cdk-ecr-deployment 3.0.42 → 3.0.44
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +15 -2
- package/.jsii.tabl.json +1 -1
- package/lib/index.js +3 -3
- package/node_modules/@types/cacheable-request/node_modules/@types/node/README.md +1 -1
- package/node_modules/@types/cacheable-request/node_modules/@types/node/http2.d.ts +6 -0
- package/node_modules/@types/cacheable-request/node_modules/@types/node/index.d.ts +1 -0
- package/node_modules/@types/cacheable-request/node_modules/@types/node/inspector.d.ts +1 -2
- package/node_modules/@types/cacheable-request/node_modules/@types/node/package.json +2 -2
- package/node_modules/@types/cacheable-request/node_modules/@types/node/sea.d.ts +153 -0
- package/node_modules/@types/keyv/node_modules/@types/node/README.md +1 -1
- package/node_modules/@types/keyv/node_modules/@types/node/http2.d.ts +6 -0
- package/node_modules/@types/keyv/node_modules/@types/node/index.d.ts +1 -0
- package/node_modules/@types/keyv/node_modules/@types/node/inspector.d.ts +1 -2
- package/node_modules/@types/keyv/node_modules/@types/node/package.json +2 -2
- package/node_modules/@types/keyv/node_modules/@types/node/sea.d.ts +153 -0
- package/node_modules/@types/responselike/node_modules/@types/node/README.md +1 -1
- package/node_modules/@types/responselike/node_modules/@types/node/http2.d.ts +6 -0
- package/node_modules/@types/responselike/node_modules/@types/node/index.d.ts +1 -0
- package/node_modules/@types/responselike/node_modules/@types/node/inspector.d.ts +1 -2
- package/node_modules/@types/responselike/node_modules/@types/node/package.json +2 -2
- package/node_modules/@types/responselike/node_modules/@types/node/sea.d.ts +153 -0
- package/package.json +3 -3
package/.jsii
CHANGED
|
@@ -3037,6 +3037,19 @@
|
|
|
3037
3037
|
}
|
|
3038
3038
|
}
|
|
3039
3039
|
},
|
|
3040
|
+
"aws-cdk-lib.aws_securitylake": {
|
|
3041
|
+
"targets": {
|
|
3042
|
+
"dotnet": {
|
|
3043
|
+
"package": "Amazon.CDK.AWS.SecurityLake"
|
|
3044
|
+
},
|
|
3045
|
+
"java": {
|
|
3046
|
+
"package": "software.amazon.awscdk.services.securitylake"
|
|
3047
|
+
},
|
|
3048
|
+
"python": {
|
|
3049
|
+
"module": "aws_cdk.aws_securitylake"
|
|
3050
|
+
}
|
|
3051
|
+
}
|
|
3052
|
+
},
|
|
3040
3053
|
"aws-cdk-lib.aws_servicecatalog": {
|
|
3041
3054
|
"targets": {
|
|
3042
3055
|
"dotnet": {
|
|
@@ -4177,6 +4190,6 @@
|
|
|
4177
4190
|
"symbolId": "src/index:S3ArchiveName"
|
|
4178
4191
|
}
|
|
4179
4192
|
},
|
|
4180
|
-
"version": "3.0.
|
|
4181
|
-
"fingerprint": "
|
|
4193
|
+
"version": "3.0.44",
|
|
4194
|
+
"fingerprint": "SJV251Zt6mVSahX1g+M05XjzVTpE8Iktytno3SMdt0U="
|
|
4182
4195
|
}
|
package/.jsii.tabl.json
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":"2","toolVersion":"5.3.31","snippets":{"33850328020507963bc7787401a169bb06e49f6132425a6d1529815c1554c645":{"translations":{"python":{"source":"from aws_cdk.aws_ecr_assets import DockerImageAsset\n\n\nimage = DockerImageAsset(self, \"CDKDockerImage\",\n directory=path.join(__dirname, \"docker\")\n)\n\n# Copy from cdk docker image asset to another ECR.\necrdeploy.ECRDeployment(self, \"DeployDockerImage1\",\n src=ecrdeploy.DockerImageName(image.image_uri),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\")\n)\n\n# Copy from docker registry to ECR.\necrdeploy.ECRDeployment(self, \"DeployDockerImage2\",\n src=ecrdeploy.DockerImageName(\"nginx:latest\"),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\")\n)\n\n# Copy from private docker registry to ECR.\n# The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\necrdeploy.ECRDeployment(self, \"DeployDockerImage3\",\n src=ecrdeploy.DockerImageName(\"javacs3/nginx:latest\", \"username:password\"),\n # src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n # src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\")\n).add_to_principal_policy(iam.PolicyStatement(\n effect=iam.Effect.ALLOW,\n actions=[\"secretsmanager:GetSecretValue\"\n ],\n resources=[\"*\"]\n))","version":"2"},"csharp":{"source":"using Amazon.CDK.AWS.Ecr.Assets;\n\n\nvar image = new DockerImageAsset(this, \"CDKDockerImage\", new DockerImageAssetProps {\n Directory = Join(__dirname, \"docker\")\n});\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\nnew ECRDeployment(this, \"DeployDockerImage1\", new ECRDeploymentProps {\n Src = new DockerImageName(image.ImageUri),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\")\n});\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\nnew ECRDeployment(this, \"DeployDockerImage2\", new ECRDeploymentProps {\n Src = new DockerImageName(\"nginx:latest\"),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\")\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ECRDeployment(this, \"DeployDockerImage3\", new ECRDeploymentProps {\n Src = new DockerImageName(\"javacs3/nginx:latest\", \"username:password\"),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\")\n}).AddToPrincipalPolicy(new PolicyStatement(new PolicyStatementProps {\n Effect = Effect.ALLOW,\n Actions = new [] { \"secretsmanager:GetSecretValue\" },\n Resources = new [] { \"*\" }\n}));","version":"1"},"java":{"source":"import software.amazon.awscdk.services.ecr.assets.DockerImageAsset;\n\n\nDockerImageAsset image = DockerImageAsset.Builder.create(this, \"CDKDockerImage\")\n .directory(join(__dirname, \"docker\"))\n .build();\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\nECRDeployment.Builder.create(this, \"DeployDockerImage1\")\n .src(new DockerImageName(image.getImageUri()))\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\", Aws.ACCOUNT_ID)))\n .build();\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\nECRDeployment.Builder.create(this, \"DeployDockerImage2\")\n .src(new DockerImageName(\"nginx:latest\"))\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\", Aws.ACCOUNT_ID)))\n .build();\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nECRDeployment.Builder.create(this, \"DeployDockerImage3\")\n .src(new DockerImageName(\"javacs3/nginx:latest\", \"username:password\"))\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\", Aws.ACCOUNT_ID)))\n .build().addToPrincipalPolicy(PolicyStatement.Builder.create()\n .effect(Effect.ALLOW)\n .actions(List.of(\"secretsmanager:GetSecretValue\"))\n .resources(List.of(\"*\"))\n .build());","version":"1"},"go":{"source":"import \"github.com/aws/aws-cdk-go/awscdk\"\n\n\nimage := awscdk.NewDockerImageAsset(this, jsii.String(\"CDKDockerImage\"), &DockerImageAssetProps{\n\tDirectory: path.join(__dirname, jsii.String(\"docker\")),\n})\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage1\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(image.ImageUri),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\", cdk.Aws_ACCOUNT_ID())),\n})\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage2\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(jsii.String(\"nginx:latest\")),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\", cdk.Aws_ACCOUNT_ID())),\n})\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage3\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(jsii.String(\"javacs3/nginx:latest\"), jsii.String(\"username:password\")),\n\t// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n\t// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\", cdk.Aws_ACCOUNT_ID())),\n}).AddToPrincipalPolicy(awscdk.Aws_iam.NewPolicyStatement(&PolicyStatementProps{\n\tEffect: awscdk.*Aws_iam.Effect_ALLOW,\n\tActions: []*string{\n\t\tjsii.String(\"secretsmanager:GetSecretValue\"),\n\t},\n\tResources: []*string{\n\t\tjsii.String(\"*\"),\n\t},\n}))","version":"1"},"$":{"source":"import { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));","version":"0"}},"location":{"api":{"api":"moduleReadme","moduleFqn":"cdk-ecr-deployment"},"field":{"field":"markdown","line":33}},"didCompile":true,"fqnsReferenced":["aws-cdk-lib.aws_ecr_assets.DockerImageAsset","aws-cdk-lib.aws_ecr_assets.DockerImageAsset#imageUri","aws-cdk-lib.aws_ecr_assets.DockerImageAssetProps","aws-cdk-lib.aws_iam.Effect","aws-cdk-lib.aws_iam.Effect#ALLOW","aws-cdk-lib.aws_iam.PolicyStatement","aws-cdk-lib.aws_iam.PolicyStatementProps","cdk-ecr-deployment.DockerImageName","cdk-ecr-deployment.ECRDeployment","cdk-ecr-deployment.ECRDeployment#addToPrincipalPolicy","cdk-ecr-deployment.ECRDeploymentProps","cdk-ecr-deployment.IImageName","constructs.Construct"],"fullSource":"// Hoisted imports begin after !show marker below\n/// !show\nimport { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n/// !hide\n// Hoisted imports ended before !hide marker above\n// Fixture with packages imported, but nothing else\nimport * as path from 'node:path';\nimport { Construct } from 'constructs';\n import * as ecrdeploy from 'cdk-ecr-deployment';\nimport {\n Stack,\n aws_iam as iam,\n} from 'aws-cdk-lib';\nimport * as cdk from 'aws-cdk-lib';\n\nclass Fixture extends Stack {\n constructor(scope: Construct, id: string) {\n super(scope, id);\n\n // Code snippet begins after !show marker below\n/// !show\n\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));\n/// !hide\n// Code snippet ended before !hide marker above\n }\n}","syntaxKindCounter":{"11":11,"16":3,"18":3,"80":51,"110":4,"209":2,"210":5,"211":21,"213":2,"214":11,"228":3,"239":3,"243":1,"244":3,"260":1,"261":1,"272":1,"273":1,"275":1,"276":1,"303":10,"312":1},"fqnsFingerprint":"9d435b1b2c76010f8a75490e073b59c4d776eb93ca570ed78a292aecd169403d"}}}
|
|
1
|
+
{"version":"2","toolVersion":"5.3.34","snippets":{"33850328020507963bc7787401a169bb06e49f6132425a6d1529815c1554c645":{"translations":{"python":{"source":"from aws_cdk.aws_ecr_assets import DockerImageAsset\n\n\nimage = DockerImageAsset(self, \"CDKDockerImage\",\n directory=path.join(__dirname, \"docker\")\n)\n\n# Copy from cdk docker image asset to another ECR.\necrdeploy.ECRDeployment(self, \"DeployDockerImage1\",\n src=ecrdeploy.DockerImageName(image.image_uri),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\")\n)\n\n# Copy from docker registry to ECR.\necrdeploy.ECRDeployment(self, \"DeployDockerImage2\",\n src=ecrdeploy.DockerImageName(\"nginx:latest\"),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\")\n)\n\n# Copy from private docker registry to ECR.\n# The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\necrdeploy.ECRDeployment(self, \"DeployDockerImage3\",\n src=ecrdeploy.DockerImageName(\"javacs3/nginx:latest\", \"username:password\"),\n # src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n # src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\")\n).add_to_principal_policy(iam.PolicyStatement(\n effect=iam.Effect.ALLOW,\n actions=[\"secretsmanager:GetSecretValue\"\n ],\n resources=[\"*\"]\n))","version":"2"},"csharp":{"source":"using Amazon.CDK.AWS.Ecr.Assets;\n\n\nvar image = new DockerImageAsset(this, \"CDKDockerImage\", new DockerImageAssetProps {\n Directory = Join(__dirname, \"docker\")\n});\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\nnew ECRDeployment(this, \"DeployDockerImage1\", new ECRDeploymentProps {\n Src = new DockerImageName(image.ImageUri),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\")\n});\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\nnew ECRDeployment(this, \"DeployDockerImage2\", new ECRDeploymentProps {\n Src = new DockerImageName(\"nginx:latest\"),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\")\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ECRDeployment(this, \"DeployDockerImage3\", new ECRDeploymentProps {\n Src = new DockerImageName(\"javacs3/nginx:latest\", \"username:password\"),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\")\n}).AddToPrincipalPolicy(new PolicyStatement(new PolicyStatementProps {\n Effect = Effect.ALLOW,\n Actions = new [] { \"secretsmanager:GetSecretValue\" },\n Resources = new [] { \"*\" }\n}));","version":"1"},"java":{"source":"import software.amazon.awscdk.services.ecr.assets.DockerImageAsset;\n\n\nDockerImageAsset image = DockerImageAsset.Builder.create(this, \"CDKDockerImage\")\n .directory(join(__dirname, \"docker\"))\n .build();\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\nECRDeployment.Builder.create(this, \"DeployDockerImage1\")\n .src(new DockerImageName(image.getImageUri()))\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\", Aws.ACCOUNT_ID)))\n .build();\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\nECRDeployment.Builder.create(this, \"DeployDockerImage2\")\n .src(new DockerImageName(\"nginx:latest\"))\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\", Aws.ACCOUNT_ID)))\n .build();\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nECRDeployment.Builder.create(this, \"DeployDockerImage3\")\n .src(new DockerImageName(\"javacs3/nginx:latest\", \"username:password\"))\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\", Aws.ACCOUNT_ID)))\n .build().addToPrincipalPolicy(PolicyStatement.Builder.create()\n .effect(Effect.ALLOW)\n .actions(List.of(\"secretsmanager:GetSecretValue\"))\n .resources(List.of(\"*\"))\n .build());","version":"1"},"go":{"source":"import \"github.com/aws/aws-cdk-go/awscdk\"\n\n\nimage := awscdk.NewDockerImageAsset(this, jsii.String(\"CDKDockerImage\"), &DockerImageAssetProps{\n\tDirectory: path.join(__dirname, jsii.String(\"docker\")),\n})\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage1\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(image.ImageUri),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\", cdk.Aws_ACCOUNT_ID())),\n})\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage2\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(jsii.String(\"nginx:latest\")),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\", cdk.Aws_ACCOUNT_ID())),\n})\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage3\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(jsii.String(\"javacs3/nginx:latest\"), jsii.String(\"username:password\")),\n\t// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n\t// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\", cdk.Aws_ACCOUNT_ID())),\n}).AddToPrincipalPolicy(awscdk.Aws_iam.NewPolicyStatement(&PolicyStatementProps{\n\tEffect: awscdk.*Aws_iam.Effect_ALLOW,\n\tActions: []*string{\n\t\tjsii.String(\"secretsmanager:GetSecretValue\"),\n\t},\n\tResources: []*string{\n\t\tjsii.String(\"*\"),\n\t},\n}))","version":"1"},"$":{"source":"import { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));","version":"0"}},"location":{"api":{"api":"moduleReadme","moduleFqn":"cdk-ecr-deployment"},"field":{"field":"markdown","line":33}},"didCompile":true,"fqnsReferenced":["aws-cdk-lib.aws_ecr_assets.DockerImageAsset","aws-cdk-lib.aws_ecr_assets.DockerImageAsset#imageUri","aws-cdk-lib.aws_ecr_assets.DockerImageAssetProps","aws-cdk-lib.aws_iam.Effect","aws-cdk-lib.aws_iam.Effect#ALLOW","aws-cdk-lib.aws_iam.PolicyStatement","aws-cdk-lib.aws_iam.PolicyStatementProps","cdk-ecr-deployment.DockerImageName","cdk-ecr-deployment.ECRDeployment","cdk-ecr-deployment.ECRDeployment#addToPrincipalPolicy","cdk-ecr-deployment.ECRDeploymentProps","cdk-ecr-deployment.IImageName","constructs.Construct"],"fullSource":"// Hoisted imports begin after !show marker below\n/// !show\nimport { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n/// !hide\n// Hoisted imports ended before !hide marker above\n// Fixture with packages imported, but nothing else\nimport * as path from 'node:path';\nimport { Construct } from 'constructs';\n import * as ecrdeploy from 'cdk-ecr-deployment';\nimport {\n Stack,\n aws_iam as iam,\n} from 'aws-cdk-lib';\nimport * as cdk from 'aws-cdk-lib';\n\nclass Fixture extends Stack {\n constructor(scope: Construct, id: string) {\n super(scope, id);\n\n // Code snippet begins after !show marker below\n/// !show\n\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));\n/// !hide\n// Code snippet ended before !hide marker above\n }\n}","syntaxKindCounter":{"11":11,"16":3,"18":3,"80":51,"110":4,"209":2,"210":5,"211":21,"213":2,"214":11,"228":3,"239":3,"243":1,"244":3,"260":1,"261":1,"272":1,"273":1,"275":1,"276":1,"303":10,"312":1},"fqnsFingerprint":"9d435b1b2c76010f8a75490e073b59c4d776eb93ca570ed78a292aecd169403d"}}}
|
package/lib/index.js
CHANGED
|
@@ -37,7 +37,7 @@ class DockerImageName {
|
|
|
37
37
|
}
|
|
38
38
|
exports.DockerImageName = DockerImageName;
|
|
39
39
|
_a = JSII_RTTI_SYMBOL_1;
|
|
40
|
-
DockerImageName[_a] = { fqn: "cdk-ecr-deployment.DockerImageName", version: "3.0.
|
|
40
|
+
DockerImageName[_a] = { fqn: "cdk-ecr-deployment.DockerImageName", version: "3.0.44" };
|
|
41
41
|
class S3ArchiveName {
|
|
42
42
|
constructor(p, ref, creds) {
|
|
43
43
|
this.creds = creds;
|
|
@@ -50,7 +50,7 @@ class S3ArchiveName {
|
|
|
50
50
|
}
|
|
51
51
|
exports.S3ArchiveName = S3ArchiveName;
|
|
52
52
|
_b = JSII_RTTI_SYMBOL_1;
|
|
53
|
-
S3ArchiveName[_b] = { fqn: "cdk-ecr-deployment.S3ArchiveName", version: "3.0.
|
|
53
|
+
S3ArchiveName[_b] = { fqn: "cdk-ecr-deployment.S3ArchiveName", version: "3.0.44" };
|
|
54
54
|
class ECRDeployment extends constructs_1.Construct {
|
|
55
55
|
constructor(scope, id, props) {
|
|
56
56
|
super(scope, id);
|
|
@@ -134,5 +134,5 @@ class ECRDeployment extends constructs_1.Construct {
|
|
|
134
134
|
}
|
|
135
135
|
exports.ECRDeployment = ECRDeployment;
|
|
136
136
|
_c = JSII_RTTI_SYMBOL_1;
|
|
137
|
-
ECRDeployment[_c] = { fqn: "cdk-ecr-deployment.ECRDeployment", version: "3.0.
|
|
137
|
+
ECRDeployment[_c] = { fqn: "cdk-ecr-deployment.ECRDeployment", version: "3.0.44" };
|
|
138
138
|
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;AAAA,qEAAqE;AACrE,sCAAsC;AAGtC,+CAA+C;AAC/C,6BAA6B;AAC7B,6CAAoH;AAEpH,2CAAuC;AACvC,qCAAmD;AAwFnD,SAAS,OAAO,CAAC,UAAkB;IACjC,IAAI,IAAA,gCAAuB,GAAE,EAAE;QAC7B,IAAI;YACF,MAAM,aAAa,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,sBAAsB,CAAC,CAAC;YACnE,MAAM,YAAY,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,eAAe,CAAC,CAAC;YAC3D,aAAa,CAAC,YAAY,CAAC,OAAO,CAAC,KAAK,EAAE,CAAC,aAAa,EAAE,YAAY,CAAC,CAAC,CAAC;YAEzE,OAAO,wBAAM,CAAC,IAAI,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC;SAC5C;QAAC,OAAO,GAAG,EAAE;YACZ,OAAO,CAAC,IAAI,CAAC,gCAAgC,GAAG,EAAE,CAAC,CAAC;SACrD;KACF;IAED,OAAO,wBAAM,CAAC,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,WAAW,CAAC,EAAE;QACpE,SAAS,EAAE;YACT,UAAU;SACX;KACF,CAAC,CAAC;AACL,CAAC;AAED,MAAa,eAAe;IAC1B,YAA2B,IAAY,EAAS,KAAc;QAAnC,SAAI,GAAJ,IAAI,CAAQ;QAAS,UAAK,GAAL,KAAK,CAAS;IAAI,CAAC;IACnE,IAAW,GAAG,KAAa,OAAO,YAAY,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;;AAF9D,0CAGC;;;AAED,MAAa,aAAa;IAExB,YAAmB,CAAS,EAAE,GAAY,EAAS,KAAc;QAAd,UAAK,GAAL,KAAK,CAAS;QAC/D,IAAI,CAAC,IAAI,GAAG,CAAC,CAAC;QACd,IAAI,GAAG,EAAE;YACP,IAAI,CAAC,IAAI,IAAI,GAAG,GAAG,GAAG,CAAC;SACxB;IACH,CAAC;IACD,IAAW,GAAG,KAAa,OAAO,QAAQ,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;;AAR1D,sCASC;;;AAED,MAAa,aAAc,SAAQ,sBAAS;IAG1C,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAyB;QACjE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,MAAM,WAAW,GAAG,KAAK,CAAC,WAAW,IAAI,GAAG,CAAC;QAC7C,IAAI,CAAC,OAAO,GAAG,IAAI,wBAAM,CAAC,iBAAiB,CAAC,IAAI,EAAE,uBAAuB,EAAE;YACzE,IAAI,EAAE,IAAI,CAAC,mBAAmB,CAAC,WAAW,CAAC;YAC3C,IAAI,EAAE,OAAO,CAAC,KAAK,CAAC,UAAU,IAAI,UAAU,CAAC;YAC7C,OAAO,EAAE,wBAAM,CAAC,OAAO,CAAC,eAAe;YACvC,OAAO,EAAE,WAAW;YACpB,WAAW,EAAE,KAAK,CAAC,WAAW;YAC9B,aAAa,EAAE,0BAA0B;YACzC,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YAC7B,IAAI,EAAE,KAAK,CAAC,IAAI;YAChB,UAAU,EAAE,WAAW;YACvB,GAAG,EAAE,KAAK,CAAC,GAAG;YACd,UAAU,EAAE,KAAK,CAAC,UAAU;YAC5B,cAAc,EAAE,KAAK,CAAC,cAAc;SACrC,CAAC,CAAC;QAEH,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,WAAW,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;SAAE;QAE7F,WAAW,CAAC,oBAAoB,CAC9B,IAAI,qBAAG,CAAC,eAAe,CAAC;YACtB,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,2BAA2B;gBAC3B,iCAAiC;gBACjC,4BAA4B;gBAC5B,yBAAyB;gBACzB,0BAA0B;gBAC1B,gBAAgB;gBAChB,oBAAoB;gBACpB,mBAAmB;gBACnB,yBAAyB;gBACzB,+BAA+B;gBAC/B,yBAAyB;gBACzB,qBAAqB;gBACrB,yBAAyB;gBACzB,cAAc;aACf;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QACN,WAAW,CAAC,oBAAoB,CAAC,IAAI,qBAAG,CAAC,eAAe,CAAC;YACvD,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,cAAc;aACf;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QAEJ,IAAI,4BAAc,CAAC,IAAI,EAAE,gBAAgB,EAAE;YACzC,YAAY,EAAE,IAAI,CAAC,OAAO,CAAC,WAAW;YACtC,YAAY,EAAE,6BAA6B;YAC3C,UAAU,EAAE;gBACV,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,GAAG;gBACvB,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,KAAK;gBACzB,SAAS,EAAE,KAAK,CAAC,IAAI,CAAC,GAAG;gBACzB,SAAS,EAAE,KAAK,CAAC,IAAI,CAAC,KAAK;aAC5B;SACF,CAAC,CAAC;IACL,CAAC;IAEM,oBAAoB,CAAC,SAA0B;QACpD,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,WAAW,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;SAAE;QAE7F,OAAO,WAAW,CAAC,oBAAoB,CAAC,SAAS,CAAC,CAAC;IACrD,CAAC;IAEO,mBAAmB,CAAC,WAAoB;QAC9C,IAAI,IAAI,GAAG,sCAAsC,CAAC;QAElD,0EAA0E;QAC1E,2EAA2E;QAC3E,4CAA4C;QAC5C,IAAI,WAAW,EAAE;YACf,IAAI,mBAAK,CAAC,YAAY,CAAC,WAAW,CAAC,EAAE;gBACnC,MAAM,IAAI,KAAK,CAAC,mHAAmH,CAAC,CAAC;aACtI;YAED,IAAI,IAAI,IAAI,WAAW,CAAC,QAAQ,EAAE,KAAK,CAAC;SACzC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;;AAvFH,sCAwFC","sourcesContent":["// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n// SPDX-License-Identifier: Apache-2.0\n\n\nimport * as child_process from 'child_process';\nimport * as path from 'path';\nimport { aws_ec2 as ec2, aws_iam as iam, aws_lambda as lambda, Duration, CustomResource, Token } from 'aws-cdk-lib';\nimport { PolicyStatement, AddToPrincipalPolicyResult } from 'aws-cdk-lib/aws-iam';\nimport { Construct } from 'constructs';\nimport { shouldUsePrebuiltLambda } from './config';\n\nexport interface ECRDeploymentProps {\n\n  /**\n   * Image to use to build Golang lambda for custom resource, if download fails or is not wanted.\n   *\n   * Might be needed for local build if all images need to come from own registry.\n   *\n   * Note that image should use yum as a package manager and have golang available.\n   *\n   * @default public.ecr.aws/sam/build-go1.x:latest\n   */\n  readonly buildImage?: string;\n  /**\n   * The source of the docker image.\n   */\n  readonly src: IImageName;\n\n  /**\n   * The destination of the docker image.\n   */\n  readonly dest: IImageName;\n\n  /**\n   * The amount of memory (in MiB) to allocate to the AWS Lambda function which\n   * replicates the files from the CDK bucket to the destination bucket.\n   *\n   * If you are deploying large files, you will need to increase this number\n   * accordingly.\n   *\n   * @default 512\n   */\n  readonly memoryLimit?: number;\n\n  /**\n   * Execution role associated with this function\n   *\n   * @default - A role is automatically created\n   */\n  readonly role?: iam.IRole;\n\n  /**\n   * The VPC network to place the deployment lambda handler in.\n   *\n   * @default None\n   */\n  readonly vpc?: ec2.IVpc;\n\n  /**\n   * Where in the VPC to place the deployment lambda handler.\n   * Only used if 'vpc' is supplied.\n   *\n   * @default - the Vpc default strategy if not specified\n   */\n  readonly vpcSubnets?: ec2.SubnetSelection;\n\n  /**\n   * The list of security groups to associate with the Lambda's network interfaces.\n   *\n   * Only used if 'vpc' is supplied.\n   *\n   * @default - If the function is placed within a VPC and a security group is\n   * not specified, either by this or securityGroup prop, a dedicated security\n   * group will be created for this function.\n   */\n  readonly securityGroups?: ec2.SecurityGroup[];\n\n  /**\n   * The environment variable to set\n   */\n  readonly environment?: { [key: string]: string };\n}\n\nexport interface IImageName {\n  /**\n   *  The uri of the docker image.\n   *\n   *  The uri spec follows https://github.com/containers/skopeo\n   */\n  readonly uri: string;\n\n  /**\n   * The credentials of the docker image. Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`\n   */\n  creds?: string;\n}\n\nfunction getCode(buildImage: string): lambda.AssetCode {\n  if (shouldUsePrebuiltLambda()) {\n    try {\n      const installScript = path.join(__dirname, '../lambda/install.js');\n      const prebuiltPath = path.join(__dirname, '../lambda/out');\n      child_process.execFileSync(process.argv0, [installScript, prebuiltPath]);\n\n      return lambda.Code.fromAsset(prebuiltPath);\n    } catch (err) {\n      console.warn(`Can not get prebuilt lambda: ${err}`);\n    }\n  }\n\n  return lambda.Code.fromDockerBuild(path.join(__dirname, '../lambda'), {\n    buildArgs: {\n      buildImage,\n    },\n  });\n}\n\nexport class DockerImageName implements IImageName {\n  public constructor(private name: string, public creds?: string) { }\n  public get uri(): string { return `docker://${this.name}`; }\n}\n\nexport class S3ArchiveName implements IImageName {\n  private name: string;\n  public constructor(p: string, ref?: string, public creds?: string) {\n    this.name = p;\n    if (ref) {\n      this.name += ':' + ref;\n    }\n  }\n  public get uri(): string { return `s3://${this.name}`; }\n}\n\nexport class ECRDeployment extends Construct {\n  private handler: lambda.SingletonFunction;\n\n  constructor(scope: Construct, id: string, props: ECRDeploymentProps) {\n    super(scope, id);\n    const memoryLimit = props.memoryLimit ?? 512;\n    this.handler = new lambda.SingletonFunction(this, 'CustomResourceHandler', {\n      uuid: this.renderSingletonUuid(memoryLimit),\n      code: getCode(props.buildImage ?? 'golang:1'),\n      runtime: lambda.Runtime.PROVIDED_AL2023,\n      handler: 'bootstrap',\n      environment: props.environment,\n      lambdaPurpose: 'Custom::CDKECRDeployment',\n      timeout: Duration.minutes(15),\n      role: props.role,\n      memorySize: memoryLimit,\n      vpc: props.vpc,\n      vpcSubnets: props.vpcSubnets,\n      securityGroups: props.securityGroups,\n    });\n\n    const handlerRole = this.handler.role;\n    if (!handlerRole) { throw new Error('lambda.SingletonFunction should have created a Role'); }\n\n    handlerRole.addToPrincipalPolicy(\n      new iam.PolicyStatement({\n        effect: iam.Effect.ALLOW,\n        actions: [\n          'ecr:GetAuthorizationToken',\n          'ecr:BatchCheckLayerAvailability',\n          'ecr:GetDownloadUrlForLayer',\n          'ecr:GetRepositoryPolicy',\n          'ecr:DescribeRepositories',\n          'ecr:ListImages',\n          'ecr:DescribeImages',\n          'ecr:BatchGetImage',\n          'ecr:ListTagsForResource',\n          'ecr:DescribeImageScanFindings',\n          'ecr:InitiateLayerUpload',\n          'ecr:UploadLayerPart',\n          'ecr:CompleteLayerUpload',\n          'ecr:PutImage',\n        ],\n        resources: ['*'],\n      }));\n    handlerRole.addToPrincipalPolicy(new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions: [\n        's3:GetObject',\n      ],\n      resources: ['*'],\n    }));\n\n    new CustomResource(this, 'CustomResource', {\n      serviceToken: this.handler.functionArn,\n      resourceType: 'Custom::CDKBucketDeployment',\n      properties: {\n        SrcImage: props.src.uri,\n        SrcCreds: props.src.creds,\n        DestImage: props.dest.uri,\n        DestCreds: props.dest.creds,\n      },\n    });\n  }\n\n  public addToPrincipalPolicy(statement: PolicyStatement): AddToPrincipalPolicyResult {\n    const handlerRole = this.handler.role;\n    if (!handlerRole) { throw new Error('lambda.SingletonFunction should have created a Role'); }\n\n    return handlerRole.addToPrincipalPolicy(statement);\n  }\n\n  private renderSingletonUuid(memoryLimit?: number) {\n    let uuid = 'bd07c930-edb9-4112-a20f-03f096f53666';\n\n    // if user specify a custom memory limit, define another singleton handler\n    // with this configuration. otherwise, it won't be possible to use multiple\n    // configurations since we have a singleton.\n    if (memoryLimit) {\n      if (Token.isUnresolved(memoryLimit)) {\n        throw new Error('Can\\'t use tokens when specifying \"memoryLimit\" since we use it to identify the singleton custom resource handler');\n      }\n\n      uuid += `-${memoryLimit.toString()}MiB`;\n    }\n\n    return uuid;\n  }\n}\n"]}
|
|
@@ -8,7 +8,7 @@ This package contains type definitions for node (https://nodejs.org/).
|
|
|
8
8
|
Files were exported from https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node.
|
|
9
9
|
|
|
10
10
|
### Additional Details
|
|
11
|
-
* Last updated:
|
|
11
|
+
* Last updated: Fri, 05 Apr 2024 22:07:19 GMT
|
|
12
12
|
* Dependencies: [undici-types](https://npmjs.com/package/undici-types)
|
|
13
13
|
|
|
14
14
|
# Credits
|
|
@@ -2094,7 +2094,13 @@ declare module "http2" {
|
|
|
2094
2094
|
const HTTP2_HEADER_ACCEPT_LANGUAGE: string;
|
|
2095
2095
|
const HTTP2_HEADER_ACCEPT_RANGES: string;
|
|
2096
2096
|
const HTTP2_HEADER_ACCEPT: string;
|
|
2097
|
+
const HTTP2_HEADER_ACCESS_CONTROL_ALLOW_CREDENTIALS: string;
|
|
2098
|
+
const HTTP2_HEADER_ACCESS_CONTROL_ALLOW_HEADERS: string;
|
|
2099
|
+
const HTTP2_HEADER_ACCESS_CONTROL_ALLOW_METHODS: string;
|
|
2097
2100
|
const HTTP2_HEADER_ACCESS_CONTROL_ALLOW_ORIGIN: string;
|
|
2101
|
+
const HTTP2_HEADER_ACCESS_CONTROL_EXPOSE_HEADERS: string;
|
|
2102
|
+
const HTTP2_HEADER_ACCESS_CONTROL_REQUEST_HEADERS: string;
|
|
2103
|
+
const HTTP2_HEADER_ACCESS_CONTROL_REQUEST_METHOD: string;
|
|
2098
2104
|
const HTTP2_HEADER_AGE: string;
|
|
2099
2105
|
const HTTP2_HEADER_ALLOW: string;
|
|
2100
2106
|
const HTTP2_HEADER_AUTHORIZATION: string;
|
|
@@ -66,6 +66,7 @@
|
|
|
66
66
|
/// <reference path="readline.d.ts" />
|
|
67
67
|
/// <reference path="readline/promises.d.ts" />
|
|
68
68
|
/// <reference path="repl.d.ts" />
|
|
69
|
+
/// <reference path="sea.d.ts" />
|
|
69
70
|
/// <reference path="stream.d.ts" />
|
|
70
71
|
/// <reference path="stream/promises.d.ts" />
|
|
71
72
|
/// <reference path="stream/consumers.d.ts" />
|
|
@@ -2742,6 +2742,5 @@ declare module 'inspector' {
|
|
|
2742
2742
|
* The inspector module provides an API for interacting with the V8 inspector.
|
|
2743
2743
|
*/
|
|
2744
2744
|
declare module 'node:inspector' {
|
|
2745
|
-
|
|
2746
|
-
export = inspector;
|
|
2745
|
+
export * from 'inspector';
|
|
2747
2746
|
}
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@types/node",
|
|
3
|
-
"version": "20.12.
|
|
3
|
+
"version": "20.12.5",
|
|
4
4
|
"description": "TypeScript definitions for node",
|
|
5
5
|
"homepage": "https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node",
|
|
6
6
|
"license": "MIT",
|
|
@@ -212,6 +212,6 @@
|
|
|
212
212
|
"dependencies": {
|
|
213
213
|
"undici-types": "~5.26.4"
|
|
214
214
|
},
|
|
215
|
-
"typesPublisherContentHash": "
|
|
215
|
+
"typesPublisherContentHash": "f9a85b9cb14aca71630c642fb895730f6aa88fce83f053df4ded37225b6b0558",
|
|
216
216
|
"typeScriptVersion": "4.7"
|
|
217
217
|
}
|
|
@@ -0,0 +1,153 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* This feature allows the distribution of a Node.js application conveniently to a
|
|
3
|
+
* system that does not have Node.js installed.
|
|
4
|
+
*
|
|
5
|
+
* Node.js supports the creation of [single executable applications](https://github.com/nodejs/single-executable) by allowing
|
|
6
|
+
* the injection of a blob prepared by Node.js, which can contain a bundled script,
|
|
7
|
+
* into the `node` binary. During start up, the program checks if anything has been
|
|
8
|
+
* injected. If the blob is found, it executes the script in the blob. Otherwise
|
|
9
|
+
* Node.js operates as it normally does.
|
|
10
|
+
*
|
|
11
|
+
* The single executable application feature currently only supports running a
|
|
12
|
+
* single embedded script using the `CommonJS` module system.
|
|
13
|
+
*
|
|
14
|
+
* Users can create a single executable application from their bundled script
|
|
15
|
+
* with the `node` binary itself and any tool which can inject resources into the
|
|
16
|
+
* binary.
|
|
17
|
+
*
|
|
18
|
+
* Here are the steps for creating a single executable application using one such
|
|
19
|
+
* tool, [postject](https://github.com/nodejs/postject):
|
|
20
|
+
*
|
|
21
|
+
* 1. Create a JavaScript file:
|
|
22
|
+
* ```bash
|
|
23
|
+
* echo 'console.log(`Hello, ${process.argv[2]}!`);' > hello.js
|
|
24
|
+
* ```
|
|
25
|
+
* 2. Create a configuration file building a blob that can be injected into the
|
|
26
|
+
* single executable application (see `Generating single executable preparation blobs` for details):
|
|
27
|
+
* ```bash
|
|
28
|
+
* echo '{ "main": "hello.js", "output": "sea-prep.blob" }' > sea-config.json
|
|
29
|
+
* ```
|
|
30
|
+
* 3. Generate the blob to be injected:
|
|
31
|
+
* ```bash
|
|
32
|
+
* node --experimental-sea-config sea-config.json
|
|
33
|
+
* ```
|
|
34
|
+
* 4. Create a copy of the `node` executable and name it according to your needs:
|
|
35
|
+
* * On systems other than Windows:
|
|
36
|
+
* ```bash
|
|
37
|
+
* cp $(command -v node) hello
|
|
38
|
+
* ```
|
|
39
|
+
* * On Windows:
|
|
40
|
+
* ```text
|
|
41
|
+
* node -e "require('fs').copyFileSync(process.execPath, 'hello.exe')"
|
|
42
|
+
* ```
|
|
43
|
+
* The `.exe` extension is necessary.
|
|
44
|
+
* 5. Remove the signature of the binary (macOS and Windows only):
|
|
45
|
+
* * On macOS:
|
|
46
|
+
* ```bash
|
|
47
|
+
* codesign --remove-signature hello
|
|
48
|
+
* ```
|
|
49
|
+
* * On Windows (optional):
|
|
50
|
+
* [signtool](https://learn.microsoft.com/en-us/windows/win32/seccrypto/signtool) can be used from the installed [Windows SDK](https://developer.microsoft.com/en-us/windows/downloads/windows-sdk/).
|
|
51
|
+
* If this step is
|
|
52
|
+
* skipped, ignore any signature-related warning from postject.
|
|
53
|
+
* ```powershell
|
|
54
|
+
* signtool remove /s hello.exe
|
|
55
|
+
* ```
|
|
56
|
+
* 6. Inject the blob into the copied binary by running `postject` with
|
|
57
|
+
* the following options:
|
|
58
|
+
* * `hello` / `hello.exe` \- The name of the copy of the `node` executable
|
|
59
|
+
* created in step 4.
|
|
60
|
+
* * `NODE_SEA_BLOB` \- The name of the resource / note / section in the binary
|
|
61
|
+
* where the contents of the blob will be stored.
|
|
62
|
+
* * `sea-prep.blob` \- The name of the blob created in step 1.
|
|
63
|
+
* * `--sentinel-fuse NODE_SEA_FUSE_fce680ab2cc467b6e072b8b5df1996b2` \- The [fuse](https://www.electronjs.org/docs/latest/tutorial/fuses) used by the Node.js project to detect if a file has been
|
|
64
|
+
* injected.
|
|
65
|
+
* * `--macho-segment-name NODE_SEA` (only needed on macOS) - The name of the
|
|
66
|
+
* segment in the binary where the contents of the blob will be
|
|
67
|
+
* stored.
|
|
68
|
+
* To summarize, here is the required command for each platform:
|
|
69
|
+
* * On Linux:
|
|
70
|
+
* ```bash
|
|
71
|
+
* npx postject hello NODE_SEA_BLOB sea-prep.blob \
|
|
72
|
+
* --sentinel-fuse NODE_SEA_FUSE_fce680ab2cc467b6e072b8b5df1996b2
|
|
73
|
+
* ```
|
|
74
|
+
* * On Windows - PowerShell:
|
|
75
|
+
* ```powershell
|
|
76
|
+
* npx postject hello.exe NODE_SEA_BLOB sea-prep.blob `
|
|
77
|
+
* --sentinel-fuse NODE_SEA_FUSE_fce680ab2cc467b6e072b8b5df1996b2
|
|
78
|
+
* ```
|
|
79
|
+
* * On Windows - Command Prompt:
|
|
80
|
+
* ```text
|
|
81
|
+
* npx postject hello.exe NODE_SEA_BLOB sea-prep.blob ^
|
|
82
|
+
* --sentinel-fuse NODE_SEA_FUSE_fce680ab2cc467b6e072b8b5df1996b2
|
|
83
|
+
* ```
|
|
84
|
+
* * On macOS:
|
|
85
|
+
* ```bash
|
|
86
|
+
* npx postject hello NODE_SEA_BLOB sea-prep.blob \
|
|
87
|
+
* --sentinel-fuse NODE_SEA_FUSE_fce680ab2cc467b6e072b8b5df1996b2 \
|
|
88
|
+
* --macho-segment-name NODE_SEA
|
|
89
|
+
* ```
|
|
90
|
+
* 7. Sign the binary (macOS and Windows only):
|
|
91
|
+
* * On macOS:
|
|
92
|
+
* ```bash
|
|
93
|
+
* codesign --sign - hello
|
|
94
|
+
* ```
|
|
95
|
+
* * On Windows (optional):
|
|
96
|
+
* A certificate needs to be present for this to work. However, the unsigned
|
|
97
|
+
* binary would still be runnable.
|
|
98
|
+
* ```powershell
|
|
99
|
+
* signtool sign /fd SHA256 hello.exe
|
|
100
|
+
* ```
|
|
101
|
+
* 8. Run the binary:
|
|
102
|
+
* * On systems other than Windows
|
|
103
|
+
* ```console
|
|
104
|
+
* $ ./hello world
|
|
105
|
+
* Hello, world!
|
|
106
|
+
* ```
|
|
107
|
+
* * On Windows
|
|
108
|
+
* ```console
|
|
109
|
+
* $ .\hello.exe world
|
|
110
|
+
* Hello, world!
|
|
111
|
+
* ```
|
|
112
|
+
* @since v19.7.0, v18.16.0
|
|
113
|
+
* @experimental
|
|
114
|
+
* @see [source](https://github.com/nodejs/node/blob/v20.12.0/src/node_sea.cc)
|
|
115
|
+
*/
|
|
116
|
+
declare module "node:sea" {
|
|
117
|
+
type AssetKey = string;
|
|
118
|
+
/**
|
|
119
|
+
* @since v20.12.0
|
|
120
|
+
* @return Whether this script is running inside a single-executable application.
|
|
121
|
+
*/
|
|
122
|
+
function isSea(): boolean;
|
|
123
|
+
/**
|
|
124
|
+
* This method can be used to retrieve the assets configured to be bundled into the
|
|
125
|
+
* single-executable application at build time.
|
|
126
|
+
* An error is thrown when no matching asset can be found.
|
|
127
|
+
* @since v20.12.0
|
|
128
|
+
*/
|
|
129
|
+
function getAsset(key: AssetKey): ArrayBuffer;
|
|
130
|
+
function getAsset(key: AssetKey, encoding: string): string;
|
|
131
|
+
/**
|
|
132
|
+
* Similar to `sea.getAsset()`, but returns the result in a [`Blob`](https://developer.mozilla.org/en-US/docs/Web/API/Blob).
|
|
133
|
+
* An error is thrown when no matching asset can be found.
|
|
134
|
+
* @since v20.12.0
|
|
135
|
+
*/
|
|
136
|
+
function getAssetAsBlob(key: AssetKey, options?: {
|
|
137
|
+
type: string;
|
|
138
|
+
}): Blob;
|
|
139
|
+
/**
|
|
140
|
+
* This method can be used to retrieve the assets configured to be bundled into the
|
|
141
|
+
* single-executable application at build time.
|
|
142
|
+
* An error is thrown when no matching asset can be found.
|
|
143
|
+
*
|
|
144
|
+
* Unlike `sea.getRawAsset()` or `sea.getAssetAsBlob()`, this method does not
|
|
145
|
+
* return a copy. Instead, it returns the raw asset bundled inside the executable.
|
|
146
|
+
*
|
|
147
|
+
* For now, users should avoid writing to the returned array buffer. If the
|
|
148
|
+
* injected section is not marked as writable or not aligned properly,
|
|
149
|
+
* writes to the returned array buffer is likely to result in a crash.
|
|
150
|
+
* @since v20.12.0
|
|
151
|
+
*/
|
|
152
|
+
function getRawAsset(key: AssetKey): string | ArrayBuffer;
|
|
153
|
+
}
|
|
@@ -8,7 +8,7 @@ This package contains type definitions for node (https://nodejs.org/).
|
|
|
8
8
|
Files were exported from https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node.
|
|
9
9
|
|
|
10
10
|
### Additional Details
|
|
11
|
-
* Last updated:
|
|
11
|
+
* Last updated: Fri, 05 Apr 2024 22:07:19 GMT
|
|
12
12
|
* Dependencies: [undici-types](https://npmjs.com/package/undici-types)
|
|
13
13
|
|
|
14
14
|
# Credits
|
|
@@ -2094,7 +2094,13 @@ declare module "http2" {
|
|
|
2094
2094
|
const HTTP2_HEADER_ACCEPT_LANGUAGE: string;
|
|
2095
2095
|
const HTTP2_HEADER_ACCEPT_RANGES: string;
|
|
2096
2096
|
const HTTP2_HEADER_ACCEPT: string;
|
|
2097
|
+
const HTTP2_HEADER_ACCESS_CONTROL_ALLOW_CREDENTIALS: string;
|
|
2098
|
+
const HTTP2_HEADER_ACCESS_CONTROL_ALLOW_HEADERS: string;
|
|
2099
|
+
const HTTP2_HEADER_ACCESS_CONTROL_ALLOW_METHODS: string;
|
|
2097
2100
|
const HTTP2_HEADER_ACCESS_CONTROL_ALLOW_ORIGIN: string;
|
|
2101
|
+
const HTTP2_HEADER_ACCESS_CONTROL_EXPOSE_HEADERS: string;
|
|
2102
|
+
const HTTP2_HEADER_ACCESS_CONTROL_REQUEST_HEADERS: string;
|
|
2103
|
+
const HTTP2_HEADER_ACCESS_CONTROL_REQUEST_METHOD: string;
|
|
2098
2104
|
const HTTP2_HEADER_AGE: string;
|
|
2099
2105
|
const HTTP2_HEADER_ALLOW: string;
|
|
2100
2106
|
const HTTP2_HEADER_AUTHORIZATION: string;
|
|
@@ -66,6 +66,7 @@
|
|
|
66
66
|
/// <reference path="readline.d.ts" />
|
|
67
67
|
/// <reference path="readline/promises.d.ts" />
|
|
68
68
|
/// <reference path="repl.d.ts" />
|
|
69
|
+
/// <reference path="sea.d.ts" />
|
|
69
70
|
/// <reference path="stream.d.ts" />
|
|
70
71
|
/// <reference path="stream/promises.d.ts" />
|
|
71
72
|
/// <reference path="stream/consumers.d.ts" />
|
|
@@ -2742,6 +2742,5 @@ declare module 'inspector' {
|
|
|
2742
2742
|
* The inspector module provides an API for interacting with the V8 inspector.
|
|
2743
2743
|
*/
|
|
2744
2744
|
declare module 'node:inspector' {
|
|
2745
|
-
|
|
2746
|
-
export = inspector;
|
|
2745
|
+
export * from 'inspector';
|
|
2747
2746
|
}
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@types/node",
|
|
3
|
-
"version": "20.12.
|
|
3
|
+
"version": "20.12.5",
|
|
4
4
|
"description": "TypeScript definitions for node",
|
|
5
5
|
"homepage": "https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node",
|
|
6
6
|
"license": "MIT",
|
|
@@ -212,6 +212,6 @@
|
|
|
212
212
|
"dependencies": {
|
|
213
213
|
"undici-types": "~5.26.4"
|
|
214
214
|
},
|
|
215
|
-
"typesPublisherContentHash": "
|
|
215
|
+
"typesPublisherContentHash": "f9a85b9cb14aca71630c642fb895730f6aa88fce83f053df4ded37225b6b0558",
|
|
216
216
|
"typeScriptVersion": "4.7"
|
|
217
217
|
}
|
|
@@ -0,0 +1,153 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* This feature allows the distribution of a Node.js application conveniently to a
|
|
3
|
+
* system that does not have Node.js installed.
|
|
4
|
+
*
|
|
5
|
+
* Node.js supports the creation of [single executable applications](https://github.com/nodejs/single-executable) by allowing
|
|
6
|
+
* the injection of a blob prepared by Node.js, which can contain a bundled script,
|
|
7
|
+
* into the `node` binary. During start up, the program checks if anything has been
|
|
8
|
+
* injected. If the blob is found, it executes the script in the blob. Otherwise
|
|
9
|
+
* Node.js operates as it normally does.
|
|
10
|
+
*
|
|
11
|
+
* The single executable application feature currently only supports running a
|
|
12
|
+
* single embedded script using the `CommonJS` module system.
|
|
13
|
+
*
|
|
14
|
+
* Users can create a single executable application from their bundled script
|
|
15
|
+
* with the `node` binary itself and any tool which can inject resources into the
|
|
16
|
+
* binary.
|
|
17
|
+
*
|
|
18
|
+
* Here are the steps for creating a single executable application using one such
|
|
19
|
+
* tool, [postject](https://github.com/nodejs/postject):
|
|
20
|
+
*
|
|
21
|
+
* 1. Create a JavaScript file:
|
|
22
|
+
* ```bash
|
|
23
|
+
* echo 'console.log(`Hello, ${process.argv[2]}!`);' > hello.js
|
|
24
|
+
* ```
|
|
25
|
+
* 2. Create a configuration file building a blob that can be injected into the
|
|
26
|
+
* single executable application (see `Generating single executable preparation blobs` for details):
|
|
27
|
+
* ```bash
|
|
28
|
+
* echo '{ "main": "hello.js", "output": "sea-prep.blob" }' > sea-config.json
|
|
29
|
+
* ```
|
|
30
|
+
* 3. Generate the blob to be injected:
|
|
31
|
+
* ```bash
|
|
32
|
+
* node --experimental-sea-config sea-config.json
|
|
33
|
+
* ```
|
|
34
|
+
* 4. Create a copy of the `node` executable and name it according to your needs:
|
|
35
|
+
* * On systems other than Windows:
|
|
36
|
+
* ```bash
|
|
37
|
+
* cp $(command -v node) hello
|
|
38
|
+
* ```
|
|
39
|
+
* * On Windows:
|
|
40
|
+
* ```text
|
|
41
|
+
* node -e "require('fs').copyFileSync(process.execPath, 'hello.exe')"
|
|
42
|
+
* ```
|
|
43
|
+
* The `.exe` extension is necessary.
|
|
44
|
+
* 5. Remove the signature of the binary (macOS and Windows only):
|
|
45
|
+
* * On macOS:
|
|
46
|
+
* ```bash
|
|
47
|
+
* codesign --remove-signature hello
|
|
48
|
+
* ```
|
|
49
|
+
* * On Windows (optional):
|
|
50
|
+
* [signtool](https://learn.microsoft.com/en-us/windows/win32/seccrypto/signtool) can be used from the installed [Windows SDK](https://developer.microsoft.com/en-us/windows/downloads/windows-sdk/).
|
|
51
|
+
* If this step is
|
|
52
|
+
* skipped, ignore any signature-related warning from postject.
|
|
53
|
+
* ```powershell
|
|
54
|
+
* signtool remove /s hello.exe
|
|
55
|
+
* ```
|
|
56
|
+
* 6. Inject the blob into the copied binary by running `postject` with
|
|
57
|
+
* the following options:
|
|
58
|
+
* * `hello` / `hello.exe` \- The name of the copy of the `node` executable
|
|
59
|
+
* created in step 4.
|
|
60
|
+
* * `NODE_SEA_BLOB` \- The name of the resource / note / section in the binary
|
|
61
|
+
* where the contents of the blob will be stored.
|
|
62
|
+
* * `sea-prep.blob` \- The name of the blob created in step 1.
|
|
63
|
+
* * `--sentinel-fuse NODE_SEA_FUSE_fce680ab2cc467b6e072b8b5df1996b2` \- The [fuse](https://www.electronjs.org/docs/latest/tutorial/fuses) used by the Node.js project to detect if a file has been
|
|
64
|
+
* injected.
|
|
65
|
+
* * `--macho-segment-name NODE_SEA` (only needed on macOS) - The name of the
|
|
66
|
+
* segment in the binary where the contents of the blob will be
|
|
67
|
+
* stored.
|
|
68
|
+
* To summarize, here is the required command for each platform:
|
|
69
|
+
* * On Linux:
|
|
70
|
+
* ```bash
|
|
71
|
+
* npx postject hello NODE_SEA_BLOB sea-prep.blob \
|
|
72
|
+
* --sentinel-fuse NODE_SEA_FUSE_fce680ab2cc467b6e072b8b5df1996b2
|
|
73
|
+
* ```
|
|
74
|
+
* * On Windows - PowerShell:
|
|
75
|
+
* ```powershell
|
|
76
|
+
* npx postject hello.exe NODE_SEA_BLOB sea-prep.blob `
|
|
77
|
+
* --sentinel-fuse NODE_SEA_FUSE_fce680ab2cc467b6e072b8b5df1996b2
|
|
78
|
+
* ```
|
|
79
|
+
* * On Windows - Command Prompt:
|
|
80
|
+
* ```text
|
|
81
|
+
* npx postject hello.exe NODE_SEA_BLOB sea-prep.blob ^
|
|
82
|
+
* --sentinel-fuse NODE_SEA_FUSE_fce680ab2cc467b6e072b8b5df1996b2
|
|
83
|
+
* ```
|
|
84
|
+
* * On macOS:
|
|
85
|
+
* ```bash
|
|
86
|
+
* npx postject hello NODE_SEA_BLOB sea-prep.blob \
|
|
87
|
+
* --sentinel-fuse NODE_SEA_FUSE_fce680ab2cc467b6e072b8b5df1996b2 \
|
|
88
|
+
* --macho-segment-name NODE_SEA
|
|
89
|
+
* ```
|
|
90
|
+
* 7. Sign the binary (macOS and Windows only):
|
|
91
|
+
* * On macOS:
|
|
92
|
+
* ```bash
|
|
93
|
+
* codesign --sign - hello
|
|
94
|
+
* ```
|
|
95
|
+
* * On Windows (optional):
|
|
96
|
+
* A certificate needs to be present for this to work. However, the unsigned
|
|
97
|
+
* binary would still be runnable.
|
|
98
|
+
* ```powershell
|
|
99
|
+
* signtool sign /fd SHA256 hello.exe
|
|
100
|
+
* ```
|
|
101
|
+
* 8. Run the binary:
|
|
102
|
+
* * On systems other than Windows
|
|
103
|
+
* ```console
|
|
104
|
+
* $ ./hello world
|
|
105
|
+
* Hello, world!
|
|
106
|
+
* ```
|
|
107
|
+
* * On Windows
|
|
108
|
+
* ```console
|
|
109
|
+
* $ .\hello.exe world
|
|
110
|
+
* Hello, world!
|
|
111
|
+
* ```
|
|
112
|
+
* @since v19.7.0, v18.16.0
|
|
113
|
+
* @experimental
|
|
114
|
+
* @see [source](https://github.com/nodejs/node/blob/v20.12.0/src/node_sea.cc)
|
|
115
|
+
*/
|
|
116
|
+
declare module "node:sea" {
|
|
117
|
+
type AssetKey = string;
|
|
118
|
+
/**
|
|
119
|
+
* @since v20.12.0
|
|
120
|
+
* @return Whether this script is running inside a single-executable application.
|
|
121
|
+
*/
|
|
122
|
+
function isSea(): boolean;
|
|
123
|
+
/**
|
|
124
|
+
* This method can be used to retrieve the assets configured to be bundled into the
|
|
125
|
+
* single-executable application at build time.
|
|
126
|
+
* An error is thrown when no matching asset can be found.
|
|
127
|
+
* @since v20.12.0
|
|
128
|
+
*/
|
|
129
|
+
function getAsset(key: AssetKey): ArrayBuffer;
|
|
130
|
+
function getAsset(key: AssetKey, encoding: string): string;
|
|
131
|
+
/**
|
|
132
|
+
* Similar to `sea.getAsset()`, but returns the result in a [`Blob`](https://developer.mozilla.org/en-US/docs/Web/API/Blob).
|
|
133
|
+
* An error is thrown when no matching asset can be found.
|
|
134
|
+
* @since v20.12.0
|
|
135
|
+
*/
|
|
136
|
+
function getAssetAsBlob(key: AssetKey, options?: {
|
|
137
|
+
type: string;
|
|
138
|
+
}): Blob;
|
|
139
|
+
/**
|
|
140
|
+
* This method can be used to retrieve the assets configured to be bundled into the
|
|
141
|
+
* single-executable application at build time.
|
|
142
|
+
* An error is thrown when no matching asset can be found.
|
|
143
|
+
*
|
|
144
|
+
* Unlike `sea.getRawAsset()` or `sea.getAssetAsBlob()`, this method does not
|
|
145
|
+
* return a copy. Instead, it returns the raw asset bundled inside the executable.
|
|
146
|
+
*
|
|
147
|
+
* For now, users should avoid writing to the returned array buffer. If the
|
|
148
|
+
* injected section is not marked as writable or not aligned properly,
|
|
149
|
+
* writes to the returned array buffer is likely to result in a crash.
|
|
150
|
+
* @since v20.12.0
|
|
151
|
+
*/
|
|
152
|
+
function getRawAsset(key: AssetKey): string | ArrayBuffer;
|
|
153
|
+
}
|
|
@@ -8,7 +8,7 @@ This package contains type definitions for node (https://nodejs.org/).
|
|
|
8
8
|
Files were exported from https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node.
|
|
9
9
|
|
|
10
10
|
### Additional Details
|
|
11
|
-
* Last updated:
|
|
11
|
+
* Last updated: Fri, 05 Apr 2024 22:07:19 GMT
|
|
12
12
|
* Dependencies: [undici-types](https://npmjs.com/package/undici-types)
|
|
13
13
|
|
|
14
14
|
# Credits
|
|
@@ -2094,7 +2094,13 @@ declare module "http2" {
|
|
|
2094
2094
|
const HTTP2_HEADER_ACCEPT_LANGUAGE: string;
|
|
2095
2095
|
const HTTP2_HEADER_ACCEPT_RANGES: string;
|
|
2096
2096
|
const HTTP2_HEADER_ACCEPT: string;
|
|
2097
|
+
const HTTP2_HEADER_ACCESS_CONTROL_ALLOW_CREDENTIALS: string;
|
|
2098
|
+
const HTTP2_HEADER_ACCESS_CONTROL_ALLOW_HEADERS: string;
|
|
2099
|
+
const HTTP2_HEADER_ACCESS_CONTROL_ALLOW_METHODS: string;
|
|
2097
2100
|
const HTTP2_HEADER_ACCESS_CONTROL_ALLOW_ORIGIN: string;
|
|
2101
|
+
const HTTP2_HEADER_ACCESS_CONTROL_EXPOSE_HEADERS: string;
|
|
2102
|
+
const HTTP2_HEADER_ACCESS_CONTROL_REQUEST_HEADERS: string;
|
|
2103
|
+
const HTTP2_HEADER_ACCESS_CONTROL_REQUEST_METHOD: string;
|
|
2098
2104
|
const HTTP2_HEADER_AGE: string;
|
|
2099
2105
|
const HTTP2_HEADER_ALLOW: string;
|
|
2100
2106
|
const HTTP2_HEADER_AUTHORIZATION: string;
|
|
@@ -66,6 +66,7 @@
|
|
|
66
66
|
/// <reference path="readline.d.ts" />
|
|
67
67
|
/// <reference path="readline/promises.d.ts" />
|
|
68
68
|
/// <reference path="repl.d.ts" />
|
|
69
|
+
/// <reference path="sea.d.ts" />
|
|
69
70
|
/// <reference path="stream.d.ts" />
|
|
70
71
|
/// <reference path="stream/promises.d.ts" />
|
|
71
72
|
/// <reference path="stream/consumers.d.ts" />
|
|
@@ -2742,6 +2742,5 @@ declare module 'inspector' {
|
|
|
2742
2742
|
* The inspector module provides an API for interacting with the V8 inspector.
|
|
2743
2743
|
*/
|
|
2744
2744
|
declare module 'node:inspector' {
|
|
2745
|
-
|
|
2746
|
-
export = inspector;
|
|
2745
|
+
export * from 'inspector';
|
|
2747
2746
|
}
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@types/node",
|
|
3
|
-
"version": "20.12.
|
|
3
|
+
"version": "20.12.5",
|
|
4
4
|
"description": "TypeScript definitions for node",
|
|
5
5
|
"homepage": "https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node",
|
|
6
6
|
"license": "MIT",
|
|
@@ -212,6 +212,6 @@
|
|
|
212
212
|
"dependencies": {
|
|
213
213
|
"undici-types": "~5.26.4"
|
|
214
214
|
},
|
|
215
|
-
"typesPublisherContentHash": "
|
|
215
|
+
"typesPublisherContentHash": "f9a85b9cb14aca71630c642fb895730f6aa88fce83f053df4ded37225b6b0558",
|
|
216
216
|
"typeScriptVersion": "4.7"
|
|
217
217
|
}
|
|
@@ -0,0 +1,153 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* This feature allows the distribution of a Node.js application conveniently to a
|
|
3
|
+
* system that does not have Node.js installed.
|
|
4
|
+
*
|
|
5
|
+
* Node.js supports the creation of [single executable applications](https://github.com/nodejs/single-executable) by allowing
|
|
6
|
+
* the injection of a blob prepared by Node.js, which can contain a bundled script,
|
|
7
|
+
* into the `node` binary. During start up, the program checks if anything has been
|
|
8
|
+
* injected. If the blob is found, it executes the script in the blob. Otherwise
|
|
9
|
+
* Node.js operates as it normally does.
|
|
10
|
+
*
|
|
11
|
+
* The single executable application feature currently only supports running a
|
|
12
|
+
* single embedded script using the `CommonJS` module system.
|
|
13
|
+
*
|
|
14
|
+
* Users can create a single executable application from their bundled script
|
|
15
|
+
* with the `node` binary itself and any tool which can inject resources into the
|
|
16
|
+
* binary.
|
|
17
|
+
*
|
|
18
|
+
* Here are the steps for creating a single executable application using one such
|
|
19
|
+
* tool, [postject](https://github.com/nodejs/postject):
|
|
20
|
+
*
|
|
21
|
+
* 1. Create a JavaScript file:
|
|
22
|
+
* ```bash
|
|
23
|
+
* echo 'console.log(`Hello, ${process.argv[2]}!`);' > hello.js
|
|
24
|
+
* ```
|
|
25
|
+
* 2. Create a configuration file building a blob that can be injected into the
|
|
26
|
+
* single executable application (see `Generating single executable preparation blobs` for details):
|
|
27
|
+
* ```bash
|
|
28
|
+
* echo '{ "main": "hello.js", "output": "sea-prep.blob" }' > sea-config.json
|
|
29
|
+
* ```
|
|
30
|
+
* 3. Generate the blob to be injected:
|
|
31
|
+
* ```bash
|
|
32
|
+
* node --experimental-sea-config sea-config.json
|
|
33
|
+
* ```
|
|
34
|
+
* 4. Create a copy of the `node` executable and name it according to your needs:
|
|
35
|
+
* * On systems other than Windows:
|
|
36
|
+
* ```bash
|
|
37
|
+
* cp $(command -v node) hello
|
|
38
|
+
* ```
|
|
39
|
+
* * On Windows:
|
|
40
|
+
* ```text
|
|
41
|
+
* node -e "require('fs').copyFileSync(process.execPath, 'hello.exe')"
|
|
42
|
+
* ```
|
|
43
|
+
* The `.exe` extension is necessary.
|
|
44
|
+
* 5. Remove the signature of the binary (macOS and Windows only):
|
|
45
|
+
* * On macOS:
|
|
46
|
+
* ```bash
|
|
47
|
+
* codesign --remove-signature hello
|
|
48
|
+
* ```
|
|
49
|
+
* * On Windows (optional):
|
|
50
|
+
* [signtool](https://learn.microsoft.com/en-us/windows/win32/seccrypto/signtool) can be used from the installed [Windows SDK](https://developer.microsoft.com/en-us/windows/downloads/windows-sdk/).
|
|
51
|
+
* If this step is
|
|
52
|
+
* skipped, ignore any signature-related warning from postject.
|
|
53
|
+
* ```powershell
|
|
54
|
+
* signtool remove /s hello.exe
|
|
55
|
+
* ```
|
|
56
|
+
* 6. Inject the blob into the copied binary by running `postject` with
|
|
57
|
+
* the following options:
|
|
58
|
+
* * `hello` / `hello.exe` \- The name of the copy of the `node` executable
|
|
59
|
+
* created in step 4.
|
|
60
|
+
* * `NODE_SEA_BLOB` \- The name of the resource / note / section in the binary
|
|
61
|
+
* where the contents of the blob will be stored.
|
|
62
|
+
* * `sea-prep.blob` \- The name of the blob created in step 1.
|
|
63
|
+
* * `--sentinel-fuse NODE_SEA_FUSE_fce680ab2cc467b6e072b8b5df1996b2` \- The [fuse](https://www.electronjs.org/docs/latest/tutorial/fuses) used by the Node.js project to detect if a file has been
|
|
64
|
+
* injected.
|
|
65
|
+
* * `--macho-segment-name NODE_SEA` (only needed on macOS) - The name of the
|
|
66
|
+
* segment in the binary where the contents of the blob will be
|
|
67
|
+
* stored.
|
|
68
|
+
* To summarize, here is the required command for each platform:
|
|
69
|
+
* * On Linux:
|
|
70
|
+
* ```bash
|
|
71
|
+
* npx postject hello NODE_SEA_BLOB sea-prep.blob \
|
|
72
|
+
* --sentinel-fuse NODE_SEA_FUSE_fce680ab2cc467b6e072b8b5df1996b2
|
|
73
|
+
* ```
|
|
74
|
+
* * On Windows - PowerShell:
|
|
75
|
+
* ```powershell
|
|
76
|
+
* npx postject hello.exe NODE_SEA_BLOB sea-prep.blob `
|
|
77
|
+
* --sentinel-fuse NODE_SEA_FUSE_fce680ab2cc467b6e072b8b5df1996b2
|
|
78
|
+
* ```
|
|
79
|
+
* * On Windows - Command Prompt:
|
|
80
|
+
* ```text
|
|
81
|
+
* npx postject hello.exe NODE_SEA_BLOB sea-prep.blob ^
|
|
82
|
+
* --sentinel-fuse NODE_SEA_FUSE_fce680ab2cc467b6e072b8b5df1996b2
|
|
83
|
+
* ```
|
|
84
|
+
* * On macOS:
|
|
85
|
+
* ```bash
|
|
86
|
+
* npx postject hello NODE_SEA_BLOB sea-prep.blob \
|
|
87
|
+
* --sentinel-fuse NODE_SEA_FUSE_fce680ab2cc467b6e072b8b5df1996b2 \
|
|
88
|
+
* --macho-segment-name NODE_SEA
|
|
89
|
+
* ```
|
|
90
|
+
* 7. Sign the binary (macOS and Windows only):
|
|
91
|
+
* * On macOS:
|
|
92
|
+
* ```bash
|
|
93
|
+
* codesign --sign - hello
|
|
94
|
+
* ```
|
|
95
|
+
* * On Windows (optional):
|
|
96
|
+
* A certificate needs to be present for this to work. However, the unsigned
|
|
97
|
+
* binary would still be runnable.
|
|
98
|
+
* ```powershell
|
|
99
|
+
* signtool sign /fd SHA256 hello.exe
|
|
100
|
+
* ```
|
|
101
|
+
* 8. Run the binary:
|
|
102
|
+
* * On systems other than Windows
|
|
103
|
+
* ```console
|
|
104
|
+
* $ ./hello world
|
|
105
|
+
* Hello, world!
|
|
106
|
+
* ```
|
|
107
|
+
* * On Windows
|
|
108
|
+
* ```console
|
|
109
|
+
* $ .\hello.exe world
|
|
110
|
+
* Hello, world!
|
|
111
|
+
* ```
|
|
112
|
+
* @since v19.7.0, v18.16.0
|
|
113
|
+
* @experimental
|
|
114
|
+
* @see [source](https://github.com/nodejs/node/blob/v20.12.0/src/node_sea.cc)
|
|
115
|
+
*/
|
|
116
|
+
declare module "node:sea" {
|
|
117
|
+
type AssetKey = string;
|
|
118
|
+
/**
|
|
119
|
+
* @since v20.12.0
|
|
120
|
+
* @return Whether this script is running inside a single-executable application.
|
|
121
|
+
*/
|
|
122
|
+
function isSea(): boolean;
|
|
123
|
+
/**
|
|
124
|
+
* This method can be used to retrieve the assets configured to be bundled into the
|
|
125
|
+
* single-executable application at build time.
|
|
126
|
+
* An error is thrown when no matching asset can be found.
|
|
127
|
+
* @since v20.12.0
|
|
128
|
+
*/
|
|
129
|
+
function getAsset(key: AssetKey): ArrayBuffer;
|
|
130
|
+
function getAsset(key: AssetKey, encoding: string): string;
|
|
131
|
+
/**
|
|
132
|
+
* Similar to `sea.getAsset()`, but returns the result in a [`Blob`](https://developer.mozilla.org/en-US/docs/Web/API/Blob).
|
|
133
|
+
* An error is thrown when no matching asset can be found.
|
|
134
|
+
* @since v20.12.0
|
|
135
|
+
*/
|
|
136
|
+
function getAssetAsBlob(key: AssetKey, options?: {
|
|
137
|
+
type: string;
|
|
138
|
+
}): Blob;
|
|
139
|
+
/**
|
|
140
|
+
* This method can be used to retrieve the assets configured to be bundled into the
|
|
141
|
+
* single-executable application at build time.
|
|
142
|
+
* An error is thrown when no matching asset can be found.
|
|
143
|
+
*
|
|
144
|
+
* Unlike `sea.getRawAsset()` or `sea.getAssetAsBlob()`, this method does not
|
|
145
|
+
* return a copy. Instead, it returns the raw asset bundled inside the executable.
|
|
146
|
+
*
|
|
147
|
+
* For now, users should avoid writing to the returned array buffer. If the
|
|
148
|
+
* injected section is not marked as writable or not aligned properly,
|
|
149
|
+
* writes to the returned array buffer is likely to result in a crash.
|
|
150
|
+
* @since v20.12.0
|
|
151
|
+
*/
|
|
152
|
+
function getRawAsset(key: AssetKey): string | ArrayBuffer;
|
|
153
|
+
}
|
package/package.json
CHANGED
|
@@ -60,8 +60,8 @@
|
|
|
60
60
|
"jsii-diff": "^1.96.0",
|
|
61
61
|
"jsii-docgen": "^1.8.110",
|
|
62
62
|
"jsii-pacmak": "^1.96.0",
|
|
63
|
-
"jsii-rosetta": "^5.3.
|
|
64
|
-
"projen": "^0.80.
|
|
63
|
+
"jsii-rosetta": "^5.3.34",
|
|
64
|
+
"projen": "^0.80.19",
|
|
65
65
|
"standard-version": "^9",
|
|
66
66
|
"ts-jest": "^27",
|
|
67
67
|
"ts-node": "^10.9.2",
|
|
@@ -90,7 +90,7 @@
|
|
|
90
90
|
],
|
|
91
91
|
"main": "lib/index.js",
|
|
92
92
|
"license": "Apache-2.0",
|
|
93
|
-
"version": "3.0.
|
|
93
|
+
"version": "3.0.44",
|
|
94
94
|
"jest": {
|
|
95
95
|
"testMatch": [
|
|
96
96
|
"<rootDir>/src/**/__tests__/**/*.ts?(x)",
|