Skip to content

Commit e0c0d9c

Browse files
author
AWS
committed
AWS Transfer Family Update: This release adds support for Amazon EFS, so customers can transfer files over SFTP, FTPS and FTP in and out of Amazon S3 as well as Amazon EFS.
1 parent 556ac16 commit e0c0d9c

File tree

2 files changed

+42
-0
lines changed

2 files changed

+42
-0
lines changed
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
{
2+
"type": "feature",
3+
"category": "AWS Transfer Family",
4+
"contributor": "",
5+
"description": "This release adds support for Amazon EFS, so customers can transfer files over SFTP, FTPS and FTP in and out of Amazon S3 as well as Amazon EFS."
6+
}

services/transfer/src/main/resources/codegen-resources/service-2.json

Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -384,6 +384,7 @@
384384
"shape":"Certificate",
385385
"documentation":"<p>The Amazon Resource Name (ARN) of the AWS Certificate Manager (ACM) certificate. Required when <code>Protocols</code> is set to <code>FTPS</code>.</p> <p>To request a new public certificate, see <a href=\"https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-public.html\">Request a public certificate</a> in the <i> AWS Certificate Manager User Guide</i>.</p> <p>To import an existing certificate into ACM, see <a href=\"https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html\">Importing certificates into ACM</a> in the <i> AWS Certificate Manager User Guide</i>.</p> <p>To request a private certificate to use FTPS through private IP addresses, see <a href=\"https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-private.html\">Request a private certificate</a> in the <i> AWS Certificate Manager User Guide</i>.</p> <p>Certificates with the following cryptographic algorithms and key sizes are supported:</p> <ul> <li> <p>2048-bit RSA (RSA_2048)</p> </li> <li> <p>4096-bit RSA (RSA_4096)</p> </li> <li> <p>Elliptic Prime Curve 256 bit (EC_prime256v1)</p> </li> <li> <p>Elliptic Prime Curve 384 bit (EC_secp384r1)</p> </li> <li> <p>Elliptic Prime Curve 521 bit (EC_secp521r1)</p> </li> </ul> <note> <p>The certificate must be a valid SSL/TLS X.509 version 3 certificate with FQDN or IP address specified and information about the issuer.</p> </note>"
386386
},
387+
"Domain":{"shape":"Domain"},
387388
"EndpointDetails":{
388389
"shape":"EndpointDetails",
389390
"documentation":"<p>The virtual private cloud (VPC) endpoint settings that are configured for your server. When you host your endpoint within your VPC, you can make it accessible only to resources within your VPC, or you can attach Elastic IPs and make it accessible to clients over the internet. Your VPC's default security groups are automatically assigned to your endpoint.</p>"
@@ -456,6 +457,7 @@
456457
"shape":"Policy",
457458
"documentation":"<p>A scope-down policy for your user so you can use the same IAM role across multiple users. This policy scopes down user access to portions of their Amazon S3 bucket. Variables that you can use inside this policy include <code>${Transfer:UserName}</code>, <code>${Transfer:HomeDirectory}</code>, and <code>${Transfer:HomeBucket}</code>.</p> <note> <p>For scope-down policies, AWS Transfer Family stores the policy as a JSON blob, instead of the Amazon Resource Name (ARN) of the policy. You save the policy as a JSON blob and pass it in the <code>Policy</code> argument.</p> <p>For an example of a scope-down policy, see <a href=\"https://docs.aws.amazon.com/transfer/latest/userguide/users.html#users-policies-scope-down\">Creating a scope-down policy</a>.</p> <p>For more information, see <a href=\"https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRole.html\">AssumeRole</a> in the <i>AWS Security Token Service API Reference</i>.</p> </note>"
458459
},
460+
"PosixProfile":{"shape":"PosixProfile"},
459461
"Role":{
460462
"shape":"Role",
461463
"documentation":"<p>The IAM role that controls your users' access to your Amazon S3 bucket. The policies attached to this role will determine the level of access you want to provide your users when transferring files into and out of your Amazon S3 bucket or buckets. The IAM role should also contain a trust relationship that allows the server to access your resources when servicing your users' transfer requests.</p>"
@@ -662,6 +664,7 @@
662664
"shape":"Certificate",
663665
"documentation":"<p>Specifies the ARN of the AWS Certificate Manager (ACM) certificate. Required when <code>Protocols</code> is set to <code>FTPS</code>.</p>"
664666
},
667+
"Domain":{"shape":"Domain"},
665668
"EndpointDetails":{
666669
"shape":"EndpointDetails",
667670
"documentation":"<p>Specifies the virtual private cloud (VPC) endpoint settings that you configured for your server.</p>"
@@ -737,6 +740,7 @@
737740
"shape":"Policy",
738741
"documentation":"<p>Specifies the name of the policy in use for the described user.</p>"
739742
},
743+
"PosixProfile":{"shape":"PosixProfile"},
740744
"Role":{
741745
"shape":"Role",
742746
"documentation":"<p>Specifies the IAM role that controls your users' access to your Amazon S3 bucket. The policies attached to this role will determine the level of access you want to provide your users when transferring files into and out of your Amazon S3 bucket or buckets. The IAM role should also contain a trust relationship that allows a server to access your resources when servicing your users' transfer requests.</p>"
@@ -756,6 +760,13 @@
756760
},
757761
"documentation":"<p>Describes the properties of a user that was specified.</p>"
758762
},
763+
"Domain":{
764+
"type":"string",
765+
"enum":[
766+
"S3",
767+
"EFS"
768+
]
769+
},
759770
"EndpointDetails":{
760771
"type":"structure",
761772
"members":{
@@ -1064,6 +1075,7 @@
10641075
"shape":"Arn",
10651076
"documentation":"<p>Specifies the unique Amazon Resource Name (ARN) for a server to be listed.</p>"
10661077
},
1078+
"Domain":{"shape":"Domain"},
10671079
"IdentityProviderType":{
10681080
"shape":"IdentityProviderType",
10691081
"documentation":"<p>Specifies the authentication method used to validate a user for a server that was specified. This can include Secure Shell (SSH), user name and password combinations, or your own custom authentication method. Valid values include <code>SERVICE_MANAGED</code> or <code>API_GATEWAY</code>.</p>"
@@ -1160,6 +1172,23 @@
11601172
"type":"string",
11611173
"max":2048
11621174
},
1175+
"PosixId":{
1176+
"type":"long",
1177+
"max":4294967295,
1178+
"min":0
1179+
},
1180+
"PosixProfile":{
1181+
"type":"structure",
1182+
"required":[
1183+
"Uid",
1184+
"Gid"
1185+
],
1186+
"members":{
1187+
"Uid":{"shape":"PosixId"},
1188+
"Gid":{"shape":"PosixId"},
1189+
"SecondaryGids":{"shape":"SecondaryGids"}
1190+
}
1191+
},
11631192
"Protocol":{
11641193
"type":"string",
11651194
"enum":[
@@ -1214,6 +1243,12 @@
12141243
"min":20,
12151244
"pattern":"arn:.*role/.*"
12161245
},
1246+
"SecondaryGids":{
1247+
"type":"list",
1248+
"member":{"shape":"PosixId"},
1249+
"max":16,
1250+
"min":0
1251+
},
12171252
"SecurityGroupId":{
12181253
"type":"string",
12191254
"max":20,
@@ -1550,6 +1585,7 @@
15501585
"shape":"Policy",
15511586
"documentation":"<p>Allows you to supply a scope-down policy for your user so you can use the same IAM role across multiple users. The policy scopes down user access to portions of your Amazon S3 bucket. Variables you can use inside this policy include <code>${Transfer:UserName}</code>, <code>${Transfer:HomeDirectory}</code>, and <code>${Transfer:HomeBucket}</code>.</p> <note> <p>For scope-down policies, AWS Transfer Family stores the policy as a JSON blob, instead of the Amazon Resource Name (ARN) of the policy. You save the policy as a JSON blob and pass it in the <code>Policy</code> argument.</p> <p>For an example of a scope-down policy, see <a href=\"https://docs.aws.amazon.com/transfer/latest/userguide/users.html#users-policies-scope-down\">Creating a scope-down policy</a>.</p> <p>For more information, see <a href=\"https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRole.html\">AssumeRole</a> in the <i>AWS Security Token Service API Reference</i>.</p> </note>"
15521587
},
1588+
"PosixProfile":{"shape":"PosixProfile"},
15531589
"Role":{
15541590
"shape":"Role",
15551591
"documentation":"<p>The IAM role that controls your users' access to your Amazon S3 bucket. The policies attached to this role will determine the level of access you want to provide your users when transferring files into and out of your Amazon S3 bucket or buckets. The IAM role should also contain a trust relationship that allows the server to access your resources when servicing your users' transfer requests.</p>"

0 commit comments

Comments
 (0)