@aws-sdk/client-ecr 3.650.0 → 3.653.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist-cjs/index.js CHANGED
@@ -2668,8 +2668,10 @@ var de_EnhancedImageScanFinding = /* @__PURE__ */ __name((output, context) => {
2668
2668
  return (0, import_smithy_client.take)(output, {
2669
2669
  awsAccountId: import_smithy_client.expectString,
2670
2670
  description: import_smithy_client.expectString,
2671
+ exploitAvailable: import_smithy_client.expectString,
2671
2672
  findingArn: import_smithy_client.expectString,
2672
2673
  firstObservedAt: (_) => (0, import_smithy_client.expectNonNull)((0, import_smithy_client.parseEpochTimestamp)((0, import_smithy_client.expectNumber)(_))),
2674
+ fixAvailable: import_smithy_client.expectString,
2673
2675
  lastObservedAt: (_) => (0, import_smithy_client.expectNonNull)((0, import_smithy_client.parseEpochTimestamp)((0, import_smithy_client.expectNumber)(_))),
2674
2676
  packageVulnerabilityDetails: (_) => de_PackageVulnerabilityDetails(_, context),
2675
2677
  remediation: import_smithy_client._json,
@@ -1580,8 +1580,10 @@ const de_EnhancedImageScanFinding = (output, context) => {
1580
1580
  return take(output, {
1581
1581
  awsAccountId: __expectString,
1582
1582
  description: __expectString,
1583
+ exploitAvailable: __expectString,
1583
1584
  findingArn: __expectString,
1584
1585
  firstObservedAt: (_) => __expectNonNull(__parseEpochTimestamp(__expectNumber(_))),
1586
+ fixAvailable: __expectString,
1585
1587
  lastObservedAt: (_) => __expectNonNull(__parseEpochTimestamp(__expectNumber(_))),
1586
1588
  packageVulnerabilityDetails: (_) => de_PackageVulnerabilityDetails(_, context),
1587
1589
  remediation: _json,
@@ -115,6 +115,7 @@ declare const DescribeImageScanFindingsCommand_base: {
115
115
  * // release: "STRING_VALUE",
116
116
  * // sourceLayerHash: "STRING_VALUE",
117
117
  * // version: "STRING_VALUE",
118
+ * // fixedInVersion: "STRING_VALUE",
118
119
  * // },
119
120
  * // ],
120
121
  * // },
@@ -167,6 +168,8 @@ declare const DescribeImageScanFindingsCommand_base: {
167
168
  * // title: "STRING_VALUE",
168
169
  * // type: "STRING_VALUE",
169
170
  * // updatedAt: new Date("TIMESTAMP"),
171
+ * // fixAvailable: "STRING_VALUE",
172
+ * // exploitAvailable: "STRING_VALUE",
170
173
  * // },
171
174
  * // ],
172
175
  * // },
@@ -841,14 +841,14 @@ export interface EncryptionConfiguration {
841
841
  * for Amazon ECR, or specify your own KMS key, which you already created.</p>
842
842
  * <p>If you use the <code>KMS_DSSE</code> encryption type, the contents of the repository
843
843
  * will be encrypted with two layers of encryption using server-side encryption with the
844
- * KMS Management Service key stored in KMS. Similar to the KMS encryption type, you
844
+ * KMS Management Service key stored in KMS. Similar to the <code>KMS</code> encryption type, you
845
845
  * can either use the default Amazon Web Services managed KMS key for Amazon ECR, or specify your own KMS
846
846
  * key, which you've already created. </p>
847
847
  * <p>If you use the <code>AES256</code> encryption type, Amazon ECR uses server-side encryption
848
848
  * with Amazon S3-managed encryption keys which encrypts the images in the repository using an
849
- * AES256 encryption algorithm. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html">Protecting data using
850
- * server-side encryption with Amazon S3-managed encryption keys (SSE-S3)</a> in the
851
- * <i>Amazon Simple Storage Service Console Developer Guide</i>.</p>
849
+ * AES256 encryption algorithm.</p>
850
+ * <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonECR/latest/userguide/encryption-at-rest.html">Amazon ECR encryption at
851
+ * rest</a> in the <i>Amazon Elastic Container Registry User Guide</i>.</p>
852
852
  * @public
853
853
  */
854
854
  encryptionType: EncryptionType | undefined;
@@ -2010,6 +2010,11 @@ export interface VulnerablePackage {
2010
2010
  * @public
2011
2011
  */
2012
2012
  version?: string;
2013
+ /**
2014
+ * <p>The version of the package that contains the vulnerability fix.</p>
2015
+ * @public
2016
+ */
2017
+ fixedInVersion?: string;
2013
2018
  }
2014
2019
  /**
2015
2020
  * <p>Information about a package vulnerability finding.</p>
@@ -2319,6 +2324,19 @@ export interface EnhancedImageScanFinding {
2319
2324
  * @public
2320
2325
  */
2321
2326
  updatedAt?: Date;
2327
+ /**
2328
+ * <p>Details on whether a fix is available through a version update. This value can be
2329
+ * <code>YES</code>, <code>NO</code>, or <code>PARTIAL</code>. A <code>PARTIAL</code>
2330
+ * fix means that some, but not all, of the packages identified in the finding have fixes
2331
+ * available through updated versions.</p>
2332
+ * @public
2333
+ */
2334
+ fixAvailable?: string;
2335
+ /**
2336
+ * <p>If a finding discovered in your environment has an exploit available.</p>
2337
+ * @public
2338
+ */
2339
+ exploitAvailable?: string;
2322
2340
  }
2323
2341
  /**
2324
2342
  * <p>This data type is used in the <a>ImageScanFinding</a> data type.</p>
@@ -619,6 +619,7 @@ export interface VulnerablePackage {
619
619
  release?: string;
620
620
  sourceLayerHash?: string;
621
621
  version?: string;
622
+ fixedInVersion?: string;
622
623
  }
623
624
  export interface PackageVulnerabilityDetails {
624
625
  cvss?: CvssScore[];
@@ -688,6 +689,8 @@ export interface EnhancedImageScanFinding {
688
689
  title?: string;
689
690
  type?: string;
690
691
  updatedAt?: Date;
692
+ fixAvailable?: string;
693
+ exploitAvailable?: string;
691
694
  }
692
695
  export interface Attribute {
693
696
  key: string | undefined;
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-ecr",
3
3
  "description": "AWS SDK for JavaScript Ecr Client for Node.js, Browser and React Native",
4
- "version": "3.650.0",
4
+ "version": "3.653.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "node ../../scripts/compilation/inline client-ecr",
@@ -20,10 +20,10 @@
20
20
  "dependencies": {
21
21
  "@aws-crypto/sha256-browser": "5.2.0",
22
22
  "@aws-crypto/sha256-js": "5.2.0",
23
- "@aws-sdk/client-sso-oidc": "3.650.0",
24
- "@aws-sdk/client-sts": "3.650.0",
25
- "@aws-sdk/core": "3.649.0",
26
- "@aws-sdk/credential-provider-node": "3.650.0",
23
+ "@aws-sdk/client-sso-oidc": "3.651.1",
24
+ "@aws-sdk/client-sts": "3.651.1",
25
+ "@aws-sdk/core": "3.651.1",
26
+ "@aws-sdk/credential-provider-node": "3.651.1",
27
27
  "@aws-sdk/middleware-host-header": "3.649.0",
28
28
  "@aws-sdk/middleware-logger": "3.649.0",
29
29
  "@aws-sdk/middleware-recursion-detection": "3.649.0",