aws-cdk-lib 2.90.0__py3-none-any.whl → 2.92.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

Files changed (55) hide show
  1. aws_cdk/__init__.py +22 -4
  2. aws_cdk/_jsii/__init__.py +2 -2
  3. aws_cdk/_jsii/{aws-cdk-lib@2.90.0.jsii.tgz → aws-cdk-lib@2.92.0.jsii.tgz} +0 -0
  4. aws_cdk/aws_appstream/__init__.py +3 -3
  5. aws_cdk/aws_batch/__init__.py +39 -18
  6. aws_cdk/aws_billingconductor/__init__.py +44 -13
  7. aws_cdk/aws_cleanrooms/__init__.py +2 -4
  8. aws_cdk/aws_cloudtrail/__init__.py +35 -10
  9. aws_cdk/aws_cloudwatch/__init__.py +3 -3
  10. aws_cdk/aws_codebuild/__init__.py +7 -7
  11. aws_cdk/aws_cognito/__init__.py +8 -8
  12. aws_cdk/aws_config/__init__.py +220 -0
  13. aws_cdk/aws_datasync/__init__.py +22 -35
  14. aws_cdk/aws_dms/__init__.py +909 -4
  15. aws_cdk/aws_dynamodb/__init__.py +0 -1
  16. aws_cdk/aws_ec2/__init__.py +59 -21
  17. aws_cdk/aws_ecs/__init__.py +45 -21
  18. aws_cdk/aws_evidently/__init__.py +3 -3
  19. aws_cdk/aws_fsx/__init__.py +6 -5
  20. aws_cdk/aws_glue/__init__.py +438 -10
  21. aws_cdk/aws_guardduty/__init__.py +60 -17
  22. aws_cdk/aws_iam/__init__.py +8 -9
  23. aws_cdk/aws_iot/__init__.py +5 -1
  24. aws_cdk/aws_kms/__init__.py +95 -47
  25. aws_cdk/aws_lambda/__init__.py +4 -2
  26. aws_cdk/aws_lambda_nodejs/__init__.py +3 -3
  27. aws_cdk/aws_mediatailor/__init__.py +2902 -892
  28. aws_cdk/aws_mwaa/__init__.py +13 -8
  29. aws_cdk/aws_neptune/__init__.py +50 -2
  30. aws_cdk/aws_omics/__init__.py +80 -0
  31. aws_cdk/aws_opensearchserverless/__init__.py +3 -3
  32. aws_cdk/aws_opensearchservice/__init__.py +247 -14
  33. aws_cdk/aws_organizations/__init__.py +17 -17
  34. aws_cdk/aws_personalize/__init__.py +41 -25
  35. aws_cdk/aws_rds/__init__.py +24 -10
  36. aws_cdk/aws_resiliencehub/__init__.py +22 -22
  37. aws_cdk/aws_rolesanywhere/__init__.py +58 -74
  38. aws_cdk/aws_route53/__init__.py +3 -1
  39. aws_cdk/aws_s3/__init__.py +17 -7
  40. aws_cdk/aws_sagemaker/__init__.py +396 -5
  41. aws_cdk/aws_sns/__init__.py +8 -8
  42. aws_cdk/aws_sqs/__init__.py +231 -4
  43. aws_cdk/aws_ssm/__init__.py +6 -28
  44. aws_cdk/aws_stepfunctions/__init__.py +7 -7
  45. aws_cdk/aws_timestream/__init__.py +243 -0
  46. aws_cdk/aws_transfer/__init__.py +250 -52
  47. aws_cdk/aws_vpclattice/__init__.py +10 -6
  48. aws_cdk/aws_wafv2/__init__.py +7517 -5036
  49. aws_cdk/custom_resources/__init__.py +18 -30
  50. {aws_cdk_lib-2.90.0.dist-info → aws_cdk_lib-2.92.0.dist-info}/METADATA +8 -8
  51. {aws_cdk_lib-2.90.0.dist-info → aws_cdk_lib-2.92.0.dist-info}/RECORD +55 -55
  52. {aws_cdk_lib-2.90.0.dist-info → aws_cdk_lib-2.92.0.dist-info}/WHEEL +1 -1
  53. {aws_cdk_lib-2.90.0.dist-info → aws_cdk_lib-2.92.0.dist-info}/LICENSE +0 -0
  54. {aws_cdk_lib-2.90.0.dist-info → aws_cdk_lib-2.92.0.dist-info}/NOTICE +0 -0
  55. {aws_cdk_lib-2.90.0.dist-info → aws_cdk_lib-2.92.0.dist-info}/top_level.txt +0 -0
@@ -106,7 +106,7 @@ class CfnAgreement(
106
106
  '''
107
107
  :param scope: Scope in which this resource is defined.
108
108
  :param id: Construct identifier for this resource (unique in its scope).
109
- :param access_role: With AS2, you can send files by calling ``StartFileTransfer`` and specifying the file paths in the request parameter, ``SendFilePaths`` . We use the file’s parent directory (for example, for ``--send-file-paths /bucket/dir/file.txt`` , parent directory is ``/bucket/dir/`` ) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the ``AccessRole`` needs to provide read and write access to the parent directory of the file location used in the ``StartFileTransfer`` request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with ``StartFileTransfer`` . If you are using Basic authentication for your AS2 connector, the access role requires the ``secretsmanager:GetSecretValue`` permission for the secret. If the secret is encrypted using a customer-managed key instead of the AWS managed key in Secrets Manager, then the role also needs the ``kms:Decrypt`` permission for that key.
109
+ :param access_role: Connectors are used to send files using either the AS2 or SFTP protocol. For the access role, provide the Amazon Resource Name (ARN) of the AWS Identity and Access Management role to use. *For AS2 connectors* With AS2, you can send files by calling ``StartFileTransfer`` and specifying the file paths in the request parameter, ``SendFilePaths`` . We use the file’s parent directory (for example, for ``--send-file-paths /bucket/dir/file.txt`` , parent directory is ``/bucket/dir/`` ) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the ``AccessRole`` needs to provide read and write access to the parent directory of the file location used in the ``StartFileTransfer`` request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with ``StartFileTransfer`` . If you are using Basic authentication for your AS2 connector, the access role requires the ``secretsmanager:GetSecretValue`` permission for the secret. If the secret is encrypted using a customer-managed key instead of the AWS managed key in Secrets Manager, then the role also needs the ``kms:Decrypt`` permission for that key. *For SFTP connectors* Make sure that the access role provides read and write access to the parent directory of the file location that's used in the ``StartFileTransfer`` request. Additionally, make sure that the role provides ``secretsmanager:GetSecretValue`` permission to AWS Secrets Manager .
110
110
  :param base_directory: The landing directory (folder) for files that are transferred by using the AS2 protocol.
111
111
  :param local_profile_id: A unique identifier for the AS2 local profile.
112
112
  :param partner_profile_id: A unique identifier for the partner profile used in the agreement.
@@ -194,7 +194,7 @@ class CfnAgreement(
194
194
  @builtins.property
195
195
  @jsii.member(jsii_name="accessRole")
196
196
  def access_role(self) -> builtins.str:
197
- '''With AS2, you can send files by calling ``StartFileTransfer`` and specifying the file paths in the request parameter, ``SendFilePaths`` .'''
197
+ '''Connectors are used to send files using either the AS2 or SFTP protocol.'''
198
198
  return typing.cast(builtins.str, jsii.get(self, "accessRole"))
199
199
 
200
200
  @access_role.setter
@@ -325,7 +325,7 @@ class CfnAgreementProps:
325
325
  ) -> None:
326
326
  '''Properties for defining a ``CfnAgreement``.
327
327
 
328
- :param access_role: With AS2, you can send files by calling ``StartFileTransfer`` and specifying the file paths in the request parameter, ``SendFilePaths`` . We use the file’s parent directory (for example, for ``--send-file-paths /bucket/dir/file.txt`` , parent directory is ``/bucket/dir/`` ) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the ``AccessRole`` needs to provide read and write access to the parent directory of the file location used in the ``StartFileTransfer`` request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with ``StartFileTransfer`` . If you are using Basic authentication for your AS2 connector, the access role requires the ``secretsmanager:GetSecretValue`` permission for the secret. If the secret is encrypted using a customer-managed key instead of the AWS managed key in Secrets Manager, then the role also needs the ``kms:Decrypt`` permission for that key.
328
+ :param access_role: Connectors are used to send files using either the AS2 or SFTP protocol. For the access role, provide the Amazon Resource Name (ARN) of the AWS Identity and Access Management role to use. *For AS2 connectors* With AS2, you can send files by calling ``StartFileTransfer`` and specifying the file paths in the request parameter, ``SendFilePaths`` . We use the file’s parent directory (for example, for ``--send-file-paths /bucket/dir/file.txt`` , parent directory is ``/bucket/dir/`` ) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the ``AccessRole`` needs to provide read and write access to the parent directory of the file location used in the ``StartFileTransfer`` request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with ``StartFileTransfer`` . If you are using Basic authentication for your AS2 connector, the access role requires the ``secretsmanager:GetSecretValue`` permission for the secret. If the secret is encrypted using a customer-managed key instead of the AWS managed key in Secrets Manager, then the role also needs the ``kms:Decrypt`` permission for that key. *For SFTP connectors* Make sure that the access role provides read and write access to the parent directory of the file location that's used in the ``StartFileTransfer`` request. Additionally, make sure that the role provides ``secretsmanager:GetSecretValue`` permission to AWS Secrets Manager .
329
329
  :param base_directory: The landing directory (folder) for files that are transferred by using the AS2 protocol.
330
330
  :param local_profile_id: A unique identifier for the AS2 local profile.
331
331
  :param partner_profile_id: A unique identifier for the partner profile used in the agreement.
@@ -385,12 +385,20 @@ class CfnAgreementProps:
385
385
 
386
386
  @builtins.property
387
387
  def access_role(self) -> builtins.str:
388
- '''With AS2, you can send files by calling ``StartFileTransfer`` and specifying the file paths in the request parameter, ``SendFilePaths`` .
388
+ '''Connectors are used to send files using either the AS2 or SFTP protocol.
389
389
 
390
- We use the file’s parent directory (for example, for ``--send-file-paths /bucket/dir/file.txt`` , parent directory is ``/bucket/dir/`` ) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the ``AccessRole`` needs to provide read and write access to the parent directory of the file location used in the ``StartFileTransfer`` request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with ``StartFileTransfer`` .
390
+ For the access role, provide the Amazon Resource Name (ARN) of the AWS Identity and Access Management role to use.
391
+
392
+ *For AS2 connectors*
393
+
394
+ With AS2, you can send files by calling ``StartFileTransfer`` and specifying the file paths in the request parameter, ``SendFilePaths`` . We use the file’s parent directory (for example, for ``--send-file-paths /bucket/dir/file.txt`` , parent directory is ``/bucket/dir/`` ) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the ``AccessRole`` needs to provide read and write access to the parent directory of the file location used in the ``StartFileTransfer`` request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with ``StartFileTransfer`` .
391
395
 
392
396
  If you are using Basic authentication for your AS2 connector, the access role requires the ``secretsmanager:GetSecretValue`` permission for the secret. If the secret is encrypted using a customer-managed key instead of the AWS managed key in Secrets Manager, then the role also needs the ``kms:Decrypt`` permission for that key.
393
397
 
398
+ *For SFTP connectors*
399
+
400
+ Make sure that the access role provides read and write access to the parent directory of the file location that's used in the ``StartFileTransfer`` request. Additionally, make sure that the role provides ``secretsmanager:GetSecretValue`` permission to AWS Secrets Manager .
401
+
394
402
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-transfer-agreement.html#cfn-transfer-agreement-accessrole
395
403
  '''
396
404
  result = self._values.get("access_role")
@@ -952,9 +960,9 @@ class CfnConnector(
952
960
  metaclass=jsii.JSIIMeta,
953
961
  jsii_type="aws-cdk-lib.aws_transfer.CfnConnector",
954
962
  ):
955
- '''Creates the connector, which captures the parameters for an outbound connection for the AS2 or SFTP protocol.
963
+ '''Creates the connector, which captures the parameters for a connection for the AS2 or SFTP protocol.
956
964
 
957
- The connector is required for sending files to an externally hosted AS2 or SFTP server. For more details about AS2 connectors, see `Create AS2 connectors <https://docs.aws.amazon.com/transfer/latest/userguide/create-b2b-server.html#configure-as2-connector>`_ .
965
+ For AS2, the connector is required for sending files to an externally hosted AS2 server. For SFTP, the connector is required when sending files to an SFTP server or receiving files from an SFTP server. For more details about connectors, see `Create AS2 connectors <https://docs.aws.amazon.com/transfer/latest/userguide/create-b2b-server.html#configure-as2-connector>`_ and `Create SFTP connectors <https://docs.aws.amazon.com/transfer/latest/userguide/configure-sftp-connector.html>`_ .
958
966
  .. epigraph::
959
967
 
960
968
  You must specify exactly one configuration object: either for AS2 ( ``As2Config`` ) or SFTP ( ``SftpConfig`` ).
@@ -972,11 +980,15 @@ class CfnConnector(
972
980
 
973
981
  cfn_connector = transfer.CfnConnector(self, "MyCfnConnector",
974
982
  access_role="accessRole",
975
- as2_config=as2_config,
976
983
  url="url",
977
984
 
978
985
  # the properties below are optional
986
+ as2_config=as2_config,
979
987
  logging_role="loggingRole",
988
+ sftp_config=transfer.CfnConnector.SftpConfigProperty(
989
+ trusted_host_keys=["trustedHostKeys"],
990
+ user_secret_id="userSecretId"
991
+ ),
980
992
  tags=[CfnTag(
981
993
  key="key",
982
994
  value="value"
@@ -990,18 +1002,20 @@ class CfnConnector(
990
1002
  id: builtins.str,
991
1003
  *,
992
1004
  access_role: builtins.str,
993
- as2_config: typing.Any,
994
1005
  url: builtins.str,
1006
+ as2_config: typing.Any = None,
995
1007
  logging_role: typing.Optional[builtins.str] = None,
1008
+ sftp_config: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnConnector.SftpConfigProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
996
1009
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
997
1010
  ) -> None:
998
1011
  '''
999
1012
  :param scope: Scope in which this resource is defined.
1000
1013
  :param id: Construct identifier for this resource (unique in its scope).
1001
- :param access_role: With AS2, you can send files by calling ``StartFileTransfer`` and specifying the file paths in the request parameter, ``SendFilePaths`` . We use the file’s parent directory (for example, for ``--send-file-paths /bucket/dir/file.txt`` , parent directory is ``/bucket/dir/`` ) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the ``AccessRole`` needs to provide read and write access to the parent directory of the file location used in the ``StartFileTransfer`` request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with ``StartFileTransfer`` . If you are using Basic authentication for your AS2 connector, the access role requires the ``secretsmanager:GetSecretValue`` permission for the secret. If the secret is encrypted using a customer-managed key instead of the AWS managed key in Secrets Manager, then the role also needs the ``kms:Decrypt`` permission for that key.
1002
- :param as2_config: A structure that contains the parameters for an AS2 connector object.
1014
+ :param access_role: Connectors are used to send files using either the AS2 or SFTP protocol. For the access role, provide the Amazon Resource Name (ARN) of the AWS Identity and Access Management role to use. *For AS2 connectors* With AS2, you can send files by calling ``StartFileTransfer`` and specifying the file paths in the request parameter, ``SendFilePaths`` . We use the file’s parent directory (for example, for ``--send-file-paths /bucket/dir/file.txt`` , parent directory is ``/bucket/dir/`` ) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the ``AccessRole`` needs to provide read and write access to the parent directory of the file location used in the ``StartFileTransfer`` request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with ``StartFileTransfer`` . If you are using Basic authentication for your AS2 connector, the access role requires the ``secretsmanager:GetSecretValue`` permission for the secret. If the secret is encrypted using a customer-managed key instead of the AWS managed key in Secrets Manager, then the role also needs the ``kms:Decrypt`` permission for that key. *For SFTP connectors* Make sure that the access role provides read and write access to the parent directory of the file location that's used in the ``StartFileTransfer`` request. Additionally, make sure that the role provides ``secretsmanager:GetSecretValue`` permission to AWS Secrets Manager .
1003
1015
  :param url: The URL of the partner's AS2 or SFTP endpoint.
1016
+ :param as2_config: A structure that contains the parameters for an AS2 connector object.
1004
1017
  :param logging_role: The Amazon Resource Name (ARN) of the AWS Identity and Access Management (IAM) role that allows a connector to turn on CloudWatch logging for Amazon S3 events. When set, you can view connector activity in your CloudWatch logs.
1018
+ :param sftp_config: A structure that contains the parameters for an SFTP connector object.
1005
1019
  :param tags: Key-value pairs that can be used to group and search for connectors.
1006
1020
  '''
1007
1021
  if __debug__:
@@ -1010,9 +1024,10 @@ class CfnConnector(
1010
1024
  check_type(argname="argument id", value=id, expected_type=type_hints["id"])
1011
1025
  props = CfnConnectorProps(
1012
1026
  access_role=access_role,
1013
- as2_config=as2_config,
1014
1027
  url=url,
1028
+ as2_config=as2_config,
1015
1029
  logging_role=logging_role,
1030
+ sftp_config=sftp_config,
1016
1031
  tags=tags,
1017
1032
  )
1018
1033
 
@@ -1051,7 +1066,7 @@ class CfnConnector(
1051
1066
  @builtins.property
1052
1067
  @jsii.member(jsii_name="attrArn")
1053
1068
  def attr_arn(self) -> builtins.str:
1054
- '''Specifies the unique Amazon Resource Name (ARN) for the workflow.
1069
+ '''Specifies the unique Amazon Resource Name (ARN) for the connector.
1055
1070
 
1056
1071
  :cloudformationAttribute: Arn
1057
1072
  '''
@@ -1080,7 +1095,7 @@ class CfnConnector(
1080
1095
  @builtins.property
1081
1096
  @jsii.member(jsii_name="accessRole")
1082
1097
  def access_role(self) -> builtins.str:
1083
- '''With AS2, you can send files by calling ``StartFileTransfer`` and specifying the file paths in the request parameter, ``SendFilePaths`` .'''
1098
+ '''Connectors are used to send files using either the AS2 or SFTP protocol.'''
1084
1099
  return typing.cast(builtins.str, jsii.get(self, "accessRole"))
1085
1100
 
1086
1101
  @access_role.setter
@@ -1090,19 +1105,6 @@ class CfnConnector(
1090
1105
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1091
1106
  jsii.set(self, "accessRole", value)
1092
1107
 
1093
- @builtins.property
1094
- @jsii.member(jsii_name="as2Config")
1095
- def as2_config(self) -> typing.Any:
1096
- '''A structure that contains the parameters for an AS2 connector object.'''
1097
- return typing.cast(typing.Any, jsii.get(self, "as2Config"))
1098
-
1099
- @as2_config.setter
1100
- def as2_config(self, value: typing.Any) -> None:
1101
- if __debug__:
1102
- type_hints = typing.get_type_hints(_typecheckingstub__b16726d88010ccba3b94afdf2e5c9f9c1e8e4dc3d9f7d56e2edf0140e687d75c)
1103
- check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1104
- jsii.set(self, "as2Config", value)
1105
-
1106
1108
  @builtins.property
1107
1109
  @jsii.member(jsii_name="url")
1108
1110
  def url(self) -> builtins.str:
@@ -1116,6 +1118,19 @@ class CfnConnector(
1116
1118
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1117
1119
  jsii.set(self, "url", value)
1118
1120
 
1121
+ @builtins.property
1122
+ @jsii.member(jsii_name="as2Config")
1123
+ def as2_config(self) -> typing.Any:
1124
+ '''A structure that contains the parameters for an AS2 connector object.'''
1125
+ return typing.cast(typing.Any, jsii.get(self, "as2Config"))
1126
+
1127
+ @as2_config.setter
1128
+ def as2_config(self, value: typing.Any) -> None:
1129
+ if __debug__:
1130
+ type_hints = typing.get_type_hints(_typecheckingstub__b16726d88010ccba3b94afdf2e5c9f9c1e8e4dc3d9f7d56e2edf0140e687d75c)
1131
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1132
+ jsii.set(self, "as2Config", value)
1133
+
1119
1134
  @builtins.property
1120
1135
  @jsii.member(jsii_name="loggingRole")
1121
1136
  def logging_role(self) -> typing.Optional[builtins.str]:
@@ -1129,6 +1144,24 @@ class CfnConnector(
1129
1144
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1130
1145
  jsii.set(self, "loggingRole", value)
1131
1146
 
1147
+ @builtins.property
1148
+ @jsii.member(jsii_name="sftpConfig")
1149
+ def sftp_config(
1150
+ self,
1151
+ ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnConnector.SftpConfigProperty"]]:
1152
+ '''A structure that contains the parameters for an SFTP connector object.'''
1153
+ return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnConnector.SftpConfigProperty"]], jsii.get(self, "sftpConfig"))
1154
+
1155
+ @sftp_config.setter
1156
+ def sftp_config(
1157
+ self,
1158
+ value: typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnConnector.SftpConfigProperty"]],
1159
+ ) -> None:
1160
+ if __debug__:
1161
+ type_hints = typing.get_type_hints(_typecheckingstub__391f4dfc56c4811c4c4aedb8ffcfac5c521d440de2f0de853365abcdec435568)
1162
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1163
+ jsii.set(self, "sftpConfig", value)
1164
+
1132
1165
  @builtins.property
1133
1166
  @jsii.member(jsii_name="tagsRaw")
1134
1167
  def tags_raw(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
@@ -1146,6 +1179,7 @@ class CfnConnector(
1146
1179
  jsii_type="aws-cdk-lib.aws_transfer.CfnConnector.As2ConfigProperty",
1147
1180
  jsii_struct_bases=[],
1148
1181
  name_mapping={
1182
+ "basic_auth_secret_id": "basicAuthSecretId",
1149
1183
  "compression": "compression",
1150
1184
  "encryption_algorithm": "encryptionAlgorithm",
1151
1185
  "local_profile_id": "localProfileId",
@@ -1160,6 +1194,7 @@ class CfnConnector(
1160
1194
  def __init__(
1161
1195
  self,
1162
1196
  *,
1197
+ basic_auth_secret_id: typing.Optional[builtins.str] = None,
1163
1198
  compression: typing.Optional[builtins.str] = None,
1164
1199
  encryption_algorithm: typing.Optional[builtins.str] = None,
1165
1200
  local_profile_id: typing.Optional[builtins.str] = None,
@@ -1171,6 +1206,7 @@ class CfnConnector(
1171
1206
  ) -> None:
1172
1207
  '''A structure that contains the parameters for an AS2 connector object.
1173
1208
 
1209
+ :param basic_auth_secret_id: Provides Basic authentication support to the AS2 Connectors API. To use Basic authentication, you must provide the name or Amazon Resource Name (ARN) of a secret in AWS Secrets Manager . The default value for this parameter is ``null`` , which indicates that Basic authentication is not enabled for the connector. If the connector should use Basic authentication, the secret needs to be in the following format: ``{ "Username": "user-name", "Password": "user-password" }`` Replace ``user-name`` and ``user-password`` with the credentials for the actual user that is being authenticated. Note the following: - You are storing these credentials in Secrets Manager, *not passing them directly* into this API. - If you are using the API, SDKs, or CloudFormation to configure your connector, then you must create the secret before you can enable Basic authentication. However, if you are using the AWS management console, you can have the system create the secret for you. If you have previously enabled Basic authentication for a connector, you can disable it by using the ``UpdateConnector`` API call. For example, if you are using the CLI, you can run the following command to remove Basic authentication: ``update-connector --connector-id my-connector-id --as2-config 'BasicAuthSecretId=""'``
1174
1210
  :param compression: Specifies whether the AS2 file is compressed.
1175
1211
  :param encryption_algorithm: The algorithm that is used to encrypt the file. .. epigraph:: You can only specify ``NONE`` if the URL for your connector uses HTTPS. This ensures that no traffic is sent in clear text.
1176
1212
  :param local_profile_id: A unique identifier for the AS2 local profile.
@@ -1190,6 +1226,7 @@ class CfnConnector(
1190
1226
  from aws_cdk import aws_transfer as transfer
1191
1227
 
1192
1228
  as2_config_property = transfer.CfnConnector.As2ConfigProperty(
1229
+ basic_auth_secret_id="basicAuthSecretId",
1193
1230
  compression="compression",
1194
1231
  encryption_algorithm="encryptionAlgorithm",
1195
1232
  local_profile_id="localProfileId",
@@ -1202,6 +1239,7 @@ class CfnConnector(
1202
1239
  '''
1203
1240
  if __debug__:
1204
1241
  type_hints = typing.get_type_hints(_typecheckingstub__328497a7bbb181a996e0747268f6105731221ad3f578e8a5ca68e405dcdd7e63)
1242
+ check_type(argname="argument basic_auth_secret_id", value=basic_auth_secret_id, expected_type=type_hints["basic_auth_secret_id"])
1205
1243
  check_type(argname="argument compression", value=compression, expected_type=type_hints["compression"])
1206
1244
  check_type(argname="argument encryption_algorithm", value=encryption_algorithm, expected_type=type_hints["encryption_algorithm"])
1207
1245
  check_type(argname="argument local_profile_id", value=local_profile_id, expected_type=type_hints["local_profile_id"])
@@ -1211,6 +1249,8 @@ class CfnConnector(
1211
1249
  check_type(argname="argument partner_profile_id", value=partner_profile_id, expected_type=type_hints["partner_profile_id"])
1212
1250
  check_type(argname="argument signing_algorithm", value=signing_algorithm, expected_type=type_hints["signing_algorithm"])
1213
1251
  self._values: typing.Dict[builtins.str, typing.Any] = {}
1252
+ if basic_auth_secret_id is not None:
1253
+ self._values["basic_auth_secret_id"] = basic_auth_secret_id
1214
1254
  if compression is not None:
1215
1255
  self._values["compression"] = compression
1216
1256
  if encryption_algorithm is not None:
@@ -1228,6 +1268,34 @@ class CfnConnector(
1228
1268
  if signing_algorithm is not None:
1229
1269
  self._values["signing_algorithm"] = signing_algorithm
1230
1270
 
1271
+ @builtins.property
1272
+ def basic_auth_secret_id(self) -> typing.Optional[builtins.str]:
1273
+ '''Provides Basic authentication support to the AS2 Connectors API.
1274
+
1275
+ To use Basic authentication, you must provide the name or Amazon Resource Name (ARN) of a secret in AWS Secrets Manager .
1276
+
1277
+ The default value for this parameter is ``null`` , which indicates that Basic authentication is not enabled for the connector.
1278
+
1279
+ If the connector should use Basic authentication, the secret needs to be in the following format:
1280
+
1281
+ ``{ "Username": "user-name", "Password": "user-password" }``
1282
+
1283
+ Replace ``user-name`` and ``user-password`` with the credentials for the actual user that is being authenticated.
1284
+
1285
+ Note the following:
1286
+
1287
+ - You are storing these credentials in Secrets Manager, *not passing them directly* into this API.
1288
+ - If you are using the API, SDKs, or CloudFormation to configure your connector, then you must create the secret before you can enable Basic authentication. However, if you are using the AWS management console, you can have the system create the secret for you.
1289
+
1290
+ If you have previously enabled Basic authentication for a connector, you can disable it by using the ``UpdateConnector`` API call. For example, if you are using the CLI, you can run the following command to remove Basic authentication:
1291
+
1292
+ ``update-connector --connector-id my-connector-id --as2-config 'BasicAuthSecretId=""'``
1293
+
1294
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-transfer-connector-as2config.html#cfn-transfer-connector-as2config-basicauthsecretid
1295
+ '''
1296
+ result = self._values.get("basic_auth_secret_id")
1297
+ return typing.cast(typing.Optional[builtins.str], result)
1298
+
1231
1299
  @builtins.property
1232
1300
  def compression(self) -> typing.Optional[builtins.str]:
1233
1301
  '''Specifies whether the AS2 file is compressed.
@@ -1324,15 +1392,100 @@ class CfnConnector(
1324
1392
  k + "=" + repr(v) for k, v in self._values.items()
1325
1393
  )
1326
1394
 
1395
+ @jsii.data_type(
1396
+ jsii_type="aws-cdk-lib.aws_transfer.CfnConnector.SftpConfigProperty",
1397
+ jsii_struct_bases=[],
1398
+ name_mapping={
1399
+ "trusted_host_keys": "trustedHostKeys",
1400
+ "user_secret_id": "userSecretId",
1401
+ },
1402
+ )
1403
+ class SftpConfigProperty:
1404
+ def __init__(
1405
+ self,
1406
+ *,
1407
+ trusted_host_keys: typing.Optional[typing.Sequence[builtins.str]] = None,
1408
+ user_secret_id: typing.Optional[builtins.str] = None,
1409
+ ) -> None:
1410
+ '''A structure that contains the parameters for an SFTP connector object.
1411
+
1412
+ :param trusted_host_keys: The public portion of the host key, or keys, that are used to authenticate the user to the external server to which you are connecting. You can use the ``ssh-keyscan`` command against the SFTP server to retrieve the necessary key. The three standard SSH public key format elements are ``<key type>`` , ``<body base64>`` , and an optional ``<comment>`` , with spaces between each element. For the trusted host key, AWS Transfer Family accepts RSA and ECDSA keys. - For RSA keys, the key type is ``ssh-rsa`` . - For ECDSA keys, the key type is either ``ecdsa-sha2-nistp256`` , ``ecdsa-sha2-nistp384`` , or ``ecdsa-sha2-nistp521`` , depending on the size of the key you generated.
1413
+ :param user_secret_id: The identifier for the secret (in AWS Secrets Manager) that contains the SFTP user's private key, password, or both. The identifier can be either the Amazon Resource Name (ARN) or the name of the secret.
1414
+
1415
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-transfer-connector-sftpconfig.html
1416
+ :exampleMetadata: fixture=_generated
1417
+
1418
+ Example::
1419
+
1420
+ # The code below shows an example of how to instantiate this type.
1421
+ # The values are placeholders you should change.
1422
+ from aws_cdk import aws_transfer as transfer
1423
+
1424
+ sftp_config_property = transfer.CfnConnector.SftpConfigProperty(
1425
+ trusted_host_keys=["trustedHostKeys"],
1426
+ user_secret_id="userSecretId"
1427
+ )
1428
+ '''
1429
+ if __debug__:
1430
+ type_hints = typing.get_type_hints(_typecheckingstub__f4f8d4be2ad63a06a458c41605c9c21318e1d9117d48f21b9ee2ea6bb109d2e8)
1431
+ check_type(argname="argument trusted_host_keys", value=trusted_host_keys, expected_type=type_hints["trusted_host_keys"])
1432
+ check_type(argname="argument user_secret_id", value=user_secret_id, expected_type=type_hints["user_secret_id"])
1433
+ self._values: typing.Dict[builtins.str, typing.Any] = {}
1434
+ if trusted_host_keys is not None:
1435
+ self._values["trusted_host_keys"] = trusted_host_keys
1436
+ if user_secret_id is not None:
1437
+ self._values["user_secret_id"] = user_secret_id
1438
+
1439
+ @builtins.property
1440
+ def trusted_host_keys(self) -> typing.Optional[typing.List[builtins.str]]:
1441
+ '''The public portion of the host key, or keys, that are used to authenticate the user to the external server to which you are connecting.
1442
+
1443
+ You can use the ``ssh-keyscan`` command against the SFTP server to retrieve the necessary key.
1444
+
1445
+ The three standard SSH public key format elements are ``<key type>`` , ``<body base64>`` , and an optional ``<comment>`` , with spaces between each element.
1446
+
1447
+ For the trusted host key, AWS Transfer Family accepts RSA and ECDSA keys.
1448
+
1449
+ - For RSA keys, the key type is ``ssh-rsa`` .
1450
+ - For ECDSA keys, the key type is either ``ecdsa-sha2-nistp256`` , ``ecdsa-sha2-nistp384`` , or ``ecdsa-sha2-nistp521`` , depending on the size of the key you generated.
1451
+
1452
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-transfer-connector-sftpconfig.html#cfn-transfer-connector-sftpconfig-trustedhostkeys
1453
+ '''
1454
+ result = self._values.get("trusted_host_keys")
1455
+ return typing.cast(typing.Optional[typing.List[builtins.str]], result)
1456
+
1457
+ @builtins.property
1458
+ def user_secret_id(self) -> typing.Optional[builtins.str]:
1459
+ '''The identifier for the secret (in AWS Secrets Manager) that contains the SFTP user's private key, password, or both.
1460
+
1461
+ The identifier can be either the Amazon Resource Name (ARN) or the name of the secret.
1462
+
1463
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-transfer-connector-sftpconfig.html#cfn-transfer-connector-sftpconfig-usersecretid
1464
+ '''
1465
+ result = self._values.get("user_secret_id")
1466
+ return typing.cast(typing.Optional[builtins.str], result)
1467
+
1468
+ def __eq__(self, rhs: typing.Any) -> builtins.bool:
1469
+ return isinstance(rhs, self.__class__) and rhs._values == self._values
1470
+
1471
+ def __ne__(self, rhs: typing.Any) -> builtins.bool:
1472
+ return not (rhs == self)
1473
+
1474
+ def __repr__(self) -> str:
1475
+ return "SftpConfigProperty(%s)" % ", ".join(
1476
+ k + "=" + repr(v) for k, v in self._values.items()
1477
+ )
1478
+
1327
1479
 
1328
1480
  @jsii.data_type(
1329
1481
  jsii_type="aws-cdk-lib.aws_transfer.CfnConnectorProps",
1330
1482
  jsii_struct_bases=[],
1331
1483
  name_mapping={
1332
1484
  "access_role": "accessRole",
1333
- "as2_config": "as2Config",
1334
1485
  "url": "url",
1486
+ "as2_config": "as2Config",
1335
1487
  "logging_role": "loggingRole",
1488
+ "sftp_config": "sftpConfig",
1336
1489
  "tags": "tags",
1337
1490
  },
1338
1491
  )
@@ -1341,17 +1494,19 @@ class CfnConnectorProps:
1341
1494
  self,
1342
1495
  *,
1343
1496
  access_role: builtins.str,
1344
- as2_config: typing.Any,
1345
1497
  url: builtins.str,
1498
+ as2_config: typing.Any = None,
1346
1499
  logging_role: typing.Optional[builtins.str] = None,
1500
+ sftp_config: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnConnector.SftpConfigProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
1347
1501
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
1348
1502
  ) -> None:
1349
1503
  '''Properties for defining a ``CfnConnector``.
1350
1504
 
1351
- :param access_role: With AS2, you can send files by calling ``StartFileTransfer`` and specifying the file paths in the request parameter, ``SendFilePaths`` . We use the file’s parent directory (for example, for ``--send-file-paths /bucket/dir/file.txt`` , parent directory is ``/bucket/dir/`` ) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the ``AccessRole`` needs to provide read and write access to the parent directory of the file location used in the ``StartFileTransfer`` request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with ``StartFileTransfer`` . If you are using Basic authentication for your AS2 connector, the access role requires the ``secretsmanager:GetSecretValue`` permission for the secret. If the secret is encrypted using a customer-managed key instead of the AWS managed key in Secrets Manager, then the role also needs the ``kms:Decrypt`` permission for that key.
1352
- :param as2_config: A structure that contains the parameters for an AS2 connector object.
1505
+ :param access_role: Connectors are used to send files using either the AS2 or SFTP protocol. For the access role, provide the Amazon Resource Name (ARN) of the AWS Identity and Access Management role to use. *For AS2 connectors* With AS2, you can send files by calling ``StartFileTransfer`` and specifying the file paths in the request parameter, ``SendFilePaths`` . We use the file’s parent directory (for example, for ``--send-file-paths /bucket/dir/file.txt`` , parent directory is ``/bucket/dir/`` ) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the ``AccessRole`` needs to provide read and write access to the parent directory of the file location used in the ``StartFileTransfer`` request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with ``StartFileTransfer`` . If you are using Basic authentication for your AS2 connector, the access role requires the ``secretsmanager:GetSecretValue`` permission for the secret. If the secret is encrypted using a customer-managed key instead of the AWS managed key in Secrets Manager, then the role also needs the ``kms:Decrypt`` permission for that key. *For SFTP connectors* Make sure that the access role provides read and write access to the parent directory of the file location that's used in the ``StartFileTransfer`` request. Additionally, make sure that the role provides ``secretsmanager:GetSecretValue`` permission to AWS Secrets Manager .
1353
1506
  :param url: The URL of the partner's AS2 or SFTP endpoint.
1507
+ :param as2_config: A structure that contains the parameters for an AS2 connector object.
1354
1508
  :param logging_role: The Amazon Resource Name (ARN) of the AWS Identity and Access Management (IAM) role that allows a connector to turn on CloudWatch logging for Amazon S3 events. When set, you can view connector activity in your CloudWatch logs.
1509
+ :param sftp_config: A structure that contains the parameters for an SFTP connector object.
1355
1510
  :param tags: Key-value pairs that can be used to group and search for connectors.
1356
1511
 
1357
1512
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-transfer-connector.html
@@ -1367,11 +1522,15 @@ class CfnConnectorProps:
1367
1522
 
1368
1523
  cfn_connector_props = transfer.CfnConnectorProps(
1369
1524
  access_role="accessRole",
1370
- as2_config=as2_config,
1371
1525
  url="url",
1372
1526
 
1373
1527
  # the properties below are optional
1528
+ as2_config=as2_config,
1374
1529
  logging_role="loggingRole",
1530
+ sftp_config=transfer.CfnConnector.SftpConfigProperty(
1531
+ trusted_host_keys=["trustedHostKeys"],
1532
+ user_secret_id="userSecretId"
1533
+ ),
1375
1534
  tags=[CfnTag(
1376
1535
  key="key",
1377
1536
  value="value"
@@ -1381,44 +1540,46 @@ class CfnConnectorProps:
1381
1540
  if __debug__:
1382
1541
  type_hints = typing.get_type_hints(_typecheckingstub__7675f9dcded8f51977cf70f499821100319fe5d62996cb917457f772cfcc9a2e)
1383
1542
  check_type(argname="argument access_role", value=access_role, expected_type=type_hints["access_role"])
1384
- check_type(argname="argument as2_config", value=as2_config, expected_type=type_hints["as2_config"])
1385
1543
  check_type(argname="argument url", value=url, expected_type=type_hints["url"])
1544
+ check_type(argname="argument as2_config", value=as2_config, expected_type=type_hints["as2_config"])
1386
1545
  check_type(argname="argument logging_role", value=logging_role, expected_type=type_hints["logging_role"])
1546
+ check_type(argname="argument sftp_config", value=sftp_config, expected_type=type_hints["sftp_config"])
1387
1547
  check_type(argname="argument tags", value=tags, expected_type=type_hints["tags"])
1388
1548
  self._values: typing.Dict[builtins.str, typing.Any] = {
1389
1549
  "access_role": access_role,
1390
- "as2_config": as2_config,
1391
1550
  "url": url,
1392
1551
  }
1552
+ if as2_config is not None:
1553
+ self._values["as2_config"] = as2_config
1393
1554
  if logging_role is not None:
1394
1555
  self._values["logging_role"] = logging_role
1556
+ if sftp_config is not None:
1557
+ self._values["sftp_config"] = sftp_config
1395
1558
  if tags is not None:
1396
1559
  self._values["tags"] = tags
1397
1560
 
1398
1561
  @builtins.property
1399
1562
  def access_role(self) -> builtins.str:
1400
- '''With AS2, you can send files by calling ``StartFileTransfer`` and specifying the file paths in the request parameter, ``SendFilePaths`` .
1563
+ '''Connectors are used to send files using either the AS2 or SFTP protocol.
1564
+
1565
+ For the access role, provide the Amazon Resource Name (ARN) of the AWS Identity and Access Management role to use.
1566
+
1567
+ *For AS2 connectors*
1401
1568
 
1402
- We use the file’s parent directory (for example, for ``--send-file-paths /bucket/dir/file.txt`` , parent directory is ``/bucket/dir/`` ) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the ``AccessRole`` needs to provide read and write access to the parent directory of the file location used in the ``StartFileTransfer`` request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with ``StartFileTransfer`` .
1569
+ With AS2, you can send files by calling ``StartFileTransfer`` and specifying the file paths in the request parameter, ``SendFilePaths`` . We use the file’s parent directory (for example, for ``--send-file-paths /bucket/dir/file.txt`` , parent directory is ``/bucket/dir/`` ) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the ``AccessRole`` needs to provide read and write access to the parent directory of the file location used in the ``StartFileTransfer`` request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with ``StartFileTransfer`` .
1403
1570
 
1404
1571
  If you are using Basic authentication for your AS2 connector, the access role requires the ``secretsmanager:GetSecretValue`` permission for the secret. If the secret is encrypted using a customer-managed key instead of the AWS managed key in Secrets Manager, then the role also needs the ``kms:Decrypt`` permission for that key.
1405
1572
 
1573
+ *For SFTP connectors*
1574
+
1575
+ Make sure that the access role provides read and write access to the parent directory of the file location that's used in the ``StartFileTransfer`` request. Additionally, make sure that the role provides ``secretsmanager:GetSecretValue`` permission to AWS Secrets Manager .
1576
+
1406
1577
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-transfer-connector.html#cfn-transfer-connector-accessrole
1407
1578
  '''
1408
1579
  result = self._values.get("access_role")
1409
1580
  assert result is not None, "Required property 'access_role' is missing"
1410
1581
  return typing.cast(builtins.str, result)
1411
1582
 
1412
- @builtins.property
1413
- def as2_config(self) -> typing.Any:
1414
- '''A structure that contains the parameters for an AS2 connector object.
1415
-
1416
- :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-transfer-connector.html#cfn-transfer-connector-as2config
1417
- '''
1418
- result = self._values.get("as2_config")
1419
- assert result is not None, "Required property 'as2_config' is missing"
1420
- return typing.cast(typing.Any, result)
1421
-
1422
1583
  @builtins.property
1423
1584
  def url(self) -> builtins.str:
1424
1585
  '''The URL of the partner's AS2 or SFTP endpoint.
@@ -1429,6 +1590,15 @@ class CfnConnectorProps:
1429
1590
  assert result is not None, "Required property 'url' is missing"
1430
1591
  return typing.cast(builtins.str, result)
1431
1592
 
1593
+ @builtins.property
1594
+ def as2_config(self) -> typing.Any:
1595
+ '''A structure that contains the parameters for an AS2 connector object.
1596
+
1597
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-transfer-connector.html#cfn-transfer-connector-as2config
1598
+ '''
1599
+ result = self._values.get("as2_config")
1600
+ return typing.cast(typing.Any, result)
1601
+
1432
1602
  @builtins.property
1433
1603
  def logging_role(self) -> typing.Optional[builtins.str]:
1434
1604
  '''The Amazon Resource Name (ARN) of the AWS Identity and Access Management (IAM) role that allows a connector to turn on CloudWatch logging for Amazon S3 events.
@@ -1440,6 +1610,17 @@ class CfnConnectorProps:
1440
1610
  result = self._values.get("logging_role")
1441
1611
  return typing.cast(typing.Optional[builtins.str], result)
1442
1612
 
1613
+ @builtins.property
1614
+ def sftp_config(
1615
+ self,
1616
+ ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, CfnConnector.SftpConfigProperty]]:
1617
+ '''A structure that contains the parameters for an SFTP connector object.
1618
+
1619
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-transfer-connector.html#cfn-transfer-connector-sftpconfig
1620
+ '''
1621
+ result = self._values.get("sftp_config")
1622
+ return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, CfnConnector.SftpConfigProperty]], result)
1623
+
1443
1624
  @builtins.property
1444
1625
  def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
1445
1626
  '''Key-value pairs that can be used to group and search for connectors.
@@ -5740,9 +5921,10 @@ def _typecheckingstub__2a3d92be7ab611ebe6dbf531ad899c2a95b3655fb829aeffdf52fdb11
5740
5921
  id: builtins.str,
5741
5922
  *,
5742
5923
  access_role: builtins.str,
5743
- as2_config: typing.Any,
5744
5924
  url: builtins.str,
5925
+ as2_config: typing.Any = None,
5745
5926
  logging_role: typing.Optional[builtins.str] = None,
5927
+ sftp_config: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnConnector.SftpConfigProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
5746
5928
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
5747
5929
  ) -> None:
5748
5930
  """Type checking stubs"""
@@ -5766,14 +5948,14 @@ def _typecheckingstub__9f4bab9f1a3e47eaac0c429ed6125ef23e8b2d8f33fac6396c2ef4a60
5766
5948
  """Type checking stubs"""
5767
5949
  pass
5768
5950
 
5769
- def _typecheckingstub__b16726d88010ccba3b94afdf2e5c9f9c1e8e4dc3d9f7d56e2edf0140e687d75c(
5770
- value: typing.Any,
5951
+ def _typecheckingstub__7f2f8d48aab925fcdb11fb86f8b12aeae11aa8b85048a7ded27a817b5864536d(
5952
+ value: builtins.str,
5771
5953
  ) -> None:
5772
5954
  """Type checking stubs"""
5773
5955
  pass
5774
5956
 
5775
- def _typecheckingstub__7f2f8d48aab925fcdb11fb86f8b12aeae11aa8b85048a7ded27a817b5864536d(
5776
- value: builtins.str,
5957
+ def _typecheckingstub__b16726d88010ccba3b94afdf2e5c9f9c1e8e4dc3d9f7d56e2edf0140e687d75c(
5958
+ value: typing.Any,
5777
5959
  ) -> None:
5778
5960
  """Type checking stubs"""
5779
5961
  pass
@@ -5784,6 +5966,12 @@ def _typecheckingstub__f6fd1718d368db980c8cf49c237a691317f958db670b242715c5440aa
5784
5966
  """Type checking stubs"""
5785
5967
  pass
5786
5968
 
5969
+ def _typecheckingstub__391f4dfc56c4811c4c4aedb8ffcfac5c521d440de2f0de853365abcdec435568(
5970
+ value: typing.Optional[typing.Union[_IResolvable_da3f097b, CfnConnector.SftpConfigProperty]],
5971
+ ) -> None:
5972
+ """Type checking stubs"""
5973
+ pass
5974
+
5787
5975
  def _typecheckingstub__207f7abcb769a2e1717d82ad1c8c7df0c05b8d8d3d89a23127362727dcd65473(
5788
5976
  value: typing.Optional[typing.List[_CfnTag_f6864754]],
5789
5977
  ) -> None:
@@ -5792,6 +5980,7 @@ def _typecheckingstub__207f7abcb769a2e1717d82ad1c8c7df0c05b8d8d3d89a23127362727d
5792
5980
 
5793
5981
  def _typecheckingstub__328497a7bbb181a996e0747268f6105731221ad3f578e8a5ca68e405dcdd7e63(
5794
5982
  *,
5983
+ basic_auth_secret_id: typing.Optional[builtins.str] = None,
5795
5984
  compression: typing.Optional[builtins.str] = None,
5796
5985
  encryption_algorithm: typing.Optional[builtins.str] = None,
5797
5986
  local_profile_id: typing.Optional[builtins.str] = None,
@@ -5804,12 +5993,21 @@ def _typecheckingstub__328497a7bbb181a996e0747268f6105731221ad3f578e8a5ca68e405d
5804
5993
  """Type checking stubs"""
5805
5994
  pass
5806
5995
 
5996
+ def _typecheckingstub__f4f8d4be2ad63a06a458c41605c9c21318e1d9117d48f21b9ee2ea6bb109d2e8(
5997
+ *,
5998
+ trusted_host_keys: typing.Optional[typing.Sequence[builtins.str]] = None,
5999
+ user_secret_id: typing.Optional[builtins.str] = None,
6000
+ ) -> None:
6001
+ """Type checking stubs"""
6002
+ pass
6003
+
5807
6004
  def _typecheckingstub__7675f9dcded8f51977cf70f499821100319fe5d62996cb917457f772cfcc9a2e(
5808
6005
  *,
5809
6006
  access_role: builtins.str,
5810
- as2_config: typing.Any,
5811
6007
  url: builtins.str,
6008
+ as2_config: typing.Any = None,
5812
6009
  logging_role: typing.Optional[builtins.str] = None,
6010
+ sftp_config: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnConnector.SftpConfigProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
5813
6011
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
5814
6012
  ) -> None:
5815
6013
  """Type checking stubs"""