95bce92b3a824b1462c1016cd0364baeff777b93b4270b8f
7
+ data.tar.gz: aa3ecd43afcfd44ffc17700d03ab0452463d285b1bff9ac6c272f73e5451eb7856f6dc15e8096f9f4a633e0513a4b62aca7f0390e4252da311eb2631ab82f23b
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.73.0 (2023-06-30)
5
+ ------------------
6
+
7
+ * Feature - Add outbound Basic authentication support to AS2 connectors
8
+
9
+ 1.72.0 (2023-06-28)
10
+ ------------------
11
+
12
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
13
+
4
14
  1.71.0 (2023-06-21)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.71.0
1
+ 1.73.0
@@ -582,6 +582,12 @@ module Aws::Transfer
582
582
  # the parent directory of the files that you intend to send with
583
583
  # `StartFileTransfer`.
584
584
  #
585
+ # If you are using Basic authentication for your AS2 connector, the
586
+ # access role requires the `secretsmanager:GetSecretValue` permission
587
+ # for the secret. If the secret is encrypted using a customer-managed
588
+ # key instead of the Amazon Web Services managed key in Secrets Manager,
589
+ # then the role also needs the `kms:Decrypt` permission for that key.
590
+ #
585
591
  # @option params [String] :status
586
592
  # The status of the agreement. The agreement can be either `ACTIVE` or
587
593
  # `INACTIVE`.
@@ -653,6 +659,12 @@ module Aws::Transfer
653
659
  # the parent directory of the files that you intend to send with
654
660
  # `StartFileTransfer`.
655
661
  #
662
+ # If you are using Basic authentication for your AS2 connector, the
663
+ # access role requires the `secretsmanager:GetSecretValue` permission
664
+ # for the secret. If the secret is encrypted using a customer-managed
665
+ # key instead of the Amazon Web Services managed key in Secrets Manager,
666
+ # then the role also needs the `kms:Decrypt` permission for that key.
667
+ #
656
668
  # @option params [String] :logging_role
657
669
  # The Amazon Resource Name (ARN) of the Identity and Access Management
658
670
  # (IAM) role that allows a connector to turn on CloudWatch logging for
@@ -680,6 +692,7 @@ module Aws::Transfer
680
692
  # signing_algorithm: "SHA256", # accepts SHA256, SHA384, SHA512, SHA1, NONE
681
693
  # mdn_signing_algorithm: "SHA256", # accepts SHA256, SHA384, SHA512, SHA1, NONE, DEFAULT
682
694
  # mdn_response: "SYNC", # accepts SYNC, NONE
695
+ # basic_auth_secret_id: "As2ConnectorSecretId",
683
696
  # },
684
697
  # access_role: "Role", # required
685
698
  # logging_role: "Role",
@@ -1945,6 +1958,7 @@ module Aws::Transfer
1945
1958
  # resp.connector.as_2_config.signing_algorithm #=> String, one of "SHA256", "SHA384", "SHA512", "SHA1", "NONE"
1946
1959
  # resp.connector.as_2_config.mdn_signing_algorithm #=> String, one of "SHA256", "SHA384", "SHA512", "SHA1", "NONE", "DEFAULT"
1947
1960
  # resp.connector.as_2_config.mdn_response #=> String, one of "SYNC", "NONE"
1961
+ # resp.connector.as_2_config.basic_auth_secret_id #=> String
1948
1962
  # resp.connector.access_role #=> String
1949
1963
  # resp.connector.logging_role #=> String
1950
1964
  # resp.connector.tags #=> Array
@@ -3688,6 +3702,12 @@ module Aws::Transfer
3688
3702
  # the parent directory of the files that you intend to send with
3689
3703
  # `StartFileTransfer`.
3690
3704
  #
3705
+ # If you are using Basic authentication for your AS2 connector, the
3706
+ # access role requires the `secretsmanager:GetSecretValue` permission
3707
+ # for the secret. If the secret is encrypted using a customer-managed
3708
+ # key instead of the Amazon Web Services managed key in Secrets Manager,
3709
+ # then the role also needs the `kms:Decrypt` permission for that key.
3710
+ #
3691
3711
  # @return [Types::UpdateAgreementResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
3692
3712
  #
3693
3713
  # * {Types::UpdateAgreementResponse#agreement_id #agreement_id} => String
@@ -3785,6 +3805,12 @@ module Aws::Transfer
3785
3805
  # the parent directory of the files that you intend to send with
3786
3806
  # `StartFileTransfer`.
3787
3807
  #
3808
+ # If you are using Basic authentication for your AS2 connector, the
3809
+ # access role requires the `secretsmanager:GetSecretValue` permission
3810
+ # for the secret. If the secret is encrypted using a customer-managed
3811
+ # key instead of the Amazon Web Services managed key in Secrets Manager,
3812
+ # then the role also needs the `kms:Decrypt` permission for that key.
3813
+ #
3788
3814
  # @option params [String] :logging_role
3789
3815
  # The Amazon Resource Name (ARN) of the Identity and Access Management
3790
3816
  # (IAM) role that allows a connector to turn on CloudWatch logging for
@@ -3809,6 +3835,7 @@ module Aws::Transfer
3809
3835
  # signing_algorithm: "SHA256", # accepts SHA256, SHA384, SHA512, SHA1, NONE
3810
3836
  # mdn_signing_algorithm: "SHA256", # accepts SHA256, SHA384, SHA512, SHA1, NONE, DEFAULT
3811
3837
  # mdn_response: "SYNC", # accepts SYNC, NONE
3838
+ # basic_auth_secret_id: "As2ConnectorSecretId",
3812
3839
  # },
3813
3840
  # access_role: "Role",
3814
3841
  # logging_role: "Role",
@@ -4379,7 +4406,7 @@ module Aws::Transfer
4379
4406
  params: params,
4380
4407
  config: config)
4381
4408
  context[:gem_name] = 'aws-sdk-transfer'
4382
- context[:gem_version] = '1.71.0'
4409
+ context[:gem_version] = '1.73.0'
4383
4410
  Seahorse::Client::Request.new(handlers, context)
4384
4411
  end
4385
4412
 
@@ -20,6 +20,7 @@ module Aws::Transfer
20
20
  AgreementStatusType = Shapes::StringShape.new(name: 'AgreementStatusType')
21
21
  Arn = Shapes::StringShape.new(name: 'Arn')
22
22
  As2ConnectorConfig = Shapes::StructureShape.new(name: 'As2ConnectorConfig')
23
+ As2ConnectorSecretId = Shapes::StringShape.new(name: 'As2ConnectorSecretId')
23
24
  As2Id = Shapes::StringShape.new(name: 'As2Id')
24
25
  As2Transport = Shapes::StringShape.new(name: 'As2Transport')
25
26
  As2Transports = Shapes::ListShape.new(name: 'As2Transports')
@@ -326,6 +327,7 @@ module Aws::Transfer
326
327
  As2ConnectorConfig.add_member(:signing_algorithm, Shapes::ShapeRef.new(shape: SigningAlg, location_name: "SigningAlgorithm"))
327
328
  As2ConnectorConfig.add_member(:mdn_signing_algorithm, Shapes::ShapeRef.new(shape: MdnSigningAlg, location_name: "MdnSigningAlgorithm"))
328
329
  As2ConnectorConfig.add_member(:mdn_response, Shapes::ShapeRef.new(shape: MdnResponse, location_name: "MdnResponse"))
330
+ As2ConnectorConfig.add_member(:basic_auth_secret_id, Shapes::ShapeRef.new(shape: As2ConnectorSecretId, location_name: "BasicAuthSecretId"))
329
331
  As2ConnectorConfig.struct_class = Types::As2ConnectorConfig
330
332
 
331
333
  As2Transports.member = Shapes::ShapeRef.new(shape: As2Transport)
@@ -79,6 +79,42 @@ module Aws::Transfer
79
79
  # * `NONE`: Specifies that no MDN response is required.
80
80
  # @return [String]
81
81
  #
82
+ # @!attribute [rw] basic_auth_secret_id
83
+ # Provides Basic authentication support to the AS2 Connectors API. To
84
+ # use Basic authentication, you must provide the name or Amazon
85
+ # Resource Name (ARN) of a secret in Secrets Manager.
86
+ #
87
+ # The default value for this parameter is `null`, which indicates that
88
+ # Basic authentication is not enabled for the connector.
89
+ #
90
+ # If the connector should use Basic authentication, the secret needs
91
+ # to be in the following format:
92
+ #
93
+ # `\{ "Username": "user-name", "Password": "user-password" \}`
94
+ #
95
+ # Replace `user-name` and `user-password` with the credentials for the
96
+ # actual user that is being authenticated.
97
+ #
98
+ # Note the following:
99
+ #
100
+ # * You are storing these credentials in Secrets Manager, *not passing
101
+ # them directly* into this API.
102
+ #
103
+ # * If you are using the API, SDKs, or CloudFormation to configure
104
+ # your connector, then you must create the secret before you can
105
+ # enable Basic authentication. However, if you are using the Amazon
106
+ # Web Services management console, you can have the system create
107
+ # the secret for you.
108
+ #
109
+ # If you have previously enabled Basic authentication for a connector,
110
+ # you can disable it by using the `UpdateConnector` API call. For
111
+ # example, if you are using the CLI, you can run the following command
112
+ # to remove Basic authentication:
113
+ #
114
+ # `update-connector --connector-id my-connector-id --as2-config
115
+ # 'BasicAuthSecretId=""'`
116
+ # @return [String]
117
+ #
82
118
  # @see http://docs.aws.amazon.com/goto/WebAPI/transfer-2018-11-05/As2ConnectorConfig AWS API Documentation
83
119
  #
84
120
  class As2ConnectorConfig < Struct.new(
@@ -89,7 +125,8 @@ module Aws::Transfer
89
125
  :encryption_algorithm,
90
126
  :signing_algorithm,
91
127
  :mdn_signing_algorithm,
92
- :mdn_response)
128
+ :mdn_response,
129
+ :basic_auth_secret_id)
93
130
  SENSITIVE = []
94
131
  include Aws::Structure
95
132
  end
@@ -360,6 +397,13 @@ module Aws::Transfer
360
397
  # `StartFileTransfer` request. Additionally, you need to provide read
361
398
  # and write access to the parent directory of the files that you
362
399
  # intend to send with `StartFileTransfer`.
400
+ #
401
+ # If you are using Basic authentication for your AS2 connector, the
402
+ # access role requires the `secretsmanager:GetSecretValue` permission
403
+ # for the secret. If the secret is encrypted using a customer-managed
404
+ # key instead of the Amazon Web Services managed key in Secrets
405
+ # Manager, then the role also needs the `kms:Decrypt` permission for
406
+ # that key.
363
407
  # @return [String]
364
408
  #
365
409
  # @!attribute [rw] status
@@ -421,6 +465,13 @@ module Aws::Transfer
421
465
  # `StartFileTransfer` request. Additionally, you need to provide read
422
466
  # and write access to the parent directory of the files that you
423
467
  # intend to send with `StartFileTransfer`.
468
+ #
469
+ # If you are using Basic authentication for your AS2 connector, the
470
+ # access role requires the `secretsmanager:GetSecretValue` permission
471
+ # for the secret. If the secret is encrypted using a customer-managed
472
+ # key instead of the Amazon Web Services managed key in Secrets
473
+ # Manager, then the role also needs the `kms:Decrypt` permission for
474
+ # that key.
424
475
  # @return [String]
425
476
  #
426
477
  # @!attribute [rw] logging_role
@@ -1870,6 +1921,13 @@ module Aws::Transfer
1870
1921
  # `StartFileTransfer` request. Additionally, you need to provide read
1871
1922
  # and write access to the parent directory of the files that you
1872
1923
  # intend to send with `StartFileTransfer`.
1924
+ #
1925
+ # If you are using Basic authentication for your AS2 connector, the
1926
+ # access role requires the `secretsmanager:GetSecretValue` permission
1927
+ # for the secret. If the secret is encrypted using a customer-managed
1928
+ # key instead of the Amazon Web Services managed key in Secrets
1929
+ # Manager, then the role also needs the `kms:Decrypt` permission for
1930
+ # that key.
1873
1931
  # @return [String]
1874
1932
  #
1875
1933
  # @!attribute [rw] tags
@@ -2012,6 +2070,13 @@ module Aws::Transfer
2012
2070
  # `StartFileTransfer` request. Additionally, you need to provide read
2013
2071
  # and write access to the parent directory of the files that you
2014
2072
  # intend to send with `StartFileTransfer`.
2073
+ #
2074
+ # If you are using Basic authentication for your AS2 connector, the
2075
+ # access role requires the `secretsmanager:GetSecretValue` permission
2076
+ # for the secret. If the secret is encrypted using a customer-managed
2077
+ # key instead of the Amazon Web Services managed key in Secrets
2078
+ # Manager, then the role also needs the `kms:Decrypt` permission for
2079
+ # that key.
2015
2080
  # @return [String]
2016
2081
  #
2017
2082
  # @!attribute [rw] logging_role
@@ -5118,6 +5183,13 @@ module Aws::Transfer
5118
5183
  # `StartFileTransfer` request. Additionally, you need to provide read
5119
5184
  # and write access to the parent directory of the files that you
5120
5185
  # intend to send with `StartFileTransfer`.
5186
+ #
5187
+ # If you are using Basic authentication for your AS2 connector, the
5188
+ # access role requires the `secretsmanager:GetSecretValue` permission
5189
+ # for the secret. If the secret is encrypted using a customer-managed
5190
+ # key instead of the Amazon Web Services managed key in Secrets
5191
+ # Manager, then the role also needs the `kms:Decrypt` permission for
5192
+ # that key.
5121
5193
  # @return [String]
5122
5194
  #
5123
5195
  # @see http://docs.aws.amazon.com/goto/WebAPI/transfer-2018-11-05/UpdateAgreementRequest AWS API Documentation
@@ -5214,6 +5286,13 @@ module Aws::Transfer
5214
5286
  # `StartFileTransfer` request. Additionally, you need to provide read
5215
5287
  # and write access to the parent directory of the files that you
5216
5288
  # intend to send with `StartFileTransfer`.
5289
+ #
5290
+ # If you are using Basic authentication for your AS2 connector, the
5291
+ # access role requires the `secretsmanager:GetSecretValue` permission
5292
+ # for the secret. If the secret is encrypted using a customer-managed
5293
+ # key instead of the Amazon Web Services managed key in Secrets
5294
+ # Manager, then the role also needs the `kms:Decrypt` permission for
5295
+ # that key.
5217
5296
  # @return [String]
5218
5297
  #
5219
5298
  # @!attribute [rw] logging_role
@@ -53,6 +53,6 @@ require_relative 'aws-sdk-transfer/customizations'
53
53
  # @!group service
54
54
  module Aws::Transfer
55
55
 
56
- GEM_VERSION = '1.71.0'
56
+ GEM_VERSION = '1.73.0'
57
57
 
58
58
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-transfer
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.71.0
4
+ version: 1.73.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-06-21 00:00:00.000000000 Z
11
+ date: 2023-06-30 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -19,7 +19,7 @@ dependencies:
19
19
  version: '3'
20
20
  - - ">="
21
21
  - !ruby/object:Gem::Version
22
- version: 3.174.0
22
+ version: 3.176.0
23
23
  type: :runtime
24
24
  prerelease: false
25
25
  version_requirements: !ruby/object:Gem::Requirement
@@ -29,7 +29,7 @@ dependencies:
29
29
  version: '3'
30
30
  - - ">="
31
31
  - !ruby/object:Gem::Version
32
- version: 3.174.0
32
+ version: 3.176.0
33
33
  - !ruby/object:Gem::Dependency
34
34
  name: aws-sigv4
35
35
  requirement: !ruby/object:Gem::Requirement