aws-cdk-lib 2.90.0__py3-none-any.whl → 2.92.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk-lib might be problematic. Click here for more details.
- aws_cdk/__init__.py +22 -4
- aws_cdk/_jsii/__init__.py +2 -2
- aws_cdk/_jsii/{aws-cdk-lib@2.90.0.jsii.tgz → aws-cdk-lib@2.92.0.jsii.tgz} +0 -0
- aws_cdk/aws_appstream/__init__.py +3 -3
- aws_cdk/aws_batch/__init__.py +39 -18
- aws_cdk/aws_billingconductor/__init__.py +44 -13
- aws_cdk/aws_cleanrooms/__init__.py +2 -4
- aws_cdk/aws_cloudtrail/__init__.py +35 -10
- aws_cdk/aws_cloudwatch/__init__.py +3 -3
- aws_cdk/aws_codebuild/__init__.py +7 -7
- aws_cdk/aws_cognito/__init__.py +8 -8
- aws_cdk/aws_config/__init__.py +220 -0
- aws_cdk/aws_datasync/__init__.py +22 -35
- aws_cdk/aws_dms/__init__.py +909 -4
- aws_cdk/aws_dynamodb/__init__.py +0 -1
- aws_cdk/aws_ec2/__init__.py +59 -21
- aws_cdk/aws_ecs/__init__.py +45 -21
- aws_cdk/aws_evidently/__init__.py +3 -3
- aws_cdk/aws_fsx/__init__.py +6 -5
- aws_cdk/aws_glue/__init__.py +438 -10
- aws_cdk/aws_guardduty/__init__.py +60 -17
- aws_cdk/aws_iam/__init__.py +8 -9
- aws_cdk/aws_iot/__init__.py +5 -1
- aws_cdk/aws_kms/__init__.py +95 -47
- aws_cdk/aws_lambda/__init__.py +4 -2
- aws_cdk/aws_lambda_nodejs/__init__.py +3 -3
- aws_cdk/aws_mediatailor/__init__.py +2902 -892
- aws_cdk/aws_mwaa/__init__.py +13 -8
- aws_cdk/aws_neptune/__init__.py +50 -2
- aws_cdk/aws_omics/__init__.py +80 -0
- aws_cdk/aws_opensearchserverless/__init__.py +3 -3
- aws_cdk/aws_opensearchservice/__init__.py +247 -14
- aws_cdk/aws_organizations/__init__.py +17 -17
- aws_cdk/aws_personalize/__init__.py +41 -25
- aws_cdk/aws_rds/__init__.py +24 -10
- aws_cdk/aws_resiliencehub/__init__.py +22 -22
- aws_cdk/aws_rolesanywhere/__init__.py +58 -74
- aws_cdk/aws_route53/__init__.py +3 -1
- aws_cdk/aws_s3/__init__.py +17 -7
- aws_cdk/aws_sagemaker/__init__.py +396 -5
- aws_cdk/aws_sns/__init__.py +8 -8
- aws_cdk/aws_sqs/__init__.py +231 -4
- aws_cdk/aws_ssm/__init__.py +6 -28
- aws_cdk/aws_stepfunctions/__init__.py +7 -7
- aws_cdk/aws_timestream/__init__.py +243 -0
- aws_cdk/aws_transfer/__init__.py +250 -52
- aws_cdk/aws_vpclattice/__init__.py +10 -6
- aws_cdk/aws_wafv2/__init__.py +7517 -5036
- aws_cdk/custom_resources/__init__.py +18 -30
- {aws_cdk_lib-2.90.0.dist-info → aws_cdk_lib-2.92.0.dist-info}/METADATA +8 -8
- {aws_cdk_lib-2.90.0.dist-info → aws_cdk_lib-2.92.0.dist-info}/RECORD +55 -55
- {aws_cdk_lib-2.90.0.dist-info → aws_cdk_lib-2.92.0.dist-info}/WHEEL +1 -1
- {aws_cdk_lib-2.90.0.dist-info → aws_cdk_lib-2.92.0.dist-info}/LICENSE +0 -0
- {aws_cdk_lib-2.90.0.dist-info → aws_cdk_lib-2.92.0.dist-info}/NOTICE +0 -0
- {aws_cdk_lib-2.90.0.dist-info → aws_cdk_lib-2.92.0.dist-info}/top_level.txt +0 -0
aws_cdk/aws_transfer/__init__.py
CHANGED
|
@@ -106,7 +106,7 @@ class CfnAgreement(
|
|
|
106
106
|
'''
|
|
107
107
|
:param scope: Scope in which this resource is defined.
|
|
108
108
|
:param id: Construct identifier for this resource (unique in its scope).
|
|
109
|
-
:param access_role: With AS2, you can send files by calling ``StartFileTransfer`` and specifying the file paths in the request parameter, ``SendFilePaths`` . We use the file’s parent directory (for example, for ``--send-file-paths /bucket/dir/file.txt`` , parent directory is ``/bucket/dir/`` ) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the ``AccessRole`` needs to provide read and write access to the parent directory of the file location used in the ``StartFileTransfer`` request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with ``StartFileTransfer`` . If you are using Basic authentication for your AS2 connector, the access role requires the ``secretsmanager:GetSecretValue`` permission for the secret. If the secret is encrypted using a customer-managed key instead of the AWS managed key in Secrets Manager, then the role also needs the ``kms:Decrypt`` permission for that key.
|
|
109
|
+
:param access_role: Connectors are used to send files using either the AS2 or SFTP protocol. For the access role, provide the Amazon Resource Name (ARN) of the AWS Identity and Access Management role to use. *For AS2 connectors* With AS2, you can send files by calling ``StartFileTransfer`` and specifying the file paths in the request parameter, ``SendFilePaths`` . We use the file’s parent directory (for example, for ``--send-file-paths /bucket/dir/file.txt`` , parent directory is ``/bucket/dir/`` ) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the ``AccessRole`` needs to provide read and write access to the parent directory of the file location used in the ``StartFileTransfer`` request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with ``StartFileTransfer`` . If you are using Basic authentication for your AS2 connector, the access role requires the ``secretsmanager:GetSecretValue`` permission for the secret. If the secret is encrypted using a customer-managed key instead of the AWS managed key in Secrets Manager, then the role also needs the ``kms:Decrypt`` permission for that key. *For SFTP connectors* Make sure that the access role provides read and write access to the parent directory of the file location that's used in the ``StartFileTransfer`` request. Additionally, make sure that the role provides ``secretsmanager:GetSecretValue`` permission to AWS Secrets Manager .
|
|
110
110
|
:param base_directory: The landing directory (folder) for files that are transferred by using the AS2 protocol.
|
|
111
111
|
:param local_profile_id: A unique identifier for the AS2 local profile.
|
|
112
112
|
:param partner_profile_id: A unique identifier for the partner profile used in the agreement.
|
|
@@ -194,7 +194,7 @@ class CfnAgreement(
|
|
|
194
194
|
@builtins.property
|
|
195
195
|
@jsii.member(jsii_name="accessRole")
|
|
196
196
|
def access_role(self) -> builtins.str:
|
|
197
|
-
'''
|
|
197
|
+
'''Connectors are used to send files using either the AS2 or SFTP protocol.'''
|
|
198
198
|
return typing.cast(builtins.str, jsii.get(self, "accessRole"))
|
|
199
199
|
|
|
200
200
|
@access_role.setter
|
|
@@ -325,7 +325,7 @@ class CfnAgreementProps:
|
|
|
325
325
|
) -> None:
|
|
326
326
|
'''Properties for defining a ``CfnAgreement``.
|
|
327
327
|
|
|
328
|
-
:param access_role: With AS2, you can send files by calling ``StartFileTransfer`` and specifying the file paths in the request parameter, ``SendFilePaths`` . We use the file’s parent directory (for example, for ``--send-file-paths /bucket/dir/file.txt`` , parent directory is ``/bucket/dir/`` ) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the ``AccessRole`` needs to provide read and write access to the parent directory of the file location used in the ``StartFileTransfer`` request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with ``StartFileTransfer`` . If you are using Basic authentication for your AS2 connector, the access role requires the ``secretsmanager:GetSecretValue`` permission for the secret. If the secret is encrypted using a customer-managed key instead of the AWS managed key in Secrets Manager, then the role also needs the ``kms:Decrypt`` permission for that key.
|
|
328
|
+
:param access_role: Connectors are used to send files using either the AS2 or SFTP protocol. For the access role, provide the Amazon Resource Name (ARN) of the AWS Identity and Access Management role to use. *For AS2 connectors* With AS2, you can send files by calling ``StartFileTransfer`` and specifying the file paths in the request parameter, ``SendFilePaths`` . We use the file’s parent directory (for example, for ``--send-file-paths /bucket/dir/file.txt`` , parent directory is ``/bucket/dir/`` ) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the ``AccessRole`` needs to provide read and write access to the parent directory of the file location used in the ``StartFileTransfer`` request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with ``StartFileTransfer`` . If you are using Basic authentication for your AS2 connector, the access role requires the ``secretsmanager:GetSecretValue`` permission for the secret. If the secret is encrypted using a customer-managed key instead of the AWS managed key in Secrets Manager, then the role also needs the ``kms:Decrypt`` permission for that key. *For SFTP connectors* Make sure that the access role provides read and write access to the parent directory of the file location that's used in the ``StartFileTransfer`` request. Additionally, make sure that the role provides ``secretsmanager:GetSecretValue`` permission to AWS Secrets Manager .
|
|
329
329
|
:param base_directory: The landing directory (folder) for files that are transferred by using the AS2 protocol.
|
|
330
330
|
:param local_profile_id: A unique identifier for the AS2 local profile.
|
|
331
331
|
:param partner_profile_id: A unique identifier for the partner profile used in the agreement.
|
|
@@ -385,12 +385,20 @@ class CfnAgreementProps:
|
|
|
385
385
|
|
|
386
386
|
@builtins.property
|
|
387
387
|
def access_role(self) -> builtins.str:
|
|
388
|
-
'''
|
|
388
|
+
'''Connectors are used to send files using either the AS2 or SFTP protocol.
|
|
389
389
|
|
|
390
|
-
|
|
390
|
+
For the access role, provide the Amazon Resource Name (ARN) of the AWS Identity and Access Management role to use.
|
|
391
|
+
|
|
392
|
+
*For AS2 connectors*
|
|
393
|
+
|
|
394
|
+
With AS2, you can send files by calling ``StartFileTransfer`` and specifying the file paths in the request parameter, ``SendFilePaths`` . We use the file’s parent directory (for example, for ``--send-file-paths /bucket/dir/file.txt`` , parent directory is ``/bucket/dir/`` ) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the ``AccessRole`` needs to provide read and write access to the parent directory of the file location used in the ``StartFileTransfer`` request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with ``StartFileTransfer`` .
|
|
391
395
|
|
|
392
396
|
If you are using Basic authentication for your AS2 connector, the access role requires the ``secretsmanager:GetSecretValue`` permission for the secret. If the secret is encrypted using a customer-managed key instead of the AWS managed key in Secrets Manager, then the role also needs the ``kms:Decrypt`` permission for that key.
|
|
393
397
|
|
|
398
|
+
*For SFTP connectors*
|
|
399
|
+
|
|
400
|
+
Make sure that the access role provides read and write access to the parent directory of the file location that's used in the ``StartFileTransfer`` request. Additionally, make sure that the role provides ``secretsmanager:GetSecretValue`` permission to AWS Secrets Manager .
|
|
401
|
+
|
|
394
402
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-transfer-agreement.html#cfn-transfer-agreement-accessrole
|
|
395
403
|
'''
|
|
396
404
|
result = self._values.get("access_role")
|
|
@@ -952,9 +960,9 @@ class CfnConnector(
|
|
|
952
960
|
metaclass=jsii.JSIIMeta,
|
|
953
961
|
jsii_type="aws-cdk-lib.aws_transfer.CfnConnector",
|
|
954
962
|
):
|
|
955
|
-
'''Creates the connector, which captures the parameters for
|
|
963
|
+
'''Creates the connector, which captures the parameters for a connection for the AS2 or SFTP protocol.
|
|
956
964
|
|
|
957
|
-
|
|
965
|
+
For AS2, the connector is required for sending files to an externally hosted AS2 server. For SFTP, the connector is required when sending files to an SFTP server or receiving files from an SFTP server. For more details about connectors, see `Create AS2 connectors <https://docs.aws.amazon.com/transfer/latest/userguide/create-b2b-server.html#configure-as2-connector>`_ and `Create SFTP connectors <https://docs.aws.amazon.com/transfer/latest/userguide/configure-sftp-connector.html>`_ .
|
|
958
966
|
.. epigraph::
|
|
959
967
|
|
|
960
968
|
You must specify exactly one configuration object: either for AS2 ( ``As2Config`` ) or SFTP ( ``SftpConfig`` ).
|
|
@@ -972,11 +980,15 @@ class CfnConnector(
|
|
|
972
980
|
|
|
973
981
|
cfn_connector = transfer.CfnConnector(self, "MyCfnConnector",
|
|
974
982
|
access_role="accessRole",
|
|
975
|
-
as2_config=as2_config,
|
|
976
983
|
url="url",
|
|
977
984
|
|
|
978
985
|
# the properties below are optional
|
|
986
|
+
as2_config=as2_config,
|
|
979
987
|
logging_role="loggingRole",
|
|
988
|
+
sftp_config=transfer.CfnConnector.SftpConfigProperty(
|
|
989
|
+
trusted_host_keys=["trustedHostKeys"],
|
|
990
|
+
user_secret_id="userSecretId"
|
|
991
|
+
),
|
|
980
992
|
tags=[CfnTag(
|
|
981
993
|
key="key",
|
|
982
994
|
value="value"
|
|
@@ -990,18 +1002,20 @@ class CfnConnector(
|
|
|
990
1002
|
id: builtins.str,
|
|
991
1003
|
*,
|
|
992
1004
|
access_role: builtins.str,
|
|
993
|
-
as2_config: typing.Any,
|
|
994
1005
|
url: builtins.str,
|
|
1006
|
+
as2_config: typing.Any = None,
|
|
995
1007
|
logging_role: typing.Optional[builtins.str] = None,
|
|
1008
|
+
sftp_config: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnConnector.SftpConfigProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
996
1009
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
997
1010
|
) -> None:
|
|
998
1011
|
'''
|
|
999
1012
|
:param scope: Scope in which this resource is defined.
|
|
1000
1013
|
:param id: Construct identifier for this resource (unique in its scope).
|
|
1001
|
-
:param access_role: With AS2, you can send files by calling ``StartFileTransfer`` and specifying the file paths in the request parameter, ``SendFilePaths`` . We use the file’s parent directory (for example, for ``--send-file-paths /bucket/dir/file.txt`` , parent directory is ``/bucket/dir/`` ) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the ``AccessRole`` needs to provide read and write access to the parent directory of the file location used in the ``StartFileTransfer`` request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with ``StartFileTransfer`` . If you are using Basic authentication for your AS2 connector, the access role requires the ``secretsmanager:GetSecretValue`` permission for the secret. If the secret is encrypted using a customer-managed key instead of the AWS managed key in Secrets Manager, then the role also needs the ``kms:Decrypt`` permission for that key.
|
|
1002
|
-
:param as2_config: A structure that contains the parameters for an AS2 connector object.
|
|
1014
|
+
:param access_role: Connectors are used to send files using either the AS2 or SFTP protocol. For the access role, provide the Amazon Resource Name (ARN) of the AWS Identity and Access Management role to use. *For AS2 connectors* With AS2, you can send files by calling ``StartFileTransfer`` and specifying the file paths in the request parameter, ``SendFilePaths`` . We use the file’s parent directory (for example, for ``--send-file-paths /bucket/dir/file.txt`` , parent directory is ``/bucket/dir/`` ) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the ``AccessRole`` needs to provide read and write access to the parent directory of the file location used in the ``StartFileTransfer`` request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with ``StartFileTransfer`` . If you are using Basic authentication for your AS2 connector, the access role requires the ``secretsmanager:GetSecretValue`` permission for the secret. If the secret is encrypted using a customer-managed key instead of the AWS managed key in Secrets Manager, then the role also needs the ``kms:Decrypt`` permission for that key. *For SFTP connectors* Make sure that the access role provides read and write access to the parent directory of the file location that's used in the ``StartFileTransfer`` request. Additionally, make sure that the role provides ``secretsmanager:GetSecretValue`` permission to AWS Secrets Manager .
|
|
1003
1015
|
:param url: The URL of the partner's AS2 or SFTP endpoint.
|
|
1016
|
+
:param as2_config: A structure that contains the parameters for an AS2 connector object.
|
|
1004
1017
|
:param logging_role: The Amazon Resource Name (ARN) of the AWS Identity and Access Management (IAM) role that allows a connector to turn on CloudWatch logging for Amazon S3 events. When set, you can view connector activity in your CloudWatch logs.
|
|
1018
|
+
:param sftp_config: A structure that contains the parameters for an SFTP connector object.
|
|
1005
1019
|
:param tags: Key-value pairs that can be used to group and search for connectors.
|
|
1006
1020
|
'''
|
|
1007
1021
|
if __debug__:
|
|
@@ -1010,9 +1024,10 @@ class CfnConnector(
|
|
|
1010
1024
|
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
1011
1025
|
props = CfnConnectorProps(
|
|
1012
1026
|
access_role=access_role,
|
|
1013
|
-
as2_config=as2_config,
|
|
1014
1027
|
url=url,
|
|
1028
|
+
as2_config=as2_config,
|
|
1015
1029
|
logging_role=logging_role,
|
|
1030
|
+
sftp_config=sftp_config,
|
|
1016
1031
|
tags=tags,
|
|
1017
1032
|
)
|
|
1018
1033
|
|
|
@@ -1051,7 +1066,7 @@ class CfnConnector(
|
|
|
1051
1066
|
@builtins.property
|
|
1052
1067
|
@jsii.member(jsii_name="attrArn")
|
|
1053
1068
|
def attr_arn(self) -> builtins.str:
|
|
1054
|
-
'''Specifies the unique Amazon Resource Name (ARN) for the
|
|
1069
|
+
'''Specifies the unique Amazon Resource Name (ARN) for the connector.
|
|
1055
1070
|
|
|
1056
1071
|
:cloudformationAttribute: Arn
|
|
1057
1072
|
'''
|
|
@@ -1080,7 +1095,7 @@ class CfnConnector(
|
|
|
1080
1095
|
@builtins.property
|
|
1081
1096
|
@jsii.member(jsii_name="accessRole")
|
|
1082
1097
|
def access_role(self) -> builtins.str:
|
|
1083
|
-
'''
|
|
1098
|
+
'''Connectors are used to send files using either the AS2 or SFTP protocol.'''
|
|
1084
1099
|
return typing.cast(builtins.str, jsii.get(self, "accessRole"))
|
|
1085
1100
|
|
|
1086
1101
|
@access_role.setter
|
|
@@ -1090,19 +1105,6 @@ class CfnConnector(
|
|
|
1090
1105
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1091
1106
|
jsii.set(self, "accessRole", value)
|
|
1092
1107
|
|
|
1093
|
-
@builtins.property
|
|
1094
|
-
@jsii.member(jsii_name="as2Config")
|
|
1095
|
-
def as2_config(self) -> typing.Any:
|
|
1096
|
-
'''A structure that contains the parameters for an AS2 connector object.'''
|
|
1097
|
-
return typing.cast(typing.Any, jsii.get(self, "as2Config"))
|
|
1098
|
-
|
|
1099
|
-
@as2_config.setter
|
|
1100
|
-
def as2_config(self, value: typing.Any) -> None:
|
|
1101
|
-
if __debug__:
|
|
1102
|
-
type_hints = typing.get_type_hints(_typecheckingstub__b16726d88010ccba3b94afdf2e5c9f9c1e8e4dc3d9f7d56e2edf0140e687d75c)
|
|
1103
|
-
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1104
|
-
jsii.set(self, "as2Config", value)
|
|
1105
|
-
|
|
1106
1108
|
@builtins.property
|
|
1107
1109
|
@jsii.member(jsii_name="url")
|
|
1108
1110
|
def url(self) -> builtins.str:
|
|
@@ -1116,6 +1118,19 @@ class CfnConnector(
|
|
|
1116
1118
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1117
1119
|
jsii.set(self, "url", value)
|
|
1118
1120
|
|
|
1121
|
+
@builtins.property
|
|
1122
|
+
@jsii.member(jsii_name="as2Config")
|
|
1123
|
+
def as2_config(self) -> typing.Any:
|
|
1124
|
+
'''A structure that contains the parameters for an AS2 connector object.'''
|
|
1125
|
+
return typing.cast(typing.Any, jsii.get(self, "as2Config"))
|
|
1126
|
+
|
|
1127
|
+
@as2_config.setter
|
|
1128
|
+
def as2_config(self, value: typing.Any) -> None:
|
|
1129
|
+
if __debug__:
|
|
1130
|
+
type_hints = typing.get_type_hints(_typecheckingstub__b16726d88010ccba3b94afdf2e5c9f9c1e8e4dc3d9f7d56e2edf0140e687d75c)
|
|
1131
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1132
|
+
jsii.set(self, "as2Config", value)
|
|
1133
|
+
|
|
1119
1134
|
@builtins.property
|
|
1120
1135
|
@jsii.member(jsii_name="loggingRole")
|
|
1121
1136
|
def logging_role(self) -> typing.Optional[builtins.str]:
|
|
@@ -1129,6 +1144,24 @@ class CfnConnector(
|
|
|
1129
1144
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1130
1145
|
jsii.set(self, "loggingRole", value)
|
|
1131
1146
|
|
|
1147
|
+
@builtins.property
|
|
1148
|
+
@jsii.member(jsii_name="sftpConfig")
|
|
1149
|
+
def sftp_config(
|
|
1150
|
+
self,
|
|
1151
|
+
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnConnector.SftpConfigProperty"]]:
|
|
1152
|
+
'''A structure that contains the parameters for an SFTP connector object.'''
|
|
1153
|
+
return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnConnector.SftpConfigProperty"]], jsii.get(self, "sftpConfig"))
|
|
1154
|
+
|
|
1155
|
+
@sftp_config.setter
|
|
1156
|
+
def sftp_config(
|
|
1157
|
+
self,
|
|
1158
|
+
value: typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnConnector.SftpConfigProperty"]],
|
|
1159
|
+
) -> None:
|
|
1160
|
+
if __debug__:
|
|
1161
|
+
type_hints = typing.get_type_hints(_typecheckingstub__391f4dfc56c4811c4c4aedb8ffcfac5c521d440de2f0de853365abcdec435568)
|
|
1162
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1163
|
+
jsii.set(self, "sftpConfig", value)
|
|
1164
|
+
|
|
1132
1165
|
@builtins.property
|
|
1133
1166
|
@jsii.member(jsii_name="tagsRaw")
|
|
1134
1167
|
def tags_raw(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
|
|
@@ -1146,6 +1179,7 @@ class CfnConnector(
|
|
|
1146
1179
|
jsii_type="aws-cdk-lib.aws_transfer.CfnConnector.As2ConfigProperty",
|
|
1147
1180
|
jsii_struct_bases=[],
|
|
1148
1181
|
name_mapping={
|
|
1182
|
+
"basic_auth_secret_id": "basicAuthSecretId",
|
|
1149
1183
|
"compression": "compression",
|
|
1150
1184
|
"encryption_algorithm": "encryptionAlgorithm",
|
|
1151
1185
|
"local_profile_id": "localProfileId",
|
|
@@ -1160,6 +1194,7 @@ class CfnConnector(
|
|
|
1160
1194
|
def __init__(
|
|
1161
1195
|
self,
|
|
1162
1196
|
*,
|
|
1197
|
+
basic_auth_secret_id: typing.Optional[builtins.str] = None,
|
|
1163
1198
|
compression: typing.Optional[builtins.str] = None,
|
|
1164
1199
|
encryption_algorithm: typing.Optional[builtins.str] = None,
|
|
1165
1200
|
local_profile_id: typing.Optional[builtins.str] = None,
|
|
@@ -1171,6 +1206,7 @@ class CfnConnector(
|
|
|
1171
1206
|
) -> None:
|
|
1172
1207
|
'''A structure that contains the parameters for an AS2 connector object.
|
|
1173
1208
|
|
|
1209
|
+
:param basic_auth_secret_id: Provides Basic authentication support to the AS2 Connectors API. To use Basic authentication, you must provide the name or Amazon Resource Name (ARN) of a secret in AWS Secrets Manager . The default value for this parameter is ``null`` , which indicates that Basic authentication is not enabled for the connector. If the connector should use Basic authentication, the secret needs to be in the following format: ``{ "Username": "user-name", "Password": "user-password" }`` Replace ``user-name`` and ``user-password`` with the credentials for the actual user that is being authenticated. Note the following: - You are storing these credentials in Secrets Manager, *not passing them directly* into this API. - If you are using the API, SDKs, or CloudFormation to configure your connector, then you must create the secret before you can enable Basic authentication. However, if you are using the AWS management console, you can have the system create the secret for you. If you have previously enabled Basic authentication for a connector, you can disable it by using the ``UpdateConnector`` API call. For example, if you are using the CLI, you can run the following command to remove Basic authentication: ``update-connector --connector-id my-connector-id --as2-config 'BasicAuthSecretId=""'``
|
|
1174
1210
|
:param compression: Specifies whether the AS2 file is compressed.
|
|
1175
1211
|
:param encryption_algorithm: The algorithm that is used to encrypt the file. .. epigraph:: You can only specify ``NONE`` if the URL for your connector uses HTTPS. This ensures that no traffic is sent in clear text.
|
|
1176
1212
|
:param local_profile_id: A unique identifier for the AS2 local profile.
|
|
@@ -1190,6 +1226,7 @@ class CfnConnector(
|
|
|
1190
1226
|
from aws_cdk import aws_transfer as transfer
|
|
1191
1227
|
|
|
1192
1228
|
as2_config_property = transfer.CfnConnector.As2ConfigProperty(
|
|
1229
|
+
basic_auth_secret_id="basicAuthSecretId",
|
|
1193
1230
|
compression="compression",
|
|
1194
1231
|
encryption_algorithm="encryptionAlgorithm",
|
|
1195
1232
|
local_profile_id="localProfileId",
|
|
@@ -1202,6 +1239,7 @@ class CfnConnector(
|
|
|
1202
1239
|
'''
|
|
1203
1240
|
if __debug__:
|
|
1204
1241
|
type_hints = typing.get_type_hints(_typecheckingstub__328497a7bbb181a996e0747268f6105731221ad3f578e8a5ca68e405dcdd7e63)
|
|
1242
|
+
check_type(argname="argument basic_auth_secret_id", value=basic_auth_secret_id, expected_type=type_hints["basic_auth_secret_id"])
|
|
1205
1243
|
check_type(argname="argument compression", value=compression, expected_type=type_hints["compression"])
|
|
1206
1244
|
check_type(argname="argument encryption_algorithm", value=encryption_algorithm, expected_type=type_hints["encryption_algorithm"])
|
|
1207
1245
|
check_type(argname="argument local_profile_id", value=local_profile_id, expected_type=type_hints["local_profile_id"])
|
|
@@ -1211,6 +1249,8 @@ class CfnConnector(
|
|
|
1211
1249
|
check_type(argname="argument partner_profile_id", value=partner_profile_id, expected_type=type_hints["partner_profile_id"])
|
|
1212
1250
|
check_type(argname="argument signing_algorithm", value=signing_algorithm, expected_type=type_hints["signing_algorithm"])
|
|
1213
1251
|
self._values: typing.Dict[builtins.str, typing.Any] = {}
|
|
1252
|
+
if basic_auth_secret_id is not None:
|
|
1253
|
+
self._values["basic_auth_secret_id"] = basic_auth_secret_id
|
|
1214
1254
|
if compression is not None:
|
|
1215
1255
|
self._values["compression"] = compression
|
|
1216
1256
|
if encryption_algorithm is not None:
|
|
@@ -1228,6 +1268,34 @@ class CfnConnector(
|
|
|
1228
1268
|
if signing_algorithm is not None:
|
|
1229
1269
|
self._values["signing_algorithm"] = signing_algorithm
|
|
1230
1270
|
|
|
1271
|
+
@builtins.property
|
|
1272
|
+
def basic_auth_secret_id(self) -> typing.Optional[builtins.str]:
|
|
1273
|
+
'''Provides Basic authentication support to the AS2 Connectors API.
|
|
1274
|
+
|
|
1275
|
+
To use Basic authentication, you must provide the name or Amazon Resource Name (ARN) of a secret in AWS Secrets Manager .
|
|
1276
|
+
|
|
1277
|
+
The default value for this parameter is ``null`` , which indicates that Basic authentication is not enabled for the connector.
|
|
1278
|
+
|
|
1279
|
+
If the connector should use Basic authentication, the secret needs to be in the following format:
|
|
1280
|
+
|
|
1281
|
+
``{ "Username": "user-name", "Password": "user-password" }``
|
|
1282
|
+
|
|
1283
|
+
Replace ``user-name`` and ``user-password`` with the credentials for the actual user that is being authenticated.
|
|
1284
|
+
|
|
1285
|
+
Note the following:
|
|
1286
|
+
|
|
1287
|
+
- You are storing these credentials in Secrets Manager, *not passing them directly* into this API.
|
|
1288
|
+
- If you are using the API, SDKs, or CloudFormation to configure your connector, then you must create the secret before you can enable Basic authentication. However, if you are using the AWS management console, you can have the system create the secret for you.
|
|
1289
|
+
|
|
1290
|
+
If you have previously enabled Basic authentication for a connector, you can disable it by using the ``UpdateConnector`` API call. For example, if you are using the CLI, you can run the following command to remove Basic authentication:
|
|
1291
|
+
|
|
1292
|
+
``update-connector --connector-id my-connector-id --as2-config 'BasicAuthSecretId=""'``
|
|
1293
|
+
|
|
1294
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-transfer-connector-as2config.html#cfn-transfer-connector-as2config-basicauthsecretid
|
|
1295
|
+
'''
|
|
1296
|
+
result = self._values.get("basic_auth_secret_id")
|
|
1297
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
1298
|
+
|
|
1231
1299
|
@builtins.property
|
|
1232
1300
|
def compression(self) -> typing.Optional[builtins.str]:
|
|
1233
1301
|
'''Specifies whether the AS2 file is compressed.
|
|
@@ -1324,15 +1392,100 @@ class CfnConnector(
|
|
|
1324
1392
|
k + "=" + repr(v) for k, v in self._values.items()
|
|
1325
1393
|
)
|
|
1326
1394
|
|
|
1395
|
+
@jsii.data_type(
|
|
1396
|
+
jsii_type="aws-cdk-lib.aws_transfer.CfnConnector.SftpConfigProperty",
|
|
1397
|
+
jsii_struct_bases=[],
|
|
1398
|
+
name_mapping={
|
|
1399
|
+
"trusted_host_keys": "trustedHostKeys",
|
|
1400
|
+
"user_secret_id": "userSecretId",
|
|
1401
|
+
},
|
|
1402
|
+
)
|
|
1403
|
+
class SftpConfigProperty:
|
|
1404
|
+
def __init__(
|
|
1405
|
+
self,
|
|
1406
|
+
*,
|
|
1407
|
+
trusted_host_keys: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
1408
|
+
user_secret_id: typing.Optional[builtins.str] = None,
|
|
1409
|
+
) -> None:
|
|
1410
|
+
'''A structure that contains the parameters for an SFTP connector object.
|
|
1411
|
+
|
|
1412
|
+
:param trusted_host_keys: The public portion of the host key, or keys, that are used to authenticate the user to the external server to which you are connecting. You can use the ``ssh-keyscan`` command against the SFTP server to retrieve the necessary key. The three standard SSH public key format elements are ``<key type>`` , ``<body base64>`` , and an optional ``<comment>`` , with spaces between each element. For the trusted host key, AWS Transfer Family accepts RSA and ECDSA keys. - For RSA keys, the key type is ``ssh-rsa`` . - For ECDSA keys, the key type is either ``ecdsa-sha2-nistp256`` , ``ecdsa-sha2-nistp384`` , or ``ecdsa-sha2-nistp521`` , depending on the size of the key you generated.
|
|
1413
|
+
:param user_secret_id: The identifier for the secret (in AWS Secrets Manager) that contains the SFTP user's private key, password, or both. The identifier can be either the Amazon Resource Name (ARN) or the name of the secret.
|
|
1414
|
+
|
|
1415
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-transfer-connector-sftpconfig.html
|
|
1416
|
+
:exampleMetadata: fixture=_generated
|
|
1417
|
+
|
|
1418
|
+
Example::
|
|
1419
|
+
|
|
1420
|
+
# The code below shows an example of how to instantiate this type.
|
|
1421
|
+
# The values are placeholders you should change.
|
|
1422
|
+
from aws_cdk import aws_transfer as transfer
|
|
1423
|
+
|
|
1424
|
+
sftp_config_property = transfer.CfnConnector.SftpConfigProperty(
|
|
1425
|
+
trusted_host_keys=["trustedHostKeys"],
|
|
1426
|
+
user_secret_id="userSecretId"
|
|
1427
|
+
)
|
|
1428
|
+
'''
|
|
1429
|
+
if __debug__:
|
|
1430
|
+
type_hints = typing.get_type_hints(_typecheckingstub__f4f8d4be2ad63a06a458c41605c9c21318e1d9117d48f21b9ee2ea6bb109d2e8)
|
|
1431
|
+
check_type(argname="argument trusted_host_keys", value=trusted_host_keys, expected_type=type_hints["trusted_host_keys"])
|
|
1432
|
+
check_type(argname="argument user_secret_id", value=user_secret_id, expected_type=type_hints["user_secret_id"])
|
|
1433
|
+
self._values: typing.Dict[builtins.str, typing.Any] = {}
|
|
1434
|
+
if trusted_host_keys is not None:
|
|
1435
|
+
self._values["trusted_host_keys"] = trusted_host_keys
|
|
1436
|
+
if user_secret_id is not None:
|
|
1437
|
+
self._values["user_secret_id"] = user_secret_id
|
|
1438
|
+
|
|
1439
|
+
@builtins.property
|
|
1440
|
+
def trusted_host_keys(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
1441
|
+
'''The public portion of the host key, or keys, that are used to authenticate the user to the external server to which you are connecting.
|
|
1442
|
+
|
|
1443
|
+
You can use the ``ssh-keyscan`` command against the SFTP server to retrieve the necessary key.
|
|
1444
|
+
|
|
1445
|
+
The three standard SSH public key format elements are ``<key type>`` , ``<body base64>`` , and an optional ``<comment>`` , with spaces between each element.
|
|
1446
|
+
|
|
1447
|
+
For the trusted host key, AWS Transfer Family accepts RSA and ECDSA keys.
|
|
1448
|
+
|
|
1449
|
+
- For RSA keys, the key type is ``ssh-rsa`` .
|
|
1450
|
+
- For ECDSA keys, the key type is either ``ecdsa-sha2-nistp256`` , ``ecdsa-sha2-nistp384`` , or ``ecdsa-sha2-nistp521`` , depending on the size of the key you generated.
|
|
1451
|
+
|
|
1452
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-transfer-connector-sftpconfig.html#cfn-transfer-connector-sftpconfig-trustedhostkeys
|
|
1453
|
+
'''
|
|
1454
|
+
result = self._values.get("trusted_host_keys")
|
|
1455
|
+
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
1456
|
+
|
|
1457
|
+
@builtins.property
|
|
1458
|
+
def user_secret_id(self) -> typing.Optional[builtins.str]:
|
|
1459
|
+
'''The identifier for the secret (in AWS Secrets Manager) that contains the SFTP user's private key, password, or both.
|
|
1460
|
+
|
|
1461
|
+
The identifier can be either the Amazon Resource Name (ARN) or the name of the secret.
|
|
1462
|
+
|
|
1463
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-transfer-connector-sftpconfig.html#cfn-transfer-connector-sftpconfig-usersecretid
|
|
1464
|
+
'''
|
|
1465
|
+
result = self._values.get("user_secret_id")
|
|
1466
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
1467
|
+
|
|
1468
|
+
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
1469
|
+
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
1470
|
+
|
|
1471
|
+
def __ne__(self, rhs: typing.Any) -> builtins.bool:
|
|
1472
|
+
return not (rhs == self)
|
|
1473
|
+
|
|
1474
|
+
def __repr__(self) -> str:
|
|
1475
|
+
return "SftpConfigProperty(%s)" % ", ".join(
|
|
1476
|
+
k + "=" + repr(v) for k, v in self._values.items()
|
|
1477
|
+
)
|
|
1478
|
+
|
|
1327
1479
|
|
|
1328
1480
|
@jsii.data_type(
|
|
1329
1481
|
jsii_type="aws-cdk-lib.aws_transfer.CfnConnectorProps",
|
|
1330
1482
|
jsii_struct_bases=[],
|
|
1331
1483
|
name_mapping={
|
|
1332
1484
|
"access_role": "accessRole",
|
|
1333
|
-
"as2_config": "as2Config",
|
|
1334
1485
|
"url": "url",
|
|
1486
|
+
"as2_config": "as2Config",
|
|
1335
1487
|
"logging_role": "loggingRole",
|
|
1488
|
+
"sftp_config": "sftpConfig",
|
|
1336
1489
|
"tags": "tags",
|
|
1337
1490
|
},
|
|
1338
1491
|
)
|
|
@@ -1341,17 +1494,19 @@ class CfnConnectorProps:
|
|
|
1341
1494
|
self,
|
|
1342
1495
|
*,
|
|
1343
1496
|
access_role: builtins.str,
|
|
1344
|
-
as2_config: typing.Any,
|
|
1345
1497
|
url: builtins.str,
|
|
1498
|
+
as2_config: typing.Any = None,
|
|
1346
1499
|
logging_role: typing.Optional[builtins.str] = None,
|
|
1500
|
+
sftp_config: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnConnector.SftpConfigProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
1347
1501
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
1348
1502
|
) -> None:
|
|
1349
1503
|
'''Properties for defining a ``CfnConnector``.
|
|
1350
1504
|
|
|
1351
|
-
:param access_role: With AS2, you can send files by calling ``StartFileTransfer`` and specifying the file paths in the request parameter, ``SendFilePaths`` . We use the file’s parent directory (for example, for ``--send-file-paths /bucket/dir/file.txt`` , parent directory is ``/bucket/dir/`` ) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the ``AccessRole`` needs to provide read and write access to the parent directory of the file location used in the ``StartFileTransfer`` request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with ``StartFileTransfer`` . If you are using Basic authentication for your AS2 connector, the access role requires the ``secretsmanager:GetSecretValue`` permission for the secret. If the secret is encrypted using a customer-managed key instead of the AWS managed key in Secrets Manager, then the role also needs the ``kms:Decrypt`` permission for that key.
|
|
1352
|
-
:param as2_config: A structure that contains the parameters for an AS2 connector object.
|
|
1505
|
+
:param access_role: Connectors are used to send files using either the AS2 or SFTP protocol. For the access role, provide the Amazon Resource Name (ARN) of the AWS Identity and Access Management role to use. *For AS2 connectors* With AS2, you can send files by calling ``StartFileTransfer`` and specifying the file paths in the request parameter, ``SendFilePaths`` . We use the file’s parent directory (for example, for ``--send-file-paths /bucket/dir/file.txt`` , parent directory is ``/bucket/dir/`` ) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the ``AccessRole`` needs to provide read and write access to the parent directory of the file location used in the ``StartFileTransfer`` request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with ``StartFileTransfer`` . If you are using Basic authentication for your AS2 connector, the access role requires the ``secretsmanager:GetSecretValue`` permission for the secret. If the secret is encrypted using a customer-managed key instead of the AWS managed key in Secrets Manager, then the role also needs the ``kms:Decrypt`` permission for that key. *For SFTP connectors* Make sure that the access role provides read and write access to the parent directory of the file location that's used in the ``StartFileTransfer`` request. Additionally, make sure that the role provides ``secretsmanager:GetSecretValue`` permission to AWS Secrets Manager .
|
|
1353
1506
|
:param url: The URL of the partner's AS2 or SFTP endpoint.
|
|
1507
|
+
:param as2_config: A structure that contains the parameters for an AS2 connector object.
|
|
1354
1508
|
:param logging_role: The Amazon Resource Name (ARN) of the AWS Identity and Access Management (IAM) role that allows a connector to turn on CloudWatch logging for Amazon S3 events. When set, you can view connector activity in your CloudWatch logs.
|
|
1509
|
+
:param sftp_config: A structure that contains the parameters for an SFTP connector object.
|
|
1355
1510
|
:param tags: Key-value pairs that can be used to group and search for connectors.
|
|
1356
1511
|
|
|
1357
1512
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-transfer-connector.html
|
|
@@ -1367,11 +1522,15 @@ class CfnConnectorProps:
|
|
|
1367
1522
|
|
|
1368
1523
|
cfn_connector_props = transfer.CfnConnectorProps(
|
|
1369
1524
|
access_role="accessRole",
|
|
1370
|
-
as2_config=as2_config,
|
|
1371
1525
|
url="url",
|
|
1372
1526
|
|
|
1373
1527
|
# the properties below are optional
|
|
1528
|
+
as2_config=as2_config,
|
|
1374
1529
|
logging_role="loggingRole",
|
|
1530
|
+
sftp_config=transfer.CfnConnector.SftpConfigProperty(
|
|
1531
|
+
trusted_host_keys=["trustedHostKeys"],
|
|
1532
|
+
user_secret_id="userSecretId"
|
|
1533
|
+
),
|
|
1375
1534
|
tags=[CfnTag(
|
|
1376
1535
|
key="key",
|
|
1377
1536
|
value="value"
|
|
@@ -1381,44 +1540,46 @@ class CfnConnectorProps:
|
|
|
1381
1540
|
if __debug__:
|
|
1382
1541
|
type_hints = typing.get_type_hints(_typecheckingstub__7675f9dcded8f51977cf70f499821100319fe5d62996cb917457f772cfcc9a2e)
|
|
1383
1542
|
check_type(argname="argument access_role", value=access_role, expected_type=type_hints["access_role"])
|
|
1384
|
-
check_type(argname="argument as2_config", value=as2_config, expected_type=type_hints["as2_config"])
|
|
1385
1543
|
check_type(argname="argument url", value=url, expected_type=type_hints["url"])
|
|
1544
|
+
check_type(argname="argument as2_config", value=as2_config, expected_type=type_hints["as2_config"])
|
|
1386
1545
|
check_type(argname="argument logging_role", value=logging_role, expected_type=type_hints["logging_role"])
|
|
1546
|
+
check_type(argname="argument sftp_config", value=sftp_config, expected_type=type_hints["sftp_config"])
|
|
1387
1547
|
check_type(argname="argument tags", value=tags, expected_type=type_hints["tags"])
|
|
1388
1548
|
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
1389
1549
|
"access_role": access_role,
|
|
1390
|
-
"as2_config": as2_config,
|
|
1391
1550
|
"url": url,
|
|
1392
1551
|
}
|
|
1552
|
+
if as2_config is not None:
|
|
1553
|
+
self._values["as2_config"] = as2_config
|
|
1393
1554
|
if logging_role is not None:
|
|
1394
1555
|
self._values["logging_role"] = logging_role
|
|
1556
|
+
if sftp_config is not None:
|
|
1557
|
+
self._values["sftp_config"] = sftp_config
|
|
1395
1558
|
if tags is not None:
|
|
1396
1559
|
self._values["tags"] = tags
|
|
1397
1560
|
|
|
1398
1561
|
@builtins.property
|
|
1399
1562
|
def access_role(self) -> builtins.str:
|
|
1400
|
-
'''
|
|
1563
|
+
'''Connectors are used to send files using either the AS2 or SFTP protocol.
|
|
1564
|
+
|
|
1565
|
+
For the access role, provide the Amazon Resource Name (ARN) of the AWS Identity and Access Management role to use.
|
|
1566
|
+
|
|
1567
|
+
*For AS2 connectors*
|
|
1401
1568
|
|
|
1402
|
-
We use the file’s parent directory (for example, for ``--send-file-paths /bucket/dir/file.txt`` , parent directory is ``/bucket/dir/`` ) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the ``AccessRole`` needs to provide read and write access to the parent directory of the file location used in the ``StartFileTransfer`` request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with ``StartFileTransfer`` .
|
|
1569
|
+
With AS2, you can send files by calling ``StartFileTransfer`` and specifying the file paths in the request parameter, ``SendFilePaths`` . We use the file’s parent directory (for example, for ``--send-file-paths /bucket/dir/file.txt`` , parent directory is ``/bucket/dir/`` ) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the ``AccessRole`` needs to provide read and write access to the parent directory of the file location used in the ``StartFileTransfer`` request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with ``StartFileTransfer`` .
|
|
1403
1570
|
|
|
1404
1571
|
If you are using Basic authentication for your AS2 connector, the access role requires the ``secretsmanager:GetSecretValue`` permission for the secret. If the secret is encrypted using a customer-managed key instead of the AWS managed key in Secrets Manager, then the role also needs the ``kms:Decrypt`` permission for that key.
|
|
1405
1572
|
|
|
1573
|
+
*For SFTP connectors*
|
|
1574
|
+
|
|
1575
|
+
Make sure that the access role provides read and write access to the parent directory of the file location that's used in the ``StartFileTransfer`` request. Additionally, make sure that the role provides ``secretsmanager:GetSecretValue`` permission to AWS Secrets Manager .
|
|
1576
|
+
|
|
1406
1577
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-transfer-connector.html#cfn-transfer-connector-accessrole
|
|
1407
1578
|
'''
|
|
1408
1579
|
result = self._values.get("access_role")
|
|
1409
1580
|
assert result is not None, "Required property 'access_role' is missing"
|
|
1410
1581
|
return typing.cast(builtins.str, result)
|
|
1411
1582
|
|
|
1412
|
-
@builtins.property
|
|
1413
|
-
def as2_config(self) -> typing.Any:
|
|
1414
|
-
'''A structure that contains the parameters for an AS2 connector object.
|
|
1415
|
-
|
|
1416
|
-
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-transfer-connector.html#cfn-transfer-connector-as2config
|
|
1417
|
-
'''
|
|
1418
|
-
result = self._values.get("as2_config")
|
|
1419
|
-
assert result is not None, "Required property 'as2_config' is missing"
|
|
1420
|
-
return typing.cast(typing.Any, result)
|
|
1421
|
-
|
|
1422
1583
|
@builtins.property
|
|
1423
1584
|
def url(self) -> builtins.str:
|
|
1424
1585
|
'''The URL of the partner's AS2 or SFTP endpoint.
|
|
@@ -1429,6 +1590,15 @@ class CfnConnectorProps:
|
|
|
1429
1590
|
assert result is not None, "Required property 'url' is missing"
|
|
1430
1591
|
return typing.cast(builtins.str, result)
|
|
1431
1592
|
|
|
1593
|
+
@builtins.property
|
|
1594
|
+
def as2_config(self) -> typing.Any:
|
|
1595
|
+
'''A structure that contains the parameters for an AS2 connector object.
|
|
1596
|
+
|
|
1597
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-transfer-connector.html#cfn-transfer-connector-as2config
|
|
1598
|
+
'''
|
|
1599
|
+
result = self._values.get("as2_config")
|
|
1600
|
+
return typing.cast(typing.Any, result)
|
|
1601
|
+
|
|
1432
1602
|
@builtins.property
|
|
1433
1603
|
def logging_role(self) -> typing.Optional[builtins.str]:
|
|
1434
1604
|
'''The Amazon Resource Name (ARN) of the AWS Identity and Access Management (IAM) role that allows a connector to turn on CloudWatch logging for Amazon S3 events.
|
|
@@ -1440,6 +1610,17 @@ class CfnConnectorProps:
|
|
|
1440
1610
|
result = self._values.get("logging_role")
|
|
1441
1611
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
1442
1612
|
|
|
1613
|
+
@builtins.property
|
|
1614
|
+
def sftp_config(
|
|
1615
|
+
self,
|
|
1616
|
+
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, CfnConnector.SftpConfigProperty]]:
|
|
1617
|
+
'''A structure that contains the parameters for an SFTP connector object.
|
|
1618
|
+
|
|
1619
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-transfer-connector.html#cfn-transfer-connector-sftpconfig
|
|
1620
|
+
'''
|
|
1621
|
+
result = self._values.get("sftp_config")
|
|
1622
|
+
return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, CfnConnector.SftpConfigProperty]], result)
|
|
1623
|
+
|
|
1443
1624
|
@builtins.property
|
|
1444
1625
|
def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
|
|
1445
1626
|
'''Key-value pairs that can be used to group and search for connectors.
|
|
@@ -5740,9 +5921,10 @@ def _typecheckingstub__2a3d92be7ab611ebe6dbf531ad899c2a95b3655fb829aeffdf52fdb11
|
|
|
5740
5921
|
id: builtins.str,
|
|
5741
5922
|
*,
|
|
5742
5923
|
access_role: builtins.str,
|
|
5743
|
-
as2_config: typing.Any,
|
|
5744
5924
|
url: builtins.str,
|
|
5925
|
+
as2_config: typing.Any = None,
|
|
5745
5926
|
logging_role: typing.Optional[builtins.str] = None,
|
|
5927
|
+
sftp_config: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnConnector.SftpConfigProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
5746
5928
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
5747
5929
|
) -> None:
|
|
5748
5930
|
"""Type checking stubs"""
|
|
@@ -5766,14 +5948,14 @@ def _typecheckingstub__9f4bab9f1a3e47eaac0c429ed6125ef23e8b2d8f33fac6396c2ef4a60
|
|
|
5766
5948
|
"""Type checking stubs"""
|
|
5767
5949
|
pass
|
|
5768
5950
|
|
|
5769
|
-
def
|
|
5770
|
-
value:
|
|
5951
|
+
def _typecheckingstub__7f2f8d48aab925fcdb11fb86f8b12aeae11aa8b85048a7ded27a817b5864536d(
|
|
5952
|
+
value: builtins.str,
|
|
5771
5953
|
) -> None:
|
|
5772
5954
|
"""Type checking stubs"""
|
|
5773
5955
|
pass
|
|
5774
5956
|
|
|
5775
|
-
def
|
|
5776
|
-
value:
|
|
5957
|
+
def _typecheckingstub__b16726d88010ccba3b94afdf2e5c9f9c1e8e4dc3d9f7d56e2edf0140e687d75c(
|
|
5958
|
+
value: typing.Any,
|
|
5777
5959
|
) -> None:
|
|
5778
5960
|
"""Type checking stubs"""
|
|
5779
5961
|
pass
|
|
@@ -5784,6 +5966,12 @@ def _typecheckingstub__f6fd1718d368db980c8cf49c237a691317f958db670b242715c5440aa
|
|
|
5784
5966
|
"""Type checking stubs"""
|
|
5785
5967
|
pass
|
|
5786
5968
|
|
|
5969
|
+
def _typecheckingstub__391f4dfc56c4811c4c4aedb8ffcfac5c521d440de2f0de853365abcdec435568(
|
|
5970
|
+
value: typing.Optional[typing.Union[_IResolvable_da3f097b, CfnConnector.SftpConfigProperty]],
|
|
5971
|
+
) -> None:
|
|
5972
|
+
"""Type checking stubs"""
|
|
5973
|
+
pass
|
|
5974
|
+
|
|
5787
5975
|
def _typecheckingstub__207f7abcb769a2e1717d82ad1c8c7df0c05b8d8d3d89a23127362727dcd65473(
|
|
5788
5976
|
value: typing.Optional[typing.List[_CfnTag_f6864754]],
|
|
5789
5977
|
) -> None:
|
|
@@ -5792,6 +5980,7 @@ def _typecheckingstub__207f7abcb769a2e1717d82ad1c8c7df0c05b8d8d3d89a23127362727d
|
|
|
5792
5980
|
|
|
5793
5981
|
def _typecheckingstub__328497a7bbb181a996e0747268f6105731221ad3f578e8a5ca68e405dcdd7e63(
|
|
5794
5982
|
*,
|
|
5983
|
+
basic_auth_secret_id: typing.Optional[builtins.str] = None,
|
|
5795
5984
|
compression: typing.Optional[builtins.str] = None,
|
|
5796
5985
|
encryption_algorithm: typing.Optional[builtins.str] = None,
|
|
5797
5986
|
local_profile_id: typing.Optional[builtins.str] = None,
|
|
@@ -5804,12 +5993,21 @@ def _typecheckingstub__328497a7bbb181a996e0747268f6105731221ad3f578e8a5ca68e405d
|
|
|
5804
5993
|
"""Type checking stubs"""
|
|
5805
5994
|
pass
|
|
5806
5995
|
|
|
5996
|
+
def _typecheckingstub__f4f8d4be2ad63a06a458c41605c9c21318e1d9117d48f21b9ee2ea6bb109d2e8(
|
|
5997
|
+
*,
|
|
5998
|
+
trusted_host_keys: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
5999
|
+
user_secret_id: typing.Optional[builtins.str] = None,
|
|
6000
|
+
) -> None:
|
|
6001
|
+
"""Type checking stubs"""
|
|
6002
|
+
pass
|
|
6003
|
+
|
|
5807
6004
|
def _typecheckingstub__7675f9dcded8f51977cf70f499821100319fe5d62996cb917457f772cfcc9a2e(
|
|
5808
6005
|
*,
|
|
5809
6006
|
access_role: builtins.str,
|
|
5810
|
-
as2_config: typing.Any,
|
|
5811
6007
|
url: builtins.str,
|
|
6008
|
+
as2_config: typing.Any = None,
|
|
5812
6009
|
logging_role: typing.Optional[builtins.str] = None,
|
|
6010
|
+
sftp_config: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnConnector.SftpConfigProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
5813
6011
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
5814
6012
|
) -> None:
|
|
5815
6013
|
"""Type checking stubs"""
|