要在AWS私有网络/子网中进行AWS SFTP传输,可以按照以下步骤操作:
import boto3
ec2 = boto3.resource('ec2')
# 创建VPC
vpc = ec2.create_vpc(CidrBlock='10.0.0.0/16')
# 启用DNS主机名
vpc.modify_attribute(EnableDnsHostnames={'Value': True})
# 创建子网
subnet = ec2.create_subnet(VpcId=vpc.id, CidrBlock='10.0.0.0/24')
# 创建安全组
security_group = ec2.create_security_group(
GroupName='SFTP-Security-Group',
Description='Security group for SFTP transfer',
VpcId=vpc.id
)
# 允许SSH流量
security_group.authorize_ingress(
IpPermissions=[
{
'FromPort': 22,
'ToPort': 22,
'IpProtocol': 'tcp',
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]
}
]
)
# 允许SFTP传输的流量
security_group.authorize_ingress(
IpPermissions=[
{
'FromPort': 22,
'ToPort': 22,
'IpProtocol': 'tcp',
'UserIdGroupPairs': [{'GroupId': security_group.id}]
}
]
)
s3 = boto3.resource('s3')
# 创建存储桶
bucket = s3.create_bucket(Bucket='sftp-transfer-bucket')
iam = boto3.client('iam')
transfer = boto3.client('transfer')
# 创建服务器角色
server_role = iam.create_role(
RoleName='SFTP-Transfer-Role',
AssumeRolePolicyDocument='{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "transfer.amazonaws.com"
},
"Action": "sts:AssumeRole"
}
]
}'
)
# 附加S3访问策略到角色
iam.attach_role_policy(
RoleName=server_role['Role']['RoleName'],
PolicyArn='arn:aws:iam::aws:policy/AmazonS3FullAccess'
)
# 创建SFTP服务器
sftp_server = transfer.create_server(
IdentityProviderType='SERVICE_MANAGED',
IdentityProviderDetails={
'Url': 's3://sftp-transfer-bucket/users.csv',
'InvocationRole': server_role['Role']['Arn']
},
EndpointType='VPC',
EndpointDetails={
'VpcId': vpc.id,
'SubnetIds': [subnet.id],
'SecurityGroupIds': [security_group.id]
}
)
现在,您已经在AWS私有网络/子网中设置了AWS SFTP传输。您可以使用SFTP客户端连接到创建的SFTP服务器,并传输文件。