lib/aws-sdk-transfer/client.rb in aws-sdk-transfer-1.106.0 vs lib/aws-sdk-transfer/client.rb in aws-sdk-transfer-1.107.0
- old
+ new
@@ -500,29 +500,29 @@
# Management (IAM) role provides access to paths in `Target`. This value
# can be set only when `HomeDirectoryType` is set to *LOGICAL*.
#
# The following is an `Entry` and `Target` pair example.
#
- # `[ \{ "Entry": "/directory1", "Target":
- # "/bucket_name/home/mydirectory" \} ]`
+ # `[ { "Entry": "/directory1", "Target": "/bucket_name/home/mydirectory"
+ # } ]`
#
# In most cases, you can use this value instead of the session policy to
# lock down your user to the designated home directory ("`chroot`").
# To do this, you can set `Entry` to `/` and set `Target` to the
# `HomeDirectory` parameter value.
#
# The following is an `Entry` and `Target` pair example for `chroot`.
#
- # `[ \{ "Entry": "/", "Target": "/bucket_name/home/mydirectory" \} ]`
+ # `[ { "Entry": "/", "Target": "/bucket_name/home/mydirectory" } ]`
#
# @option params [String] :policy
# A session policy for your user so that you can use the same Identity
# and Access Management (IAM) role across multiple users. This policy
# scopes down a user's access to portions of their Amazon S3 bucket.
# Variables that you can use inside this policy include
- # `$\{Transfer:UserName\}`, `$\{Transfer:HomeDirectory\}`, and
- # `$\{Transfer:HomeBucket\}`.
+ # `${Transfer:UserName}`, `${Transfer:HomeDirectory}`, and
+ # `${Transfer:HomeBucket}`.
#
# <note markdown="1"> This policy applies only when the domain of `ServerId` is Amazon S3.
# Amazon EFS does not use session policies.
#
# For session policies, Transfer Family stores the policy as a JSON
@@ -569,11 +569,11 @@
# access to your Amazon S3 or Amazon EFS resources over the enabled
# protocols using Transfer Family. If you know the group name, you can
# view the SID values by running the following command using Windows
# PowerShell.
#
- # `Get-ADGroup -Filter \{samAccountName -like "YourGroupName*"\}
+ # `Get-ADGroup -Filter {samAccountName -like "YourGroupName*"}
# -Properties * | Select SamAccountName,ObjectSid`
#
# In that command, replace *YourGroupName* with the name of your Active
# Directory group.
#
@@ -1322,29 +1322,29 @@
# Management (IAM) role provides access to paths in `Target`. This value
# can be set only when `HomeDirectoryType` is set to *LOGICAL*.
#
# The following is an `Entry` and `Target` pair example.
#
- # `[ \{ "Entry": "/directory1", "Target":
- # "/bucket_name/home/mydirectory" \} ]`
+ # `[ { "Entry": "/directory1", "Target": "/bucket_name/home/mydirectory"
+ # } ]`
#
# In most cases, you can use this value instead of the session policy to
# lock your user down to the designated home directory ("`chroot`").
# To do this, you can set `Entry` to `/` and set `Target` to the value
# the user should see for their home directory when they log in.
#
# The following is an `Entry` and `Target` pair example for `chroot`.
#
- # `[ \{ "Entry": "/", "Target": "/bucket_name/home/mydirectory" \} ]`
+ # `[ { "Entry": "/", "Target": "/bucket_name/home/mydirectory" } ]`
#
# @option params [String] :policy
# A session policy for your user so that you can use the same Identity
# and Access Management (IAM) role across multiple users. This policy
# scopes down a user's access to portions of their Amazon S3 bucket.
# Variables that you can use inside this policy include
- # `$\{Transfer:UserName\}`, `$\{Transfer:HomeDirectory\}`, and
- # `$\{Transfer:HomeBucket\}`.
+ # `${Transfer:UserName}`, `${Transfer:HomeDirectory}`, and
+ # `${Transfer:HomeBucket}`.
#
# <note markdown="1"> This policy applies only when the domain of `ServerId` is Amazon S3.
# Amazon EFS does not use session policies.
#
# For session policies, Transfer Family stores the policy as a JSON
@@ -1667,11 +1667,11 @@
# access to your Amazon S3 or Amazon EFS resources over the enabled
# protocols using Transfer Family. If you know the group name, you can
# view the SID values by running the following command using Windows
# PowerShell.
#
- # `Get-ADGroup -Filter \{samAccountName -like "YourGroupName*"\}
+ # `Get-ADGroup -Filter {samAccountName -like "YourGroupName*"}
# -Properties * | Select SamAccountName,ObjectSid`
#
# In that command, replace *YourGroupName* with the name of your Active
# Directory group.
#
@@ -1950,11 +1950,11 @@
# access to your Amazon S3 or Amazon EFS resources over the enabled
# protocols using Transfer Family. If you know the group name, you can
# view the SID values by running the following command using Windows
# PowerShell.
#
- # `Get-ADGroup -Filter \{samAccountName -like "YourGroupName*"\}
+ # `Get-ADGroup -Filter {samAccountName -like "YourGroupName*"}
# -Properties * | Select SamAccountName,ObjectSid`
#
# In that command, replace *YourGroupName* with the name of your Active
# Directory group.
#
@@ -3959,29 +3959,29 @@
# Management (IAM) role provides access to paths in `Target`. This value
# can be set only when `HomeDirectoryType` is set to *LOGICAL*.
#
# The following is an `Entry` and `Target` pair example.
#
- # `[ \{ "Entry": "/directory1", "Target":
- # "/bucket_name/home/mydirectory" \} ]`
+ # `[ { "Entry": "/directory1", "Target": "/bucket_name/home/mydirectory"
+ # } ]`
#
# In most cases, you can use this value instead of the session policy to
# lock down your user to the designated home directory ("`chroot`").
# To do this, you can set `Entry` to `/` and set `Target` to the
# `HomeDirectory` parameter value.
#
# The following is an `Entry` and `Target` pair example for `chroot`.
#
- # `[ \{ "Entry": "/", "Target": "/bucket_name/home/mydirectory" \} ]`
+ # `[ { "Entry": "/", "Target": "/bucket_name/home/mydirectory" } ]`
#
# @option params [String] :policy
# A session policy for your user so that you can use the same Identity
# and Access Management (IAM) role across multiple users. This policy
# scopes down a user's access to portions of their Amazon S3 bucket.
# Variables that you can use inside this policy include
- # `$\{Transfer:UserName\}`, `$\{Transfer:HomeDirectory\}`, and
- # `$\{Transfer:HomeBucket\}`.
+ # `${Transfer:UserName}`, `${Transfer:HomeDirectory}`, and
+ # `${Transfer:HomeBucket}`.
#
# <note markdown="1"> This policy applies only when the domain of `ServerId` is Amazon S3.
# Amazon EFS does not use session policies.
#
# For session policies, Transfer Family stores the policy as a JSON
@@ -4028,11 +4028,11 @@
# access to your Amazon S3 or Amazon EFS resources over the enabled
# protocols using Transfer Family. If you know the group name, you can
# view the SID values by running the following command using Windows
# PowerShell.
#
- # `Get-ADGroup -Filter \{samAccountName -like "YourGroupName*"\}
+ # `Get-ADGroup -Filter {samAccountName -like "YourGroupName*"}
# -Properties * | Select SamAccountName,ObjectSid`
#
# In that command, replace *YourGroupName* with the name of your Active
# Directory group.
#
@@ -4626,11 +4626,11 @@
#
# To remove an associated workflow from a server, you can provide an
# empty `OnUpload` object, as in the following example.
#
# `aws transfer update-server --server-id s-01234567890abcdef
- # --workflow-details '\{"OnUpload":[]\}'`
+ # --workflow-details '{"OnUpload":[]}'`
#
# @option params [Array<String>] :structured_log_destinations
# Specifies the log groups to which your server logs are sent.
#
# To specify a log group, you must provide the ARN for an existing log
@@ -4745,11 +4745,11 @@
# following command updates the user so that their configuration in the
# console shows the *Restricted* flag as selected.
#
# ` aws transfer update-user --server-id <server-id> --user-name
# admin-user --home-directory-type LOGICAL --home-directory-mappings
- # "[\{"Entry":"/", "Target":"/test/admin-user"\}]"`
+ # "[{"Entry":"/", "Target":"/test/admin-user"}]"`
#
# @option params [String] :home_directory
# The landing directory (folder) for a user when they log in to the
# server using the client.
#
@@ -4787,29 +4787,29 @@
# Management (IAM) role provides access to paths in `Target`. This value
# can be set only when `HomeDirectoryType` is set to *LOGICAL*.
#
# The following is an `Entry` and `Target` pair example.
#
- # `[ \{ "Entry": "/directory1", "Target":
- # "/bucket_name/home/mydirectory" \} ]`
+ # `[ { "Entry": "/directory1", "Target": "/bucket_name/home/mydirectory"
+ # } ]`
#
# In most cases, you can use this value instead of the session policy to
# lock down your user to the designated home directory ("`chroot`").
# To do this, you can set `Entry` to '/' and set `Target` to the
# HomeDirectory parameter value.
#
# The following is an `Entry` and `Target` pair example for `chroot`.
#
- # `[ \{ "Entry": "/", "Target": "/bucket_name/home/mydirectory" \} ]`
+ # `[ { "Entry": "/", "Target": "/bucket_name/home/mydirectory" } ]`
#
# @option params [String] :policy
# A session policy for your user so that you can use the same Identity
# and Access Management (IAM) role across multiple users. This policy
# scopes down a user's access to portions of their Amazon S3 bucket.
# Variables that you can use inside this policy include
- # `$\{Transfer:UserName\}`, `$\{Transfer:HomeDirectory\}`, and
- # `$\{Transfer:HomeBucket\}`.
+ # `${Transfer:UserName}`, `${Transfer:HomeDirectory}`, and
+ # `${Transfer:HomeBucket}`.
#
# <note markdown="1"> This policy applies only when the domain of `ServerId` is Amazon S3.
# Amazon EFS does not use session policies.
#
# For session policies, Transfer Family stores the policy as a JSON
@@ -4917,10 +4917,10 @@
params: params,
config: config,
tracer: tracer
)
context[:gem_name] = 'aws-sdk-transfer'
- context[:gem_version] = '1.106.0'
+ context[:gem_version] = '1.107.0'
Seahorse::Client::Request.new(handlers, context)
end
# Polls an API operation until a resource enters a desired state.
#