cdk-docker-image-deployment 0.0.158 → 0.0.159
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/lib/destination.js +1 -1
- package/lib/docker-image-deployment.js +1 -1
- package/lib/source.js +1 -1
- package/node_modules/aws-sdk/CHANGELOG.md +7 -1
- package/node_modules/aws-sdk/README.md +1 -1
- package/node_modules/aws-sdk/apis/backup-2018-11-15.min.json +16 -8
- package/node_modules/aws-sdk/apis/glue-2017-03-31.min.json +9 -2
- package/node_modules/aws-sdk/clients/backup.d.ts +35 -3
- package/node_modules/aws-sdk/clients/cloudfront.d.ts +5 -5
- package/node_modules/aws-sdk/clients/glue.d.ts +38 -0
- package/node_modules/aws-sdk/clients/transfer.d.ts +44 -29
- package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +1 -1
- package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +3 -3
- package/node_modules/aws-sdk/dist/aws-sdk.js +3 -3
- package/node_modules/aws-sdk/dist/aws-sdk.min.js +2 -2
- package/node_modules/aws-sdk/lib/core.js +1 -1
- package/node_modules/aws-sdk/package.json +1 -1
- package/package.json +4 -4
|
@@ -517,7 +517,7 @@ declare namespace Transfer {
|
|
|
517
517
|
*/
|
|
518
518
|
Compression?: CompressionEnum;
|
|
519
519
|
/**
|
|
520
|
-
* The algorithm that is used to encrypt the file.
|
|
520
|
+
* The algorithm that is used to encrypt the file. You can only specify NONE if the URL for your connector uses HTTPS. This ensures that no traffic is sent in clear text.
|
|
521
521
|
*/
|
|
522
522
|
EncryptionAlgorithm?: EncryptionAlg;
|
|
523
523
|
/**
|
|
@@ -525,7 +525,7 @@ declare namespace Transfer {
|
|
|
525
525
|
*/
|
|
526
526
|
SigningAlgorithm?: SigningAlg;
|
|
527
527
|
/**
|
|
528
|
-
* The signing algorithm for the MDN response. If set to DEFAULT (or not set at all), the value for
|
|
528
|
+
* The signing algorithm for the MDN response. If set to DEFAULT (or not set at all), the value for SigningAlgorithm is used.
|
|
529
529
|
*/
|
|
530
530
|
MdnSigningAlgorithm?: MdnSigningAlg;
|
|
531
531
|
/**
|
|
@@ -555,15 +555,15 @@ declare namespace Transfer {
|
|
|
555
555
|
*/
|
|
556
556
|
Name?: WorkflowStepName;
|
|
557
557
|
/**
|
|
558
|
-
* Specifies the location for the file being copied.
|
|
558
|
+
* Specifies the location for the file being copied. Use ${Transfer:username} or ${Transfer:UploadDate} in this field to parametrize the destination prefix by username or uploaded date. Set the value of DestinationFileLocation to ${Transfer:username} to copy uploaded files to an Amazon S3 bucket that is prefixed with the name of the Transfer Family user that uploaded the file. Set the value of DestinationFileLocation to ${Transfer:UploadDate} to copy uploaded files to an Amazon S3 bucket that is prefixed with the date of the upload. The system resolves UploadDate to a date format of YYYY-MM-DD, based on the date the file is uploaded.
|
|
559
559
|
*/
|
|
560
560
|
DestinationFileLocation?: InputFileLocation;
|
|
561
561
|
/**
|
|
562
|
-
* A flag that indicates whether
|
|
562
|
+
* A flag that indicates whether to overwrite an existing file of the same name. The default is FALSE.
|
|
563
563
|
*/
|
|
564
564
|
OverwriteExisting?: OverwriteExisting;
|
|
565
565
|
/**
|
|
566
|
-
* Specifies which file to use as input to the workflow step: either the output from the previous step, or the originally uploaded file for the workflow.
|
|
566
|
+
* Specifies which file to use as input to the workflow step: either the output from the previous step, or the originally uploaded file for the workflow. To use the previous file as the input, enter ${previous.file}. In this case, this workflow step uses the output file from the previous workflow step as input. This is the default value. To use the originally uploaded file location as input for this step, enter ${original.file}.
|
|
567
567
|
*/
|
|
568
568
|
SourceFileLocation?: SourceFileLocation;
|
|
569
569
|
}
|
|
@@ -626,7 +626,7 @@ declare namespace Transfer {
|
|
|
626
626
|
*/
|
|
627
627
|
PartnerProfileId: ProfileId;
|
|
628
628
|
/**
|
|
629
|
-
* The landing directory (folder) for files transferred by using the AS2 protocol. A BaseDirectory example is DOC-EXAMPLE-BUCKET/home/mydirectory.
|
|
629
|
+
* The landing directory (folder) for files transferred by using the AS2 protocol. A BaseDirectory example is /DOC-EXAMPLE-BUCKET/home/mydirectory.
|
|
630
630
|
*/
|
|
631
631
|
BaseDirectory: HomeDirectory;
|
|
632
632
|
/**
|
|
@@ -718,7 +718,7 @@ declare namespace Transfer {
|
|
|
718
718
|
*/
|
|
719
719
|
EndpointType?: EndpointType;
|
|
720
720
|
/**
|
|
721
|
-
* The RSA, ECDSA, or ED25519 private key to use for your SFTP-enabled server. You can add multiple host keys, in case you want to rotate keys, or have a set of active keys that use different algorithms. Use the following command to generate an RSA 2048 bit key with no passphrase: ssh-keygen -t rsa -b 2048 -N "" -m PEM -f my-new-server-key. Use a minimum value of 2048 for the -b option. You can create a stronger key by using 3072 or 4096. Use the following command to generate an ECDSA 256 bit key with no passphrase: ssh-keygen -t ecdsa -b 256 -N "" -m PEM -f my-new-server-key. Valid values for the -b option for ECDSA are 256, 384, and 521. Use the following command to generate an ED25519 key with no passphrase: ssh-keygen -t ed25519 -N "" -f my-new-server-key. For all of these commands, you can replace my-new-server-key with a string of your choice. If you aren't planning to migrate existing users from an existing SFTP-enabled server to a new server, don't update the host key. Accidentally changing a server's host key can be disruptive. For more information, see
|
|
721
|
+
* The RSA, ECDSA, or ED25519 private key to use for your SFTP-enabled server. You can add multiple host keys, in case you want to rotate keys, or have a set of active keys that use different algorithms. Use the following command to generate an RSA 2048 bit key with no passphrase: ssh-keygen -t rsa -b 2048 -N "" -m PEM -f my-new-server-key. Use a minimum value of 2048 for the -b option. You can create a stronger key by using 3072 or 4096. Use the following command to generate an ECDSA 256 bit key with no passphrase: ssh-keygen -t ecdsa -b 256 -N "" -m PEM -f my-new-server-key. Valid values for the -b option for ECDSA are 256, 384, and 521. Use the following command to generate an ED25519 key with no passphrase: ssh-keygen -t ed25519 -N "" -f my-new-server-key. For all of these commands, you can replace my-new-server-key with a string of your choice. If you aren't planning to migrate existing users from an existing SFTP-enabled server to a new server, don't update the host key. Accidentally changing a server's host key can be disruptive. For more information, see Manage host keys for your SFTP-enabled server in the Transfer Family User Guide.
|
|
722
722
|
*/
|
|
723
723
|
HostKey?: HostKey;
|
|
724
724
|
/**
|
|
@@ -742,7 +742,7 @@ declare namespace Transfer {
|
|
|
742
742
|
*/
|
|
743
743
|
PreAuthenticationLoginBanner?: PreAuthenticationLoginBanner;
|
|
744
744
|
/**
|
|
745
|
-
* Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are: SFTP (Secure Shell (SSH) File Transfer Protocol): File transfer over SSH FTPS (File Transfer Protocol Secure): File transfer with TLS encryption FTP (File Transfer Protocol): Unencrypted file transfer AS2 (Applicability Statement 2): used for transporting structured business-to-business data If you select FTPS, you must choose a certificate stored in Certificate Manager (ACM) which is used to identify your server when clients connect to it over FTPS. If Protocol includes either FTP or FTPS, then the EndpointType must be VPC and the IdentityProviderType must be AWS_DIRECTORY_SERVICE or API_GATEWAY. If Protocol includes FTP, then AddressAllocationIds cannot be associated. If Protocol is set only to SFTP, the EndpointType can be set to PUBLIC and the IdentityProviderType can be set
|
|
745
|
+
* Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are: SFTP (Secure Shell (SSH) File Transfer Protocol): File transfer over SSH FTPS (File Transfer Protocol Secure): File transfer with TLS encryption FTP (File Transfer Protocol): Unencrypted file transfer AS2 (Applicability Statement 2): used for transporting structured business-to-business data If you select FTPS, you must choose a certificate stored in Certificate Manager (ACM) which is used to identify your server when clients connect to it over FTPS. If Protocol includes either FTP or FTPS, then the EndpointType must be VPC and the IdentityProviderType must be either AWS_DIRECTORY_SERVICE, AWS_LAMBDA, or API_GATEWAY. If Protocol includes FTP, then AddressAllocationIds cannot be associated. If Protocol is set only to SFTP, the EndpointType can be set to PUBLIC and the IdentityProviderType can be set any of the supported identity types: SERVICE_MANAGED, AWS_DIRECTORY_SERVICE, AWS_LAMBDA, or API_GATEWAY. If Protocol includes AS2, then the EndpointType must be VPC, and domain must be Amazon S3.
|
|
746
746
|
*/
|
|
747
747
|
Protocols?: Protocols;
|
|
748
748
|
/**
|
|
@@ -758,7 +758,7 @@ declare namespace Transfer {
|
|
|
758
758
|
*/
|
|
759
759
|
Tags?: Tags;
|
|
760
760
|
/**
|
|
761
|
-
* Specifies the workflow ID for the workflow to assign and the execution role that's used for executing the workflow. In
|
|
761
|
+
* Specifies the workflow ID for the workflow to assign and the execution role that's used for executing the workflow. In addition to a workflow to execute when a file is uploaded completely, WorkflowDetails can also contain a workflow ID (and execution role) for a workflow to execute on partial upload. A partial upload occurs when a file is open when the session disconnects.
|
|
762
762
|
*/
|
|
763
763
|
WorkflowDetails?: WorkflowDetails;
|
|
764
764
|
}
|
|
@@ -798,7 +798,7 @@ declare namespace Transfer {
|
|
|
798
798
|
*/
|
|
799
799
|
ServerId: ServerId;
|
|
800
800
|
/**
|
|
801
|
-
* The public portion of the Secure Shell (SSH) key used to authenticate the user to the server. Transfer Family accepts RSA, ECDSA, and ED25519 keys.
|
|
801
|
+
* The public portion of the Secure Shell (SSH) key used to authenticate the user to the server. The three standard SSH public key format elements are <key type>, <body base64>, and an optional <comment>, with spaces between each element. Transfer Family accepts RSA, ECDSA, and ED25519 keys. For RSA keys, the key type is ssh-rsa. For ED25519 keys, the key type is ssh-ed25519. For ECDSA keys, the key type is either ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, or ecdsa-sha2-nistp521, depending on the size of the key you generated.
|
|
802
802
|
*/
|
|
803
803
|
SshPublicKeyBody?: SshPublicKeyBody;
|
|
804
804
|
/**
|
|
@@ -826,7 +826,7 @@ declare namespace Transfer {
|
|
|
826
826
|
*/
|
|
827
827
|
Description?: WorkflowDescription;
|
|
828
828
|
/**
|
|
829
|
-
* Specifies the details for the steps that are in the specified workflow. The TYPE specifies which of the following actions is being taken for this step.
|
|
829
|
+
* Specifies the details for the steps that are in the specified workflow. The TYPE specifies which of the following actions is being taken for this step. COPY - Copy the file to another location. CUSTOM - Perform a custom step with an Lambda function target. DECRYPT - Decrypt a file that was encrypted before it was uploaded. DELETE - Delete the file. TAG - Add a tag to the file. Currently, copying and tagging are supported only on S3. For file location, you specify either the Amazon S3 bucket and key, or the Amazon EFS file system ID and path.
|
|
830
830
|
*/
|
|
831
831
|
Steps: WorkflowSteps;
|
|
832
832
|
/**
|
|
@@ -858,7 +858,7 @@ declare namespace Transfer {
|
|
|
858
858
|
*/
|
|
859
859
|
TimeoutSeconds?: CustomStepTimeoutSeconds;
|
|
860
860
|
/**
|
|
861
|
-
* Specifies which file to use as input to the workflow step: either the output from the previous step, or the originally uploaded file for the workflow.
|
|
861
|
+
* Specifies which file to use as input to the workflow step: either the output from the previous step, or the originally uploaded file for the workflow. To use the previous file as the input, enter ${previous.file}. In this case, this workflow step uses the output file from the previous workflow step as input. This is the default value. To use the originally uploaded file location as input for this step, enter ${original.file}.
|
|
862
862
|
*/
|
|
863
863
|
SourceFileLocation?: SourceFileLocation;
|
|
864
864
|
}
|
|
@@ -867,9 +867,21 @@ declare namespace Transfer {
|
|
|
867
867
|
export type CustomStepTimeoutSeconds = number;
|
|
868
868
|
export type DateImported = Date;
|
|
869
869
|
export interface DecryptStepDetails {
|
|
870
|
+
/**
|
|
871
|
+
* The name of the step, used as an identifier.
|
|
872
|
+
*/
|
|
870
873
|
Name?: WorkflowStepName;
|
|
874
|
+
/**
|
|
875
|
+
* The type of encryption used. Currently, this value must be PGP.
|
|
876
|
+
*/
|
|
871
877
|
Type: EncryptionType;
|
|
878
|
+
/**
|
|
879
|
+
* Specifies which file to use as input to the workflow step: either the output from the previous step, or the originally uploaded file for the workflow. To use the previous file as the input, enter ${previous.file}. In this case, this workflow step uses the output file from the previous workflow step as input. This is the default value. To use the originally uploaded file location as input for this step, enter ${original.file}.
|
|
880
|
+
*/
|
|
872
881
|
SourceFileLocation?: SourceFileLocation;
|
|
882
|
+
/**
|
|
883
|
+
* A flag that indicates whether to overwrite an existing file of the same name. The default is FALSE.
|
|
884
|
+
*/
|
|
873
885
|
OverwriteExisting?: OverwriteExisting;
|
|
874
886
|
DestinationFileLocation: InputFileLocation;
|
|
875
887
|
}
|
|
@@ -947,7 +959,7 @@ declare namespace Transfer {
|
|
|
947
959
|
*/
|
|
948
960
|
Name?: WorkflowStepName;
|
|
949
961
|
/**
|
|
950
|
-
* Specifies which file to use as input to the workflow step: either the output from the previous step, or the originally uploaded file for the workflow.
|
|
962
|
+
* Specifies which file to use as input to the workflow step: either the output from the previous step, or the originally uploaded file for the workflow. To use the previous file as the input, enter ${previous.file}. In this case, this workflow step uses the output file from the previous workflow step as input. This is the default value. To use the originally uploaded file location as input for this step, enter ${original.file}.
|
|
951
963
|
*/
|
|
952
964
|
SourceFileLocation?: SourceFileLocation;
|
|
953
965
|
}
|
|
@@ -1451,7 +1463,7 @@ declare namespace Transfer {
|
|
|
1451
1463
|
*/
|
|
1452
1464
|
PreAuthenticationLoginBanner?: PreAuthenticationLoginBanner;
|
|
1453
1465
|
/**
|
|
1454
|
-
* Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are: SFTP (Secure Shell (SSH) File Transfer Protocol): File transfer over SSH FTPS (File Transfer Protocol Secure): File transfer with TLS encryption FTP (File Transfer Protocol): Unencrypted file transfer AS2 (Applicability Statement 2): used for transporting structured business-to-business data If you select FTPS, you must choose a certificate stored in Certificate Manager (ACM) which is used to identify your server when clients connect to it over FTPS. If Protocol includes either FTP or FTPS, then the EndpointType must be VPC and the IdentityProviderType must be AWS_DIRECTORY_SERVICE or API_GATEWAY. If Protocol includes FTP, then AddressAllocationIds cannot be associated. If Protocol is set only to SFTP, the EndpointType can be set to PUBLIC and the IdentityProviderType can be set
|
|
1466
|
+
* Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are: SFTP (Secure Shell (SSH) File Transfer Protocol): File transfer over SSH FTPS (File Transfer Protocol Secure): File transfer with TLS encryption FTP (File Transfer Protocol): Unencrypted file transfer AS2 (Applicability Statement 2): used for transporting structured business-to-business data If you select FTPS, you must choose a certificate stored in Certificate Manager (ACM) which is used to identify your server when clients connect to it over FTPS. If Protocol includes either FTP or FTPS, then the EndpointType must be VPC and the IdentityProviderType must be either AWS_DIRECTORY_SERVICE, AWS_LAMBDA, or API_GATEWAY. If Protocol includes FTP, then AddressAllocationIds cannot be associated. If Protocol is set only to SFTP, the EndpointType can be set to PUBLIC and the IdentityProviderType can be set any of the supported identity types: SERVICE_MANAGED, AWS_DIRECTORY_SERVICE, AWS_LAMBDA, or API_GATEWAY. If Protocol includes AS2, then the EndpointType must be VPC, and domain must be Amazon S3.
|
|
1455
1467
|
*/
|
|
1456
1468
|
Protocols?: Protocols;
|
|
1457
1469
|
/**
|
|
@@ -1475,7 +1487,7 @@ declare namespace Transfer {
|
|
|
1475
1487
|
*/
|
|
1476
1488
|
UserCount?: UserCount;
|
|
1477
1489
|
/**
|
|
1478
|
-
* Specifies the workflow ID for the workflow to assign and the execution role that's used for executing the workflow. In
|
|
1490
|
+
* Specifies the workflow ID for the workflow to assign and the execution role that's used for executing the workflow. In addition to a workflow to execute when a file is uploaded completely, WorkflowDetails can also contain a workflow ID (and execution role) for a workflow to execute on partial upload. A partial upload occurs when a file is open when the session disconnects.
|
|
1479
1491
|
*/
|
|
1480
1492
|
WorkflowDetails?: WorkflowDetails;
|
|
1481
1493
|
}
|
|
@@ -1613,7 +1625,7 @@ declare namespace Transfer {
|
|
|
1613
1625
|
export type ExecutionStatus = "IN_PROGRESS"|"COMPLETED"|"EXCEPTION"|"HANDLING_EXCEPTION"|string;
|
|
1614
1626
|
export interface ExecutionStepResult {
|
|
1615
1627
|
/**
|
|
1616
|
-
* One of the available step types.
|
|
1628
|
+
* One of the available step types. COPY - Copy the file to another location. CUSTOM - Perform a custom step with an Lambda function target. DECRYPT - Decrypt a file that was encrypted before it was uploaded. DELETE - Delete the file. TAG - Add a tag to the file.
|
|
1617
1629
|
*/
|
|
1618
1630
|
StepType?: WorkflowStepType;
|
|
1619
1631
|
/**
|
|
@@ -1684,7 +1696,7 @@ declare namespace Transfer {
|
|
|
1684
1696
|
*/
|
|
1685
1697
|
Usage: CertificateUsageType;
|
|
1686
1698
|
/**
|
|
1687
|
-
*
|
|
1699
|
+
* For the CLI, provide a file path for a certificate in URI format. For example, --certificate file://encryption-cert.pem. Alternatively, you can provide the raw content. For the SDK, specify the raw content of a certificate file. For example, --certificate "`cat encryption-cert.pem`".
|
|
1688
1700
|
*/
|
|
1689
1701
|
Certificate: CertificateBodyType;
|
|
1690
1702
|
/**
|
|
@@ -1692,7 +1704,7 @@ declare namespace Transfer {
|
|
|
1692
1704
|
*/
|
|
1693
1705
|
CertificateChain?: CertificateChainType;
|
|
1694
1706
|
/**
|
|
1695
|
-
*
|
|
1707
|
+
* For the CLI, provide a file path for a private key in URI format.For example, --private-key file://encryption-key.pem. Alternatively, you can provide the raw content of the private key file. For the SDK, specify the raw content of a private key file. For example, --private-key "`cat encryption-key.pem`"
|
|
1696
1708
|
*/
|
|
1697
1709
|
PrivateKey?: PrivateKeyType;
|
|
1698
1710
|
/**
|
|
@@ -1724,7 +1736,7 @@ declare namespace Transfer {
|
|
|
1724
1736
|
*/
|
|
1725
1737
|
ServerId: ServerId;
|
|
1726
1738
|
/**
|
|
1727
|
-
* The
|
|
1739
|
+
* The private key portion of an SSH key pair. Transfer Family accepts RSA, ECDSA, and ED25519 keys.
|
|
1728
1740
|
*/
|
|
1729
1741
|
HostKeyBody: HostKey;
|
|
1730
1742
|
/**
|
|
@@ -1776,11 +1788,11 @@ declare namespace Transfer {
|
|
|
1776
1788
|
}
|
|
1777
1789
|
export interface InputFileLocation {
|
|
1778
1790
|
/**
|
|
1779
|
-
* Specifies the details for the S3 file being copied.
|
|
1791
|
+
* Specifies the details for the Amazon S3 file that's being copied or decrypted.
|
|
1780
1792
|
*/
|
|
1781
1793
|
S3FileLocation?: S3InputFileLocation;
|
|
1782
1794
|
/**
|
|
1783
|
-
*
|
|
1795
|
+
* Specifies the details for the Amazon Elastic File System (Amazon EFS) file that's being decrypted.
|
|
1784
1796
|
*/
|
|
1785
1797
|
EfsFileLocation?: EfsFileLocation;
|
|
1786
1798
|
}
|
|
@@ -2548,7 +2560,7 @@ declare namespace Transfer {
|
|
|
2548
2560
|
*/
|
|
2549
2561
|
Tags?: S3Tags;
|
|
2550
2562
|
/**
|
|
2551
|
-
* Specifies which file to use as input to the workflow step: either the output from the previous step, or the originally uploaded file for the workflow.
|
|
2563
|
+
* Specifies which file to use as input to the workflow step: either the output from the previous step, or the originally uploaded file for the workflow. To use the previous file as the input, enter ${previous.file}. In this case, this workflow step uses the output file from the previous workflow step as input. This is the default value. To use the originally uploaded file location as input for this step, enter ${original.file}.
|
|
2552
2564
|
*/
|
|
2553
2565
|
SourceFileLocation?: SourceFileLocation;
|
|
2554
2566
|
}
|
|
@@ -2797,7 +2809,7 @@ declare namespace Transfer {
|
|
|
2797
2809
|
*/
|
|
2798
2810
|
EndpointType?: EndpointType;
|
|
2799
2811
|
/**
|
|
2800
|
-
* The RSA, ECDSA, or ED25519 private key to use for your SFTP-enabled server. You can add multiple host keys, in case you want to rotate keys, or have a set of active keys that use different algorithms. Use the following command to generate an RSA 2048 bit key with no passphrase: ssh-keygen -t rsa -b 2048 -N "" -m PEM -f my-new-server-key. Use a minimum value of 2048 for the -b option. You can create a stronger key by using 3072 or 4096. Use the following command to generate an ECDSA 256 bit key with no passphrase: ssh-keygen -t ecdsa -b 256 -N "" -m PEM -f my-new-server-key. Valid values for the -b option for ECDSA are 256, 384, and 521. Use the following command to generate an ED25519 key with no passphrase: ssh-keygen -t ed25519 -N "" -f my-new-server-key. For all of these commands, you can replace my-new-server-key with a string of your choice. If you aren't planning to migrate existing users from an existing SFTP-enabled server to a new server, don't update the host key. Accidentally changing a server's host key can be disruptive. For more information, see
|
|
2812
|
+
* The RSA, ECDSA, or ED25519 private key to use for your SFTP-enabled server. You can add multiple host keys, in case you want to rotate keys, or have a set of active keys that use different algorithms. Use the following command to generate an RSA 2048 bit key with no passphrase: ssh-keygen -t rsa -b 2048 -N "" -m PEM -f my-new-server-key. Use a minimum value of 2048 for the -b option. You can create a stronger key by using 3072 or 4096. Use the following command to generate an ECDSA 256 bit key with no passphrase: ssh-keygen -t ecdsa -b 256 -N "" -m PEM -f my-new-server-key. Valid values for the -b option for ECDSA are 256, 384, and 521. Use the following command to generate an ED25519 key with no passphrase: ssh-keygen -t ed25519 -N "" -f my-new-server-key. For all of these commands, you can replace my-new-server-key with a string of your choice. If you aren't planning to migrate existing users from an existing SFTP-enabled server to a new server, don't update the host key. Accidentally changing a server's host key can be disruptive. For more information, see Manage host keys for your SFTP-enabled server in the Transfer Family User Guide.
|
|
2801
2813
|
*/
|
|
2802
2814
|
HostKey?: HostKey;
|
|
2803
2815
|
/**
|
|
@@ -2817,7 +2829,7 @@ declare namespace Transfer {
|
|
|
2817
2829
|
*/
|
|
2818
2830
|
PreAuthenticationLoginBanner?: PreAuthenticationLoginBanner;
|
|
2819
2831
|
/**
|
|
2820
|
-
* Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are: SFTP (Secure Shell (SSH) File Transfer Protocol): File transfer over SSH FTPS (File Transfer Protocol Secure): File transfer with TLS encryption FTP (File Transfer Protocol): Unencrypted file transfer AS2 (Applicability Statement 2): used for transporting structured business-to-business data If you select FTPS, you must choose a certificate stored in Certificate Manager (ACM) which is used to identify your server when clients connect to it over FTPS. If Protocol includes either FTP or FTPS, then the EndpointType must be VPC and the IdentityProviderType must be AWS_DIRECTORY_SERVICE or API_GATEWAY. If Protocol includes FTP, then AddressAllocationIds cannot be associated. If Protocol is set only to SFTP, the EndpointType can be set to PUBLIC and the IdentityProviderType can be set
|
|
2832
|
+
* Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are: SFTP (Secure Shell (SSH) File Transfer Protocol): File transfer over SSH FTPS (File Transfer Protocol Secure): File transfer with TLS encryption FTP (File Transfer Protocol): Unencrypted file transfer AS2 (Applicability Statement 2): used for transporting structured business-to-business data If you select FTPS, you must choose a certificate stored in Certificate Manager (ACM) which is used to identify your server when clients connect to it over FTPS. If Protocol includes either FTP or FTPS, then the EndpointType must be VPC and the IdentityProviderType must be either AWS_DIRECTORY_SERVICE, AWS_LAMBDA, or API_GATEWAY. If Protocol includes FTP, then AddressAllocationIds cannot be associated. If Protocol is set only to SFTP, the EndpointType can be set to PUBLIC and the IdentityProviderType can be set any of the supported identity types: SERVICE_MANAGED, AWS_DIRECTORY_SERVICE, AWS_LAMBDA, or API_GATEWAY. If Protocol includes AS2, then the EndpointType must be VPC, and domain must be Amazon S3.
|
|
2821
2833
|
*/
|
|
2822
2834
|
Protocols?: Protocols;
|
|
2823
2835
|
/**
|
|
@@ -2829,7 +2841,7 @@ declare namespace Transfer {
|
|
|
2829
2841
|
*/
|
|
2830
2842
|
ServerId: ServerId;
|
|
2831
2843
|
/**
|
|
2832
|
-
* Specifies the workflow ID for the workflow to assign and the execution role that's used for executing the workflow. In
|
|
2844
|
+
* Specifies the workflow ID for the workflow to assign and the execution role that's used for executing the workflow. In addition to a workflow to execute when a file is uploaded completely, WorkflowDetails can also contain a workflow ID (and execution role) for a workflow to execute on partial upload. A partial upload occurs when a file is open when the session disconnects. To remove an associated workflow from a server, you can provide an empty OnUpload object, as in the following example. aws transfer update-server --server-id s-01234567890abcdef --workflow-details '{"OnUpload":[]}'
|
|
2833
2845
|
*/
|
|
2834
2846
|
WorkflowDetails?: WorkflowDetails;
|
|
2835
2847
|
}
|
|
@@ -2927,15 +2939,15 @@ declare namespace Transfer {
|
|
|
2927
2939
|
export type WorkflowId = string;
|
|
2928
2940
|
export interface WorkflowStep {
|
|
2929
2941
|
/**
|
|
2930
|
-
* Currently, the following step types are supported.
|
|
2942
|
+
* Currently, the following step types are supported. COPY - Copy the file to another location. CUSTOM - Perform a custom step with an Lambda function target. DECRYPT - Decrypt a file that was encrypted before it was uploaded. DELETE - Delete the file. TAG - Add a tag to the file.
|
|
2931
2943
|
*/
|
|
2932
2944
|
Type?: WorkflowStepType;
|
|
2933
2945
|
/**
|
|
2934
|
-
* Details for a step that performs a file copy. Consists of the following values: A description An S3 location for the destination of the file copy. A flag that indicates whether
|
|
2946
|
+
* Details for a step that performs a file copy. Consists of the following values: A description An Amazon S3 location for the destination of the file copy. A flag that indicates whether to overwrite an existing file of the same name. The default is FALSE.
|
|
2935
2947
|
*/
|
|
2936
2948
|
CopyStepDetails?: CopyStepDetails;
|
|
2937
2949
|
/**
|
|
2938
|
-
* Details for a step that invokes
|
|
2950
|
+
* Details for a step that invokes an Lambda function. Consists of the Lambda function's name, target, and timeout (in seconds).
|
|
2939
2951
|
*/
|
|
2940
2952
|
CustomStepDetails?: CustomStepDetails;
|
|
2941
2953
|
/**
|
|
@@ -2943,9 +2955,12 @@ declare namespace Transfer {
|
|
|
2943
2955
|
*/
|
|
2944
2956
|
DeleteStepDetails?: DeleteStepDetails;
|
|
2945
2957
|
/**
|
|
2946
|
-
* Details for a step that creates one or more tags. You specify one or more tags
|
|
2958
|
+
* Details for a step that creates one or more tags. You specify one or more tags. Each tag contains a key-value pair.
|
|
2947
2959
|
*/
|
|
2948
2960
|
TagStepDetails?: TagStepDetails;
|
|
2961
|
+
/**
|
|
2962
|
+
* Details for a step that decrypts an encrypted file. Consists of the following values: A descriptive name An Amazon S3 or Amazon Elastic File System (Amazon EFS) location for the source file to decrypt. An S3 or Amazon EFS location for the destination of the file decryption. A flag that indicates whether to overwrite an existing file of the same name. The default is FALSE. The type of encryption that's used. Currently, only PGP encryption is supported.
|
|
2963
|
+
*/
|
|
2949
2964
|
DecryptStepDetails?: DecryptStepDetails;
|
|
2950
2965
|
}
|
|
2951
2966
|
export type WorkflowStepName = string;
|