aws-sdk-ecr 1.83.0 → 1.85.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 4b4d570021bde605b1495c44fb5318d62054ad4059f09fe24005702174ac4c9d
4
- data.tar.gz: df6f040f6804197c9ba9929feba735b54a415a64988b61e55ad02c99c3b10587
3
+ metadata.gz: 5901329d48b4e1388d6a222235a7fbff1c3f9c64268296340458d9d555d51bc2
4
+ data.tar.gz: 0b4d1c8828b2bde3c6495abf9869a13ed5c747f279bc1d4f94157b06df8cba34
5
5
  SHA512:
6
- metadata.gz: 5793455e4b19ad8ad0522d516a27052cecb117ae4bb188329d1aa4506c18e8660538096c5e81c10e8673ef3788315eb7a2394ba526b0e4c8446501a28260980d
7
- data.tar.gz: a0e904f946631b8858caf9c6832bbe3be05cb160e35f7de592759729d8d1a2d1634b24df951ff553d81fba7cebcac1f31688e558dc82c56f05da1c393521a901
6
+ metadata.gz: 1cb79edddefb30e03522115cf41a7169630a7d415426160c53c1b2c917db76d44a614a3f4cb9727d05fb1e8c9834eddce6e9b61dbdb71cdebe05c2a700e43541
7
+ data.tar.gz: 6bb2155bd9578e09f2b7339724bdd9ad5d4bcfc2b283bfc0a548d548eadb7fbbaffad7ac1cfaa9d575db52165207ba7903058e879c14384226cc4da155dadf87
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.85.0 (2024-09-20)
5
+ ------------------
6
+
7
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
8
+
9
+ 1.84.0 (2024-09-17)
10
+ ------------------
11
+
12
+ * Feature - The `DescribeImageScanning` API now includes `fixAvailable`, `exploitAvailable`, and `fixedInVersion` fields to provide more detailed information about the availability of fixes, exploits, and fixed versions for identified image vulnerabilities.
13
+
4
14
  1.83.0 (2024-09-11)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.83.0
1
+ 1.85.0
@@ -130,13 +130,15 @@ module Aws::ECR
130
130
  # locations will be searched for credentials:
131
131
  #
132
132
  # * `Aws.config[:credentials]`
133
- # * The `:access_key_id`, `:secret_access_key`, and `:session_token` options.
134
- # * ENV['AWS_ACCESS_KEY_ID'], ENV['AWS_SECRET_ACCESS_KEY']
133
+ # * The `:access_key_id`, `:secret_access_key`, `:session_token`, and
134
+ # `:account_id` options.
135
+ # * ENV['AWS_ACCESS_KEY_ID'], ENV['AWS_SECRET_ACCESS_KEY'],
136
+ # ENV['AWS_SESSION_TOKEN'], and ENV['AWS_ACCOUNT_ID']
135
137
  # * `~/.aws/credentials`
136
138
  # * `~/.aws/config`
137
139
  # * EC2/ECS IMDS instance profile - When used by default, the timeouts
138
140
  # are very aggressive. Construct and pass an instance of
139
- # `Aws::InstanceProfileCredentails` or `Aws::ECSCredentials` to
141
+ # `Aws::InstanceProfileCredentials` or `Aws::ECSCredentials` to
140
142
  # enable retries and extended timeouts. Instance profile credential
141
143
  # fetching can be disabled by setting ENV['AWS_EC2_METADATA_DISABLED']
142
144
  # to true.
@@ -155,6 +157,8 @@ module Aws::ECR
155
157
  #
156
158
  # @option options [String] :access_key_id
157
159
  #
160
+ # @option options [String] :account_id
161
+ #
158
162
  # @option options [Boolean] :active_endpoint_cache (false)
159
163
  # When set to `true`, a thread polling for endpoints will be running in
160
164
  # the background every 60 secs (default). Defaults to `false`.
@@ -376,7 +380,9 @@ module Aws::ECR
376
380
  # sending the request.
377
381
  #
378
382
  # @option options [Aws::ECR::EndpointProvider] :endpoint_provider
379
- # The endpoint provider used to resolve endpoints. Any object that responds to `#resolve_endpoint(parameters)` where `parameters` is a Struct similar to `Aws::ECR::EndpointParameters`
383
+ # The endpoint provider used to resolve endpoints. Any object that responds to
384
+ # `#resolve_endpoint(parameters)` where `parameters` is a Struct similar to
385
+ # `Aws::ECR::EndpointParameters`.
380
386
  #
381
387
  # @option options [Float] :http_continue_timeout (1)
382
388
  # The number of seconds to wait for a 100-continue response before sending the
@@ -1623,6 +1629,7 @@ module Aws::ECR
1623
1629
  # resp.image_scan_findings.enhanced_findings[0].package_vulnerability_details.vulnerable_packages[0].release #=> String
1624
1630
  # resp.image_scan_findings.enhanced_findings[0].package_vulnerability_details.vulnerable_packages[0].source_layer_hash #=> String
1625
1631
  # resp.image_scan_findings.enhanced_findings[0].package_vulnerability_details.vulnerable_packages[0].version #=> String
1632
+ # resp.image_scan_findings.enhanced_findings[0].package_vulnerability_details.vulnerable_packages[0].fixed_in_version #=> String
1626
1633
  # resp.image_scan_findings.enhanced_findings[0].remediation.recommendation.url #=> String
1627
1634
  # resp.image_scan_findings.enhanced_findings[0].remediation.recommendation.text #=> String
1628
1635
  # resp.image_scan_findings.enhanced_findings[0].resources #=> Array
@@ -1652,6 +1659,8 @@ module Aws::ECR
1652
1659
  # resp.image_scan_findings.enhanced_findings[0].title #=> String
1653
1660
  # resp.image_scan_findings.enhanced_findings[0].type #=> String
1654
1661
  # resp.image_scan_findings.enhanced_findings[0].updated_at #=> Time
1662
+ # resp.image_scan_findings.enhanced_findings[0].fix_available #=> String
1663
+ # resp.image_scan_findings.enhanced_findings[0].exploit_available #=> String
1655
1664
  # resp.next_token #=> String
1656
1665
  #
1657
1666
  #
@@ -3666,7 +3675,7 @@ module Aws::ECR
3666
3675
  tracer: tracer
3667
3676
  )
3668
3677
  context[:gem_name] = 'aws-sdk-ecr'
3669
- context[:gem_version] = '1.83.0'
3678
+ context[:gem_version] = '1.85.0'
3670
3679
  Seahorse::Client::Request.new(handlers, context)
3671
3680
  end
3672
3681
 
@@ -91,12 +91,15 @@ module Aws::ECR
91
91
  EvaluationTimestamp = Shapes::TimestampShape.new(name: 'EvaluationTimestamp')
92
92
  ExceptionMessage = Shapes::StringShape.new(name: 'ExceptionMessage')
93
93
  ExpirationTimestamp = Shapes::TimestampShape.new(name: 'ExpirationTimestamp')
94
+ ExploitAvailable = Shapes::StringShape.new(name: 'ExploitAvailable')
94
95
  FilePath = Shapes::StringShape.new(name: 'FilePath')
95
96
  FindingArn = Shapes::StringShape.new(name: 'FindingArn')
96
97
  FindingDescription = Shapes::StringShape.new(name: 'FindingDescription')
97
98
  FindingName = Shapes::StringShape.new(name: 'FindingName')
98
99
  FindingSeverity = Shapes::StringShape.new(name: 'FindingSeverity')
99
100
  FindingSeverityCounts = Shapes::MapShape.new(name: 'FindingSeverityCounts')
101
+ FixAvailable = Shapes::StringShape.new(name: 'FixAvailable')
102
+ FixedInVersion = Shapes::StringShape.new(name: 'FixedInVersion')
100
103
  ForceFlag = Shapes::BooleanShape.new(name: 'ForceFlag')
101
104
  GetAccountSettingRequest = Shapes::StructureShape.new(name: 'GetAccountSettingRequest')
102
105
  GetAccountSettingResponse = Shapes::StructureShape.new(name: 'GetAccountSettingResponse')
@@ -637,6 +640,8 @@ module Aws::ECR
637
640
  EnhancedImageScanFinding.add_member(:title, Shapes::ShapeRef.new(shape: Title, location_name: "title"))
638
641
  EnhancedImageScanFinding.add_member(:type, Shapes::ShapeRef.new(shape: Type, location_name: "type"))
639
642
  EnhancedImageScanFinding.add_member(:updated_at, Shapes::ShapeRef.new(shape: Date, location_name: "updatedAt"))
643
+ EnhancedImageScanFinding.add_member(:fix_available, Shapes::ShapeRef.new(shape: FixAvailable, location_name: "fixAvailable"))
644
+ EnhancedImageScanFinding.add_member(:exploit_available, Shapes::ShapeRef.new(shape: ExploitAvailable, location_name: "exploitAvailable"))
640
645
  EnhancedImageScanFinding.struct_class = Types::EnhancedImageScanFinding
641
646
 
642
647
  EnhancedImageScanFindingList.member = Shapes::ShapeRef.new(shape: EnhancedImageScanFinding)
@@ -1303,6 +1308,7 @@ module Aws::ECR
1303
1308
  VulnerablePackage.add_member(:release, Shapes::ShapeRef.new(shape: Release, location_name: "release"))
1304
1309
  VulnerablePackage.add_member(:source_layer_hash, Shapes::ShapeRef.new(shape: SourceLayerHash, location_name: "sourceLayerHash"))
1305
1310
  VulnerablePackage.add_member(:version, Shapes::ShapeRef.new(shape: Version, location_name: "version"))
1311
+ VulnerablePackage.add_member(:fixed_in_version, Shapes::ShapeRef.new(shape: FixedInVersion, location_name: "fixedInVersion"))
1306
1312
  VulnerablePackage.struct_class = Types::VulnerablePackage
1307
1313
 
1308
1314
  VulnerablePackagesList.member = Shapes::ShapeRef.new(shape: VulnerablePackage)
@@ -15,11 +15,11 @@ module Aws::ECR
15
15
  :endpoint_provider,
16
16
  doc_type: 'Aws::ECR::EndpointProvider',
17
17
  rbs_type: 'untyped',
18
- docstring: 'The endpoint provider used to resolve endpoints. Any '\
19
- 'object that responds to `#resolve_endpoint(parameters)` '\
20
- 'where `parameters` is a Struct similar to '\
21
- '`Aws::ECR::EndpointParameters`'
22
- ) do |cfg|
18
+ docstring: <<~DOCS) do |_cfg|
19
+ The endpoint provider used to resolve endpoints. Any object that responds to
20
+ `#resolve_endpoint(parameters)` where `parameters` is a Struct similar to
21
+ `Aws::ECR::EndpointParameters`.
22
+ DOCS
23
23
  Aws::ECR::EndpointProvider.new
24
24
  end
25
25
 
@@ -51,6 +51,9 @@ module Aws::ECR
51
51
  if context[:auth_scheme] && context[:auth_scheme]['name'] == 'sigv4a'
52
52
  metrics << 'SIGV4A_SIGNING'
53
53
  end
54
+ if context.config.credentials&.credentials&.account_id
55
+ metrics << 'RESOLVED_ACCOUNT_ID'
56
+ end
54
57
  Aws::Plugins::UserAgent.metric(*metrics, &block)
55
58
  end
56
59
 
@@ -1432,20 +1432,20 @@ module Aws::ECR
1432
1432
  # If you use the `KMS_DSSE` encryption type, the contents of the
1433
1433
  # repository will be encrypted with two layers of encryption using
1434
1434
  # server-side encryption with the KMS Management Service key stored in
1435
- # KMS. Similar to the KMS encryption type, you can either use the
1435
+ # KMS. Similar to the `KMS` encryption type, you can either use the
1436
1436
  # default Amazon Web Services managed KMS key for Amazon ECR, or
1437
1437
  # specify your own KMS key, which you've already created.
1438
1438
  #
1439
1439
  # If you use the `AES256` encryption type, Amazon ECR uses server-side
1440
1440
  # encryption with Amazon S3-managed encryption keys which encrypts the
1441
- # images in the repository using an AES256 encryption algorithm. For
1442
- # more information, see [Protecting data using server-side encryption
1443
- # with Amazon S3-managed encryption keys (SSE-S3)][1] in the *Amazon
1444
- # Simple Storage Service Console Developer Guide*.
1441
+ # images in the repository using an AES256 encryption algorithm.
1442
+ #
1443
+ # For more information, see [Amazon ECR encryption at rest][1] in the
1444
+ # *Amazon Elastic Container Registry User Guide*.
1445
1445
  #
1446
1446
  #
1447
1447
  #
1448
- # [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html
1448
+ # [1]: https://docs.aws.amazon.com/AmazonECR/latest/userguide/encryption-at-rest.html
1449
1449
  # @return [String]
1450
1450
  #
1451
1451
  # @!attribute [rw] kms_key
@@ -1576,6 +1576,18 @@ module Aws::ECR
1576
1576
  # The date and time the finding was last updated at.
1577
1577
  # @return [Time]
1578
1578
  #
1579
+ # @!attribute [rw] fix_available
1580
+ # Details on whether a fix is available through a version update. This
1581
+ # value can be `YES`, `NO`, or `PARTIAL`. A `PARTIAL` fix means that
1582
+ # some, but not all, of the packages identified in the finding have
1583
+ # fixes available through updated versions.
1584
+ # @return [String]
1585
+ #
1586
+ # @!attribute [rw] exploit_available
1587
+ # If a finding discovered in your environment has an exploit
1588
+ # available.
1589
+ # @return [String]
1590
+ #
1579
1591
  # @see http://docs.aws.amazon.com/goto/WebAPI/ecr-2015-09-21/EnhancedImageScanFinding AWS API Documentation
1580
1592
  #
1581
1593
  class EnhancedImageScanFinding < Struct.new(
@@ -1593,7 +1605,9 @@ module Aws::ECR
1593
1605
  :status,
1594
1606
  :title,
1595
1607
  :type,
1596
- :updated_at)
1608
+ :updated_at,
1609
+ :fix_available,
1610
+ :exploit_available)
1597
1611
  SENSITIVE = []
1598
1612
  include Aws::Structure
1599
1613
  end
@@ -4605,6 +4619,10 @@ module Aws::ECR
4605
4619
  # The version of the vulnerable package.
4606
4620
  # @return [String]
4607
4621
  #
4622
+ # @!attribute [rw] fixed_in_version
4623
+ # The version of the package that contains the vulnerability fix.
4624
+ # @return [String]
4625
+ #
4608
4626
  # @see http://docs.aws.amazon.com/goto/WebAPI/ecr-2015-09-21/VulnerablePackage AWS API Documentation
4609
4627
  #
4610
4628
  class VulnerablePackage < Struct.new(
@@ -4615,7 +4633,8 @@ module Aws::ECR
4615
4633
  :package_manager,
4616
4634
  :release,
4617
4635
  :source_layer_hash,
4618
- :version)
4636
+ :version,
4637
+ :fixed_in_version)
4619
4638
  SENSITIVE = []
4620
4639
  include Aws::Structure
4621
4640
  end
data/lib/aws-sdk-ecr.rb CHANGED
@@ -53,6 +53,6 @@ require_relative 'aws-sdk-ecr/customizations'
53
53
  # @!group service
54
54
  module Aws::ECR
55
55
 
56
- GEM_VERSION = '1.83.0'
56
+ GEM_VERSION = '1.85.0'
57
57
 
58
58
  end
data/sig/client.rbs CHANGED
@@ -15,6 +15,7 @@ module Aws
15
15
  ?credentials: untyped,
16
16
  ?region: String,
17
17
  ?access_key_id: String,
18
+ ?account_id: String,
18
19
  ?active_endpoint_cache: bool,
19
20
  ?adaptive_retry_wait_to_fill: bool,
20
21
  ?client_side_monitoring: bool,
data/sig/resource.rbs CHANGED
@@ -15,6 +15,7 @@ module Aws
15
15
  ?credentials: untyped,
16
16
  ?region: String,
17
17
  ?access_key_id: String,
18
+ ?account_id: String,
18
19
  ?active_endpoint_cache: bool,
19
20
  ?adaptive_retry_wait_to_fill: bool,
20
21
  ?client_side_monitoring: bool,
data/sig/types.rbs CHANGED
@@ -388,6 +388,8 @@ module Aws::ECR
388
388
  attr_accessor title: ::String
389
389
  attr_accessor type: ::String
390
390
  attr_accessor updated_at: ::Time
391
+ attr_accessor fix_available: ::String
392
+ attr_accessor exploit_available: ::String
391
393
  SENSITIVE: []
392
394
  end
393
395
 
@@ -1238,6 +1240,7 @@ module Aws::ECR
1238
1240
  attr_accessor release: ::String
1239
1241
  attr_accessor source_layer_hash: ::String
1240
1242
  attr_accessor version: ::String
1243
+ attr_accessor fixed_in_version: ::String
1241
1244
  SENSITIVE: []
1242
1245
  end
1243
1246
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-ecr
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.83.0
4
+ version: 1.85.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-09-11 00:00:00.000000000 Z
11
+ date: 2024-09-20 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -19,7 +19,7 @@ dependencies:
19
19
  version: '3'
20
20
  - - ">="
21
21
  - !ruby/object:Gem::Version
22
- version: 3.205.0
22
+ version: 3.207.0
23
23
  type: :runtime
24
24
  prerelease: false
25
25
  version_requirements: !ruby/object:Gem::Requirement
@@ -29,7 +29,7 @@ dependencies:
29
29
  version: '3'
30
30
  - - ">="
31
31
  - !ruby/object:Gem::Version
32
- version: 3.205.0
32
+ version: 3.207.0
33
33
  - !ruby/object:Gem::Dependency
34
34
  name: aws-sigv4
35
35
  requirement: !ruby/object:Gem::Requirement