cdk-ecr-deployment 3.1.10 → 3.1.12
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +2 -2
- package/.jsii.tabl.json +1 -1
- package/lib/index.js +3 -3
- package/node_modules/@types/cacheable-request/node_modules/@types/node/README.md +1 -1
- package/node_modules/@types/cacheable-request/node_modules/@types/node/constants.d.ts +14 -12
- package/node_modules/@types/cacheable-request/node_modules/@types/node/crypto.d.ts +36 -1
- package/node_modules/@types/cacheable-request/node_modules/@types/node/module.d.ts +4 -4
- package/node_modules/@types/cacheable-request/node_modules/@types/node/package.json +2 -2
- package/node_modules/@types/keyv/node_modules/@types/node/README.md +1 -1
- package/node_modules/@types/keyv/node_modules/@types/node/constants.d.ts +14 -12
- package/node_modules/@types/keyv/node_modules/@types/node/crypto.d.ts +36 -1
- package/node_modules/@types/keyv/node_modules/@types/node/module.d.ts +4 -4
- package/node_modules/@types/keyv/node_modules/@types/node/package.json +2 -2
- package/node_modules/@types/responselike/node_modules/@types/node/README.md +1 -1
- package/node_modules/@types/responselike/node_modules/@types/node/constants.d.ts +14 -12
- package/node_modules/@types/responselike/node_modules/@types/node/crypto.d.ts +36 -1
- package/node_modules/@types/responselike/node_modules/@types/node/module.d.ts +4 -4
- package/node_modules/@types/responselike/node_modules/@types/node/package.json +2 -2
- package/package.json +2 -2
package/.jsii
CHANGED
|
@@ -4040,6 +4040,6 @@
|
|
|
4040
4040
|
"symbolId": "src/index:S3ArchiveName"
|
|
4041
4041
|
}
|
|
4042
4042
|
},
|
|
4043
|
-
"version": "3.1.
|
|
4044
|
-
"fingerprint": "
|
|
4043
|
+
"version": "3.1.12",
|
|
4044
|
+
"fingerprint": "o52TLClb7SesysGRv60q55ssyy+se1Rocg8uP1U71BQ="
|
|
4045
4045
|
}
|
package/.jsii.tabl.json
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":"2","toolVersion":"5.7.6","snippets":{"33850328020507963bc7787401a169bb06e49f6132425a6d1529815c1554c645":{"translations":{"python":{"source":"from aws_cdk.aws_ecr_assets import DockerImageAsset\n\n\nimage = DockerImageAsset(self, \"CDKDockerImage\",\n directory=path.join(__dirname, \"docker\")\n)\n\n# Copy from cdk docker image asset to another ECR.\necrdeploy.ECRDeployment(self, \"DeployDockerImage1\",\n src=ecrdeploy.DockerImageName(image.image_uri),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\")\n)\n\n# Copy from docker registry to ECR.\necrdeploy.ECRDeployment(self, \"DeployDockerImage2\",\n src=ecrdeploy.DockerImageName(\"nginx:latest\"),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\")\n)\n\n# Copy from private docker registry to ECR.\n# The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\necrdeploy.ECRDeployment(self, \"DeployDockerImage3\",\n src=ecrdeploy.DockerImageName(\"javacs3/nginx:latest\", \"username:password\"),\n # src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n # src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\")\n).add_to_principal_policy(iam.PolicyStatement(\n effect=iam.Effect.ALLOW,\n actions=[\"secretsmanager:GetSecretValue\"\n ],\n resources=[\"*\"]\n))","version":"2"},"csharp":{"source":"using Amazon.CDK.AWS.Ecr.Assets;\n\n\nvar image = new DockerImageAsset(this, \"CDKDockerImage\", new DockerImageAssetProps {\n Directory = Join(__dirname, \"docker\")\n});\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\nnew ECRDeployment(this, \"DeployDockerImage1\", new ECRDeploymentProps {\n Src = new DockerImageName(image.ImageUri),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\")\n});\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\nnew ECRDeployment(this, \"DeployDockerImage2\", new ECRDeploymentProps {\n Src = new DockerImageName(\"nginx:latest\"),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\")\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ECRDeployment(this, \"DeployDockerImage3\", new ECRDeploymentProps {\n Src = new DockerImageName(\"javacs3/nginx:latest\", \"username:password\"),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\")\n}).AddToPrincipalPolicy(new PolicyStatement(new PolicyStatementProps {\n Effect = Effect.ALLOW,\n Actions = new [] { \"secretsmanager:GetSecretValue\" },\n Resources = new [] { \"*\" }\n}));","version":"1"},"java":{"source":"import software.amazon.awscdk.services.ecr.assets.DockerImageAsset;\n\n\nDockerImageAsset image = DockerImageAsset.Builder.create(this, \"CDKDockerImage\")\n .directory(join(__dirname, \"docker\"))\n .build();\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\nECRDeployment.Builder.create(this, \"DeployDockerImage1\")\n .src(new DockerImageName(image.getImageUri()))\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\", Aws.ACCOUNT_ID)))\n .build();\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\nECRDeployment.Builder.create(this, \"DeployDockerImage2\")\n .src(new DockerImageName(\"nginx:latest\"))\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\", Aws.ACCOUNT_ID)))\n .build();\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nECRDeployment.Builder.create(this, \"DeployDockerImage3\")\n .src(new DockerImageName(\"javacs3/nginx:latest\", \"username:password\"))\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\", Aws.ACCOUNT_ID)))\n .build().addToPrincipalPolicy(PolicyStatement.Builder.create()\n .effect(Effect.ALLOW)\n .actions(List.of(\"secretsmanager:GetSecretValue\"))\n .resources(List.of(\"*\"))\n .build());","version":"1"},"go":{"source":"import \"github.com/aws/aws-cdk-go/awscdk\"\n\n\nimage := awscdk.NewDockerImageAsset(this, jsii.String(\"CDKDockerImage\"), &DockerImageAssetProps{\n\tDirectory: path.join(__dirname, jsii.String(\"docker\")),\n})\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage1\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(image.ImageUri),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\", cdk.Aws_ACCOUNT_ID())),\n})\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage2\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(jsii.String(\"nginx:latest\")),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\", cdk.Aws_ACCOUNT_ID())),\n})\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage3\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(jsii.String(\"javacs3/nginx:latest\"), jsii.String(\"username:password\")),\n\t// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n\t// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\", cdk.Aws_ACCOUNT_ID())),\n}).AddToPrincipalPolicy(awscdk.Aws_iam.NewPolicyStatement(&PolicyStatementProps{\n\tEffect: awscdk.*Aws_iam.Effect_ALLOW,\n\tActions: []*string{\n\t\tjsii.String(\"secretsmanager:GetSecretValue\"),\n\t},\n\tResources: []*string{\n\t\tjsii.String(\"*\"),\n\t},\n}))","version":"1"},"$":{"source":"import { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));","version":"0"}},"location":{"api":{"api":"moduleReadme","moduleFqn":"cdk-ecr-deployment"},"field":{"field":"markdown","line":34}},"didCompile":true,"fqnsReferenced":["aws-cdk-lib.aws_ecr_assets.DockerImageAsset","aws-cdk-lib.aws_ecr_assets.DockerImageAsset#imageUri","aws-cdk-lib.aws_ecr_assets.DockerImageAssetProps","aws-cdk-lib.aws_iam.Effect","aws-cdk-lib.aws_iam.Effect#ALLOW","aws-cdk-lib.aws_iam.PolicyStatement","aws-cdk-lib.aws_iam.PolicyStatementProps","cdk-ecr-deployment.DockerImageName","cdk-ecr-deployment.ECRDeployment","cdk-ecr-deployment.ECRDeployment#addToPrincipalPolicy","cdk-ecr-deployment.ECRDeploymentProps","cdk-ecr-deployment.IImageName"],"fullSource":"// Hoisted imports begin after !show marker below\n/// !show\nimport { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n/// !hide\n// Hoisted imports ended before !hide marker above\n// Fixture with packages imported, but nothing else\nimport * as path from 'node:path';\nimport { Construct } from 'constructs';\n import * as ecrdeploy from 'cdk-ecr-deployment';\nimport {\n Stack,\n aws_iam as iam,\n} from 'aws-cdk-lib';\nimport * as cdk from 'aws-cdk-lib';\n\nclass Fixture extends Stack {\n constructor(scope: Construct, id: string) {\n super(scope, id);\n\n // Code snippet begins after !show marker below\n/// !show\n\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));\n/// !hide\n// Code snippet ended before !hide marker above\n }\n}","syntaxKindCounter":{"11":11,"16":3,"18":3,"80":51,"110":4,"209":2,"210":5,"211":21,"213":2,"214":11,"228":3,"239":3,"243":1,"244":3,"260":1,"261":1,"272":1,"273":1,"275":1,"276":1,"303":10,"307":1},"fqnsFingerprint":"b2b5036b1bfc508279d58dec7b8bdd00caa0f71123068dc963187960f976dddb"}}}
|
|
1
|
+
{"version":"2","toolVersion":"5.7.7","snippets":{"33850328020507963bc7787401a169bb06e49f6132425a6d1529815c1554c645":{"translations":{"python":{"source":"from aws_cdk.aws_ecr_assets import DockerImageAsset\n\n\nimage = DockerImageAsset(self, \"CDKDockerImage\",\n directory=path.join(__dirname, \"docker\")\n)\n\n# Copy from cdk docker image asset to another ECR.\necrdeploy.ECRDeployment(self, \"DeployDockerImage1\",\n src=ecrdeploy.DockerImageName(image.image_uri),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\")\n)\n\n# Copy from docker registry to ECR.\necrdeploy.ECRDeployment(self, \"DeployDockerImage2\",\n src=ecrdeploy.DockerImageName(\"nginx:latest\"),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\")\n)\n\n# Copy from private docker registry to ECR.\n# The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\necrdeploy.ECRDeployment(self, \"DeployDockerImage3\",\n src=ecrdeploy.DockerImageName(\"javacs3/nginx:latest\", \"username:password\"),\n # src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n # src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\")\n).add_to_principal_policy(iam.PolicyStatement(\n effect=iam.Effect.ALLOW,\n actions=[\"secretsmanager:GetSecretValue\"\n ],\n resources=[\"*\"]\n))","version":"2"},"csharp":{"source":"using Amazon.CDK.AWS.Ecr.Assets;\n\n\nvar image = new DockerImageAsset(this, \"CDKDockerImage\", new DockerImageAssetProps {\n Directory = Join(__dirname, \"docker\")\n});\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\nnew ECRDeployment(this, \"DeployDockerImage1\", new ECRDeploymentProps {\n Src = new DockerImageName(image.ImageUri),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\")\n});\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\nnew ECRDeployment(this, \"DeployDockerImage2\", new ECRDeploymentProps {\n Src = new DockerImageName(\"nginx:latest\"),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\")\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ECRDeployment(this, \"DeployDockerImage3\", new ECRDeploymentProps {\n Src = new DockerImageName(\"javacs3/nginx:latest\", \"username:password\"),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\")\n}).AddToPrincipalPolicy(new PolicyStatement(new PolicyStatementProps {\n Effect = Effect.ALLOW,\n Actions = new [] { \"secretsmanager:GetSecretValue\" },\n Resources = new [] { \"*\" }\n}));","version":"1"},"java":{"source":"import software.amazon.awscdk.services.ecr.assets.DockerImageAsset;\n\n\nDockerImageAsset image = DockerImageAsset.Builder.create(this, \"CDKDockerImage\")\n .directory(join(__dirname, \"docker\"))\n .build();\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\nECRDeployment.Builder.create(this, \"DeployDockerImage1\")\n .src(new DockerImageName(image.getImageUri()))\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\", Aws.ACCOUNT_ID)))\n .build();\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\nECRDeployment.Builder.create(this, \"DeployDockerImage2\")\n .src(new DockerImageName(\"nginx:latest\"))\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\", Aws.ACCOUNT_ID)))\n .build();\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nECRDeployment.Builder.create(this, \"DeployDockerImage3\")\n .src(new DockerImageName(\"javacs3/nginx:latest\", \"username:password\"))\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\", Aws.ACCOUNT_ID)))\n .build().addToPrincipalPolicy(PolicyStatement.Builder.create()\n .effect(Effect.ALLOW)\n .actions(List.of(\"secretsmanager:GetSecretValue\"))\n .resources(List.of(\"*\"))\n .build());","version":"1"},"go":{"source":"import \"github.com/aws/aws-cdk-go/awscdk\"\n\n\nimage := awscdk.NewDockerImageAsset(this, jsii.String(\"CDKDockerImage\"), &DockerImageAssetProps{\n\tDirectory: path.join(__dirname, jsii.String(\"docker\")),\n})\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage1\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(image.ImageUri),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\", cdk.Aws_ACCOUNT_ID())),\n})\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage2\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(jsii.String(\"nginx:latest\")),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\", cdk.Aws_ACCOUNT_ID())),\n})\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage3\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(jsii.String(\"javacs3/nginx:latest\"), jsii.String(\"username:password\")),\n\t// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n\t// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\", cdk.Aws_ACCOUNT_ID())),\n}).AddToPrincipalPolicy(awscdk.Aws_iam.NewPolicyStatement(&PolicyStatementProps{\n\tEffect: awscdk.*Aws_iam.Effect_ALLOW,\n\tActions: []*string{\n\t\tjsii.String(\"secretsmanager:GetSecretValue\"),\n\t},\n\tResources: []*string{\n\t\tjsii.String(\"*\"),\n\t},\n}))","version":"1"},"$":{"source":"import { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));","version":"0"}},"location":{"api":{"api":"moduleReadme","moduleFqn":"cdk-ecr-deployment"},"field":{"field":"markdown","line":34}},"didCompile":true,"fqnsReferenced":["aws-cdk-lib.aws_ecr_assets.DockerImageAsset","aws-cdk-lib.aws_ecr_assets.DockerImageAsset#imageUri","aws-cdk-lib.aws_ecr_assets.DockerImageAssetProps","aws-cdk-lib.aws_iam.Effect","aws-cdk-lib.aws_iam.Effect#ALLOW","aws-cdk-lib.aws_iam.PolicyStatement","aws-cdk-lib.aws_iam.PolicyStatementProps","cdk-ecr-deployment.DockerImageName","cdk-ecr-deployment.ECRDeployment","cdk-ecr-deployment.ECRDeployment#addToPrincipalPolicy","cdk-ecr-deployment.ECRDeploymentProps","cdk-ecr-deployment.IImageName"],"fullSource":"// Hoisted imports begin after !show marker below\n/// !show\nimport { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n/// !hide\n// Hoisted imports ended before !hide marker above\n// Fixture with packages imported, but nothing else\nimport * as path from 'node:path';\nimport { Construct } from 'constructs';\n import * as ecrdeploy from 'cdk-ecr-deployment';\nimport {\n Stack,\n aws_iam as iam,\n} from 'aws-cdk-lib';\nimport * as cdk from 'aws-cdk-lib';\n\nclass Fixture extends Stack {\n constructor(scope: Construct, id: string) {\n super(scope, id);\n\n // Code snippet begins after !show marker below\n/// !show\n\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));\n/// !hide\n// Code snippet ended before !hide marker above\n }\n}","syntaxKindCounter":{"11":11,"16":3,"18":3,"80":51,"110":4,"209":2,"210":5,"211":21,"213":2,"214":11,"228":3,"239":3,"243":1,"244":3,"260":1,"261":1,"272":1,"273":1,"275":1,"276":1,"303":10,"307":1},"fqnsFingerprint":"b2b5036b1bfc508279d58dec7b8bdd00caa0f71123068dc963187960f976dddb"}}}
|
package/lib/index.js
CHANGED
|
@@ -38,7 +38,7 @@ class DockerImageName {
|
|
|
38
38
|
}
|
|
39
39
|
exports.DockerImageName = DockerImageName;
|
|
40
40
|
_a = JSII_RTTI_SYMBOL_1;
|
|
41
|
-
DockerImageName[_a] = { fqn: "cdk-ecr-deployment.DockerImageName", version: "3.1.
|
|
41
|
+
DockerImageName[_a] = { fqn: "cdk-ecr-deployment.DockerImageName", version: "3.1.12" };
|
|
42
42
|
class S3ArchiveName {
|
|
43
43
|
constructor(p, ref, creds) {
|
|
44
44
|
this.creds = creds;
|
|
@@ -51,7 +51,7 @@ class S3ArchiveName {
|
|
|
51
51
|
}
|
|
52
52
|
exports.S3ArchiveName = S3ArchiveName;
|
|
53
53
|
_b = JSII_RTTI_SYMBOL_1;
|
|
54
|
-
S3ArchiveName[_b] = { fqn: "cdk-ecr-deployment.S3ArchiveName", version: "3.1.
|
|
54
|
+
S3ArchiveName[_b] = { fqn: "cdk-ecr-deployment.S3ArchiveName", version: "3.1.12" };
|
|
55
55
|
class ECRDeployment extends constructs_1.Construct {
|
|
56
56
|
constructor(scope, id, props) {
|
|
57
57
|
super(scope, id);
|
|
@@ -141,5 +141,5 @@ class ECRDeployment extends constructs_1.Construct {
|
|
|
141
141
|
}
|
|
142
142
|
exports.ECRDeployment = ECRDeployment;
|
|
143
143
|
_c = JSII_RTTI_SYMBOL_1;
|
|
144
|
-
ECRDeployment[_c] = { fqn: "cdk-ecr-deployment.ECRDeployment", version: "3.1.
|
|
144
|
+
ECRDeployment[_c] = { fqn: "cdk-ecr-deployment.ECRDeployment", version: "3.1.12" };
|
|
145
145
|
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;AAAA,qEAAqE;AACrE,sCAAsC;AAGtC,+CAA+C;AAC/C,6BAA6B;AAC7B,6CAAoH;AAEpH,uDAAuD;AACvD,2CAAuC;AACvC,qCAAmD;AAmHnD,SAAS,OAAO,CAAC,UAAkB;IACjC,IAAI,IAAA,gCAAuB,GAAE,EAAE;QAC7B,IAAI;YACF,MAAM,aAAa,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,sBAAsB,CAAC,CAAC;YACnE,MAAM,YAAY,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,eAAe,CAAC,CAAC;YAC3D,aAAa,CAAC,YAAY,CAAC,OAAO,CAAC,KAAK,EAAE,CAAC,aAAa,EAAE,YAAY,CAAC,CAAC,CAAC;YAEzE,OAAO,wBAAM,CAAC,IAAI,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC;SAC5C;QAAC,OAAO,GAAG,EAAE;YACZ,OAAO,CAAC,IAAI,CAAC,gCAAgC,GAAG,EAAE,CAAC,CAAC;SACrD;KACF;IAED,OAAO,wBAAM,CAAC,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,WAAW,CAAC,EAAE;QACpE,SAAS,EAAE;YACT,UAAU;SACX;KACF,CAAC,CAAC;AACL,CAAC;AAED,MAAa,eAAe;IAC1B,YAA2B,IAAY,EAAS,KAAc;QAAnC,SAAI,GAAJ,IAAI,CAAQ;QAAS,UAAK,GAAL,KAAK,CAAS;IAAI,CAAC;IACnE,IAAW,GAAG,KAAa,OAAO,YAAY,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;;AAF9D,0CAGC;;;AAED,MAAa,aAAa;IAExB,YAAmB,CAAS,EAAE,GAAY,EAAS,KAAc;QAAd,UAAK,GAAL,KAAK,CAAS;QAC/D,IAAI,CAAC,IAAI,GAAG,CAAC,CAAC;QACd,IAAI,GAAG,EAAE;YACP,IAAI,CAAC,IAAI,IAAI,GAAG,GAAG,GAAG,CAAC;SACxB;IACH,CAAC;IACD,IAAW,GAAG,KAAa,OAAO,QAAQ,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;;AAR1D,sCASC;;;AAED,MAAa,aAAc,SAAQ,sBAAS;IAG1C,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAyB;QACjE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,MAAM,WAAW,GAAG,KAAK,CAAC,WAAW,IAAI,GAAG,CAAC;QAC7C,IAAI,CAAC,OAAO,GAAG,IAAI,wBAAM,CAAC,iBAAiB,CAAC,IAAI,EAAE,uBAAuB,EAAE;YACzE,IAAI,EAAE,IAAI,CAAC,mBAAmB,CAAC,WAAW,CAAC;YAC3C,IAAI,EAAE,OAAO,CAAC,KAAK,CAAC,UAAU,IAAI,wCAAwC,CAAC;YAC3E,OAAO,EAAE,KAAK,CAAC,aAAa,IAAI,IAAI,wBAAM,CAAC,OAAO,CAAC,iBAAiB,EAAE,0BAAa,CAAC,KAAK,CAAC;YAC1F,OAAO,EAAE,KAAK,CAAC,aAAa,IAAI,WAAW;YAC3C,WAAW,EAAE,KAAK,CAAC,WAAW;YAC9B,aAAa,EAAE,0BAA0B;YACzC,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YAC7B,IAAI,EAAE,KAAK,CAAC,IAAI;YAChB,UAAU,EAAE,WAAW;YACvB,GAAG,EAAE,KAAK,CAAC,GAAG;YACd,UAAU,EAAE,KAAK,CAAC,UAAU;YAC5B,cAAc,EAAE,KAAK,CAAC,cAAc;SACrC,CAAC,CAAC;QAEH,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,WAAW,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;SAAE;QAE7F,WAAW,CAAC,oBAAoB,CAC9B,IAAI,qBAAG,CAAC,eAAe,CAAC;YACtB,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,2BAA2B;gBAC3B,iCAAiC;gBACjC,4BAA4B;gBAC5B,yBAAyB;gBACzB,0BAA0B;gBAC1B,gBAAgB;gBAChB,oBAAoB;gBACpB,mBAAmB;gBACnB,yBAAyB;gBACzB,+BAA+B;gBAC/B,yBAAyB;gBACzB,qBAAqB;gBACrB,yBAAyB;gBACzB,cAAc;aACf;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QACN,WAAW,CAAC,oBAAoB,CAAC,IAAI,qBAAG,CAAC,eAAe,CAAC;YACvD,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,cAAc;aACf;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QAEJ,IAAI,KAAK,CAAC,SAAS,IAAI,KAAK,CAAC,SAAS,CAAC,MAAM,KAAK,CAAC,EAAE;YACnD,MAAM,IAAI,KAAK,CAAC,iDAAiD,IAAI,CAAC,SAAS,CAAC,KAAK,CAAC,SAAS,CAAC,EAAE,CAAC,CAAC;SACrG;QACD,MAAM,SAAS,GAAG,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;QAE5D,IAAI,4BAAc,CAAC,IAAI,EAAE,gBAAgB,EAAE;YACzC,YAAY,EAAE,IAAI,CAAC,OAAO,CAAC,WAAW;YACtC,sGAAsG;YACtG,YAAY,EAAE,6BAA6B;YAC3C,UAAU,EAAE;gBACV,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,GAAG;gBACvB,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,KAAK;gBACzB,SAAS,EAAE,KAAK,CAAC,IAAI,CAAC,GAAG;gBACzB,SAAS,EAAE,KAAK,CAAC,IAAI,CAAC,KAAK;gBAC3B,GAAG,SAAS,CAAC,CAAC,CAAC,EAAE,SAAS,EAAE,SAAS,EAAE,CAAC,CAAC,CAAC,EAAE;aAC7C;SACF,CAAC,CAAC;IACL,CAAC;IAEM,oBAAoB,CAAC,SAA0B;QACpD,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,WAAW,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;SAAE;QAE7F,OAAO,WAAW,CAAC,oBAAoB,CAAC,SAAS,CAAC,CAAC;IACrD,CAAC;IAEO,mBAAmB,CAAC,WAAoB;QAC9C,IAAI,IAAI,GAAG,sCAAsC,CAAC;QAElD,0EAA0E;QAC1E,2EAA2E;QAC3E,4CAA4C;QAC5C,IAAI,WAAW,EAAE;YACf,IAAI,mBAAK,CAAC,YAAY,CAAC,WAAW,CAAC,EAAE;gBACnC,MAAM,IAAI,KAAK,CAAC,mHAAmH,CAAC,CAAC;aACtI;YAED,IAAI,IAAI,IAAI,WAAW,CAAC,QAAQ,EAAE,KAAK,CAAC;SACzC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;;AA9FH,sCA+FC","sourcesContent":["// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n// SPDX-License-Identifier: Apache-2.0\n\n\nimport * as child_process from 'child_process';\nimport * as path from 'path';\nimport { aws_ec2 as ec2, aws_iam as iam, aws_lambda as lambda, Duration, CustomResource, Token } from 'aws-cdk-lib';\nimport { PolicyStatement, AddToPrincipalPolicyResult } from 'aws-cdk-lib/aws-iam';\nimport { RuntimeFamily } from 'aws-cdk-lib/aws-lambda';\nimport { Construct } from 'constructs';\nimport { shouldUsePrebuiltLambda } from './config';\n\nexport interface ECRDeploymentProps {\n\n  /**\n   * Image to use to build Golang lambda for custom resource, if download fails or is not wanted.\n   *\n   * Might be needed for local build if all images need to come from own registry.\n   *\n   * Note that image should use yum as a package manager and have golang available.\n   *\n   * @default - public.ecr.aws/sam/build-go1.x:latest\n   */\n  readonly buildImage?: string;\n  /**\n   * The source of the docker image.\n   */\n  readonly src: IImageName;\n\n  /**\n   * The destination of the docker image.\n   */\n  readonly dest: IImageName;\n\n  /**\n   * The image architecture to be copied.\n   *\n   * The 'amd64' architecture will be copied by default. Specify the\n   * architecture or architectures to copy here.\n   *\n   * It is currently not possible to copy more than one architecture\n   * at a time: the array you specify must contain exactly one string.\n   *\n   * @default ['amd64']\n   */\n  readonly imageArch?: string[];\n\n  /**\n   * The amount of memory (in MiB) to allocate to the AWS Lambda function which\n   * replicates the files from the CDK bucket to the destination bucket.\n   *\n   * If you are deploying large files, you will need to increase this number\n   * accordingly.\n   *\n   * @default - 512\n   */\n  readonly memoryLimit?: number;\n\n  /**\n   * Execution role associated with this function\n   *\n   * @default - A role is automatically created\n   */\n  readonly role?: iam.IRole;\n\n  /**\n   * The VPC network to place the deployment lambda handler in.\n   *\n   * @default - None\n   */\n  readonly vpc?: ec2.IVpc;\n\n  /**\n   * Where in the VPC to place the deployment lambda handler.\n   * Only used if 'vpc' is supplied.\n   *\n   * @default - the Vpc default strategy if not specified\n   */\n  readonly vpcSubnets?: ec2.SubnetSelection;\n\n  /**\n   * The list of security groups to associate with the Lambda's network interfaces.\n   *\n   * Only used if 'vpc' is supplied.\n   *\n   * @default - If the function is placed within a VPC and a security group is\n   * not specified, either by this or securityGroup prop, a dedicated security\n   * group will be created for this function.\n   */\n  readonly securityGroups?: ec2.SecurityGroup[];\n\n  /**\n   * The lambda function runtime environment.\n   *\n   * @default - lambda.Runtime.PROVIDED_AL2023\n   */\n  readonly lambdaRuntime?: lambda.Runtime;\n\n  /**\n   * The name of the lambda handler.\n   *\n   * @default - bootstrap\n   */\n  readonly lambdaHandler?: string;\n\n  /**\n   * The environment variable to set\n   */\n  readonly environment?: { [key: string]: string };\n}\n\nexport interface IImageName {\n  /**\n   *  The uri of the docker image.\n   *\n   *  The uri spec follows https://github.com/containers/skopeo\n   */\n  readonly uri: string;\n\n  /**\n   * The credentials of the docker image. Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`\n   */\n  creds?: string;\n}\n\nfunction getCode(buildImage: string): lambda.AssetCode {\n  if (shouldUsePrebuiltLambda()) {\n    try {\n      const installScript = path.join(__dirname, '../lambda/install.js');\n      const prebuiltPath = path.join(__dirname, '../lambda/out');\n      child_process.execFileSync(process.argv0, [installScript, prebuiltPath]);\n\n      return lambda.Code.fromAsset(prebuiltPath);\n    } catch (err) {\n      console.warn(`Can not get prebuilt lambda: ${err}`);\n    }\n  }\n\n  return lambda.Code.fromDockerBuild(path.join(__dirname, '../lambda'), {\n    buildArgs: {\n      buildImage,\n    },\n  });\n}\n\nexport class DockerImageName implements IImageName {\n  public constructor(private name: string, public creds?: string) { }\n  public get uri(): string { return `docker://${this.name}`; }\n}\n\nexport class S3ArchiveName implements IImageName {\n  private name: string;\n  public constructor(p: string, ref?: string, public creds?: string) {\n    this.name = p;\n    if (ref) {\n      this.name += ':' + ref;\n    }\n  }\n  public get uri(): string { return `s3://${this.name}`; }\n}\n\nexport class ECRDeployment extends Construct {\n  private handler: lambda.SingletonFunction;\n\n  constructor(scope: Construct, id: string, props: ECRDeploymentProps) {\n    super(scope, id);\n    const memoryLimit = props.memoryLimit ?? 512;\n    this.handler = new lambda.SingletonFunction(this, 'CustomResourceHandler', {\n      uuid: this.renderSingletonUuid(memoryLimit),\n      code: getCode(props.buildImage ?? 'public.ecr.aws/docker/library/golang:1'),\n      runtime: props.lambdaRuntime ?? new lambda.Runtime('provided.al2023', RuntimeFamily.OTHER), // not using Runtime.PROVIDED_AL2023 to support older CDK versions (< 2.105.0)\n      handler: props.lambdaHandler ?? 'bootstrap',\n      environment: props.environment,\n      lambdaPurpose: 'Custom::CDKECRDeployment',\n      timeout: Duration.minutes(15),\n      role: props.role,\n      memorySize: memoryLimit,\n      vpc: props.vpc,\n      vpcSubnets: props.vpcSubnets,\n      securityGroups: props.securityGroups,\n    });\n\n    const handlerRole = this.handler.role;\n    if (!handlerRole) { throw new Error('lambda.SingletonFunction should have created a Role'); }\n\n    handlerRole.addToPrincipalPolicy(\n      new iam.PolicyStatement({\n        effect: iam.Effect.ALLOW,\n        actions: [\n          'ecr:GetAuthorizationToken',\n          'ecr:BatchCheckLayerAvailability',\n          'ecr:GetDownloadUrlForLayer',\n          'ecr:GetRepositoryPolicy',\n          'ecr:DescribeRepositories',\n          'ecr:ListImages',\n          'ecr:DescribeImages',\n          'ecr:BatchGetImage',\n          'ecr:ListTagsForResource',\n          'ecr:DescribeImageScanFindings',\n          'ecr:InitiateLayerUpload',\n          'ecr:UploadLayerPart',\n          'ecr:CompleteLayerUpload',\n          'ecr:PutImage',\n        ],\n        resources: ['*'],\n      }));\n    handlerRole.addToPrincipalPolicy(new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions: [\n        's3:GetObject',\n      ],\n      resources: ['*'],\n    }));\n\n    if (props.imageArch && props.imageArch.length !== 1) {\n      throw new Error(`imageArch must contain exactly 1 element, got ${JSON.stringify(props.imageArch)}`);\n    }\n    const imageArch = props.imageArch ? props.imageArch[0] : '';\n\n    new CustomResource(this, 'CustomResource', {\n      serviceToken: this.handler.functionArn,\n      // This has been copy/pasted and is a pure lie, but changing it is going to change people's infra!! X(\n      resourceType: 'Custom::CDKBucketDeployment',\n      properties: {\n        SrcImage: props.src.uri,\n        SrcCreds: props.src.creds,\n        DestImage: props.dest.uri,\n        DestCreds: props.dest.creds,\n        ...imageArch ? { ImageArch: imageArch } : {},\n      },\n    });\n  }\n\n  public addToPrincipalPolicy(statement: PolicyStatement): AddToPrincipalPolicyResult {\n    const handlerRole = this.handler.role;\n    if (!handlerRole) { throw new Error('lambda.SingletonFunction should have created a Role'); }\n\n    return handlerRole.addToPrincipalPolicy(statement);\n  }\n\n  private renderSingletonUuid(memoryLimit?: number) {\n    let uuid = 'bd07c930-edb9-4112-a20f-03f096f53666';\n\n    // if user specify a custom memory limit, define another singleton handler\n    // with this configuration. otherwise, it won't be possible to use multiple\n    // configurations since we have a singleton.\n    if (memoryLimit) {\n      if (Token.isUnresolved(memoryLimit)) {\n        throw new Error('Can\\'t use tokens when specifying \"memoryLimit\" since we use it to identify the singleton custom resource handler');\n      }\n\n      uuid += `-${memoryLimit.toString()}MiB`;\n    }\n\n    return uuid;\n  }\n}\n"]}
|
|
@@ -8,7 +8,7 @@ This package contains type definitions for node (https://nodejs.org/).
|
|
|
8
8
|
Files were exported from https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node.
|
|
9
9
|
|
|
10
10
|
### Additional Details
|
|
11
|
-
* Last updated: Sat,
|
|
11
|
+
* Last updated: Sat, 08 Mar 2025 07:02:57 GMT
|
|
12
12
|
* Dependencies: [undici-types](https://npmjs.com/package/undici-types)
|
|
13
13
|
|
|
14
14
|
# Credits
|
|
@@ -1,16 +1,18 @@
|
|
|
1
|
-
/**
|
|
1
|
+
/**
|
|
2
|
+
* @deprecated The `node:constants` module is deprecated. When requiring access to constants
|
|
3
|
+
* relevant to specific Node.js builtin modules, developers should instead refer
|
|
4
|
+
* to the `constants` property exposed by the relevant module. For instance,
|
|
5
|
+
* `require('node:fs').constants` and `require('node:os').constants`.
|
|
6
|
+
*/
|
|
2
7
|
declare module "constants" {
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
& typeof
|
|
9
|
-
& typeof
|
|
10
|
-
|
|
11
|
-
& typeof cryptoConstants
|
|
12
|
-
& typeof fsConstants;
|
|
13
|
-
export = exp;
|
|
8
|
+
const constants:
|
|
9
|
+
& typeof import("node:os").constants.dlopen
|
|
10
|
+
& typeof import("node:os").constants.errno
|
|
11
|
+
& typeof import("node:os").constants.priority
|
|
12
|
+
& typeof import("node:os").constants.signals
|
|
13
|
+
& typeof import("node:fs").constants
|
|
14
|
+
& typeof import("node:crypto").constants;
|
|
15
|
+
export = constants;
|
|
14
16
|
}
|
|
15
17
|
|
|
16
18
|
declare module "node:constants" {
|
|
@@ -682,9 +682,10 @@ declare module "crypto" {
|
|
|
682
682
|
*/
|
|
683
683
|
type: KeyObjectType;
|
|
684
684
|
}
|
|
685
|
-
type CipherCCMTypes = "aes-128-ccm" | "aes-192-ccm" | "aes-256-ccm"
|
|
685
|
+
type CipherCCMTypes = "aes-128-ccm" | "aes-192-ccm" | "aes-256-ccm";
|
|
686
686
|
type CipherGCMTypes = "aes-128-gcm" | "aes-192-gcm" | "aes-256-gcm";
|
|
687
687
|
type CipherOCBTypes = "aes-128-ocb" | "aes-192-ocb" | "aes-256-ocb";
|
|
688
|
+
type CipherChaCha20Poly1305Types = "chacha20-poly1305";
|
|
688
689
|
type BinaryLike = string | NodeJS.ArrayBufferView;
|
|
689
690
|
type CipherKey = BinaryLike | KeyObject;
|
|
690
691
|
interface CipherCCMOptions extends stream.TransformOptions {
|
|
@@ -696,6 +697,10 @@ declare module "crypto" {
|
|
|
696
697
|
interface CipherOCBOptions extends stream.TransformOptions {
|
|
697
698
|
authTagLength: number;
|
|
698
699
|
}
|
|
700
|
+
interface CipherChaCha20Poly1305Options extends stream.TransformOptions {
|
|
701
|
+
/** @default 16 */
|
|
702
|
+
authTagLength?: number | undefined;
|
|
703
|
+
}
|
|
699
704
|
/**
|
|
700
705
|
* Creates and returns a `Cipher` object, with the given `algorithm`, `key` and
|
|
701
706
|
* initialization vector (`iv`).
|
|
@@ -744,6 +749,12 @@ declare module "crypto" {
|
|
|
744
749
|
iv: BinaryLike,
|
|
745
750
|
options?: CipherGCMOptions,
|
|
746
751
|
): CipherGCM;
|
|
752
|
+
function createCipheriv(
|
|
753
|
+
algorithm: CipherChaCha20Poly1305Types,
|
|
754
|
+
key: CipherKey,
|
|
755
|
+
iv: BinaryLike,
|
|
756
|
+
options?: CipherChaCha20Poly1305Options,
|
|
757
|
+
): CipherChaCha20Poly1305;
|
|
747
758
|
function createCipheriv(
|
|
748
759
|
algorithm: string,
|
|
749
760
|
key: CipherKey,
|
|
@@ -943,6 +954,15 @@ declare module "crypto" {
|
|
|
943
954
|
): this;
|
|
944
955
|
getAuthTag(): Buffer;
|
|
945
956
|
}
|
|
957
|
+
interface CipherChaCha20Poly1305 extends Cipher {
|
|
958
|
+
setAAD(
|
|
959
|
+
buffer: NodeJS.ArrayBufferView,
|
|
960
|
+
options: {
|
|
961
|
+
plaintextLength: number;
|
|
962
|
+
},
|
|
963
|
+
): this;
|
|
964
|
+
getAuthTag(): Buffer;
|
|
965
|
+
}
|
|
946
966
|
/**
|
|
947
967
|
* Creates and returns a `Decipher` object that uses the given `algorithm`, `key` and initialization vector (`iv`).
|
|
948
968
|
*
|
|
@@ -990,6 +1010,12 @@ declare module "crypto" {
|
|
|
990
1010
|
iv: BinaryLike,
|
|
991
1011
|
options?: CipherGCMOptions,
|
|
992
1012
|
): DecipherGCM;
|
|
1013
|
+
function createDecipheriv(
|
|
1014
|
+
algorithm: CipherChaCha20Poly1305Types,
|
|
1015
|
+
key: CipherKey,
|
|
1016
|
+
iv: BinaryLike,
|
|
1017
|
+
options?: CipherChaCha20Poly1305Options,
|
|
1018
|
+
): DecipherChaCha20Poly1305;
|
|
993
1019
|
function createDecipheriv(
|
|
994
1020
|
algorithm: string,
|
|
995
1021
|
key: CipherKey,
|
|
@@ -1175,6 +1201,15 @@ declare module "crypto" {
|
|
|
1175
1201
|
},
|
|
1176
1202
|
): this;
|
|
1177
1203
|
}
|
|
1204
|
+
interface DecipherChaCha20Poly1305 extends Decipher {
|
|
1205
|
+
setAuthTag(buffer: NodeJS.ArrayBufferView): this;
|
|
1206
|
+
setAAD(
|
|
1207
|
+
buffer: NodeJS.ArrayBufferView,
|
|
1208
|
+
options: {
|
|
1209
|
+
plaintextLength: number;
|
|
1210
|
+
},
|
|
1211
|
+
): this;
|
|
1212
|
+
}
|
|
1178
1213
|
interface PrivateKeyInput {
|
|
1179
1214
|
key: string | Buffer;
|
|
1180
1215
|
format?: KeyFormat | undefined;
|
|
@@ -325,9 +325,9 @@ declare module "module" {
|
|
|
325
325
|
}
|
|
326
326
|
interface ResolveFnOutput {
|
|
327
327
|
/**
|
|
328
|
-
* A hint to the load hook (it might be ignored)
|
|
328
|
+
* A hint to the load hook (it might be ignored); can be an intermediary value.
|
|
329
329
|
*/
|
|
330
|
-
format?:
|
|
330
|
+
format?: string | null | undefined;
|
|
331
331
|
/**
|
|
332
332
|
* The import attributes to use when caching the module (optional; if excluded the input will be used)
|
|
333
333
|
*/
|
|
@@ -365,9 +365,9 @@ declare module "module" {
|
|
|
365
365
|
*/
|
|
366
366
|
conditions: string[];
|
|
367
367
|
/**
|
|
368
|
-
* The format optionally supplied by the `resolve` hook chain
|
|
368
|
+
* The format optionally supplied by the `resolve` hook chain (can be an intermediary value).
|
|
369
369
|
*/
|
|
370
|
-
format:
|
|
370
|
+
format: string | null | undefined;
|
|
371
371
|
/**
|
|
372
372
|
* An object whose key-value pairs represent the assertions for the module to import
|
|
373
373
|
*/
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@types/node",
|
|
3
|
-
"version": "22.13.
|
|
3
|
+
"version": "22.13.10",
|
|
4
4
|
"description": "TypeScript definitions for node",
|
|
5
5
|
"homepage": "https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node",
|
|
6
6
|
"license": "MIT",
|
|
@@ -215,6 +215,6 @@
|
|
|
215
215
|
"undici-types": "~6.20.0"
|
|
216
216
|
},
|
|
217
217
|
"peerDependencies": {},
|
|
218
|
-
"typesPublisherContentHash": "
|
|
218
|
+
"typesPublisherContentHash": "25fcca4abf7a12f9be2302bc659011d734e5385c4d6aa230045dc3f241321494",
|
|
219
219
|
"typeScriptVersion": "5.0"
|
|
220
220
|
}
|
|
@@ -8,7 +8,7 @@ This package contains type definitions for node (https://nodejs.org/).
|
|
|
8
8
|
Files were exported from https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node.
|
|
9
9
|
|
|
10
10
|
### Additional Details
|
|
11
|
-
* Last updated: Sat,
|
|
11
|
+
* Last updated: Sat, 08 Mar 2025 07:02:57 GMT
|
|
12
12
|
* Dependencies: [undici-types](https://npmjs.com/package/undici-types)
|
|
13
13
|
|
|
14
14
|
# Credits
|
|
@@ -1,16 +1,18 @@
|
|
|
1
|
-
/**
|
|
1
|
+
/**
|
|
2
|
+
* @deprecated The `node:constants` module is deprecated. When requiring access to constants
|
|
3
|
+
* relevant to specific Node.js builtin modules, developers should instead refer
|
|
4
|
+
* to the `constants` property exposed by the relevant module. For instance,
|
|
5
|
+
* `require('node:fs').constants` and `require('node:os').constants`.
|
|
6
|
+
*/
|
|
2
7
|
declare module "constants" {
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
& typeof
|
|
9
|
-
& typeof
|
|
10
|
-
|
|
11
|
-
& typeof cryptoConstants
|
|
12
|
-
& typeof fsConstants;
|
|
13
|
-
export = exp;
|
|
8
|
+
const constants:
|
|
9
|
+
& typeof import("node:os").constants.dlopen
|
|
10
|
+
& typeof import("node:os").constants.errno
|
|
11
|
+
& typeof import("node:os").constants.priority
|
|
12
|
+
& typeof import("node:os").constants.signals
|
|
13
|
+
& typeof import("node:fs").constants
|
|
14
|
+
& typeof import("node:crypto").constants;
|
|
15
|
+
export = constants;
|
|
14
16
|
}
|
|
15
17
|
|
|
16
18
|
declare module "node:constants" {
|
|
@@ -682,9 +682,10 @@ declare module "crypto" {
|
|
|
682
682
|
*/
|
|
683
683
|
type: KeyObjectType;
|
|
684
684
|
}
|
|
685
|
-
type CipherCCMTypes = "aes-128-ccm" | "aes-192-ccm" | "aes-256-ccm"
|
|
685
|
+
type CipherCCMTypes = "aes-128-ccm" | "aes-192-ccm" | "aes-256-ccm";
|
|
686
686
|
type CipherGCMTypes = "aes-128-gcm" | "aes-192-gcm" | "aes-256-gcm";
|
|
687
687
|
type CipherOCBTypes = "aes-128-ocb" | "aes-192-ocb" | "aes-256-ocb";
|
|
688
|
+
type CipherChaCha20Poly1305Types = "chacha20-poly1305";
|
|
688
689
|
type BinaryLike = string | NodeJS.ArrayBufferView;
|
|
689
690
|
type CipherKey = BinaryLike | KeyObject;
|
|
690
691
|
interface CipherCCMOptions extends stream.TransformOptions {
|
|
@@ -696,6 +697,10 @@ declare module "crypto" {
|
|
|
696
697
|
interface CipherOCBOptions extends stream.TransformOptions {
|
|
697
698
|
authTagLength: number;
|
|
698
699
|
}
|
|
700
|
+
interface CipherChaCha20Poly1305Options extends stream.TransformOptions {
|
|
701
|
+
/** @default 16 */
|
|
702
|
+
authTagLength?: number | undefined;
|
|
703
|
+
}
|
|
699
704
|
/**
|
|
700
705
|
* Creates and returns a `Cipher` object, with the given `algorithm`, `key` and
|
|
701
706
|
* initialization vector (`iv`).
|
|
@@ -744,6 +749,12 @@ declare module "crypto" {
|
|
|
744
749
|
iv: BinaryLike,
|
|
745
750
|
options?: CipherGCMOptions,
|
|
746
751
|
): CipherGCM;
|
|
752
|
+
function createCipheriv(
|
|
753
|
+
algorithm: CipherChaCha20Poly1305Types,
|
|
754
|
+
key: CipherKey,
|
|
755
|
+
iv: BinaryLike,
|
|
756
|
+
options?: CipherChaCha20Poly1305Options,
|
|
757
|
+
): CipherChaCha20Poly1305;
|
|
747
758
|
function createCipheriv(
|
|
748
759
|
algorithm: string,
|
|
749
760
|
key: CipherKey,
|
|
@@ -943,6 +954,15 @@ declare module "crypto" {
|
|
|
943
954
|
): this;
|
|
944
955
|
getAuthTag(): Buffer;
|
|
945
956
|
}
|
|
957
|
+
interface CipherChaCha20Poly1305 extends Cipher {
|
|
958
|
+
setAAD(
|
|
959
|
+
buffer: NodeJS.ArrayBufferView,
|
|
960
|
+
options: {
|
|
961
|
+
plaintextLength: number;
|
|
962
|
+
},
|
|
963
|
+
): this;
|
|
964
|
+
getAuthTag(): Buffer;
|
|
965
|
+
}
|
|
946
966
|
/**
|
|
947
967
|
* Creates and returns a `Decipher` object that uses the given `algorithm`, `key` and initialization vector (`iv`).
|
|
948
968
|
*
|
|
@@ -990,6 +1010,12 @@ declare module "crypto" {
|
|
|
990
1010
|
iv: BinaryLike,
|
|
991
1011
|
options?: CipherGCMOptions,
|
|
992
1012
|
): DecipherGCM;
|
|
1013
|
+
function createDecipheriv(
|
|
1014
|
+
algorithm: CipherChaCha20Poly1305Types,
|
|
1015
|
+
key: CipherKey,
|
|
1016
|
+
iv: BinaryLike,
|
|
1017
|
+
options?: CipherChaCha20Poly1305Options,
|
|
1018
|
+
): DecipherChaCha20Poly1305;
|
|
993
1019
|
function createDecipheriv(
|
|
994
1020
|
algorithm: string,
|
|
995
1021
|
key: CipherKey,
|
|
@@ -1175,6 +1201,15 @@ declare module "crypto" {
|
|
|
1175
1201
|
},
|
|
1176
1202
|
): this;
|
|
1177
1203
|
}
|
|
1204
|
+
interface DecipherChaCha20Poly1305 extends Decipher {
|
|
1205
|
+
setAuthTag(buffer: NodeJS.ArrayBufferView): this;
|
|
1206
|
+
setAAD(
|
|
1207
|
+
buffer: NodeJS.ArrayBufferView,
|
|
1208
|
+
options: {
|
|
1209
|
+
plaintextLength: number;
|
|
1210
|
+
},
|
|
1211
|
+
): this;
|
|
1212
|
+
}
|
|
1178
1213
|
interface PrivateKeyInput {
|
|
1179
1214
|
key: string | Buffer;
|
|
1180
1215
|
format?: KeyFormat | undefined;
|
|
@@ -325,9 +325,9 @@ declare module "module" {
|
|
|
325
325
|
}
|
|
326
326
|
interface ResolveFnOutput {
|
|
327
327
|
/**
|
|
328
|
-
* A hint to the load hook (it might be ignored)
|
|
328
|
+
* A hint to the load hook (it might be ignored); can be an intermediary value.
|
|
329
329
|
*/
|
|
330
|
-
format?:
|
|
330
|
+
format?: string | null | undefined;
|
|
331
331
|
/**
|
|
332
332
|
* The import attributes to use when caching the module (optional; if excluded the input will be used)
|
|
333
333
|
*/
|
|
@@ -365,9 +365,9 @@ declare module "module" {
|
|
|
365
365
|
*/
|
|
366
366
|
conditions: string[];
|
|
367
367
|
/**
|
|
368
|
-
* The format optionally supplied by the `resolve` hook chain
|
|
368
|
+
* The format optionally supplied by the `resolve` hook chain (can be an intermediary value).
|
|
369
369
|
*/
|
|
370
|
-
format:
|
|
370
|
+
format: string | null | undefined;
|
|
371
371
|
/**
|
|
372
372
|
* An object whose key-value pairs represent the assertions for the module to import
|
|
373
373
|
*/
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@types/node",
|
|
3
|
-
"version": "22.13.
|
|
3
|
+
"version": "22.13.10",
|
|
4
4
|
"description": "TypeScript definitions for node",
|
|
5
5
|
"homepage": "https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node",
|
|
6
6
|
"license": "MIT",
|
|
@@ -215,6 +215,6 @@
|
|
|
215
215
|
"undici-types": "~6.20.0"
|
|
216
216
|
},
|
|
217
217
|
"peerDependencies": {},
|
|
218
|
-
"typesPublisherContentHash": "
|
|
218
|
+
"typesPublisherContentHash": "25fcca4abf7a12f9be2302bc659011d734e5385c4d6aa230045dc3f241321494",
|
|
219
219
|
"typeScriptVersion": "5.0"
|
|
220
220
|
}
|
|
@@ -8,7 +8,7 @@ This package contains type definitions for node (https://nodejs.org/).
|
|
|
8
8
|
Files were exported from https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node.
|
|
9
9
|
|
|
10
10
|
### Additional Details
|
|
11
|
-
* Last updated: Sat,
|
|
11
|
+
* Last updated: Sat, 08 Mar 2025 07:02:57 GMT
|
|
12
12
|
* Dependencies: [undici-types](https://npmjs.com/package/undici-types)
|
|
13
13
|
|
|
14
14
|
# Credits
|
|
@@ -1,16 +1,18 @@
|
|
|
1
|
-
/**
|
|
1
|
+
/**
|
|
2
|
+
* @deprecated The `node:constants` module is deprecated. When requiring access to constants
|
|
3
|
+
* relevant to specific Node.js builtin modules, developers should instead refer
|
|
4
|
+
* to the `constants` property exposed by the relevant module. For instance,
|
|
5
|
+
* `require('node:fs').constants` and `require('node:os').constants`.
|
|
6
|
+
*/
|
|
2
7
|
declare module "constants" {
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
& typeof
|
|
9
|
-
& typeof
|
|
10
|
-
|
|
11
|
-
& typeof cryptoConstants
|
|
12
|
-
& typeof fsConstants;
|
|
13
|
-
export = exp;
|
|
8
|
+
const constants:
|
|
9
|
+
& typeof import("node:os").constants.dlopen
|
|
10
|
+
& typeof import("node:os").constants.errno
|
|
11
|
+
& typeof import("node:os").constants.priority
|
|
12
|
+
& typeof import("node:os").constants.signals
|
|
13
|
+
& typeof import("node:fs").constants
|
|
14
|
+
& typeof import("node:crypto").constants;
|
|
15
|
+
export = constants;
|
|
14
16
|
}
|
|
15
17
|
|
|
16
18
|
declare module "node:constants" {
|
|
@@ -682,9 +682,10 @@ declare module "crypto" {
|
|
|
682
682
|
*/
|
|
683
683
|
type: KeyObjectType;
|
|
684
684
|
}
|
|
685
|
-
type CipherCCMTypes = "aes-128-ccm" | "aes-192-ccm" | "aes-256-ccm"
|
|
685
|
+
type CipherCCMTypes = "aes-128-ccm" | "aes-192-ccm" | "aes-256-ccm";
|
|
686
686
|
type CipherGCMTypes = "aes-128-gcm" | "aes-192-gcm" | "aes-256-gcm";
|
|
687
687
|
type CipherOCBTypes = "aes-128-ocb" | "aes-192-ocb" | "aes-256-ocb";
|
|
688
|
+
type CipherChaCha20Poly1305Types = "chacha20-poly1305";
|
|
688
689
|
type BinaryLike = string | NodeJS.ArrayBufferView;
|
|
689
690
|
type CipherKey = BinaryLike | KeyObject;
|
|
690
691
|
interface CipherCCMOptions extends stream.TransformOptions {
|
|
@@ -696,6 +697,10 @@ declare module "crypto" {
|
|
|
696
697
|
interface CipherOCBOptions extends stream.TransformOptions {
|
|
697
698
|
authTagLength: number;
|
|
698
699
|
}
|
|
700
|
+
interface CipherChaCha20Poly1305Options extends stream.TransformOptions {
|
|
701
|
+
/** @default 16 */
|
|
702
|
+
authTagLength?: number | undefined;
|
|
703
|
+
}
|
|
699
704
|
/**
|
|
700
705
|
* Creates and returns a `Cipher` object, with the given `algorithm`, `key` and
|
|
701
706
|
* initialization vector (`iv`).
|
|
@@ -744,6 +749,12 @@ declare module "crypto" {
|
|
|
744
749
|
iv: BinaryLike,
|
|
745
750
|
options?: CipherGCMOptions,
|
|
746
751
|
): CipherGCM;
|
|
752
|
+
function createCipheriv(
|
|
753
|
+
algorithm: CipherChaCha20Poly1305Types,
|
|
754
|
+
key: CipherKey,
|
|
755
|
+
iv: BinaryLike,
|
|
756
|
+
options?: CipherChaCha20Poly1305Options,
|
|
757
|
+
): CipherChaCha20Poly1305;
|
|
747
758
|
function createCipheriv(
|
|
748
759
|
algorithm: string,
|
|
749
760
|
key: CipherKey,
|
|
@@ -943,6 +954,15 @@ declare module "crypto" {
|
|
|
943
954
|
): this;
|
|
944
955
|
getAuthTag(): Buffer;
|
|
945
956
|
}
|
|
957
|
+
interface CipherChaCha20Poly1305 extends Cipher {
|
|
958
|
+
setAAD(
|
|
959
|
+
buffer: NodeJS.ArrayBufferView,
|
|
960
|
+
options: {
|
|
961
|
+
plaintextLength: number;
|
|
962
|
+
},
|
|
963
|
+
): this;
|
|
964
|
+
getAuthTag(): Buffer;
|
|
965
|
+
}
|
|
946
966
|
/**
|
|
947
967
|
* Creates and returns a `Decipher` object that uses the given `algorithm`, `key` and initialization vector (`iv`).
|
|
948
968
|
*
|
|
@@ -990,6 +1010,12 @@ declare module "crypto" {
|
|
|
990
1010
|
iv: BinaryLike,
|
|
991
1011
|
options?: CipherGCMOptions,
|
|
992
1012
|
): DecipherGCM;
|
|
1013
|
+
function createDecipheriv(
|
|
1014
|
+
algorithm: CipherChaCha20Poly1305Types,
|
|
1015
|
+
key: CipherKey,
|
|
1016
|
+
iv: BinaryLike,
|
|
1017
|
+
options?: CipherChaCha20Poly1305Options,
|
|
1018
|
+
): DecipherChaCha20Poly1305;
|
|
993
1019
|
function createDecipheriv(
|
|
994
1020
|
algorithm: string,
|
|
995
1021
|
key: CipherKey,
|
|
@@ -1175,6 +1201,15 @@ declare module "crypto" {
|
|
|
1175
1201
|
},
|
|
1176
1202
|
): this;
|
|
1177
1203
|
}
|
|
1204
|
+
interface DecipherChaCha20Poly1305 extends Decipher {
|
|
1205
|
+
setAuthTag(buffer: NodeJS.ArrayBufferView): this;
|
|
1206
|
+
setAAD(
|
|
1207
|
+
buffer: NodeJS.ArrayBufferView,
|
|
1208
|
+
options: {
|
|
1209
|
+
plaintextLength: number;
|
|
1210
|
+
},
|
|
1211
|
+
): this;
|
|
1212
|
+
}
|
|
1178
1213
|
interface PrivateKeyInput {
|
|
1179
1214
|
key: string | Buffer;
|
|
1180
1215
|
format?: KeyFormat | undefined;
|
|
@@ -325,9 +325,9 @@ declare module "module" {
|
|
|
325
325
|
}
|
|
326
326
|
interface ResolveFnOutput {
|
|
327
327
|
/**
|
|
328
|
-
* A hint to the load hook (it might be ignored)
|
|
328
|
+
* A hint to the load hook (it might be ignored); can be an intermediary value.
|
|
329
329
|
*/
|
|
330
|
-
format?:
|
|
330
|
+
format?: string | null | undefined;
|
|
331
331
|
/**
|
|
332
332
|
* The import attributes to use when caching the module (optional; if excluded the input will be used)
|
|
333
333
|
*/
|
|
@@ -365,9 +365,9 @@ declare module "module" {
|
|
|
365
365
|
*/
|
|
366
366
|
conditions: string[];
|
|
367
367
|
/**
|
|
368
|
-
* The format optionally supplied by the `resolve` hook chain
|
|
368
|
+
* The format optionally supplied by the `resolve` hook chain (can be an intermediary value).
|
|
369
369
|
*/
|
|
370
|
-
format:
|
|
370
|
+
format: string | null | undefined;
|
|
371
371
|
/**
|
|
372
372
|
* An object whose key-value pairs represent the assertions for the module to import
|
|
373
373
|
*/
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@types/node",
|
|
3
|
-
"version": "22.13.
|
|
3
|
+
"version": "22.13.10",
|
|
4
4
|
"description": "TypeScript definitions for node",
|
|
5
5
|
"homepage": "https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node",
|
|
6
6
|
"license": "MIT",
|
|
@@ -215,6 +215,6 @@
|
|
|
215
215
|
"undici-types": "~6.20.0"
|
|
216
216
|
},
|
|
217
217
|
"peerDependencies": {},
|
|
218
|
-
"typesPublisherContentHash": "
|
|
218
|
+
"typesPublisherContentHash": "25fcca4abf7a12f9be2302bc659011d734e5385c4d6aa230045dc3f241321494",
|
|
219
219
|
"typeScriptVersion": "5.0"
|
|
220
220
|
}
|
package/package.json
CHANGED
|
@@ -64,7 +64,7 @@
|
|
|
64
64
|
"jsii-diff": "^1.108.0",
|
|
65
65
|
"jsii-docgen": "^10.5.0",
|
|
66
66
|
"jsii-pacmak": "^1.108.0",
|
|
67
|
-
"jsii-rosetta": "^5.7.
|
|
67
|
+
"jsii-rosetta": "^5.7.7",
|
|
68
68
|
"projen": "^0.91.4",
|
|
69
69
|
"ts-jest": "^27",
|
|
70
70
|
"ts-node": "^10.9.2",
|
|
@@ -94,7 +94,7 @@
|
|
|
94
94
|
"publishConfig": {
|
|
95
95
|
"access": "public"
|
|
96
96
|
},
|
|
97
|
-
"version": "3.1.
|
|
97
|
+
"version": "3.1.12",
|
|
98
98
|
"jest": {
|
|
99
99
|
"coverageProvider": "v8",
|
|
100
100
|
"testMatch": [
|