Resource: awsTransferUser
Provides a AWS Transfer User resource. Managing SSH keys can be accomplished with the awsTransferSshKey
resource.
Example Usage
/*Provider bindings are generated by running cdktf get.
See https://cdk.tf/provider-generation for more details.*/
import * as aws from "./.gen/providers/aws";
const awsTransferServerFoo = new aws.transferServer.TransferServer(
this,
"foo",
{
identityProviderType: "SERVICE_MANAGED",
tags: {
NAME: "tf-acc-test-transfer-server",
},
}
);
const dataAwsIamPolicyDocumentAssumeRole =
new aws.dataAwsIamPolicyDocument.DataAwsIamPolicyDocument(
this,
"assume_role",
{
statement: [
{
actions: ["sts:AssumeRole"],
effect: "Allow",
principals: [
{
identifiers: ["transfer.amazonaws.com"],
type: "Service",
},
],
},
],
}
);
const dataAwsIamPolicyDocumentFoo =
new aws.dataAwsIamPolicyDocument.DataAwsIamPolicyDocument(this, "foo_2", {
statement: [
{
actions: ["s3:*"],
effect: "Allow",
resources: ["*"],
sid: "AllowFullAccesstoS3",
},
],
});
/*This allows the Terraform resource name to match the original name. You can remove the call if you don't need them to match.*/
dataAwsIamPolicyDocumentFoo.overrideLogicalId("foo");
const awsIamRoleFoo = new aws.iamRole.IamRole(this, "foo_3", {
assumeRolePolicy: dataAwsIamPolicyDocumentAssumeRole.json,
name: "tf-test-transfer-user-iam-role",
});
/*This allows the Terraform resource name to match the original name. You can remove the call if you don't need them to match.*/
awsIamRoleFoo.overrideLogicalId("foo");
const awsIamRolePolicyFoo = new aws.iamRolePolicy.IamRolePolicy(this, "foo_4", {
name: "tf-test-transfer-user-iam-policy",
policy: "${data.aws_iam_role_policy.foo.json}",
role: awsIamRoleFoo.id,
});
/*This allows the Terraform resource name to match the original name. You can remove the call if you don't need them to match.*/
awsIamRolePolicyFoo.overrideLogicalId("foo");
const awsTransferUserFoo = new aws.transferUser.TransferUser(this, "foo_5", {
homeDirectoryMappings: [
{
entry: "/test.pdf",
target: "/bucket3/test-path/tftestuser.pdf",
},
],
homeDirectoryType: "LOGICAL",
role: awsIamRoleFoo.arn,
serverId: awsTransferServerFoo.id,
userName: "tftestuser",
});
/*This allows the Terraform resource name to match the original name. You can remove the call if you don't need them to match.*/
awsTransferUserFoo.overrideLogicalId("foo");
Argument Reference
The following arguments are supported:
serverId
- (Required) The Server ID of the Transfer Server (e.g.,s12345678
)userName
- (Required) The name used for log in to your SFTP server.homeDirectory
- (Optional) The landing directory (folder) for a user when they log in to the server using their SFTP client. It should begin with a/
. The first item in the path is the name of the home bucket (accessible as${transfer:homeBucket}
in the policy) and the rest is the home directory (accessible as${transfer:homeDirectory}
in the policy). For example,/exampleBucket1234/username
would set the home bucket toexampleBucket1234
and the home directory tousername
.homeDirectoryMappings
- (Optional) Logical directory mappings that specify what S3 paths and keys should be visible to your user and how you want to make them visible. See Home Directory Mappings below.homeDirectoryType
- (Optional) The type of landing directory (folder) you mapped for your users' home directory. Valid values arepath
andlogical
.policy
- (Optional) An IAM JSON policy document that scopes down user access to portions of their Amazon S3 bucket. IAM variables you can use inside this policy include${transfer:userName}
,${transfer:homeDirectory}
, and${transfer:homeBucket}
. Since the IAM variable syntax matches Terraform's interpolation syntax, they must be escaped inside Terraform configuration strings ($${transfer:userName}
). These are evaluated on-the-fly when navigating the bucket.posixProfile
- (Optional) Specifies the full POSIX identity, including user ID (Uid), group ID (Gid), and any secondary groups IDs (SecondaryGids), that controls your users' access to your Amazon EFS file systems. See Posix Profile below.role
- (Required) Amazon Resource Name (ARN) of an IAM role that allows the service to controls your user’s access to your Amazon S3 bucket.tags
- (Optional) A map of tags to assign to the resource. If configured with a providerdefaultTags
configuration block present, tags with matching keys will overwrite those defined at the provider-level.
Home Directory Mappings
entry
- (Required) Represents an entry and a target.target
- (Required) Represents the map target.
The restricted
option is achieved using the following mapping:
Posix Profile
gid
- (Required) The POSIX group ID used for all EFS operations by this user.uid
- (Required) The POSIX user ID used for all EFS operations by this user.secondaryGids
- (Optional) The secondary POSIX group IDs used for all EFS operations by this user.
Attributes Reference
In addition to all arguments above, the following attributes are exported:
arn
- Amazon Resource Name (ARN) of Transfer UsertagsAll
- A map of tags assigned to the resource, including those inherited from the providerdefaultTags
configuration block.
Timeouts
delete
- (Default10M
)
Import
Transfer Users can be imported using the serverId
and userName
separated by /
.