@@ -385,13 +385,72 @@ export namespace LustreLogConfiguration {
385
385
} ) ;
386
386
}
387
387
388
+ /**
389
+ * <p>The configuration for Lustre root squash used to restrict root-level access
390
+ * from clients that try to access your FSx for Lustre file system as root.
391
+ * Use the <code>RootSquash</code> parameter to enable root squash. To learn more
392
+ * about Lustre root squash,
393
+ * see <a href="https://docs.aws.amazon.com/fsx/latest/LustreGuide/root-squash.html">Lustre root squash</a>.</p>
394
+ * <p>You can also use the <code>NoSquashNids</code> parameter to provide an array of clients
395
+ * who are not affected by the root squash setting. These clients will access the file system as root,
396
+ * with unrestricted privileges.</p>
397
+ */
398
+ export interface LustreRootSquashConfiguration {
399
+ /**
400
+ * <p>You enable root squash by setting a user ID (UID) and group ID (GID) for the file
401
+ * system in the format <code>UID:GID</code> (for example, <code>365534:65534</code>).
402
+ * The UID and GID values can range from <code>0</code> to <code>4294967294</code>:</p>
403
+ * <ul>
404
+ * <li>
405
+ * <p>A non-zero value for UID and GID enables root squash. The UID and GID
406
+ * values can be different, but each must be a non-zero value.</p>
407
+ * </li>
408
+ * <li>
409
+ * <p>A value of <code>0</code> (zero) for UID and GID indicates root,
410
+ * and therefore disables root squash.</p>
411
+ * </li>
412
+ * </ul>
413
+ * <p>When root squash is enabled, the user ID and group ID of a root user accessing
414
+ * the file system are re-mapped to the UID and GID you provide.</p>
415
+ */
416
+ RootSquash ?: string ;
417
+
418
+ /**
419
+ * <p>When root squash is enabled, you can optionally specify an array of NIDs of clients
420
+ * for which root squash does not apply. A client NID is a Lustre Network Identifier used
421
+ * to uniquely identify a client. You can specify the NID as either a single address or a
422
+ * range of addresses:</p>
423
+ * <ul>
424
+ * <li>
425
+ * <p>A single address is described in standard Lustre NID format by specifying
426
+ * the client’s IP address followed by the Lustre network ID (for example,
427
+ * <code>10.0.1.6@tcp</code>).</p>
428
+ * </li>
429
+ * <li>
430
+ * <p>An address range is described using a dash to separate the range (for example,
431
+ * <code>10.0.[2-10].[1-255]@tcp</code>).</p>
432
+ * </li>
433
+ * </ul>
434
+ */
435
+ NoSquashNids ?: string [ ] ;
436
+ }
437
+
438
+ export namespace LustreRootSquashConfiguration {
439
+ /**
440
+ * @internal
441
+ */
442
+ export const filterSensitiveLog = ( obj : LustreRootSquashConfiguration ) : any => ( {
443
+ ...obj ,
444
+ } ) ;
445
+ }
446
+
388
447
/**
389
448
* <p>The configuration for the Amazon FSx for Lustre file system.</p>
390
449
*/
391
450
export interface LustreFileSystemConfiguration {
392
451
/**
393
452
* <p>The preferred start time to perform weekly maintenance, formatted d:HH:MM in the UTC
394
- * time zone. Here, d is the weekday number, from 1 through 7, beginning with Monday and
453
+ * time zone. Here, <code>d</code> is the weekday number, from 1 through 7, beginning with Monday and
395
454
* ending with Sunday.</p>
396
455
*/
397
456
WeeklyMaintenanceStartTime ?: string ;
@@ -512,6 +571,13 @@ export interface LustreFileSystemConfiguration {
512
571
* events for your file system to Amazon CloudWatch Logs.</p>
513
572
*/
514
573
LogConfiguration ?: LustreLogConfiguration ;
574
+
575
+ /**
576
+ * <p>The Lustre root squash configuration for an Amazon FSx for Lustre
577
+ * file system. When enabled, root squash restricts root-level access from clients that
578
+ * try to access your file system as a root user.</p>
579
+ */
580
+ RootSquashConfiguration ?: LustreRootSquashConfiguration ;
515
581
}
516
582
517
583
export namespace LustreFileSystemConfiguration {
@@ -3513,6 +3579,13 @@ export interface CreateFileSystemLustreConfiguration {
3513
3579
* associated with your file system to Amazon CloudWatch Logs.</p>
3514
3580
*/
3515
3581
LogConfiguration ?: LustreLogCreateConfiguration ;
3582
+
3583
+ /**
3584
+ * <p>The Lustre root squash configuration used when creating an Amazon FSx for Lustre
3585
+ * file system. When enabled, root squash restricts root-level access from clients that
3586
+ * try to access your file system as a root user.</p>
3587
+ */
3588
+ RootSquashConfiguration ?: LustreRootSquashConfiguration ;
3516
3589
}
3517
3590
3518
3591
export namespace CreateFileSystemLustreConfiguration {
@@ -3560,8 +3633,7 @@ export interface CreateFileSystemOntapConfiguration {
3560
3633
* </li>
3561
3634
* </ul>
3562
3635
* <p>For information about the use cases for Multi-AZ and Single-AZ deployments, refer to
3563
- * <a href="https://docs.aws.amazon.com/fsx/latest/ONTAPGuide/high-availability-multiAZ.html">Choosing Multi-AZ or
3564
- * Single-AZ file system deployment</a>. </p>
3636
+ * <a href="https://docs.aws.amazon.com/fsx/latest/ONTAPGuide/high-availability-AZ.html">Choosing a file system deployment type</a>. </p>
3565
3637
*/
3566
3638
DeploymentType : OntapDeploymentType | string | undefined ;
3567
3639
@@ -7221,6 +7293,13 @@ export interface UpdateFileSystemLustreConfiguration {
7221
7293
* data repositories associated with your file system to Amazon CloudWatch Logs.</p>
7222
7294
*/
7223
7295
LogConfiguration ?: LustreLogCreateConfiguration ;
7296
+
7297
+ /**
7298
+ * <p>The Lustre root squash configuration used when updating an Amazon FSx for Lustre
7299
+ * file system. When enabled, root squash restricts root-level access from clients that
7300
+ * try to access your file system as a root user.</p>
7301
+ */
7302
+ RootSquashConfiguration ?: LustreRootSquashConfiguration ;
7224
7303
}
7225
7304
7226
7305
export namespace UpdateFileSystemLustreConfiguration {
0 commit comments