aws-sdk-ecr 1.83.0 → 1.85.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-ecr/client.rb +14 -5
- data/lib/aws-sdk-ecr/client_api.rb +6 -0
- data/lib/aws-sdk-ecr/plugins/endpoints.rb +8 -5
- data/lib/aws-sdk-ecr/types.rb +27 -8
- data/lib/aws-sdk-ecr.rb +1 -1
- data/sig/client.rbs +1 -0
- data/sig/resource.rbs +1 -0
- data/sig/types.rbs +3 -0
- metadata +4 -4
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 5901329d48b4e1388d6a222235a7fbff1c3f9c64268296340458d9d555d51bc2
|
4
|
+
data.tar.gz: 0b4d1c8828b2bde3c6495abf9869a13ed5c747f279bc1d4f94157b06df8cba34
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 1cb79edddefb30e03522115cf41a7169630a7d415426160c53c1b2c917db76d44a614a3f4cb9727d05fb1e8c9834eddce6e9b61dbdb71cdebe05c2a700e43541
|
7
|
+
data.tar.gz: 6bb2155bd9578e09f2b7339724bdd9ad5d4bcfc2b283bfc0a548d548eadb7fbbaffad7ac1cfaa9d575db52165207ba7903058e879c14384226cc4da155dadf87
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.85.0 (2024-09-20)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
8
|
+
|
9
|
+
1.84.0 (2024-09-17)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - The `DescribeImageScanning` API now includes `fixAvailable`, `exploitAvailable`, and `fixedInVersion` fields to provide more detailed information about the availability of fixes, exploits, and fixed versions for identified image vulnerabilities.
|
13
|
+
|
4
14
|
1.83.0 (2024-09-11)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.85.0
|
data/lib/aws-sdk-ecr/client.rb
CHANGED
@@ -130,13 +130,15 @@ module Aws::ECR
|
|
130
130
|
# locations will be searched for credentials:
|
131
131
|
#
|
132
132
|
# * `Aws.config[:credentials]`
|
133
|
-
# * The `:access_key_id`, `:secret_access_key`,
|
134
|
-
#
|
133
|
+
# * The `:access_key_id`, `:secret_access_key`, `:session_token`, and
|
134
|
+
# `:account_id` options.
|
135
|
+
# * ENV['AWS_ACCESS_KEY_ID'], ENV['AWS_SECRET_ACCESS_KEY'],
|
136
|
+
# ENV['AWS_SESSION_TOKEN'], and ENV['AWS_ACCOUNT_ID']
|
135
137
|
# * `~/.aws/credentials`
|
136
138
|
# * `~/.aws/config`
|
137
139
|
# * EC2/ECS IMDS instance profile - When used by default, the timeouts
|
138
140
|
# are very aggressive. Construct and pass an instance of
|
139
|
-
# `Aws::
|
141
|
+
# `Aws::InstanceProfileCredentials` or `Aws::ECSCredentials` to
|
140
142
|
# enable retries and extended timeouts. Instance profile credential
|
141
143
|
# fetching can be disabled by setting ENV['AWS_EC2_METADATA_DISABLED']
|
142
144
|
# to true.
|
@@ -155,6 +157,8 @@ module Aws::ECR
|
|
155
157
|
#
|
156
158
|
# @option options [String] :access_key_id
|
157
159
|
#
|
160
|
+
# @option options [String] :account_id
|
161
|
+
#
|
158
162
|
# @option options [Boolean] :active_endpoint_cache (false)
|
159
163
|
# When set to `true`, a thread polling for endpoints will be running in
|
160
164
|
# the background every 60 secs (default). Defaults to `false`.
|
@@ -376,7 +380,9 @@ module Aws::ECR
|
|
376
380
|
# sending the request.
|
377
381
|
#
|
378
382
|
# @option options [Aws::ECR::EndpointProvider] :endpoint_provider
|
379
|
-
# The endpoint provider used to resolve endpoints. Any object that responds to
|
383
|
+
# The endpoint provider used to resolve endpoints. Any object that responds to
|
384
|
+
# `#resolve_endpoint(parameters)` where `parameters` is a Struct similar to
|
385
|
+
# `Aws::ECR::EndpointParameters`.
|
380
386
|
#
|
381
387
|
# @option options [Float] :http_continue_timeout (1)
|
382
388
|
# The number of seconds to wait for a 100-continue response before sending the
|
@@ -1623,6 +1629,7 @@ module Aws::ECR
|
|
1623
1629
|
# resp.image_scan_findings.enhanced_findings[0].package_vulnerability_details.vulnerable_packages[0].release #=> String
|
1624
1630
|
# resp.image_scan_findings.enhanced_findings[0].package_vulnerability_details.vulnerable_packages[0].source_layer_hash #=> String
|
1625
1631
|
# resp.image_scan_findings.enhanced_findings[0].package_vulnerability_details.vulnerable_packages[0].version #=> String
|
1632
|
+
# resp.image_scan_findings.enhanced_findings[0].package_vulnerability_details.vulnerable_packages[0].fixed_in_version #=> String
|
1626
1633
|
# resp.image_scan_findings.enhanced_findings[0].remediation.recommendation.url #=> String
|
1627
1634
|
# resp.image_scan_findings.enhanced_findings[0].remediation.recommendation.text #=> String
|
1628
1635
|
# resp.image_scan_findings.enhanced_findings[0].resources #=> Array
|
@@ -1652,6 +1659,8 @@ module Aws::ECR
|
|
1652
1659
|
# resp.image_scan_findings.enhanced_findings[0].title #=> String
|
1653
1660
|
# resp.image_scan_findings.enhanced_findings[0].type #=> String
|
1654
1661
|
# resp.image_scan_findings.enhanced_findings[0].updated_at #=> Time
|
1662
|
+
# resp.image_scan_findings.enhanced_findings[0].fix_available #=> String
|
1663
|
+
# resp.image_scan_findings.enhanced_findings[0].exploit_available #=> String
|
1655
1664
|
# resp.next_token #=> String
|
1656
1665
|
#
|
1657
1666
|
#
|
@@ -3666,7 +3675,7 @@ module Aws::ECR
|
|
3666
3675
|
tracer: tracer
|
3667
3676
|
)
|
3668
3677
|
context[:gem_name] = 'aws-sdk-ecr'
|
3669
|
-
context[:gem_version] = '1.
|
3678
|
+
context[:gem_version] = '1.85.0'
|
3670
3679
|
Seahorse::Client::Request.new(handlers, context)
|
3671
3680
|
end
|
3672
3681
|
|
@@ -91,12 +91,15 @@ module Aws::ECR
|
|
91
91
|
EvaluationTimestamp = Shapes::TimestampShape.new(name: 'EvaluationTimestamp')
|
92
92
|
ExceptionMessage = Shapes::StringShape.new(name: 'ExceptionMessage')
|
93
93
|
ExpirationTimestamp = Shapes::TimestampShape.new(name: 'ExpirationTimestamp')
|
94
|
+
ExploitAvailable = Shapes::StringShape.new(name: 'ExploitAvailable')
|
94
95
|
FilePath = Shapes::StringShape.new(name: 'FilePath')
|
95
96
|
FindingArn = Shapes::StringShape.new(name: 'FindingArn')
|
96
97
|
FindingDescription = Shapes::StringShape.new(name: 'FindingDescription')
|
97
98
|
FindingName = Shapes::StringShape.new(name: 'FindingName')
|
98
99
|
FindingSeverity = Shapes::StringShape.new(name: 'FindingSeverity')
|
99
100
|
FindingSeverityCounts = Shapes::MapShape.new(name: 'FindingSeverityCounts')
|
101
|
+
FixAvailable = Shapes::StringShape.new(name: 'FixAvailable')
|
102
|
+
FixedInVersion = Shapes::StringShape.new(name: 'FixedInVersion')
|
100
103
|
ForceFlag = Shapes::BooleanShape.new(name: 'ForceFlag')
|
101
104
|
GetAccountSettingRequest = Shapes::StructureShape.new(name: 'GetAccountSettingRequest')
|
102
105
|
GetAccountSettingResponse = Shapes::StructureShape.new(name: 'GetAccountSettingResponse')
|
@@ -637,6 +640,8 @@ module Aws::ECR
|
|
637
640
|
EnhancedImageScanFinding.add_member(:title, Shapes::ShapeRef.new(shape: Title, location_name: "title"))
|
638
641
|
EnhancedImageScanFinding.add_member(:type, Shapes::ShapeRef.new(shape: Type, location_name: "type"))
|
639
642
|
EnhancedImageScanFinding.add_member(:updated_at, Shapes::ShapeRef.new(shape: Date, location_name: "updatedAt"))
|
643
|
+
EnhancedImageScanFinding.add_member(:fix_available, Shapes::ShapeRef.new(shape: FixAvailable, location_name: "fixAvailable"))
|
644
|
+
EnhancedImageScanFinding.add_member(:exploit_available, Shapes::ShapeRef.new(shape: ExploitAvailable, location_name: "exploitAvailable"))
|
640
645
|
EnhancedImageScanFinding.struct_class = Types::EnhancedImageScanFinding
|
641
646
|
|
642
647
|
EnhancedImageScanFindingList.member = Shapes::ShapeRef.new(shape: EnhancedImageScanFinding)
|
@@ -1303,6 +1308,7 @@ module Aws::ECR
|
|
1303
1308
|
VulnerablePackage.add_member(:release, Shapes::ShapeRef.new(shape: Release, location_name: "release"))
|
1304
1309
|
VulnerablePackage.add_member(:source_layer_hash, Shapes::ShapeRef.new(shape: SourceLayerHash, location_name: "sourceLayerHash"))
|
1305
1310
|
VulnerablePackage.add_member(:version, Shapes::ShapeRef.new(shape: Version, location_name: "version"))
|
1311
|
+
VulnerablePackage.add_member(:fixed_in_version, Shapes::ShapeRef.new(shape: FixedInVersion, location_name: "fixedInVersion"))
|
1306
1312
|
VulnerablePackage.struct_class = Types::VulnerablePackage
|
1307
1313
|
|
1308
1314
|
VulnerablePackagesList.member = Shapes::ShapeRef.new(shape: VulnerablePackage)
|
@@ -15,11 +15,11 @@ module Aws::ECR
|
|
15
15
|
:endpoint_provider,
|
16
16
|
doc_type: 'Aws::ECR::EndpointProvider',
|
17
17
|
rbs_type: 'untyped',
|
18
|
-
docstring:
|
19
|
-
|
20
|
-
|
21
|
-
|
22
|
-
|
18
|
+
docstring: <<~DOCS) do |_cfg|
|
19
|
+
The endpoint provider used to resolve endpoints. Any object that responds to
|
20
|
+
`#resolve_endpoint(parameters)` where `parameters` is a Struct similar to
|
21
|
+
`Aws::ECR::EndpointParameters`.
|
22
|
+
DOCS
|
23
23
|
Aws::ECR::EndpointProvider.new
|
24
24
|
end
|
25
25
|
|
@@ -51,6 +51,9 @@ module Aws::ECR
|
|
51
51
|
if context[:auth_scheme] && context[:auth_scheme]['name'] == 'sigv4a'
|
52
52
|
metrics << 'SIGV4A_SIGNING'
|
53
53
|
end
|
54
|
+
if context.config.credentials&.credentials&.account_id
|
55
|
+
metrics << 'RESOLVED_ACCOUNT_ID'
|
56
|
+
end
|
54
57
|
Aws::Plugins::UserAgent.metric(*metrics, &block)
|
55
58
|
end
|
56
59
|
|
data/lib/aws-sdk-ecr/types.rb
CHANGED
@@ -1432,20 +1432,20 @@ module Aws::ECR
|
|
1432
1432
|
# If you use the `KMS_DSSE` encryption type, the contents of the
|
1433
1433
|
# repository will be encrypted with two layers of encryption using
|
1434
1434
|
# server-side encryption with the KMS Management Service key stored in
|
1435
|
-
# KMS. Similar to the KMS encryption type, you can either use the
|
1435
|
+
# KMS. Similar to the `KMS` encryption type, you can either use the
|
1436
1436
|
# default Amazon Web Services managed KMS key for Amazon ECR, or
|
1437
1437
|
# specify your own KMS key, which you've already created.
|
1438
1438
|
#
|
1439
1439
|
# If you use the `AES256` encryption type, Amazon ECR uses server-side
|
1440
1440
|
# encryption with Amazon S3-managed encryption keys which encrypts the
|
1441
|
-
# images in the repository using an AES256 encryption algorithm.
|
1442
|
-
#
|
1443
|
-
#
|
1444
|
-
#
|
1441
|
+
# images in the repository using an AES256 encryption algorithm.
|
1442
|
+
#
|
1443
|
+
# For more information, see [Amazon ECR encryption at rest][1] in the
|
1444
|
+
# *Amazon Elastic Container Registry User Guide*.
|
1445
1445
|
#
|
1446
1446
|
#
|
1447
1447
|
#
|
1448
|
-
# [1]: https://docs.aws.amazon.com/
|
1448
|
+
# [1]: https://docs.aws.amazon.com/AmazonECR/latest/userguide/encryption-at-rest.html
|
1449
1449
|
# @return [String]
|
1450
1450
|
#
|
1451
1451
|
# @!attribute [rw] kms_key
|
@@ -1576,6 +1576,18 @@ module Aws::ECR
|
|
1576
1576
|
# The date and time the finding was last updated at.
|
1577
1577
|
# @return [Time]
|
1578
1578
|
#
|
1579
|
+
# @!attribute [rw] fix_available
|
1580
|
+
# Details on whether a fix is available through a version update. This
|
1581
|
+
# value can be `YES`, `NO`, or `PARTIAL`. A `PARTIAL` fix means that
|
1582
|
+
# some, but not all, of the packages identified in the finding have
|
1583
|
+
# fixes available through updated versions.
|
1584
|
+
# @return [String]
|
1585
|
+
#
|
1586
|
+
# @!attribute [rw] exploit_available
|
1587
|
+
# If a finding discovered in your environment has an exploit
|
1588
|
+
# available.
|
1589
|
+
# @return [String]
|
1590
|
+
#
|
1579
1591
|
# @see http://docs.aws.amazon.com/goto/WebAPI/ecr-2015-09-21/EnhancedImageScanFinding AWS API Documentation
|
1580
1592
|
#
|
1581
1593
|
class EnhancedImageScanFinding < Struct.new(
|
@@ -1593,7 +1605,9 @@ module Aws::ECR
|
|
1593
1605
|
:status,
|
1594
1606
|
:title,
|
1595
1607
|
:type,
|
1596
|
-
:updated_at
|
1608
|
+
:updated_at,
|
1609
|
+
:fix_available,
|
1610
|
+
:exploit_available)
|
1597
1611
|
SENSITIVE = []
|
1598
1612
|
include Aws::Structure
|
1599
1613
|
end
|
@@ -4605,6 +4619,10 @@ module Aws::ECR
|
|
4605
4619
|
# The version of the vulnerable package.
|
4606
4620
|
# @return [String]
|
4607
4621
|
#
|
4622
|
+
# @!attribute [rw] fixed_in_version
|
4623
|
+
# The version of the package that contains the vulnerability fix.
|
4624
|
+
# @return [String]
|
4625
|
+
#
|
4608
4626
|
# @see http://docs.aws.amazon.com/goto/WebAPI/ecr-2015-09-21/VulnerablePackage AWS API Documentation
|
4609
4627
|
#
|
4610
4628
|
class VulnerablePackage < Struct.new(
|
@@ -4615,7 +4633,8 @@ module Aws::ECR
|
|
4615
4633
|
:package_manager,
|
4616
4634
|
:release,
|
4617
4635
|
:source_layer_hash,
|
4618
|
-
:version
|
4636
|
+
:version,
|
4637
|
+
:fixed_in_version)
|
4619
4638
|
SENSITIVE = []
|
4620
4639
|
include Aws::Structure
|
4621
4640
|
end
|
data/lib/aws-sdk-ecr.rb
CHANGED
data/sig/client.rbs
CHANGED
data/sig/resource.rbs
CHANGED
data/sig/types.rbs
CHANGED
@@ -388,6 +388,8 @@ module Aws::ECR
|
|
388
388
|
attr_accessor title: ::String
|
389
389
|
attr_accessor type: ::String
|
390
390
|
attr_accessor updated_at: ::Time
|
391
|
+
attr_accessor fix_available: ::String
|
392
|
+
attr_accessor exploit_available: ::String
|
391
393
|
SENSITIVE: []
|
392
394
|
end
|
393
395
|
|
@@ -1238,6 +1240,7 @@ module Aws::ECR
|
|
1238
1240
|
attr_accessor release: ::String
|
1239
1241
|
attr_accessor source_layer_hash: ::String
|
1240
1242
|
attr_accessor version: ::String
|
1243
|
+
attr_accessor fixed_in_version: ::String
|
1241
1244
|
SENSITIVE: []
|
1242
1245
|
end
|
1243
1246
|
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-ecr
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.85.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-09-
|
11
|
+
date: 2024-09-20 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|
@@ -19,7 +19,7 @@ dependencies:
|
|
19
19
|
version: '3'
|
20
20
|
- - ">="
|
21
21
|
- !ruby/object:Gem::Version
|
22
|
-
version: 3.
|
22
|
+
version: 3.207.0
|
23
23
|
type: :runtime
|
24
24
|
prerelease: false
|
25
25
|
version_requirements: !ruby/object:Gem::Requirement
|
@@ -29,7 +29,7 @@ dependencies:
|
|
29
29
|
version: '3'
|
30
30
|
- - ">="
|
31
31
|
- !ruby/object:Gem::Version
|
32
|
-
version: 3.
|
32
|
+
version: 3.207.0
|
33
33
|
- !ruby/object:Gem::Dependency
|
34
34
|
name: aws-sigv4
|
35
35
|
requirement: !ruby/object:Gem::Requirement
|