aws-sdk-ecr 1.34.0 → 1.35.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 2ebf6eeeb70393724c995aa5b88da4a3e6950b938890ee7928e8e247e627c0b8
4
- data.tar.gz: f213e87634e76b01ac87bb243a724be04464fa5715dbf62eebb2d928ba1d824a
3
+ metadata.gz: 2b1a6d2d514c23e566ea671e6a13e63cfb75a410e6e0f48be3f731538fe6a901
4
+ data.tar.gz: 0fb93618f10c5680713f990102c88f9370daeaeb976f936a0b929c2b1e221d56
5
5
  SHA512:
6
- metadata.gz: 26d65172c84d58763389d803ceeeda47d8e504d945b7b35bb09b922b3910eab7d032fa7814dd64ce3ce8a0488af8406a6c046cbb3f1fc5f6d774bae47bc16186
7
- data.tar.gz: 4c99f612f73033798996aa7194936751dc26dcce9ee5b1111424ee9fd44690f270a4db2516f01805a4ef0fa051412aa5db3c0342e898f3fecdbd37663be17a8a
6
+ metadata.gz: 0dbc4e6f7862316dd57b011a87ddf8c6aff977192cf4de1d18e0f8be00091866a49a20c16fe23609ffc9e94e7dc9470a5ec646241ef004bac13131cb47d49252
7
+ data.tar.gz: 4dac2b35c18ecc5460b2e97333483096e6be64320befd3d3a6e9bf1bf30a0bcc05a7c8e32cfdfb267bc376c98a9b2dd08643313753291c73e884062912fb23f2
@@ -48,6 +48,6 @@ require_relative 'aws-sdk-ecr/customizations'
48
48
  # @service
49
49
  module Aws::ECR
50
50
 
51
- GEM_VERSION = '1.34.0'
51
+ GEM_VERSION = '1.35.0'
52
52
 
53
53
  end
@@ -456,7 +456,7 @@ module Aws::ECR
456
456
  # resp.failures #=> Array
457
457
  # resp.failures[0].image_id.image_digest #=> String
458
458
  # resp.failures[0].image_id.image_tag #=> String
459
- # resp.failures[0].failure_code #=> String, one of "InvalidImageDigest", "InvalidImageTag", "ImageTagDoesNotMatchDigest", "ImageNotFound", "MissingDigestAndTag", "ImageReferencedByManifestList"
459
+ # resp.failures[0].failure_code #=> String, one of "InvalidImageDigest", "InvalidImageTag", "ImageTagDoesNotMatchDigest", "ImageNotFound", "MissingDigestAndTag", "ImageReferencedByManifestList", "KmsError"
460
460
  # resp.failures[0].failure_reason #=> String
461
461
  #
462
462
  # @see http://docs.aws.amazon.com/goto/WebAPI/ecr-2015-09-21/BatchDeleteImage AWS API Documentation
@@ -557,7 +557,7 @@ module Aws::ECR
557
557
  # resp.failures #=> Array
558
558
  # resp.failures[0].image_id.image_digest #=> String
559
559
  # resp.failures[0].image_id.image_tag #=> String
560
- # resp.failures[0].failure_code #=> String, one of "InvalidImageDigest", "InvalidImageTag", "ImageTagDoesNotMatchDigest", "ImageNotFound", "MissingDigestAndTag", "ImageReferencedByManifestList"
560
+ # resp.failures[0].failure_code #=> String, one of "InvalidImageDigest", "InvalidImageTag", "ImageTagDoesNotMatchDigest", "ImageNotFound", "MissingDigestAndTag", "ImageReferencedByManifestList", "KmsError"
561
561
  # resp.failures[0].failure_reason #=> String
562
562
  #
563
563
  # @see http://docs.aws.amazon.com/goto/WebAPI/ecr-2015-09-21/BatchGetImage AWS API Documentation
@@ -659,9 +659,13 @@ module Aws::ECR
659
659
  # them from being overwritten.
660
660
  #
661
661
  # @option params [Types::ImageScanningConfiguration] :image_scanning_configuration
662
- # The image scanning configuration for the repository. This setting
663
- # determines whether images are scanned for known vulnerabilities after
664
- # being pushed to the repository.
662
+ # The image scanning configuration for the repository. This determines
663
+ # whether images are scanned for known vulnerabilities after being
664
+ # pushed to the repository.
665
+ #
666
+ # @option params [Types::EncryptionConfiguration] :encryption_configuration
667
+ # The encryption configuration for the repository. This determines how
668
+ # the contents of your repository are encrypted at rest.
665
669
  #
666
670
  # @return [Types::CreateRepositoryResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
667
671
  #
@@ -700,6 +704,10 @@ module Aws::ECR
700
704
  # image_scanning_configuration: {
701
705
  # scan_on_push: false,
702
706
  # },
707
+ # encryption_configuration: {
708
+ # encryption_type: "AES256", # required, accepts AES256, KMS
709
+ # kms_key: "KmsKey",
710
+ # },
703
711
  # })
704
712
  #
705
713
  # @example Response structure
@@ -711,6 +719,8 @@ module Aws::ECR
711
719
  # resp.repository.created_at #=> Time
712
720
  # resp.repository.image_tag_mutability #=> String, one of "MUTABLE", "IMMUTABLE"
713
721
  # resp.repository.image_scanning_configuration.scan_on_push #=> Boolean
722
+ # resp.repository.encryption_configuration.encryption_type #=> String, one of "AES256", "KMS"
723
+ # resp.repository.encryption_configuration.kms_key #=> String
714
724
  #
715
725
  # @see http://docs.aws.amazon.com/goto/WebAPI/ecr-2015-09-21/CreateRepository AWS API Documentation
716
726
  #
@@ -817,6 +827,8 @@ module Aws::ECR
817
827
  # resp.repository.created_at #=> Time
818
828
  # resp.repository.image_tag_mutability #=> String, one of "MUTABLE", "IMMUTABLE"
819
829
  # resp.repository.image_scanning_configuration.scan_on_push #=> Boolean
830
+ # resp.repository.encryption_configuration.encryption_type #=> String, one of "AES256", "KMS"
831
+ # resp.repository.encryption_configuration.kms_key #=> String
820
832
  #
821
833
  # @see http://docs.aws.amazon.com/goto/WebAPI/ecr-2015-09-21/DeleteRepository AWS API Documentation
822
834
  #
@@ -1159,6 +1171,8 @@ module Aws::ECR
1159
1171
  # resp.repositories[0].created_at #=> Time
1160
1172
  # resp.repositories[0].image_tag_mutability #=> String, one of "MUTABLE", "IMMUTABLE"
1161
1173
  # resp.repositories[0].image_scanning_configuration.scan_on_push #=> Boolean
1174
+ # resp.repositories[0].encryption_configuration.encryption_type #=> String, one of "AES256", "KMS"
1175
+ # resp.repositories[0].encryption_configuration.kms_key #=> String
1162
1176
  # resp.next_token #=> String
1163
1177
  #
1164
1178
  # @see http://docs.aws.amazon.com/goto/WebAPI/ecr-2015-09-21/DescribeRepositories AWS API Documentation
@@ -1690,7 +1704,8 @@ module Aws::ECR
1690
1704
  #
1691
1705
  # @option params [String] :image_tag
1692
1706
  # The tag to associate with the image. This parameter is required for
1693
- # images that use the Docker Image Manifest V2 Schema 2 or OCI formats.
1707
+ # images that use the Docker Image Manifest V2 Schema 2 or Open
1708
+ # Container Initiative (OCI) formats.
1694
1709
  #
1695
1710
  # @option params [String] :image_digest
1696
1711
  # The image digest of the image manifest corresponding to the image.
@@ -2137,7 +2152,7 @@ module Aws::ECR
2137
2152
  # The position of the last byte of the layer part within the overall
2138
2153
  # image layer.
2139
2154
  #
2140
- # @option params [required, String, IO] :layer_part_blob
2155
+ # @option params [required, String, StringIO, File] :layer_part_blob
2141
2156
  # The base64-encoded layer part payload.
2142
2157
  #
2143
2158
  # @return [Types::UploadLayerPartResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
@@ -2187,7 +2202,7 @@ module Aws::ECR
2187
2202
  params: params,
2188
2203
  config: config)
2189
2204
  context[:gem_name] = 'aws-sdk-ecr'
2190
- context[:gem_version] = '1.34.0'
2205
+ context[:gem_version] = '1.35.0'
2191
2206
  Seahorse::Client::Request.new(handlers, context)
2192
2207
  end
2193
2208
 
@@ -48,6 +48,8 @@ module Aws::ECR
48
48
  DescribeRepositoriesRequest = Shapes::StructureShape.new(name: 'DescribeRepositoriesRequest')
49
49
  DescribeRepositoriesResponse = Shapes::StructureShape.new(name: 'DescribeRepositoriesResponse')
50
50
  EmptyUploadException = Shapes::StructureShape.new(name: 'EmptyUploadException')
51
+ EncryptionConfiguration = Shapes::StructureShape.new(name: 'EncryptionConfiguration')
52
+ EncryptionType = Shapes::StringShape.new(name: 'EncryptionType')
51
53
  EvaluationTimestamp = Shapes::TimestampShape.new(name: 'EvaluationTimestamp')
52
54
  ExceptionMessage = Shapes::StringShape.new(name: 'ExceptionMessage')
53
55
  ExpirationTimestamp = Shapes::TimestampShape.new(name: 'ExpirationTimestamp')
@@ -101,6 +103,9 @@ module Aws::ECR
101
103
  InvalidLayerPartException = Shapes::StructureShape.new(name: 'InvalidLayerPartException')
102
104
  InvalidParameterException = Shapes::StructureShape.new(name: 'InvalidParameterException')
103
105
  InvalidTagParameterException = Shapes::StructureShape.new(name: 'InvalidTagParameterException')
106
+ KmsError = Shapes::StringShape.new(name: 'KmsError')
107
+ KmsException = Shapes::StructureShape.new(name: 'KmsException')
108
+ KmsKey = Shapes::StringShape.new(name: 'KmsKey')
104
109
  Layer = Shapes::StructureShape.new(name: 'Layer')
105
110
  LayerAlreadyExistsException = Shapes::StructureShape.new(name: 'LayerAlreadyExistsException')
106
111
  LayerAvailability = Shapes::StringShape.new(name: 'LayerAvailability')
@@ -251,6 +256,7 @@ module Aws::ECR
251
256
  CreateRepositoryRequest.add_member(:tags, Shapes::ShapeRef.new(shape: TagList, location_name: "tags"))
252
257
  CreateRepositoryRequest.add_member(:image_tag_mutability, Shapes::ShapeRef.new(shape: ImageTagMutability, location_name: "imageTagMutability"))
253
258
  CreateRepositoryRequest.add_member(:image_scanning_configuration, Shapes::ShapeRef.new(shape: ImageScanningConfiguration, location_name: "imageScanningConfiguration"))
259
+ CreateRepositoryRequest.add_member(:encryption_configuration, Shapes::ShapeRef.new(shape: EncryptionConfiguration, location_name: "encryptionConfiguration"))
254
260
  CreateRepositoryRequest.struct_class = Types::CreateRepositoryRequest
255
261
 
256
262
  CreateRepositoryResponse.add_member(:repository, Shapes::ShapeRef.new(shape: Repository, location_name: "repository"))
@@ -326,6 +332,10 @@ module Aws::ECR
326
332
  EmptyUploadException.add_member(:message, Shapes::ShapeRef.new(shape: ExceptionMessage, location_name: "message"))
327
333
  EmptyUploadException.struct_class = Types::EmptyUploadException
328
334
 
335
+ EncryptionConfiguration.add_member(:encryption_type, Shapes::ShapeRef.new(shape: EncryptionType, required: true, location_name: "encryptionType"))
336
+ EncryptionConfiguration.add_member(:kms_key, Shapes::ShapeRef.new(shape: KmsKey, location_name: "kmsKey"))
337
+ EncryptionConfiguration.struct_class = Types::EncryptionConfiguration
338
+
329
339
  FindingSeverityCounts.key = Shapes::ShapeRef.new(shape: FindingSeverity)
330
340
  FindingSeverityCounts.value = Shapes::ShapeRef.new(shape: SeverityCount)
331
341
 
@@ -481,6 +491,10 @@ module Aws::ECR
481
491
  InvalidTagParameterException.add_member(:message, Shapes::ShapeRef.new(shape: ExceptionMessage, location_name: "message"))
482
492
  InvalidTagParameterException.struct_class = Types::InvalidTagParameterException
483
493
 
494
+ KmsException.add_member(:message, Shapes::ShapeRef.new(shape: ExceptionMessage, location_name: "message"))
495
+ KmsException.add_member(:kms_error, Shapes::ShapeRef.new(shape: KmsError, location_name: "kmsError"))
496
+ KmsException.struct_class = Types::KmsException
497
+
484
498
  Layer.add_member(:layer_digest, Shapes::ShapeRef.new(shape: LayerDigest, location_name: "layerDigest"))
485
499
  Layer.add_member(:layer_availability, Shapes::ShapeRef.new(shape: LayerAvailability, location_name: "layerAvailability"))
486
500
  Layer.add_member(:layer_size, Shapes::ShapeRef.new(shape: LayerSizeInBytes, location_name: "layerSize"))
@@ -613,6 +627,7 @@ module Aws::ECR
613
627
  Repository.add_member(:created_at, Shapes::ShapeRef.new(shape: CreationTimestamp, location_name: "createdAt"))
614
628
  Repository.add_member(:image_tag_mutability, Shapes::ShapeRef.new(shape: ImageTagMutability, location_name: "imageTagMutability"))
615
629
  Repository.add_member(:image_scanning_configuration, Shapes::ShapeRef.new(shape: ImageScanningConfiguration, location_name: "imageScanningConfiguration"))
630
+ Repository.add_member(:encryption_configuration, Shapes::ShapeRef.new(shape: EncryptionConfiguration, location_name: "encryptionConfiguration"))
616
631
  Repository.struct_class = Types::Repository
617
632
 
618
633
  RepositoryAlreadyExistsException.add_member(:message, Shapes::ShapeRef.new(shape: ExceptionMessage, location_name: "message"))
@@ -780,6 +795,7 @@ module Aws::ECR
780
795
  o.errors << Shapes::ShapeRef.new(shape: LayerPartTooSmallException)
781
796
  o.errors << Shapes::ShapeRef.new(shape: LayerAlreadyExistsException)
782
797
  o.errors << Shapes::ShapeRef.new(shape: EmptyUploadException)
798
+ o.errors << Shapes::ShapeRef.new(shape: KmsException)
783
799
  end)
784
800
 
785
801
  api.add_operation(:create_repository, Seahorse::Model::Operation.new.tap do |o|
@@ -794,6 +810,7 @@ module Aws::ECR
794
810
  o.errors << Shapes::ShapeRef.new(shape: TooManyTagsException)
795
811
  o.errors << Shapes::ShapeRef.new(shape: RepositoryAlreadyExistsException)
796
812
  o.errors << Shapes::ShapeRef.new(shape: LimitExceededException)
813
+ o.errors << Shapes::ShapeRef.new(shape: KmsException)
797
814
  end)
798
815
 
799
816
  api.add_operation(:delete_lifecycle_policy, Seahorse::Model::Operation.new.tap do |o|
@@ -818,6 +835,7 @@ module Aws::ECR
818
835
  o.errors << Shapes::ShapeRef.new(shape: InvalidParameterException)
819
836
  o.errors << Shapes::ShapeRef.new(shape: RepositoryNotFoundException)
820
837
  o.errors << Shapes::ShapeRef.new(shape: RepositoryNotEmptyException)
838
+ o.errors << Shapes::ShapeRef.new(shape: KmsException)
821
839
  end)
822
840
 
823
841
  api.add_operation(:delete_repository_policy, Seahorse::Model::Operation.new.tap do |o|
@@ -960,6 +978,7 @@ module Aws::ECR
960
978
  o.errors << Shapes::ShapeRef.new(shape: ServerException)
961
979
  o.errors << Shapes::ShapeRef.new(shape: InvalidParameterException)
962
980
  o.errors << Shapes::ShapeRef.new(shape: RepositoryNotFoundException)
981
+ o.errors << Shapes::ShapeRef.new(shape: KmsException)
963
982
  end)
964
983
 
965
984
  api.add_operation(:list_images, Seahorse::Model::Operation.new.tap do |o|
@@ -1005,6 +1024,7 @@ module Aws::ECR
1005
1024
  o.errors << Shapes::ShapeRef.new(shape: LimitExceededException)
1006
1025
  o.errors << Shapes::ShapeRef.new(shape: ImageTagAlreadyExistsException)
1007
1026
  o.errors << Shapes::ShapeRef.new(shape: ImageDigestDoesNotMatchException)
1027
+ o.errors << Shapes::ShapeRef.new(shape: KmsException)
1008
1028
  end)
1009
1029
 
1010
1030
  api.add_operation(:put_image_scanning_configuration, Seahorse::Model::Operation.new.tap do |o|
@@ -1116,6 +1136,7 @@ module Aws::ECR
1116
1136
  o.errors << Shapes::ShapeRef.new(shape: RepositoryNotFoundException)
1117
1137
  o.errors << Shapes::ShapeRef.new(shape: UploadNotFoundException)
1118
1138
  o.errors << Shapes::ShapeRef.new(shape: LimitExceededException)
1139
+ o.errors << Shapes::ShapeRef.new(shape: KmsException)
1119
1140
  end)
1120
1141
  end
1121
1142
 
@@ -36,6 +36,7 @@ module Aws::ECR
36
36
  # * {InvalidLayerPartException}
37
37
  # * {InvalidParameterException}
38
38
  # * {InvalidTagParameterException}
39
+ # * {KmsException}
39
40
  # * {LayerAlreadyExistsException}
40
41
  # * {LayerInaccessibleException}
41
42
  # * {LayerPartTooSmallException}
@@ -216,6 +217,26 @@ module Aws::ECR
216
217
  end
217
218
  end
218
219
 
220
+ class KmsException < ServiceError
221
+
222
+ # @param [Seahorse::Client::RequestContext] context
223
+ # @param [String] message
224
+ # @param [Aws::ECR::Types::KmsException] data
225
+ def initialize(context, message, data = Aws::EmptyStructure.new)
226
+ super(context, message, data)
227
+ end
228
+
229
+ # @return [String]
230
+ def message
231
+ @message || @data[:message]
232
+ end
233
+
234
+ # @return [String]
235
+ def kms_error
236
+ @data[:kms_error]
237
+ end
238
+ end
239
+
219
240
  class LayerAlreadyExistsException < ServiceError
220
241
 
221
242
  # @param [Seahorse::Client::RequestContext] context
@@ -322,6 +322,10 @@ module Aws::ECR
322
322
  # image_scanning_configuration: {
323
323
  # scan_on_push: false,
324
324
  # },
325
+ # encryption_configuration: {
326
+ # encryption_type: "AES256", # required, accepts AES256, KMS
327
+ # kms_key: "KmsKey",
328
+ # },
325
329
  # }
326
330
  #
327
331
  # @!attribute [rw] repository_name
@@ -348,18 +352,24 @@ module Aws::ECR
348
352
  # @return [String]
349
353
  #
350
354
  # @!attribute [rw] image_scanning_configuration
351
- # The image scanning configuration for the repository. This setting
352
- # determines whether images are scanned for known vulnerabilities
353
- # after being pushed to the repository.
355
+ # The image scanning configuration for the repository. This determines
356
+ # whether images are scanned for known vulnerabilities after being
357
+ # pushed to the repository.
354
358
  # @return [Types::ImageScanningConfiguration]
355
359
  #
360
+ # @!attribute [rw] encryption_configuration
361
+ # The encryption configuration for the repository. This determines how
362
+ # the contents of your repository are encrypted at rest.
363
+ # @return [Types::EncryptionConfiguration]
364
+ #
356
365
  # @see http://docs.aws.amazon.com/goto/WebAPI/ecr-2015-09-21/CreateRepositoryRequest AWS API Documentation
357
366
  #
358
367
  class CreateRepositoryRequest < Struct.new(
359
368
  :repository_name,
360
369
  :tags,
361
370
  :image_tag_mutability,
362
- :image_scanning_configuration)
371
+ :image_scanning_configuration,
372
+ :encryption_configuration)
363
373
  SENSITIVE = []
364
374
  include Aws::Structure
365
375
  end
@@ -840,6 +850,75 @@ module Aws::ECR
840
850
  include Aws::Structure
841
851
  end
842
852
 
853
+ # The encryption configuration for the repository. This determines how
854
+ # the contents of your repository are encrypted at rest.
855
+ #
856
+ # By default, when no encryption configuration is set or the `AES256`
857
+ # encryption type is used, Amazon ECR uses server-side encryption with
858
+ # Amazon S3-managed encryption keys which encrypts your data at rest
859
+ # using an AES-256 encryption algorithm. This does not require any
860
+ # action on your part.
861
+ #
862
+ # For more control over the encryption of the contents of your
863
+ # repository, you can use server-side encryption with customer master
864
+ # keys (CMKs) stored in AWS Key Management Service (AWS KMS) to encrypt
865
+ # your images. For more information, see [Amazon ECR encryption at
866
+ # rest][1] in the *Amazon Elastic Container Registry User Guide*.
867
+ #
868
+ #
869
+ #
870
+ # [1]: https://docs.aws.amazon.com/AmazonECR/latest/userguide/encryption-at-rest.html
871
+ #
872
+ # @note When making an API call, you may pass EncryptionConfiguration
873
+ # data as a hash:
874
+ #
875
+ # {
876
+ # encryption_type: "AES256", # required, accepts AES256, KMS
877
+ # kms_key: "KmsKey",
878
+ # }
879
+ #
880
+ # @!attribute [rw] encryption_type
881
+ # The encryption type to use.
882
+ #
883
+ # If you use the `KMS` encryption type, the contents of the repository
884
+ # will be encrypted using server-side encryption with customer master
885
+ # keys (CMKs) stored in AWS KMS. When you use AWS KMS to encrypt your
886
+ # data, you can either use the default AWS managed CMK for Amazon ECR,
887
+ # or specify your own CMK, which you already created. For more
888
+ # information, see [Protecting Data Using Server-Side Encryption with
889
+ # CMKs Stored in AWS Key Management Service (SSE-KMS)][1] in the
890
+ # *Amazon Simple Storage Service Console Developer Guide.*.
891
+ #
892
+ # If you use the `AES256` encryption type, Amazon ECR uses server-side
893
+ # encryption with Amazon S3-managed encryption keys which encrypts the
894
+ # images in the repository using an AES-256 encryption algorithm. For
895
+ # more information, see [Protecting Data Using Server-Side Encryption
896
+ # with Amazon S3-Managed Encryption Keys (SSE-S3)][2] in the *Amazon
897
+ # Simple Storage Service Console Developer Guide.*.
898
+ #
899
+ #
900
+ #
901
+ # [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingKMSEncryption.html
902
+ # [2]: https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html
903
+ # @return [String]
904
+ #
905
+ # @!attribute [rw] kms_key
906
+ # If you use the `KMS` encryption type, specify the CMK to use for
907
+ # encryption. The alias, key ID, or full ARN of the CMK can be
908
+ # specified. The key must exist in the same Region as the repository.
909
+ # If no key is specified, the default AWS managed CMK for Amazon ECR
910
+ # will be used.
911
+ # @return [String]
912
+ #
913
+ # @see http://docs.aws.amazon.com/goto/WebAPI/ecr-2015-09-21/EncryptionConfiguration AWS API Documentation
914
+ #
915
+ class EncryptionConfiguration < Struct.new(
916
+ :encryption_type,
917
+ :kms_key)
918
+ SENSITIVE = []
919
+ include Aws::Structure
920
+ end
921
+
843
922
  # @note When making an API call, you may pass GetAuthorizationTokenRequest
844
923
  # data as a hash:
845
924
  #
@@ -1615,6 +1694,24 @@ module Aws::ECR
1615
1694
  include Aws::Structure
1616
1695
  end
1617
1696
 
1697
+ # The operation failed due to a KMS exception.
1698
+ #
1699
+ # @!attribute [rw] message
1700
+ # @return [String]
1701
+ #
1702
+ # @!attribute [rw] kms_error
1703
+ # The error code returned by AWS KMS.
1704
+ # @return [String]
1705
+ #
1706
+ # @see http://docs.aws.amazon.com/goto/WebAPI/ecr-2015-09-21/KmsException AWS API Documentation
1707
+ #
1708
+ class KmsException < Struct.new(
1709
+ :message,
1710
+ :kms_error)
1711
+ SENSITIVE = []
1712
+ include Aws::Structure
1713
+ end
1714
+
1618
1715
  # An object representing an Amazon ECR image layer.
1619
1716
  #
1620
1717
  # @!attribute [rw] layer_digest
@@ -1763,8 +1860,8 @@ module Aws::ECR
1763
1860
  include Aws::Structure
1764
1861
  end
1765
1862
 
1766
- # The previous lifecycle policy preview request has not completed.
1767
- # Please try again later.
1863
+ # The previous lifecycle policy preview request has not completed. Wait
1864
+ # and try again.
1768
1865
  #
1769
1866
  # @!attribute [rw] message
1770
1867
  # @return [String]
@@ -2047,8 +2144,8 @@ module Aws::ECR
2047
2144
  #
2048
2145
  # @!attribute [rw] image_tag
2049
2146
  # The tag to associate with the image. This parameter is required for
2050
- # images that use the Docker Image Manifest V2 Schema 2 or OCI
2051
- # formats.
2147
+ # images that use the Docker Image Manifest V2 Schema 2 or Open
2148
+ # Container Initiative (OCI) formats.
2052
2149
  # @return [String]
2053
2150
  #
2054
2151
  # @!attribute [rw] image_digest
@@ -2288,8 +2385,8 @@ module Aws::ECR
2288
2385
  # @return [String]
2289
2386
  #
2290
2387
  # @!attribute [rw] repository_uri
2291
- # The URI for the repository. You can use this URI for Docker `push`
2292
- # or `pull` operations.
2388
+ # The URI for the repository. You can use this URI for container image
2389
+ # `push` and `pull` operations.
2293
2390
  # @return [String]
2294
2391
  #
2295
2392
  # @!attribute [rw] created_at
@@ -2305,6 +2402,11 @@ module Aws::ECR
2305
2402
  # The image scanning configuration for a repository.
2306
2403
  # @return [Types::ImageScanningConfiguration]
2307
2404
  #
2405
+ # @!attribute [rw] encryption_configuration
2406
+ # The encryption configuration for the repository. This determines how
2407
+ # the contents of your repository are encrypted at rest.
2408
+ # @return [Types::EncryptionConfiguration]
2409
+ #
2308
2410
  # @see http://docs.aws.amazon.com/goto/WebAPI/ecr-2015-09-21/Repository AWS API Documentation
2309
2411
  #
2310
2412
  class Repository < Struct.new(
@@ -2314,7 +2416,8 @@ module Aws::ECR
2314
2416
  :repository_uri,
2315
2417
  :created_at,
2316
2418
  :image_tag_mutability,
2317
- :image_scanning_configuration)
2419
+ :image_scanning_configuration,
2420
+ :encryption_configuration)
2318
2421
  SENSITIVE = []
2319
2422
  include Aws::Structure
2320
2423
  end
@@ -2814,7 +2917,7 @@ module Aws::ECR
2814
2917
  include Aws::Structure
2815
2918
  end
2816
2919
 
2817
- # The upload could not be found, or the specified upload id is not valid
2920
+ # The upload could not be found, or the specified upload ID is not valid
2818
2921
  # for this repository.
2819
2922
  #
2820
2923
  # @!attribute [rw] message
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-ecr
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.34.0
4
+ version: 1.35.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2020-07-02 00:00:00.000000000 Z
11
+ date: 2020-07-29 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core