lib/aws-sdk-transfer/client.rb in aws-sdk-transfer-1.106.0 vs lib/aws-sdk-transfer/client.rb in aws-sdk-transfer-1.107.0

- old
+ new

@@ -500,29 +500,29 @@ # Management (IAM) role provides access to paths in `Target`. This value # can be set only when `HomeDirectoryType` is set to *LOGICAL*. # # The following is an `Entry` and `Target` pair example. # - # `[ \{ "Entry": "/directory1", "Target": - # "/bucket_name/home/mydirectory" \} ]` + # `[ { "Entry": "/directory1", "Target": "/bucket_name/home/mydirectory" + # } ]` # # In most cases, you can use this value instead of the session policy to # lock down your user to the designated home directory ("`chroot`"). # To do this, you can set `Entry` to `/` and set `Target` to the # `HomeDirectory` parameter value. # # The following is an `Entry` and `Target` pair example for `chroot`. # - # `[ \{ "Entry": "/", "Target": "/bucket_name/home/mydirectory" \} ]` + # `[ { "Entry": "/", "Target": "/bucket_name/home/mydirectory" } ]` # # @option params [String] :policy # A session policy for your user so that you can use the same Identity # and Access Management (IAM) role across multiple users. This policy # scopes down a user's access to portions of their Amazon S3 bucket. # Variables that you can use inside this policy include - # `$\{Transfer:UserName\}`, `$\{Transfer:HomeDirectory\}`, and - # `$\{Transfer:HomeBucket\}`. + # `${Transfer:UserName}`, `${Transfer:HomeDirectory}`, and + # `${Transfer:HomeBucket}`. # # <note markdown="1"> This policy applies only when the domain of `ServerId` is Amazon S3. # Amazon EFS does not use session policies. # # For session policies, Transfer Family stores the policy as a JSON @@ -569,11 +569,11 @@ # access to your Amazon S3 or Amazon EFS resources over the enabled # protocols using Transfer Family. If you know the group name, you can # view the SID values by running the following command using Windows # PowerShell. # - # `Get-ADGroup -Filter \{samAccountName -like "YourGroupName*"\} + # `Get-ADGroup -Filter {samAccountName -like "YourGroupName*"} # -Properties * | Select SamAccountName,ObjectSid` # # In that command, replace *YourGroupName* with the name of your Active # Directory group. # @@ -1322,29 +1322,29 @@ # Management (IAM) role provides access to paths in `Target`. This value # can be set only when `HomeDirectoryType` is set to *LOGICAL*. # # The following is an `Entry` and `Target` pair example. # - # `[ \{ "Entry": "/directory1", "Target": - # "/bucket_name/home/mydirectory" \} ]` + # `[ { "Entry": "/directory1", "Target": "/bucket_name/home/mydirectory" + # } ]` # # In most cases, you can use this value instead of the session policy to # lock your user down to the designated home directory ("`chroot`"). # To do this, you can set `Entry` to `/` and set `Target` to the value # the user should see for their home directory when they log in. # # The following is an `Entry` and `Target` pair example for `chroot`. # - # `[ \{ "Entry": "/", "Target": "/bucket_name/home/mydirectory" \} ]` + # `[ { "Entry": "/", "Target": "/bucket_name/home/mydirectory" } ]` # # @option params [String] :policy # A session policy for your user so that you can use the same Identity # and Access Management (IAM) role across multiple users. This policy # scopes down a user's access to portions of their Amazon S3 bucket. # Variables that you can use inside this policy include - # `$\{Transfer:UserName\}`, `$\{Transfer:HomeDirectory\}`, and - # `$\{Transfer:HomeBucket\}`. + # `${Transfer:UserName}`, `${Transfer:HomeDirectory}`, and + # `${Transfer:HomeBucket}`. # # <note markdown="1"> This policy applies only when the domain of `ServerId` is Amazon S3. # Amazon EFS does not use session policies. # # For session policies, Transfer Family stores the policy as a JSON @@ -1667,11 +1667,11 @@ # access to your Amazon S3 or Amazon EFS resources over the enabled # protocols using Transfer Family. If you know the group name, you can # view the SID values by running the following command using Windows # PowerShell. # - # `Get-ADGroup -Filter \{samAccountName -like "YourGroupName*"\} + # `Get-ADGroup -Filter {samAccountName -like "YourGroupName*"} # -Properties * | Select SamAccountName,ObjectSid` # # In that command, replace *YourGroupName* with the name of your Active # Directory group. # @@ -1950,11 +1950,11 @@ # access to your Amazon S3 or Amazon EFS resources over the enabled # protocols using Transfer Family. If you know the group name, you can # view the SID values by running the following command using Windows # PowerShell. # - # `Get-ADGroup -Filter \{samAccountName -like "YourGroupName*"\} + # `Get-ADGroup -Filter {samAccountName -like "YourGroupName*"} # -Properties * | Select SamAccountName,ObjectSid` # # In that command, replace *YourGroupName* with the name of your Active # Directory group. # @@ -3959,29 +3959,29 @@ # Management (IAM) role provides access to paths in `Target`. This value # can be set only when `HomeDirectoryType` is set to *LOGICAL*. # # The following is an `Entry` and `Target` pair example. # - # `[ \{ "Entry": "/directory1", "Target": - # "/bucket_name/home/mydirectory" \} ]` + # `[ { "Entry": "/directory1", "Target": "/bucket_name/home/mydirectory" + # } ]` # # In most cases, you can use this value instead of the session policy to # lock down your user to the designated home directory ("`chroot`"). # To do this, you can set `Entry` to `/` and set `Target` to the # `HomeDirectory` parameter value. # # The following is an `Entry` and `Target` pair example for `chroot`. # - # `[ \{ "Entry": "/", "Target": "/bucket_name/home/mydirectory" \} ]` + # `[ { "Entry": "/", "Target": "/bucket_name/home/mydirectory" } ]` # # @option params [String] :policy # A session policy for your user so that you can use the same Identity # and Access Management (IAM) role across multiple users. This policy # scopes down a user's access to portions of their Amazon S3 bucket. # Variables that you can use inside this policy include - # `$\{Transfer:UserName\}`, `$\{Transfer:HomeDirectory\}`, and - # `$\{Transfer:HomeBucket\}`. + # `${Transfer:UserName}`, `${Transfer:HomeDirectory}`, and + # `${Transfer:HomeBucket}`. # # <note markdown="1"> This policy applies only when the domain of `ServerId` is Amazon S3. # Amazon EFS does not use session policies. # # For session policies, Transfer Family stores the policy as a JSON @@ -4028,11 +4028,11 @@ # access to your Amazon S3 or Amazon EFS resources over the enabled # protocols using Transfer Family. If you know the group name, you can # view the SID values by running the following command using Windows # PowerShell. # - # `Get-ADGroup -Filter \{samAccountName -like "YourGroupName*"\} + # `Get-ADGroup -Filter {samAccountName -like "YourGroupName*"} # -Properties * | Select SamAccountName,ObjectSid` # # In that command, replace *YourGroupName* with the name of your Active # Directory group. # @@ -4626,11 +4626,11 @@ # # To remove an associated workflow from a server, you can provide an # empty `OnUpload` object, as in the following example. # # `aws transfer update-server --server-id s-01234567890abcdef - # --workflow-details '\{"OnUpload":[]\}'` + # --workflow-details '{"OnUpload":[]}'` # # @option params [Array<String>] :structured_log_destinations # Specifies the log groups to which your server logs are sent. # # To specify a log group, you must provide the ARN for an existing log @@ -4745,11 +4745,11 @@ # following command updates the user so that their configuration in the # console shows the *Restricted* flag as selected. # # ` aws transfer update-user --server-id <server-id> --user-name # admin-user --home-directory-type LOGICAL --home-directory-mappings - # "[\{"Entry":"/", "Target":"/test/admin-user"\}]"` + # "[{"Entry":"/", "Target":"/test/admin-user"}]"` # # @option params [String] :home_directory # The landing directory (folder) for a user when they log in to the # server using the client. # @@ -4787,29 +4787,29 @@ # Management (IAM) role provides access to paths in `Target`. This value # can be set only when `HomeDirectoryType` is set to *LOGICAL*. # # The following is an `Entry` and `Target` pair example. # - # `[ \{ "Entry": "/directory1", "Target": - # "/bucket_name/home/mydirectory" \} ]` + # `[ { "Entry": "/directory1", "Target": "/bucket_name/home/mydirectory" + # } ]` # # In most cases, you can use this value instead of the session policy to # lock down your user to the designated home directory ("`chroot`"). # To do this, you can set `Entry` to '/' and set `Target` to the # HomeDirectory parameter value. # # The following is an `Entry` and `Target` pair example for `chroot`. # - # `[ \{ "Entry": "/", "Target": "/bucket_name/home/mydirectory" \} ]` + # `[ { "Entry": "/", "Target": "/bucket_name/home/mydirectory" } ]` # # @option params [String] :policy # A session policy for your user so that you can use the same Identity # and Access Management (IAM) role across multiple users. This policy # scopes down a user's access to portions of their Amazon S3 bucket. # Variables that you can use inside this policy include - # `$\{Transfer:UserName\}`, `$\{Transfer:HomeDirectory\}`, and - # `$\{Transfer:HomeBucket\}`. + # `${Transfer:UserName}`, `${Transfer:HomeDirectory}`, and + # `${Transfer:HomeBucket}`. # # <note markdown="1"> This policy applies only when the domain of `ServerId` is Amazon S3. # Amazon EFS does not use session policies. # # For session policies, Transfer Family stores the policy as a JSON @@ -4917,10 +4917,10 @@ params: params, config: config, tracer: tracer ) context[:gem_name] = 'aws-sdk-transfer' - context[:gem_version] = '1.106.0' + context[:gem_version] = '1.107.0' Seahorse::Client::Request.new(handlers, context) end # Polls an API operation until a resource enters a desired state. #