aws-sdk-ecr 1.83.0 → 1.85.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 4b4d570021bde605b1495c44fb5318d62054ad4059f09fe24005702174ac4c9d
4
- data.tar.gz: df6f040f6804197c9ba9929feba735b54a415a64988b61e55ad02c99c3b10587
3
+ metadata.gz: 5901329d48b4e1388d6a222235a7fbff1c3f9c64268296340458d9d555d51bc2
4
+ data.tar.gz: 0b4d1c8828b2bde3c6495abf9869a13ed5c747f279bc1d4f94157b06df8cba34
5
5
  SHA512:
6
- metadata.gz: 5793455e4b19ad8ad0522d516a27052cecb117ae4bb188329d1aa4506c18e8660538096c5e81c10e8673ef3788315eb7a2394ba526b0e4c8446501a28260980d
7
- data.tar.gz: a0e904f946631b8858caf9c6832bbe3be05cb160e35f7de592759729d8d1a2d1634b24df951ff553d81fba7cebcac1f31688e558dc82c56f05da1c393521a901
6
+ metadata.gz: 1cb79edddefb30e03522115cf41a7169630a7d415426160c53c1b2c917db76d44a614a3f4cb9727d05fb1e8c9834eddce6e9b61dbdb71cdebe05c2a700e43541
7
+ data.tar.gz: 6bb2155bd9578e09f2b7339724bdd9ad5d4bcfc2b283bfc0a548d548eadb7fbbaffad7ac1cfaa9d575db52165207ba7903058e879c14384226cc4da155dadf87
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.85.0 (2024-09-20)
5
+ ------------------
6
+
7
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
8
+
9
+ 1.84.0 (2024-09-17)
10
+ ------------------
11
+
12
+ * Feature - The `DescribeImageScanning` API now includes `fixAvailable`, `exploitAvailable`, and `fixedInVersion` fields to provide more detailed information about the availability of fixes, exploits, and fixed versions for identified image vulnerabilities.
13
+
4
14
  1.83.0 (2024-09-11)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.83.0
1
+ 1.85.0
@@ -130,13 +130,15 @@ module Aws::ECR
130
130
  # locations will be searched for credentials:
131
131
  #
132
132
  # * `Aws.config[:credentials]`
133
- # * The `:access_key_id`, `:secret_access_key`, and `:session_token` options.
134
- # * ENV['AWS_ACCESS_KEY_ID'], ENV['AWS_SECRET_ACCESS_KEY']
133
+ # * The `:access_key_id`, `:secret_access_key`, `:session_token`, and
134
+ # `:account_id` options.
135
+ # * ENV['AWS_ACCESS_KEY_ID'], ENV['AWS_SECRET_ACCESS_KEY'],
136
+ # ENV['AWS_SESSION_TOKEN'], and ENV['AWS_ACCOUNT_ID']
135
137
  # * `~/.aws/credentials`
136
138
  # * `~/.aws/config`
137
139
  # * EC2/ECS IMDS instance profile - When used by default, the timeouts
138
140
  # are very aggressive. Construct and pass an instance of
139
- # `Aws::InstanceProfileCredentails` or `Aws::ECSCredentials` to
141
+ # `Aws::InstanceProfileCredentials` or `Aws::ECSCredentials` to
140
142
  # enable retries and extended timeouts. Instance profile credential
141
143
  # fetching can be disabled by setting ENV['AWS_EC2_METADATA_DISABLED']
142
144
  # to true.
@@ -155,6 +157,8 @@ module Aws::ECR
155
157
  #
156
158
  # @option options [String] :access_key_id
157
159
  #
160
+ # @option options [String] :account_id
161
+ #
158
162
  # @option options [Boolean] :active_endpoint_cache (false)
159
163
  # When set to `true`, a thread polling for endpoints will be running in
160
164
  # the background every 60 secs (default). Defaults to `false`.
@@ -376,7 +380,9 @@ module Aws::ECR
376
380
  # sending the request.
377
381
  #
378
382
  # @option options [Aws::ECR::EndpointProvider] :endpoint_provider
379
- # The endpoint provider used to resolve endpoints. Any object that responds to `#resolve_endpoint(parameters)` where `parameters` is a Struct similar to `Aws::ECR::EndpointParameters`
383
+ # The endpoint provider used to resolve endpoints. Any object that responds to
384
+ # `#resolve_endpoint(parameters)` where `parameters` is a Struct similar to
385
+ # `Aws::ECR::EndpointParameters`.
380
386
  #
381
387
  # @option options [Float] :http_continue_timeout (1)
382
388
  # The number of seconds to wait for a 100-continue response before sending the
@@ -1623,6 +1629,7 @@ module Aws::ECR
1623
1629
  # resp.image_scan_findings.enhanced_findings[0].package_vulnerability_details.vulnerable_packages[0].release #=> String
1624
1630
  # resp.image_scan_findings.enhanced_findings[0].package_vulnerability_details.vulnerable_packages[0].source_layer_hash #=> String
1625
1631
  # resp.image_scan_findings.enhanced_findings[0].package_vulnerability_details.vulnerable_packages[0].version #=> String
1632
+ # resp.image_scan_findings.enhanced_findings[0].package_vulnerability_details.vulnerable_packages[0].fixed_in_version #=> String
1626
1633
  # resp.image_scan_findings.enhanced_findings[0].remediation.recommendation.url #=> String
1627
1634
  # resp.image_scan_findings.enhanced_findings[0].remediation.recommendation.text #=> String
1628
1635
  # resp.image_scan_findings.enhanced_findings[0].resources #=> Array
@@ -1652,6 +1659,8 @@ module Aws::ECR
1652
1659
  # resp.image_scan_findings.enhanced_findings[0].title #=> String
1653
1660
  # resp.image_scan_findings.enhanced_findings[0].type #=> String
1654
1661
  # resp.image_scan_findings.enhanced_findings[0].updated_at #=> Time
1662
+ # resp.image_scan_findings.enhanced_findings[0].fix_available #=> String
1663
+ # resp.image_scan_findings.enhanced_findings[0].exploit_available #=> String
1655
1664
  # resp.next_token #=> String
1656
1665
  #
1657
1666
  #
@@ -3666,7 +3675,7 @@ module Aws::ECR
3666
3675
  tracer: tracer
3667
3676
  )
3668
3677
  context[:gem_name] = 'aws-sdk-ecr'
3669
- context[:gem_version] = '1.83.0'
3678
+ context[:gem_version] = '1.85.0'
3670
3679
  Seahorse::Client::Request.new(handlers, context)
3671
3680
  end
3672
3681
 
@@ -91,12 +91,15 @@ module Aws::ECR
91
91
  EvaluationTimestamp = Shapes::TimestampShape.new(name: 'EvaluationTimestamp')
92
92
  ExceptionMessage = Shapes::StringShape.new(name: 'ExceptionMessage')
93
93
  ExpirationTimestamp = Shapes::TimestampShape.new(name: 'ExpirationTimestamp')
94
+ ExploitAvailable = Shapes::StringShape.new(name: 'ExploitAvailable')
94
95
  FilePath = Shapes::StringShape.new(name: 'FilePath')
95
96
  FindingArn = Shapes::StringShape.new(name: 'FindingArn')
96
97
  FindingDescription = Shapes::StringShape.new(name: 'FindingDescription')
97
98
  FindingName = Shapes::StringShape.new(name: 'FindingName')
98
99
  FindingSeverity = Shapes::StringShape.new(name: 'FindingSeverity')
99
100
  FindingSeverityCounts = Shapes::MapShape.new(name: 'FindingSeverityCounts')
101
+ FixAvailable = Shapes::StringShape.new(name: 'FixAvailable')
102
+ FixedInVersion = Shapes::StringShape.new(name: 'FixedInVersion')
100
103
  ForceFlag = Shapes::BooleanShape.new(name: 'ForceFlag')
101
104
  GetAccountSettingRequest = Shapes::StructureShape.new(name: 'GetAccountSettingRequest')
102
105
  GetAccountSettingResponse = Shapes::StructureShape.new(name: 'GetAccountSettingResponse')
@@ -637,6 +640,8 @@ module Aws::ECR
637
640
  EnhancedImageScanFinding.add_member(:title, Shapes::ShapeRef.new(shape: Title, location_name: "title"))
638
641
  EnhancedImageScanFinding.add_member(:type, Shapes::ShapeRef.new(shape: Type, location_name: "type"))
639
642
  EnhancedImageScanFinding.add_member(:updated_at, Shapes::ShapeRef.new(shape: Date, location_name: "updatedAt"))
643
+ EnhancedImageScanFinding.add_member(:fix_available, Shapes::ShapeRef.new(shape: FixAvailable, location_name: "fixAvailable"))
644
+ EnhancedImageScanFinding.add_member(:exploit_available, Shapes::ShapeRef.new(shape: ExploitAvailable, location_name: "exploitAvailable"))
640
645
  EnhancedImageScanFinding.struct_class = Types::EnhancedImageScanFinding
641
646
 
642
647
  EnhancedImageScanFindingList.member = Shapes::ShapeRef.new(shape: EnhancedImageScanFinding)
@@ -1303,6 +1308,7 @@ module Aws::ECR
1303
1308
  VulnerablePackage.add_member(:release, Shapes::ShapeRef.new(shape: Release, location_name: "release"))
1304
1309
  VulnerablePackage.add_member(:source_layer_hash, Shapes::ShapeRef.new(shape: SourceLayerHash, location_name: "sourceLayerHash"))
1305
1310
  VulnerablePackage.add_member(:version, Shapes::ShapeRef.new(shape: Version, location_name: "version"))
1311
+ VulnerablePackage.add_member(:fixed_in_version, Shapes::ShapeRef.new(shape: FixedInVersion, location_name: "fixedInVersion"))
1306
1312
  VulnerablePackage.struct_class = Types::VulnerablePackage
1307
1313
 
1308
1314
  VulnerablePackagesList.member = Shapes::ShapeRef.new(shape: VulnerablePackage)
@@ -15,11 +15,11 @@ module Aws::ECR
15
15
  :endpoint_provider,
16
16
  doc_type: 'Aws::ECR::EndpointProvider',
17
17
  rbs_type: 'untyped',
18
- docstring: 'The endpoint provider used to resolve endpoints. Any '\
19
- 'object that responds to `#resolve_endpoint(parameters)` '\
20
- 'where `parameters` is a Struct similar to '\
21
- '`Aws::ECR::EndpointParameters`'
22
- ) do |cfg|
18
+ docstring: <<~DOCS) do |_cfg|
19
+ The endpoint provider used to resolve endpoints. Any object that responds to
20
+ `#resolve_endpoint(parameters)` where `parameters` is a Struct similar to
21
+ `Aws::ECR::EndpointParameters`.
22
+ DOCS
23
23
  Aws::ECR::EndpointProvider.new
24
24
  end
25
25
 
@@ -51,6 +51,9 @@ module Aws::ECR
51
51
  if context[:auth_scheme] && context[:auth_scheme]['name'] == 'sigv4a'
52
52
  metrics << 'SIGV4A_SIGNING'
53
53
  end
54
+ if context.config.credentials&.credentials&.account_id
55
+ metrics << 'RESOLVED_ACCOUNT_ID'
56
+ end
54
57
  Aws::Plugins::UserAgent.metric(*metrics, &block)
55
58
  end
56
59
 
@@ -1432,20 +1432,20 @@ module Aws::ECR
1432
1432
  # If you use the `KMS_DSSE` encryption type, the contents of the
1433
1433
  # repository will be encrypted with two layers of encryption using
1434
1434
  # server-side encryption with the KMS Management Service key stored in
1435
- # KMS. Similar to the KMS encryption type, you can either use the
1435
+ # KMS. Similar to the `KMS` encryption type, you can either use the
1436
1436
  # default Amazon Web Services managed KMS key for Amazon ECR, or
1437
1437
  # specify your own KMS key, which you've already created.
1438
1438
  #
1439
1439
  # If you use the `AES256` encryption type, Amazon ECR uses server-side
1440
1440
  # encryption with Amazon S3-managed encryption keys which encrypts the
1441
- # images in the repository using an AES256 encryption algorithm. For
1442
- # more information, see [Protecting data using server-side encryption
1443
- # with Amazon S3-managed encryption keys (SSE-S3)][1] in the *Amazon
1444
- # Simple Storage Service Console Developer Guide*.
1441
+ # images in the repository using an AES256 encryption algorithm.
1442
+ #
1443
+ # For more information, see [Amazon ECR encryption at rest][1] in the
1444
+ # *Amazon Elastic Container Registry User Guide*.
1445
1445
  #
1446
1446
  #
1447
1447
  #
1448
- # [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html
1448
+ # [1]: https://docs.aws.amazon.com/AmazonECR/latest/userguide/encryption-at-rest.html
1449
1449
  # @return [String]
1450
1450
  #
1451
1451
  # @!attribute [rw] kms_key
@@ -1576,6 +1576,18 @@ module Aws::ECR
1576
1576
  # The date and time the finding was last updated at.
1577
1577
  # @return [Time]
1578
1578
  #
1579
+ # @!attribute [rw] fix_available
1580
+ # Details on whether a fix is available through a version update. This
1581
+ # value can be `YES`, `NO`, or `PARTIAL`. A `PARTIAL` fix means that
1582
+ # some, but not all, of the packages identified in the finding have
1583
+ # fixes available through updated versions.
1584
+ # @return [String]
1585
+ #
1586
+ # @!attribute [rw] exploit_available
1587
+ # If a finding discovered in your environment has an exploit
1588
+ # available.
1589
+ # @return [String]
1590
+ #
1579
1591
  # @see http://docs.aws.amazon.com/goto/WebAPI/ecr-2015-09-21/EnhancedImageScanFinding AWS API Documentation
1580
1592
  #
1581
1593
  class EnhancedImageScanFinding < Struct.new(
@@ -1593,7 +1605,9 @@ module Aws::ECR
1593
1605
  :status,
1594
1606
  :title,
1595
1607
  :type,
1596
- :updated_at)
1608
+ :updated_at,
1609
+ :fix_available,
1610
+ :exploit_available)
1597
1611
  SENSITIVE = []
1598
1612
  include Aws::Structure
1599
1613
  end
@@ -4605,6 +4619,10 @@ module Aws::ECR
4605
4619
  # The version of the vulnerable package.
4606
4620
  # @return [String]
4607
4621
  #
4622
+ # @!attribute [rw] fixed_in_version
4623
+ # The version of the package that contains the vulnerability fix.
4624
+ # @return [String]
4625
+ #
4608
4626
  # @see http://docs.aws.amazon.com/goto/WebAPI/ecr-2015-09-21/VulnerablePackage AWS API Documentation
4609
4627
  #
4610
4628
  class VulnerablePackage < Struct.new(
@@ -4615,7 +4633,8 @@ module Aws::ECR
4615
4633
  :package_manager,
4616
4634
  :release,
4617
4635
  :source_layer_hash,
4618
- :version)
4636
+ :version,
4637
+ :fixed_in_version)
4619
4638
  SENSITIVE = []
4620
4639
  include Aws::Structure
4621
4640
  end
data/lib/aws-sdk-ecr.rb CHANGED
@@ -53,6 +53,6 @@ require_relative 'aws-sdk-ecr/customizations'
53
53
  # @!group service
54
54
  module Aws::ECR
55
55
 
56
- GEM_VERSION = '1.83.0'
56
+ GEM_VERSION = '1.85.0'
57
57
 
58
58
  end
data/sig/client.rbs CHANGED
@@ -15,6 +15,7 @@ module Aws
15
15
  ?credentials: untyped,
16
16
  ?region: String,
17
17
  ?access_key_id: String,
18
+ ?account_id: String,
18
19
  ?active_endpoint_cache: bool,
19
20
  ?adaptive_retry_wait_to_fill: bool,
20
21
  ?client_side_monitoring: bool,
data/sig/resource.rbs CHANGED
@@ -15,6 +15,7 @@ module Aws
15
15
  ?credentials: untyped,
16
16
  ?region: String,
17
17
  ?access_key_id: String,
18
+ ?account_id: String,
18
19
  ?active_endpoint_cache: bool,
19
20
  ?adaptive_retry_wait_to_fill: bool,
20
21
  ?client_side_monitoring: bool,
data/sig/types.rbs CHANGED
@@ -388,6 +388,8 @@ module Aws::ECR
388
388
  attr_accessor title: ::String
389
389
  attr_accessor type: ::String
390
390
  attr_accessor updated_at: ::Time
391
+ attr_accessor fix_available: ::String
392
+ attr_accessor exploit_available: ::String
391
393
  SENSITIVE: []
392
394
  end
393
395
 
@@ -1238,6 +1240,7 @@ module Aws::ECR
1238
1240
  attr_accessor release: ::String
1239
1241
  attr_accessor source_layer_hash: ::String
1240
1242
  attr_accessor version: ::String
1243
+ attr_accessor fixed_in_version: ::String
1241
1244
  SENSITIVE: []
1242
1245
  end
1243
1246
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-ecr
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.83.0
4
+ version: 1.85.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-09-11 00:00:00.000000000 Z
11
+ date: 2024-09-20 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -19,7 +19,7 @@ dependencies:
19
19
  version: '3'
20
20
  - - ">="
21
21
  - !ruby/object:Gem::Version
22
- version: 3.205.0
22
+ version: 3.207.0
23
23
  type: :runtime
24
24
  prerelease: false
25
25
  version_requirements: !ruby/object:Gem::Requirement
@@ -29,7 +29,7 @@ dependencies:
29
29
  version: '3'
30
30
  - - ">="
31
31
  - !ruby/object:Gem::Version
32
- version: 3.205.0
32
+ version: 3.207.0
33
33
  - !ruby/object:Gem::Dependency
34
34
  name: aws-sigv4
35
35
  requirement: !ruby/object:Gem::Requirement