cdk-docker-image-deployment 0.0.158 → 0.0.159

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -517,7 +517,7 @@ declare namespace Transfer {
517
517
  */
518
518
  Compression?: CompressionEnum;
519
519
  /**
520
- * The algorithm that is used to encrypt the file.
520
+ * The algorithm that is used to encrypt the file. You can only specify NONE if the URL for your connector uses HTTPS. This ensures that no traffic is sent in clear text.
521
521
  */
522
522
  EncryptionAlgorithm?: EncryptionAlg;
523
523
  /**
@@ -525,7 +525,7 @@ declare namespace Transfer {
525
525
  */
526
526
  SigningAlgorithm?: SigningAlg;
527
527
  /**
528
- * The signing algorithm for the MDN response. If set to DEFAULT (or not set at all), the value for SigningAlogorithm is used.
528
+ * The signing algorithm for the MDN response. If set to DEFAULT (or not set at all), the value for SigningAlgorithm is used.
529
529
  */
530
530
  MdnSigningAlgorithm?: MdnSigningAlg;
531
531
  /**
@@ -555,15 +555,15 @@ declare namespace Transfer {
555
555
  */
556
556
  Name?: WorkflowStepName;
557
557
  /**
558
- * Specifies the location for the file being copied. Only applicable for Copy type workflow steps. Use ${Transfer:username} in this field to parametrize the destination prefix by username.
558
+ * Specifies the location for the file being copied. Use ${Transfer:username} or ${Transfer:UploadDate} in this field to parametrize the destination prefix by username or uploaded date. Set the value of DestinationFileLocation to ${Transfer:username} to copy uploaded files to an Amazon S3 bucket that is prefixed with the name of the Transfer Family user that uploaded the file. Set the value of DestinationFileLocation to ${Transfer:UploadDate} to copy uploaded files to an Amazon S3 bucket that is prefixed with the date of the upload. The system resolves UploadDate to a date format of YYYY-MM-DD, based on the date the file is uploaded.
559
559
  */
560
560
  DestinationFileLocation?: InputFileLocation;
561
561
  /**
562
- * A flag that indicates whether or not to overwrite an existing file of the same name. The default is FALSE.
562
+ * A flag that indicates whether to overwrite an existing file of the same name. The default is FALSE.
563
563
  */
564
564
  OverwriteExisting?: OverwriteExisting;
565
565
  /**
566
- * Specifies which file to use as input to the workflow step: either the output from the previous step, or the originally uploaded file for the workflow. Enter ${previous.file} to use the previous file as the input. In this case, this workflow step uses the output file from the previous workflow step as input. This is the default value. Enter ${original.file} to use the originally-uploaded file location as input for this step.
566
+ * Specifies which file to use as input to the workflow step: either the output from the previous step, or the originally uploaded file for the workflow. To use the previous file as the input, enter ${previous.file}. In this case, this workflow step uses the output file from the previous workflow step as input. This is the default value. To use the originally uploaded file location as input for this step, enter ${original.file}.
567
567
  */
568
568
  SourceFileLocation?: SourceFileLocation;
569
569
  }
@@ -626,7 +626,7 @@ declare namespace Transfer {
626
626
  */
627
627
  PartnerProfileId: ProfileId;
628
628
  /**
629
- * The landing directory (folder) for files transferred by using the AS2 protocol. A BaseDirectory example is DOC-EXAMPLE-BUCKET/home/mydirectory.
629
+ * The landing directory (folder) for files transferred by using the AS2 protocol. A BaseDirectory example is /DOC-EXAMPLE-BUCKET/home/mydirectory.
630
630
  */
631
631
  BaseDirectory: HomeDirectory;
632
632
  /**
@@ -718,7 +718,7 @@ declare namespace Transfer {
718
718
  */
719
719
  EndpointType?: EndpointType;
720
720
  /**
721
- * The RSA, ECDSA, or ED25519 private key to use for your SFTP-enabled server. You can add multiple host keys, in case you want to rotate keys, or have a set of active keys that use different algorithms. Use the following command to generate an RSA 2048 bit key with no passphrase: ssh-keygen -t rsa -b 2048 -N "" -m PEM -f my-new-server-key. Use a minimum value of 2048 for the -b option. You can create a stronger key by using 3072 or 4096. Use the following command to generate an ECDSA 256 bit key with no passphrase: ssh-keygen -t ecdsa -b 256 -N "" -m PEM -f my-new-server-key. Valid values for the -b option for ECDSA are 256, 384, and 521. Use the following command to generate an ED25519 key with no passphrase: ssh-keygen -t ed25519 -N "" -f my-new-server-key. For all of these commands, you can replace my-new-server-key with a string of your choice. If you aren't planning to migrate existing users from an existing SFTP-enabled server to a new server, don't update the host key. Accidentally changing a server's host key can be disruptive. For more information, see Update host keys for your SFTP-enabled server in the Transfer Family User Guide.
721
+ * The RSA, ECDSA, or ED25519 private key to use for your SFTP-enabled server. You can add multiple host keys, in case you want to rotate keys, or have a set of active keys that use different algorithms. Use the following command to generate an RSA 2048 bit key with no passphrase: ssh-keygen -t rsa -b 2048 -N "" -m PEM -f my-new-server-key. Use a minimum value of 2048 for the -b option. You can create a stronger key by using 3072 or 4096. Use the following command to generate an ECDSA 256 bit key with no passphrase: ssh-keygen -t ecdsa -b 256 -N "" -m PEM -f my-new-server-key. Valid values for the -b option for ECDSA are 256, 384, and 521. Use the following command to generate an ED25519 key with no passphrase: ssh-keygen -t ed25519 -N "" -f my-new-server-key. For all of these commands, you can replace my-new-server-key with a string of your choice. If you aren't planning to migrate existing users from an existing SFTP-enabled server to a new server, don't update the host key. Accidentally changing a server's host key can be disruptive. For more information, see Manage host keys for your SFTP-enabled server in the Transfer Family User Guide.
722
722
  */
723
723
  HostKey?: HostKey;
724
724
  /**
@@ -742,7 +742,7 @@ declare namespace Transfer {
742
742
  */
743
743
  PreAuthenticationLoginBanner?: PreAuthenticationLoginBanner;
744
744
  /**
745
- * Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are: SFTP (Secure Shell (SSH) File Transfer Protocol): File transfer over SSH FTPS (File Transfer Protocol Secure): File transfer with TLS encryption FTP (File Transfer Protocol): Unencrypted file transfer AS2 (Applicability Statement 2): used for transporting structured business-to-business data If you select FTPS, you must choose a certificate stored in Certificate Manager (ACM) which is used to identify your server when clients connect to it over FTPS. If Protocol includes either FTP or FTPS, then the EndpointType must be VPC and the IdentityProviderType must be AWS_DIRECTORY_SERVICE or API_GATEWAY. If Protocol includes FTP, then AddressAllocationIds cannot be associated. If Protocol is set only to SFTP, the EndpointType can be set to PUBLIC and the IdentityProviderType can be set to SERVICE_MANAGED. If Protocol includes AS2, then the EndpointType must be VPC, and domain must be Amazon S3.
745
+ * Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are: SFTP (Secure Shell (SSH) File Transfer Protocol): File transfer over SSH FTPS (File Transfer Protocol Secure): File transfer with TLS encryption FTP (File Transfer Protocol): Unencrypted file transfer AS2 (Applicability Statement 2): used for transporting structured business-to-business data If you select FTPS, you must choose a certificate stored in Certificate Manager (ACM) which is used to identify your server when clients connect to it over FTPS. If Protocol includes either FTP or FTPS, then the EndpointType must be VPC and the IdentityProviderType must be either AWS_DIRECTORY_SERVICE, AWS_LAMBDA, or API_GATEWAY. If Protocol includes FTP, then AddressAllocationIds cannot be associated. If Protocol is set only to SFTP, the EndpointType can be set to PUBLIC and the IdentityProviderType can be set any of the supported identity types: SERVICE_MANAGED, AWS_DIRECTORY_SERVICE, AWS_LAMBDA, or API_GATEWAY. If Protocol includes AS2, then the EndpointType must be VPC, and domain must be Amazon S3.
746
746
  */
747
747
  Protocols?: Protocols;
748
748
  /**
@@ -758,7 +758,7 @@ declare namespace Transfer {
758
758
  */
759
759
  Tags?: Tags;
760
760
  /**
761
- * Specifies the workflow ID for the workflow to assign and the execution role that's used for executing the workflow. In additon to a workflow to execute when a file is uploaded completely, WorkflowDeatails can also contain a workflow ID (and execution role) for a workflow to execute on partial upload. A partial upload occurs when a file is open when the session disconnects.
761
+ * Specifies the workflow ID for the workflow to assign and the execution role that's used for executing the workflow. In addition to a workflow to execute when a file is uploaded completely, WorkflowDetails can also contain a workflow ID (and execution role) for a workflow to execute on partial upload. A partial upload occurs when a file is open when the session disconnects.
762
762
  */
763
763
  WorkflowDetails?: WorkflowDetails;
764
764
  }
@@ -798,7 +798,7 @@ declare namespace Transfer {
798
798
  */
799
799
  ServerId: ServerId;
800
800
  /**
801
- * The public portion of the Secure Shell (SSH) key used to authenticate the user to the server. Transfer Family accepts RSA, ECDSA, and ED25519 keys.
801
+ * The public portion of the Secure Shell (SSH) key used to authenticate the user to the server. The three standard SSH public key format elements are <key type>, <body base64>, and an optional <comment>, with spaces between each element. Transfer Family accepts RSA, ECDSA, and ED25519 keys. For RSA keys, the key type is ssh-rsa. For ED25519 keys, the key type is ssh-ed25519. For ECDSA keys, the key type is either ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, or ecdsa-sha2-nistp521, depending on the size of the key you generated.
802
802
  */
803
803
  SshPublicKeyBody?: SshPublicKeyBody;
804
804
  /**
@@ -826,7 +826,7 @@ declare namespace Transfer {
826
826
  */
827
827
  Description?: WorkflowDescription;
828
828
  /**
829
- * Specifies the details for the steps that are in the specified workflow. The TYPE specifies which of the following actions is being taken for this step. COPY: Copy the file to another location. CUSTOM: Perform a custom step with an Lambda function target. DELETE: Delete the file. TAG: Add a tag to the file. Currently, copying and tagging are supported only on S3. For file location, you specify either the S3 bucket and key, or the EFS file system ID and path.
829
+ * Specifies the details for the steps that are in the specified workflow. The TYPE specifies which of the following actions is being taken for this step. COPY - Copy the file to another location. CUSTOM - Perform a custom step with an Lambda function target. DECRYPT - Decrypt a file that was encrypted before it was uploaded. DELETE - Delete the file. TAG - Add a tag to the file. Currently, copying and tagging are supported only on S3. For file location, you specify either the Amazon S3 bucket and key, or the Amazon EFS file system ID and path.
830
830
  */
831
831
  Steps: WorkflowSteps;
832
832
  /**
@@ -858,7 +858,7 @@ declare namespace Transfer {
858
858
  */
859
859
  TimeoutSeconds?: CustomStepTimeoutSeconds;
860
860
  /**
861
- * Specifies which file to use as input to the workflow step: either the output from the previous step, or the originally uploaded file for the workflow. Enter ${previous.file} to use the previous file as the input. In this case, this workflow step uses the output file from the previous workflow step as input. This is the default value. Enter ${original.file} to use the originally-uploaded file location as input for this step.
861
+ * Specifies which file to use as input to the workflow step: either the output from the previous step, or the originally uploaded file for the workflow. To use the previous file as the input, enter ${previous.file}. In this case, this workflow step uses the output file from the previous workflow step as input. This is the default value. To use the originally uploaded file location as input for this step, enter ${original.file}.
862
862
  */
863
863
  SourceFileLocation?: SourceFileLocation;
864
864
  }
@@ -867,9 +867,21 @@ declare namespace Transfer {
867
867
  export type CustomStepTimeoutSeconds = number;
868
868
  export type DateImported = Date;
869
869
  export interface DecryptStepDetails {
870
+ /**
871
+ * The name of the step, used as an identifier.
872
+ */
870
873
  Name?: WorkflowStepName;
874
+ /**
875
+ * The type of encryption used. Currently, this value must be PGP.
876
+ */
871
877
  Type: EncryptionType;
878
+ /**
879
+ * Specifies which file to use as input to the workflow step: either the output from the previous step, or the originally uploaded file for the workflow. To use the previous file as the input, enter ${previous.file}. In this case, this workflow step uses the output file from the previous workflow step as input. This is the default value. To use the originally uploaded file location as input for this step, enter ${original.file}.
880
+ */
872
881
  SourceFileLocation?: SourceFileLocation;
882
+ /**
883
+ * A flag that indicates whether to overwrite an existing file of the same name. The default is FALSE.
884
+ */
873
885
  OverwriteExisting?: OverwriteExisting;
874
886
  DestinationFileLocation: InputFileLocation;
875
887
  }
@@ -947,7 +959,7 @@ declare namespace Transfer {
947
959
  */
948
960
  Name?: WorkflowStepName;
949
961
  /**
950
- * Specifies which file to use as input to the workflow step: either the output from the previous step, or the originally uploaded file for the workflow. Enter ${previous.file} to use the previous file as the input. In this case, this workflow step uses the output file from the previous workflow step as input. This is the default value. Enter ${original.file} to use the originally-uploaded file location as input for this step.
962
+ * Specifies which file to use as input to the workflow step: either the output from the previous step, or the originally uploaded file for the workflow. To use the previous file as the input, enter ${previous.file}. In this case, this workflow step uses the output file from the previous workflow step as input. This is the default value. To use the originally uploaded file location as input for this step, enter ${original.file}.
951
963
  */
952
964
  SourceFileLocation?: SourceFileLocation;
953
965
  }
@@ -1451,7 +1463,7 @@ declare namespace Transfer {
1451
1463
  */
1452
1464
  PreAuthenticationLoginBanner?: PreAuthenticationLoginBanner;
1453
1465
  /**
1454
- * Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are: SFTP (Secure Shell (SSH) File Transfer Protocol): File transfer over SSH FTPS (File Transfer Protocol Secure): File transfer with TLS encryption FTP (File Transfer Protocol): Unencrypted file transfer AS2 (Applicability Statement 2): used for transporting structured business-to-business data If you select FTPS, you must choose a certificate stored in Certificate Manager (ACM) which is used to identify your server when clients connect to it over FTPS. If Protocol includes either FTP or FTPS, then the EndpointType must be VPC and the IdentityProviderType must be AWS_DIRECTORY_SERVICE or API_GATEWAY. If Protocol includes FTP, then AddressAllocationIds cannot be associated. If Protocol is set only to SFTP, the EndpointType can be set to PUBLIC and the IdentityProviderType can be set to SERVICE_MANAGED. If Protocol includes AS2, then the EndpointType must be VPC, and domain must be Amazon S3.
1466
+ * Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are: SFTP (Secure Shell (SSH) File Transfer Protocol): File transfer over SSH FTPS (File Transfer Protocol Secure): File transfer with TLS encryption FTP (File Transfer Protocol): Unencrypted file transfer AS2 (Applicability Statement 2): used for transporting structured business-to-business data If you select FTPS, you must choose a certificate stored in Certificate Manager (ACM) which is used to identify your server when clients connect to it over FTPS. If Protocol includes either FTP or FTPS, then the EndpointType must be VPC and the IdentityProviderType must be either AWS_DIRECTORY_SERVICE, AWS_LAMBDA, or API_GATEWAY. If Protocol includes FTP, then AddressAllocationIds cannot be associated. If Protocol is set only to SFTP, the EndpointType can be set to PUBLIC and the IdentityProviderType can be set any of the supported identity types: SERVICE_MANAGED, AWS_DIRECTORY_SERVICE, AWS_LAMBDA, or API_GATEWAY. If Protocol includes AS2, then the EndpointType must be VPC, and domain must be Amazon S3.
1455
1467
  */
1456
1468
  Protocols?: Protocols;
1457
1469
  /**
@@ -1475,7 +1487,7 @@ declare namespace Transfer {
1475
1487
  */
1476
1488
  UserCount?: UserCount;
1477
1489
  /**
1478
- * Specifies the workflow ID for the workflow to assign and the execution role that's used for executing the workflow. In additon to a workflow to execute when a file is uploaded completely, WorkflowDeatails can also contain a workflow ID (and execution role) for a workflow to execute on partial upload. A partial upload occurs when a file is open when the session disconnects.
1490
+ * Specifies the workflow ID for the workflow to assign and the execution role that's used for executing the workflow. In addition to a workflow to execute when a file is uploaded completely, WorkflowDetails can also contain a workflow ID (and execution role) for a workflow to execute on partial upload. A partial upload occurs when a file is open when the session disconnects.
1479
1491
  */
1480
1492
  WorkflowDetails?: WorkflowDetails;
1481
1493
  }
@@ -1613,7 +1625,7 @@ declare namespace Transfer {
1613
1625
  export type ExecutionStatus = "IN_PROGRESS"|"COMPLETED"|"EXCEPTION"|"HANDLING_EXCEPTION"|string;
1614
1626
  export interface ExecutionStepResult {
1615
1627
  /**
1616
- * One of the available step types. COPY: Copy the file to another location. CUSTOM: Perform a custom step with an Lambda function target. DELETE: Delete the file. TAG: Add a tag to the file.
1628
+ * One of the available step types. COPY - Copy the file to another location. CUSTOM - Perform a custom step with an Lambda function target. DECRYPT - Decrypt a file that was encrypted before it was uploaded. DELETE - Delete the file. TAG - Add a tag to the file.
1617
1629
  */
1618
1630
  StepType?: WorkflowStepType;
1619
1631
  /**
@@ -1684,7 +1696,7 @@ declare namespace Transfer {
1684
1696
  */
1685
1697
  Usage: CertificateUsageType;
1686
1698
  /**
1687
- * The file that contains the certificate to import.
1699
+ * For the CLI, provide a file path for a certificate in URI format. For example, --certificate file://encryption-cert.pem. Alternatively, you can provide the raw content. For the SDK, specify the raw content of a certificate file. For example, --certificate "`cat encryption-cert.pem`".
1688
1700
  */
1689
1701
  Certificate: CertificateBodyType;
1690
1702
  /**
@@ -1692,7 +1704,7 @@ declare namespace Transfer {
1692
1704
  */
1693
1705
  CertificateChain?: CertificateChainType;
1694
1706
  /**
1695
- * The file that contains the private key for the certificate that's being imported.
1707
+ * For the CLI, provide a file path for a private key in URI format.For example, --private-key file://encryption-key.pem. Alternatively, you can provide the raw content of the private key file. For the SDK, specify the raw content of a private key file. For example, --private-key "`cat encryption-key.pem`"
1696
1708
  */
1697
1709
  PrivateKey?: PrivateKeyType;
1698
1710
  /**
@@ -1724,7 +1736,7 @@ declare namespace Transfer {
1724
1736
  */
1725
1737
  ServerId: ServerId;
1726
1738
  /**
1727
- * The public key portion of an SSH key pair. Transfer Family accepts RSA, ECDSA, and ED25519 keys.
1739
+ * The private key portion of an SSH key pair. Transfer Family accepts RSA, ECDSA, and ED25519 keys.
1728
1740
  */
1729
1741
  HostKeyBody: HostKey;
1730
1742
  /**
@@ -1776,11 +1788,11 @@ declare namespace Transfer {
1776
1788
  }
1777
1789
  export interface InputFileLocation {
1778
1790
  /**
1779
- * Specifies the details for the S3 file being copied.
1791
+ * Specifies the details for the Amazon S3 file that's being copied or decrypted.
1780
1792
  */
1781
1793
  S3FileLocation?: S3InputFileLocation;
1782
1794
  /**
1783
- * Reserved for future use.
1795
+ * Specifies the details for the Amazon Elastic File System (Amazon EFS) file that's being decrypted.
1784
1796
  */
1785
1797
  EfsFileLocation?: EfsFileLocation;
1786
1798
  }
@@ -2548,7 +2560,7 @@ declare namespace Transfer {
2548
2560
  */
2549
2561
  Tags?: S3Tags;
2550
2562
  /**
2551
- * Specifies which file to use as input to the workflow step: either the output from the previous step, or the originally uploaded file for the workflow. Enter ${previous.file} to use the previous file as the input. In this case, this workflow step uses the output file from the previous workflow step as input. This is the default value. Enter ${original.file} to use the originally-uploaded file location as input for this step.
2563
+ * Specifies which file to use as input to the workflow step: either the output from the previous step, or the originally uploaded file for the workflow. To use the previous file as the input, enter ${previous.file}. In this case, this workflow step uses the output file from the previous workflow step as input. This is the default value. To use the originally uploaded file location as input for this step, enter ${original.file}.
2552
2564
  */
2553
2565
  SourceFileLocation?: SourceFileLocation;
2554
2566
  }
@@ -2797,7 +2809,7 @@ declare namespace Transfer {
2797
2809
  */
2798
2810
  EndpointType?: EndpointType;
2799
2811
  /**
2800
- * The RSA, ECDSA, or ED25519 private key to use for your SFTP-enabled server. You can add multiple host keys, in case you want to rotate keys, or have a set of active keys that use different algorithms. Use the following command to generate an RSA 2048 bit key with no passphrase: ssh-keygen -t rsa -b 2048 -N "" -m PEM -f my-new-server-key. Use a minimum value of 2048 for the -b option. You can create a stronger key by using 3072 or 4096. Use the following command to generate an ECDSA 256 bit key with no passphrase: ssh-keygen -t ecdsa -b 256 -N "" -m PEM -f my-new-server-key. Valid values for the -b option for ECDSA are 256, 384, and 521. Use the following command to generate an ED25519 key with no passphrase: ssh-keygen -t ed25519 -N "" -f my-new-server-key. For all of these commands, you can replace my-new-server-key with a string of your choice. If you aren't planning to migrate existing users from an existing SFTP-enabled server to a new server, don't update the host key. Accidentally changing a server's host key can be disruptive. For more information, see Update host keys for your SFTP-enabled server in the Transfer Family User Guide.
2812
+ * The RSA, ECDSA, or ED25519 private key to use for your SFTP-enabled server. You can add multiple host keys, in case you want to rotate keys, or have a set of active keys that use different algorithms. Use the following command to generate an RSA 2048 bit key with no passphrase: ssh-keygen -t rsa -b 2048 -N "" -m PEM -f my-new-server-key. Use a minimum value of 2048 for the -b option. You can create a stronger key by using 3072 or 4096. Use the following command to generate an ECDSA 256 bit key with no passphrase: ssh-keygen -t ecdsa -b 256 -N "" -m PEM -f my-new-server-key. Valid values for the -b option for ECDSA are 256, 384, and 521. Use the following command to generate an ED25519 key with no passphrase: ssh-keygen -t ed25519 -N "" -f my-new-server-key. For all of these commands, you can replace my-new-server-key with a string of your choice. If you aren't planning to migrate existing users from an existing SFTP-enabled server to a new server, don't update the host key. Accidentally changing a server's host key can be disruptive. For more information, see Manage host keys for your SFTP-enabled server in the Transfer Family User Guide.
2801
2813
  */
2802
2814
  HostKey?: HostKey;
2803
2815
  /**
@@ -2817,7 +2829,7 @@ declare namespace Transfer {
2817
2829
  */
2818
2830
  PreAuthenticationLoginBanner?: PreAuthenticationLoginBanner;
2819
2831
  /**
2820
- * Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are: SFTP (Secure Shell (SSH) File Transfer Protocol): File transfer over SSH FTPS (File Transfer Protocol Secure): File transfer with TLS encryption FTP (File Transfer Protocol): Unencrypted file transfer AS2 (Applicability Statement 2): used for transporting structured business-to-business data If you select FTPS, you must choose a certificate stored in Certificate Manager (ACM) which is used to identify your server when clients connect to it over FTPS. If Protocol includes either FTP or FTPS, then the EndpointType must be VPC and the IdentityProviderType must be AWS_DIRECTORY_SERVICE or API_GATEWAY. If Protocol includes FTP, then AddressAllocationIds cannot be associated. If Protocol is set only to SFTP, the EndpointType can be set to PUBLIC and the IdentityProviderType can be set to SERVICE_MANAGED. If Protocol includes AS2, then the EndpointType must be VPC, and domain must be Amazon S3.
2832
+ * Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are: SFTP (Secure Shell (SSH) File Transfer Protocol): File transfer over SSH FTPS (File Transfer Protocol Secure): File transfer with TLS encryption FTP (File Transfer Protocol): Unencrypted file transfer AS2 (Applicability Statement 2): used for transporting structured business-to-business data If you select FTPS, you must choose a certificate stored in Certificate Manager (ACM) which is used to identify your server when clients connect to it over FTPS. If Protocol includes either FTP or FTPS, then the EndpointType must be VPC and the IdentityProviderType must be either AWS_DIRECTORY_SERVICE, AWS_LAMBDA, or API_GATEWAY. If Protocol includes FTP, then AddressAllocationIds cannot be associated. If Protocol is set only to SFTP, the EndpointType can be set to PUBLIC and the IdentityProviderType can be set any of the supported identity types: SERVICE_MANAGED, AWS_DIRECTORY_SERVICE, AWS_LAMBDA, or API_GATEWAY. If Protocol includes AS2, then the EndpointType must be VPC, and domain must be Amazon S3.
2821
2833
  */
2822
2834
  Protocols?: Protocols;
2823
2835
  /**
@@ -2829,7 +2841,7 @@ declare namespace Transfer {
2829
2841
  */
2830
2842
  ServerId: ServerId;
2831
2843
  /**
2832
- * Specifies the workflow ID for the workflow to assign and the execution role that's used for executing the workflow. In additon to a workflow to execute when a file is uploaded completely, WorkflowDeatails can also contain a workflow ID (and execution role) for a workflow to execute on partial upload. A partial upload occurs when a file is open when the session disconnects. To remove an associated workflow from a server, you can provide an empty OnUpload object, as in the following example. aws transfer update-server --server-id s-01234567890abcdef --workflow-details '{"OnUpload":[]}'
2844
+ * Specifies the workflow ID for the workflow to assign and the execution role that's used for executing the workflow. In addition to a workflow to execute when a file is uploaded completely, WorkflowDetails can also contain a workflow ID (and execution role) for a workflow to execute on partial upload. A partial upload occurs when a file is open when the session disconnects. To remove an associated workflow from a server, you can provide an empty OnUpload object, as in the following example. aws transfer update-server --server-id s-01234567890abcdef --workflow-details '{"OnUpload":[]}'
2833
2845
  */
2834
2846
  WorkflowDetails?: WorkflowDetails;
2835
2847
  }
@@ -2927,15 +2939,15 @@ declare namespace Transfer {
2927
2939
  export type WorkflowId = string;
2928
2940
  export interface WorkflowStep {
2929
2941
  /**
2930
- * Currently, the following step types are supported. COPY: Copy the file to another location. CUSTOM: Perform a custom step with an Lambda function target. DELETE: Delete the file. TAG: Add a tag to the file.
2942
+ * Currently, the following step types are supported. COPY - Copy the file to another location. CUSTOM - Perform a custom step with an Lambda function target. DECRYPT - Decrypt a file that was encrypted before it was uploaded. DELETE - Delete the file. TAG - Add a tag to the file.
2931
2943
  */
2932
2944
  Type?: WorkflowStepType;
2933
2945
  /**
2934
- * Details for a step that performs a file copy. Consists of the following values: A description An S3 location for the destination of the file copy. A flag that indicates whether or not to overwrite an existing file of the same name. The default is FALSE.
2946
+ * Details for a step that performs a file copy. Consists of the following values: A description An Amazon S3 location for the destination of the file copy. A flag that indicates whether to overwrite an existing file of the same name. The default is FALSE.
2935
2947
  */
2936
2948
  CopyStepDetails?: CopyStepDetails;
2937
2949
  /**
2938
- * Details for a step that invokes a lambda function. Consists of the lambda function name, target, and timeout (in seconds).
2950
+ * Details for a step that invokes an Lambda function. Consists of the Lambda function's name, target, and timeout (in seconds).
2939
2951
  */
2940
2952
  CustomStepDetails?: CustomStepDetails;
2941
2953
  /**
@@ -2943,9 +2955,12 @@ declare namespace Transfer {
2943
2955
  */
2944
2956
  DeleteStepDetails?: DeleteStepDetails;
2945
2957
  /**
2946
- * Details for a step that creates one or more tags. You specify one or more tags: each tag contains a key/value pair.
2958
+ * Details for a step that creates one or more tags. You specify one or more tags. Each tag contains a key-value pair.
2947
2959
  */
2948
2960
  TagStepDetails?: TagStepDetails;
2961
+ /**
2962
+ * Details for a step that decrypts an encrypted file. Consists of the following values: A descriptive name An Amazon S3 or Amazon Elastic File System (Amazon EFS) location for the source file to decrypt. An S3 or Amazon EFS location for the destination of the file decryption. A flag that indicates whether to overwrite an existing file of the same name. The default is FALSE. The type of encryption that's used. Currently, only PGP encryption is supported.
2963
+ */
2949
2964
  DecryptStepDetails?: DecryptStepDetails;
2950
2965
  }
2951
2966
  export type WorkflowStepName = string;
@@ -83,7 +83,7 @@ return /******/ (function(modules) { // webpackBootstrap
83
83
  /**
84
84
  * @constant
85
85
  */
86
- VERSION: '2.1310.0',
86
+ VERSION: '2.1311.0',
87
87
 
88
88
  /**
89
89
  * @api private