|
206 | 206 | }, |
207 | 207 | "aws.protocols#awsJson1_1": {}, |
208 | 208 | "smithy.api#documentation": "<fullname>Amazon Elastic Container Registry</fullname>\n <p>Amazon Elastic Container Registry (Amazon ECR) is a managed container image registry service. Customers can use the\n familiar Docker CLI, or their preferred client, to push, pull, and manage images. Amazon ECR\n provides a secure, scalable, and reliable registry for your Docker or Open Container\n Initiative (OCI) images. Amazon ECR supports private repositories with resource-based\n permissions using IAM so that specific users or Amazon EC2 instances can access\n repositories and images.</p>\n <p>Amazon ECR has service endpoints in each supported Region. For more information, see <a href=\"https://docs.aws.amazon.com/general/latest/gr/ecr.html\">Amazon ECR endpoints</a> in the\n <i>Amazon Web Services General Reference</i>.</p>", |
209 | | - "smithy.api#title": "Amazon EC2 Container Registry", |
| 209 | + "smithy.api#title": "Amazon Elastic Container Registry", |
210 | 210 | "smithy.api#xmlNamespace": { |
211 | 211 | "uri": "http://ecr.amazonaws.com/doc/2015-09-21/" |
212 | 212 | }, |
|
2142 | 2142 | "customRoleArn": { |
2143 | 2143 | "target": "com.amazonaws.ecr#CustomRoleArn", |
2144 | 2144 | "traits": { |
2145 | | - "smithy.api#documentation": "<p>The ARN of the role to be assumed by Amazon ECR. This role must be in the same account as\n the registry that you are configuring. Amazon ECR will assume your supplied role when\n the customRoleArn is specified. When this field isn't specified, Amazon ECR will\n use the service-linked role for the repository creation template.</p>" |
| 2145 | + "smithy.api#documentation": "<p>The ARN of the role to be assumed by Amazon ECR. This role must be in the same account as\n the registry that you are configuring. Amazon ECR will assume your supplied role when the\n customRoleArn is specified. When this field isn't specified, Amazon ECR will use the\n service-linked role for the repository creation template.</p>" |
2146 | 2146 | } |
2147 | 2147 | } |
2148 | 2148 | }, |
|
3329 | 3329 | "outputToken": "nextToken", |
3330 | 3330 | "items": "repositories", |
3331 | 3331 | "pageSize": "maxResults" |
3332 | | - } |
| 3332 | + }, |
| 3333 | + "smithy.test#smokeTests": [ |
| 3334 | + { |
| 3335 | + "id": "DescribeRepositoriesSuccess", |
| 3336 | + "params": {}, |
| 3337 | + "vendorParams": { |
| 3338 | + "region": "us-west-2" |
| 3339 | + }, |
| 3340 | + "vendorParamsShape": "aws.test#AwsVendorParams", |
| 3341 | + "expect": { |
| 3342 | + "success": {} |
| 3343 | + } |
| 3344 | + } |
| 3345 | + ] |
3333 | 3346 | } |
3334 | 3347 | }, |
3335 | 3348 | "com.amazonaws.ecr#DescribeRepositoriesRequest": { |
|
3486 | 3499 | "encryptionType": { |
3487 | 3500 | "target": "com.amazonaws.ecr#EncryptionType", |
3488 | 3501 | "traits": { |
3489 | | - "smithy.api#documentation": "<p>The encryption type to use.</p>\n <p>If you use the <code>KMS</code> encryption type, the contents of the repository will\n be encrypted using server-side encryption with Key Management Service key stored in KMS. When you\n use KMS to encrypt your data, you can either use the default Amazon Web Services managed KMS key\n for Amazon ECR, or specify your own KMS key, which you already created. For more\n information, see <a href=\"https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingKMSEncryption.html\">Protecting data using server-side\n encryption with an KMS key stored in Key Management Service (SSE-KMS)</a> in the\n <i>Amazon Simple Storage Service Console Developer Guide</i>.</p>\n <p>If you use the <code>AES256</code> encryption type, Amazon ECR uses server-side encryption\n with Amazon S3-managed encryption keys which encrypts the images in the repository using an\n AES256 encryption algorithm. For more information, see <a href=\"https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html\">Protecting data using\n server-side encryption with Amazon S3-managed encryption keys (SSE-S3)</a> in the\n <i>Amazon Simple Storage Service Console Developer Guide</i>.</p>", |
| 3502 | + "smithy.api#documentation": "<p>The encryption type to use.</p>\n <p>If you use the <code>KMS</code> encryption type, the contents of the repository will\n be encrypted using server-side encryption with Key Management Service key stored in KMS. When you\n use KMS to encrypt your data, you can either use the default Amazon Web Services managed KMS key\n for Amazon ECR, or specify your own KMS key, which you already created.</p>\n <p>If you use the <code>KMS_DSSE</code> encryption type, the contents of the repository\n will be encrypted with two layers of encryption using server-side encryption with the\n KMS Management Service key stored in KMS. Similar to the KMS encryption type, you\n can either use the default Amazon Web Services managed KMS key for Amazon ECR, or specify your own KMS\n key, which you've already created. </p>\n <p>If you use the <code>AES256</code> encryption type, Amazon ECR uses server-side encryption\n with Amazon S3-managed encryption keys which encrypts the images in the repository using an\n AES256 encryption algorithm. For more information, see <a href=\"https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html\">Protecting data using\n server-side encryption with Amazon S3-managed encryption keys (SSE-S3)</a> in the\n <i>Amazon Simple Storage Service Console Developer Guide</i>.</p>", |
3490 | 3503 | "smithy.api#required": {} |
3491 | 3504 | } |
3492 | 3505 | }, |
|
3536 | 3549 | "traits": { |
3537 | 3550 | "smithy.api#enumValue": "KMS" |
3538 | 3551 | } |
| 3552 | + }, |
| 3553 | + "KMS_DSSE": { |
| 3554 | + "target": "smithy.api#Unit", |
| 3555 | + "traits": { |
| 3556 | + "smithy.api#enumValue": "KMS_DSSE" |
| 3557 | + } |
3539 | 3558 | } |
3540 | 3559 | } |
3541 | 3560 | }, |
|
5550 | 5569 | "outputToken": "nextToken", |
5551 | 5570 | "items": "imageIds", |
5552 | 5571 | "pageSize": "maxResults" |
5553 | | - } |
| 5572 | + }, |
| 5573 | + "smithy.test#smokeTests": [ |
| 5574 | + { |
| 5575 | + "id": "ListImagesFailure", |
| 5576 | + "params": { |
| 5577 | + "repositoryName": "not-a-real-repository" |
| 5578 | + }, |
| 5579 | + "vendorParams": { |
| 5580 | + "region": "us-west-2" |
| 5581 | + }, |
| 5582 | + "vendorParamsShape": "aws.test#AwsVendorParams", |
| 5583 | + "expect": { |
| 5584 | + "failure": {} |
| 5585 | + } |
| 5586 | + } |
| 5587 | + ] |
5554 | 5588 | } |
5555 | 5589 | }, |
5556 | 5590 | "com.amazonaws.ecr#ListImagesFilter": { |
|
6910 | 6944 | "customRoleArn": { |
6911 | 6945 | "target": "com.amazonaws.ecr#CustomRoleArn", |
6912 | 6946 | "traits": { |
6913 | | - "smithy.api#documentation": "<p>The ARN of the role to be assumed by Amazon ECR. Amazon ECR will assume your supplied role when\n the customRoleArn is specified. When this field isn't specified, Amazon ECR will\n use the service-linked role for the repository creation template.</p>" |
| 6947 | + "smithy.api#documentation": "<p>The ARN of the role to be assumed by Amazon ECR. Amazon ECR will assume your supplied role\n when the customRoleArn is specified. When this field isn't specified, Amazon ECR will use the\n service-linked role for the repository creation template.</p>" |
6914 | 6948 | } |
6915 | 6949 | }, |
6916 | 6950 | "createdAt": { |
|
8223 | 8257 | "customRoleArn": { |
8224 | 8258 | "target": "com.amazonaws.ecr#CustomRoleArn", |
8225 | 8259 | "traits": { |
8226 | | - "smithy.api#documentation": "<p>The ARN of the role to be assumed by Amazon ECR. This role must be in the same account as\n the registry that you are configuring. Amazon ECR will assume your supplied role when\n the customRoleArn is specified. When this field isn't specified, Amazon ECR will\n use the service-linked role for the repository creation template.</p>" |
| 8260 | + "smithy.api#documentation": "<p>The ARN of the role to be assumed by Amazon ECR. This role must be in the same account as\n the registry that you are configuring. Amazon ECR will assume your supplied role when the\n customRoleArn is specified. When this field isn't specified, Amazon ECR will use the\n service-linked role for the repository creation template.</p>" |
8227 | 8261 | } |
8228 | 8262 | } |
8229 | 8263 | }, |
|
0 commit comments