@aws-sdk/client-ecr 3.408.0 → 3.409.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/endpoint/ruleset.js +2 -2
- package/dist-es/endpoint/ruleset.js +2 -2
- package/dist-types/ECR.d.ts +2 -2
- package/dist-types/ECRClient.d.ts +2 -2
- package/dist-types/commands/BatchCheckLayerAvailabilityCommand.d.ts +4 -4
- package/dist-types/commands/BatchDeleteImageCommand.d.ts +3 -3
- package/dist-types/commands/BatchGetImageCommand.d.ts +2 -2
- package/dist-types/commands/BatchGetRepositoryScanningConfigurationCommand.d.ts +3 -3
- package/dist-types/commands/CompleteLayerUploadCommand.d.ts +2 -2
- package/dist-types/commands/CreateRepositoryCommand.d.ts +4 -4
- package/dist-types/commands/DeleteRepositoryCommand.d.ts +2 -2
- package/dist-types/commands/DescribeImageReplicationStatusCommand.d.ts +1 -1
- package/dist-types/commands/DescribeImageScanFindingsCommand.d.ts +2 -2
- package/dist-types/commands/DescribeImagesCommand.d.ts +4 -4
- package/dist-types/commands/DescribeRegistryCommand.d.ts +1 -1
- package/dist-types/commands/DescribeRepositoriesCommand.d.ts +2 -2
- package/dist-types/commands/GetAuthorizationTokenCommand.d.ts +1 -1
- package/dist-types/commands/GetDownloadUrlForLayerCommand.d.ts +2 -2
- package/dist-types/commands/GetLifecyclePolicyPreviewCommand.d.ts +3 -3
- package/dist-types/commands/GetRegistryScanningConfigurationCommand.d.ts +3 -3
- package/dist-types/commands/InitiateLayerUploadCommand.d.ts +2 -2
- package/dist-types/commands/ListImagesCommand.d.ts +2 -2
- package/dist-types/commands/PutImageCommand.d.ts +2 -3
- package/dist-types/commands/PutImageScanningConfigurationCommand.d.ts +2 -2
- package/dist-types/commands/PutImageTagMutabilityCommand.d.ts +2 -2
- package/dist-types/commands/PutRegistryPolicyCommand.d.ts +1 -1
- package/dist-types/commands/PutRegistryScanningConfigurationCommand.d.ts +6 -6
- package/dist-types/commands/PutReplicationConfigurationCommand.d.ts +4 -4
- package/dist-types/commands/StartImageScanCommand.d.ts +1 -1
- package/dist-types/commands/StartLifecyclePolicyPreviewCommand.d.ts +1 -1
- package/dist-types/commands/UploadLayerPartCommand.d.ts +2 -2
- package/dist-types/index.d.ts +2 -2
- package/dist-types/models/models_0.d.ts +16 -16
- package/package.json +3 -3
|
@@ -2,6 +2,6 @@
|
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
3
|
exports.ruleSet = void 0;
|
|
4
4
|
const t = "required", u = "fn", v = "argv", w = "ref";
|
|
5
|
-
const a = "
|
|
6
|
-
const _data = { version: "1.0", parameters: { Region:
|
|
5
|
+
const a = "isSet", b = "tree", c = "error", d = "endpoint", e = "PartitionResult", f = "stringEquals", g = { [t]: false, "type": "String" }, h = { [t]: true, "default": false, "type": "Boolean" }, i = { [w]: "Endpoint" }, j = { [u]: "booleanEquals", [v]: [{ [w]: "UseFIPS" }, true] }, k = { [u]: "booleanEquals", [v]: [{ [w]: "UseDualStack" }, true] }, l = {}, m = { [u]: "booleanEquals", [v]: [true, { [u]: "getAttr", [v]: [{ [w]: e }, "supportsFIPS"] }] }, n = { [u]: "booleanEquals", [v]: [true, { [u]: "getAttr", [v]: [{ [w]: e }, "supportsDualStack"] }] }, o = { [u]: "getAttr", [v]: [{ [w]: e }, "name"] }, p = { "url": "https://ecr-fips.{Region}.amazonaws.com", "properties": {}, "headers": {} }, q = [j], r = [k], s = [{ [w]: "Region" }];
|
|
6
|
+
const _data = { version: "1.0", parameters: { Region: g, UseDualStack: h, UseFIPS: h, Endpoint: g }, rules: [{ conditions: [{ [u]: a, [v]: [i] }], type: b, rules: [{ conditions: q, error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: c }, { conditions: r, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", type: c }, { endpoint: { url: i, properties: l, headers: l }, type: d }] }, { conditions: [{ [u]: a, [v]: s }], type: b, rules: [{ conditions: [{ [u]: "aws.partition", [v]: s, assign: e }], type: b, rules: [{ conditions: [j, k], type: b, rules: [{ conditions: [m, n], type: b, rules: [{ endpoint: { url: "https://api.ecr-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: l, headers: l }, type: d }] }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", type: c }] }, { conditions: q, type: b, rules: [{ conditions: [m], type: b, rules: [{ conditions: [{ [u]: f, [v]: ["aws", o] }], endpoint: p, type: d }, { conditions: [{ [u]: f, [v]: ["aws-us-gov", o] }], endpoint: p, type: d }, { endpoint: { url: "https://api.ecr-fips.{Region}.{PartitionResult#dnsSuffix}", properties: l, headers: l }, type: d }] }, { error: "FIPS is enabled but this partition does not support FIPS", type: c }] }, { conditions: r, type: b, rules: [{ conditions: [n], type: b, rules: [{ endpoint: { url: "https://api.ecr.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: l, headers: l }, type: d }] }, { error: "DualStack is enabled but this partition does not support DualStack", type: c }] }, { endpoint: { url: "https://api.ecr.{Region}.{PartitionResult#dnsSuffix}", properties: l, headers: l }, type: d }] }] }, { error: "Invalid Configuration: Missing Region", type: c }] };
|
|
7
7
|
exports.ruleSet = _data;
|
|
@@ -1,4 +1,4 @@
|
|
|
1
1
|
const t = "required", u = "fn", v = "argv", w = "ref";
|
|
2
|
-
const a = "
|
|
3
|
-
const _data = { version: "1.0", parameters: { Region:
|
|
2
|
+
const a = "isSet", b = "tree", c = "error", d = "endpoint", e = "PartitionResult", f = "stringEquals", g = { [t]: false, "type": "String" }, h = { [t]: true, "default": false, "type": "Boolean" }, i = { [w]: "Endpoint" }, j = { [u]: "booleanEquals", [v]: [{ [w]: "UseFIPS" }, true] }, k = { [u]: "booleanEquals", [v]: [{ [w]: "UseDualStack" }, true] }, l = {}, m = { [u]: "booleanEquals", [v]: [true, { [u]: "getAttr", [v]: [{ [w]: e }, "supportsFIPS"] }] }, n = { [u]: "booleanEquals", [v]: [true, { [u]: "getAttr", [v]: [{ [w]: e }, "supportsDualStack"] }] }, o = { [u]: "getAttr", [v]: [{ [w]: e }, "name"] }, p = { "url": "https://ecr-fips.{Region}.amazonaws.com", "properties": {}, "headers": {} }, q = [j], r = [k], s = [{ [w]: "Region" }];
|
|
3
|
+
const _data = { version: "1.0", parameters: { Region: g, UseDualStack: h, UseFIPS: h, Endpoint: g }, rules: [{ conditions: [{ [u]: a, [v]: [i] }], type: b, rules: [{ conditions: q, error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: c }, { conditions: r, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", type: c }, { endpoint: { url: i, properties: l, headers: l }, type: d }] }, { conditions: [{ [u]: a, [v]: s }], type: b, rules: [{ conditions: [{ [u]: "aws.partition", [v]: s, assign: e }], type: b, rules: [{ conditions: [j, k], type: b, rules: [{ conditions: [m, n], type: b, rules: [{ endpoint: { url: "https://api.ecr-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: l, headers: l }, type: d }] }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", type: c }] }, { conditions: q, type: b, rules: [{ conditions: [m], type: b, rules: [{ conditions: [{ [u]: f, [v]: ["aws", o] }], endpoint: p, type: d }, { conditions: [{ [u]: f, [v]: ["aws-us-gov", o] }], endpoint: p, type: d }, { endpoint: { url: "https://api.ecr-fips.{Region}.{PartitionResult#dnsSuffix}", properties: l, headers: l }, type: d }] }, { error: "FIPS is enabled but this partition does not support FIPS", type: c }] }, { conditions: r, type: b, rules: [{ conditions: [n], type: b, rules: [{ endpoint: { url: "https://api.ecr.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: l, headers: l }, type: d }] }, { error: "DualStack is enabled but this partition does not support DualStack", type: c }] }, { endpoint: { url: "https://api.ecr.{Region}.{PartitionResult#dnsSuffix}", properties: l, headers: l }, type: d }] }] }, { error: "Invalid Configuration: Missing Region", type: c }] };
|
|
4
4
|
export const ruleSet = _data;
|
package/dist-types/ECR.d.ts
CHANGED
|
@@ -292,13 +292,13 @@ export interface ECR {
|
|
|
292
292
|
/**
|
|
293
293
|
* @public
|
|
294
294
|
* <fullname>Amazon Elastic Container Registry</fullname>
|
|
295
|
-
*
|
|
295
|
+
* <p>Amazon Elastic Container Registry (Amazon ECR) is a managed container image registry service. Customers can use the
|
|
296
296
|
* familiar Docker CLI, or their preferred client, to push, pull, and manage images. Amazon ECR
|
|
297
297
|
* provides a secure, scalable, and reliable registry for your Docker or Open Container
|
|
298
298
|
* Initiative (OCI) images. Amazon ECR supports private repositories with resource-based
|
|
299
299
|
* permissions using IAM so that specific users or Amazon EC2 instances can access
|
|
300
300
|
* repositories and images.</p>
|
|
301
|
-
*
|
|
301
|
+
* <p>Amazon ECR has service endpoints in each supported Region. For more information, see <a href="https://docs.aws.amazon.com/general/latest/gr/ecr.html">Amazon ECR endpoints</a> in the
|
|
302
302
|
* <i>Amazon Web Services General Reference</i>.</p>
|
|
303
303
|
*/
|
|
304
304
|
export declare class ECR extends ECRClient implements ECR {
|
|
@@ -192,13 +192,13 @@ export interface ECRClientResolvedConfig extends ECRClientResolvedConfigType {
|
|
|
192
192
|
/**
|
|
193
193
|
* @public
|
|
194
194
|
* <fullname>Amazon Elastic Container Registry</fullname>
|
|
195
|
-
*
|
|
195
|
+
* <p>Amazon Elastic Container Registry (Amazon ECR) is a managed container image registry service. Customers can use the
|
|
196
196
|
* familiar Docker CLI, or their preferred client, to push, pull, and manage images. Amazon ECR
|
|
197
197
|
* provides a secure, scalable, and reliable registry for your Docker or Open Container
|
|
198
198
|
* Initiative (OCI) images. Amazon ECR supports private repositories with resource-based
|
|
199
199
|
* permissions using IAM so that specific users or Amazon EC2 instances can access
|
|
200
200
|
* repositories and images.</p>
|
|
201
|
-
*
|
|
201
|
+
* <p>Amazon ECR has service endpoints in each supported Region. For more information, see <a href="https://docs.aws.amazon.com/general/latest/gr/ecr.html">Amazon ECR endpoints</a> in the
|
|
202
202
|
* <i>Amazon Web Services General Reference</i>.</p>
|
|
203
203
|
*/
|
|
204
204
|
export declare class ECRClient extends __Client<__HttpHandlerOptions, ServiceInputTypes, ServiceOutputTypes, ECRClientResolvedConfig> {
|
|
@@ -24,10 +24,10 @@ export interface BatchCheckLayerAvailabilityCommandOutput extends BatchCheckLaye
|
|
|
24
24
|
/**
|
|
25
25
|
* @public
|
|
26
26
|
* <p>Checks the availability of one or more image layers in a repository.</p>
|
|
27
|
-
*
|
|
27
|
+
* <p>When an image is pushed to a repository, each image layer is checked to verify if it
|
|
28
28
|
* has been uploaded before. If it has been uploaded, then the image layer is
|
|
29
29
|
* skipped.</p>
|
|
30
|
-
*
|
|
30
|
+
* <note>
|
|
31
31
|
* <p>This operation is used by the Amazon ECR proxy and is not generally used by
|
|
32
32
|
* customers for pulling and pushing images. In most cases, you should use the <code>docker</code> CLI to pull, tag, and push images.</p>
|
|
33
33
|
* </note>
|
|
@@ -50,7 +50,7 @@ export interface BatchCheckLayerAvailabilityCommandOutput extends BatchCheckLaye
|
|
|
50
50
|
* // layers: [ // LayerList
|
|
51
51
|
* // { // Layer
|
|
52
52
|
* // layerDigest: "STRING_VALUE",
|
|
53
|
-
* // layerAvailability: "
|
|
53
|
+
* // layerAvailability: "AVAILABLE" || "UNAVAILABLE",
|
|
54
54
|
* // layerSize: Number("long"),
|
|
55
55
|
* // mediaType: "STRING_VALUE",
|
|
56
56
|
* // },
|
|
@@ -58,7 +58,7 @@ export interface BatchCheckLayerAvailabilityCommandOutput extends BatchCheckLaye
|
|
|
58
58
|
* // failures: [ // LayerFailureList
|
|
59
59
|
* // { // LayerFailure
|
|
60
60
|
* // layerDigest: "STRING_VALUE",
|
|
61
|
-
* // failureCode: "
|
|
61
|
+
* // failureCode: "InvalidLayerDigest" || "MissingLayerDigest",
|
|
62
62
|
* // failureReason: "STRING_VALUE",
|
|
63
63
|
* // },
|
|
64
64
|
* // ],
|
|
@@ -25,9 +25,9 @@ export interface BatchDeleteImageCommandOutput extends BatchDeleteImageResponse,
|
|
|
25
25
|
* @public
|
|
26
26
|
* <p>Deletes a list of specified images within a repository. Images are specified with
|
|
27
27
|
* either an <code>imageTag</code> or <code>imageDigest</code>.</p>
|
|
28
|
-
*
|
|
28
|
+
* <p>You can remove a tag from an image by specifying the image's tag in your request. When
|
|
29
29
|
* you remove the last tag from an image, the image is deleted from your repository.</p>
|
|
30
|
-
*
|
|
30
|
+
* <p>You can completely delete an image (and all of its tags) by specifying the image's
|
|
31
31
|
* digest in your request.</p>
|
|
32
32
|
* @example
|
|
33
33
|
* Use a bare-bones client and the command you need to make an API call.
|
|
@@ -60,7 +60,7 @@ export interface BatchDeleteImageCommandOutput extends BatchDeleteImageResponse,
|
|
|
60
60
|
* // imageDigest: "STRING_VALUE",
|
|
61
61
|
* // imageTag: "STRING_VALUE",
|
|
62
62
|
* // },
|
|
63
|
-
* // failureCode: "
|
|
63
|
+
* // failureCode: "InvalidImageDigest" || "InvalidImageTag" || "ImageTagDoesNotMatchDigest" || "ImageNotFound" || "MissingDigestAndTag" || "ImageReferencedByManifestList" || "KmsError",
|
|
64
64
|
* // failureReason: "STRING_VALUE",
|
|
65
65
|
* // },
|
|
66
66
|
* // ],
|
|
@@ -25,7 +25,7 @@ export interface BatchGetImageCommandOutput extends BatchGetImageResponse, __Met
|
|
|
25
25
|
* @public
|
|
26
26
|
* <p>Gets detailed information for an image. Images are specified with either an
|
|
27
27
|
* <code>imageTag</code> or <code>imageDigest</code>.</p>
|
|
28
|
-
*
|
|
28
|
+
* <p>When an image is pulled, the BatchGetImage API is called once to retrieve the image
|
|
29
29
|
* manifest.</p>
|
|
30
30
|
* @example
|
|
31
31
|
* Use a bare-bones client and the command you need to make an API call.
|
|
@@ -67,7 +67,7 @@ export interface BatchGetImageCommandOutput extends BatchGetImageResponse, __Met
|
|
|
67
67
|
* // imageDigest: "STRING_VALUE",
|
|
68
68
|
* // imageTag: "STRING_VALUE",
|
|
69
69
|
* // },
|
|
70
|
-
* // failureCode: "
|
|
70
|
+
* // failureCode: "InvalidImageDigest" || "InvalidImageTag" || "ImageTagDoesNotMatchDigest" || "ImageNotFound" || "MissingDigestAndTag" || "ImageReferencedByManifestList" || "KmsError",
|
|
71
71
|
* // failureReason: "STRING_VALUE",
|
|
72
72
|
* // },
|
|
73
73
|
* // ],
|
|
@@ -43,11 +43,11 @@ export interface BatchGetRepositoryScanningConfigurationCommandOutput extends Ba
|
|
|
43
43
|
* // repositoryArn: "STRING_VALUE",
|
|
44
44
|
* // repositoryName: "STRING_VALUE",
|
|
45
45
|
* // scanOnPush: true || false,
|
|
46
|
-
* // scanFrequency: "
|
|
46
|
+
* // scanFrequency: "SCAN_ON_PUSH" || "CONTINUOUS_SCAN" || "MANUAL",
|
|
47
47
|
* // appliedScanFilters: [ // ScanningRepositoryFilterList
|
|
48
48
|
* // { // ScanningRepositoryFilter
|
|
49
49
|
* // filter: "STRING_VALUE", // required
|
|
50
|
-
* // filterType: "
|
|
50
|
+
* // filterType: "WILDCARD", // required
|
|
51
51
|
* // },
|
|
52
52
|
* // ],
|
|
53
53
|
* // },
|
|
@@ -55,7 +55,7 @@ export interface BatchGetRepositoryScanningConfigurationCommandOutput extends Ba
|
|
|
55
55
|
* // failures: [ // RepositoryScanningConfigurationFailureList
|
|
56
56
|
* // { // RepositoryScanningConfigurationFailure
|
|
57
57
|
* // repositoryName: "STRING_VALUE",
|
|
58
|
-
* // failureCode: "
|
|
58
|
+
* // failureCode: "REPOSITORY_NOT_FOUND",
|
|
59
59
|
* // failureReason: "STRING_VALUE",
|
|
60
60
|
* // },
|
|
61
61
|
* // ],
|
|
@@ -26,9 +26,9 @@ export interface CompleteLayerUploadCommandOutput extends CompleteLayerUploadRes
|
|
|
26
26
|
* <p>Informs Amazon ECR that the image layer upload has completed for a specified registry,
|
|
27
27
|
* repository name, and upload ID. You can optionally provide a <code>sha256</code> digest
|
|
28
28
|
* of the image layer for data validation purposes.</p>
|
|
29
|
-
*
|
|
29
|
+
* <p>When an image is pushed, the CompleteLayerUpload API is called once per each new image
|
|
30
30
|
* layer to verify that the upload has completed.</p>
|
|
31
|
-
*
|
|
31
|
+
* <note>
|
|
32
32
|
* <p>This operation is used by the Amazon ECR proxy and is not generally used by
|
|
33
33
|
* customers for pulling and pushing images. In most cases, you should use the <code>docker</code> CLI to pull, tag, and push images.</p>
|
|
34
34
|
* </note>
|
|
@@ -40,12 +40,12 @@ export interface CreateRepositoryCommandOutput extends CreateRepositoryResponse,
|
|
|
40
40
|
* Value: "STRING_VALUE",
|
|
41
41
|
* },
|
|
42
42
|
* ],
|
|
43
|
-
* imageTagMutability: "
|
|
43
|
+
* imageTagMutability: "MUTABLE" || "IMMUTABLE",
|
|
44
44
|
* imageScanningConfiguration: { // ImageScanningConfiguration
|
|
45
45
|
* scanOnPush: true || false,
|
|
46
46
|
* },
|
|
47
47
|
* encryptionConfiguration: { // EncryptionConfiguration
|
|
48
|
-
* encryptionType: "
|
|
48
|
+
* encryptionType: "AES256" || "KMS", // required
|
|
49
49
|
* kmsKey: "STRING_VALUE",
|
|
50
50
|
* },
|
|
51
51
|
* };
|
|
@@ -58,12 +58,12 @@ export interface CreateRepositoryCommandOutput extends CreateRepositoryResponse,
|
|
|
58
58
|
* // repositoryName: "STRING_VALUE",
|
|
59
59
|
* // repositoryUri: "STRING_VALUE",
|
|
60
60
|
* // createdAt: new Date("TIMESTAMP"),
|
|
61
|
-
* // imageTagMutability: "
|
|
61
|
+
* // imageTagMutability: "MUTABLE" || "IMMUTABLE",
|
|
62
62
|
* // imageScanningConfiguration: { // ImageScanningConfiguration
|
|
63
63
|
* // scanOnPush: true || false,
|
|
64
64
|
* // },
|
|
65
65
|
* // encryptionConfiguration: { // EncryptionConfiguration
|
|
66
|
-
* // encryptionType: "
|
|
66
|
+
* // encryptionType: "AES256" || "KMS", // required
|
|
67
67
|
* // kmsKey: "STRING_VALUE",
|
|
68
68
|
* // },
|
|
69
69
|
* // },
|
|
@@ -46,12 +46,12 @@ export interface DeleteRepositoryCommandOutput extends DeleteRepositoryResponse,
|
|
|
46
46
|
* // repositoryName: "STRING_VALUE",
|
|
47
47
|
* // repositoryUri: "STRING_VALUE",
|
|
48
48
|
* // createdAt: new Date("TIMESTAMP"),
|
|
49
|
-
* // imageTagMutability: "
|
|
49
|
+
* // imageTagMutability: "MUTABLE" || "IMMUTABLE",
|
|
50
50
|
* // imageScanningConfiguration: { // ImageScanningConfiguration
|
|
51
51
|
* // scanOnPush: true || false,
|
|
52
52
|
* // },
|
|
53
53
|
* // encryptionConfiguration: { // EncryptionConfiguration
|
|
54
|
-
* // encryptionType: "
|
|
54
|
+
* // encryptionType: "AES256" || "KMS", // required
|
|
55
55
|
* // kmsKey: "STRING_VALUE",
|
|
56
56
|
* // },
|
|
57
57
|
* // },
|
|
@@ -50,7 +50,7 @@ export interface DescribeImageReplicationStatusCommandOutput extends DescribeIma
|
|
|
50
50
|
* // { // ImageReplicationStatus
|
|
51
51
|
* // region: "STRING_VALUE",
|
|
52
52
|
* // registryId: "STRING_VALUE",
|
|
53
|
-
* // status: "
|
|
53
|
+
* // status: "IN_PROGRESS" || "COMPLETE" || "FAILED",
|
|
54
54
|
* // failureCode: "STRING_VALUE",
|
|
55
55
|
* // },
|
|
56
56
|
* // ],
|
|
@@ -50,7 +50,7 @@ export interface DescribeImageScanFindingsCommandOutput extends DescribeImageSca
|
|
|
50
50
|
* // imageTag: "STRING_VALUE",
|
|
51
51
|
* // },
|
|
52
52
|
* // imageScanStatus: { // ImageScanStatus
|
|
53
|
-
* // status: "
|
|
53
|
+
* // status: "IN_PROGRESS" || "COMPLETE" || "FAILED" || "UNSUPPORTED_IMAGE" || "ACTIVE" || "PENDING" || "SCAN_ELIGIBILITY_EXPIRED" || "FINDINGS_UNAVAILABLE",
|
|
54
54
|
* // description: "STRING_VALUE",
|
|
55
55
|
* // },
|
|
56
56
|
* // imageScanFindings: { // ImageScanFindings
|
|
@@ -64,7 +64,7 @@ export interface DescribeImageScanFindingsCommandOutput extends DescribeImageSca
|
|
|
64
64
|
* // name: "STRING_VALUE",
|
|
65
65
|
* // description: "STRING_VALUE",
|
|
66
66
|
* // uri: "STRING_VALUE",
|
|
67
|
-
* // severity: "
|
|
67
|
+
* // severity: "INFORMATIONAL" || "LOW" || "MEDIUM" || "HIGH" || "CRITICAL" || "UNDEFINED",
|
|
68
68
|
* // attributes: [ // AttributeList
|
|
69
69
|
* // { // Attribute
|
|
70
70
|
* // key: "STRING_VALUE", // required
|
|
@@ -24,12 +24,12 @@ export interface DescribeImagesCommandOutput extends DescribeImagesResponse, __M
|
|
|
24
24
|
/**
|
|
25
25
|
* @public
|
|
26
26
|
* <p>Returns metadata about the images in a repository.</p>
|
|
27
|
-
*
|
|
27
|
+
* <note>
|
|
28
28
|
* <p>Beginning with Docker version 1.9, the Docker client compresses image layers
|
|
29
29
|
* before pushing them to a V2 Docker registry. The output of the <code>docker
|
|
30
30
|
* images</code> command shows the uncompressed image size, so it may return a
|
|
31
31
|
* larger image size than the image sizes returned by <a>DescribeImages</a>.</p>
|
|
32
|
-
*
|
|
32
|
+
* </note>
|
|
33
33
|
* @example
|
|
34
34
|
* Use a bare-bones client and the command you need to make an API call.
|
|
35
35
|
* ```javascript
|
|
@@ -48,7 +48,7 @@ export interface DescribeImagesCommandOutput extends DescribeImagesResponse, __M
|
|
|
48
48
|
* nextToken: "STRING_VALUE",
|
|
49
49
|
* maxResults: Number("int"),
|
|
50
50
|
* filter: { // DescribeImagesFilter
|
|
51
|
-
* tagStatus: "
|
|
51
|
+
* tagStatus: "TAGGED" || "UNTAGGED" || "ANY",
|
|
52
52
|
* },
|
|
53
53
|
* };
|
|
54
54
|
* const command = new DescribeImagesCommand(input);
|
|
@@ -65,7 +65,7 @@ export interface DescribeImagesCommandOutput extends DescribeImagesResponse, __M
|
|
|
65
65
|
* // imageSizeInBytes: Number("long"),
|
|
66
66
|
* // imagePushedAt: new Date("TIMESTAMP"),
|
|
67
67
|
* // imageScanStatus: { // ImageScanStatus
|
|
68
|
-
* // status: "
|
|
68
|
+
* // status: "IN_PROGRESS" || "COMPLETE" || "FAILED" || "UNSUPPORTED_IMAGE" || "ACTIVE" || "PENDING" || "SCAN_ELIGIBILITY_EXPIRED" || "FINDINGS_UNAVAILABLE",
|
|
69
69
|
* // description: "STRING_VALUE",
|
|
70
70
|
* // },
|
|
71
71
|
* // imageScanFindingsSummary: { // ImageScanFindingsSummary
|
|
@@ -49,7 +49,7 @@ export interface DescribeRegistryCommandOutput extends DescribeRegistryResponse,
|
|
|
49
49
|
* // repositoryFilters: [ // RepositoryFilterList
|
|
50
50
|
* // { // RepositoryFilter
|
|
51
51
|
* // filter: "STRING_VALUE", // required
|
|
52
|
-
* // filterType: "
|
|
52
|
+
* // filterType: "PREFIX_MATCH", // required
|
|
53
53
|
* // },
|
|
54
54
|
* // ],
|
|
55
55
|
* // },
|
|
@@ -48,12 +48,12 @@ export interface DescribeRepositoriesCommandOutput extends DescribeRepositoriesR
|
|
|
48
48
|
* // repositoryName: "STRING_VALUE",
|
|
49
49
|
* // repositoryUri: "STRING_VALUE",
|
|
50
50
|
* // createdAt: new Date("TIMESTAMP"),
|
|
51
|
-
* // imageTagMutability: "
|
|
51
|
+
* // imageTagMutability: "MUTABLE" || "IMMUTABLE",
|
|
52
52
|
* // imageScanningConfiguration: { // ImageScanningConfiguration
|
|
53
53
|
* // scanOnPush: true || false,
|
|
54
54
|
* // },
|
|
55
55
|
* // encryptionConfiguration: { // EncryptionConfiguration
|
|
56
|
-
* // encryptionType: "
|
|
56
|
+
* // encryptionType: "AES256" || "KMS", // required
|
|
57
57
|
* // kmsKey: "STRING_VALUE",
|
|
58
58
|
* // },
|
|
59
59
|
* // },
|
|
@@ -26,7 +26,7 @@ export interface GetAuthorizationTokenCommandOutput extends GetAuthorizationToke
|
|
|
26
26
|
* <p>Retrieves an authorization token. An authorization token represents your IAM
|
|
27
27
|
* authentication credentials and can be used to access any Amazon ECR registry that your IAM
|
|
28
28
|
* principal has access to. The authorization token is valid for 12 hours.</p>
|
|
29
|
-
*
|
|
29
|
+
* <p>The <code>authorizationToken</code> returned is a base64 encoded string that can be
|
|
30
30
|
* decoded and used in a <code>docker login</code> command to authenticate to a registry.
|
|
31
31
|
* The CLI offers an <code>get-login-password</code> command that simplifies the login
|
|
32
32
|
* process. For more information, see <a href="https://docs.aws.amazon.com/AmazonECR/latest/userguide/Registries.html#registry_auth">Registry
|
|
@@ -25,9 +25,9 @@ export interface GetDownloadUrlForLayerCommandOutput extends GetDownloadUrlForLa
|
|
|
25
25
|
* @public
|
|
26
26
|
* <p>Retrieves the pre-signed Amazon S3 download URL corresponding to an image layer. You can
|
|
27
27
|
* only get URLs for image layers that are referenced in an image.</p>
|
|
28
|
-
*
|
|
28
|
+
* <p>When an image is pulled, the GetDownloadUrlForLayer API is called once per image layer
|
|
29
29
|
* that is not already cached.</p>
|
|
30
|
-
*
|
|
30
|
+
* <note>
|
|
31
31
|
* <p>This operation is used by the Amazon ECR proxy and is not generally used by
|
|
32
32
|
* customers for pulling and pushing images. In most cases, you should use the <code>docker</code> CLI to pull, tag, and push images.</p>
|
|
33
33
|
* </note>
|
|
@@ -43,7 +43,7 @@ export interface GetLifecyclePolicyPreviewCommandOutput extends GetLifecyclePoli
|
|
|
43
43
|
* nextToken: "STRING_VALUE",
|
|
44
44
|
* maxResults: Number("int"),
|
|
45
45
|
* filter: { // LifecyclePolicyPreviewFilter
|
|
46
|
-
* tagStatus: "
|
|
46
|
+
* tagStatus: "TAGGED" || "UNTAGGED" || "ANY",
|
|
47
47
|
* },
|
|
48
48
|
* };
|
|
49
49
|
* const command = new GetLifecyclePolicyPreviewCommand(input);
|
|
@@ -52,7 +52,7 @@ export interface GetLifecyclePolicyPreviewCommandOutput extends GetLifecyclePoli
|
|
|
52
52
|
* // registryId: "STRING_VALUE",
|
|
53
53
|
* // repositoryName: "STRING_VALUE",
|
|
54
54
|
* // lifecyclePolicyText: "STRING_VALUE",
|
|
55
|
-
* // status: "
|
|
55
|
+
* // status: "IN_PROGRESS" || "COMPLETE" || "EXPIRED" || "FAILED",
|
|
56
56
|
* // nextToken: "STRING_VALUE",
|
|
57
57
|
* // previewResults: [ // LifecyclePolicyPreviewResultList
|
|
58
58
|
* // { // LifecyclePolicyPreviewResult
|
|
@@ -62,7 +62,7 @@ export interface GetLifecyclePolicyPreviewCommandOutput extends GetLifecyclePoli
|
|
|
62
62
|
* // imageDigest: "STRING_VALUE",
|
|
63
63
|
* // imagePushedAt: new Date("TIMESTAMP"),
|
|
64
64
|
* // action: { // LifecyclePolicyRuleAction
|
|
65
|
-
* // type: "
|
|
65
|
+
* // type: "EXPIRE",
|
|
66
66
|
* // },
|
|
67
67
|
* // appliedRulePriority: Number("int"),
|
|
68
68
|
* // },
|
|
@@ -36,14 +36,14 @@ export interface GetRegistryScanningConfigurationCommandOutput extends GetRegist
|
|
|
36
36
|
* // { // GetRegistryScanningConfigurationResponse
|
|
37
37
|
* // registryId: "STRING_VALUE",
|
|
38
38
|
* // scanningConfiguration: { // RegistryScanningConfiguration
|
|
39
|
-
* // scanType: "
|
|
39
|
+
* // scanType: "BASIC" || "ENHANCED",
|
|
40
40
|
* // rules: [ // RegistryScanningRuleList
|
|
41
41
|
* // { // RegistryScanningRule
|
|
42
|
-
* // scanFrequency: "
|
|
42
|
+
* // scanFrequency: "SCAN_ON_PUSH" || "CONTINUOUS_SCAN" || "MANUAL", // required
|
|
43
43
|
* // repositoryFilters: [ // ScanningRepositoryFilterList // required
|
|
44
44
|
* // { // ScanningRepositoryFilter
|
|
45
45
|
* // filter: "STRING_VALUE", // required
|
|
46
|
-
* // filterType: "
|
|
46
|
+
* // filterType: "WILDCARD", // required
|
|
47
47
|
* // },
|
|
48
48
|
* // ],
|
|
49
49
|
* // },
|
|
@@ -24,10 +24,10 @@ export interface InitiateLayerUploadCommandOutput extends InitiateLayerUploadRes
|
|
|
24
24
|
/**
|
|
25
25
|
* @public
|
|
26
26
|
* <p>Notifies Amazon ECR that you intend to upload an image layer.</p>
|
|
27
|
-
*
|
|
27
|
+
* <p>When an image is pushed, the InitiateLayerUpload API is called once per image layer
|
|
28
28
|
* that has not already been uploaded. Whether or not an image layer has been uploaded is
|
|
29
29
|
* determined by the BatchCheckLayerAvailability API action.</p>
|
|
30
|
-
*
|
|
30
|
+
* <note>
|
|
31
31
|
* <p>This operation is used by the Amazon ECR proxy and is not generally used by
|
|
32
32
|
* customers for pulling and pushing images. In most cases, you should use the <code>docker</code> CLI to pull, tag, and push images.</p>
|
|
33
33
|
* </note>
|
|
@@ -24,7 +24,7 @@ export interface ListImagesCommandOutput extends ListImagesResponse, __MetadataB
|
|
|
24
24
|
/**
|
|
25
25
|
* @public
|
|
26
26
|
* <p>Lists all the image IDs for the specified repository.</p>
|
|
27
|
-
*
|
|
27
|
+
* <p>You can filter images based on whether or not they are tagged by using the
|
|
28
28
|
* <code>tagStatus</code> filter and specifying either <code>TAGGED</code>,
|
|
29
29
|
* <code>UNTAGGED</code> or <code>ANY</code>. For example, you can filter your results
|
|
30
30
|
* to return only <code>UNTAGGED</code> images and then pipe that result to a <a>BatchDeleteImage</a> operation to delete them. Or, you can filter your
|
|
@@ -42,7 +42,7 @@ export interface ListImagesCommandOutput extends ListImagesResponse, __MetadataB
|
|
|
42
42
|
* nextToken: "STRING_VALUE",
|
|
43
43
|
* maxResults: Number("int"),
|
|
44
44
|
* filter: { // ListImagesFilter
|
|
45
|
-
* tagStatus: "
|
|
45
|
+
* tagStatus: "TAGGED" || "UNTAGGED" || "ANY",
|
|
46
46
|
* },
|
|
47
47
|
* };
|
|
48
48
|
* const command = new ListImagesCommand(input);
|
|
@@ -24,11 +24,10 @@ export interface PutImageCommandOutput extends PutImageResponse, __MetadataBeare
|
|
|
24
24
|
/**
|
|
25
25
|
* @public
|
|
26
26
|
* <p>Creates or updates the image manifest and tags associated with an image.</p>
|
|
27
|
-
*
|
|
27
|
+
* <p>When an image is pushed and all new image layers have been uploaded, the PutImage API
|
|
28
28
|
* is called once to create or update the image manifest and the tags associated with the
|
|
29
29
|
* image.</p>
|
|
30
|
-
*
|
|
31
|
-
* <note>
|
|
30
|
+
* <note>
|
|
32
31
|
* <p>This operation is used by the Amazon ECR proxy and is not generally used by
|
|
33
32
|
* customers for pulling and pushing images. In most cases, you should use the <code>docker</code> CLI to pull, tag, and push images.</p>
|
|
34
33
|
* </note>
|
|
@@ -27,8 +27,8 @@ export interface PutImageScanningConfigurationCommandOutput extends PutImageScan
|
|
|
27
27
|
* <p>The <code>PutImageScanningConfiguration</code> API is being deprecated, in favor
|
|
28
28
|
* of specifying the image scanning configuration at the registry level. For more
|
|
29
29
|
* information, see <a>PutRegistryScanningConfiguration</a>.</p>
|
|
30
|
-
*
|
|
31
|
-
*
|
|
30
|
+
* </important>
|
|
31
|
+
* <p>Updates the image scanning configuration for the specified repository.</p>
|
|
32
32
|
* @example
|
|
33
33
|
* Use a bare-bones client and the command you need to make an API call.
|
|
34
34
|
* ```javascript
|
|
@@ -35,14 +35,14 @@ export interface PutImageTagMutabilityCommandOutput extends PutImageTagMutabilit
|
|
|
35
35
|
* const input = { // PutImageTagMutabilityRequest
|
|
36
36
|
* registryId: "STRING_VALUE",
|
|
37
37
|
* repositoryName: "STRING_VALUE", // required
|
|
38
|
-
* imageTagMutability: "
|
|
38
|
+
* imageTagMutability: "MUTABLE" || "IMMUTABLE", // required
|
|
39
39
|
* };
|
|
40
40
|
* const command = new PutImageTagMutabilityCommand(input);
|
|
41
41
|
* const response = await client.send(command);
|
|
42
42
|
* // { // PutImageTagMutabilityResponse
|
|
43
43
|
* // registryId: "STRING_VALUE",
|
|
44
44
|
* // repositoryName: "STRING_VALUE",
|
|
45
|
-
* // imageTagMutability: "
|
|
45
|
+
* // imageTagMutability: "MUTABLE" || "IMMUTABLE",
|
|
46
46
|
* // };
|
|
47
47
|
*
|
|
48
48
|
* ```
|
|
@@ -24,7 +24,7 @@ export interface PutRegistryPolicyCommandOutput extends PutRegistryPolicyRespons
|
|
|
24
24
|
/**
|
|
25
25
|
* @public
|
|
26
26
|
* <p>Creates or updates the permissions policy for your registry.</p>
|
|
27
|
-
*
|
|
27
|
+
* <p>A registry policy is used to specify permissions for another Amazon Web Services account and is used
|
|
28
28
|
* when configuring cross-account replication. For more information, see <a href="https://docs.aws.amazon.com/AmazonECR/latest/userguide/registry-permissions.html">Registry permissions</a> in the <i>Amazon Elastic Container Registry User Guide</i>.</p>
|
|
29
29
|
* @example
|
|
30
30
|
* Use a bare-bones client and the command you need to make an API call.
|
|
@@ -31,14 +31,14 @@ export interface PutRegistryScanningConfigurationCommandOutput extends PutRegist
|
|
|
31
31
|
* // const { ECRClient, PutRegistryScanningConfigurationCommand } = require("@aws-sdk/client-ecr"); // CommonJS import
|
|
32
32
|
* const client = new ECRClient(config);
|
|
33
33
|
* const input = { // PutRegistryScanningConfigurationRequest
|
|
34
|
-
* scanType: "
|
|
34
|
+
* scanType: "BASIC" || "ENHANCED",
|
|
35
35
|
* rules: [ // RegistryScanningRuleList
|
|
36
36
|
* { // RegistryScanningRule
|
|
37
|
-
* scanFrequency: "
|
|
37
|
+
* scanFrequency: "SCAN_ON_PUSH" || "CONTINUOUS_SCAN" || "MANUAL", // required
|
|
38
38
|
* repositoryFilters: [ // ScanningRepositoryFilterList // required
|
|
39
39
|
* { // ScanningRepositoryFilter
|
|
40
40
|
* filter: "STRING_VALUE", // required
|
|
41
|
-
* filterType: "
|
|
41
|
+
* filterType: "WILDCARD", // required
|
|
42
42
|
* },
|
|
43
43
|
* ],
|
|
44
44
|
* },
|
|
@@ -48,14 +48,14 @@ export interface PutRegistryScanningConfigurationCommandOutput extends PutRegist
|
|
|
48
48
|
* const response = await client.send(command);
|
|
49
49
|
* // { // PutRegistryScanningConfigurationResponse
|
|
50
50
|
* // registryScanningConfiguration: { // RegistryScanningConfiguration
|
|
51
|
-
* // scanType: "
|
|
51
|
+
* // scanType: "BASIC" || "ENHANCED",
|
|
52
52
|
* // rules: [ // RegistryScanningRuleList
|
|
53
53
|
* // { // RegistryScanningRule
|
|
54
|
-
* // scanFrequency: "
|
|
54
|
+
* // scanFrequency: "SCAN_ON_PUSH" || "CONTINUOUS_SCAN" || "MANUAL", // required
|
|
55
55
|
* // repositoryFilters: [ // ScanningRepositoryFilterList // required
|
|
56
56
|
* // { // ScanningRepositoryFilter
|
|
57
57
|
* // filter: "STRING_VALUE", // required
|
|
58
|
-
* // filterType: "
|
|
58
|
+
* // filterType: "WILDCARD", // required
|
|
59
59
|
* // },
|
|
60
60
|
* // ],
|
|
61
61
|
* // },
|
|
@@ -29,11 +29,11 @@ export interface PutReplicationConfigurationCommandOutput extends PutReplication
|
|
|
29
29
|
* your account for the replication process. For more information, see <a href="https://docs.aws.amazon.com/AmazonECR/latest/userguide/using-service-linked-roles.html">Using
|
|
30
30
|
* service-linked roles for Amazon ECR</a> in the
|
|
31
31
|
* <i>Amazon Elastic Container Registry User Guide</i>.</p>
|
|
32
|
-
*
|
|
32
|
+
* <note>
|
|
33
33
|
* <p>When configuring cross-account replication, the destination account must grant the
|
|
34
34
|
* source account permission to replicate. This permission is controlled using a
|
|
35
35
|
* registry permissions policy. For more information, see <a>PutRegistryPolicy</a>.</p>
|
|
36
|
-
*
|
|
36
|
+
* </note>
|
|
37
37
|
* @example
|
|
38
38
|
* Use a bare-bones client and the command you need to make an API call.
|
|
39
39
|
* ```javascript
|
|
@@ -53,7 +53,7 @@ export interface PutReplicationConfigurationCommandOutput extends PutReplication
|
|
|
53
53
|
* repositoryFilters: [ // RepositoryFilterList
|
|
54
54
|
* { // RepositoryFilter
|
|
55
55
|
* filter: "STRING_VALUE", // required
|
|
56
|
-
* filterType: "
|
|
56
|
+
* filterType: "PREFIX_MATCH", // required
|
|
57
57
|
* },
|
|
58
58
|
* ],
|
|
59
59
|
* },
|
|
@@ -75,7 +75,7 @@ export interface PutReplicationConfigurationCommandOutput extends PutReplication
|
|
|
75
75
|
* // repositoryFilters: [ // RepositoryFilterList
|
|
76
76
|
* // { // RepositoryFilter
|
|
77
77
|
* // filter: "STRING_VALUE", // required
|
|
78
|
-
* // filterType: "
|
|
78
|
+
* // filterType: "PREFIX_MATCH", // required
|
|
79
79
|
* // },
|
|
80
80
|
* // ],
|
|
81
81
|
* // },
|
|
@@ -51,7 +51,7 @@ export interface StartImageScanCommandOutput extends StartImageScanResponse, __M
|
|
|
51
51
|
* // imageTag: "STRING_VALUE",
|
|
52
52
|
* // },
|
|
53
53
|
* // imageScanStatus: { // ImageScanStatus
|
|
54
|
-
* // status: "
|
|
54
|
+
* // status: "IN_PROGRESS" || "COMPLETE" || "FAILED" || "UNSUPPORTED_IMAGE" || "ACTIVE" || "PENDING" || "SCAN_ELIGIBILITY_EXPIRED" || "FINDINGS_UNAVAILABLE",
|
|
55
55
|
* // description: "STRING_VALUE",
|
|
56
56
|
* // },
|
|
57
57
|
* // };
|
|
@@ -42,7 +42,7 @@ export interface StartLifecyclePolicyPreviewCommandOutput extends StartLifecycle
|
|
|
42
42
|
* // registryId: "STRING_VALUE",
|
|
43
43
|
* // repositoryName: "STRING_VALUE",
|
|
44
44
|
* // lifecyclePolicyText: "STRING_VALUE",
|
|
45
|
-
* // status: "
|
|
45
|
+
* // status: "IN_PROGRESS" || "COMPLETE" || "EXPIRED" || "FAILED",
|
|
46
46
|
* // };
|
|
47
47
|
*
|
|
48
48
|
* ```
|
|
@@ -24,10 +24,10 @@ export interface UploadLayerPartCommandOutput extends UploadLayerPartResponse, _
|
|
|
24
24
|
/**
|
|
25
25
|
* @public
|
|
26
26
|
* <p>Uploads an image layer part to Amazon ECR.</p>
|
|
27
|
-
*
|
|
27
|
+
* <p>When an image is pushed, each new image layer is uploaded in parts. The maximum size
|
|
28
28
|
* of each image layer part can be 20971520 bytes (or about 20MB). The UploadLayerPart API
|
|
29
29
|
* is called once per each new image layer part.</p>
|
|
30
|
-
*
|
|
30
|
+
* <note>
|
|
31
31
|
* <p>This operation is used by the Amazon ECR proxy and is not generally used by
|
|
32
32
|
* customers for pulling and pushing images. In most cases, you should use the <code>docker</code> CLI to pull, tag, and push images.</p>
|
|
33
33
|
* </note>
|
package/dist-types/index.d.ts
CHANGED
|
@@ -1,12 +1,12 @@
|
|
|
1
1
|
/**
|
|
2
2
|
* <fullname>Amazon Elastic Container Registry</fullname>
|
|
3
|
-
*
|
|
3
|
+
* <p>Amazon Elastic Container Registry (Amazon ECR) is a managed container image registry service. Customers can use the
|
|
4
4
|
* familiar Docker CLI, or their preferred client, to push, pull, and manage images. Amazon ECR
|
|
5
5
|
* provides a secure, scalable, and reliable registry for your Docker or Open Container
|
|
6
6
|
* Initiative (OCI) images. Amazon ECR supports private repositories with resource-based
|
|
7
7
|
* permissions using IAM so that specific users or Amazon EC2 instances can access
|
|
8
8
|
* repositories and images.</p>
|
|
9
|
-
*
|
|
9
|
+
* <p>Amazon ECR has service endpoints in each supported Region. For more information, see <a href="https://docs.aws.amazon.com/general/latest/gr/ecr.html">Amazon ECR endpoints</a> in the
|
|
10
10
|
* <i>Amazon Web Services General Reference</i>.</p>
|
|
11
11
|
*
|
|
12
12
|
* @packageDocumentation
|
|
@@ -267,7 +267,7 @@ export interface BatchGetImageRequest {
|
|
|
267
267
|
/**
|
|
268
268
|
* @public
|
|
269
269
|
* <p>The accepted media types for the request.</p>
|
|
270
|
-
*
|
|
270
|
+
* <p>Valid values: <code>application/vnd.docker.distribution.manifest.v1+json</code> |
|
|
271
271
|
* <code>application/vnd.docker.distribution.manifest.v2+json</code> |
|
|
272
272
|
* <code>application/vnd.oci.image.manifest.v1+json</code>
|
|
273
273
|
* </p>
|
|
@@ -697,11 +697,11 @@ export type EncryptionType = (typeof EncryptionType)[keyof typeof EncryptionType
|
|
|
697
697
|
* @public
|
|
698
698
|
* <p>The encryption configuration for the repository. This determines how the contents of
|
|
699
699
|
* your repository are encrypted at rest.</p>
|
|
700
|
-
*
|
|
700
|
+
* <p>By default, when no encryption configuration is set or the <code>AES256</code>
|
|
701
701
|
* encryption type is used, Amazon ECR uses server-side encryption with Amazon S3-managed encryption
|
|
702
702
|
* keys which encrypts your data at rest using an AES-256 encryption algorithm. This does
|
|
703
703
|
* not require any action on your part.</p>
|
|
704
|
-
*
|
|
704
|
+
* <p>For more control over the encryption of the contents of your repository, you can use
|
|
705
705
|
* server-side encryption with Key Management Service key stored in Key Management Service (KMS) to encrypt your
|
|
706
706
|
* images. For more information, see <a href="https://docs.aws.amazon.com/AmazonECR/latest/userguide/encryption-at-rest.html">Amazon ECR encryption at
|
|
707
707
|
* rest</a> in the <i>Amazon Elastic Container Registry User Guide</i>.</p>
|
|
@@ -710,14 +710,14 @@ export interface EncryptionConfiguration {
|
|
|
710
710
|
/**
|
|
711
711
|
* @public
|
|
712
712
|
* <p>The encryption type to use.</p>
|
|
713
|
-
*
|
|
713
|
+
* <p>If you use the <code>KMS</code> encryption type, the contents of the repository will
|
|
714
714
|
* be encrypted using server-side encryption with Key Management Service key stored in KMS. When you
|
|
715
715
|
* use KMS to encrypt your data, you can either use the default Amazon Web Services managed KMS key
|
|
716
716
|
* for Amazon ECR, or specify your own KMS key, which you already created. For more
|
|
717
717
|
* information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingKMSEncryption.html">Protecting data using server-side
|
|
718
718
|
* encryption with an KMS key stored in Key Management Service (SSE-KMS)</a> in the
|
|
719
719
|
* <i>Amazon Simple Storage Service Console Developer Guide</i>.</p>
|
|
720
|
-
*
|
|
720
|
+
* <p>If you use the <code>AES256</code> encryption type, Amazon ECR uses server-side encryption
|
|
721
721
|
* with Amazon S3-managed encryption keys which encrypts the images in the repository using an
|
|
722
722
|
* AES-256 encryption algorithm. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html">Protecting data using
|
|
723
723
|
* server-side encryption with Amazon S3-managed encryption keys (SSE-S3)</a> in the
|
|
@@ -1425,14 +1425,14 @@ export interface ImageDetail {
|
|
|
1425
1425
|
/**
|
|
1426
1426
|
* @public
|
|
1427
1427
|
* <p>The size, in bytes, of the image in the repository.</p>
|
|
1428
|
-
*
|
|
1428
|
+
* <p>If the image is a manifest list, this will be the max size of all manifests in the
|
|
1429
1429
|
* list.</p>
|
|
1430
|
-
*
|
|
1430
|
+
* <note>
|
|
1431
1431
|
* <p>Beginning with Docker version 1.9, the Docker client compresses image layers
|
|
1432
1432
|
* before pushing them to a V2 Docker registry. The output of the <code>docker
|
|
1433
1433
|
* images</code> command shows the uncompressed image size, so it may return a
|
|
1434
1434
|
* larger image size than the image sizes returned by <a>DescribeImages</a>.</p>
|
|
1435
|
-
*
|
|
1435
|
+
* </note>
|
|
1436
1436
|
*/
|
|
1437
1437
|
imageSizeInBytes?: number;
|
|
1438
1438
|
/**
|
|
@@ -1465,14 +1465,14 @@ export interface ImageDetail {
|
|
|
1465
1465
|
* @public
|
|
1466
1466
|
* <p>The date and time, expressed in standard JavaScript date format, when Amazon ECR recorded
|
|
1467
1467
|
* the last image pull.</p>
|
|
1468
|
-
*
|
|
1468
|
+
* <note>
|
|
1469
1469
|
* <p>Amazon ECR refreshes the last image pull timestamp at least once every 24 hours. For
|
|
1470
1470
|
* example, if you pull an image once a day then the <code>lastRecordedPullTime</code>
|
|
1471
1471
|
* timestamp will indicate the exact time that the image was last pulled. However, if
|
|
1472
1472
|
* you pull an image once an hour, because Amazon ECR refreshes the
|
|
1473
1473
|
* <code>lastRecordedPullTime</code> timestamp at least once every 24 hours, the
|
|
1474
1474
|
* result may not be the exact time that the image was last pulled.</p>
|
|
1475
|
-
*
|
|
1475
|
+
* </note>
|
|
1476
1476
|
*/
|
|
1477
1477
|
lastRecordedPullTime?: Date;
|
|
1478
1478
|
}
|
|
@@ -2263,10 +2263,10 @@ export interface DescribeRepositoriesRequest {
|
|
|
2263
2263
|
* the previous results that returned the <code>nextToken</code> value. This value is
|
|
2264
2264
|
* <code>null</code> when there are no more results to return. This option cannot be
|
|
2265
2265
|
* used when you specify repositories with <code>repositoryNames</code>.</p>
|
|
2266
|
-
*
|
|
2266
|
+
* <note>
|
|
2267
2267
|
* <p>This token should be treated as an opaque identifier that is only used to
|
|
2268
2268
|
* retrieve the next items in a list and not for other programmatic purposes.</p>
|
|
2269
|
-
*
|
|
2269
|
+
* </note>
|
|
2270
2270
|
*/
|
|
2271
2271
|
nextToken?: string;
|
|
2272
2272
|
/**
|
|
@@ -2858,10 +2858,10 @@ export interface ListImagesRequest {
|
|
|
2858
2858
|
* results exceeded the value of that parameter. Pagination continues from the end of the
|
|
2859
2859
|
* previous results that returned the <code>nextToken</code> value. This value is
|
|
2860
2860
|
* <code>null</code> when there are no more results to return.</p>
|
|
2861
|
-
*
|
|
2861
|
+
* <note>
|
|
2862
2862
|
* <p>This token should be treated as an opaque identifier that is only used to
|
|
2863
2863
|
* retrieve the next items in a list and not for other programmatic purposes.</p>
|
|
2864
|
-
*
|
|
2864
|
+
* </note>
|
|
2865
2865
|
*/
|
|
2866
2866
|
nextToken?: string;
|
|
2867
2867
|
/**
|
|
@@ -3189,12 +3189,12 @@ export interface PutRegistryScanningConfigurationRequest {
|
|
|
3189
3189
|
/**
|
|
3190
3190
|
* @public
|
|
3191
3191
|
* <p>The scanning type to set for the registry.</p>
|
|
3192
|
-
*
|
|
3192
|
+
* <p>When a registry scanning configuration is not defined, by default the
|
|
3193
3193
|
* <code>BASIC</code> scan type is used. When basic scanning is used, you may specify
|
|
3194
3194
|
* filters to determine which individual repositories, or all repositories, are scanned
|
|
3195
3195
|
* when new images are pushed to those repositories. Alternatively, you can do manual scans
|
|
3196
3196
|
* of images with basic scanning.</p>
|
|
3197
|
-
*
|
|
3197
|
+
* <p>When the <code>ENHANCED</code> scan type is set, Amazon Inspector provides automated
|
|
3198
3198
|
* vulnerability scanning. You may choose between continuous scanning or scan on push and
|
|
3199
3199
|
* you may specify filters to determine which individual repositories, or all repositories,
|
|
3200
3200
|
* are scanned.</p>
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-ecr",
|
|
3
3
|
"description": "AWS SDK for JavaScript Ecr Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.409.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
|
|
7
7
|
"build:cjs": "tsc -p tsconfig.cjs.json",
|
|
@@ -21,8 +21,8 @@
|
|
|
21
21
|
"dependencies": {
|
|
22
22
|
"@aws-crypto/sha256-browser": "3.0.0",
|
|
23
23
|
"@aws-crypto/sha256-js": "3.0.0",
|
|
24
|
-
"@aws-sdk/client-sts": "3.
|
|
25
|
-
"@aws-sdk/credential-provider-node": "3.
|
|
24
|
+
"@aws-sdk/client-sts": "3.409.0",
|
|
25
|
+
"@aws-sdk/credential-provider-node": "3.409.0",
|
|
26
26
|
"@aws-sdk/middleware-host-header": "3.408.0",
|
|
27
27
|
"@aws-sdk/middleware-logger": "3.408.0",
|
|
28
28
|
"@aws-sdk/middleware-recursion-detection": "3.408.0",
|