cdk-ecr-deployment 3.0.20 → 3.0.22
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +2 -2
- package/.jsii.tabl.json +1 -1
- package/lib/index.js +3 -3
- package/node_modules/@types/cacheable-request/node_modules/@types/node/README.md +1 -1
- package/node_modules/@types/cacheable-request/node_modules/@types/node/crypto.d.ts +1 -1
- package/node_modules/@types/cacheable-request/node_modules/@types/node/net.d.ts +3 -3
- package/node_modules/@types/cacheable-request/node_modules/@types/node/package.json +3 -4
- package/node_modules/@types/cacheable-request/node_modules/@types/node/tls.d.ts +1 -1
- package/node_modules/@types/cacheable-request/node_modules/@types/node/ts4.8/crypto.d.ts +9 -4
- package/node_modules/@types/cacheable-request/node_modules/@types/node/ts4.8/net.d.ts +3 -3
- package/node_modules/@types/cacheable-request/node_modules/@types/node/ts4.8/tls.d.ts +1 -1
- package/node_modules/@types/cacheable-request/node_modules/@types/node/ts4.8/util.d.ts +1 -1
- package/node_modules/@types/keyv/node_modules/@types/node/README.md +1 -1
- package/node_modules/@types/keyv/node_modules/@types/node/crypto.d.ts +1 -1
- package/node_modules/@types/keyv/node_modules/@types/node/net.d.ts +3 -3
- package/node_modules/@types/keyv/node_modules/@types/node/package.json +3 -4
- package/node_modules/@types/keyv/node_modules/@types/node/tls.d.ts +1 -1
- package/node_modules/@types/keyv/node_modules/@types/node/ts4.8/crypto.d.ts +9 -4
- package/node_modules/@types/keyv/node_modules/@types/node/ts4.8/net.d.ts +3 -3
- package/node_modules/@types/keyv/node_modules/@types/node/ts4.8/tls.d.ts +1 -1
- package/node_modules/@types/keyv/node_modules/@types/node/ts4.8/util.d.ts +1 -1
- package/node_modules/@types/responselike/node_modules/@types/node/README.md +1 -1
- package/node_modules/@types/responselike/node_modules/@types/node/crypto.d.ts +1 -1
- package/node_modules/@types/responselike/node_modules/@types/node/net.d.ts +3 -3
- package/node_modules/@types/responselike/node_modules/@types/node/package.json +3 -4
- package/node_modules/@types/responselike/node_modules/@types/node/tls.d.ts +1 -1
- package/node_modules/@types/responselike/node_modules/@types/node/ts4.8/crypto.d.ts +9 -4
- package/node_modules/@types/responselike/node_modules/@types/node/ts4.8/net.d.ts +3 -3
- package/node_modules/@types/responselike/node_modules/@types/node/ts4.8/tls.d.ts +1 -1
- package/node_modules/@types/responselike/node_modules/@types/node/ts4.8/util.d.ts +1 -1
- package/package.json +3 -3
package/.jsii
CHANGED
|
@@ -4190,6 +4190,6 @@
|
|
|
4190
4190
|
"symbolId": "src/index:S3ArchiveName"
|
|
4191
4191
|
}
|
|
4192
4192
|
},
|
|
4193
|
-
"version": "3.0.
|
|
4194
|
-
"fingerprint": "
|
|
4193
|
+
"version": "3.0.22",
|
|
4194
|
+
"fingerprint": "c+NW2F4XcwSU95ZBEztqh3ihP+E/aC32zHrIsv+wCr4="
|
|
4195
4195
|
}
|
package/.jsii.tabl.json
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":"2","toolVersion":"5.3.8","snippets":{"33850328020507963bc7787401a169bb06e49f6132425a6d1529815c1554c645":{"translations":{"python":{"source":"from aws_cdk.aws_ecr_assets import DockerImageAsset\n\n\nimage = DockerImageAsset(self, \"CDKDockerImage\",\n directory=path.join(__dirname, \"docker\")\n)\n\n# Copy from cdk docker image asset to another ECR.\necrdeploy.ECRDeployment(self, \"DeployDockerImage1\",\n src=ecrdeploy.DockerImageName(image.image_uri),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\")\n)\n\n# Copy from docker registry to ECR.\necrdeploy.ECRDeployment(self, \"DeployDockerImage2\",\n src=ecrdeploy.DockerImageName(\"nginx:latest\"),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\")\n)\n\n# Copy from private docker registry to ECR.\n# The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\necrdeploy.ECRDeployment(self, \"DeployDockerImage3\",\n src=ecrdeploy.DockerImageName(\"javacs3/nginx:latest\", \"username:password\"),\n # src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n # src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\")\n).add_to_principal_policy(iam.PolicyStatement(\n effect=iam.Effect.ALLOW,\n actions=[\"secretsmanager:GetSecretValue\"\n ],\n resources=[\"*\"]\n))","version":"2"},"csharp":{"source":"using Amazon.CDK.AWS.Ecr.Assets;\n\n\nvar image = new DockerImageAsset(this, \"CDKDockerImage\", new DockerImageAssetProps {\n Directory = Join(__dirname, \"docker\")\n});\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\nnew ECRDeployment(this, \"DeployDockerImage1\", new ECRDeploymentProps {\n Src = new DockerImageName(image.ImageUri),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\")\n});\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\nnew ECRDeployment(this, \"DeployDockerImage2\", new ECRDeploymentProps {\n Src = new DockerImageName(\"nginx:latest\"),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\")\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ECRDeployment(this, \"DeployDockerImage3\", new ECRDeploymentProps {\n Src = new DockerImageName(\"javacs3/nginx:latest\", \"username:password\"),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\")\n}).AddToPrincipalPolicy(new PolicyStatement(new PolicyStatementProps {\n Effect = Effect.ALLOW,\n Actions = new [] { \"secretsmanager:GetSecretValue\" },\n Resources = new [] { \"*\" }\n}));","version":"1"},"java":{"source":"import software.amazon.awscdk.services.ecr.assets.DockerImageAsset;\n\n\nDockerImageAsset image = DockerImageAsset.Builder.create(this, \"CDKDockerImage\")\n .directory(join(__dirname, \"docker\"))\n .build();\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\nECRDeployment.Builder.create(this, \"DeployDockerImage1\")\n .src(new DockerImageName(image.getImageUri()))\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\", Aws.ACCOUNT_ID)))\n .build();\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\nECRDeployment.Builder.create(this, \"DeployDockerImage2\")\n .src(new DockerImageName(\"nginx:latest\"))\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\", Aws.ACCOUNT_ID)))\n .build();\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nECRDeployment.Builder.create(this, \"DeployDockerImage3\")\n .src(new DockerImageName(\"javacs3/nginx:latest\", \"username:password\"))\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\", Aws.ACCOUNT_ID)))\n .build().addToPrincipalPolicy(PolicyStatement.Builder.create()\n .effect(Effect.ALLOW)\n .actions(List.of(\"secretsmanager:GetSecretValue\"))\n .resources(List.of(\"*\"))\n .build());","version":"1"},"go":{"source":"import \"github.com/aws/aws-cdk-go/awscdk\"\n\n\nimage := awscdk.NewDockerImageAsset(this, jsii.String(\"CDKDockerImage\"), &DockerImageAssetProps{\n\tDirectory: path.join(__dirname, jsii.String(\"docker\")),\n})\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage1\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(image.ImageUri),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\", cdk.Aws_ACCOUNT_ID())),\n})\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage2\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(jsii.String(\"nginx:latest\")),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\", cdk.Aws_ACCOUNT_ID())),\n})\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage3\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(jsii.String(\"javacs3/nginx:latest\"), jsii.String(\"username:password\")),\n\t// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n\t// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\", cdk.Aws_ACCOUNT_ID())),\n}).AddToPrincipalPolicy(awscdk.Aws_iam.NewPolicyStatement(&PolicyStatementProps{\n\tEffect: awscdk.*Aws_iam.Effect_ALLOW,\n\tActions: []*string{\n\t\tjsii.String(\"secretsmanager:GetSecretValue\"),\n\t},\n\tResources: []*string{\n\t\tjsii.String(\"*\"),\n\t},\n}))","version":"1"},"$":{"source":"import { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));","version":"0"}},"location":{"api":{"api":"moduleReadme","moduleFqn":"cdk-ecr-deployment"},"field":{"field":"markdown","line":33}},"didCompile":true,"fqnsReferenced":["aws-cdk-lib.aws_ecr_assets.DockerImageAsset","aws-cdk-lib.aws_ecr_assets.DockerImageAsset#imageUri","aws-cdk-lib.aws_ecr_assets.DockerImageAssetProps","aws-cdk-lib.aws_iam.Effect","aws-cdk-lib.aws_iam.Effect#ALLOW","aws-cdk-lib.aws_iam.PolicyStatement","aws-cdk-lib.aws_iam.PolicyStatementProps","cdk-ecr-deployment.DockerImageName","cdk-ecr-deployment.ECRDeployment","cdk-ecr-deployment.ECRDeployment#addToPrincipalPolicy","cdk-ecr-deployment.ECRDeploymentProps","cdk-ecr-deployment.IImageName","constructs.Construct"],"fullSource":"// Hoisted imports begin after !show marker below\n/// !show\nimport { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n/// !hide\n// Hoisted imports ended before !hide marker above\n// Fixture with packages imported, but nothing else\nimport * as path from 'node:path';\nimport { Construct } from 'constructs';\n import * as ecrdeploy from 'cdk-ecr-deployment';\nimport {\n Stack,\n aws_iam as iam,\n} from 'aws-cdk-lib';\nimport * as cdk from 'aws-cdk-lib';\n\nclass Fixture extends Stack {\n constructor(scope: Construct, id: string) {\n super(scope, id);\n\n // Code snippet begins after !show marker below\n/// !show\n\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));\n/// !hide\n// Code snippet ended before !hide marker above\n }\n}","syntaxKindCounter":{"11":11,"16":3,"18":3,"80":51,"110":4,"209":2,"210":5,"211":21,"213":2,"214":11,"228":3,"239":3,"243":1,"244":3,"260":1,"261":1,"272":1,"273":1,"275":1,"276":1,"303":10,"312":1},"fqnsFingerprint":"9d435b1b2c76010f8a75490e073b59c4d776eb93ca570ed78a292aecd169403d"}}}
|
|
1
|
+
{"version":"2","toolVersion":"5.3.9","snippets":{"33850328020507963bc7787401a169bb06e49f6132425a6d1529815c1554c645":{"translations":{"python":{"source":"from aws_cdk.aws_ecr_assets import DockerImageAsset\n\n\nimage = DockerImageAsset(self, \"CDKDockerImage\",\n directory=path.join(__dirname, \"docker\")\n)\n\n# Copy from cdk docker image asset to another ECR.\necrdeploy.ECRDeployment(self, \"DeployDockerImage1\",\n src=ecrdeploy.DockerImageName(image.image_uri),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\")\n)\n\n# Copy from docker registry to ECR.\necrdeploy.ECRDeployment(self, \"DeployDockerImage2\",\n src=ecrdeploy.DockerImageName(\"nginx:latest\"),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\")\n)\n\n# Copy from private docker registry to ECR.\n# The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\necrdeploy.ECRDeployment(self, \"DeployDockerImage3\",\n src=ecrdeploy.DockerImageName(\"javacs3/nginx:latest\", \"username:password\"),\n # src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n # src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\")\n).add_to_principal_policy(iam.PolicyStatement(\n effect=iam.Effect.ALLOW,\n actions=[\"secretsmanager:GetSecretValue\"\n ],\n resources=[\"*\"]\n))","version":"2"},"csharp":{"source":"using Amazon.CDK.AWS.Ecr.Assets;\n\n\nvar image = new DockerImageAsset(this, \"CDKDockerImage\", new DockerImageAssetProps {\n Directory = Join(__dirname, \"docker\")\n});\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\nnew ECRDeployment(this, \"DeployDockerImage1\", new ECRDeploymentProps {\n Src = new DockerImageName(image.ImageUri),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\")\n});\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\nnew ECRDeployment(this, \"DeployDockerImage2\", new ECRDeploymentProps {\n Src = new DockerImageName(\"nginx:latest\"),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\")\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ECRDeployment(this, \"DeployDockerImage3\", new ECRDeploymentProps {\n Src = new DockerImageName(\"javacs3/nginx:latest\", \"username:password\"),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\")\n}).AddToPrincipalPolicy(new PolicyStatement(new PolicyStatementProps {\n Effect = Effect.ALLOW,\n Actions = new [] { \"secretsmanager:GetSecretValue\" },\n Resources = new [] { \"*\" }\n}));","version":"1"},"java":{"source":"import software.amazon.awscdk.services.ecr.assets.DockerImageAsset;\n\n\nDockerImageAsset image = DockerImageAsset.Builder.create(this, \"CDKDockerImage\")\n .directory(join(__dirname, \"docker\"))\n .build();\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\nECRDeployment.Builder.create(this, \"DeployDockerImage1\")\n .src(new DockerImageName(image.getImageUri()))\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\", Aws.ACCOUNT_ID)))\n .build();\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\nECRDeployment.Builder.create(this, \"DeployDockerImage2\")\n .src(new DockerImageName(\"nginx:latest\"))\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\", Aws.ACCOUNT_ID)))\n .build();\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nECRDeployment.Builder.create(this, \"DeployDockerImage3\")\n .src(new DockerImageName(\"javacs3/nginx:latest\", \"username:password\"))\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\", Aws.ACCOUNT_ID)))\n .build().addToPrincipalPolicy(PolicyStatement.Builder.create()\n .effect(Effect.ALLOW)\n .actions(List.of(\"secretsmanager:GetSecretValue\"))\n .resources(List.of(\"*\"))\n .build());","version":"1"},"go":{"source":"import \"github.com/aws/aws-cdk-go/awscdk\"\n\n\nimage := awscdk.NewDockerImageAsset(this, jsii.String(\"CDKDockerImage\"), &DockerImageAssetProps{\n\tDirectory: path.join(__dirname, jsii.String(\"docker\")),\n})\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage1\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(image.ImageUri),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\", cdk.Aws_ACCOUNT_ID())),\n})\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage2\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(jsii.String(\"nginx:latest\")),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\", cdk.Aws_ACCOUNT_ID())),\n})\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage3\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(jsii.String(\"javacs3/nginx:latest\"), jsii.String(\"username:password\")),\n\t// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n\t// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\", cdk.Aws_ACCOUNT_ID())),\n}).AddToPrincipalPolicy(awscdk.Aws_iam.NewPolicyStatement(&PolicyStatementProps{\n\tEffect: awscdk.*Aws_iam.Effect_ALLOW,\n\tActions: []*string{\n\t\tjsii.String(\"secretsmanager:GetSecretValue\"),\n\t},\n\tResources: []*string{\n\t\tjsii.String(\"*\"),\n\t},\n}))","version":"1"},"$":{"source":"import { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));","version":"0"}},"location":{"api":{"api":"moduleReadme","moduleFqn":"cdk-ecr-deployment"},"field":{"field":"markdown","line":33}},"didCompile":true,"fqnsReferenced":["aws-cdk-lib.aws_ecr_assets.DockerImageAsset","aws-cdk-lib.aws_ecr_assets.DockerImageAsset#imageUri","aws-cdk-lib.aws_ecr_assets.DockerImageAssetProps","aws-cdk-lib.aws_iam.Effect","aws-cdk-lib.aws_iam.Effect#ALLOW","aws-cdk-lib.aws_iam.PolicyStatement","aws-cdk-lib.aws_iam.PolicyStatementProps","cdk-ecr-deployment.DockerImageName","cdk-ecr-deployment.ECRDeployment","cdk-ecr-deployment.ECRDeployment#addToPrincipalPolicy","cdk-ecr-deployment.ECRDeploymentProps","cdk-ecr-deployment.IImageName","constructs.Construct"],"fullSource":"// Hoisted imports begin after !show marker below\n/// !show\nimport { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n/// !hide\n// Hoisted imports ended before !hide marker above\n// Fixture with packages imported, but nothing else\nimport * as path from 'node:path';\nimport { Construct } from 'constructs';\n import * as ecrdeploy from 'cdk-ecr-deployment';\nimport {\n Stack,\n aws_iam as iam,\n} from 'aws-cdk-lib';\nimport * as cdk from 'aws-cdk-lib';\n\nclass Fixture extends Stack {\n constructor(scope: Construct, id: string) {\n super(scope, id);\n\n // Code snippet begins after !show marker below\n/// !show\n\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));\n/// !hide\n// Code snippet ended before !hide marker above\n }\n}","syntaxKindCounter":{"11":11,"16":3,"18":3,"80":51,"110":4,"209":2,"210":5,"211":21,"213":2,"214":11,"228":3,"239":3,"243":1,"244":3,"260":1,"261":1,"272":1,"273":1,"275":1,"276":1,"303":10,"312":1},"fqnsFingerprint":"9d435b1b2c76010f8a75490e073b59c4d776eb93ca570ed78a292aecd169403d"}}}
|
package/lib/index.js
CHANGED
|
@@ -37,7 +37,7 @@ class DockerImageName {
|
|
|
37
37
|
}
|
|
38
38
|
exports.DockerImageName = DockerImageName;
|
|
39
39
|
_a = JSII_RTTI_SYMBOL_1;
|
|
40
|
-
DockerImageName[_a] = { fqn: "cdk-ecr-deployment.DockerImageName", version: "3.0.
|
|
40
|
+
DockerImageName[_a] = { fqn: "cdk-ecr-deployment.DockerImageName", version: "3.0.22" };
|
|
41
41
|
class S3ArchiveName {
|
|
42
42
|
constructor(p, ref, creds) {
|
|
43
43
|
this.creds = creds;
|
|
@@ -50,7 +50,7 @@ class S3ArchiveName {
|
|
|
50
50
|
}
|
|
51
51
|
exports.S3ArchiveName = S3ArchiveName;
|
|
52
52
|
_b = JSII_RTTI_SYMBOL_1;
|
|
53
|
-
S3ArchiveName[_b] = { fqn: "cdk-ecr-deployment.S3ArchiveName", version: "3.0.
|
|
53
|
+
S3ArchiveName[_b] = { fqn: "cdk-ecr-deployment.S3ArchiveName", version: "3.0.22" };
|
|
54
54
|
class ECRDeployment extends constructs_1.Construct {
|
|
55
55
|
constructor(scope, id, props) {
|
|
56
56
|
super(scope, id);
|
|
@@ -134,5 +134,5 @@ class ECRDeployment extends constructs_1.Construct {
|
|
|
134
134
|
}
|
|
135
135
|
exports.ECRDeployment = ECRDeployment;
|
|
136
136
|
_c = JSII_RTTI_SYMBOL_1;
|
|
137
|
-
ECRDeployment[_c] = { fqn: "cdk-ecr-deployment.ECRDeployment", version: "3.0.
|
|
137
|
+
ECRDeployment[_c] = { fqn: "cdk-ecr-deployment.ECRDeployment", version: "3.0.22" };
|
|
138
138
|
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;AAAA,qEAAqE;AACrE,sCAAsC;AAGtC,+CAA+C;AAC/C,6BAA6B;AAC7B,6CAAoH;AAEpH,2CAAuC;AACvC,qCAAmD;AAwFnD,SAAS,OAAO,CAAC,UAAkB;IACjC,IAAI,IAAA,gCAAuB,GAAE,EAAE;QAC7B,IAAI;YACF,MAAM,aAAa,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,sBAAsB,CAAC,CAAC;YACnE,MAAM,YAAY,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,eAAe,CAAC,CAAC;YAC3D,aAAa,CAAC,YAAY,CAAC,OAAO,CAAC,KAAK,EAAE,CAAC,aAAa,EAAE,YAAY,CAAC,CAAC,CAAC;YAEzE,OAAO,wBAAM,CAAC,IAAI,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC;SAC5C;QAAC,OAAO,GAAG,EAAE;YACZ,OAAO,CAAC,IAAI,CAAC,gCAAgC,GAAG,EAAE,CAAC,CAAC;SACrD;KACF;IAED,OAAO,wBAAM,CAAC,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,WAAW,CAAC,EAAE;QACpE,SAAS,EAAE;YACT,UAAU;SACX;KACF,CAAC,CAAC;AACL,CAAC;AAED,MAAa,eAAe;IAC1B,YAA2B,IAAY,EAAS,KAAc;QAAnC,SAAI,GAAJ,IAAI,CAAQ;QAAS,UAAK,GAAL,KAAK,CAAS;IAAI,CAAC;IACnE,IAAW,GAAG,KAAa,OAAO,YAAY,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;;AAF9D,0CAGC;;;AAED,MAAa,aAAa;IAExB,YAAmB,CAAS,EAAE,GAAY,EAAS,KAAc;QAAd,UAAK,GAAL,KAAK,CAAS;QAC/D,IAAI,CAAC,IAAI,GAAG,CAAC,CAAC;QACd,IAAI,GAAG,EAAE;YACP,IAAI,CAAC,IAAI,IAAI,GAAG,GAAG,GAAG,CAAC;SACxB;IACH,CAAC;IACD,IAAW,GAAG,KAAa,OAAO,QAAQ,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;;AAR1D,sCASC;;;AAED,MAAa,aAAc,SAAQ,sBAAS;IAG1C,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAyB;QACjE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,MAAM,WAAW,GAAG,KAAK,CAAC,WAAW,IAAI,GAAG,CAAC;QAC7C,IAAI,CAAC,OAAO,GAAG,IAAI,wBAAM,CAAC,iBAAiB,CAAC,IAAI,EAAE,uBAAuB,EAAE;YACzE,IAAI,EAAE,IAAI,CAAC,mBAAmB,CAAC,WAAW,CAAC;YAC3C,IAAI,EAAE,OAAO,CAAC,KAAK,CAAC,UAAU,IAAI,UAAU,CAAC;YAC7C,OAAO,EAAE,wBAAM,CAAC,OAAO,CAAC,eAAe;YACvC,OAAO,EAAE,WAAW;YACpB,WAAW,EAAE,KAAK,CAAC,WAAW;YAC9B,aAAa,EAAE,0BAA0B;YACzC,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YAC7B,IAAI,EAAE,KAAK,CAAC,IAAI;YAChB,UAAU,EAAE,WAAW;YACvB,GAAG,EAAE,KAAK,CAAC,GAAG;YACd,UAAU,EAAE,KAAK,CAAC,UAAU;YAC5B,cAAc,EAAE,KAAK,CAAC,cAAc;SACrC,CAAC,CAAC;QAEH,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,WAAW,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;SAAE;QAE7F,WAAW,CAAC,oBAAoB,CAC9B,IAAI,qBAAG,CAAC,eAAe,CAAC;YACtB,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,2BAA2B;gBAC3B,iCAAiC;gBACjC,4BAA4B;gBAC5B,yBAAyB;gBACzB,0BAA0B;gBAC1B,gBAAgB;gBAChB,oBAAoB;gBACpB,mBAAmB;gBACnB,yBAAyB;gBACzB,+BAA+B;gBAC/B,yBAAyB;gBACzB,qBAAqB;gBACrB,yBAAyB;gBACzB,cAAc;aACf;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QACN,WAAW,CAAC,oBAAoB,CAAC,IAAI,qBAAG,CAAC,eAAe,CAAC;YACvD,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,cAAc;aACf;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QAEJ,IAAI,4BAAc,CAAC,IAAI,EAAE,gBAAgB,EAAE;YACzC,YAAY,EAAE,IAAI,CAAC,OAAO,CAAC,WAAW;YACtC,YAAY,EAAE,6BAA6B;YAC3C,UAAU,EAAE;gBACV,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,GAAG;gBACvB,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,KAAK;gBACzB,SAAS,EAAE,KAAK,CAAC,IAAI,CAAC,GAAG;gBACzB,SAAS,EAAE,KAAK,CAAC,IAAI,CAAC,KAAK;aAC5B;SACF,CAAC,CAAC;IACL,CAAC;IAEM,oBAAoB,CAAC,SAA0B;QACpD,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,WAAW,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;SAAE;QAE7F,OAAO,WAAW,CAAC,oBAAoB,CAAC,SAAS,CAAC,CAAC;IACrD,CAAC;IAEO,mBAAmB,CAAC,WAAoB;QAC9C,IAAI,IAAI,GAAG,sCAAsC,CAAC;QAElD,0EAA0E;QAC1E,2EAA2E;QAC3E,4CAA4C;QAC5C,IAAI,WAAW,EAAE;YACf,IAAI,mBAAK,CAAC,YAAY,CAAC,WAAW,CAAC,EAAE;gBACnC,MAAM,IAAI,KAAK,CAAC,mHAAmH,CAAC,CAAC;aACtI;YAED,IAAI,IAAI,IAAI,WAAW,CAAC,QAAQ,EAAE,KAAK,CAAC;SACzC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;;AAvFH,sCAwFC","sourcesContent":["// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n// SPDX-License-Identifier: Apache-2.0\n\n\nimport * as child_process from 'child_process';\nimport * as path from 'path';\nimport { aws_ec2 as ec2, aws_iam as iam, aws_lambda as lambda, Duration, CustomResource, Token } from 'aws-cdk-lib';\nimport { PolicyStatement, AddToPrincipalPolicyResult } from 'aws-cdk-lib/aws-iam';\nimport { Construct } from 'constructs';\nimport { shouldUsePrebuiltLambda } from './config';\n\nexport interface ECRDeploymentProps {\n\n  /**\n   * Image to use to build Golang lambda for custom resource, if download fails or is not wanted.\n   *\n   * Might be needed for local build if all images need to come from own registry.\n   *\n   * Note that image should use yum as a package manager and have golang available.\n   *\n   * @default public.ecr.aws/sam/build-go1.x:latest\n   */\n  readonly buildImage?: string;\n  /**\n   * The source of the docker image.\n   */\n  readonly src: IImageName;\n\n  /**\n   * The destination of the docker image.\n   */\n  readonly dest: IImageName;\n\n  /**\n   * The amount of memory (in MiB) to allocate to the AWS Lambda function which\n   * replicates the files from the CDK bucket to the destination bucket.\n   *\n   * If you are deploying large files, you will need to increase this number\n   * accordingly.\n   *\n   * @default 512\n   */\n  readonly memoryLimit?: number;\n\n  /**\n   * Execution role associated with this function\n   *\n   * @default - A role is automatically created\n   */\n  readonly role?: iam.IRole;\n\n  /**\n   * The VPC network to place the deployment lambda handler in.\n   *\n   * @default None\n   */\n  readonly vpc?: ec2.IVpc;\n\n  /**\n   * Where in the VPC to place the deployment lambda handler.\n   * Only used if 'vpc' is supplied.\n   *\n   * @default - the Vpc default strategy if not specified\n   */\n  readonly vpcSubnets?: ec2.SubnetSelection;\n\n  /**\n   * The list of security groups to associate with the Lambda's network interfaces.\n   *\n   * Only used if 'vpc' is supplied.\n   *\n   * @default - If the function is placed within a VPC and a security group is\n   * not specified, either by this or securityGroup prop, a dedicated security\n   * group will be created for this function.\n   */\n  readonly securityGroups?: ec2.SecurityGroup[];\n\n  /**\n   * The environment variable to set\n   */\n  readonly environment?: { [key: string]: string };\n}\n\nexport interface IImageName {\n  /**\n   *  The uri of the docker image.\n   *\n   *  The uri spec follows https://github.com/containers/skopeo\n   */\n  readonly uri: string;\n\n  /**\n   * The credentials of the docker image. Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`\n   */\n  creds?: string;\n}\n\nfunction getCode(buildImage: string): lambda.AssetCode {\n  if (shouldUsePrebuiltLambda()) {\n    try {\n      const installScript = path.join(__dirname, '../lambda/install.js');\n      const prebuiltPath = path.join(__dirname, '../lambda/out');\n      child_process.execFileSync(process.argv0, [installScript, prebuiltPath]);\n\n      return lambda.Code.fromAsset(prebuiltPath);\n    } catch (err) {\n      console.warn(`Can not get prebuilt lambda: ${err}`);\n    }\n  }\n\n  return lambda.Code.fromDockerBuild(path.join(__dirname, '../lambda'), {\n    buildArgs: {\n      buildImage,\n    },\n  });\n}\n\nexport class DockerImageName implements IImageName {\n  public constructor(private name: string, public creds?: string) { }\n  public get uri(): string { return `docker://${this.name}`; }\n}\n\nexport class S3ArchiveName implements IImageName {\n  private name: string;\n  public constructor(p: string, ref?: string, public creds?: string) {\n    this.name = p;\n    if (ref) {\n      this.name += ':' + ref;\n    }\n  }\n  public get uri(): string { return `s3://${this.name}`; }\n}\n\nexport class ECRDeployment extends Construct {\n  private handler: lambda.SingletonFunction;\n\n  constructor(scope: Construct, id: string, props: ECRDeploymentProps) {\n    super(scope, id);\n    const memoryLimit = props.memoryLimit ?? 512;\n    this.handler = new lambda.SingletonFunction(this, 'CustomResourceHandler', {\n      uuid: this.renderSingletonUuid(memoryLimit),\n      code: getCode(props.buildImage ?? 'golang:1'),\n      runtime: lambda.Runtime.PROVIDED_AL2023,\n      handler: 'bootstrap',\n      environment: props.environment,\n      lambdaPurpose: 'Custom::CDKECRDeployment',\n      timeout: Duration.minutes(15),\n      role: props.role,\n      memorySize: memoryLimit,\n      vpc: props.vpc,\n      vpcSubnets: props.vpcSubnets,\n      securityGroups: props.securityGroups,\n    });\n\n    const handlerRole = this.handler.role;\n    if (!handlerRole) { throw new Error('lambda.SingletonFunction should have created a Role'); }\n\n    handlerRole.addToPrincipalPolicy(\n      new iam.PolicyStatement({\n        effect: iam.Effect.ALLOW,\n        actions: [\n          'ecr:GetAuthorizationToken',\n          'ecr:BatchCheckLayerAvailability',\n          'ecr:GetDownloadUrlForLayer',\n          'ecr:GetRepositoryPolicy',\n          'ecr:DescribeRepositories',\n          'ecr:ListImages',\n          'ecr:DescribeImages',\n          'ecr:BatchGetImage',\n          'ecr:ListTagsForResource',\n          'ecr:DescribeImageScanFindings',\n          'ecr:InitiateLayerUpload',\n          'ecr:UploadLayerPart',\n          'ecr:CompleteLayerUpload',\n          'ecr:PutImage',\n        ],\n        resources: ['*'],\n      }));\n    handlerRole.addToPrincipalPolicy(new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions: [\n        's3:GetObject',\n      ],\n      resources: ['*'],\n    }));\n\n    new CustomResource(this, 'CustomResource', {\n      serviceToken: this.handler.functionArn,\n      resourceType: 'Custom::CDKBucketDeployment',\n      properties: {\n        SrcImage: props.src.uri,\n        SrcCreds: props.src.creds,\n        DestImage: props.dest.uri,\n        DestCreds: props.dest.creds,\n      },\n    });\n  }\n\n  public addToPrincipalPolicy(statement: PolicyStatement): AddToPrincipalPolicyResult {\n    const handlerRole = this.handler.role;\n    if (!handlerRole) { throw new Error('lambda.SingletonFunction should have created a Role'); }\n\n    return handlerRole.addToPrincipalPolicy(statement);\n  }\n\n  private renderSingletonUuid(memoryLimit?: number) {\n    let uuid = 'bd07c930-edb9-4112-a20f-03f096f53666';\n\n    // if user specify a custom memory limit, define another singleton handler\n    // with this configuration. otherwise, it won't be possible to use multiple\n    // configurations since we have a singleton.\n    if (memoryLimit) {\n      if (Token.isUnresolved(memoryLimit)) {\n        throw new Error('Can\\'t use tokens when specifying \"memoryLimit\" since we use it to identify the singleton custom resource handler');\n      }\n\n      uuid += `-${memoryLimit.toString()}MiB`;\n    }\n\n    return uuid;\n  }\n}\n"]}
|
|
@@ -8,7 +8,7 @@ This package contains type definitions for node (https://nodejs.org/).
|
|
|
8
8
|
Files were exported from https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node.
|
|
9
9
|
|
|
10
10
|
### Additional Details
|
|
11
|
-
* Last updated:
|
|
11
|
+
* Last updated: Thu, 01 Feb 2024 17:35:23 GMT
|
|
12
12
|
* Dependencies: [undici-types](https://npmjs.com/package/undici-types)
|
|
13
13
|
|
|
14
14
|
# Credits
|
|
@@ -1920,7 +1920,7 @@ declare module "crypto" {
|
|
|
1920
1920
|
* Return a random integer `n` such that `min <= n < max`. This
|
|
1921
1921
|
* implementation avoids [modulo bias](https://en.wikipedia.org/wiki/Fisher%E2%80%93Yates_shuffle#Modulo_bias).
|
|
1922
1922
|
*
|
|
1923
|
-
* The range (`max - min`) must be less than
|
|
1923
|
+
* The range (`max - min`) must be less than 2**48. `min` and `max` must
|
|
1924
1924
|
* be [safe integers](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Number/isSafeInteger).
|
|
1925
1925
|
*
|
|
1926
1926
|
* If the `callback` function is not provided, the random integer is
|
|
@@ -18,8 +18,8 @@ declare module "net" {
|
|
|
18
18
|
import * as dns from "node:dns";
|
|
19
19
|
type LookupFunction = (
|
|
20
20
|
hostname: string,
|
|
21
|
-
options: dns.
|
|
22
|
-
callback: (err: NodeJS.ErrnoException | null,
|
|
21
|
+
options: dns.LookupOptions,
|
|
22
|
+
callback: (err: NodeJS.ErrnoException | null, address: string | dns.LookupAddress[], family?: number) => void,
|
|
23
23
|
) => void;
|
|
24
24
|
interface AddressInfo {
|
|
25
25
|
address: string;
|
|
@@ -628,7 +628,7 @@ declare module "net" {
|
|
|
628
628
|
* Indicates whether or not the server is listening for connections.
|
|
629
629
|
* @since v5.7.0
|
|
630
630
|
*/
|
|
631
|
-
listening: boolean;
|
|
631
|
+
readonly listening: boolean;
|
|
632
632
|
/**
|
|
633
633
|
* events.EventEmitter
|
|
634
634
|
* 1. close
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@types/node",
|
|
3
|
-
"version": "20.11.
|
|
3
|
+
"version": "20.11.16",
|
|
4
4
|
"description": "TypeScript definitions for node",
|
|
5
5
|
"homepage": "https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node",
|
|
6
6
|
"license": "MIT",
|
|
@@ -224,7 +224,6 @@
|
|
|
224
224
|
"dependencies": {
|
|
225
225
|
"undici-types": "~5.26.4"
|
|
226
226
|
},
|
|
227
|
-
"typesPublisherContentHash": "
|
|
228
|
-
"typeScriptVersion": "4.6"
|
|
229
|
-
"nonNpm": true
|
|
227
|
+
"typesPublisherContentHash": "c74616c0dddd05b588f3fe3d0da870cc1928ca91bb661c07bccd1d41c3058b05",
|
|
228
|
+
"typeScriptVersion": "4.6"
|
|
230
229
|
}
|
|
@@ -220,7 +220,7 @@ declare module "tls" {
|
|
|
220
220
|
/**
|
|
221
221
|
* Construct a new tls.TLSSocket object from an existing TCP socket.
|
|
222
222
|
*/
|
|
223
|
-
constructor(socket: net.Socket, options?: TLSSocketOptions);
|
|
223
|
+
constructor(socket: net.Socket | stream.Duplex, options?: TLSSocketOptions);
|
|
224
224
|
/**
|
|
225
225
|
* This property is `true` if the peer certificate was signed by one of the CAs
|
|
226
226
|
* specified when creating the `tls.TLSSocket` instance, otherwise `false`.
|
|
@@ -1920,7 +1920,7 @@ declare module "crypto" {
|
|
|
1920
1920
|
* Return a random integer `n` such that `min <= n < max`. This
|
|
1921
1921
|
* implementation avoids [modulo bias](https://en.wikipedia.org/wiki/Fisher%E2%80%93Yates_shuffle#Modulo_bias).
|
|
1922
1922
|
*
|
|
1923
|
-
* The range (`max - min`) must be less than
|
|
1923
|
+
* The range (`max - min`) must be less than 2**48. `min` and `max` must
|
|
1924
1924
|
* be [safe integers](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Number/isSafeInteger).
|
|
1925
1925
|
*
|
|
1926
1926
|
* If the `callback` function is not provided, the random integer is
|
|
@@ -3530,12 +3530,13 @@ declare module "crypto" {
|
|
|
3530
3530
|
*/
|
|
3531
3531
|
disableEntropyCache?: boolean | undefined;
|
|
3532
3532
|
}
|
|
3533
|
+
type UUID = `${string}-${string}-${string}-${string}-${string}`;
|
|
3533
3534
|
/**
|
|
3534
3535
|
* Generates a random [RFC 4122](https://www.rfc-editor.org/rfc/rfc4122.txt) version 4 UUID. The UUID is generated using a
|
|
3535
3536
|
* cryptographic pseudorandom number generator.
|
|
3536
3537
|
* @since v15.6.0, v14.17.0
|
|
3537
3538
|
*/
|
|
3538
|
-
function randomUUID(options?: RandomUUIDOptions):
|
|
3539
|
+
function randomUUID(options?: RandomUUIDOptions): UUID;
|
|
3539
3540
|
interface X509CheckOptions {
|
|
3540
3541
|
/**
|
|
3541
3542
|
* @default 'always'
|
|
@@ -4094,7 +4095,7 @@ declare module "crypto" {
|
|
|
4094
4095
|
* The UUID is generated using a cryptographic pseudorandom number generator.
|
|
4095
4096
|
* @since v16.7.0
|
|
4096
4097
|
*/
|
|
4097
|
-
randomUUID():
|
|
4098
|
+
randomUUID(): UUID;
|
|
4098
4099
|
CryptoKey: CryptoKeyConstructor;
|
|
4099
4100
|
}
|
|
4100
4101
|
// This constructor throws ILLEGAL_CONSTRUCTOR so it should not be newable.
|
|
@@ -4474,7 +4475,11 @@ declare module "crypto" {
|
|
|
4474
4475
|
}
|
|
4475
4476
|
|
|
4476
4477
|
global {
|
|
4477
|
-
var crypto:
|
|
4478
|
+
var crypto: typeof globalThis extends {
|
|
4479
|
+
crypto: infer T;
|
|
4480
|
+
onmessage: any;
|
|
4481
|
+
} ? T
|
|
4482
|
+
: webcrypto.Crypto;
|
|
4478
4483
|
}
|
|
4479
4484
|
}
|
|
4480
4485
|
declare module "node:crypto" {
|
|
@@ -18,8 +18,8 @@ declare module "net" {
|
|
|
18
18
|
import * as dns from "node:dns";
|
|
19
19
|
type LookupFunction = (
|
|
20
20
|
hostname: string,
|
|
21
|
-
options: dns.
|
|
22
|
-
callback: (err: NodeJS.ErrnoException | null,
|
|
21
|
+
options: dns.LookupOptions,
|
|
22
|
+
callback: (err: NodeJS.ErrnoException | null, address: string | dns.LookupAddress[], family?: number) => void,
|
|
23
23
|
) => void;
|
|
24
24
|
interface AddressInfo {
|
|
25
25
|
address: string;
|
|
@@ -628,7 +628,7 @@ declare module "net" {
|
|
|
628
628
|
* Indicates whether or not the server is listening for connections.
|
|
629
629
|
* @since v5.7.0
|
|
630
630
|
*/
|
|
631
|
-
listening: boolean;
|
|
631
|
+
readonly listening: boolean;
|
|
632
632
|
/**
|
|
633
633
|
* events.EventEmitter
|
|
634
634
|
* 1. close
|
|
@@ -220,7 +220,7 @@ declare module "tls" {
|
|
|
220
220
|
/**
|
|
221
221
|
* Construct a new tls.TLSSocket object from an existing TCP socket.
|
|
222
222
|
*/
|
|
223
|
-
constructor(socket: net.Socket, options?: TLSSocketOptions);
|
|
223
|
+
constructor(socket: net.Socket | stream.Duplex, options?: TLSSocketOptions);
|
|
224
224
|
/**
|
|
225
225
|
* This property is `true` if the peer certificate was signed by one of the CAs
|
|
226
226
|
* specified when creating the `tls.TLSSocket` instance, otherwise `false`.
|
|
@@ -1602,7 +1602,7 @@ declare module "util" {
|
|
|
1602
1602
|
* Each item of the iterator is a JavaScript `Array`. The first item of the array
|
|
1603
1603
|
* is the `name`, the second item of the array is the `value`.
|
|
1604
1604
|
*/
|
|
1605
|
-
entries(): IterableIterator<[string, string]>;
|
|
1605
|
+
entries(): IterableIterator<[name: string, value: string]>;
|
|
1606
1606
|
/**
|
|
1607
1607
|
* Returns the value of the first name-value pair whose name is `name`. If there
|
|
1608
1608
|
* are no such pairs, `null` is returned.
|
|
@@ -8,7 +8,7 @@ This package contains type definitions for node (https://nodejs.org/).
|
|
|
8
8
|
Files were exported from https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node.
|
|
9
9
|
|
|
10
10
|
### Additional Details
|
|
11
|
-
* Last updated:
|
|
11
|
+
* Last updated: Thu, 01 Feb 2024 17:35:23 GMT
|
|
12
12
|
* Dependencies: [undici-types](https://npmjs.com/package/undici-types)
|
|
13
13
|
|
|
14
14
|
# Credits
|
|
@@ -1920,7 +1920,7 @@ declare module "crypto" {
|
|
|
1920
1920
|
* Return a random integer `n` such that `min <= n < max`. This
|
|
1921
1921
|
* implementation avoids [modulo bias](https://en.wikipedia.org/wiki/Fisher%E2%80%93Yates_shuffle#Modulo_bias).
|
|
1922
1922
|
*
|
|
1923
|
-
* The range (`max - min`) must be less than
|
|
1923
|
+
* The range (`max - min`) must be less than 2**48. `min` and `max` must
|
|
1924
1924
|
* be [safe integers](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Number/isSafeInteger).
|
|
1925
1925
|
*
|
|
1926
1926
|
* If the `callback` function is not provided, the random integer is
|
|
@@ -18,8 +18,8 @@ declare module "net" {
|
|
|
18
18
|
import * as dns from "node:dns";
|
|
19
19
|
type LookupFunction = (
|
|
20
20
|
hostname: string,
|
|
21
|
-
options: dns.
|
|
22
|
-
callback: (err: NodeJS.ErrnoException | null,
|
|
21
|
+
options: dns.LookupOptions,
|
|
22
|
+
callback: (err: NodeJS.ErrnoException | null, address: string | dns.LookupAddress[], family?: number) => void,
|
|
23
23
|
) => void;
|
|
24
24
|
interface AddressInfo {
|
|
25
25
|
address: string;
|
|
@@ -628,7 +628,7 @@ declare module "net" {
|
|
|
628
628
|
* Indicates whether or not the server is listening for connections.
|
|
629
629
|
* @since v5.7.0
|
|
630
630
|
*/
|
|
631
|
-
listening: boolean;
|
|
631
|
+
readonly listening: boolean;
|
|
632
632
|
/**
|
|
633
633
|
* events.EventEmitter
|
|
634
634
|
* 1. close
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@types/node",
|
|
3
|
-
"version": "20.11.
|
|
3
|
+
"version": "20.11.16",
|
|
4
4
|
"description": "TypeScript definitions for node",
|
|
5
5
|
"homepage": "https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node",
|
|
6
6
|
"license": "MIT",
|
|
@@ -224,7 +224,6 @@
|
|
|
224
224
|
"dependencies": {
|
|
225
225
|
"undici-types": "~5.26.4"
|
|
226
226
|
},
|
|
227
|
-
"typesPublisherContentHash": "
|
|
228
|
-
"typeScriptVersion": "4.6"
|
|
229
|
-
"nonNpm": true
|
|
227
|
+
"typesPublisherContentHash": "c74616c0dddd05b588f3fe3d0da870cc1928ca91bb661c07bccd1d41c3058b05",
|
|
228
|
+
"typeScriptVersion": "4.6"
|
|
230
229
|
}
|
|
@@ -220,7 +220,7 @@ declare module "tls" {
|
|
|
220
220
|
/**
|
|
221
221
|
* Construct a new tls.TLSSocket object from an existing TCP socket.
|
|
222
222
|
*/
|
|
223
|
-
constructor(socket: net.Socket, options?: TLSSocketOptions);
|
|
223
|
+
constructor(socket: net.Socket | stream.Duplex, options?: TLSSocketOptions);
|
|
224
224
|
/**
|
|
225
225
|
* This property is `true` if the peer certificate was signed by one of the CAs
|
|
226
226
|
* specified when creating the `tls.TLSSocket` instance, otherwise `false`.
|
|
@@ -1920,7 +1920,7 @@ declare module "crypto" {
|
|
|
1920
1920
|
* Return a random integer `n` such that `min <= n < max`. This
|
|
1921
1921
|
* implementation avoids [modulo bias](https://en.wikipedia.org/wiki/Fisher%E2%80%93Yates_shuffle#Modulo_bias).
|
|
1922
1922
|
*
|
|
1923
|
-
* The range (`max - min`) must be less than
|
|
1923
|
+
* The range (`max - min`) must be less than 2**48. `min` and `max` must
|
|
1924
1924
|
* be [safe integers](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Number/isSafeInteger).
|
|
1925
1925
|
*
|
|
1926
1926
|
* If the `callback` function is not provided, the random integer is
|
|
@@ -3530,12 +3530,13 @@ declare module "crypto" {
|
|
|
3530
3530
|
*/
|
|
3531
3531
|
disableEntropyCache?: boolean | undefined;
|
|
3532
3532
|
}
|
|
3533
|
+
type UUID = `${string}-${string}-${string}-${string}-${string}`;
|
|
3533
3534
|
/**
|
|
3534
3535
|
* Generates a random [RFC 4122](https://www.rfc-editor.org/rfc/rfc4122.txt) version 4 UUID. The UUID is generated using a
|
|
3535
3536
|
* cryptographic pseudorandom number generator.
|
|
3536
3537
|
* @since v15.6.0, v14.17.0
|
|
3537
3538
|
*/
|
|
3538
|
-
function randomUUID(options?: RandomUUIDOptions):
|
|
3539
|
+
function randomUUID(options?: RandomUUIDOptions): UUID;
|
|
3539
3540
|
interface X509CheckOptions {
|
|
3540
3541
|
/**
|
|
3541
3542
|
* @default 'always'
|
|
@@ -4094,7 +4095,7 @@ declare module "crypto" {
|
|
|
4094
4095
|
* The UUID is generated using a cryptographic pseudorandom number generator.
|
|
4095
4096
|
* @since v16.7.0
|
|
4096
4097
|
*/
|
|
4097
|
-
randomUUID():
|
|
4098
|
+
randomUUID(): UUID;
|
|
4098
4099
|
CryptoKey: CryptoKeyConstructor;
|
|
4099
4100
|
}
|
|
4100
4101
|
// This constructor throws ILLEGAL_CONSTRUCTOR so it should not be newable.
|
|
@@ -4474,7 +4475,11 @@ declare module "crypto" {
|
|
|
4474
4475
|
}
|
|
4475
4476
|
|
|
4476
4477
|
global {
|
|
4477
|
-
var crypto:
|
|
4478
|
+
var crypto: typeof globalThis extends {
|
|
4479
|
+
crypto: infer T;
|
|
4480
|
+
onmessage: any;
|
|
4481
|
+
} ? T
|
|
4482
|
+
: webcrypto.Crypto;
|
|
4478
4483
|
}
|
|
4479
4484
|
}
|
|
4480
4485
|
declare module "node:crypto" {
|
|
@@ -18,8 +18,8 @@ declare module "net" {
|
|
|
18
18
|
import * as dns from "node:dns";
|
|
19
19
|
type LookupFunction = (
|
|
20
20
|
hostname: string,
|
|
21
|
-
options: dns.
|
|
22
|
-
callback: (err: NodeJS.ErrnoException | null,
|
|
21
|
+
options: dns.LookupOptions,
|
|
22
|
+
callback: (err: NodeJS.ErrnoException | null, address: string | dns.LookupAddress[], family?: number) => void,
|
|
23
23
|
) => void;
|
|
24
24
|
interface AddressInfo {
|
|
25
25
|
address: string;
|
|
@@ -628,7 +628,7 @@ declare module "net" {
|
|
|
628
628
|
* Indicates whether or not the server is listening for connections.
|
|
629
629
|
* @since v5.7.0
|
|
630
630
|
*/
|
|
631
|
-
listening: boolean;
|
|
631
|
+
readonly listening: boolean;
|
|
632
632
|
/**
|
|
633
633
|
* events.EventEmitter
|
|
634
634
|
* 1. close
|
|
@@ -220,7 +220,7 @@ declare module "tls" {
|
|
|
220
220
|
/**
|
|
221
221
|
* Construct a new tls.TLSSocket object from an existing TCP socket.
|
|
222
222
|
*/
|
|
223
|
-
constructor(socket: net.Socket, options?: TLSSocketOptions);
|
|
223
|
+
constructor(socket: net.Socket | stream.Duplex, options?: TLSSocketOptions);
|
|
224
224
|
/**
|
|
225
225
|
* This property is `true` if the peer certificate was signed by one of the CAs
|
|
226
226
|
* specified when creating the `tls.TLSSocket` instance, otherwise `false`.
|
|
@@ -1602,7 +1602,7 @@ declare module "util" {
|
|
|
1602
1602
|
* Each item of the iterator is a JavaScript `Array`. The first item of the array
|
|
1603
1603
|
* is the `name`, the second item of the array is the `value`.
|
|
1604
1604
|
*/
|
|
1605
|
-
entries(): IterableIterator<[string, string]>;
|
|
1605
|
+
entries(): IterableIterator<[name: string, value: string]>;
|
|
1606
1606
|
/**
|
|
1607
1607
|
* Returns the value of the first name-value pair whose name is `name`. If there
|
|
1608
1608
|
* are no such pairs, `null` is returned.
|
|
@@ -8,7 +8,7 @@ This package contains type definitions for node (https://nodejs.org/).
|
|
|
8
8
|
Files were exported from https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node.
|
|
9
9
|
|
|
10
10
|
### Additional Details
|
|
11
|
-
* Last updated:
|
|
11
|
+
* Last updated: Thu, 01 Feb 2024 17:35:23 GMT
|
|
12
12
|
* Dependencies: [undici-types](https://npmjs.com/package/undici-types)
|
|
13
13
|
|
|
14
14
|
# Credits
|
|
@@ -1920,7 +1920,7 @@ declare module "crypto" {
|
|
|
1920
1920
|
* Return a random integer `n` such that `min <= n < max`. This
|
|
1921
1921
|
* implementation avoids [modulo bias](https://en.wikipedia.org/wiki/Fisher%E2%80%93Yates_shuffle#Modulo_bias).
|
|
1922
1922
|
*
|
|
1923
|
-
* The range (`max - min`) must be less than
|
|
1923
|
+
* The range (`max - min`) must be less than 2**48. `min` and `max` must
|
|
1924
1924
|
* be [safe integers](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Number/isSafeInteger).
|
|
1925
1925
|
*
|
|
1926
1926
|
* If the `callback` function is not provided, the random integer is
|
|
@@ -18,8 +18,8 @@ declare module "net" {
|
|
|
18
18
|
import * as dns from "node:dns";
|
|
19
19
|
type LookupFunction = (
|
|
20
20
|
hostname: string,
|
|
21
|
-
options: dns.
|
|
22
|
-
callback: (err: NodeJS.ErrnoException | null,
|
|
21
|
+
options: dns.LookupOptions,
|
|
22
|
+
callback: (err: NodeJS.ErrnoException | null, address: string | dns.LookupAddress[], family?: number) => void,
|
|
23
23
|
) => void;
|
|
24
24
|
interface AddressInfo {
|
|
25
25
|
address: string;
|
|
@@ -628,7 +628,7 @@ declare module "net" {
|
|
|
628
628
|
* Indicates whether or not the server is listening for connections.
|
|
629
629
|
* @since v5.7.0
|
|
630
630
|
*/
|
|
631
|
-
listening: boolean;
|
|
631
|
+
readonly listening: boolean;
|
|
632
632
|
/**
|
|
633
633
|
* events.EventEmitter
|
|
634
634
|
* 1. close
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@types/node",
|
|
3
|
-
"version": "20.11.
|
|
3
|
+
"version": "20.11.16",
|
|
4
4
|
"description": "TypeScript definitions for node",
|
|
5
5
|
"homepage": "https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node",
|
|
6
6
|
"license": "MIT",
|
|
@@ -224,7 +224,6 @@
|
|
|
224
224
|
"dependencies": {
|
|
225
225
|
"undici-types": "~5.26.4"
|
|
226
226
|
},
|
|
227
|
-
"typesPublisherContentHash": "
|
|
228
|
-
"typeScriptVersion": "4.6"
|
|
229
|
-
"nonNpm": true
|
|
227
|
+
"typesPublisherContentHash": "c74616c0dddd05b588f3fe3d0da870cc1928ca91bb661c07bccd1d41c3058b05",
|
|
228
|
+
"typeScriptVersion": "4.6"
|
|
230
229
|
}
|
|
@@ -220,7 +220,7 @@ declare module "tls" {
|
|
|
220
220
|
/**
|
|
221
221
|
* Construct a new tls.TLSSocket object from an existing TCP socket.
|
|
222
222
|
*/
|
|
223
|
-
constructor(socket: net.Socket, options?: TLSSocketOptions);
|
|
223
|
+
constructor(socket: net.Socket | stream.Duplex, options?: TLSSocketOptions);
|
|
224
224
|
/**
|
|
225
225
|
* This property is `true` if the peer certificate was signed by one of the CAs
|
|
226
226
|
* specified when creating the `tls.TLSSocket` instance, otherwise `false`.
|
|
@@ -1920,7 +1920,7 @@ declare module "crypto" {
|
|
|
1920
1920
|
* Return a random integer `n` such that `min <= n < max`. This
|
|
1921
1921
|
* implementation avoids [modulo bias](https://en.wikipedia.org/wiki/Fisher%E2%80%93Yates_shuffle#Modulo_bias).
|
|
1922
1922
|
*
|
|
1923
|
-
* The range (`max - min`) must be less than
|
|
1923
|
+
* The range (`max - min`) must be less than 2**48. `min` and `max` must
|
|
1924
1924
|
* be [safe integers](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Number/isSafeInteger).
|
|
1925
1925
|
*
|
|
1926
1926
|
* If the `callback` function is not provided, the random integer is
|
|
@@ -3530,12 +3530,13 @@ declare module "crypto" {
|
|
|
3530
3530
|
*/
|
|
3531
3531
|
disableEntropyCache?: boolean | undefined;
|
|
3532
3532
|
}
|
|
3533
|
+
type UUID = `${string}-${string}-${string}-${string}-${string}`;
|
|
3533
3534
|
/**
|
|
3534
3535
|
* Generates a random [RFC 4122](https://www.rfc-editor.org/rfc/rfc4122.txt) version 4 UUID. The UUID is generated using a
|
|
3535
3536
|
* cryptographic pseudorandom number generator.
|
|
3536
3537
|
* @since v15.6.0, v14.17.0
|
|
3537
3538
|
*/
|
|
3538
|
-
function randomUUID(options?: RandomUUIDOptions):
|
|
3539
|
+
function randomUUID(options?: RandomUUIDOptions): UUID;
|
|
3539
3540
|
interface X509CheckOptions {
|
|
3540
3541
|
/**
|
|
3541
3542
|
* @default 'always'
|
|
@@ -4094,7 +4095,7 @@ declare module "crypto" {
|
|
|
4094
4095
|
* The UUID is generated using a cryptographic pseudorandom number generator.
|
|
4095
4096
|
* @since v16.7.0
|
|
4096
4097
|
*/
|
|
4097
|
-
randomUUID():
|
|
4098
|
+
randomUUID(): UUID;
|
|
4098
4099
|
CryptoKey: CryptoKeyConstructor;
|
|
4099
4100
|
}
|
|
4100
4101
|
// This constructor throws ILLEGAL_CONSTRUCTOR so it should not be newable.
|
|
@@ -4474,7 +4475,11 @@ declare module "crypto" {
|
|
|
4474
4475
|
}
|
|
4475
4476
|
|
|
4476
4477
|
global {
|
|
4477
|
-
var crypto:
|
|
4478
|
+
var crypto: typeof globalThis extends {
|
|
4479
|
+
crypto: infer T;
|
|
4480
|
+
onmessage: any;
|
|
4481
|
+
} ? T
|
|
4482
|
+
: webcrypto.Crypto;
|
|
4478
4483
|
}
|
|
4479
4484
|
}
|
|
4480
4485
|
declare module "node:crypto" {
|
|
@@ -18,8 +18,8 @@ declare module "net" {
|
|
|
18
18
|
import * as dns from "node:dns";
|
|
19
19
|
type LookupFunction = (
|
|
20
20
|
hostname: string,
|
|
21
|
-
options: dns.
|
|
22
|
-
callback: (err: NodeJS.ErrnoException | null,
|
|
21
|
+
options: dns.LookupOptions,
|
|
22
|
+
callback: (err: NodeJS.ErrnoException | null, address: string | dns.LookupAddress[], family?: number) => void,
|
|
23
23
|
) => void;
|
|
24
24
|
interface AddressInfo {
|
|
25
25
|
address: string;
|
|
@@ -628,7 +628,7 @@ declare module "net" {
|
|
|
628
628
|
* Indicates whether or not the server is listening for connections.
|
|
629
629
|
* @since v5.7.0
|
|
630
630
|
*/
|
|
631
|
-
listening: boolean;
|
|
631
|
+
readonly listening: boolean;
|
|
632
632
|
/**
|
|
633
633
|
* events.EventEmitter
|
|
634
634
|
* 1. close
|
|
@@ -220,7 +220,7 @@ declare module "tls" {
|
|
|
220
220
|
/**
|
|
221
221
|
* Construct a new tls.TLSSocket object from an existing TCP socket.
|
|
222
222
|
*/
|
|
223
|
-
constructor(socket: net.Socket, options?: TLSSocketOptions);
|
|
223
|
+
constructor(socket: net.Socket | stream.Duplex, options?: TLSSocketOptions);
|
|
224
224
|
/**
|
|
225
225
|
* This property is `true` if the peer certificate was signed by one of the CAs
|
|
226
226
|
* specified when creating the `tls.TLSSocket` instance, otherwise `false`.
|
|
@@ -1602,7 +1602,7 @@ declare module "util" {
|
|
|
1602
1602
|
* Each item of the iterator is a JavaScript `Array`. The first item of the array
|
|
1603
1603
|
* is the `name`, the second item of the array is the `value`.
|
|
1604
1604
|
*/
|
|
1605
|
-
entries(): IterableIterator<[string, string]>;
|
|
1605
|
+
entries(): IterableIterator<[name: string, value: string]>;
|
|
1606
1606
|
/**
|
|
1607
1607
|
* Returns the value of the first name-value pair whose name is `name`. If there
|
|
1608
1608
|
* are no such pairs, `null` is returned.
|
package/package.json
CHANGED
|
@@ -60,8 +60,8 @@
|
|
|
60
60
|
"jsii-diff": "^1.94.0",
|
|
61
61
|
"jsii-docgen": "^1.8.110",
|
|
62
62
|
"jsii-pacmak": "^1.94.0",
|
|
63
|
-
"jsii-rosetta": "^5.3.
|
|
64
|
-
"projen": "^0.79.
|
|
63
|
+
"jsii-rosetta": "^5.3.9",
|
|
64
|
+
"projen": "^0.79.7",
|
|
65
65
|
"standard-version": "^9",
|
|
66
66
|
"ts-jest": "^27",
|
|
67
67
|
"ts-node": "^10.9.2",
|
|
@@ -90,7 +90,7 @@
|
|
|
90
90
|
],
|
|
91
91
|
"main": "lib/index.js",
|
|
92
92
|
"license": "Apache-2.0",
|
|
93
|
-
"version": "3.0.
|
|
93
|
+
"version": "3.0.22",
|
|
94
94
|
"jest": {
|
|
95
95
|
"testMatch": [
|
|
96
96
|
"<rootDir>/src/**/__tests__/**/*.ts?(x)",
|