cdk-ecr-deployment 2.5.21 → 2.5.22
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +2 -2
- package/.jsii.tabl.json +1 -1
- package/lib/index.js +3 -3
- package/node_modules/@types/cacheable-request/node_modules/@types/node/README.md +1 -1
- package/node_modules/@types/cacheable-request/node_modules/@types/node/package.json +2 -2
- package/node_modules/@types/cacheable-request/node_modules/@types/node/test.d.ts +198 -96
- package/node_modules/@types/cacheable-request/node_modules/@types/node/ts4.8/test.d.ts +198 -96
- package/node_modules/@types/keyv/node_modules/@types/node/README.md +1 -1
- package/node_modules/@types/keyv/node_modules/@types/node/package.json +2 -2
- package/node_modules/@types/keyv/node_modules/@types/node/test.d.ts +198 -96
- package/node_modules/@types/keyv/node_modules/@types/node/ts4.8/test.d.ts +198 -96
- package/node_modules/@types/responselike/node_modules/@types/node/README.md +1 -1
- package/node_modules/@types/responselike/node_modules/@types/node/package.json +2 -2
- package/node_modules/@types/responselike/node_modules/@types/node/test.d.ts +198 -96
- package/node_modules/@types/responselike/node_modules/@types/node/ts4.8/test.d.ts +198 -96
- package/package.json +4 -4
package/.jsii
CHANGED
|
@@ -3982,6 +3982,6 @@
|
|
|
3982
3982
|
"symbolId": "src/index:S3ArchiveName"
|
|
3983
3983
|
}
|
|
3984
3984
|
},
|
|
3985
|
-
"version": "2.5.
|
|
3986
|
-
"fingerprint": "
|
|
3985
|
+
"version": "2.5.22",
|
|
3986
|
+
"fingerprint": "s499nDZI8SON+7UgOA4NCyUaAcy0fAnSnhDhX/8/6ac="
|
|
3987
3987
|
}
|
package/.jsii.tabl.json
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":"2","toolVersion":"5.1.2","snippets":{"33850328020507963bc7787401a169bb06e49f6132425a6d1529815c1554c645":{"translations":{"python":{"source":"from aws_cdk.aws_ecr_assets import DockerImageAsset\n\n\nimage = DockerImageAsset(self, \"CDKDockerImage\",\n directory=path.join(__dirname, \"docker\")\n)\n\n# Copy from cdk docker image asset to another ECR.\necrdeploy.ECRDeployment(self, \"DeployDockerImage1\",\n src=ecrdeploy.DockerImageName(image.image_uri),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\")\n)\n\n# Copy from docker registry to ECR.\necrdeploy.ECRDeployment(self, \"DeployDockerImage2\",\n src=ecrdeploy.DockerImageName(\"nginx:latest\"),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\")\n)\n\n# Copy from private docker registry to ECR.\n# The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\necrdeploy.ECRDeployment(self, \"DeployDockerImage3\",\n src=ecrdeploy.DockerImageName(\"javacs3/nginx:latest\", \"username:password\"),\n # src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n # src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\")\n).add_to_principal_policy(iam.PolicyStatement(\n effect=iam.Effect.ALLOW,\n actions=[\"secretsmanager:GetSecretValue\"\n ],\n resources=[\"*\"]\n))","version":"2"},"csharp":{"source":"using Amazon.CDK.AWS.Ecr.Assets;\n\n\nvar image = new DockerImageAsset(this, \"CDKDockerImage\", new DockerImageAssetProps {\n Directory = Join(__dirname, \"docker\")\n});\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\nnew ECRDeployment(this, \"DeployDockerImage1\", new ECRDeploymentProps {\n Src = new DockerImageName(image.ImageUri),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\")\n});\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\nnew ECRDeployment(this, \"DeployDockerImage2\", new ECRDeploymentProps {\n Src = new DockerImageName(\"nginx:latest\"),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\")\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ECRDeployment(this, \"DeployDockerImage3\", new ECRDeploymentProps {\n Src = new DockerImageName(\"javacs3/nginx:latest\", \"username:password\"),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\")\n}).AddToPrincipalPolicy(new PolicyStatement(new PolicyStatementProps {\n Effect = Effect.ALLOW,\n Actions = new [] { \"secretsmanager:GetSecretValue\" },\n Resources = new [] { \"*\" }\n}));","version":"1"},"java":{"source":"import software.amazon.awscdk.services.ecr.assets.DockerImageAsset;\n\n\nDockerImageAsset image = DockerImageAsset.Builder.create(this, \"CDKDockerImage\")\n .directory(join(__dirname, \"docker\"))\n .build();\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\nECRDeployment.Builder.create(this, \"DeployDockerImage1\")\n .src(new DockerImageName(image.getImageUri()))\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\", Aws.ACCOUNT_ID)))\n .build();\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\nECRDeployment.Builder.create(this, \"DeployDockerImage2\")\n .src(new DockerImageName(\"nginx:latest\"))\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\", Aws.ACCOUNT_ID)))\n .build();\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nECRDeployment.Builder.create(this, \"DeployDockerImage3\")\n .src(new DockerImageName(\"javacs3/nginx:latest\", \"username:password\"))\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\", Aws.ACCOUNT_ID)))\n .build().addToPrincipalPolicy(PolicyStatement.Builder.create()\n .effect(Effect.ALLOW)\n .actions(List.of(\"secretsmanager:GetSecretValue\"))\n .resources(List.of(\"*\"))\n .build());","version":"1"},"go":{"source":"import \"github.com/aws/aws-cdk-go/awscdk\"\n\n\nimage := awscdk.NewDockerImageAsset(this, jsii.String(\"CDKDockerImage\"), &DockerImageAssetProps{\n\tDirectory: path.join(__dirname, jsii.String(\"docker\")),\n})\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage1\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(image.ImageUri),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\", cdk.Aws_ACCOUNT_ID())),\n})\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage2\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(jsii.String(\"nginx:latest\")),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\", cdk.Aws_ACCOUNT_ID())),\n})\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage3\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(jsii.String(\"javacs3/nginx:latest\"), jsii.String(\"username:password\")),\n\t// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n\t// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\", cdk.Aws_ACCOUNT_ID())),\n}).AddToPrincipalPolicy(awscdk.Aws_iam.NewPolicyStatement(&PolicyStatementProps{\n\tEffect: awscdk.*Aws_iam.Effect_ALLOW,\n\tActions: []*string{\n\t\tjsii.String(\"secretsmanager:GetSecretValue\"),\n\t},\n\tResources: []*string{\n\t\tjsii.String(\"*\"),\n\t},\n}))","version":"1"},"$":{"source":"import { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));","version":"0"}},"location":{"api":{"api":"moduleReadme","moduleFqn":"cdk-ecr-deployment"},"field":{"field":"markdown","line":33}},"didCompile":true,"fqnsReferenced":["aws-cdk-lib.aws_ecr_assets.DockerImageAsset","aws-cdk-lib.aws_ecr_assets.DockerImageAsset#imageUri","aws-cdk-lib.aws_ecr_assets.DockerImageAssetProps","aws-cdk-lib.aws_iam.Effect","aws-cdk-lib.aws_iam.Effect#ALLOW","aws-cdk-lib.aws_iam.PolicyStatement","aws-cdk-lib.aws_iam.PolicyStatementProps","cdk-ecr-deployment.DockerImageName","cdk-ecr-deployment.ECRDeployment","cdk-ecr-deployment.ECRDeployment#addToPrincipalPolicy","cdk-ecr-deployment.ECRDeploymentProps","cdk-ecr-deployment.IImageName","constructs.Construct"],"fullSource":"// Hoisted imports begin after !show marker below\n/// !show\nimport { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n/// !hide\n// Hoisted imports ended before !hide marker above\n// Fixture with packages imported, but nothing else\nimport * as path from 'node:path';\nimport { Construct } from 'constructs';\n import * as ecrdeploy from 'cdk-ecr-deployment';\nimport {\n Stack,\n aws_iam as iam,\n} from 'aws-cdk-lib';\nimport * as cdk from 'aws-cdk-lib';\n\nclass Fixture extends Stack {\n constructor(scope: Construct, id: string) {\n super(scope, id);\n\n // Code snippet begins after !show marker below\n/// !show\n\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));\n/// !hide\n// Code snippet ended before !hide marker above\n }\n}","syntaxKindCounter":{"11":11,"16":3,"18":3,"80":51,"110":4,"208":2,"209":5,"210":21,"212":2,"213":11,"227":3,"238":3,"242":1,"243":3,"259":1,"260":1,"271":1,"272":1,"274":1,"275":1,"302":10,"311":1},"fqnsFingerprint":"899b67c6c71969e7ca1efcba8b9d9201fcf9261e98c2cf48abe7a25615fce1d9"}}}
|
|
1
|
+
{"version":"2","toolVersion":"5.1.3","snippets":{"33850328020507963bc7787401a169bb06e49f6132425a6d1529815c1554c645":{"translations":{"python":{"source":"from aws_cdk.aws_ecr_assets import DockerImageAsset\n\n\nimage = DockerImageAsset(self, \"CDKDockerImage\",\n directory=path.join(__dirname, \"docker\")\n)\n\n# Copy from cdk docker image asset to another ECR.\necrdeploy.ECRDeployment(self, \"DeployDockerImage1\",\n src=ecrdeploy.DockerImageName(image.image_uri),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\")\n)\n\n# Copy from docker registry to ECR.\necrdeploy.ECRDeployment(self, \"DeployDockerImage2\",\n src=ecrdeploy.DockerImageName(\"nginx:latest\"),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\")\n)\n\n# Copy from private docker registry to ECR.\n# The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\necrdeploy.ECRDeployment(self, \"DeployDockerImage3\",\n src=ecrdeploy.DockerImageName(\"javacs3/nginx:latest\", \"username:password\"),\n # src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n # src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\")\n).add_to_principal_policy(iam.PolicyStatement(\n effect=iam.Effect.ALLOW,\n actions=[\"secretsmanager:GetSecretValue\"\n ],\n resources=[\"*\"]\n))","version":"2"},"csharp":{"source":"using Amazon.CDK.AWS.Ecr.Assets;\n\n\nvar image = new DockerImageAsset(this, \"CDKDockerImage\", new DockerImageAssetProps {\n Directory = Join(__dirname, \"docker\")\n});\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\nnew ECRDeployment(this, \"DeployDockerImage1\", new ECRDeploymentProps {\n Src = new DockerImageName(image.ImageUri),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\")\n});\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\nnew ECRDeployment(this, \"DeployDockerImage2\", new ECRDeploymentProps {\n Src = new DockerImageName(\"nginx:latest\"),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\")\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ECRDeployment(this, \"DeployDockerImage3\", new ECRDeploymentProps {\n Src = new DockerImageName(\"javacs3/nginx:latest\", \"username:password\"),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\")\n}).AddToPrincipalPolicy(new PolicyStatement(new PolicyStatementProps {\n Effect = Effect.ALLOW,\n Actions = new [] { \"secretsmanager:GetSecretValue\" },\n Resources = new [] { \"*\" }\n}));","version":"1"},"java":{"source":"import software.amazon.awscdk.services.ecr.assets.DockerImageAsset;\n\n\nDockerImageAsset image = DockerImageAsset.Builder.create(this, \"CDKDockerImage\")\n .directory(join(__dirname, \"docker\"))\n .build();\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\nECRDeployment.Builder.create(this, \"DeployDockerImage1\")\n .src(new DockerImageName(image.getImageUri()))\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\", Aws.ACCOUNT_ID)))\n .build();\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\nECRDeployment.Builder.create(this, \"DeployDockerImage2\")\n .src(new DockerImageName(\"nginx:latest\"))\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\", Aws.ACCOUNT_ID)))\n .build();\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nECRDeployment.Builder.create(this, \"DeployDockerImage3\")\n .src(new DockerImageName(\"javacs3/nginx:latest\", \"username:password\"))\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\", Aws.ACCOUNT_ID)))\n .build().addToPrincipalPolicy(PolicyStatement.Builder.create()\n .effect(Effect.ALLOW)\n .actions(List.of(\"secretsmanager:GetSecretValue\"))\n .resources(List.of(\"*\"))\n .build());","version":"1"},"go":{"source":"import \"github.com/aws/aws-cdk-go/awscdk\"\n\n\nimage := awscdk.NewDockerImageAsset(this, jsii.String(\"CDKDockerImage\"), &DockerImageAssetProps{\n\tDirectory: path.join(__dirname, jsii.String(\"docker\")),\n})\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage1\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(image.ImageUri),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\", cdk.Aws_ACCOUNT_ID())),\n})\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage2\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(jsii.String(\"nginx:latest\")),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\", cdk.Aws_ACCOUNT_ID())),\n})\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage3\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(jsii.String(\"javacs3/nginx:latest\"), jsii.String(\"username:password\")),\n\t// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n\t// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\", cdk.Aws_ACCOUNT_ID())),\n}).AddToPrincipalPolicy(awscdk.Aws_iam.NewPolicyStatement(&PolicyStatementProps{\n\tEffect: awscdk.*Aws_iam.Effect_ALLOW,\n\tActions: []*string{\n\t\tjsii.String(\"secretsmanager:GetSecretValue\"),\n\t},\n\tResources: []*string{\n\t\tjsii.String(\"*\"),\n\t},\n}))","version":"1"},"$":{"source":"import { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));","version":"0"}},"location":{"api":{"api":"moduleReadme","moduleFqn":"cdk-ecr-deployment"},"field":{"field":"markdown","line":33}},"didCompile":true,"fqnsReferenced":["aws-cdk-lib.aws_ecr_assets.DockerImageAsset","aws-cdk-lib.aws_ecr_assets.DockerImageAsset#imageUri","aws-cdk-lib.aws_ecr_assets.DockerImageAssetProps","aws-cdk-lib.aws_iam.Effect","aws-cdk-lib.aws_iam.Effect#ALLOW","aws-cdk-lib.aws_iam.PolicyStatement","aws-cdk-lib.aws_iam.PolicyStatementProps","cdk-ecr-deployment.DockerImageName","cdk-ecr-deployment.ECRDeployment","cdk-ecr-deployment.ECRDeployment#addToPrincipalPolicy","cdk-ecr-deployment.ECRDeploymentProps","cdk-ecr-deployment.IImageName","constructs.Construct"],"fullSource":"// Hoisted imports begin after !show marker below\n/// !show\nimport { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n/// !hide\n// Hoisted imports ended before !hide marker above\n// Fixture with packages imported, but nothing else\nimport * as path from 'node:path';\nimport { Construct } from 'constructs';\n import * as ecrdeploy from 'cdk-ecr-deployment';\nimport {\n Stack,\n aws_iam as iam,\n} from 'aws-cdk-lib';\nimport * as cdk from 'aws-cdk-lib';\n\nclass Fixture extends Stack {\n constructor(scope: Construct, id: string) {\n super(scope, id);\n\n // Code snippet begins after !show marker below\n/// !show\n\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));\n/// !hide\n// Code snippet ended before !hide marker above\n }\n}","syntaxKindCounter":{"11":11,"16":3,"18":3,"80":51,"110":4,"208":2,"209":5,"210":21,"212":2,"213":11,"227":3,"238":3,"242":1,"243":3,"259":1,"260":1,"271":1,"272":1,"274":1,"275":1,"302":10,"311":1},"fqnsFingerprint":"899b67c6c71969e7ca1efcba8b9d9201fcf9261e98c2cf48abe7a25615fce1d9"}}}
|
package/lib/index.js
CHANGED
|
@@ -37,7 +37,7 @@ class DockerImageName {
|
|
|
37
37
|
}
|
|
38
38
|
exports.DockerImageName = DockerImageName;
|
|
39
39
|
_a = JSII_RTTI_SYMBOL_1;
|
|
40
|
-
DockerImageName[_a] = { fqn: "cdk-ecr-deployment.DockerImageName", version: "2.5.
|
|
40
|
+
DockerImageName[_a] = { fqn: "cdk-ecr-deployment.DockerImageName", version: "2.5.22" };
|
|
41
41
|
class S3ArchiveName {
|
|
42
42
|
constructor(p, ref, creds) {
|
|
43
43
|
this.creds = creds;
|
|
@@ -50,7 +50,7 @@ class S3ArchiveName {
|
|
|
50
50
|
}
|
|
51
51
|
exports.S3ArchiveName = S3ArchiveName;
|
|
52
52
|
_b = JSII_RTTI_SYMBOL_1;
|
|
53
|
-
S3ArchiveName[_b] = { fqn: "cdk-ecr-deployment.S3ArchiveName", version: "2.5.
|
|
53
|
+
S3ArchiveName[_b] = { fqn: "cdk-ecr-deployment.S3ArchiveName", version: "2.5.22" };
|
|
54
54
|
class ECRDeployment extends constructs_1.Construct {
|
|
55
55
|
constructor(scope, id, props) {
|
|
56
56
|
super(scope, id);
|
|
@@ -133,5 +133,5 @@ class ECRDeployment extends constructs_1.Construct {
|
|
|
133
133
|
}
|
|
134
134
|
exports.ECRDeployment = ECRDeployment;
|
|
135
135
|
_c = JSII_RTTI_SYMBOL_1;
|
|
136
|
-
ECRDeployment[_c] = { fqn: "cdk-ecr-deployment.ECRDeployment", version: "2.5.
|
|
136
|
+
ECRDeployment[_c] = { fqn: "cdk-ecr-deployment.ECRDeployment", version: "2.5.22" };
|
|
137
137
|
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;AAAA,qEAAqE;AACrE,sCAAsC;AAGtC,+CAA+C;AAC/C,6BAA6B;AAC7B,6CAAoH;AAEpH,2CAAuC;AACvC,qCAAmD;AA6EnD,SAAS,OAAO,CAAC,UAAkB;IACjC,IAAI,IAAA,gCAAuB,GAAE,EAAE;QAC7B,IAAI;YACF,MAAM,aAAa,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,sBAAsB,CAAC,CAAC;YACnE,MAAM,YAAY,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,eAAe,CAAC,CAAC;YAC3D,aAAa,CAAC,QAAQ,CAAC,GAAG,OAAO,CAAC,KAAK,IAAI,aAAa,IAAI,YAAY,EAAE,CAAC,CAAC;YAE5E,OAAO,wBAAM,CAAC,IAAI,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC;SAC5C;QAAC,OAAO,GAAG,EAAE;YACZ,OAAO,CAAC,IAAI,CAAC,gCAAgC,GAAG,EAAE,CAAC,CAAC;SACrD;KACF;IAED,OAAO,wBAAM,CAAC,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,WAAW,CAAC,EAAE;QACpE,SAAS,EAAE;YACT,UAAU;SACX;KACF,CAAC,CAAC;AACL,CAAC;AAED,MAAa,eAAe;IAC1B,YAA2B,IAAY,EAAS,KAAc;QAAnC,SAAI,GAAJ,IAAI,CAAQ;QAAS,UAAK,GAAL,KAAK,CAAS;IAAI,CAAC;IACnE,IAAW,GAAG,KAAa,OAAO,YAAY,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;;AAF9D,0CAGC;;;AAED,MAAa,aAAa;IAExB,YAAmB,CAAS,EAAE,GAAY,EAAS,KAAc;QAAd,UAAK,GAAL,KAAK,CAAS;QAC/D,IAAI,CAAC,IAAI,GAAG,CAAC,CAAC;QACd,IAAI,GAAG,EAAE;YACP,IAAI,CAAC,IAAI,IAAI,GAAG,GAAG,GAAG,CAAC;SACxB;IACH,CAAC;IACD,IAAW,GAAG,KAAa,OAAO,QAAQ,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;;AAR1D,sCASC;;;AAED,MAAa,aAAc,SAAQ,sBAAS;IAG1C,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAyB;QACjE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,MAAM,WAAW,GAAG,KAAK,CAAC,WAAW,IAAI,GAAG,CAAC;QAC7C,IAAI,CAAC,OAAO,GAAG,IAAI,wBAAM,CAAC,iBAAiB,CAAC,IAAI,EAAE,uBAAuB,EAAE;YACzE,IAAI,EAAE,IAAI,CAAC,mBAAmB,CAAC,WAAW,CAAC;YAC3C,IAAI,EAAE,OAAO,CAAC,KAAK,CAAC,UAAU,IAAI,uCAAuC,CAAC;YAC1E,OAAO,EAAE,wBAAM,CAAC,OAAO,CAAC,MAAM;YAC9B,OAAO,EAAE,MAAM;YACf,WAAW,EAAE,KAAK,CAAC,WAAW;YAC9B,aAAa,EAAE,0BAA0B;YACzC,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YAC7B,IAAI,EAAE,KAAK,CAAC,IAAI;YAChB,UAAU,EAAE,WAAW;YACvB,GAAG,EAAE,KAAK,CAAC,GAAG;YACd,UAAU,EAAE,KAAK,CAAC,UAAU;SAC7B,CAAC,CAAC;QAEH,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,WAAW,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;SAAE;QAE7F,WAAW,CAAC,oBAAoB,CAC9B,IAAI,qBAAG,CAAC,eAAe,CAAC;YACtB,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,2BAA2B;gBAC3B,iCAAiC;gBACjC,4BAA4B;gBAC5B,yBAAyB;gBACzB,0BAA0B;gBAC1B,gBAAgB;gBAChB,oBAAoB;gBACpB,mBAAmB;gBACnB,yBAAyB;gBACzB,+BAA+B;gBAC/B,yBAAyB;gBACzB,qBAAqB;gBACrB,yBAAyB;gBACzB,cAAc;aACf;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QACN,WAAW,CAAC,oBAAoB,CAAC,IAAI,qBAAG,CAAC,eAAe,CAAC;YACvD,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,cAAc;aACf;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QAEJ,IAAI,4BAAc,CAAC,IAAI,EAAE,gBAAgB,EAAE;YACzC,YAAY,EAAE,IAAI,CAAC,OAAO,CAAC,WAAW;YACtC,YAAY,EAAE,6BAA6B;YAC3C,UAAU,EAAE;gBACV,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,GAAG;gBACvB,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,KAAK;gBACzB,SAAS,EAAE,KAAK,CAAC,IAAI,CAAC,GAAG;gBACzB,SAAS,EAAE,KAAK,CAAC,IAAI,CAAC,KAAK;aAC5B;SACF,CAAC,CAAC;IACL,CAAC;IAEM,oBAAoB,CAAC,SAA0B;QACpD,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,WAAW,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;SAAE;QAE7F,OAAO,WAAW,CAAC,oBAAoB,CAAC,SAAS,CAAC,CAAC;IACrD,CAAC;IAEO,mBAAmB,CAAC,WAAoB;QAC9C,IAAI,IAAI,GAAG,sCAAsC,CAAC;QAElD,0EAA0E;QAC1E,2EAA2E;QAC3E,4CAA4C;QAC5C,IAAI,WAAW,EAAE;YACf,IAAI,mBAAK,CAAC,YAAY,CAAC,WAAW,CAAC,EAAE;gBACnC,MAAM,IAAI,KAAK,CAAC,mHAAmH,CAAC,CAAC;aACtI;YAED,IAAI,IAAI,IAAI,WAAW,CAAC,QAAQ,EAAE,KAAK,CAAC;SACzC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;;AAtFH,sCAuFC","sourcesContent":["// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n// SPDX-License-Identifier: Apache-2.0\n\n\nimport * as child_process from 'child_process';\nimport * as path from 'path';\nimport { aws_ec2 as ec2, aws_iam as iam, aws_lambda as lambda, Duration, CustomResource, Token } from 'aws-cdk-lib';\nimport { PolicyStatement, AddToPrincipalPolicyResult } from 'aws-cdk-lib/aws-iam';\nimport { Construct } from 'constructs';\nimport { shouldUsePrebuiltLambda } from './config';\n\nexport interface ECRDeploymentProps {\n\n  /**\n   * Image to use to build Golang lambda for custom resource, if download fails or is not wanted.\n   *\n   * Might be needed for local build if all images need to come from own registry.\n   *\n   * Note that image should use yum as a package manager and have golang available.\n   *\n   * @default public.ecr.aws/sam/build-go1.x:latest\n   */\n  readonly buildImage?: string;\n  /**\n   * The source of the docker image.\n   */\n  readonly src: IImageName;\n\n  /**\n   * The destination of the docker image.\n   */\n  readonly dest: IImageName;\n\n  /**\n   * The amount of memory (in MiB) to allocate to the AWS Lambda function which\n   * replicates the files from the CDK bucket to the destination bucket.\n   *\n   * If you are deploying large files, you will need to increase this number\n   * accordingly.\n   *\n   * @default 512\n   */\n  readonly memoryLimit?: number;\n\n  /**\n   * Execution role associated with this function\n   *\n   * @default - A role is automatically created\n   */\n  readonly role?: iam.IRole;\n\n  /**\n   * The VPC network to place the deployment lambda handler in.\n   *\n   * @default None\n   */\n  readonly vpc?: ec2.IVpc;\n\n  /**\n   * Where in the VPC to place the deployment lambda handler.\n   * Only used if 'vpc' is supplied.\n   *\n   * @default - the Vpc default strategy if not specified\n   */\n  readonly vpcSubnets?: ec2.SubnetSelection;\n\n  /**\n   * The environment variable to set\n   */\n  readonly environment?: { [key: string]: string };\n}\n\nexport interface IImageName {\n  /**\n   *  The uri of the docker image.\n   *\n   *  The uri spec follows https://github.com/containers/skopeo\n   */\n  readonly uri: string;\n\n  /**\n   * The credentials of the docker image. Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`\n   */\n  creds?: string;\n}\n\nfunction getCode(buildImage: string): lambda.AssetCode {\n  if (shouldUsePrebuiltLambda()) {\n    try {\n      const installScript = path.join(__dirname, '../lambda/install.js');\n      const prebuiltPath = path.join(__dirname, '../lambda/out');\n      child_process.execSync(`${process.argv0} ${installScript} ${prebuiltPath}`);\n\n      return lambda.Code.fromAsset(prebuiltPath);\n    } catch (err) {\n      console.warn(`Can not get prebuilt lambda: ${err}`);\n    }\n  }\n\n  return lambda.Code.fromDockerBuild(path.join(__dirname, '../lambda'), {\n    buildArgs: {\n      buildImage,\n    },\n  });\n}\n\nexport class DockerImageName implements IImageName {\n  public constructor(private name: string, public creds?: string) { }\n  public get uri(): string { return `docker://${this.name}`; }\n}\n\nexport class S3ArchiveName implements IImageName {\n  private name: string;\n  public constructor(p: string, ref?: string, public creds?: string) {\n    this.name = p;\n    if (ref) {\n      this.name += ':' + ref;\n    }\n  }\n  public get uri(): string { return `s3://${this.name}`; }\n}\n\nexport class ECRDeployment extends Construct {\n  private handler: lambda.SingletonFunction;\n\n  constructor(scope: Construct, id: string, props: ECRDeploymentProps) {\n    super(scope, id);\n    const memoryLimit = props.memoryLimit ?? 512;\n    this.handler = new lambda.SingletonFunction(this, 'CustomResourceHandler', {\n      uuid: this.renderSingletonUuid(memoryLimit),\n      code: getCode(props.buildImage ?? 'public.ecr.aws/sam/build-go1.x:latest'),\n      runtime: lambda.Runtime.GO_1_X,\n      handler: 'main',\n      environment: props.environment,\n      lambdaPurpose: 'Custom::CDKECRDeployment',\n      timeout: Duration.minutes(15),\n      role: props.role,\n      memorySize: memoryLimit,\n      vpc: props.vpc,\n      vpcSubnets: props.vpcSubnets,\n    });\n\n    const handlerRole = this.handler.role;\n    if (!handlerRole) { throw new Error('lambda.SingletonFunction should have created a Role'); }\n\n    handlerRole.addToPrincipalPolicy(\n      new iam.PolicyStatement({\n        effect: iam.Effect.ALLOW,\n        actions: [\n          'ecr:GetAuthorizationToken',\n          'ecr:BatchCheckLayerAvailability',\n          'ecr:GetDownloadUrlForLayer',\n          'ecr:GetRepositoryPolicy',\n          'ecr:DescribeRepositories',\n          'ecr:ListImages',\n          'ecr:DescribeImages',\n          'ecr:BatchGetImage',\n          'ecr:ListTagsForResource',\n          'ecr:DescribeImageScanFindings',\n          'ecr:InitiateLayerUpload',\n          'ecr:UploadLayerPart',\n          'ecr:CompleteLayerUpload',\n          'ecr:PutImage',\n        ],\n        resources: ['*'],\n      }));\n    handlerRole.addToPrincipalPolicy(new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions: [\n        's3:GetObject',\n      ],\n      resources: ['*'],\n    }));\n\n    new CustomResource(this, 'CustomResource', {\n      serviceToken: this.handler.functionArn,\n      resourceType: 'Custom::CDKBucketDeployment',\n      properties: {\n        SrcImage: props.src.uri,\n        SrcCreds: props.src.creds,\n        DestImage: props.dest.uri,\n        DestCreds: props.dest.creds,\n      },\n    });\n  }\n\n  public addToPrincipalPolicy(statement: PolicyStatement): AddToPrincipalPolicyResult {\n    const handlerRole = this.handler.role;\n    if (!handlerRole) { throw new Error('lambda.SingletonFunction should have created a Role'); }\n\n    return handlerRole.addToPrincipalPolicy(statement);\n  }\n\n  private renderSingletonUuid(memoryLimit?: number) {\n    let uuid = 'bd07c930-edb9-4112-a20f-03f096f53666';\n\n    // if user specify a custom memory limit, define another singleton handler\n    // with this configuration. otherwise, it won't be possible to use multiple\n    // configurations since we have a singleton.\n    if (memoryLimit) {\n      if (Token.isUnresolved(memoryLimit)) {\n        throw new Error('Can\\'t use tokens when specifying \"memoryLimit\" since we use it to identify the singleton custom resource handler');\n      }\n\n      uuid += `-${memoryLimit.toString()}MiB`;\n    }\n\n    return uuid;\n  }\n}\n"]}
|
|
@@ -8,7 +8,7 @@ This package contains type definitions for Node.js (https://nodejs.org/).
|
|
|
8
8
|
Files were exported from https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node.
|
|
9
9
|
|
|
10
10
|
### Additional Details
|
|
11
|
-
* Last updated:
|
|
11
|
+
* Last updated: Mon, 26 Jun 2023 20:02:42 GMT
|
|
12
12
|
* Dependencies: none
|
|
13
13
|
* Global values: `AbortController`, `AbortSignal`, `__dirname`, `__filename`, `console`, `exports`, `gc`, `global`, `module`, `process`, `require`, `structuredClone`
|
|
14
14
|
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@types/node",
|
|
3
|
-
"version": "20.3.
|
|
3
|
+
"version": "20.3.2",
|
|
4
4
|
"description": "TypeScript definitions for Node.js",
|
|
5
5
|
"homepage": "https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node",
|
|
6
6
|
"license": "MIT",
|
|
@@ -232,6 +232,6 @@
|
|
|
232
232
|
},
|
|
233
233
|
"scripts": {},
|
|
234
234
|
"dependencies": {},
|
|
235
|
-
"typesPublisherContentHash": "
|
|
235
|
+
"typesPublisherContentHash": "77b1f16021a42a5f28f9061a3922380bdc6bcd9630c2405d53ff935c6538793c",
|
|
236
236
|
"typeScriptVersion": "4.3"
|
|
237
237
|
}
|
|
@@ -307,134 +307,50 @@ declare module 'node:test' {
|
|
|
307
307
|
addListener(event: 'test:pass', listener: (data: TestPass) => void): this;
|
|
308
308
|
addListener(event: 'test:plan', listener: (data: TestPlan) => void): this;
|
|
309
309
|
addListener(event: 'test:start', listener: (data: TestStart) => void): this;
|
|
310
|
+
addListener(event: 'test:stderr', listener: (data: TestStderr) => void): this;
|
|
311
|
+
addListener(event: 'test:stdout', listener: (data: TestStdout) => void): this;
|
|
310
312
|
addListener(event: string, listener: (...args: any[]) => void): this;
|
|
311
313
|
emit(event: 'test:diagnostic', data: DiagnosticData): boolean;
|
|
312
314
|
emit(event: 'test:fail', data: TestFail): boolean;
|
|
313
315
|
emit(event: 'test:pass', data: TestPass): boolean;
|
|
314
316
|
emit(event: 'test:plan', data: TestPlan): boolean;
|
|
315
317
|
emit(event: 'test:start', data: TestStart): boolean;
|
|
318
|
+
emit(event: 'test:stderr', data: TestStderr): boolean;
|
|
319
|
+
emit(event: 'test:stdout', data: TestStdout): boolean;
|
|
316
320
|
emit(event: string | symbol, ...args: any[]): boolean;
|
|
317
321
|
on(event: 'test:diagnostic', listener: (data: DiagnosticData) => void): this;
|
|
318
322
|
on(event: 'test:fail', listener: (data: TestFail) => void): this;
|
|
319
323
|
on(event: 'test:pass', listener: (data: TestPass) => void): this;
|
|
320
324
|
on(event: 'test:plan', listener: (data: TestPlan) => void): this;
|
|
321
325
|
on(event: 'test:start', listener: (data: TestStart) => void): this;
|
|
326
|
+
on(event: 'test:stderr', listener: (data: TestStderr) => void): this;
|
|
327
|
+
on(event: 'test:stdout', listener: (data: TestStdout) => void): this;
|
|
322
328
|
on(event: string, listener: (...args: any[]) => void): this;
|
|
323
329
|
once(event: 'test:diagnostic', listener: (data: DiagnosticData) => void): this;
|
|
324
330
|
once(event: 'test:fail', listener: (data: TestFail) => void): this;
|
|
325
331
|
once(event: 'test:pass', listener: (data: TestPass) => void): this;
|
|
326
332
|
once(event: 'test:plan', listener: (data: TestPlan) => void): this;
|
|
327
333
|
once(event: 'test:start', listener: (data: TestStart) => void): this;
|
|
334
|
+
once(event: 'test:stderr', listener: (data: TestStderr) => void): this;
|
|
335
|
+
once(event: 'test:stdout', listener: (data: TestStdout) => void): this;
|
|
328
336
|
once(event: string, listener: (...args: any[]) => void): this;
|
|
329
337
|
prependListener(event: 'test:diagnostic', listener: (data: DiagnosticData) => void): this;
|
|
330
338
|
prependListener(event: 'test:fail', listener: (data: TestFail) => void): this;
|
|
331
339
|
prependListener(event: 'test:pass', listener: (data: TestPass) => void): this;
|
|
332
340
|
prependListener(event: 'test:plan', listener: (data: TestPlan) => void): this;
|
|
333
341
|
prependListener(event: 'test:start', listener: (data: TestStart) => void): this;
|
|
342
|
+
prependListener(event: 'test:stderr', listener: (data: TestStderr) => void): this;
|
|
343
|
+
prependListener(event: 'test:stdout', listener: (data: TestStdout) => void): this;
|
|
334
344
|
prependListener(event: string, listener: (...args: any[]) => void): this;
|
|
335
345
|
prependOnceListener(event: 'test:diagnostic', listener: (data: DiagnosticData) => void): this;
|
|
336
346
|
prependOnceListener(event: 'test:fail', listener: (data: TestFail) => void): this;
|
|
337
347
|
prependOnceListener(event: 'test:pass', listener: (data: TestPass) => void): this;
|
|
338
348
|
prependOnceListener(event: 'test:plan', listener: (data: TestPlan) => void): this;
|
|
339
349
|
prependOnceListener(event: 'test:start', listener: (data: TestStart) => void): this;
|
|
350
|
+
prependOnceListener(event: 'test:stderr', listener: (data: TestStderr) => void): this;
|
|
351
|
+
prependOnceListener(event: 'test:stdout', listener: (data: TestStdout) => void): this;
|
|
340
352
|
prependOnceListener(event: string, listener: (...args: any[]) => void): this;
|
|
341
353
|
}
|
|
342
|
-
interface DiagnosticData {
|
|
343
|
-
/**
|
|
344
|
-
* The diagnostic message.
|
|
345
|
-
*/
|
|
346
|
-
message: string;
|
|
347
|
-
/**
|
|
348
|
-
* The nesting level of the test.
|
|
349
|
-
*/
|
|
350
|
-
nesting: number;
|
|
351
|
-
}
|
|
352
|
-
interface TestFail {
|
|
353
|
-
/**
|
|
354
|
-
* Additional execution metadata.
|
|
355
|
-
*/
|
|
356
|
-
details: {
|
|
357
|
-
/**
|
|
358
|
-
* The duration of the test in milliseconds.
|
|
359
|
-
*/
|
|
360
|
-
duration: number;
|
|
361
|
-
/**
|
|
362
|
-
* The error thrown by the test.
|
|
363
|
-
*/
|
|
364
|
-
error: Error;
|
|
365
|
-
};
|
|
366
|
-
/**
|
|
367
|
-
* The test name.
|
|
368
|
-
*/
|
|
369
|
-
name: string;
|
|
370
|
-
/**
|
|
371
|
-
* The nesting level of the test.
|
|
372
|
-
*/
|
|
373
|
-
nesting: number;
|
|
374
|
-
/**
|
|
375
|
-
* The ordinal number of the test.
|
|
376
|
-
*/
|
|
377
|
-
testNumber: number;
|
|
378
|
-
/**
|
|
379
|
-
* Present if `context.todo` is called.
|
|
380
|
-
*/
|
|
381
|
-
todo?: string | boolean;
|
|
382
|
-
/**
|
|
383
|
-
* Present if `context.skip` is called.
|
|
384
|
-
*/
|
|
385
|
-
skip?: string | boolean;
|
|
386
|
-
}
|
|
387
|
-
interface TestPass {
|
|
388
|
-
/**
|
|
389
|
-
* Additional execution metadata.
|
|
390
|
-
*/
|
|
391
|
-
details: {
|
|
392
|
-
/**
|
|
393
|
-
* The duration of the test in milliseconds.
|
|
394
|
-
*/
|
|
395
|
-
duration: number;
|
|
396
|
-
};
|
|
397
|
-
/**
|
|
398
|
-
* The test name.
|
|
399
|
-
*/
|
|
400
|
-
name: string;
|
|
401
|
-
/**
|
|
402
|
-
* The nesting level of the test.
|
|
403
|
-
*/
|
|
404
|
-
nesting: number;
|
|
405
|
-
/**
|
|
406
|
-
* The ordinal number of the test.
|
|
407
|
-
*/
|
|
408
|
-
testNumber: number;
|
|
409
|
-
/**
|
|
410
|
-
* Present if `context.todo` is called.
|
|
411
|
-
*/
|
|
412
|
-
todo?: string | boolean;
|
|
413
|
-
/**
|
|
414
|
-
* Present if `context.skip` is called.
|
|
415
|
-
*/
|
|
416
|
-
skip?: string | boolean;
|
|
417
|
-
}
|
|
418
|
-
interface TestPlan {
|
|
419
|
-
/**
|
|
420
|
-
* The nesting level of the test.
|
|
421
|
-
*/
|
|
422
|
-
nesting: number;
|
|
423
|
-
/**
|
|
424
|
-
* The number of subtests that have ran.
|
|
425
|
-
*/
|
|
426
|
-
count: number;
|
|
427
|
-
}
|
|
428
|
-
interface TestStart {
|
|
429
|
-
/**
|
|
430
|
-
* The test name.
|
|
431
|
-
*/
|
|
432
|
-
name: string;
|
|
433
|
-
/**
|
|
434
|
-
* The nesting level of the test.
|
|
435
|
-
*/
|
|
436
|
-
nesting: number;
|
|
437
|
-
}
|
|
438
354
|
/**
|
|
439
355
|
* An instance of `TestContext` is passed to each test function in order to
|
|
440
356
|
* interact with the test runner. However, the `TestContext` constructor is not
|
|
@@ -1050,3 +966,189 @@ declare module 'node:test' {
|
|
|
1050
966
|
}
|
|
1051
967
|
export { test as default, run, test, describe, it, before, after, beforeEach, afterEach, mock, skip, only, todo };
|
|
1052
968
|
}
|
|
969
|
+
|
|
970
|
+
interface DiagnosticData {
|
|
971
|
+
/**
|
|
972
|
+
* The diagnostic message.
|
|
973
|
+
*/
|
|
974
|
+
message: string;
|
|
975
|
+
/**
|
|
976
|
+
* The nesting level of the test.
|
|
977
|
+
*/
|
|
978
|
+
nesting: number;
|
|
979
|
+
/**
|
|
980
|
+
* The path of the test file, undefined if test is not ran through a file.
|
|
981
|
+
*/
|
|
982
|
+
file?: string;
|
|
983
|
+
}
|
|
984
|
+
interface TestFail {
|
|
985
|
+
/**
|
|
986
|
+
* Additional execution metadata.
|
|
987
|
+
*/
|
|
988
|
+
details: {
|
|
989
|
+
/**
|
|
990
|
+
* The duration of the test in milliseconds.
|
|
991
|
+
*/
|
|
992
|
+
duration: number;
|
|
993
|
+
/**
|
|
994
|
+
* The error thrown by the test.
|
|
995
|
+
*/
|
|
996
|
+
error: Error;
|
|
997
|
+
};
|
|
998
|
+
/**
|
|
999
|
+
* The test name.
|
|
1000
|
+
*/
|
|
1001
|
+
name: string;
|
|
1002
|
+
/**
|
|
1003
|
+
* The nesting level of the test.
|
|
1004
|
+
*/
|
|
1005
|
+
nesting: number;
|
|
1006
|
+
/**
|
|
1007
|
+
* The ordinal number of the test.
|
|
1008
|
+
*/
|
|
1009
|
+
testNumber: number;
|
|
1010
|
+
/**
|
|
1011
|
+
* Present if `context.todo` is called.
|
|
1012
|
+
*/
|
|
1013
|
+
todo?: string | boolean;
|
|
1014
|
+
/**
|
|
1015
|
+
* Present if `context.skip` is called.
|
|
1016
|
+
*/
|
|
1017
|
+
skip?: string | boolean;
|
|
1018
|
+
/**
|
|
1019
|
+
* The path of the test file, undefined if test is not ran through a file.
|
|
1020
|
+
*/
|
|
1021
|
+
file?: string;
|
|
1022
|
+
}
|
|
1023
|
+
interface TestPass {
|
|
1024
|
+
/**
|
|
1025
|
+
* Additional execution metadata.
|
|
1026
|
+
*/
|
|
1027
|
+
details: {
|
|
1028
|
+
/**
|
|
1029
|
+
* The duration of the test in milliseconds.
|
|
1030
|
+
*/
|
|
1031
|
+
duration: number;
|
|
1032
|
+
};
|
|
1033
|
+
/**
|
|
1034
|
+
* The test name.
|
|
1035
|
+
*/
|
|
1036
|
+
name: string;
|
|
1037
|
+
/**
|
|
1038
|
+
* The nesting level of the test.
|
|
1039
|
+
*/
|
|
1040
|
+
nesting: number;
|
|
1041
|
+
/**
|
|
1042
|
+
* The ordinal number of the test.
|
|
1043
|
+
*/
|
|
1044
|
+
testNumber: number;
|
|
1045
|
+
/**
|
|
1046
|
+
* Present if `context.todo` is called.
|
|
1047
|
+
*/
|
|
1048
|
+
todo?: string | boolean;
|
|
1049
|
+
/**
|
|
1050
|
+
* Present if `context.skip` is called.
|
|
1051
|
+
*/
|
|
1052
|
+
skip?: string | boolean;
|
|
1053
|
+
/**
|
|
1054
|
+
* The path of the test file, undefined if test is not ran through a file.
|
|
1055
|
+
*/
|
|
1056
|
+
file?: string;
|
|
1057
|
+
}
|
|
1058
|
+
interface TestPlan {
|
|
1059
|
+
/**
|
|
1060
|
+
* The nesting level of the test.
|
|
1061
|
+
*/
|
|
1062
|
+
nesting: number;
|
|
1063
|
+
/**
|
|
1064
|
+
* The number of subtests that have ran.
|
|
1065
|
+
*/
|
|
1066
|
+
count: number;
|
|
1067
|
+
/**
|
|
1068
|
+
* The path of the test file, undefined if test is not ran through a file.
|
|
1069
|
+
*/
|
|
1070
|
+
file?: string;
|
|
1071
|
+
}
|
|
1072
|
+
interface TestStart {
|
|
1073
|
+
/**
|
|
1074
|
+
* The test name.
|
|
1075
|
+
*/
|
|
1076
|
+
name: string;
|
|
1077
|
+
/**
|
|
1078
|
+
* The nesting level of the test.
|
|
1079
|
+
*/
|
|
1080
|
+
nesting: number;
|
|
1081
|
+
/**
|
|
1082
|
+
* The path of the test file, undefined if test is not ran through a file.
|
|
1083
|
+
*/
|
|
1084
|
+
file?: string;
|
|
1085
|
+
}
|
|
1086
|
+
interface TestStderr {
|
|
1087
|
+
/**
|
|
1088
|
+
* The path of the test file, undefined if test is not ran through a file.
|
|
1089
|
+
*/
|
|
1090
|
+
file?: string;
|
|
1091
|
+
/**
|
|
1092
|
+
* The message written to `stderr`
|
|
1093
|
+
*/
|
|
1094
|
+
message: string;
|
|
1095
|
+
}
|
|
1096
|
+
interface TestStdout {
|
|
1097
|
+
/**
|
|
1098
|
+
* The path of the test file, undefined if test is not ran through a file.
|
|
1099
|
+
*/
|
|
1100
|
+
file?: string;
|
|
1101
|
+
/**
|
|
1102
|
+
* The message written to `stdout`
|
|
1103
|
+
*/
|
|
1104
|
+
message: string;
|
|
1105
|
+
}
|
|
1106
|
+
|
|
1107
|
+
/**
|
|
1108
|
+
* The `node:test/reporters` module exposes the builtin-reporters for `node:test`.
|
|
1109
|
+
* To access it:
|
|
1110
|
+
*
|
|
1111
|
+
* ```js
|
|
1112
|
+
* import test from 'node:test/reporters';
|
|
1113
|
+
* ```
|
|
1114
|
+
*
|
|
1115
|
+
* This module is only available under the `node:` scheme. The following will not
|
|
1116
|
+
* work:
|
|
1117
|
+
*
|
|
1118
|
+
* ```js
|
|
1119
|
+
* import test from 'test/reporters';
|
|
1120
|
+
* ```
|
|
1121
|
+
* @since v19.9.0
|
|
1122
|
+
* @see [source](https://github.com/nodejs/node/blob/v20.2.0/lib/test/reporters.js)
|
|
1123
|
+
*/
|
|
1124
|
+
declare module 'node:test/reporters' {
|
|
1125
|
+
import { Transform } from 'node:stream';
|
|
1126
|
+
|
|
1127
|
+
type TestEvent =
|
|
1128
|
+
| { type: 'test:diagnostic', data: DiagnosticData }
|
|
1129
|
+
| { type: 'test:fail', data: TestFail }
|
|
1130
|
+
| { type: 'test:pass', data: TestPass }
|
|
1131
|
+
| { type: 'test:plan', data: TestPlan }
|
|
1132
|
+
| { type: 'test:start', data: TestStart }
|
|
1133
|
+
| { type: 'test:stderr', data: TestStderr }
|
|
1134
|
+
| { type: 'test:stdout', data: TestStdout };
|
|
1135
|
+
type TestEventGenerator = AsyncGenerator<TestEvent, void>;
|
|
1136
|
+
|
|
1137
|
+
/**
|
|
1138
|
+
* The `dot` reporter outputs the test results in a compact format,
|
|
1139
|
+
* where each passing test is represented by a `.`,
|
|
1140
|
+
* and each failing test is represented by a `X`.
|
|
1141
|
+
*/
|
|
1142
|
+
function dot(source: TestEventGenerator): AsyncGenerator<"\n" | "." | "X", void>;
|
|
1143
|
+
/**
|
|
1144
|
+
* The `tap` reporter outputs the test results in the [TAP](https://testanything.org/) format.
|
|
1145
|
+
*/
|
|
1146
|
+
function tap(source: TestEventGenerator): AsyncGenerator<string, void>;
|
|
1147
|
+
/**
|
|
1148
|
+
* The `spec` reporter outputs the test results in a human-readable format.
|
|
1149
|
+
*/
|
|
1150
|
+
class Spec extends Transform {
|
|
1151
|
+
constructor();
|
|
1152
|
+
}
|
|
1153
|
+
export { dot, tap, Spec as spec };
|
|
1154
|
+
}
|