cdk-ecr-deployment 3.0.67 → 3.0.68

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (27) hide show
  1. package/.jsii +56 -20
  2. package/.jsii.tabl.json +1 -1
  3. package/API.md +4 -0
  4. package/lib/index.d.ts +16 -4
  5. package/lib/index.js +6 -6
  6. package/node_modules/@types/cacheable-request/node_modules/@types/node/README.md +1 -1
  7. package/node_modules/@types/cacheable-request/node_modules/@types/node/dns/promises.d.ts +25 -23
  8. package/node_modules/@types/cacheable-request/node_modules/@types/node/dns.d.ts +23 -23
  9. package/node_modules/@types/cacheable-request/node_modules/@types/node/events.d.ts +39 -1
  10. package/node_modules/@types/cacheable-request/node_modules/@types/node/globals.d.ts +1 -0
  11. package/node_modules/@types/cacheable-request/node_modules/@types/node/package.json +2 -2
  12. package/node_modules/@types/cacheable-request/node_modules/@types/node/worker_threads.d.ts +3 -0
  13. package/node_modules/@types/keyv/node_modules/@types/node/README.md +1 -1
  14. package/node_modules/@types/keyv/node_modules/@types/node/dns/promises.d.ts +25 -23
  15. package/node_modules/@types/keyv/node_modules/@types/node/dns.d.ts +23 -23
  16. package/node_modules/@types/keyv/node_modules/@types/node/events.d.ts +39 -1
  17. package/node_modules/@types/keyv/node_modules/@types/node/globals.d.ts +1 -0
  18. package/node_modules/@types/keyv/node_modules/@types/node/package.json +2 -2
  19. package/node_modules/@types/keyv/node_modules/@types/node/worker_threads.d.ts +3 -0
  20. package/node_modules/@types/responselike/node_modules/@types/node/README.md +1 -1
  21. package/node_modules/@types/responselike/node_modules/@types/node/dns/promises.d.ts +25 -23
  22. package/node_modules/@types/responselike/node_modules/@types/node/dns.d.ts +23 -23
  23. package/node_modules/@types/responselike/node_modules/@types/node/events.d.ts +39 -1
  24. package/node_modules/@types/responselike/node_modules/@types/node/globals.d.ts +1 -0
  25. package/node_modules/@types/responselike/node_modules/@types/node/package.json +2 -2
  26. package/node_modules/@types/responselike/node_modules/@types/node/worker_threads.d.ts +3 -0
  27. package/package.json +2 -2
package/.jsii CHANGED
@@ -3840,7 +3840,7 @@
3840
3840
  },
3841
3841
  "locationInModule": {
3842
3842
  "filename": "src/index.ts",
3843
- "line": 119
3843
+ "line": 133
3844
3844
  },
3845
3845
  "parameters": [
3846
3846
  {
@@ -3868,7 +3868,7 @@
3868
3868
  "kind": "class",
3869
3869
  "locationInModule": {
3870
3870
  "filename": "src/index.ts",
3871
- "line": 118
3871
+ "line": 132
3872
3872
  },
3873
3873
  "name": "DockerImageName",
3874
3874
  "properties": [
@@ -3881,7 +3881,7 @@
3881
3881
  "immutable": true,
3882
3882
  "locationInModule": {
3883
3883
  "filename": "src/index.ts",
3884
- "line": 120
3884
+ "line": 134
3885
3885
  },
3886
3886
  "name": "uri",
3887
3887
  "overrides": "cdk-ecr-deployment.IImageName",
@@ -3897,7 +3897,7 @@
3897
3897
  },
3898
3898
  "locationInModule": {
3899
3899
  "filename": "src/index.ts",
3900
- "line": 119
3900
+ "line": 133
3901
3901
  },
3902
3902
  "name": "creds",
3903
3903
  "optional": true,
@@ -3922,7 +3922,7 @@
3922
3922
  },
3923
3923
  "locationInModule": {
3924
3924
  "filename": "src/index.ts",
3925
- "line": 137
3925
+ "line": 151
3926
3926
  },
3927
3927
  "parameters": [
3928
3928
  {
@@ -3948,7 +3948,7 @@
3948
3948
  "kind": "class",
3949
3949
  "locationInModule": {
3950
3950
  "filename": "src/index.ts",
3951
- "line": 134
3951
+ "line": 148
3952
3952
  },
3953
3953
  "methods": [
3954
3954
  {
@@ -3957,7 +3957,7 @@
3957
3957
  },
3958
3958
  "locationInModule": {
3959
3959
  "filename": "src/index.ts",
3960
- "line": 199
3960
+ "line": 213
3961
3961
  },
3962
3962
  "name": "addToPrincipalPolicy",
3963
3963
  "parameters": [
@@ -4027,7 +4027,7 @@
4027
4027
  {
4028
4028
  "abstract": true,
4029
4029
  "docs": {
4030
- "default": "public.ecr.aws/sam/build-go1.x:latest",
4030
+ "default": "- public.ecr.aws/sam/build-go1.x:latest",
4031
4031
  "remarks": "Might be needed for local build if all images need to come from own registry.\n\nNote that image should use yum as a package manager and have golang available.",
4032
4032
  "stability": "stable",
4033
4033
  "summary": "Image to use to build Golang lambda for custom resource, if download fails or is not wanted."
@@ -4052,7 +4052,7 @@
4052
4052
  "immutable": true,
4053
4053
  "locationInModule": {
4054
4054
  "filename": "src/index.ts",
4055
- "line": 81
4055
+ "line": 95
4056
4056
  },
4057
4057
  "name": "environment",
4058
4058
  "optional": true,
@@ -4068,7 +4068,43 @@
4068
4068
  {
4069
4069
  "abstract": true,
4070
4070
  "docs": {
4071
- "default": "512",
4071
+ "default": "- bootstrap",
4072
+ "stability": "stable",
4073
+ "summary": "The name of the lambda handler."
4074
+ },
4075
+ "immutable": true,
4076
+ "locationInModule": {
4077
+ "filename": "src/index.ts",
4078
+ "line": 90
4079
+ },
4080
+ "name": "lambdaHandler",
4081
+ "optional": true,
4082
+ "type": {
4083
+ "primitive": "string"
4084
+ }
4085
+ },
4086
+ {
4087
+ "abstract": true,
4088
+ "docs": {
4089
+ "default": "- lambda.Runtime.PROVIDED_AL2023",
4090
+ "stability": "stable",
4091
+ "summary": "The lambda function runtime environment."
4092
+ },
4093
+ "immutable": true,
4094
+ "locationInModule": {
4095
+ "filename": "src/index.ts",
4096
+ "line": 83
4097
+ },
4098
+ "name": "lambdaRuntime",
4099
+ "optional": true,
4100
+ "type": {
4101
+ "fqn": "aws-cdk-lib.aws_lambda.Runtime"
4102
+ }
4103
+ },
4104
+ {
4105
+ "abstract": true,
4106
+ "docs": {
4107
+ "default": "- 512",
4072
4108
  "remarks": "If you are deploying large files, you will need to increase this number\naccordingly.",
4073
4109
  "stability": "stable",
4074
4110
  "summary": "The amount of memory (in MiB) to allocate to the AWS Lambda function which replicates the files from the CDK bucket to the destination bucket."
@@ -4129,7 +4165,7 @@
4129
4165
  {
4130
4166
  "abstract": true,
4131
4167
  "docs": {
4132
- "default": "None",
4168
+ "default": "- None",
4133
4169
  "stability": "stable",
4134
4170
  "summary": "The VPC network to place the deployment lambda handler in."
4135
4171
  },
@@ -4175,7 +4211,7 @@
4175
4211
  "kind": "interface",
4176
4212
  "locationInModule": {
4177
4213
  "filename": "src/index.ts",
4178
- "line": 84
4214
+ "line": 98
4179
4215
  },
4180
4216
  "name": "IImageName",
4181
4217
  "properties": [
@@ -4189,7 +4225,7 @@
4189
4225
  "immutable": true,
4190
4226
  "locationInModule": {
4191
4227
  "filename": "src/index.ts",
4192
- "line": 90
4228
+ "line": 104
4193
4229
  },
4194
4230
  "name": "uri",
4195
4231
  "type": {
@@ -4205,7 +4241,7 @@
4205
4241
  },
4206
4242
  "locationInModule": {
4207
4243
  "filename": "src/index.ts",
4208
- "line": 95
4244
+ "line": 109
4209
4245
  },
4210
4246
  "name": "creds",
4211
4247
  "optional": true,
@@ -4228,7 +4264,7 @@
4228
4264
  },
4229
4265
  "locationInModule": {
4230
4266
  "filename": "src/index.ts",
4231
- "line": 125
4267
+ "line": 139
4232
4268
  },
4233
4269
  "parameters": [
4234
4270
  {
@@ -4263,7 +4299,7 @@
4263
4299
  "kind": "class",
4264
4300
  "locationInModule": {
4265
4301
  "filename": "src/index.ts",
4266
- "line": 123
4302
+ "line": 137
4267
4303
  },
4268
4304
  "name": "S3ArchiveName",
4269
4305
  "properties": [
@@ -4276,7 +4312,7 @@
4276
4312
  "immutable": true,
4277
4313
  "locationInModule": {
4278
4314
  "filename": "src/index.ts",
4279
- "line": 131
4315
+ "line": 145
4280
4316
  },
4281
4317
  "name": "uri",
4282
4318
  "overrides": "cdk-ecr-deployment.IImageName",
@@ -4292,7 +4328,7 @@
4292
4328
  },
4293
4329
  "locationInModule": {
4294
4330
  "filename": "src/index.ts",
4295
- "line": 125
4331
+ "line": 139
4296
4332
  },
4297
4333
  "name": "creds",
4298
4334
  "optional": true,
@@ -4305,6 +4341,6 @@
4305
4341
  "symbolId": "src/index:S3ArchiveName"
4306
4342
  }
4307
4343
  },
4308
- "version": "3.0.67",
4309
- "fingerprint": "k8VaAHgbL01P40MsvM/TxrM16ZtZ5hTfPy2XseJoJ2Q="
4344
+ "version": "3.0.68",
4345
+ "fingerprint": "cIiRzouasa/VXo+X4O78eybX3M2Rjk8Y94d31KM9v60="
4310
4346
  }
package/.jsii.tabl.json CHANGED
@@ -1 +1 @@
1
- {"version":"2","toolVersion":"5.4.21","snippets":{"33850328020507963bc7787401a169bb06e49f6132425a6d1529815c1554c645":{"translations":{"python":{"source":"from aws_cdk.aws_ecr_assets import DockerImageAsset\n\n\nimage = DockerImageAsset(self, \"CDKDockerImage\",\n directory=path.join(__dirname, \"docker\")\n)\n\n# Copy from cdk docker image asset to another ECR.\necrdeploy.ECRDeployment(self, \"DeployDockerImage1\",\n src=ecrdeploy.DockerImageName(image.image_uri),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\")\n)\n\n# Copy from docker registry to ECR.\necrdeploy.ECRDeployment(self, \"DeployDockerImage2\",\n src=ecrdeploy.DockerImageName(\"nginx:latest\"),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\")\n)\n\n# Copy from private docker registry to ECR.\n# The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\necrdeploy.ECRDeployment(self, \"DeployDockerImage3\",\n src=ecrdeploy.DockerImageName(\"javacs3/nginx:latest\", \"username:password\"),\n # src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n # src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\")\n).add_to_principal_policy(iam.PolicyStatement(\n effect=iam.Effect.ALLOW,\n actions=[\"secretsmanager:GetSecretValue\"\n ],\n resources=[\"*\"]\n))","version":"2"},"csharp":{"source":"using Amazon.CDK.AWS.Ecr.Assets;\n\n\nvar image = new DockerImageAsset(this, \"CDKDockerImage\", new DockerImageAssetProps {\n Directory = Join(__dirname, \"docker\")\n});\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\nnew ECRDeployment(this, \"DeployDockerImage1\", new ECRDeploymentProps {\n Src = new DockerImageName(image.ImageUri),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\")\n});\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\nnew ECRDeployment(this, \"DeployDockerImage2\", new ECRDeploymentProps {\n Src = new DockerImageName(\"nginx:latest\"),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\")\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ECRDeployment(this, \"DeployDockerImage3\", new ECRDeploymentProps {\n Src = new DockerImageName(\"javacs3/nginx:latest\", \"username:password\"),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\")\n}).AddToPrincipalPolicy(new PolicyStatement(new PolicyStatementProps {\n Effect = Effect.ALLOW,\n Actions = new [] { \"secretsmanager:GetSecretValue\" },\n Resources = new [] { \"*\" }\n}));","version":"1"},"java":{"source":"import software.amazon.awscdk.services.ecr.assets.DockerImageAsset;\n\n\nDockerImageAsset image = DockerImageAsset.Builder.create(this, \"CDKDockerImage\")\n .directory(join(__dirname, \"docker\"))\n .build();\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\nECRDeployment.Builder.create(this, \"DeployDockerImage1\")\n .src(new DockerImageName(image.getImageUri()))\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\", Aws.ACCOUNT_ID)))\n .build();\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\nECRDeployment.Builder.create(this, \"DeployDockerImage2\")\n .src(new DockerImageName(\"nginx:latest\"))\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\", Aws.ACCOUNT_ID)))\n .build();\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nECRDeployment.Builder.create(this, \"DeployDockerImage3\")\n .src(new DockerImageName(\"javacs3/nginx:latest\", \"username:password\"))\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\", Aws.ACCOUNT_ID)))\n .build().addToPrincipalPolicy(PolicyStatement.Builder.create()\n .effect(Effect.ALLOW)\n .actions(List.of(\"secretsmanager:GetSecretValue\"))\n .resources(List.of(\"*\"))\n .build());","version":"1"},"go":{"source":"import \"github.com/aws/aws-cdk-go/awscdk\"\n\n\nimage := awscdk.NewDockerImageAsset(this, jsii.String(\"CDKDockerImage\"), &DockerImageAssetProps{\n\tDirectory: path.join(__dirname, jsii.String(\"docker\")),\n})\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage1\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(image.ImageUri),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\", cdk.Aws_ACCOUNT_ID())),\n})\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage2\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(jsii.String(\"nginx:latest\")),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\", cdk.Aws_ACCOUNT_ID())),\n})\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage3\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(jsii.String(\"javacs3/nginx:latest\"), jsii.String(\"username:password\")),\n\t// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n\t// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\", cdk.Aws_ACCOUNT_ID())),\n}).AddToPrincipalPolicy(awscdk.Aws_iam.NewPolicyStatement(&PolicyStatementProps{\n\tEffect: awscdk.*Aws_iam.Effect_ALLOW,\n\tActions: []*string{\n\t\tjsii.String(\"secretsmanager:GetSecretValue\"),\n\t},\n\tResources: []*string{\n\t\tjsii.String(\"*\"),\n\t},\n}))","version":"1"},"$":{"source":"import { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));","version":"0"}},"location":{"api":{"api":"moduleReadme","moduleFqn":"cdk-ecr-deployment"},"field":{"field":"markdown","line":33}},"didCompile":true,"fqnsReferenced":["aws-cdk-lib.aws_ecr_assets.DockerImageAsset","aws-cdk-lib.aws_ecr_assets.DockerImageAsset#imageUri","aws-cdk-lib.aws_ecr_assets.DockerImageAssetProps","aws-cdk-lib.aws_iam.Effect","aws-cdk-lib.aws_iam.Effect#ALLOW","aws-cdk-lib.aws_iam.PolicyStatement","aws-cdk-lib.aws_iam.PolicyStatementProps","cdk-ecr-deployment.DockerImageName","cdk-ecr-deployment.ECRDeployment","cdk-ecr-deployment.ECRDeployment#addToPrincipalPolicy","cdk-ecr-deployment.ECRDeploymentProps","cdk-ecr-deployment.IImageName","constructs.Construct"],"fullSource":"// Hoisted imports begin after !show marker below\n/// !show\nimport { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n/// !hide\n// Hoisted imports ended before !hide marker above\n// Fixture with packages imported, but nothing else\nimport * as path from 'node:path';\nimport { Construct } from 'constructs';\n import * as ecrdeploy from 'cdk-ecr-deployment';\nimport {\n Stack,\n aws_iam as iam,\n} from 'aws-cdk-lib';\nimport * as cdk from 'aws-cdk-lib';\n\nclass Fixture extends Stack {\n constructor(scope: Construct, id: string) {\n super(scope, id);\n\n // Code snippet begins after !show marker below\n/// !show\n\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));\n/// !hide\n// Code snippet ended before !hide marker above\n }\n}","syntaxKindCounter":{"11":11,"16":3,"18":3,"80":51,"110":4,"209":2,"210":5,"211":21,"213":2,"214":11,"228":3,"239":3,"243":1,"244":3,"260":1,"261":1,"272":1,"273":1,"275":1,"276":1,"303":10,"312":1},"fqnsFingerprint":"9d435b1b2c76010f8a75490e073b59c4d776eb93ca570ed78a292aecd169403d"}}}
1
+ {"version":"2","toolVersion":"5.4.22","snippets":{"33850328020507963bc7787401a169bb06e49f6132425a6d1529815c1554c645":{"translations":{"python":{"source":"from aws_cdk.aws_ecr_assets import DockerImageAsset\n\n\nimage = DockerImageAsset(self, \"CDKDockerImage\",\n directory=path.join(__dirname, \"docker\")\n)\n\n# Copy from cdk docker image asset to another ECR.\necrdeploy.ECRDeployment(self, \"DeployDockerImage1\",\n src=ecrdeploy.DockerImageName(image.image_uri),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\")\n)\n\n# Copy from docker registry to ECR.\necrdeploy.ECRDeployment(self, \"DeployDockerImage2\",\n src=ecrdeploy.DockerImageName(\"nginx:latest\"),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\")\n)\n\n# Copy from private docker registry to ECR.\n# The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\necrdeploy.ECRDeployment(self, \"DeployDockerImage3\",\n src=ecrdeploy.DockerImageName(\"javacs3/nginx:latest\", \"username:password\"),\n # src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n # src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\")\n).add_to_principal_policy(iam.PolicyStatement(\n effect=iam.Effect.ALLOW,\n actions=[\"secretsmanager:GetSecretValue\"\n ],\n resources=[\"*\"]\n))","version":"2"},"csharp":{"source":"using Amazon.CDK.AWS.Ecr.Assets;\n\n\nvar image = new DockerImageAsset(this, \"CDKDockerImage\", new DockerImageAssetProps {\n Directory = Join(__dirname, \"docker\")\n});\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\nnew ECRDeployment(this, \"DeployDockerImage1\", new ECRDeploymentProps {\n Src = new DockerImageName(image.ImageUri),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\")\n});\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\nnew ECRDeployment(this, \"DeployDockerImage2\", new ECRDeploymentProps {\n Src = new DockerImageName(\"nginx:latest\"),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\")\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ECRDeployment(this, \"DeployDockerImage3\", new ECRDeploymentProps {\n Src = new DockerImageName(\"javacs3/nginx:latest\", \"username:password\"),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\")\n}).AddToPrincipalPolicy(new PolicyStatement(new PolicyStatementProps {\n Effect = Effect.ALLOW,\n Actions = new [] { \"secretsmanager:GetSecretValue\" },\n Resources = new [] { \"*\" }\n}));","version":"1"},"java":{"source":"import software.amazon.awscdk.services.ecr.assets.DockerImageAsset;\n\n\nDockerImageAsset image = DockerImageAsset.Builder.create(this, \"CDKDockerImage\")\n .directory(join(__dirname, \"docker\"))\n .build();\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\nECRDeployment.Builder.create(this, \"DeployDockerImage1\")\n .src(new DockerImageName(image.getImageUri()))\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\", Aws.ACCOUNT_ID)))\n .build();\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\nECRDeployment.Builder.create(this, \"DeployDockerImage2\")\n .src(new DockerImageName(\"nginx:latest\"))\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\", Aws.ACCOUNT_ID)))\n .build();\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nECRDeployment.Builder.create(this, \"DeployDockerImage3\")\n .src(new DockerImageName(\"javacs3/nginx:latest\", \"username:password\"))\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\", Aws.ACCOUNT_ID)))\n .build().addToPrincipalPolicy(PolicyStatement.Builder.create()\n .effect(Effect.ALLOW)\n .actions(List.of(\"secretsmanager:GetSecretValue\"))\n .resources(List.of(\"*\"))\n .build());","version":"1"},"go":{"source":"import \"github.com/aws/aws-cdk-go/awscdk\"\n\n\nimage := awscdk.NewDockerImageAsset(this, jsii.String(\"CDKDockerImage\"), &DockerImageAssetProps{\n\tDirectory: path.join(__dirname, jsii.String(\"docker\")),\n})\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage1\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(image.ImageUri),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\", cdk.Aws_ACCOUNT_ID())),\n})\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage2\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(jsii.String(\"nginx:latest\")),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\", cdk.Aws_ACCOUNT_ID())),\n})\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage3\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(jsii.String(\"javacs3/nginx:latest\"), jsii.String(\"username:password\")),\n\t// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n\t// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\", cdk.Aws_ACCOUNT_ID())),\n}).AddToPrincipalPolicy(awscdk.Aws_iam.NewPolicyStatement(&PolicyStatementProps{\n\tEffect: awscdk.*Aws_iam.Effect_ALLOW,\n\tActions: []*string{\n\t\tjsii.String(\"secretsmanager:GetSecretValue\"),\n\t},\n\tResources: []*string{\n\t\tjsii.String(\"*\"),\n\t},\n}))","version":"1"},"$":{"source":"import { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));","version":"0"}},"location":{"api":{"api":"moduleReadme","moduleFqn":"cdk-ecr-deployment"},"field":{"field":"markdown","line":33}},"didCompile":true,"fqnsReferenced":["aws-cdk-lib.aws_ecr_assets.DockerImageAsset","aws-cdk-lib.aws_ecr_assets.DockerImageAsset#imageUri","aws-cdk-lib.aws_ecr_assets.DockerImageAssetProps","aws-cdk-lib.aws_iam.Effect","aws-cdk-lib.aws_iam.Effect#ALLOW","aws-cdk-lib.aws_iam.PolicyStatement","aws-cdk-lib.aws_iam.PolicyStatementProps","cdk-ecr-deployment.DockerImageName","cdk-ecr-deployment.ECRDeployment","cdk-ecr-deployment.ECRDeployment#addToPrincipalPolicy","cdk-ecr-deployment.ECRDeploymentProps","cdk-ecr-deployment.IImageName","constructs.Construct"],"fullSource":"// Hoisted imports begin after !show marker below\n/// !show\nimport { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n/// !hide\n// Hoisted imports ended before !hide marker above\n// Fixture with packages imported, but nothing else\nimport * as path from 'node:path';\nimport { Construct } from 'constructs';\n import * as ecrdeploy from 'cdk-ecr-deployment';\nimport {\n Stack,\n aws_iam as iam,\n} from 'aws-cdk-lib';\nimport * as cdk from 'aws-cdk-lib';\n\nclass Fixture extends Stack {\n constructor(scope: Construct, id: string) {\n super(scope, id);\n\n // Code snippet begins after !show marker below\n/// !show\n\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));\n/// !hide\n// Code snippet ended before !hide marker above\n }\n}","syntaxKindCounter":{"11":11,"16":3,"18":3,"80":51,"110":4,"209":2,"210":5,"211":21,"213":2,"214":11,"228":3,"239":3,"243":1,"244":3,"260":1,"261":1,"272":1,"273":1,"275":1,"276":1,"303":10,"312":1},"fqnsFingerprint":"49c3b893d162beea6924f8cf712357c6390954e35a181bc42817e82aa4070d12"}}}
package/API.md CHANGED
@@ -77,6 +77,8 @@ new ECRDeployment(scope: Construct, id: string, props: ECRDeploymentProps)
77
77
  * **src** (<code>[IImageName](#cdk-ecr-deployment-iimagename)</code>) The source of the docker image.
78
78
  * **buildImage** (<code>string</code>) Image to use to build Golang lambda for custom resource, if download fails or is not wanted. __*Default*__: public.ecr.aws/sam/build-go1.x:latest
79
79
  * **environment** (<code>Map<string, string></code>) The environment variable to set. __*Optional*__
80
+ * **lambdaHandler** (<code>string</code>) The name of the lambda handler. __*Default*__: bootstrap
81
+ * **lambdaRuntime** (<code>[aws_lambda.Runtime](#aws-cdk-lib-aws-lambda-runtime)</code>) The lambda function runtime environment. __*Default*__: lambda.Runtime.PROVIDED_AL2023
80
82
  * **memoryLimit** (<code>number</code>) The amount of memory (in MiB) to allocate to the AWS Lambda function which replicates the files from the CDK bucket to the destination bucket. __*Default*__: 512
81
83
  * **role** (<code>[aws_iam.IRole](#aws-cdk-lib-aws-iam-irole)</code>) Execution role associated with this function. __*Default*__: A role is automatically created
82
84
  * **securityGroups** (<code>Array<[aws_ec2.SecurityGroup](#aws-cdk-lib-aws-ec2-securitygroup)></code>) The list of security groups to associate with the Lambda's network interfaces. __*Default*__: If the function is placed within a VPC and a security group is not specified, either by this or securityGroup prop, a dedicated security group will be created for this function.
@@ -146,6 +148,8 @@ Name | Type | Description
146
148
  **src** | <code>[IImageName](#cdk-ecr-deployment-iimagename)</code> | The source of the docker image.
147
149
  **buildImage**? | <code>string</code> | Image to use to build Golang lambda for custom resource, if download fails or is not wanted.<br/>__*Default*__: public.ecr.aws/sam/build-go1.x:latest
148
150
  **environment**? | <code>Map<string, string></code> | The environment variable to set.<br/>__*Optional*__
151
+ **lambdaHandler**? | <code>string</code> | The name of the lambda handler.<br/>__*Default*__: bootstrap
152
+ **lambdaRuntime**? | <code>[aws_lambda.Runtime](#aws-cdk-lib-aws-lambda-runtime)</code> | The lambda function runtime environment.<br/>__*Default*__: lambda.Runtime.PROVIDED_AL2023
149
153
  **memoryLimit**? | <code>number</code> | The amount of memory (in MiB) to allocate to the AWS Lambda function which replicates the files from the CDK bucket to the destination bucket.<br/>__*Default*__: 512
150
154
  **role**? | <code>[aws_iam.IRole](#aws-cdk-lib-aws-iam-irole)</code> | Execution role associated with this function.<br/>__*Default*__: A role is automatically created
151
155
  **securityGroups**? | <code>Array<[aws_ec2.SecurityGroup](#aws-cdk-lib-aws-ec2-securitygroup)></code> | The list of security groups to associate with the Lambda's network interfaces.<br/>__*Default*__: If the function is placed within a VPC and a security group is not specified, either by this or securityGroup prop, a dedicated security group will be created for this function.
package/lib/index.d.ts CHANGED
@@ -1,4 +1,4 @@
1
- import { aws_ec2 as ec2, aws_iam as iam } from 'aws-cdk-lib';
1
+ import { aws_ec2 as ec2, aws_iam as iam, aws_lambda as lambda } from 'aws-cdk-lib';
2
2
  import { PolicyStatement, AddToPrincipalPolicyResult } from 'aws-cdk-lib/aws-iam';
3
3
  import { Construct } from 'constructs';
4
4
  export interface ECRDeploymentProps {
@@ -9,7 +9,7 @@ export interface ECRDeploymentProps {
9
9
  *
10
10
  * Note that image should use yum as a package manager and have golang available.
11
11
  *
12
- * @default public.ecr.aws/sam/build-go1.x:latest
12
+ * @default - public.ecr.aws/sam/build-go1.x:latest
13
13
  */
14
14
  readonly buildImage?: string;
15
15
  /**
@@ -27,7 +27,7 @@ export interface ECRDeploymentProps {
27
27
  * If you are deploying large files, you will need to increase this number
28
28
  * accordingly.
29
29
  *
30
- * @default 512
30
+ * @default - 512
31
31
  */
32
32
  readonly memoryLimit?: number;
33
33
  /**
@@ -39,7 +39,7 @@ export interface ECRDeploymentProps {
39
39
  /**
40
40
  * The VPC network to place the deployment lambda handler in.
41
41
  *
42
- * @default None
42
+ * @default - None
43
43
  */
44
44
  readonly vpc?: ec2.IVpc;
45
45
  /**
@@ -59,6 +59,18 @@ export interface ECRDeploymentProps {
59
59
  * group will be created for this function.
60
60
  */
61
61
  readonly securityGroups?: ec2.SecurityGroup[];
62
+ /**
63
+ * The lambda function runtime environment.
64
+ *
65
+ * @default - lambda.Runtime.PROVIDED_AL2023
66
+ */
67
+ readonly lambdaRuntime?: lambda.Runtime;
68
+ /**
69
+ * The name of the lambda handler.
70
+ *
71
+ * @default - bootstrap
72
+ */
73
+ readonly lambdaHandler?: string;
62
74
  /**
63
75
  * The environment variable to set
64
76
  */
package/lib/index.js CHANGED
@@ -37,7 +37,7 @@ class DockerImageName {
37
37
  }
38
38
  exports.DockerImageName = DockerImageName;
39
39
  _a = JSII_RTTI_SYMBOL_1;
40
- DockerImageName[_a] = { fqn: "cdk-ecr-deployment.DockerImageName", version: "3.0.67" };
40
+ DockerImageName[_a] = { fqn: "cdk-ecr-deployment.DockerImageName", version: "3.0.68" };
41
41
  class S3ArchiveName {
42
42
  constructor(p, ref, creds) {
43
43
  this.creds = creds;
@@ -50,7 +50,7 @@ class S3ArchiveName {
50
50
  }
51
51
  exports.S3ArchiveName = S3ArchiveName;
52
52
  _b = JSII_RTTI_SYMBOL_1;
53
- S3ArchiveName[_b] = { fqn: "cdk-ecr-deployment.S3ArchiveName", version: "3.0.67" };
53
+ S3ArchiveName[_b] = { fqn: "cdk-ecr-deployment.S3ArchiveName", version: "3.0.68" };
54
54
  class ECRDeployment extends constructs_1.Construct {
55
55
  constructor(scope, id, props) {
56
56
  super(scope, id);
@@ -58,8 +58,8 @@ class ECRDeployment extends constructs_1.Construct {
58
58
  this.handler = new aws_cdk_lib_1.aws_lambda.SingletonFunction(this, 'CustomResourceHandler', {
59
59
  uuid: this.renderSingletonUuid(memoryLimit),
60
60
  code: getCode(props.buildImage ?? 'golang:1'),
61
- runtime: aws_cdk_lib_1.aws_lambda.Runtime.PROVIDED_AL2023,
62
- handler: 'bootstrap',
61
+ runtime: props.lambdaRuntime ?? aws_cdk_lib_1.aws_lambda.Runtime.PROVIDED_AL2023,
62
+ handler: props.lambdaHandler ?? 'bootstrap',
63
63
  environment: props.environment,
64
64
  lambdaPurpose: 'Custom::CDKECRDeployment',
65
65
  timeout: aws_cdk_lib_1.Duration.minutes(15),
@@ -134,5 +134,5 @@ class ECRDeployment extends constructs_1.Construct {
134
134
  }
135
135
  exports.ECRDeployment = ECRDeployment;
136
136
  _c = JSII_RTTI_SYMBOL_1;
137
- ECRDeployment[_c] = { fqn: "cdk-ecr-deployment.ECRDeployment", version: "3.0.67" };
138
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;AAAA,qEAAqE;AACrE,sCAAsC;AAGtC,+CAA+C;AAC/C,6BAA6B;AAC7B,6CAAoH;AAEpH,2CAAuC;AACvC,qCAAmD;AAwFnD,SAAS,OAAO,CAAC,UAAkB;IACjC,IAAI,IAAA,gCAAuB,GAAE,EAAE;QAC7B,IAAI;YACF,MAAM,aAAa,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,sBAAsB,CAAC,CAAC;YACnE,MAAM,YAAY,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,eAAe,CAAC,CAAC;YAC3D,aAAa,CAAC,YAAY,CAAC,OAAO,CAAC,KAAK,EAAE,CAAC,aAAa,EAAE,YAAY,CAAC,CAAC,CAAC;YAEzE,OAAO,wBAAM,CAAC,IAAI,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC;SAC5C;QAAC,OAAO,GAAG,EAAE;YACZ,OAAO,CAAC,IAAI,CAAC,gCAAgC,GAAG,EAAE,CAAC,CAAC;SACrD;KACF;IAED,OAAO,wBAAM,CAAC,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,WAAW,CAAC,EAAE;QACpE,SAAS,EAAE;YACT,UAAU;SACX;KACF,CAAC,CAAC;AACL,CAAC;AAED,MAAa,eAAe;IAC1B,YAA2B,IAAY,EAAS,KAAc;QAAnC,SAAI,GAAJ,IAAI,CAAQ;QAAS,UAAK,GAAL,KAAK,CAAS;IAAI,CAAC;IACnE,IAAW,GAAG,KAAa,OAAO,YAAY,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;;AAF9D,0CAGC;;;AAED,MAAa,aAAa;IAExB,YAAmB,CAAS,EAAE,GAAY,EAAS,KAAc;QAAd,UAAK,GAAL,KAAK,CAAS;QAC/D,IAAI,CAAC,IAAI,GAAG,CAAC,CAAC;QACd,IAAI,GAAG,EAAE;YACP,IAAI,CAAC,IAAI,IAAI,GAAG,GAAG,GAAG,CAAC;SACxB;IACH,CAAC;IACD,IAAW,GAAG,KAAa,OAAO,QAAQ,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;;AAR1D,sCASC;;;AAED,MAAa,aAAc,SAAQ,sBAAS;IAG1C,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAyB;QACjE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,MAAM,WAAW,GAAG,KAAK,CAAC,WAAW,IAAI,GAAG,CAAC;QAC7C,IAAI,CAAC,OAAO,GAAG,IAAI,wBAAM,CAAC,iBAAiB,CAAC,IAAI,EAAE,uBAAuB,EAAE;YACzE,IAAI,EAAE,IAAI,CAAC,mBAAmB,CAAC,WAAW,CAAC;YAC3C,IAAI,EAAE,OAAO,CAAC,KAAK,CAAC,UAAU,IAAI,UAAU,CAAC;YAC7C,OAAO,EAAE,wBAAM,CAAC,OAAO,CAAC,eAAe;YACvC,OAAO,EAAE,WAAW;YACpB,WAAW,EAAE,KAAK,CAAC,WAAW;YAC9B,aAAa,EAAE,0BAA0B;YACzC,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YAC7B,IAAI,EAAE,KAAK,CAAC,IAAI;YAChB,UAAU,EAAE,WAAW;YACvB,GAAG,EAAE,KAAK,CAAC,GAAG;YACd,UAAU,EAAE,KAAK,CAAC,UAAU;YAC5B,cAAc,EAAE,KAAK,CAAC,cAAc;SACrC,CAAC,CAAC;QAEH,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,WAAW,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;SAAE;QAE7F,WAAW,CAAC,oBAAoB,CAC9B,IAAI,qBAAG,CAAC,eAAe,CAAC;YACtB,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,2BAA2B;gBAC3B,iCAAiC;gBACjC,4BAA4B;gBAC5B,yBAAyB;gBACzB,0BAA0B;gBAC1B,gBAAgB;gBAChB,oBAAoB;gBACpB,mBAAmB;gBACnB,yBAAyB;gBACzB,+BAA+B;gBAC/B,yBAAyB;gBACzB,qBAAqB;gBACrB,yBAAyB;gBACzB,cAAc;aACf;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QACN,WAAW,CAAC,oBAAoB,CAAC,IAAI,qBAAG,CAAC,eAAe,CAAC;YACvD,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,cAAc;aACf;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QAEJ,IAAI,4BAAc,CAAC,IAAI,EAAE,gBAAgB,EAAE;YACzC,YAAY,EAAE,IAAI,CAAC,OAAO,CAAC,WAAW;YACtC,YAAY,EAAE,6BAA6B;YAC3C,UAAU,EAAE;gBACV,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,GAAG;gBACvB,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,KAAK;gBACzB,SAAS,EAAE,KAAK,CAAC,IAAI,CAAC,GAAG;gBACzB,SAAS,EAAE,KAAK,CAAC,IAAI,CAAC,KAAK;aAC5B;SACF,CAAC,CAAC;IACL,CAAC;IAEM,oBAAoB,CAAC,SAA0B;QACpD,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,WAAW,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;SAAE;QAE7F,OAAO,WAAW,CAAC,oBAAoB,CAAC,SAAS,CAAC,CAAC;IACrD,CAAC;IAEO,mBAAmB,CAAC,WAAoB;QAC9C,IAAI,IAAI,GAAG,sCAAsC,CAAC;QAElD,0EAA0E;QAC1E,2EAA2E;QAC3E,4CAA4C;QAC5C,IAAI,WAAW,EAAE;YACf,IAAI,mBAAK,CAAC,YAAY,CAAC,WAAW,CAAC,EAAE;gBACnC,MAAM,IAAI,KAAK,CAAC,mHAAmH,CAAC,CAAC;aACtI;YAED,IAAI,IAAI,IAAI,WAAW,CAAC,QAAQ,EAAE,KAAK,CAAC;SACzC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;;AAvFH,sCAwFC","sourcesContent":["// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n// SPDX-License-Identifier: Apache-2.0\n\n\nimport * as child_process from 'child_process';\nimport * as path from 'path';\nimport { aws_ec2 as ec2, aws_iam as iam, aws_lambda as lambda, Duration, CustomResource, Token } from 'aws-cdk-lib';\nimport { PolicyStatement, AddToPrincipalPolicyResult } from 'aws-cdk-lib/aws-iam';\nimport { Construct } from 'constructs';\nimport { shouldUsePrebuiltLambda } from './config';\n\nexport interface ECRDeploymentProps {\n\n  /**\n   * Image to use to build Golang lambda for custom resource, if download fails or is not wanted.\n   *\n   * Might be needed for local build if all images need to come from own registry.\n   *\n   * Note that image should use yum as a package manager and have golang available.\n   *\n   * @default public.ecr.aws/sam/build-go1.x:latest\n   */\n  readonly buildImage?: string;\n  /**\n   * The source of the docker image.\n   */\n  readonly src: IImageName;\n\n  /**\n   * The destination of the docker image.\n   */\n  readonly dest: IImageName;\n\n  /**\n   * The amount of memory (in MiB) to allocate to the AWS Lambda function which\n   * replicates the files from the CDK bucket to the destination bucket.\n   *\n   * If you are deploying large files, you will need to increase this number\n   * accordingly.\n   *\n   * @default 512\n   */\n  readonly memoryLimit?: number;\n\n  /**\n   * Execution role associated with this function\n   *\n   * @default - A role is automatically created\n   */\n  readonly role?: iam.IRole;\n\n  /**\n   * The VPC network to place the deployment lambda handler in.\n   *\n   * @default None\n   */\n  readonly vpc?: ec2.IVpc;\n\n  /**\n   * Where in the VPC to place the deployment lambda handler.\n   * Only used if 'vpc' is supplied.\n   *\n   * @default - the Vpc default strategy if not specified\n   */\n  readonly vpcSubnets?: ec2.SubnetSelection;\n\n  /**\n   * The list of security groups to associate with the Lambda's network interfaces.\n   *\n   * Only used if 'vpc' is supplied.\n   *\n   * @default - If the function is placed within a VPC and a security group is\n   * not specified, either by this or securityGroup prop, a dedicated security\n   * group will be created for this function.\n   */\n  readonly securityGroups?: ec2.SecurityGroup[];\n\n  /**\n   * The environment variable to set\n   */\n  readonly environment?: { [key: string]: string };\n}\n\nexport interface IImageName {\n  /**\n   *  The uri of the docker image.\n   *\n   *  The uri spec follows https://github.com/containers/skopeo\n   */\n  readonly uri: string;\n\n  /**\n   * The credentials of the docker image. Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`\n   */\n  creds?: string;\n}\n\nfunction getCode(buildImage: string): lambda.AssetCode {\n  if (shouldUsePrebuiltLambda()) {\n    try {\n      const installScript = path.join(__dirname, '../lambda/install.js');\n      const prebuiltPath = path.join(__dirname, '../lambda/out');\n      child_process.execFileSync(process.argv0, [installScript, prebuiltPath]);\n\n      return lambda.Code.fromAsset(prebuiltPath);\n    } catch (err) {\n      console.warn(`Can not get prebuilt lambda: ${err}`);\n    }\n  }\n\n  return lambda.Code.fromDockerBuild(path.join(__dirname, '../lambda'), {\n    buildArgs: {\n      buildImage,\n    },\n  });\n}\n\nexport class DockerImageName implements IImageName {\n  public constructor(private name: string, public creds?: string) { }\n  public get uri(): string { return `docker://${this.name}`; }\n}\n\nexport class S3ArchiveName implements IImageName {\n  private name: string;\n  public constructor(p: string, ref?: string, public creds?: string) {\n    this.name = p;\n    if (ref) {\n      this.name += ':' + ref;\n    }\n  }\n  public get uri(): string { return `s3://${this.name}`; }\n}\n\nexport class ECRDeployment extends Construct {\n  private handler: lambda.SingletonFunction;\n\n  constructor(scope: Construct, id: string, props: ECRDeploymentProps) {\n    super(scope, id);\n    const memoryLimit = props.memoryLimit ?? 512;\n    this.handler = new lambda.SingletonFunction(this, 'CustomResourceHandler', {\n      uuid: this.renderSingletonUuid(memoryLimit),\n      code: getCode(props.buildImage ?? 'golang:1'),\n      runtime: lambda.Runtime.PROVIDED_AL2023,\n      handler: 'bootstrap',\n      environment: props.environment,\n      lambdaPurpose: 'Custom::CDKECRDeployment',\n      timeout: Duration.minutes(15),\n      role: props.role,\n      memorySize: memoryLimit,\n      vpc: props.vpc,\n      vpcSubnets: props.vpcSubnets,\n      securityGroups: props.securityGroups,\n    });\n\n    const handlerRole = this.handler.role;\n    if (!handlerRole) { throw new Error('lambda.SingletonFunction should have created a Role'); }\n\n    handlerRole.addToPrincipalPolicy(\n      new iam.PolicyStatement({\n        effect: iam.Effect.ALLOW,\n        actions: [\n          'ecr:GetAuthorizationToken',\n          'ecr:BatchCheckLayerAvailability',\n          'ecr:GetDownloadUrlForLayer',\n          'ecr:GetRepositoryPolicy',\n          'ecr:DescribeRepositories',\n          'ecr:ListImages',\n          'ecr:DescribeImages',\n          'ecr:BatchGetImage',\n          'ecr:ListTagsForResource',\n          'ecr:DescribeImageScanFindings',\n          'ecr:InitiateLayerUpload',\n          'ecr:UploadLayerPart',\n          'ecr:CompleteLayerUpload',\n          'ecr:PutImage',\n        ],\n        resources: ['*'],\n      }));\n    handlerRole.addToPrincipalPolicy(new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions: [\n        's3:GetObject',\n      ],\n      resources: ['*'],\n    }));\n\n    new CustomResource(this, 'CustomResource', {\n      serviceToken: this.handler.functionArn,\n      resourceType: 'Custom::CDKBucketDeployment',\n      properties: {\n        SrcImage: props.src.uri,\n        SrcCreds: props.src.creds,\n        DestImage: props.dest.uri,\n        DestCreds: props.dest.creds,\n      },\n    });\n  }\n\n  public addToPrincipalPolicy(statement: PolicyStatement): AddToPrincipalPolicyResult {\n    const handlerRole = this.handler.role;\n    if (!handlerRole) { throw new Error('lambda.SingletonFunction should have created a Role'); }\n\n    return handlerRole.addToPrincipalPolicy(statement);\n  }\n\n  private renderSingletonUuid(memoryLimit?: number) {\n    let uuid = 'bd07c930-edb9-4112-a20f-03f096f53666';\n\n    // if user specify a custom memory limit, define another singleton handler\n    // with this configuration. otherwise, it won't be possible to use multiple\n    // configurations since we have a singleton.\n    if (memoryLimit) {\n      if (Token.isUnresolved(memoryLimit)) {\n        throw new Error('Can\\'t use tokens when specifying \"memoryLimit\" since we use it to identify the singleton custom resource handler');\n      }\n\n      uuid += `-${memoryLimit.toString()}MiB`;\n    }\n\n    return uuid;\n  }\n}\n"]}
137
+ ECRDeployment[_c] = { fqn: "cdk-ecr-deployment.ECRDeployment", version: "3.0.68" };
138
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;AAAA,qEAAqE;AACrE,sCAAsC;AAGtC,+CAA+C;AAC/C,6BAA6B;AAC7B,6CAAoH;AAEpH,2CAAuC;AACvC,qCAAmD;AAsGnD,SAAS,OAAO,CAAC,UAAkB;IACjC,IAAI,IAAA,gCAAuB,GAAE,EAAE;QAC7B,IAAI;YACF,MAAM,aAAa,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,sBAAsB,CAAC,CAAC;YACnE,MAAM,YAAY,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,eAAe,CAAC,CAAC;YAC3D,aAAa,CAAC,YAAY,CAAC,OAAO,CAAC,KAAK,EAAE,CAAC,aAAa,EAAE,YAAY,CAAC,CAAC,CAAC;YAEzE,OAAO,wBAAM,CAAC,IAAI,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC;SAC5C;QAAC,OAAO,GAAG,EAAE;YACZ,OAAO,CAAC,IAAI,CAAC,gCAAgC,GAAG,EAAE,CAAC,CAAC;SACrD;KACF;IAED,OAAO,wBAAM,CAAC,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,WAAW,CAAC,EAAE;QACpE,SAAS,EAAE;YACT,UAAU;SACX;KACF,CAAC,CAAC;AACL,CAAC;AAED,MAAa,eAAe;IAC1B,YAA2B,IAAY,EAAS,KAAc;QAAnC,SAAI,GAAJ,IAAI,CAAQ;QAAS,UAAK,GAAL,KAAK,CAAS;IAAI,CAAC;IACnE,IAAW,GAAG,KAAa,OAAO,YAAY,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;;AAF9D,0CAGC;;;AAED,MAAa,aAAa;IAExB,YAAmB,CAAS,EAAE,GAAY,EAAS,KAAc;QAAd,UAAK,GAAL,KAAK,CAAS;QAC/D,IAAI,CAAC,IAAI,GAAG,CAAC,CAAC;QACd,IAAI,GAAG,EAAE;YACP,IAAI,CAAC,IAAI,IAAI,GAAG,GAAG,GAAG,CAAC;SACxB;IACH,CAAC;IACD,IAAW,GAAG,KAAa,OAAO,QAAQ,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;;AAR1D,sCASC;;;AAED,MAAa,aAAc,SAAQ,sBAAS;IAG1C,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAyB;QACjE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,MAAM,WAAW,GAAG,KAAK,CAAC,WAAW,IAAI,GAAG,CAAC;QAC7C,IAAI,CAAC,OAAO,GAAG,IAAI,wBAAM,CAAC,iBAAiB,CAAC,IAAI,EAAE,uBAAuB,EAAE;YACzE,IAAI,EAAE,IAAI,CAAC,mBAAmB,CAAC,WAAW,CAAC;YAC3C,IAAI,EAAE,OAAO,CAAC,KAAK,CAAC,UAAU,IAAI,UAAU,CAAC;YAC7C,OAAO,EAAE,KAAK,CAAC,aAAa,IAAI,wBAAM,CAAC,OAAO,CAAC,eAAe;YAC9D,OAAO,EAAE,KAAK,CAAC,aAAa,IAAI,WAAW;YAC3C,WAAW,EAAE,KAAK,CAAC,WAAW;YAC9B,aAAa,EAAE,0BAA0B;YACzC,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YAC7B,IAAI,EAAE,KAAK,CAAC,IAAI;YAChB,UAAU,EAAE,WAAW;YACvB,GAAG,EAAE,KAAK,CAAC,GAAG;YACd,UAAU,EAAE,KAAK,CAAC,UAAU;YAC5B,cAAc,EAAE,KAAK,CAAC,cAAc;SACrC,CAAC,CAAC;QAEH,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,WAAW,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;SAAE;QAE7F,WAAW,CAAC,oBAAoB,CAC9B,IAAI,qBAAG,CAAC,eAAe,CAAC;YACtB,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,2BAA2B;gBAC3B,iCAAiC;gBACjC,4BAA4B;gBAC5B,yBAAyB;gBACzB,0BAA0B;gBAC1B,gBAAgB;gBAChB,oBAAoB;gBACpB,mBAAmB;gBACnB,yBAAyB;gBACzB,+BAA+B;gBAC/B,yBAAyB;gBACzB,qBAAqB;gBACrB,yBAAyB;gBACzB,cAAc;aACf;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QACN,WAAW,CAAC,oBAAoB,CAAC,IAAI,qBAAG,CAAC,eAAe,CAAC;YACvD,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,cAAc;aACf;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QAEJ,IAAI,4BAAc,CAAC,IAAI,EAAE,gBAAgB,EAAE;YACzC,YAAY,EAAE,IAAI,CAAC,OAAO,CAAC,WAAW;YACtC,YAAY,EAAE,6BAA6B;YAC3C,UAAU,EAAE;gBACV,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,GAAG;gBACvB,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,KAAK;gBACzB,SAAS,EAAE,KAAK,CAAC,IAAI,CAAC,GAAG;gBACzB,SAAS,EAAE,KAAK,CAAC,IAAI,CAAC,KAAK;aAC5B;SACF,CAAC,CAAC;IACL,CAAC;IAEM,oBAAoB,CAAC,SAA0B;QACpD,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,WAAW,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;SAAE;QAE7F,OAAO,WAAW,CAAC,oBAAoB,CAAC,SAAS,CAAC,CAAC;IACrD,CAAC;IAEO,mBAAmB,CAAC,WAAoB;QAC9C,IAAI,IAAI,GAAG,sCAAsC,CAAC;QAElD,0EAA0E;QAC1E,2EAA2E;QAC3E,4CAA4C;QAC5C,IAAI,WAAW,EAAE;YACf,IAAI,mBAAK,CAAC,YAAY,CAAC,WAAW,CAAC,EAAE;gBACnC,MAAM,IAAI,KAAK,CAAC,mHAAmH,CAAC,CAAC;aACtI;YAED,IAAI,IAAI,IAAI,WAAW,CAAC,QAAQ,EAAE,KAAK,CAAC;SACzC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;;AAvFH,sCAwFC","sourcesContent":["// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n// SPDX-License-Identifier: Apache-2.0\n\n\nimport * as child_process from 'child_process';\nimport * as path from 'path';\nimport { aws_ec2 as ec2, aws_iam as iam, aws_lambda as lambda, Duration, CustomResource, Token } from 'aws-cdk-lib';\nimport { PolicyStatement, AddToPrincipalPolicyResult } from 'aws-cdk-lib/aws-iam';\nimport { Construct } from 'constructs';\nimport { shouldUsePrebuiltLambda } from './config';\n\nexport interface ECRDeploymentProps {\n\n  /**\n   * Image to use to build Golang lambda for custom resource, if download fails or is not wanted.\n   *\n   * Might be needed for local build if all images need to come from own registry.\n   *\n   * Note that image should use yum as a package manager and have golang available.\n   *\n   * @default - public.ecr.aws/sam/build-go1.x:latest\n   */\n  readonly buildImage?: string;\n  /**\n   * The source of the docker image.\n   */\n  readonly src: IImageName;\n\n  /**\n   * The destination of the docker image.\n   */\n  readonly dest: IImageName;\n\n  /**\n   * The amount of memory (in MiB) to allocate to the AWS Lambda function which\n   * replicates the files from the CDK bucket to the destination bucket.\n   *\n   * If you are deploying large files, you will need to increase this number\n   * accordingly.\n   *\n   * @default - 512\n   */\n  readonly memoryLimit?: number;\n\n  /**\n   * Execution role associated with this function\n   *\n   * @default - A role is automatically created\n   */\n  readonly role?: iam.IRole;\n\n  /**\n   * The VPC network to place the deployment lambda handler in.\n   *\n   * @default - None\n   */\n  readonly vpc?: ec2.IVpc;\n\n  /**\n   * Where in the VPC to place the deployment lambda handler.\n   * Only used if 'vpc' is supplied.\n   *\n   * @default - the Vpc default strategy if not specified\n   */\n  readonly vpcSubnets?: ec2.SubnetSelection;\n\n  /**\n   * The list of security groups to associate with the Lambda's network interfaces.\n   *\n   * Only used if 'vpc' is supplied.\n   *\n   * @default - If the function is placed within a VPC and a security group is\n   * not specified, either by this or securityGroup prop, a dedicated security\n   * group will be created for this function.\n   */\n  readonly securityGroups?: ec2.SecurityGroup[];\n\n  /**\n   * The lambda function runtime environment.\n   *\n   * @default - lambda.Runtime.PROVIDED_AL2023\n   */\n  readonly lambdaRuntime?: lambda.Runtime;\n\n  /**\n   * The name of the lambda handler.\n   *\n   * @default - bootstrap\n   */\n  readonly lambdaHandler?: string;\n\n  /**\n   * The environment variable to set\n   */\n  readonly environment?: { [key: string]: string };\n}\n\nexport interface IImageName {\n  /**\n   *  The uri of the docker image.\n   *\n   *  The uri spec follows https://github.com/containers/skopeo\n   */\n  readonly uri: string;\n\n  /**\n   * The credentials of the docker image. Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`\n   */\n  creds?: string;\n}\n\nfunction getCode(buildImage: string): lambda.AssetCode {\n  if (shouldUsePrebuiltLambda()) {\n    try {\n      const installScript = path.join(__dirname, '../lambda/install.js');\n      const prebuiltPath = path.join(__dirname, '../lambda/out');\n      child_process.execFileSync(process.argv0, [installScript, prebuiltPath]);\n\n      return lambda.Code.fromAsset(prebuiltPath);\n    } catch (err) {\n      console.warn(`Can not get prebuilt lambda: ${err}`);\n    }\n  }\n\n  return lambda.Code.fromDockerBuild(path.join(__dirname, '../lambda'), {\n    buildArgs: {\n      buildImage,\n    },\n  });\n}\n\nexport class DockerImageName implements IImageName {\n  public constructor(private name: string, public creds?: string) { }\n  public get uri(): string { return `docker://${this.name}`; }\n}\n\nexport class S3ArchiveName implements IImageName {\n  private name: string;\n  public constructor(p: string, ref?: string, public creds?: string) {\n    this.name = p;\n    if (ref) {\n      this.name += ':' + ref;\n    }\n  }\n  public get uri(): string { return `s3://${this.name}`; }\n}\n\nexport class ECRDeployment extends Construct {\n  private handler: lambda.SingletonFunction;\n\n  constructor(scope: Construct, id: string, props: ECRDeploymentProps) {\n    super(scope, id);\n    const memoryLimit = props.memoryLimit ?? 512;\n    this.handler = new lambda.SingletonFunction(this, 'CustomResourceHandler', {\n      uuid: this.renderSingletonUuid(memoryLimit),\n      code: getCode(props.buildImage ?? 'golang:1'),\n      runtime: props.lambdaRuntime ?? lambda.Runtime.PROVIDED_AL2023,\n      handler: props.lambdaHandler ?? 'bootstrap',\n      environment: props.environment,\n      lambdaPurpose: 'Custom::CDKECRDeployment',\n      timeout: Duration.minutes(15),\n      role: props.role,\n      memorySize: memoryLimit,\n      vpc: props.vpc,\n      vpcSubnets: props.vpcSubnets,\n      securityGroups: props.securityGroups,\n    });\n\n    const handlerRole = this.handler.role;\n    if (!handlerRole) { throw new Error('lambda.SingletonFunction should have created a Role'); }\n\n    handlerRole.addToPrincipalPolicy(\n      new iam.PolicyStatement({\n        effect: iam.Effect.ALLOW,\n        actions: [\n          'ecr:GetAuthorizationToken',\n          'ecr:BatchCheckLayerAvailability',\n          'ecr:GetDownloadUrlForLayer',\n          'ecr:GetRepositoryPolicy',\n          'ecr:DescribeRepositories',\n          'ecr:ListImages',\n          'ecr:DescribeImages',\n          'ecr:BatchGetImage',\n          'ecr:ListTagsForResource',\n          'ecr:DescribeImageScanFindings',\n          'ecr:InitiateLayerUpload',\n          'ecr:UploadLayerPart',\n          'ecr:CompleteLayerUpload',\n          'ecr:PutImage',\n        ],\n        resources: ['*'],\n      }));\n    handlerRole.addToPrincipalPolicy(new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions: [\n        's3:GetObject',\n      ],\n      resources: ['*'],\n    }));\n\n    new CustomResource(this, 'CustomResource', {\n      serviceToken: this.handler.functionArn,\n      resourceType: 'Custom::CDKBucketDeployment',\n      properties: {\n        SrcImage: props.src.uri,\n        SrcCreds: props.src.creds,\n        DestImage: props.dest.uri,\n        DestCreds: props.dest.creds,\n      },\n    });\n  }\n\n  public addToPrincipalPolicy(statement: PolicyStatement): AddToPrincipalPolicyResult {\n    const handlerRole = this.handler.role;\n    if (!handlerRole) { throw new Error('lambda.SingletonFunction should have created a Role'); }\n\n    return handlerRole.addToPrincipalPolicy(statement);\n  }\n\n  private renderSingletonUuid(memoryLimit?: number) {\n    let uuid = 'bd07c930-edb9-4112-a20f-03f096f53666';\n\n    // if user specify a custom memory limit, define another singleton handler\n    // with this configuration. otherwise, it won't be possible to use multiple\n    // configurations since we have a singleton.\n    if (memoryLimit) {\n      if (Token.isUnresolved(memoryLimit)) {\n        throw new Error('Can\\'t use tokens when specifying \"memoryLimit\" since we use it to identify the singleton custom resource handler');\n      }\n\n      uuid += `-${memoryLimit.toString()}MiB`;\n    }\n\n    return uuid;\n  }\n}\n"]}
@@ -8,7 +8,7 @@ This package contains type definitions for node (https://nodejs.org/).
8
8
  Files were exported from https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node.
9
9
 
10
10
  ### Additional Details
11
- * Last updated: Wed, 05 Jun 2024 07:35:45 GMT
11
+ * Last updated: Wed, 19 Jun 2024 16:07:46 GMT
12
12
  * Dependencies: [undici-types](https://npmjs.com/package/undici-types)
13
13
 
14
14
  # Credits
@@ -360,30 +360,32 @@ declare module "dns/promises" {
360
360
  * @param order must be `'ipv4first'`, `'ipv6first'` or `'verbatim'`.
361
361
  */
362
362
  function setDefaultResultOrder(order: "ipv4first" | "ipv6first" | "verbatim"): void;
363
- const NODATA: "NODATA";
364
- const FORMERR: "FORMERR";
365
- const SERVFAIL: "SERVFAIL";
366
- const NOTFOUND: "NOTFOUND";
367
- const NOTIMP: "NOTIMP";
368
- const REFUSED: "REFUSED";
369
- const BADQUERY: "BADQUERY";
370
- const BADNAME: "BADNAME";
371
- const BADFAMILY: "BADFAMILY";
372
- const BADRESP: "BADRESP";
373
- const CONNREFUSED: "TIMEOUT";
374
- const TIMEOUT: "TIMEOUT";
363
+ // Error codes
364
+ const NODATA: "ENODATA";
365
+ const FORMERR: "EFORMERR";
366
+ const SERVFAIL: "ESERVFAIL";
367
+ const NOTFOUND: "ENOTFOUND";
368
+ const NOTIMP: "ENOTIMP";
369
+ const REFUSED: "EREFUSED";
370
+ const BADQUERY: "EBADQUERY";
371
+ const BADNAME: "EBADNAME";
372
+ const BADFAMILY: "EBADFAMILY";
373
+ const BADRESP: "EBADRESP";
374
+ const CONNREFUSED: "ECONNREFUSED";
375
+ const TIMEOUT: "ETIMEOUT";
375
376
  const EOF: "EOF";
376
- const FILE: "FILE";
377
- const NOMEM: "NOMEM";
378
- const DESTRUCTION: "DESTRUCTION";
379
- const BADSTR: "BADSTR";
380
- const BADFLAGS: "BADFLAGS";
381
- const NONAME: "NONAME";
382
- const BADHINTS: "BADHINTS";
383
- const NOTINITIALIZED: "NOTINITIALIZED";
384
- const LOADIPHLPAPI: "LOADIPHLPAPI";
385
- const ADDRGETNETWORKPARAMS: "ADDRGETNETWORKPARAMS";
386
- const CANCELLED: "CANCELLED";
377
+ const FILE: "EFILE";
378
+ const NOMEM: "ENOMEM";
379
+ const DESTRUCTION: "EDESTRUCTION";
380
+ const BADSTR: "EBADSTR";
381
+ const BADFLAGS: "EBADFLAGS";
382
+ const NONAME: "ENONAME";
383
+ const BADHINTS: "EBADHINTS";
384
+ const NOTINITIALIZED: "ENOTINITIALIZED";
385
+ const LOADIPHLPAPI: "ELOADIPHLPAPI";
386
+ const ADDRGETNETWORKPARAMS: "EADDRGETNETWORKPARAMS";
387
+ const CANCELLED: "ECANCELLED";
388
+
387
389
  /**
388
390
  * An independent resolver for DNS requests.
389
391
  *
@@ -743,30 +743,30 @@ declare module "dns" {
743
743
  */
744
744
  export function setDefaultResultOrder(order: "ipv4first" | "ipv6first" | "verbatim"): void;
745
745
  // Error codes
746
- export const NODATA: "NODATA";
747
- export const FORMERR: "FORMERR";
748
- export const SERVFAIL: "SERVFAIL";
749
- export const NOTFOUND: "NOTFOUND";
750
- export const NOTIMP: "NOTIMP";
751
- export const REFUSED: "REFUSED";
752
- export const BADQUERY: "BADQUERY";
753
- export const BADNAME: "BADNAME";
754
- export const BADFAMILY: "BADFAMILY";
755
- export const BADRESP: "BADRESP";
756
- export const CONNREFUSED: "TIMEOUT";
757
- export const TIMEOUT: "TIMEOUT";
746
+ export const NODATA: "ENODATA";
747
+ export const FORMERR: "EFORMERR";
748
+ export const SERVFAIL: "ESERVFAIL";
749
+ export const NOTFOUND: "ENOTFOUND";
750
+ export const NOTIMP: "ENOTIMP";
751
+ export const REFUSED: "EREFUSED";
752
+ export const BADQUERY: "EBADQUERY";
753
+ export const BADNAME: "EBADNAME";
754
+ export const BADFAMILY: "EBADFAMILY";
755
+ export const BADRESP: "EBADRESP";
756
+ export const CONNREFUSED: "ECONNREFUSED";
757
+ export const TIMEOUT: "ETIMEOUT";
758
758
  export const EOF: "EOF";
759
- export const FILE: "FILE";
760
- export const NOMEM: "NOMEM";
761
- export const DESTRUCTION: "DESTRUCTION";
762
- export const BADSTR: "BADSTR";
763
- export const BADFLAGS: "BADFLAGS";
764
- export const NONAME: "NONAME";
765
- export const BADHINTS: "BADHINTS";
766
- export const NOTINITIALIZED: "NOTINITIALIZED";
767
- export const LOADIPHLPAPI: "LOADIPHLPAPI";
768
- export const ADDRGETNETWORKPARAMS: "ADDRGETNETWORKPARAMS";
769
- export const CANCELLED: "CANCELLED";
759
+ export const FILE: "EFILE";
760
+ export const NOMEM: "ENOMEM";
761
+ export const DESTRUCTION: "EDESTRUCTION";
762
+ export const BADSTR: "EBADSTR";
763
+ export const BADFLAGS: "EBADFLAGS";
764
+ export const NONAME: "ENONAME";
765
+ export const BADHINTS: "EBADHINTS";
766
+ export const NOTINITIALIZED: "ENOTINITIALIZED";
767
+ export const LOADIPHLPAPI: "ELOADIPHLPAPI";
768
+ export const ADDRGETNETWORKPARAMS: "EADDRGETNETWORKPARAMS";
769
+ export const CANCELLED: "ECANCELLED";
770
770
  export interface ResolverOptions {
771
771
  /**
772
772
  * Query timeout in milliseconds, or `-1` to use the default timeout.
@@ -98,6 +98,22 @@ declare module "events" {
98
98
  */
99
99
  lowWaterMark?: number | undefined;
100
100
  }
101
+ interface StaticEventEmitterIteratorOptions extends StaticEventEmitterOptions {
102
+ /**
103
+ * Names of events that will end the iteration.
104
+ */
105
+ close?: string[];
106
+ /**
107
+ * The emitter is paused every time the size of events being buffered is higher than it. Supported only on emitters implementing pause() and resume() methods.
108
+ * @default Number.MAX_SAFE_INTEGER
109
+ */
110
+ highWaterMark?: number;
111
+ /**
112
+ * The emitter is resumed every time the size of events being buffered is lower than it. Supported only on emitters implementing pause() and resume() methods.
113
+ * @default 1
114
+ */
115
+ lowWaterMark?: number;
116
+ }
101
117
  interface EventEmitter<T extends EventMap<T> = DefaultEventMap> extends NodeJS.EventEmitter<T> {}
102
118
  type EventMap<T> = Record<keyof T, any[]> | DefaultEventMap;
103
119
  type DefaultEventMap = [never];
@@ -274,6 +290,28 @@ declare module "events" {
274
290
  *
275
291
  * process.nextTick(() => ac.abort());
276
292
  * ```
293
+ *
294
+ * Use the `close` option to specify an array of event names that will end the iteration:
295
+ *
296
+ * ```js
297
+ * import { on, EventEmitter } from 'node:events';
298
+ * import process from 'node:process';
299
+ *
300
+ * const ee = new EventEmitter();
301
+ *
302
+ * // Emit later on
303
+ * process.nextTick(() => {
304
+ * ee.emit('foo', 'bar');
305
+ * ee.emit('foo', 42);
306
+ * ee.emit('close');
307
+ * });
308
+ *
309
+ * for await (const event of on(ee, 'foo', { close: ['close'] })) {
310
+ * console.log(event); // prints ['bar'] [42]
311
+ * }
312
+ * // the loop will exit after 'close' is emitted
313
+ * console.log('done'); // prints 'done'
314
+ * ```
277
315
  * @since v13.6.0, v12.16.0
278
316
  * @param eventName The name of the event being listened for
279
317
  * @return An `AsyncIterator` that iterates `eventName` events emitted by the `emitter`
@@ -286,7 +324,7 @@ declare module "events" {
286
324
  static on(
287
325
  emitter: EventTarget,
288
326
  eventName: string,
289
- options?: StaticEventEmitterOptions,
327
+ options?: StaticEventEmitterIteratorOptions,
290
328
  ): AsyncIterableIterator<any>;
291
329
  /**
292
330
  * A class method that returns the number of listeners for the given `eventName` registered on the given `emitter`.
@@ -96,6 +96,7 @@ declare global {
96
96
  new(): AbortSignal;
97
97
  abort(reason?: any): AbortSignal;
98
98
  timeout(milliseconds: number): AbortSignal;
99
+ any(signals: AbortSignal[]): AbortSignal;
99
100
  };
100
101
  // #endregion borrowed
101
102
 
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@types/node",
3
- "version": "20.14.2",
3
+ "version": "20.14.6",
4
4
  "description": "TypeScript definitions for node",
5
5
  "homepage": "https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node",
6
6
  "license": "MIT",
@@ -212,6 +212,6 @@
212
212
  "dependencies": {
213
213
  "undici-types": "~5.26.4"
214
214
  },
215
- "typesPublisherContentHash": "43d05c87d286b3893e501b24310b8f43081bf151b225e4d88d87af1cf32fb63d",
215
+ "typesPublisherContentHash": "7ad87ee86165e98ba92d3e3f4bd58e162ffc58fa84208518416853f7f0f704fc",
216
216
  "typeScriptVersion": "4.7"
217
217
  }
@@ -237,6 +237,9 @@ declare module "worker_threads" {
237
237
  off(event: "message", listener: (value: any) => void): this;
238
238
  off(event: "messageerror", listener: (error: Error) => void): this;
239
239
  off(event: string | symbol, listener: (...args: any[]) => void): this;
240
+ addEventListener: EventTarget["addEventListener"];
241
+ dispatchEvent: EventTarget["dispatchEvent"];
242
+ removeEventListener: EventTarget["removeEventListener"];
240
243
  }
241
244
  interface WorkerOptions {
242
245
  /**
@@ -8,7 +8,7 @@ This package contains type definitions for node (https://nodejs.org/).
8
8
  Files were exported from https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node.
9
9
 
10
10
  ### Additional Details
11
- * Last updated: Wed, 05 Jun 2024 07:35:45 GMT
11
+ * Last updated: Wed, 19 Jun 2024 16:07:46 GMT
12
12
  * Dependencies: [undici-types](https://npmjs.com/package/undici-types)
13
13
 
14
14
  # Credits
@@ -360,30 +360,32 @@ declare module "dns/promises" {
360
360
  * @param order must be `'ipv4first'`, `'ipv6first'` or `'verbatim'`.
361
361
  */
362
362
  function setDefaultResultOrder(order: "ipv4first" | "ipv6first" | "verbatim"): void;
363
- const NODATA: "NODATA";
364
- const FORMERR: "FORMERR";
365
- const SERVFAIL: "SERVFAIL";
366
- const NOTFOUND: "NOTFOUND";
367
- const NOTIMP: "NOTIMP";
368
- const REFUSED: "REFUSED";
369
- const BADQUERY: "BADQUERY";
370
- const BADNAME: "BADNAME";
371
- const BADFAMILY: "BADFAMILY";
372
- const BADRESP: "BADRESP";
373
- const CONNREFUSED: "TIMEOUT";
374
- const TIMEOUT: "TIMEOUT";
363
+ // Error codes
364
+ const NODATA: "ENODATA";
365
+ const FORMERR: "EFORMERR";
366
+ const SERVFAIL: "ESERVFAIL";
367
+ const NOTFOUND: "ENOTFOUND";
368
+ const NOTIMP: "ENOTIMP";
369
+ const REFUSED: "EREFUSED";
370
+ const BADQUERY: "EBADQUERY";
371
+ const BADNAME: "EBADNAME";
372
+ const BADFAMILY: "EBADFAMILY";
373
+ const BADRESP: "EBADRESP";
374
+ const CONNREFUSED: "ECONNREFUSED";
375
+ const TIMEOUT: "ETIMEOUT";
375
376
  const EOF: "EOF";
376
- const FILE: "FILE";
377
- const NOMEM: "NOMEM";
378
- const DESTRUCTION: "DESTRUCTION";
379
- const BADSTR: "BADSTR";
380
- const BADFLAGS: "BADFLAGS";
381
- const NONAME: "NONAME";
382
- const BADHINTS: "BADHINTS";
383
- const NOTINITIALIZED: "NOTINITIALIZED";
384
- const LOADIPHLPAPI: "LOADIPHLPAPI";
385
- const ADDRGETNETWORKPARAMS: "ADDRGETNETWORKPARAMS";
386
- const CANCELLED: "CANCELLED";
377
+ const FILE: "EFILE";
378
+ const NOMEM: "ENOMEM";
379
+ const DESTRUCTION: "EDESTRUCTION";
380
+ const BADSTR: "EBADSTR";
381
+ const BADFLAGS: "EBADFLAGS";
382
+ const NONAME: "ENONAME";
383
+ const BADHINTS: "EBADHINTS";
384
+ const NOTINITIALIZED: "ENOTINITIALIZED";
385
+ const LOADIPHLPAPI: "ELOADIPHLPAPI";
386
+ const ADDRGETNETWORKPARAMS: "EADDRGETNETWORKPARAMS";
387
+ const CANCELLED: "ECANCELLED";
388
+
387
389
  /**
388
390
  * An independent resolver for DNS requests.
389
391
  *
@@ -743,30 +743,30 @@ declare module "dns" {
743
743
  */
744
744
  export function setDefaultResultOrder(order: "ipv4first" | "ipv6first" | "verbatim"): void;
745
745
  // Error codes
746
- export const NODATA: "NODATA";
747
- export const FORMERR: "FORMERR";
748
- export const SERVFAIL: "SERVFAIL";
749
- export const NOTFOUND: "NOTFOUND";
750
- export const NOTIMP: "NOTIMP";
751
- export const REFUSED: "REFUSED";
752
- export const BADQUERY: "BADQUERY";
753
- export const BADNAME: "BADNAME";
754
- export const BADFAMILY: "BADFAMILY";
755
- export const BADRESP: "BADRESP";
756
- export const CONNREFUSED: "TIMEOUT";
757
- export const TIMEOUT: "TIMEOUT";
746
+ export const NODATA: "ENODATA";
747
+ export const FORMERR: "EFORMERR";
748
+ export const SERVFAIL: "ESERVFAIL";
749
+ export const NOTFOUND: "ENOTFOUND";
750
+ export const NOTIMP: "ENOTIMP";
751
+ export const REFUSED: "EREFUSED";
752
+ export const BADQUERY: "EBADQUERY";
753
+ export const BADNAME: "EBADNAME";
754
+ export const BADFAMILY: "EBADFAMILY";
755
+ export const BADRESP: "EBADRESP";
756
+ export const CONNREFUSED: "ECONNREFUSED";
757
+ export const TIMEOUT: "ETIMEOUT";
758
758
  export const EOF: "EOF";
759
- export const FILE: "FILE";
760
- export const NOMEM: "NOMEM";
761
- export const DESTRUCTION: "DESTRUCTION";
762
- export const BADSTR: "BADSTR";
763
- export const BADFLAGS: "BADFLAGS";
764
- export const NONAME: "NONAME";
765
- export const BADHINTS: "BADHINTS";
766
- export const NOTINITIALIZED: "NOTINITIALIZED";
767
- export const LOADIPHLPAPI: "LOADIPHLPAPI";
768
- export const ADDRGETNETWORKPARAMS: "ADDRGETNETWORKPARAMS";
769
- export const CANCELLED: "CANCELLED";
759
+ export const FILE: "EFILE";
760
+ export const NOMEM: "ENOMEM";
761
+ export const DESTRUCTION: "EDESTRUCTION";
762
+ export const BADSTR: "EBADSTR";
763
+ export const BADFLAGS: "EBADFLAGS";
764
+ export const NONAME: "ENONAME";
765
+ export const BADHINTS: "EBADHINTS";
766
+ export const NOTINITIALIZED: "ENOTINITIALIZED";
767
+ export const LOADIPHLPAPI: "ELOADIPHLPAPI";
768
+ export const ADDRGETNETWORKPARAMS: "EADDRGETNETWORKPARAMS";
769
+ export const CANCELLED: "ECANCELLED";
770
770
  export interface ResolverOptions {
771
771
  /**
772
772
  * Query timeout in milliseconds, or `-1` to use the default timeout.
@@ -98,6 +98,22 @@ declare module "events" {
98
98
  */
99
99
  lowWaterMark?: number | undefined;
100
100
  }
101
+ interface StaticEventEmitterIteratorOptions extends StaticEventEmitterOptions {
102
+ /**
103
+ * Names of events that will end the iteration.
104
+ */
105
+ close?: string[];
106
+ /**
107
+ * The emitter is paused every time the size of events being buffered is higher than it. Supported only on emitters implementing pause() and resume() methods.
108
+ * @default Number.MAX_SAFE_INTEGER
109
+ */
110
+ highWaterMark?: number;
111
+ /**
112
+ * The emitter is resumed every time the size of events being buffered is lower than it. Supported only on emitters implementing pause() and resume() methods.
113
+ * @default 1
114
+ */
115
+ lowWaterMark?: number;
116
+ }
101
117
  interface EventEmitter<T extends EventMap<T> = DefaultEventMap> extends NodeJS.EventEmitter<T> {}
102
118
  type EventMap<T> = Record<keyof T, any[]> | DefaultEventMap;
103
119
  type DefaultEventMap = [never];
@@ -274,6 +290,28 @@ declare module "events" {
274
290
  *
275
291
  * process.nextTick(() => ac.abort());
276
292
  * ```
293
+ *
294
+ * Use the `close` option to specify an array of event names that will end the iteration:
295
+ *
296
+ * ```js
297
+ * import { on, EventEmitter } from 'node:events';
298
+ * import process from 'node:process';
299
+ *
300
+ * const ee = new EventEmitter();
301
+ *
302
+ * // Emit later on
303
+ * process.nextTick(() => {
304
+ * ee.emit('foo', 'bar');
305
+ * ee.emit('foo', 42);
306
+ * ee.emit('close');
307
+ * });
308
+ *
309
+ * for await (const event of on(ee, 'foo', { close: ['close'] })) {
310
+ * console.log(event); // prints ['bar'] [42]
311
+ * }
312
+ * // the loop will exit after 'close' is emitted
313
+ * console.log('done'); // prints 'done'
314
+ * ```
277
315
  * @since v13.6.0, v12.16.0
278
316
  * @param eventName The name of the event being listened for
279
317
  * @return An `AsyncIterator` that iterates `eventName` events emitted by the `emitter`
@@ -286,7 +324,7 @@ declare module "events" {
286
324
  static on(
287
325
  emitter: EventTarget,
288
326
  eventName: string,
289
- options?: StaticEventEmitterOptions,
327
+ options?: StaticEventEmitterIteratorOptions,
290
328
  ): AsyncIterableIterator<any>;
291
329
  /**
292
330
  * A class method that returns the number of listeners for the given `eventName` registered on the given `emitter`.
@@ -96,6 +96,7 @@ declare global {
96
96
  new(): AbortSignal;
97
97
  abort(reason?: any): AbortSignal;
98
98
  timeout(milliseconds: number): AbortSignal;
99
+ any(signals: AbortSignal[]): AbortSignal;
99
100
  };
100
101
  // #endregion borrowed
101
102
 
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@types/node",
3
- "version": "20.14.2",
3
+ "version": "20.14.6",
4
4
  "description": "TypeScript definitions for node",
5
5
  "homepage": "https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node",
6
6
  "license": "MIT",
@@ -212,6 +212,6 @@
212
212
  "dependencies": {
213
213
  "undici-types": "~5.26.4"
214
214
  },
215
- "typesPublisherContentHash": "43d05c87d286b3893e501b24310b8f43081bf151b225e4d88d87af1cf32fb63d",
215
+ "typesPublisherContentHash": "7ad87ee86165e98ba92d3e3f4bd58e162ffc58fa84208518416853f7f0f704fc",
216
216
  "typeScriptVersion": "4.7"
217
217
  }
@@ -237,6 +237,9 @@ declare module "worker_threads" {
237
237
  off(event: "message", listener: (value: any) => void): this;
238
238
  off(event: "messageerror", listener: (error: Error) => void): this;
239
239
  off(event: string | symbol, listener: (...args: any[]) => void): this;
240
+ addEventListener: EventTarget["addEventListener"];
241
+ dispatchEvent: EventTarget["dispatchEvent"];
242
+ removeEventListener: EventTarget["removeEventListener"];
240
243
  }
241
244
  interface WorkerOptions {
242
245
  /**
@@ -8,7 +8,7 @@ This package contains type definitions for node (https://nodejs.org/).
8
8
  Files were exported from https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node.
9
9
 
10
10
  ### Additional Details
11
- * Last updated: Wed, 05 Jun 2024 07:35:45 GMT
11
+ * Last updated: Wed, 19 Jun 2024 16:07:46 GMT
12
12
  * Dependencies: [undici-types](https://npmjs.com/package/undici-types)
13
13
 
14
14
  # Credits
@@ -360,30 +360,32 @@ declare module "dns/promises" {
360
360
  * @param order must be `'ipv4first'`, `'ipv6first'` or `'verbatim'`.
361
361
  */
362
362
  function setDefaultResultOrder(order: "ipv4first" | "ipv6first" | "verbatim"): void;
363
- const NODATA: "NODATA";
364
- const FORMERR: "FORMERR";
365
- const SERVFAIL: "SERVFAIL";
366
- const NOTFOUND: "NOTFOUND";
367
- const NOTIMP: "NOTIMP";
368
- const REFUSED: "REFUSED";
369
- const BADQUERY: "BADQUERY";
370
- const BADNAME: "BADNAME";
371
- const BADFAMILY: "BADFAMILY";
372
- const BADRESP: "BADRESP";
373
- const CONNREFUSED: "TIMEOUT";
374
- const TIMEOUT: "TIMEOUT";
363
+ // Error codes
364
+ const NODATA: "ENODATA";
365
+ const FORMERR: "EFORMERR";
366
+ const SERVFAIL: "ESERVFAIL";
367
+ const NOTFOUND: "ENOTFOUND";
368
+ const NOTIMP: "ENOTIMP";
369
+ const REFUSED: "EREFUSED";
370
+ const BADQUERY: "EBADQUERY";
371
+ const BADNAME: "EBADNAME";
372
+ const BADFAMILY: "EBADFAMILY";
373
+ const BADRESP: "EBADRESP";
374
+ const CONNREFUSED: "ECONNREFUSED";
375
+ const TIMEOUT: "ETIMEOUT";
375
376
  const EOF: "EOF";
376
- const FILE: "FILE";
377
- const NOMEM: "NOMEM";
378
- const DESTRUCTION: "DESTRUCTION";
379
- const BADSTR: "BADSTR";
380
- const BADFLAGS: "BADFLAGS";
381
- const NONAME: "NONAME";
382
- const BADHINTS: "BADHINTS";
383
- const NOTINITIALIZED: "NOTINITIALIZED";
384
- const LOADIPHLPAPI: "LOADIPHLPAPI";
385
- const ADDRGETNETWORKPARAMS: "ADDRGETNETWORKPARAMS";
386
- const CANCELLED: "CANCELLED";
377
+ const FILE: "EFILE";
378
+ const NOMEM: "ENOMEM";
379
+ const DESTRUCTION: "EDESTRUCTION";
380
+ const BADSTR: "EBADSTR";
381
+ const BADFLAGS: "EBADFLAGS";
382
+ const NONAME: "ENONAME";
383
+ const BADHINTS: "EBADHINTS";
384
+ const NOTINITIALIZED: "ENOTINITIALIZED";
385
+ const LOADIPHLPAPI: "ELOADIPHLPAPI";
386
+ const ADDRGETNETWORKPARAMS: "EADDRGETNETWORKPARAMS";
387
+ const CANCELLED: "ECANCELLED";
388
+
387
389
  /**
388
390
  * An independent resolver for DNS requests.
389
391
  *
@@ -743,30 +743,30 @@ declare module "dns" {
743
743
  */
744
744
  export function setDefaultResultOrder(order: "ipv4first" | "ipv6first" | "verbatim"): void;
745
745
  // Error codes
746
- export const NODATA: "NODATA";
747
- export const FORMERR: "FORMERR";
748
- export const SERVFAIL: "SERVFAIL";
749
- export const NOTFOUND: "NOTFOUND";
750
- export const NOTIMP: "NOTIMP";
751
- export const REFUSED: "REFUSED";
752
- export const BADQUERY: "BADQUERY";
753
- export const BADNAME: "BADNAME";
754
- export const BADFAMILY: "BADFAMILY";
755
- export const BADRESP: "BADRESP";
756
- export const CONNREFUSED: "TIMEOUT";
757
- export const TIMEOUT: "TIMEOUT";
746
+ export const NODATA: "ENODATA";
747
+ export const FORMERR: "EFORMERR";
748
+ export const SERVFAIL: "ESERVFAIL";
749
+ export const NOTFOUND: "ENOTFOUND";
750
+ export const NOTIMP: "ENOTIMP";
751
+ export const REFUSED: "EREFUSED";
752
+ export const BADQUERY: "EBADQUERY";
753
+ export const BADNAME: "EBADNAME";
754
+ export const BADFAMILY: "EBADFAMILY";
755
+ export const BADRESP: "EBADRESP";
756
+ export const CONNREFUSED: "ECONNREFUSED";
757
+ export const TIMEOUT: "ETIMEOUT";
758
758
  export const EOF: "EOF";
759
- export const FILE: "FILE";
760
- export const NOMEM: "NOMEM";
761
- export const DESTRUCTION: "DESTRUCTION";
762
- export const BADSTR: "BADSTR";
763
- export const BADFLAGS: "BADFLAGS";
764
- export const NONAME: "NONAME";
765
- export const BADHINTS: "BADHINTS";
766
- export const NOTINITIALIZED: "NOTINITIALIZED";
767
- export const LOADIPHLPAPI: "LOADIPHLPAPI";
768
- export const ADDRGETNETWORKPARAMS: "ADDRGETNETWORKPARAMS";
769
- export const CANCELLED: "CANCELLED";
759
+ export const FILE: "EFILE";
760
+ export const NOMEM: "ENOMEM";
761
+ export const DESTRUCTION: "EDESTRUCTION";
762
+ export const BADSTR: "EBADSTR";
763
+ export const BADFLAGS: "EBADFLAGS";
764
+ export const NONAME: "ENONAME";
765
+ export const BADHINTS: "EBADHINTS";
766
+ export const NOTINITIALIZED: "ENOTINITIALIZED";
767
+ export const LOADIPHLPAPI: "ELOADIPHLPAPI";
768
+ export const ADDRGETNETWORKPARAMS: "EADDRGETNETWORKPARAMS";
769
+ export const CANCELLED: "ECANCELLED";
770
770
  export interface ResolverOptions {
771
771
  /**
772
772
  * Query timeout in milliseconds, or `-1` to use the default timeout.
@@ -98,6 +98,22 @@ declare module "events" {
98
98
  */
99
99
  lowWaterMark?: number | undefined;
100
100
  }
101
+ interface StaticEventEmitterIteratorOptions extends StaticEventEmitterOptions {
102
+ /**
103
+ * Names of events that will end the iteration.
104
+ */
105
+ close?: string[];
106
+ /**
107
+ * The emitter is paused every time the size of events being buffered is higher than it. Supported only on emitters implementing pause() and resume() methods.
108
+ * @default Number.MAX_SAFE_INTEGER
109
+ */
110
+ highWaterMark?: number;
111
+ /**
112
+ * The emitter is resumed every time the size of events being buffered is lower than it. Supported only on emitters implementing pause() and resume() methods.
113
+ * @default 1
114
+ */
115
+ lowWaterMark?: number;
116
+ }
101
117
  interface EventEmitter<T extends EventMap<T> = DefaultEventMap> extends NodeJS.EventEmitter<T> {}
102
118
  type EventMap<T> = Record<keyof T, any[]> | DefaultEventMap;
103
119
  type DefaultEventMap = [never];
@@ -274,6 +290,28 @@ declare module "events" {
274
290
  *
275
291
  * process.nextTick(() => ac.abort());
276
292
  * ```
293
+ *
294
+ * Use the `close` option to specify an array of event names that will end the iteration:
295
+ *
296
+ * ```js
297
+ * import { on, EventEmitter } from 'node:events';
298
+ * import process from 'node:process';
299
+ *
300
+ * const ee = new EventEmitter();
301
+ *
302
+ * // Emit later on
303
+ * process.nextTick(() => {
304
+ * ee.emit('foo', 'bar');
305
+ * ee.emit('foo', 42);
306
+ * ee.emit('close');
307
+ * });
308
+ *
309
+ * for await (const event of on(ee, 'foo', { close: ['close'] })) {
310
+ * console.log(event); // prints ['bar'] [42]
311
+ * }
312
+ * // the loop will exit after 'close' is emitted
313
+ * console.log('done'); // prints 'done'
314
+ * ```
277
315
  * @since v13.6.0, v12.16.0
278
316
  * @param eventName The name of the event being listened for
279
317
  * @return An `AsyncIterator` that iterates `eventName` events emitted by the `emitter`
@@ -286,7 +324,7 @@ declare module "events" {
286
324
  static on(
287
325
  emitter: EventTarget,
288
326
  eventName: string,
289
- options?: StaticEventEmitterOptions,
327
+ options?: StaticEventEmitterIteratorOptions,
290
328
  ): AsyncIterableIterator<any>;
291
329
  /**
292
330
  * A class method that returns the number of listeners for the given `eventName` registered on the given `emitter`.
@@ -96,6 +96,7 @@ declare global {
96
96
  new(): AbortSignal;
97
97
  abort(reason?: any): AbortSignal;
98
98
  timeout(milliseconds: number): AbortSignal;
99
+ any(signals: AbortSignal[]): AbortSignal;
99
100
  };
100
101
  // #endregion borrowed
101
102
 
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@types/node",
3
- "version": "20.14.2",
3
+ "version": "20.14.6",
4
4
  "description": "TypeScript definitions for node",
5
5
  "homepage": "https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node",
6
6
  "license": "MIT",
@@ -212,6 +212,6 @@
212
212
  "dependencies": {
213
213
  "undici-types": "~5.26.4"
214
214
  },
215
- "typesPublisherContentHash": "43d05c87d286b3893e501b24310b8f43081bf151b225e4d88d87af1cf32fb63d",
215
+ "typesPublisherContentHash": "7ad87ee86165e98ba92d3e3f4bd58e162ffc58fa84208518416853f7f0f704fc",
216
216
  "typeScriptVersion": "4.7"
217
217
  }
@@ -237,6 +237,9 @@ declare module "worker_threads" {
237
237
  off(event: "message", listener: (value: any) => void): this;
238
238
  off(event: "messageerror", listener: (error: Error) => void): this;
239
239
  off(event: string | symbol, listener: (...args: any[]) => void): this;
240
+ addEventListener: EventTarget["addEventListener"];
241
+ dispatchEvent: EventTarget["dispatchEvent"];
242
+ removeEventListener: EventTarget["removeEventListener"];
240
243
  }
241
244
  interface WorkerOptions {
242
245
  /**
package/package.json CHANGED
@@ -60,7 +60,7 @@
60
60
  "jsii-diff": "^1.100.0",
61
61
  "jsii-docgen": "^1.8.110",
62
62
  "jsii-pacmak": "^1.100.0",
63
- "jsii-rosetta": "^5.4.21",
63
+ "jsii-rosetta": "^5.4.22",
64
64
  "projen": "^0.82.6",
65
65
  "standard-version": "^9",
66
66
  "ts-jest": "^27",
@@ -93,7 +93,7 @@
93
93
  "publishConfig": {
94
94
  "access": "public"
95
95
  },
96
- "version": "3.0.67",
96
+ "version": "3.0.68",
97
97
  "jest": {
98
98
  "coverageProvider": "v8",
99
99
  "testMatch": [