Skip to content

Commit 9b215d2

Browse files
author
awstools
committed
feat(client-transfer): Until today, the service supported only RSA host keys and user keys. Now with this launch, Transfer Family has expanded the support for ECDSA and ED25519 host keys and user keys, enabling customers to support a broader set of clients by choosing RSA, ECDSA, and ED25519 host and user keys.
1 parent 01f3d6a commit 9b215d2

File tree

2 files changed

+62
-37
lines changed

2 files changed

+62
-37
lines changed

clients/client-transfer/src/models/models_0.ts

Lines changed: 51 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -659,7 +659,7 @@ export interface ProtocolDetails {
659659
/**
660660
* <p>
661661
* Indicates passive mode, for FTP and FTPS protocols.
662-
* Enter a single dotted-quad IPv4 address, such as the external IP address of a firewall, router, or load balancer.
662+
* Enter a single IPv4 address, such as the public IP address of a firewall, router, or load balancer.
663663
* For example:
664664
* </p>
665665
* <p>
@@ -672,17 +672,17 @@ export interface ProtocolDetails {
672672
* </code> in the example above with the actual IP address you want to use.</p>
673673
* <note>
674674
* <p>
675-
* If you change the <code>PassiveIp</code> value, you must stop and then restart your Transfer server for the change to take effect. For details on using Passive IP (PASV) in a NAT environment, see <a href="http://aws.amazon.com/blogs/storage/configuring-your-ftps-server-behind-a-firewall-or-nat-with-aws-transfer-family/">Configuring your FTPS server behind a firewall or NAT with Amazon Web Services Transfer Family</a>.
675+
* If you change the <code>PassiveIp</code> value, you must stop and then restart your Transfer Family server for the change to take effect. For details on using passive mode (PASV) in a NAT environment, see <a href="http://aws.amazon.com/blogs/storage/configuring-your-ftps-server-behind-a-firewall-or-nat-with-aws-transfer-family/">Configuring your FTPS server behind a firewall or NAT with Transfer Family</a>.
676676
* </p>
677677
* </note>
678678
*/
679679
PassiveIp?: string;
680680

681681
/**
682-
* <p>A property used with Transfer servers that use the FTPS protocol. TLS Session Resumption provides a mechanism to resume or share a negotiated secret
682+
* <p>A property used with Transfer Family servers that use the FTPS protocol. TLS Session Resumption provides a mechanism to resume or share a negotiated secret
683683
* key between the control and data connection for an FTPS session. <code>TlsSessionResumptionMode</code> determines whether or not the server resumes recent,
684684
* negotiated sessions through a unique session ID. This property is available during <code>CreateServer</code> and <code>UpdateServer</code> calls.
685-
* If a <code>TlsSessionResumptionMode</code> value is not specified during CreateServer, it is set to <code>ENFORCED</code> by default.</p>
685+
* If a <code>TlsSessionResumptionMode</code> value is not specified during <code>CreateServer</code>, it is set to <code>ENFORCED</code> by default.</p>
686686
* <ul>
687687
* <li>
688688
* <p>
@@ -710,15 +710,15 @@ export interface ProtocolDetails {
710710
TlsSessionResumptionMode?: TlsSessionResumptionMode | string;
711711

712712
/**
713-
* <p>Use the <code>SetStatOption</code> to ignore the error that is generated when the client attempts to use SETSTAT on a file you are uploading to an S3 bucket.</p>
714-
* <p>Some SFTP file transfer clients can attempt to change the attributes of remote files, including timestamp and permissions, using commands, such as SETSTAT when uploading the file.
713+
* <p>Use the <code>SetStatOption</code> to ignore the error that is generated when the client attempts to use <code>SETSTAT</code> on a file you are uploading to an S3 bucket.</p>
714+
* <p>Some SFTP file transfer clients can attempt to change the attributes of remote files, including timestamp and permissions, using commands, such as <code>SETSTAT</code> when uploading the file.
715715
* However, these commands are not compatible with object storage systems, such as Amazon S3. Due to this incompatibility, file uploads from these clients can result in errors even when
716716
* the file is otherwise successfully uploaded.</p>
717-
* <p>Set the value to <code>ENABLE_NO_OP</code> to have the Transfer Family server ignore the SETSTAT command, and upload files without needing to make any changes to your SFTP client.
717+
* <p>Set the value to <code>ENABLE_NO_OP</code> to have the Transfer Family server ignore the <code>SETSTAT</code> command, and upload files without needing to make any changes to your SFTP client.
718718
* While the <code>SetStatOption</code>
719-
* <code>ENABLE_NO_OP</code> setting ignores the error, it does generate a log entry in CloudWatch Logs, so you can determine when the client is making a SETSTAT call.</p>
719+
* <code>ENABLE_NO_OP</code> setting ignores the error, it does generate a log entry in Amazon CloudWatch Logs, so you can determine when the client is making a <code>SETSTAT</code> call.</p>
720720
* <note>
721-
* <p>If you want to preserve the original timestamp for your file, and modify other file attributes using SETSTAT, you can use Amazon EFS as backend storage with Transfer Family.</p>
721+
* <p>If you want to preserve the original timestamp for your file, and modify other file attributes using <code>SETSTAT</code>, you can use Amazon EFS as backend storage with Transfer Family.</p>
722722
* </note>
723723
*/
724724
SetStatOption?: SetStatOption | string;
@@ -903,8 +903,23 @@ export interface CreateServerRequest {
903903
EndpointType?: EndpointType | string;
904904

905905
/**
906-
* <p>The RSA private key as generated by the <code>ssh-keygen -N "" -m PEM -f
907-
* my-new-server-key</code> command.</p>
906+
* <p>The RSA, ECDSA, or ED25519 private key to use for your server.</p>
907+
*
908+
* <p>Use the following command to generate an RSA 2048 bit key with no passphrase:</p>
909+
* <p>
910+
* <code>ssh-keygen -t rsa -b 2048 -N "" -m PEM -f my-new-server-key</code>.</p>
911+
* <p>Use a minimum value of 2048 for the <code>-b</code> option: you can create a stronger key using 3072 or 4096.</p>
912+
*
913+
* <p>Use the following command to generate an ECDSA 256 bit key with no passphrase:</p>
914+
* <p>
915+
* <code>ssh-keygen -t ecdsa -b 256 -N "" -m PEM -f my-new-server-key</code>.</p>
916+
* <p>Valid values for the <code>-b</code> option for ECDSA are 256, 384, and 521.</p>
917+
*
918+
* <p>Use the following command to generate an ED25519 key with no passphrase:</p>
919+
* <p>
920+
* <code>ssh-keygen -t ed25519 -N "" -f my-new-server-key</code>.</p>
921+
*
922+
* <p>For all of these commands, you can replace <i>my-new-server-key</i> with a string of your choice.</p>
908923
*
909924
* <important>
910925
* <p>If you aren't planning to migrate existing users from an existing SFTP-enabled
@@ -1077,8 +1092,6 @@ export namespace CreateServerResponse {
10771092

10781093
/**
10791094
* <p>The request was denied due to request throttling.</p>
1080-
*
1081-
* <p> HTTP Status Code: 400</p>
10821095
*/
10831096
export class ThrottlingException extends __BaseException {
10841097
readonly name: "ThrottlingException" = "ThrottlingException";
@@ -1191,11 +1204,7 @@ export interface CreateUserRequest {
11911204
/**
11921205
* <p>The public portion of the Secure Shell (SSH) key used to authenticate the user to the
11931206
* server.</p>
1194-
* <note>
1195-
* <p>
1196-
* Currently, Transfer Family does not accept elliptical curve keys (keys beginning with <code>ecdsa</code>).
1197-
* </p>
1198-
* </note>
1207+
* <p>Transfer Family accepts RSA, ECDSA, and ED25519 keys.</p>
11991208
*/
12001209
SshPublicKeyBody?: string;
12011210

@@ -2246,7 +2255,7 @@ export interface DescribedServer {
22462255
* </p>
22472256
* <p>
22482257
* Use the <code>PassiveIp</code> parameter to indicate passive mode.
2249-
* Enter a single dotted-quad IPv4 address, such as the external IP address of a firewall, router, or load balancer.
2258+
* Enter a single IPv4 address, such as the public IP address of a firewall, router, or load balancer.
22502259
* </p>
22512260
*/
22522261
ProtocolDetails?: ProtocolDetails;
@@ -2416,6 +2425,7 @@ export interface SshPublicKey {
24162425
/**
24172426
* <p>Specifies the content of the SSH public key as specified by the
24182427
* <code>PublicKeyId</code>.</p>
2428+
* <p>Transfer Family accepts RSA, ECDSA, and ED25519 keys.</p>
24192429
*/
24202430
SshPublicKeyBody: string | undefined;
24212431

@@ -2765,6 +2775,7 @@ export interface ImportSshPublicKeyRequest {
27652775

27662776
/**
27672777
* <p>The public key portion of an SSH key pair.</p>
2778+
* <p>Transfer Family accepts RSA, ECDSA, and ED25519 keys.</p>
27682779
*/
27692780
SshPublicKeyBody: string | undefined;
27702781

@@ -3946,18 +3957,33 @@ export interface UpdateServerRequest {
39463957
EndpointType?: EndpointType | string;
39473958

39483959
/**
3949-
* <p>The RSA private key as generated by <code>ssh-keygen -N "" -m PEM -f
3950-
* my-new-server-key</code>.</p>
3960+
* <p>The RSA, ECDSA, or ED25519 private key to use for your server.</p>
3961+
*
3962+
* <p>Use the following command to generate an RSA 2048 bit key with no passphrase:</p>
3963+
* <p>
3964+
* <code>ssh-keygen -t rsa -b 2048 -N "" -m PEM -f my-new-server-key</code>.</p>
3965+
* <p>Use a minimum value of 2048 for the <code>-b</code> option: you can create a stronger key using 3072 or 4096.</p>
3966+
*
3967+
* <p>Use the following command to generate an ECDSA 256 bit key with no passphrase:</p>
3968+
* <p>
3969+
* <code>ssh-keygen -t ecdsa -b 256 -N "" -m PEM -f my-new-server-key</code>.</p>
3970+
* <p>Valid values for the <code>-b</code> option for ECDSA are 256, 384, and 521.</p>
3971+
*
3972+
* <p>Use the following command to generate an ED25519 key with no passphrase:</p>
3973+
* <p>
3974+
* <code>ssh-keygen -t ed25519 -N "" -f my-new-server-key</code>.</p>
3975+
*
3976+
* <p>For all of these commands, you can replace <i>my-new-server-key</i> with a string of your choice.</p>
39513977
*
39523978
* <important>
3953-
* <p>If you aren't planning to migrate existing users from an existing server to a new
3954-
* server, don't update the host key. Accidentally changing a server's host key can
3955-
* be disruptive.</p>
3979+
* <p>If you aren't planning to migrate existing users from an existing SFTP-enabled
3980+
* server to a new server, don't update the host key. Accidentally changing a
3981+
* server's host key can be disruptive.</p>
39563982
* </important>
39573983
*
39583984
*
39593985
*
3960-
* <p>For more information, see <a href="https://docs.aws.amazon.com/transfer/latest/userguide/edit-server-config.html#configuring-servers-change-host-key">Change the host key for your SFTP-enabled server</a> in the <i>Amazon Web ServicesTransfer
3986+
* <p>For more information, see <a href="https://docs.aws.amazon.com/transfer/latest/userguide/edit-server-config.html#configuring-servers-change-host-key">Change the host key for your SFTP-enabled server</a> in the <i>Amazon Web Services Transfer
39613987
* Family User Guide</i>.</p>
39623988
*/
39633989
HostKey?: string;

0 commit comments

Comments
 (0)