The File Transfer action is a premium action that can be used to transfer packages or application files to a remote server. The action allows transfer via four protocols: FTP, FTPS implicit, FTPS explicit and SFTP. 

File Transfer

Name

A friendly name for this action (will be displayed in the actions workflow area).

Enabled

Determines if this action will be run within the relevant stage.

Transport Protocol

Selected the transfer protocol to use:

Host Address

Enter the address of the host to transfer the files to. This can either be a DNS name, URL or IP4 address. 

Port

The port that the host is listening on for the selected protocol. Standard ports for each protocol are:

Some servers do use non-standard ports for a variety of reasons, please check with your provider.  

Username

The name of the user for logging into the  host machine. This can be blank as some file transfer services do not require a username or password to be provided. If a username is required ,you will receive an error from the action stating that a login is required by the host.  

Password

The matching password for the supplied username. This can be blank as some file transfer services do not require a username or password to be provided. If a password is required, you will receive an error from the action stating that a login is required by the host. 

Note that if the password contains a $ or % they will need to be escaped, e.g. $$ and %%, as these are identifiers for objects and variables in Continua CI. 

Remote Folder

The folder on the remote machine to upload the files to. Note that this is relative to the base directory for the user on the host. Note that the source folder structure will be preserved when transferring files to the host. 

Passive

Tick to enable the passive file transfer protocol.

Use Proxy

Tick to make the 'Proxy' tab visible.


Source

Source Folder

Enter the folder containing all the files to be uploaded to the host folder. This is typically a workspace location such as "$Workspace$\Output\".

File Names / Patterns

Enter a list of files or file patterns to match the file to be uploaded. Each file/pattern must be entered on a new line. Patterns can contain wildcards as described on the Ant Pattern Usage page.

You can exclude files by prefixing the file name or pattern with a dash. e.g -*.ignore. Exclude patterns always take precedence over include patterns.


Proxy

Proxy Type

The proxy types handled by the File Transfer action are:

The type of proxy connection will be determined by the proxy server in use. Please talk to your network administrator as to which proxy server your company uses. 

Host Name

Enter the name or address of the host to proxy the file transfer connection through. This can either be a DNS name, URL or IP4 address.  

Port 

Enter the port to use to connect to the proxy. This will depend on the configuration of the proxy server in question. Talk to your network administrator or proxy provider as to what settings are required for your particular file transfer. 

Username

Enter the username required to access the proxy. Some proxies require authentication before you can tunnel your connection through them. If the username is left blank, then no username or password is used for connecting to the proxy. 

Password

Enter the password required to access the proxy. This password should match the username provided for the proxy. The password is encrypted on the system, and once entered will not be readable when editing the action. 

Proxy Authentication Method

The method of authentication required by the proxy server. The following proxy authentication settings are available:


TLS/SSL

Secure Modes Allowed

Choose one or more of the following TLS protocols to be accepted when connecting to the host:

Note that these options are only available when a TLS based file transfer protocol is selected, namely the FTPS protocols. Please check with your host FTPS provider as to which TLS protocols to use. Depending on the configuration of the host, certain protocols might not be allowed, or would provide better security for the connection. The action will attempt to select the highest security protocol as a default and log which one was used. 

Certificate Validation

The file transfer action allows the following certificate verification methods. 

Thumbprint (SHA1 hash)

This box is shown when "Locally stored thumbprint" is selected for the Certification Validation. Enter the thumbprint of the server certificate to accept. 

Allowed Cypher Suites

Select the type of cipher suites allow when connecting. The options available are:

Clear Command Channel

Tick this to clear the command channel on the secure connection after login. Some servers require this to function correctly. If your experiencing any login errors where the server is reporting unexpected commands, please turn this option on. 


SSH

Key Validation

The file transfer action provides the following ways to validate the SSH key of the host:

Key Algorithm

This option specifies the algorithm that should be used to read the key. This will be known by the administrator of the host. 

Hash Algorithm

This option specifies the hash algorithm used to generated a hash of the SSH key. If the algorithm used does not generate the hash listed below, the key will be rejected. 

Hash Value

The hash of the SSH hosts key. This should be generated using the hash algorithm listed above.


Options

Logging Level

The amount of information detail to display in the build log.

Log the list of files transferred

Write the file name of each file transferred to the Build Log.

Action When a File Exists

Select the action to perform when a file already exists:

Ignore warnings

If this is ticked, any warnings logged will not mark the action with a warning status.