cdk-ecr-deployment 3.1.8 → 3.1.9
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +2 -2
- package/.jsii.tabl.json +1 -1
- package/lib/index.js +3 -3
- package/node_modules/@types/cacheable-request/node_modules/@types/node/README.md +1 -1
- package/node_modules/@types/cacheable-request/node_modules/@types/node/assert.d.ts +55 -0
- package/node_modules/@types/cacheable-request/node_modules/@types/node/buffer.buffer.d.ts +2 -1
- package/node_modules/@types/cacheable-request/node_modules/@types/node/dgram.d.ts +3 -1
- package/node_modules/@types/cacheable-request/node_modules/@types/node/fs/promises.d.ts +2 -2
- package/node_modules/@types/cacheable-request/node_modules/@types/node/http.d.ts +1 -0
- package/node_modules/@types/cacheable-request/node_modules/@types/node/module.d.ts +74 -0
- package/node_modules/@types/cacheable-request/node_modules/@types/node/net.d.ts +24 -0
- package/node_modules/@types/cacheable-request/node_modules/@types/node/package.json +2 -2
- package/node_modules/@types/cacheable-request/node_modules/@types/node/perf_hooks.d.ts +5 -0
- package/node_modules/@types/cacheable-request/node_modules/@types/node/process.d.ts +19 -2
- package/node_modules/@types/cacheable-request/node_modules/@types/node/sea.d.ts +1 -1
- package/node_modules/@types/cacheable-request/node_modules/@types/node/sqlite.d.ts +104 -14
- package/node_modules/@types/cacheable-request/node_modules/@types/node/test.d.ts +0 -5
- package/node_modules/@types/cacheable-request/node_modules/@types/node/util.d.ts +52 -10
- package/node_modules/@types/keyv/node_modules/@types/node/README.md +1 -1
- package/node_modules/@types/keyv/node_modules/@types/node/assert.d.ts +55 -0
- package/node_modules/@types/keyv/node_modules/@types/node/buffer.buffer.d.ts +2 -1
- package/node_modules/@types/keyv/node_modules/@types/node/dgram.d.ts +3 -1
- package/node_modules/@types/keyv/node_modules/@types/node/fs/promises.d.ts +2 -2
- package/node_modules/@types/keyv/node_modules/@types/node/http.d.ts +1 -0
- package/node_modules/@types/keyv/node_modules/@types/node/module.d.ts +74 -0
- package/node_modules/@types/keyv/node_modules/@types/node/net.d.ts +24 -0
- package/node_modules/@types/keyv/node_modules/@types/node/package.json +2 -2
- package/node_modules/@types/keyv/node_modules/@types/node/perf_hooks.d.ts +5 -0
- package/node_modules/@types/keyv/node_modules/@types/node/process.d.ts +19 -2
- package/node_modules/@types/keyv/node_modules/@types/node/sea.d.ts +1 -1
- package/node_modules/@types/keyv/node_modules/@types/node/sqlite.d.ts +104 -14
- package/node_modules/@types/keyv/node_modules/@types/node/test.d.ts +0 -5
- package/node_modules/@types/keyv/node_modules/@types/node/util.d.ts +52 -10
- package/node_modules/@types/responselike/node_modules/@types/node/README.md +1 -1
- package/node_modules/@types/responselike/node_modules/@types/node/assert.d.ts +55 -0
- package/node_modules/@types/responselike/node_modules/@types/node/buffer.buffer.d.ts +2 -1
- package/node_modules/@types/responselike/node_modules/@types/node/dgram.d.ts +3 -1
- package/node_modules/@types/responselike/node_modules/@types/node/fs/promises.d.ts +2 -2
- package/node_modules/@types/responselike/node_modules/@types/node/http.d.ts +1 -0
- package/node_modules/@types/responselike/node_modules/@types/node/module.d.ts +74 -0
- package/node_modules/@types/responselike/node_modules/@types/node/net.d.ts +24 -0
- package/node_modules/@types/responselike/node_modules/@types/node/package.json +2 -2
- package/node_modules/@types/responselike/node_modules/@types/node/perf_hooks.d.ts +5 -0
- package/node_modules/@types/responselike/node_modules/@types/node/process.d.ts +19 -2
- package/node_modules/@types/responselike/node_modules/@types/node/sea.d.ts +1 -1
- package/node_modules/@types/responselike/node_modules/@types/node/sqlite.d.ts +104 -14
- package/node_modules/@types/responselike/node_modules/@types/node/test.d.ts +0 -5
- package/node_modules/@types/responselike/node_modules/@types/node/util.d.ts +52 -10
- package/package.json +2 -2
package/.jsii
CHANGED
package/.jsii.tabl.json
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":"2","toolVersion":"5.7.2","snippets":{"33850328020507963bc7787401a169bb06e49f6132425a6d1529815c1554c645":{"translations":{"python":{"source":"from aws_cdk.aws_ecr_assets import DockerImageAsset\n\n\nimage = DockerImageAsset(self, \"CDKDockerImage\",\n directory=path.join(__dirname, \"docker\")\n)\n\n# Copy from cdk docker image asset to another ECR.\necrdeploy.ECRDeployment(self, \"DeployDockerImage1\",\n src=ecrdeploy.DockerImageName(image.image_uri),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\")\n)\n\n# Copy from docker registry to ECR.\necrdeploy.ECRDeployment(self, \"DeployDockerImage2\",\n src=ecrdeploy.DockerImageName(\"nginx:latest\"),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\")\n)\n\n# Copy from private docker registry to ECR.\n# The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\necrdeploy.ECRDeployment(self, \"DeployDockerImage3\",\n src=ecrdeploy.DockerImageName(\"javacs3/nginx:latest\", \"username:password\"),\n # src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n # src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\")\n).add_to_principal_policy(iam.PolicyStatement(\n effect=iam.Effect.ALLOW,\n actions=[\"secretsmanager:GetSecretValue\"\n ],\n resources=[\"*\"]\n))","version":"2"},"csharp":{"source":"using Amazon.CDK.AWS.Ecr.Assets;\n\n\nvar image = new DockerImageAsset(this, \"CDKDockerImage\", new DockerImageAssetProps {\n Directory = Join(__dirname, \"docker\")\n});\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\nnew ECRDeployment(this, \"DeployDockerImage1\", new ECRDeploymentProps {\n Src = new DockerImageName(image.ImageUri),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\")\n});\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\nnew ECRDeployment(this, \"DeployDockerImage2\", new ECRDeploymentProps {\n Src = new DockerImageName(\"nginx:latest\"),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\")\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ECRDeployment(this, \"DeployDockerImage3\", new ECRDeploymentProps {\n Src = new DockerImageName(\"javacs3/nginx:latest\", \"username:password\"),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\")\n}).AddToPrincipalPolicy(new PolicyStatement(new PolicyStatementProps {\n Effect = Effect.ALLOW,\n Actions = new [] { \"secretsmanager:GetSecretValue\" },\n Resources = new [] { \"*\" }\n}));","version":"1"},"java":{"source":"import software.amazon.awscdk.services.ecr.assets.DockerImageAsset;\n\n\nDockerImageAsset image = DockerImageAsset.Builder.create(this, \"CDKDockerImage\")\n .directory(join(__dirname, \"docker\"))\n .build();\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\nECRDeployment.Builder.create(this, \"DeployDockerImage1\")\n .src(new DockerImageName(image.getImageUri()))\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\", Aws.ACCOUNT_ID)))\n .build();\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\nECRDeployment.Builder.create(this, \"DeployDockerImage2\")\n .src(new DockerImageName(\"nginx:latest\"))\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\", Aws.ACCOUNT_ID)))\n .build();\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nECRDeployment.Builder.create(this, \"DeployDockerImage3\")\n .src(new DockerImageName(\"javacs3/nginx:latest\", \"username:password\"))\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\", Aws.ACCOUNT_ID)))\n .build().addToPrincipalPolicy(PolicyStatement.Builder.create()\n .effect(Effect.ALLOW)\n .actions(List.of(\"secretsmanager:GetSecretValue\"))\n .resources(List.of(\"*\"))\n .build());","version":"1"},"go":{"source":"import \"github.com/aws/aws-cdk-go/awscdk\"\n\n\nimage := awscdk.NewDockerImageAsset(this, jsii.String(\"CDKDockerImage\"), &DockerImageAssetProps{\n\tDirectory: path.join(__dirname, jsii.String(\"docker\")),\n})\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage1\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(image.ImageUri),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\", cdk.Aws_ACCOUNT_ID())),\n})\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage2\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(jsii.String(\"nginx:latest\")),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\", cdk.Aws_ACCOUNT_ID())),\n})\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage3\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(jsii.String(\"javacs3/nginx:latest\"), jsii.String(\"username:password\")),\n\t// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n\t// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\", cdk.Aws_ACCOUNT_ID())),\n}).AddToPrincipalPolicy(awscdk.Aws_iam.NewPolicyStatement(&PolicyStatementProps{\n\tEffect: awscdk.*Aws_iam.Effect_ALLOW,\n\tActions: []*string{\n\t\tjsii.String(\"secretsmanager:GetSecretValue\"),\n\t},\n\tResources: []*string{\n\t\tjsii.String(\"*\"),\n\t},\n}))","version":"1"},"$":{"source":"import { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));","version":"0"}},"location":{"api":{"api":"moduleReadme","moduleFqn":"cdk-ecr-deployment"},"field":{"field":"markdown","line":34}},"didCompile":true,"fqnsReferenced":["aws-cdk-lib.aws_ecr_assets.DockerImageAsset","aws-cdk-lib.aws_ecr_assets.DockerImageAsset#imageUri","aws-cdk-lib.aws_ecr_assets.DockerImageAssetProps","aws-cdk-lib.aws_iam.Effect","aws-cdk-lib.aws_iam.Effect#ALLOW","aws-cdk-lib.aws_iam.PolicyStatement","aws-cdk-lib.aws_iam.PolicyStatementProps","cdk-ecr-deployment.DockerImageName","cdk-ecr-deployment.ECRDeployment","cdk-ecr-deployment.ECRDeployment#addToPrincipalPolicy","cdk-ecr-deployment.ECRDeploymentProps","cdk-ecr-deployment.IImageName"],"fullSource":"// Hoisted imports begin after !show marker below\n/// !show\nimport { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n/// !hide\n// Hoisted imports ended before !hide marker above\n// Fixture with packages imported, but nothing else\nimport * as path from 'node:path';\nimport { Construct } from 'constructs';\n import * as ecrdeploy from 'cdk-ecr-deployment';\nimport {\n Stack,\n aws_iam as iam,\n} from 'aws-cdk-lib';\nimport * as cdk from 'aws-cdk-lib';\n\nclass Fixture extends Stack {\n constructor(scope: Construct, id: string) {\n super(scope, id);\n\n // Code snippet begins after !show marker below\n/// !show\n\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));\n/// !hide\n// Code snippet ended before !hide marker above\n }\n}","syntaxKindCounter":{"11":11,"16":3,"18":3,"80":51,"110":4,"209":2,"210":5,"211":21,"213":2,"214":11,"228":3,"239":3,"243":1,"244":3,"260":1,"261":1,"272":1,"273":1,"275":1,"276":1,"303":10,"307":1},"fqnsFingerprint":"b2b5036b1bfc508279d58dec7b8bdd00caa0f71123068dc963187960f976dddb"}}}
|
|
1
|
+
{"version":"2","toolVersion":"5.7.4","snippets":{"33850328020507963bc7787401a169bb06e49f6132425a6d1529815c1554c645":{"translations":{"python":{"source":"from aws_cdk.aws_ecr_assets import DockerImageAsset\n\n\nimage = DockerImageAsset(self, \"CDKDockerImage\",\n directory=path.join(__dirname, \"docker\")\n)\n\n# Copy from cdk docker image asset to another ECR.\necrdeploy.ECRDeployment(self, \"DeployDockerImage1\",\n src=ecrdeploy.DockerImageName(image.image_uri),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\")\n)\n\n# Copy from docker registry to ECR.\necrdeploy.ECRDeployment(self, \"DeployDockerImage2\",\n src=ecrdeploy.DockerImageName(\"nginx:latest\"),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\")\n)\n\n# Copy from private docker registry to ECR.\n# The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\necrdeploy.ECRDeployment(self, \"DeployDockerImage3\",\n src=ecrdeploy.DockerImageName(\"javacs3/nginx:latest\", \"username:password\"),\n # src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n # src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest=ecrdeploy.DockerImageName(f\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\")\n).add_to_principal_policy(iam.PolicyStatement(\n effect=iam.Effect.ALLOW,\n actions=[\"secretsmanager:GetSecretValue\"\n ],\n resources=[\"*\"]\n))","version":"2"},"csharp":{"source":"using Amazon.CDK.AWS.Ecr.Assets;\n\n\nvar image = new DockerImageAsset(this, \"CDKDockerImage\", new DockerImageAssetProps {\n Directory = Join(__dirname, \"docker\")\n});\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\nnew ECRDeployment(this, \"DeployDockerImage1\", new ECRDeploymentProps {\n Src = new DockerImageName(image.ImageUri),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\")\n});\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\nnew ECRDeployment(this, \"DeployDockerImage2\", new ECRDeploymentProps {\n Src = new DockerImageName(\"nginx:latest\"),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\")\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ECRDeployment(this, \"DeployDockerImage3\", new ECRDeploymentProps {\n Src = new DockerImageName(\"javacs3/nginx:latest\", \"username:password\"),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n Dest = new DockerImageName($\"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\")\n}).AddToPrincipalPolicy(new PolicyStatement(new PolicyStatementProps {\n Effect = Effect.ALLOW,\n Actions = new [] { \"secretsmanager:GetSecretValue\" },\n Resources = new [] { \"*\" }\n}));","version":"1"},"java":{"source":"import software.amazon.awscdk.services.ecr.assets.DockerImageAsset;\n\n\nDockerImageAsset image = DockerImageAsset.Builder.create(this, \"CDKDockerImage\")\n .directory(join(__dirname, \"docker\"))\n .build();\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\nECRDeployment.Builder.create(this, \"DeployDockerImage1\")\n .src(new DockerImageName(image.getImageUri()))\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\", Aws.ACCOUNT_ID)))\n .build();\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\nECRDeployment.Builder.create(this, \"DeployDockerImage2\")\n .src(new DockerImageName(\"nginx:latest\"))\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\", Aws.ACCOUNT_ID)))\n .build();\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nECRDeployment.Builder.create(this, \"DeployDockerImage3\")\n .src(new DockerImageName(\"javacs3/nginx:latest\", \"username:password\"))\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n .dest(new DockerImageName(String.format(\"%s.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\", Aws.ACCOUNT_ID)))\n .build().addToPrincipalPolicy(PolicyStatement.Builder.create()\n .effect(Effect.ALLOW)\n .actions(List.of(\"secretsmanager:GetSecretValue\"))\n .resources(List.of(\"*\"))\n .build());","version":"1"},"go":{"source":"import \"github.com/aws/aws-cdk-go/awscdk\"\n\n\nimage := awscdk.NewDockerImageAsset(this, jsii.String(\"CDKDockerImage\"), &DockerImageAssetProps{\n\tDirectory: path.join(__dirname, jsii.String(\"docker\")),\n})\n\n// Copy from cdk docker image asset to another ECR.\n// Copy from cdk docker image asset to another ECR.\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage1\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(image.ImageUri),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest\", cdk.Aws_ACCOUNT_ID())),\n})\n\n// Copy from docker registry to ECR.\n// Copy from docker registry to ECR.\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage2\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(jsii.String(\"nginx:latest\")),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest\", cdk.Aws_ACCOUNT_ID())),\n})\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\necrdeploy.NewECRDeployment(this, jsii.String(\"DeployDockerImage3\"), &ECRDeploymentProps{\n\tSrc: ecrdeploy.NewDockerImageName(jsii.String(\"javacs3/nginx:latest\"), jsii.String(\"username:password\")),\n\t// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n\t// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n\tDest: ecrdeploy.NewDockerImageName(fmt.Sprintf(\"%v.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest\", cdk.Aws_ACCOUNT_ID())),\n}).AddToPrincipalPolicy(awscdk.Aws_iam.NewPolicyStatement(&PolicyStatementProps{\n\tEffect: awscdk.*Aws_iam.Effect_ALLOW,\n\tActions: []*string{\n\t\tjsii.String(\"secretsmanager:GetSecretValue\"),\n\t},\n\tResources: []*string{\n\t\tjsii.String(\"*\"),\n\t},\n}))","version":"1"},"$":{"source":"import { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));","version":"0"}},"location":{"api":{"api":"moduleReadme","moduleFqn":"cdk-ecr-deployment"},"field":{"field":"markdown","line":34}},"didCompile":true,"fqnsReferenced":["aws-cdk-lib.aws_ecr_assets.DockerImageAsset","aws-cdk-lib.aws_ecr_assets.DockerImageAsset#imageUri","aws-cdk-lib.aws_ecr_assets.DockerImageAssetProps","aws-cdk-lib.aws_iam.Effect","aws-cdk-lib.aws_iam.Effect#ALLOW","aws-cdk-lib.aws_iam.PolicyStatement","aws-cdk-lib.aws_iam.PolicyStatementProps","cdk-ecr-deployment.DockerImageName","cdk-ecr-deployment.ECRDeployment","cdk-ecr-deployment.ECRDeployment#addToPrincipalPolicy","cdk-ecr-deployment.ECRDeploymentProps","cdk-ecr-deployment.IImageName"],"fullSource":"// Hoisted imports begin after !show marker below\n/// !show\nimport { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n/// !hide\n// Hoisted imports ended before !hide marker above\n// Fixture with packages imported, but nothing else\nimport * as path from 'node:path';\nimport { Construct } from 'constructs';\n import * as ecrdeploy from 'cdk-ecr-deployment';\nimport {\n Stack,\n aws_iam as iam,\n} from 'aws-cdk-lib';\nimport * as cdk from 'aws-cdk-lib';\n\nclass Fixture extends Stack {\n constructor(scope: Construct, id: string) {\n super(scope, id);\n\n // Code snippet begins after !show marker below\n/// !show\n\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be plain text! e.g. <username>:<password>\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));\n/// !hide\n// Code snippet ended before !hide marker above\n }\n}","syntaxKindCounter":{"11":11,"16":3,"18":3,"80":51,"110":4,"209":2,"210":5,"211":21,"213":2,"214":11,"228":3,"239":3,"243":1,"244":3,"260":1,"261":1,"272":1,"273":1,"275":1,"276":1,"303":10,"307":1},"fqnsFingerprint":"b2b5036b1bfc508279d58dec7b8bdd00caa0f71123068dc963187960f976dddb"}}}
|
package/lib/index.js
CHANGED
|
@@ -38,7 +38,7 @@ class DockerImageName {
|
|
|
38
38
|
}
|
|
39
39
|
exports.DockerImageName = DockerImageName;
|
|
40
40
|
_a = JSII_RTTI_SYMBOL_1;
|
|
41
|
-
DockerImageName[_a] = { fqn: "cdk-ecr-deployment.DockerImageName", version: "3.1.
|
|
41
|
+
DockerImageName[_a] = { fqn: "cdk-ecr-deployment.DockerImageName", version: "3.1.9" };
|
|
42
42
|
class S3ArchiveName {
|
|
43
43
|
constructor(p, ref, creds) {
|
|
44
44
|
this.creds = creds;
|
|
@@ -51,7 +51,7 @@ class S3ArchiveName {
|
|
|
51
51
|
}
|
|
52
52
|
exports.S3ArchiveName = S3ArchiveName;
|
|
53
53
|
_b = JSII_RTTI_SYMBOL_1;
|
|
54
|
-
S3ArchiveName[_b] = { fqn: "cdk-ecr-deployment.S3ArchiveName", version: "3.1.
|
|
54
|
+
S3ArchiveName[_b] = { fqn: "cdk-ecr-deployment.S3ArchiveName", version: "3.1.9" };
|
|
55
55
|
class ECRDeployment extends constructs_1.Construct {
|
|
56
56
|
constructor(scope, id, props) {
|
|
57
57
|
super(scope, id);
|
|
@@ -141,5 +141,5 @@ class ECRDeployment extends constructs_1.Construct {
|
|
|
141
141
|
}
|
|
142
142
|
exports.ECRDeployment = ECRDeployment;
|
|
143
143
|
_c = JSII_RTTI_SYMBOL_1;
|
|
144
|
-
ECRDeployment[_c] = { fqn: "cdk-ecr-deployment.ECRDeployment", version: "3.1.
|
|
144
|
+
ECRDeployment[_c] = { fqn: "cdk-ecr-deployment.ECRDeployment", version: "3.1.9" };
|
|
145
145
|
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;AAAA,qEAAqE;AACrE,sCAAsC;AAGtC,+CAA+C;AAC/C,6BAA6B;AAC7B,6CAAoH;AAEpH,uDAAuD;AACvD,2CAAuC;AACvC,qCAAmD;AAmHnD,SAAS,OAAO,CAAC,UAAkB;IACjC,IAAI,IAAA,gCAAuB,GAAE,EAAE;QAC7B,IAAI;YACF,MAAM,aAAa,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,sBAAsB,CAAC,CAAC;YACnE,MAAM,YAAY,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,eAAe,CAAC,CAAC;YAC3D,aAAa,CAAC,YAAY,CAAC,OAAO,CAAC,KAAK,EAAE,CAAC,aAAa,EAAE,YAAY,CAAC,CAAC,CAAC;YAEzE,OAAO,wBAAM,CAAC,IAAI,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC;SAC5C;QAAC,OAAO,GAAG,EAAE;YACZ,OAAO,CAAC,IAAI,CAAC,gCAAgC,GAAG,EAAE,CAAC,CAAC;SACrD;KACF;IAED,OAAO,wBAAM,CAAC,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,WAAW,CAAC,EAAE;QACpE,SAAS,EAAE;YACT,UAAU;SACX;KACF,CAAC,CAAC;AACL,CAAC;AAED,MAAa,eAAe;IAC1B,YAA2B,IAAY,EAAS,KAAc;QAAnC,SAAI,GAAJ,IAAI,CAAQ;QAAS,UAAK,GAAL,KAAK,CAAS;IAAI,CAAC;IACnE,IAAW,GAAG,KAAa,OAAO,YAAY,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;;AAF9D,0CAGC;;;AAED,MAAa,aAAa;IAExB,YAAmB,CAAS,EAAE,GAAY,EAAS,KAAc;QAAd,UAAK,GAAL,KAAK,CAAS;QAC/D,IAAI,CAAC,IAAI,GAAG,CAAC,CAAC;QACd,IAAI,GAAG,EAAE;YACP,IAAI,CAAC,IAAI,IAAI,GAAG,GAAG,GAAG,CAAC;SACxB;IACH,CAAC;IACD,IAAW,GAAG,KAAa,OAAO,QAAQ,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;;AAR1D,sCASC;;;AAED,MAAa,aAAc,SAAQ,sBAAS;IAG1C,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAyB;QACjE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,MAAM,WAAW,GAAG,KAAK,CAAC,WAAW,IAAI,GAAG,CAAC;QAC7C,IAAI,CAAC,OAAO,GAAG,IAAI,wBAAM,CAAC,iBAAiB,CAAC,IAAI,EAAE,uBAAuB,EAAE;YACzE,IAAI,EAAE,IAAI,CAAC,mBAAmB,CAAC,WAAW,CAAC;YAC3C,IAAI,EAAE,OAAO,CAAC,KAAK,CAAC,UAAU,IAAI,wCAAwC,CAAC;YAC3E,OAAO,EAAE,KAAK,CAAC,aAAa,IAAI,IAAI,wBAAM,CAAC,OAAO,CAAC,iBAAiB,EAAE,0BAAa,CAAC,KAAK,CAAC;YAC1F,OAAO,EAAE,KAAK,CAAC,aAAa,IAAI,WAAW;YAC3C,WAAW,EAAE,KAAK,CAAC,WAAW;YAC9B,aAAa,EAAE,0BAA0B;YACzC,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YAC7B,IAAI,EAAE,KAAK,CAAC,IAAI;YAChB,UAAU,EAAE,WAAW;YACvB,GAAG,EAAE,KAAK,CAAC,GAAG;YACd,UAAU,EAAE,KAAK,CAAC,UAAU;YAC5B,cAAc,EAAE,KAAK,CAAC,cAAc;SACrC,CAAC,CAAC;QAEH,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,WAAW,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;SAAE;QAE7F,WAAW,CAAC,oBAAoB,CAC9B,IAAI,qBAAG,CAAC,eAAe,CAAC;YACtB,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,2BAA2B;gBAC3B,iCAAiC;gBACjC,4BAA4B;gBAC5B,yBAAyB;gBACzB,0BAA0B;gBAC1B,gBAAgB;gBAChB,oBAAoB;gBACpB,mBAAmB;gBACnB,yBAAyB;gBACzB,+BAA+B;gBAC/B,yBAAyB;gBACzB,qBAAqB;gBACrB,yBAAyB;gBACzB,cAAc;aACf;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QACN,WAAW,CAAC,oBAAoB,CAAC,IAAI,qBAAG,CAAC,eAAe,CAAC;YACvD,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,cAAc;aACf;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QAEJ,IAAI,KAAK,CAAC,SAAS,IAAI,KAAK,CAAC,SAAS,CAAC,MAAM,KAAK,CAAC,EAAE;YACnD,MAAM,IAAI,KAAK,CAAC,iDAAiD,IAAI,CAAC,SAAS,CAAC,KAAK,CAAC,SAAS,CAAC,EAAE,CAAC,CAAC;SACrG;QACD,MAAM,SAAS,GAAG,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;QAE5D,IAAI,4BAAc,CAAC,IAAI,EAAE,gBAAgB,EAAE;YACzC,YAAY,EAAE,IAAI,CAAC,OAAO,CAAC,WAAW;YACtC,sGAAsG;YACtG,YAAY,EAAE,6BAA6B;YAC3C,UAAU,EAAE;gBACV,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,GAAG;gBACvB,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,KAAK;gBACzB,SAAS,EAAE,KAAK,CAAC,IAAI,CAAC,GAAG;gBACzB,SAAS,EAAE,KAAK,CAAC,IAAI,CAAC,KAAK;gBAC3B,GAAG,SAAS,CAAC,CAAC,CAAC,EAAE,SAAS,EAAE,SAAS,EAAE,CAAC,CAAC,CAAC,EAAE;aAC7C;SACF,CAAC,CAAC;IACL,CAAC;IAEM,oBAAoB,CAAC,SAA0B;QACpD,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,WAAW,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;SAAE;QAE7F,OAAO,WAAW,CAAC,oBAAoB,CAAC,SAAS,CAAC,CAAC;IACrD,CAAC;IAEO,mBAAmB,CAAC,WAAoB;QAC9C,IAAI,IAAI,GAAG,sCAAsC,CAAC;QAElD,0EAA0E;QAC1E,2EAA2E;QAC3E,4CAA4C;QAC5C,IAAI,WAAW,EAAE;YACf,IAAI,mBAAK,CAAC,YAAY,CAAC,WAAW,CAAC,EAAE;gBACnC,MAAM,IAAI,KAAK,CAAC,mHAAmH,CAAC,CAAC;aACtI;YAED,IAAI,IAAI,IAAI,WAAW,CAAC,QAAQ,EAAE,KAAK,CAAC;SACzC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;;AA9FH,sCA+FC","sourcesContent":["// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n// SPDX-License-Identifier: Apache-2.0\n\n\nimport * as child_process from 'child_process';\nimport * as path from 'path';\nimport { aws_ec2 as ec2, aws_iam as iam, aws_lambda as lambda, Duration, CustomResource, Token } from 'aws-cdk-lib';\nimport { PolicyStatement, AddToPrincipalPolicyResult } from 'aws-cdk-lib/aws-iam';\nimport { RuntimeFamily } from 'aws-cdk-lib/aws-lambda';\nimport { Construct } from 'constructs';\nimport { shouldUsePrebuiltLambda } from './config';\n\nexport interface ECRDeploymentProps {\n\n  /**\n   * Image to use to build Golang lambda for custom resource, if download fails or is not wanted.\n   *\n   * Might be needed for local build if all images need to come from own registry.\n   *\n   * Note that image should use yum as a package manager and have golang available.\n   *\n   * @default - public.ecr.aws/sam/build-go1.x:latest\n   */\n  readonly buildImage?: string;\n  /**\n   * The source of the docker image.\n   */\n  readonly src: IImageName;\n\n  /**\n   * The destination of the docker image.\n   */\n  readonly dest: IImageName;\n\n  /**\n   * The image architecture to be copied.\n   *\n   * The 'amd64' architecture will be copied by default. Specify the\n   * architecture or architectures to copy here.\n   *\n   * It is currently not possible to copy more than one architecture\n   * at a time: the array you specify must contain exactly one string.\n   *\n   * @default ['amd64']\n   */\n  readonly imageArch?: string[];\n\n  /**\n   * The amount of memory (in MiB) to allocate to the AWS Lambda function which\n   * replicates the files from the CDK bucket to the destination bucket.\n   *\n   * If you are deploying large files, you will need to increase this number\n   * accordingly.\n   *\n   * @default - 512\n   */\n  readonly memoryLimit?: number;\n\n  /**\n   * Execution role associated with this function\n   *\n   * @default - A role is automatically created\n   */\n  readonly role?: iam.IRole;\n\n  /**\n   * The VPC network to place the deployment lambda handler in.\n   *\n   * @default - None\n   */\n  readonly vpc?: ec2.IVpc;\n\n  /**\n   * Where in the VPC to place the deployment lambda handler.\n   * Only used if 'vpc' is supplied.\n   *\n   * @default - the Vpc default strategy if not specified\n   */\n  readonly vpcSubnets?: ec2.SubnetSelection;\n\n  /**\n   * The list of security groups to associate with the Lambda's network interfaces.\n   *\n   * Only used if 'vpc' is supplied.\n   *\n   * @default - If the function is placed within a VPC and a security group is\n   * not specified, either by this or securityGroup prop, a dedicated security\n   * group will be created for this function.\n   */\n  readonly securityGroups?: ec2.SecurityGroup[];\n\n  /**\n   * The lambda function runtime environment.\n   *\n   * @default - lambda.Runtime.PROVIDED_AL2023\n   */\n  readonly lambdaRuntime?: lambda.Runtime;\n\n  /**\n   * The name of the lambda handler.\n   *\n   * @default - bootstrap\n   */\n  readonly lambdaHandler?: string;\n\n  /**\n   * The environment variable to set\n   */\n  readonly environment?: { [key: string]: string };\n}\n\nexport interface IImageName {\n  /**\n   *  The uri of the docker image.\n   *\n   *  The uri spec follows https://github.com/containers/skopeo\n   */\n  readonly uri: string;\n\n  /**\n   * The credentials of the docker image. Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`\n   */\n  creds?: string;\n}\n\nfunction getCode(buildImage: string): lambda.AssetCode {\n  if (shouldUsePrebuiltLambda()) {\n    try {\n      const installScript = path.join(__dirname, '../lambda/install.js');\n      const prebuiltPath = path.join(__dirname, '../lambda/out');\n      child_process.execFileSync(process.argv0, [installScript, prebuiltPath]);\n\n      return lambda.Code.fromAsset(prebuiltPath);\n    } catch (err) {\n      console.warn(`Can not get prebuilt lambda: ${err}`);\n    }\n  }\n\n  return lambda.Code.fromDockerBuild(path.join(__dirname, '../lambda'), {\n    buildArgs: {\n      buildImage,\n    },\n  });\n}\n\nexport class DockerImageName implements IImageName {\n  public constructor(private name: string, public creds?: string) { }\n  public get uri(): string { return `docker://${this.name}`; }\n}\n\nexport class S3ArchiveName implements IImageName {\n  private name: string;\n  public constructor(p: string, ref?: string, public creds?: string) {\n    this.name = p;\n    if (ref) {\n      this.name += ':' + ref;\n    }\n  }\n  public get uri(): string { return `s3://${this.name}`; }\n}\n\nexport class ECRDeployment extends Construct {\n  private handler: lambda.SingletonFunction;\n\n  constructor(scope: Construct, id: string, props: ECRDeploymentProps) {\n    super(scope, id);\n    const memoryLimit = props.memoryLimit ?? 512;\n    this.handler = new lambda.SingletonFunction(this, 'CustomResourceHandler', {\n      uuid: this.renderSingletonUuid(memoryLimit),\n      code: getCode(props.buildImage ?? 'public.ecr.aws/docker/library/golang:1'),\n      runtime: props.lambdaRuntime ?? new lambda.Runtime('provided.al2023', RuntimeFamily.OTHER), // not using Runtime.PROVIDED_AL2023 to support older CDK versions (< 2.105.0)\n      handler: props.lambdaHandler ?? 'bootstrap',\n      environment: props.environment,\n      lambdaPurpose: 'Custom::CDKECRDeployment',\n      timeout: Duration.minutes(15),\n      role: props.role,\n      memorySize: memoryLimit,\n      vpc: props.vpc,\n      vpcSubnets: props.vpcSubnets,\n      securityGroups: props.securityGroups,\n    });\n\n    const handlerRole = this.handler.role;\n    if (!handlerRole) { throw new Error('lambda.SingletonFunction should have created a Role'); }\n\n    handlerRole.addToPrincipalPolicy(\n      new iam.PolicyStatement({\n        effect: iam.Effect.ALLOW,\n        actions: [\n          'ecr:GetAuthorizationToken',\n          'ecr:BatchCheckLayerAvailability',\n          'ecr:GetDownloadUrlForLayer',\n          'ecr:GetRepositoryPolicy',\n          'ecr:DescribeRepositories',\n          'ecr:ListImages',\n          'ecr:DescribeImages',\n          'ecr:BatchGetImage',\n          'ecr:ListTagsForResource',\n          'ecr:DescribeImageScanFindings',\n          'ecr:InitiateLayerUpload',\n          'ecr:UploadLayerPart',\n          'ecr:CompleteLayerUpload',\n          'ecr:PutImage',\n        ],\n        resources: ['*'],\n      }));\n    handlerRole.addToPrincipalPolicy(new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions: [\n        's3:GetObject',\n      ],\n      resources: ['*'],\n    }));\n\n    if (props.imageArch && props.imageArch.length !== 1) {\n      throw new Error(`imageArch must contain exactly 1 element, got ${JSON.stringify(props.imageArch)}`);\n    }\n    const imageArch = props.imageArch ? props.imageArch[0] : '';\n\n    new CustomResource(this, 'CustomResource', {\n      serviceToken: this.handler.functionArn,\n      // This has been copy/pasted and is a pure lie, but changing it is going to change people's infra!! X(\n      resourceType: 'Custom::CDKBucketDeployment',\n      properties: {\n        SrcImage: props.src.uri,\n        SrcCreds: props.src.creds,\n        DestImage: props.dest.uri,\n        DestCreds: props.dest.creds,\n        ...imageArch ? { ImageArch: imageArch } : {},\n      },\n    });\n  }\n\n  public addToPrincipalPolicy(statement: PolicyStatement): AddToPrincipalPolicyResult {\n    const handlerRole = this.handler.role;\n    if (!handlerRole) { throw new Error('lambda.SingletonFunction should have created a Role'); }\n\n    return handlerRole.addToPrincipalPolicy(statement);\n  }\n\n  private renderSingletonUuid(memoryLimit?: number) {\n    let uuid = 'bd07c930-edb9-4112-a20f-03f096f53666';\n\n    // if user specify a custom memory limit, define another singleton handler\n    // with this configuration. otherwise, it won't be possible to use multiple\n    // configurations since we have a singleton.\n    if (memoryLimit) {\n      if (Token.isUnresolved(memoryLimit)) {\n        throw new Error('Can\\'t use tokens when specifying \"memoryLimit\" since we use it to identify the singleton custom resource handler');\n      }\n\n      uuid += `-${memoryLimit.toString()}MiB`;\n    }\n\n    return uuid;\n  }\n}\n"]}
|
|
@@ -8,7 +8,7 @@ This package contains type definitions for node (https://nodejs.org/).
|
|
|
8
8
|
Files were exported from https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node.
|
|
9
9
|
|
|
10
10
|
### Additional Details
|
|
11
|
-
* Last updated:
|
|
11
|
+
* Last updated: Thu, 13 Feb 2025 04:35:29 GMT
|
|
12
12
|
* Dependencies: [undici-types](https://npmjs.com/package/undici-types)
|
|
13
13
|
|
|
14
14
|
# Credits
|
|
@@ -956,6 +956,59 @@ declare module "assert" {
|
|
|
956
956
|
* @since v13.6.0, v12.16.0
|
|
957
957
|
*/
|
|
958
958
|
function doesNotMatch(value: string, regExp: RegExp, message?: string | Error): void;
|
|
959
|
+
/**
|
|
960
|
+
* `assert.partialDeepStrictEqual()` Asserts the equivalence between the `actual` and `expected` parameters through a
|
|
961
|
+
* deep comparison, ensuring that all properties in the `expected` parameter are
|
|
962
|
+
* present in the `actual` parameter with equivalent values, not allowing type coercion.
|
|
963
|
+
* The main difference with `assert.deepStrictEqual()` is that `assert.partialDeepStrictEqual()` does not require
|
|
964
|
+
* all properties in the `actual` parameter to be present in the `expected` parameter.
|
|
965
|
+
* This method should always pass the same test cases as `assert.deepStrictEqual()`, behaving as a super set of it.
|
|
966
|
+
*
|
|
967
|
+
* ```js
|
|
968
|
+
* import assert from 'node:assert';
|
|
969
|
+
*
|
|
970
|
+
* assert.partialDeepStrictEqual({ a: 1, b: 2 }, { a: 1, b: 2 });
|
|
971
|
+
* // OK
|
|
972
|
+
*
|
|
973
|
+
* assert.partialDeepStrictEqual({ a: { b: { c: 1 } } }, { a: { b: { c: 1 } } });
|
|
974
|
+
* // OK
|
|
975
|
+
*
|
|
976
|
+
* assert.partialDeepStrictEqual({ a: 1, b: 2, c: 3 }, { a: 1, b: 2 });
|
|
977
|
+
* // OK
|
|
978
|
+
*
|
|
979
|
+
* assert.partialDeepStrictEqual(new Set(['value1', 'value2']), new Set(['value1', 'value2']));
|
|
980
|
+
* // OK
|
|
981
|
+
*
|
|
982
|
+
* assert.partialDeepStrictEqual(new Map([['key1', 'value1']]), new Map([['key1', 'value1']]));
|
|
983
|
+
* // OK
|
|
984
|
+
*
|
|
985
|
+
* assert.partialDeepStrictEqual(new Uint8Array([1, 2, 3]), new Uint8Array([1, 2, 3]));
|
|
986
|
+
* // OK
|
|
987
|
+
*
|
|
988
|
+
* assert.partialDeepStrictEqual(/abc/, /abc/);
|
|
989
|
+
* // OK
|
|
990
|
+
*
|
|
991
|
+
* assert.partialDeepStrictEqual([{ a: 5 }, { b: 5 }], [{ a: 5 }]);
|
|
992
|
+
* // OK
|
|
993
|
+
*
|
|
994
|
+
* assert.partialDeepStrictEqual(new Set([{ a: 1 }, { b: 1 }]), new Set([{ a: 1 }]));
|
|
995
|
+
* // OK
|
|
996
|
+
*
|
|
997
|
+
* assert.partialDeepStrictEqual(new Date(0), new Date(0));
|
|
998
|
+
* // OK
|
|
999
|
+
*
|
|
1000
|
+
* assert.partialDeepStrictEqual({ a: 1 }, { a: 1, b: 2 });
|
|
1001
|
+
* // AssertionError
|
|
1002
|
+
*
|
|
1003
|
+
* assert.partialDeepStrictEqual({ a: 1, b: '2' }, { a: 1, b: 2 });
|
|
1004
|
+
* // AssertionError
|
|
1005
|
+
*
|
|
1006
|
+
* assert.partialDeepStrictEqual({ a: { b: 2 } }, { a: { b: '2' } });
|
|
1007
|
+
* // AssertionError
|
|
1008
|
+
* ```
|
|
1009
|
+
* @since v22.13.0
|
|
1010
|
+
*/
|
|
1011
|
+
function partialDeepStrictEqual(actual: unknown, expected: unknown, message?: string | Error): void;
|
|
959
1012
|
/**
|
|
960
1013
|
* In strict assertion mode, non-strict methods behave like their corresponding strict methods. For example,
|
|
961
1014
|
* {@link deepEqual} will behave like {@link deepStrictEqual}.
|
|
@@ -1015,6 +1068,7 @@ declare module "assert" {
|
|
|
1015
1068
|
| "deepStrictEqual"
|
|
1016
1069
|
| "ifError"
|
|
1017
1070
|
| "strict"
|
|
1071
|
+
| "AssertionError"
|
|
1018
1072
|
>
|
|
1019
1073
|
& {
|
|
1020
1074
|
(value: unknown, message?: string | Error): asserts value;
|
|
@@ -1030,6 +1084,7 @@ declare module "assert" {
|
|
|
1030
1084
|
deepStrictEqual: typeof deepStrictEqual;
|
|
1031
1085
|
ifError: typeof ifError;
|
|
1032
1086
|
strict: typeof strict;
|
|
1087
|
+
AssertionError: typeof AssertionError;
|
|
1033
1088
|
};
|
|
1034
1089
|
}
|
|
1035
1090
|
export = assert;
|
|
@@ -107,7 +107,8 @@ declare module "buffer" {
|
|
|
107
107
|
*
|
|
108
108
|
* If `totalLength` is provided, it is coerced to an unsigned integer. If the
|
|
109
109
|
* combined length of the `Buffer`s in `list` exceeds `totalLength`, the result is
|
|
110
|
-
* truncated to `totalLength`.
|
|
110
|
+
* truncated to `totalLength`. If the combined length of the `Buffer`s in `list` is
|
|
111
|
+
* less than `totalLength`, the remaining space is filled with zeros.
|
|
111
112
|
*
|
|
112
113
|
* ```js
|
|
113
114
|
* import { Buffer } from 'node:buffer';
|
|
@@ -26,7 +26,7 @@
|
|
|
26
26
|
* @see [source](https://github.com/nodejs/node/blob/v22.x/lib/dgram.js)
|
|
27
27
|
*/
|
|
28
28
|
declare module "dgram" {
|
|
29
|
-
import { AddressInfo } from "node:net";
|
|
29
|
+
import { AddressInfo, BlockList } from "node:net";
|
|
30
30
|
import * as dns from "node:dns";
|
|
31
31
|
import { Abortable, EventEmitter } from "node:events";
|
|
32
32
|
interface RemoteInfo {
|
|
@@ -59,6 +59,8 @@ declare module "dgram" {
|
|
|
59
59
|
callback: (err: NodeJS.ErrnoException | null, address: string, family: number) => void,
|
|
60
60
|
) => void)
|
|
61
61
|
| undefined;
|
|
62
|
+
receiveBlockList?: BlockList | undefined;
|
|
63
|
+
sendBlockList?: BlockList | undefined;
|
|
62
64
|
}
|
|
63
65
|
/**
|
|
64
66
|
* Creates a `dgram.Socket` object. Once the socket is created, calling `socket.bind()` will instruct the socket to begin listening for datagram
|
|
@@ -112,7 +112,7 @@ declare module "fs/promises" {
|
|
|
112
112
|
appendFile(
|
|
113
113
|
data: string | Uint8Array,
|
|
114
114
|
options?:
|
|
115
|
-
| (ObjectEncodingOptions &
|
|
115
|
+
| (ObjectEncodingOptions & Abortable)
|
|
116
116
|
| BufferEncoding
|
|
117
117
|
| null,
|
|
118
118
|
): Promise<void>;
|
|
@@ -402,7 +402,7 @@ declare module "fs/promises" {
|
|
|
402
402
|
writeFile(
|
|
403
403
|
data: string | Uint8Array,
|
|
404
404
|
options?:
|
|
405
|
-
| (ObjectEncodingOptions &
|
|
405
|
+
| (ObjectEncodingOptions & Abortable)
|
|
406
406
|
| BufferEncoding
|
|
407
407
|
| null,
|
|
408
408
|
): Promise<void>;
|
|
@@ -223,6 +223,7 @@ declare module "http" {
|
|
|
223
223
|
path?: string | null | undefined;
|
|
224
224
|
port?: number | string | null | undefined;
|
|
225
225
|
protocol?: string | null | undefined;
|
|
226
|
+
setDefaultHeaders?: boolean | undefined;
|
|
226
227
|
setHost?: boolean | undefined;
|
|
227
228
|
signal?: AbortSignal | undefined;
|
|
228
229
|
socketPath?: string | undefined;
|
|
@@ -168,6 +168,80 @@ declare module "module" {
|
|
|
168
168
|
options?: RegisterOptions<Data>,
|
|
169
169
|
): void;
|
|
170
170
|
function register<Data = any>(specifier: string | URL, options?: RegisterOptions<Data>): void;
|
|
171
|
+
interface StripTypeScriptTypesOptions {
|
|
172
|
+
/**
|
|
173
|
+
* Possible values are:
|
|
174
|
+
* * `'strip'` Only strip type annotations without performing the transformation of TypeScript features.
|
|
175
|
+
* * `'transform'` Strip type annotations and transform TypeScript features to JavaScript.
|
|
176
|
+
* @default 'strip'
|
|
177
|
+
*/
|
|
178
|
+
mode?: "strip" | "transform" | undefined;
|
|
179
|
+
/**
|
|
180
|
+
* Only when `mode` is `'transform'`, if `true`, a source map
|
|
181
|
+
* will be generated for the transformed code.
|
|
182
|
+
* @default false
|
|
183
|
+
*/
|
|
184
|
+
sourceMap?: boolean | undefined;
|
|
185
|
+
/**
|
|
186
|
+
* Specifies the source url used in the source map.
|
|
187
|
+
*/
|
|
188
|
+
sourceUrl?: string | undefined;
|
|
189
|
+
}
|
|
190
|
+
/**
|
|
191
|
+
* `module.stripTypeScriptTypes()` removes type annotations from TypeScript code. It
|
|
192
|
+
* can be used to strip type annotations from TypeScript code before running it
|
|
193
|
+
* with `vm.runInContext()` or `vm.compileFunction()`.
|
|
194
|
+
* By default, it will throw an error if the code contains TypeScript features
|
|
195
|
+
* that require transformation such as `Enums`,
|
|
196
|
+
* see [type-stripping](https://nodejs.org/docs/latest-v22.x/api/typescript.md#type-stripping) for more information.
|
|
197
|
+
* When mode is `'transform'`, it also transforms TypeScript features to JavaScript,
|
|
198
|
+
* see [transform TypeScript features](https://nodejs.org/docs/latest-v22.x/api/typescript.md#typescript-features) for more information.
|
|
199
|
+
* When mode is `'strip'`, source maps are not generated, because locations are preserved.
|
|
200
|
+
* If `sourceMap` is provided, when mode is `'strip'`, an error will be thrown.
|
|
201
|
+
*
|
|
202
|
+
* _WARNING_: The output of this function should not be considered stable across Node.js versions,
|
|
203
|
+
* due to changes in the TypeScript parser.
|
|
204
|
+
*
|
|
205
|
+
* ```js
|
|
206
|
+
* import { stripTypeScriptTypes } from 'node:module';
|
|
207
|
+
* const code = 'const a: number = 1;';
|
|
208
|
+
* const strippedCode = stripTypeScriptTypes(code);
|
|
209
|
+
* console.log(strippedCode);
|
|
210
|
+
* // Prints: const a = 1;
|
|
211
|
+
* ```
|
|
212
|
+
*
|
|
213
|
+
* If `sourceUrl` is provided, it will be used appended as a comment at the end of the output:
|
|
214
|
+
*
|
|
215
|
+
* ```js
|
|
216
|
+
* import { stripTypeScriptTypes } from 'node:module';
|
|
217
|
+
* const code = 'const a: number = 1;';
|
|
218
|
+
* const strippedCode = stripTypeScriptTypes(code, { mode: 'strip', sourceUrl: 'source.ts' });
|
|
219
|
+
* console.log(strippedCode);
|
|
220
|
+
* // Prints: const a = 1\n\n//# sourceURL=source.ts;
|
|
221
|
+
* ```
|
|
222
|
+
*
|
|
223
|
+
* When `mode` is `'transform'`, the code is transformed to JavaScript:
|
|
224
|
+
*
|
|
225
|
+
* ```js
|
|
226
|
+
* import { stripTypeScriptTypes } from 'node:module';
|
|
227
|
+
* const code = `
|
|
228
|
+
* namespace MathUtil {
|
|
229
|
+
* export const add = (a: number, b: number) => a + b;
|
|
230
|
+
* }`;
|
|
231
|
+
* const strippedCode = stripTypeScriptTypes(code, { mode: 'transform', sourceMap: true });
|
|
232
|
+
* console.log(strippedCode);
|
|
233
|
+
* // Prints:
|
|
234
|
+
* // var MathUtil;
|
|
235
|
+
* // (function(MathUtil) {
|
|
236
|
+
* // MathUtil.add = (a, b)=>a + b;
|
|
237
|
+
* // })(MathUtil || (MathUtil = {}));
|
|
238
|
+
* // # sourceMappingURL=data:application/json;base64, ...
|
|
239
|
+
* ```
|
|
240
|
+
* @since v22.13.0
|
|
241
|
+
* @param code The code to strip type annotations from.
|
|
242
|
+
* @returns The code with type annotations stripped.
|
|
243
|
+
*/
|
|
244
|
+
function stripTypeScriptTypes(code: string, options?: StripTypeScriptTypesOptions): string;
|
|
171
245
|
/* eslint-enable @definitelytyped/no-unnecessary-generics */
|
|
172
246
|
/**
|
|
173
247
|
* The `module.syncBuiltinESMExports()` method updates all the live bindings for
|
|
@@ -65,6 +65,7 @@ declare module "net" {
|
|
|
65
65
|
* @since v18.13.0
|
|
66
66
|
*/
|
|
67
67
|
autoSelectFamilyAttemptTimeout?: number | undefined;
|
|
68
|
+
blockList?: BlockList | undefined;
|
|
68
69
|
}
|
|
69
70
|
interface IpcSocketConnectOpts {
|
|
70
71
|
path: string;
|
|
@@ -535,6 +536,15 @@ declare module "net" {
|
|
|
535
536
|
* @since v18.17.0, v20.1.0
|
|
536
537
|
*/
|
|
537
538
|
highWaterMark?: number | undefined;
|
|
539
|
+
/**
|
|
540
|
+
* `blockList` can be used for disabling inbound
|
|
541
|
+
* access to specific IP addresses, IP ranges, or IP subnets. This does not
|
|
542
|
+
* work if the server is behind a reverse proxy, NAT, etc. because the address
|
|
543
|
+
* checked against the block list is the address of the proxy, or the one
|
|
544
|
+
* specified by the NAT.
|
|
545
|
+
* @since v22.13.0
|
|
546
|
+
*/
|
|
547
|
+
blockList?: BlockList | undefined;
|
|
538
548
|
}
|
|
539
549
|
interface DropArgument {
|
|
540
550
|
localAddress?: string;
|
|
@@ -786,6 +796,12 @@ declare module "net" {
|
|
|
786
796
|
* @since v15.0.0, v14.18.0
|
|
787
797
|
*/
|
|
788
798
|
rules: readonly string[];
|
|
799
|
+
/**
|
|
800
|
+
* Returns `true` if the `value` is a `net.BlockList`.
|
|
801
|
+
* @since v22.13.0
|
|
802
|
+
* @param value Any JS value
|
|
803
|
+
*/
|
|
804
|
+
static isBlockList(value: unknown): value is BlockList;
|
|
789
805
|
}
|
|
790
806
|
interface TcpNetConnectOpts extends TcpSocketConnectOpts, SocketConstructorOpts {
|
|
791
807
|
timeout?: number | undefined;
|
|
@@ -998,6 +1014,14 @@ declare module "net" {
|
|
|
998
1014
|
* @since v15.14.0, v14.18.0
|
|
999
1015
|
*/
|
|
1000
1016
|
readonly flowlabel: number;
|
|
1017
|
+
/**
|
|
1018
|
+
* @since v22.13.0
|
|
1019
|
+
* @param input An input string containing an IP address and optional port,
|
|
1020
|
+
* e.g. `123.1.2.3:1234` or `[1::1]:1234`.
|
|
1021
|
+
* @returns Returns a `SocketAddress` if parsing was successful.
|
|
1022
|
+
* Otherwise returns `undefined`.
|
|
1023
|
+
*/
|
|
1024
|
+
static parse(input: string): SocketAddress | undefined;
|
|
1001
1025
|
}
|
|
1002
1026
|
}
|
|
1003
1027
|
declare module "node:net" {
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@types/node",
|
|
3
|
-
"version": "22.
|
|
3
|
+
"version": "22.13.2",
|
|
4
4
|
"description": "TypeScript definitions for node",
|
|
5
5
|
"homepage": "https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node",
|
|
6
6
|
"license": "MIT",
|
|
@@ -215,6 +215,6 @@
|
|
|
215
215
|
"undici-types": "~6.20.0"
|
|
216
216
|
},
|
|
217
217
|
"peerDependencies": {},
|
|
218
|
-
"typesPublisherContentHash": "
|
|
218
|
+
"typesPublisherContentHash": "8f76b84da333a4c284b6ca2d01420553eea2aa3051743db8e776b50e4342f5c1",
|
|
219
219
|
"typeScriptVersion": "5.0"
|
|
220
220
|
}
|
|
@@ -594,6 +594,11 @@ declare module "perf_hooks" {
|
|
|
594
594
|
buffered?: boolean | undefined;
|
|
595
595
|
},
|
|
596
596
|
): void;
|
|
597
|
+
/**
|
|
598
|
+
* @since v16.0.0
|
|
599
|
+
* @returns Current list of entries stored in the performance observer, emptying it out.
|
|
600
|
+
*/
|
|
601
|
+
takeRecords(): PerformanceEntry[];
|
|
597
602
|
}
|
|
598
603
|
/**
|
|
599
604
|
* Provides detailed network timing data regarding the loading of an application's resources.
|
|
@@ -186,7 +186,10 @@ declare module "process" {
|
|
|
186
186
|
readonly inspector: boolean;
|
|
187
187
|
/**
|
|
188
188
|
* A boolean value that is `true` if the current Node.js build includes support for IPv6.
|
|
189
|
+
*
|
|
190
|
+
* Since all Node.js builds have IPv6 support, this value is always `true`.
|
|
189
191
|
* @since v0.5.3
|
|
192
|
+
* @deprecated This property is always true, and any checks based on it are redundant.
|
|
190
193
|
*/
|
|
191
194
|
readonly ipv6: boolean;
|
|
192
195
|
/**
|
|
@@ -202,17 +205,29 @@ declare module "process" {
|
|
|
202
205
|
readonly tls: boolean;
|
|
203
206
|
/**
|
|
204
207
|
* A boolean value that is `true` if the current Node.js build includes support for ALPN in TLS.
|
|
208
|
+
*
|
|
209
|
+
* In Node.js 11.0.0 and later versions, the OpenSSL dependencies feature unconditional ALPN support.
|
|
210
|
+
* This value is therefore identical to that of `process.features.tls`.
|
|
205
211
|
* @since v4.8.0
|
|
212
|
+
* @deprecated Use `process.features.tls` instead.
|
|
206
213
|
*/
|
|
207
214
|
readonly tls_alpn: boolean;
|
|
208
215
|
/**
|
|
209
216
|
* A boolean value that is `true` if the current Node.js build includes support for OCSP in TLS.
|
|
217
|
+
*
|
|
218
|
+
* In Node.js 11.0.0 and later versions, the OpenSSL dependencies feature unconditional OCSP support.
|
|
219
|
+
* This value is therefore identical to that of `process.features.tls`.
|
|
210
220
|
* @since v0.11.13
|
|
221
|
+
* @deprecated Use `process.features.tls` instead.
|
|
211
222
|
*/
|
|
212
223
|
readonly tls_ocsp: boolean;
|
|
213
224
|
/**
|
|
214
225
|
* A boolean value that is `true` if the current Node.js build includes support for SNI in TLS.
|
|
226
|
+
*
|
|
227
|
+
* In Node.js 11.0.0 and later versions, the OpenSSL dependencies feature unconditional SNI support.
|
|
228
|
+
* This value is therefore identical to that of `process.features.tls`.
|
|
215
229
|
* @since v0.5.3
|
|
230
|
+
* @deprecated Use `process.features.tls` instead.
|
|
216
231
|
*/
|
|
217
232
|
readonly tls_sni: boolean;
|
|
218
233
|
/**
|
|
@@ -223,8 +238,10 @@ declare module "process" {
|
|
|
223
238
|
readonly typescript: "strip" | "transform" | false;
|
|
224
239
|
/**
|
|
225
240
|
* A boolean value that is `true` if the current Node.js build includes support for libuv.
|
|
226
|
-
*
|
|
241
|
+
*
|
|
242
|
+
* Since it's not possible to build Node.js without libuv, this value is always `true`.
|
|
227
243
|
* @since v0.5.3
|
|
244
|
+
* @deprecated This property is always true, and any checks based on it are redundant.
|
|
228
245
|
*/
|
|
229
246
|
readonly uv: boolean;
|
|
230
247
|
}
|
|
@@ -1676,7 +1693,7 @@ declare module "process" {
|
|
|
1676
1693
|
*/
|
|
1677
1694
|
nextTick(callback: Function, ...args: any[]): void;
|
|
1678
1695
|
/**
|
|
1679
|
-
* This API is available through the [--
|
|
1696
|
+
* This API is available through the [--permission](https://nodejs.org/api/cli.html#--permission) flag.
|
|
1680
1697
|
*
|
|
1681
1698
|
* `process.permission` is an object whose methods are used to manage permissions for the current process.
|
|
1682
1699
|
* Additional documentation is available in the [Permission Model](https://nodejs.org/api/permissions.html#permission-model).
|