@aws-sdk/client-aiops 3.857.0 → 3.859.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/protocols/Aws_restJson1.js +2 -2
- package/dist-es/protocols/Aws_restJson1.js +3 -3
- package/dist-types/commands/CreateInvestigationGroupCommand.d.ts +1 -1
- package/dist-types/commands/GetInvestigationGroupCommand.d.ts +2 -2
- package/dist-types/commands/GetInvestigationGroupPolicyCommand.d.ts +1 -1
- package/dist-types/commands/PutInvestigationGroupPolicyCommand.d.ts +1 -1
- package/dist-types/models/models_0.d.ts +16 -16
- package/dist-types/ts3.4/models/models_0.d.ts +2 -2
- package/package.json +5 -5
|
@@ -202,12 +202,12 @@ const de_GetInvestigationGroupCommand = async (output, context) => {
|
|
|
202
202
|
const doc = (0, smithy_client_1.take)(data, {
|
|
203
203
|
arn: smithy_client_1.expectString,
|
|
204
204
|
chatbotNotificationChannel: smithy_client_1._json,
|
|
205
|
-
createdAt:
|
|
205
|
+
createdAt: smithy_client_1.expectLong,
|
|
206
206
|
createdBy: smithy_client_1.expectString,
|
|
207
207
|
crossAccountConfigurations: smithy_client_1._json,
|
|
208
208
|
encryptionConfiguration: smithy_client_1._json,
|
|
209
209
|
isCloudTrailEventHistoryEnabled: smithy_client_1.expectBoolean,
|
|
210
|
-
lastModifiedAt:
|
|
210
|
+
lastModifiedAt: smithy_client_1.expectLong,
|
|
211
211
|
lastModifiedBy: smithy_client_1.expectString,
|
|
212
212
|
name: smithy_client_1.expectString,
|
|
213
213
|
retentionInDays: smithy_client_1.expectLong,
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import { loadRestJsonErrorCode, parseJsonBody as parseBody, parseJsonErrorBody as parseErrorBody } from "@aws-sdk/core";
|
|
2
2
|
import { requestBuilder as rb } from "@smithy/core";
|
|
3
|
-
import { _json, collectBody, decorateServiceException as __decorateServiceException, expectBoolean as __expectBoolean, expectLong as __expectLong, expectNonNull as __expectNonNull,
|
|
3
|
+
import { _json, collectBody, decorateServiceException as __decorateServiceException, expectBoolean as __expectBoolean, expectLong as __expectLong, expectNonNull as __expectNonNull, expectObject as __expectObject, expectString as __expectString, map, take, withBaseException, } from "@smithy/smithy-client";
|
|
4
4
|
import { AIOpsServiceException as __BaseException } from "../models/AIOpsServiceException";
|
|
5
5
|
import { AccessDeniedException, ConflictException, ForbiddenException, InternalServerException, ResourceNotFoundException, ServiceQuotaExceededException, ThrottlingException, ValidationException, } from "../models/models_0";
|
|
6
6
|
export const se_CreateInvestigationGroupCommand = async (input, context) => {
|
|
@@ -185,12 +185,12 @@ export const de_GetInvestigationGroupCommand = async (output, context) => {
|
|
|
185
185
|
const doc = take(data, {
|
|
186
186
|
arn: __expectString,
|
|
187
187
|
chatbotNotificationChannel: _json,
|
|
188
|
-
createdAt:
|
|
188
|
+
createdAt: __expectLong,
|
|
189
189
|
createdBy: __expectString,
|
|
190
190
|
crossAccountConfigurations: _json,
|
|
191
191
|
encryptionConfiguration: _json,
|
|
192
192
|
isCloudTrailEventHistoryEnabled: __expectBoolean,
|
|
193
|
-
lastModifiedAt:
|
|
193
|
+
lastModifiedAt: __expectLong,
|
|
194
194
|
lastModifiedBy: __expectString,
|
|
195
195
|
name: __expectString,
|
|
196
196
|
retentionInDays: __expectLong,
|
|
@@ -27,7 +27,7 @@ declare const CreateInvestigationGroupCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Creates an <i>investigation group</i> in your account. Creating an investigation group is a one-time setup task for each Region in your account. It is a necessary task to be able to perform investigations.</p> <p>Settings in the investigation group help you centrally manage the common properties of your investigations, such as the following:</p> <ul> <li> <p>Who can access the investigations</p> </li> <li> <p>Whether investigation data is encrypted with a customer managed Key Management Service key.</p> </li> <li> <p>How long investigations and their data are retained by default.</p> </li> </ul> <p>Currently, you can have one investigation group in each Region in your account. Each investigation in a Region is a part of the investigation group in that Region</p> <p>To create an investigation group and set up CloudWatch investigations, you must be signed in to an IAM principal that has
|
|
30
|
+
* <p>Creates an <i>investigation group</i> in your account. Creating an investigation group is a one-time setup task for each Region in your account. It is a necessary task to be able to perform investigations.</p> <p>Settings in the investigation group help you centrally manage the common properties of your investigations, such as the following:</p> <ul> <li> <p>Who can access the investigations</p> </li> <li> <p>Whether investigation data is encrypted with a customer managed Key Management Service key.</p> </li> <li> <p>How long investigations and their data are retained by default.</p> </li> </ul> <p>Currently, you can have one investigation group in each Region in your account. Each investigation in a Region is a part of the investigation group in that Region</p> <p>To create an investigation group and set up CloudWatch investigations, you must be signed in to an IAM principal that has either the <code>AIOpsConsoleAdminPolicy</code> or the <code>AdministratorAccess</code> IAM policy attached, or to an account that has similar permissions.</p> <important> <p>You can configure CloudWatch alarms to start investigations and add events to investigations. If you create your investigation group with <code>CreateInvestigationGroup</code> and you want to enable alarms to do this, you must use <code>PutInvestigationGroupPolicy</code> to create a resource policy that grants this permission to CloudWatch alarms. </p> <p>For more information about configuring CloudWatch alarms, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/AlarmThatSendsEmail.html">Using Amazon CloudWatch alarms</a> </p> </important>
|
|
31
31
|
* @example
|
|
32
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
33
33
|
* ```javascript
|
|
@@ -41,9 +41,9 @@ declare const GetInvestigationGroupCommand_base: {
|
|
|
41
41
|
* const response = await client.send(command);
|
|
42
42
|
* // { // GetInvestigationGroupResponse
|
|
43
43
|
* // createdBy: "STRING_VALUE",
|
|
44
|
-
* // createdAt:
|
|
44
|
+
* // createdAt: Number("long"),
|
|
45
45
|
* // lastModifiedBy: "STRING_VALUE",
|
|
46
|
-
* // lastModifiedAt:
|
|
46
|
+
* // lastModifiedAt: Number("long"),
|
|
47
47
|
* // name: "STRING_VALUE",
|
|
48
48
|
* // arn: "STRING_VALUE",
|
|
49
49
|
* // roleArn: "STRING_VALUE",
|
|
@@ -27,7 +27,7 @@ declare const GetInvestigationGroupPolicyCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Returns the IAM resource policy
|
|
30
|
+
* <p>Returns the JSON of the IAM resource policy associated with the specified investigation group in a string. For example, <code>\{\"Version\":\"2012-10-17\",\"Statement\":[\{\"Effect\":\"Allow\",\"Principal\":\{\"Service\":\"aiops.alarms.cloudwatch.amazonaws.com\"\},\"Action\":[\"aiops:CreateInvestigation\",\"aiops:CreateInvestigationEvent\"],\"Resource\":\"*\",\"Condition\":\{\"StringEquals\":\{\"aws:SourceAccount\":\"111122223333\"\},\"ArnLike\":\{\"aws:SourceArn\":\"arn:aws:cloudwatch:us-east-1:111122223333:alarm:*\"\}\}\}]\}</code>.</p>
|
|
31
31
|
* @example
|
|
32
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
33
33
|
* ```javascript
|
|
@@ -27,7 +27,7 @@ declare const PutInvestigationGroupPolicyCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Creates an IAM resource policy and assigns it to the specified investigation group.</p> <p>If you create your investigation group with <code>CreateInvestigationGroup</code> and you want to enable CloudWatch alarms to create investigations and add events to investigations, you must use this operation to create a policy similar to this example.</p> <p> <code
|
|
30
|
+
* <p>Creates an IAM resource policy and assigns it to the specified investigation group.</p> <p>If you create your investigation group with <code>CreateInvestigationGroup</code> and you want to enable CloudWatch alarms to create investigations and add events to investigations, you must use this operation to create a policy similar to this example.</p> <p> <code> \{ "Version": "2008-10-17", "Statement": [ \{ "Effect": "Allow", "Principal": \{ "Service": "aiops.alarms.cloudwatch.amazonaws.com" \}, "Action": [ "aiops:CreateInvestigation", "aiops:CreateInvestigationEvent" ], "Resource": "*", "Condition": \{ "StringEquals": \{ "aws:SourceAccount": "account-id" \}, "ArnLike": \{ "aws:SourceArn": "arn:aws:cloudwatch:region:account-id:alarm:*" \} \} \} ] \} </code> </p>
|
|
31
31
|
* @example
|
|
32
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
33
33
|
* ```javascript
|
|
@@ -77,7 +77,7 @@ export type EncryptionConfigurationType = (typeof EncryptionConfigurationType)[k
|
|
|
77
77
|
*/
|
|
78
78
|
export interface EncryptionConfiguration {
|
|
79
79
|
/**
|
|
80
|
-
* <p>Displays whether investigation data is encrypted by a customer managed key or an Amazon Web Services owned
|
|
80
|
+
* <p>Displays whether investigation data is encrypted by a customer managed key or an Amazon Web Services owned key.</p>
|
|
81
81
|
* @public
|
|
82
82
|
*/
|
|
83
83
|
type?: EncryptionConfigurationType | undefined;
|
|
@@ -97,7 +97,7 @@ export interface CreateInvestigationGroupInput {
|
|
|
97
97
|
*/
|
|
98
98
|
name: string | undefined;
|
|
99
99
|
/**
|
|
100
|
-
* <p>Specify the ARN of the IAM role that CloudWatch investigations will use when it gathers investigation data. The permissions in this role determine which of your resources that CloudWatch investigations will have access to during investigations.</p> <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data">How to control what data
|
|
100
|
+
* <p>Specify the ARN of the IAM role that CloudWatch investigations will use when it gathers investigation data. The permissions in this role determine which of your resources that CloudWatch investigations will have access to during investigations.</p> <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data">How to control what data CloudWatch investigations has access to during investigations</a>.</p>
|
|
101
101
|
* @public
|
|
102
102
|
*/
|
|
103
103
|
roleArn: string | undefined;
|
|
@@ -117,12 +117,12 @@ export interface CreateInvestigationGroupInput {
|
|
|
117
117
|
*/
|
|
118
118
|
tags?: Record<string, string> | undefined;
|
|
119
119
|
/**
|
|
120
|
-
* <p>Enter the existing custom tag keys for custom applications in your system. Resource tags help
|
|
120
|
+
* <p>Enter the existing custom tag keys for custom applications in your system. Resource tags help CloudWatch investigations narrow the search space when it is unable to discover definite relationships between resources. For example, to discover that an Amazon ECS service depends on an Amazon RDS database, CloudWatch investigations can discover this relationship using data sources such as X-Ray and CloudWatch Application Signals. However, if you haven't deployed these features, CloudWatch investigations will attempt to identify possible relationships. Tag boundaries can be used to narrow the resources that will be discovered by CloudWatch investigations in these cases.</p> <p>You don't need to enter tags created by myApplications or CloudFormation, because CloudWatch investigations can automatically detect those tags.</p>
|
|
121
121
|
* @public
|
|
122
122
|
*/
|
|
123
123
|
tagKeyBoundaries?: string[] | undefined;
|
|
124
124
|
/**
|
|
125
|
-
* <p>Use this structure to integrate CloudWatch investigations with
|
|
125
|
+
* <p>Use this structure to integrate CloudWatch investigations with chat applications. This structure is a string array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see <a href="https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html">Getting started with Amazon Q in chat applications</a> and <a href="https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies">Resource type defined by Amazon Web Services Chatbot</a>.</p>
|
|
126
126
|
* @public
|
|
127
127
|
*/
|
|
128
128
|
chatbotNotificationChannel?: Record<string, string[]> | undefined;
|
|
@@ -132,7 +132,7 @@ export interface CreateInvestigationGroupInput {
|
|
|
132
132
|
*/
|
|
133
133
|
isCloudTrailEventHistoryEnabled?: boolean | undefined;
|
|
134
134
|
/**
|
|
135
|
-
* <p>
|
|
135
|
+
* <p>List of <code>sourceRoleArn</code> values that have been configured for cross-account access.</p>
|
|
136
136
|
* @public
|
|
137
137
|
*/
|
|
138
138
|
crossAccountConfigurations?: CrossAccountConfiguration[] | undefined;
|
|
@@ -230,7 +230,7 @@ export interface DeleteInvestigationGroupRequest {
|
|
|
230
230
|
*/
|
|
231
231
|
export interface GetInvestigationGroupRequest {
|
|
232
232
|
/**
|
|
233
|
-
* <p>Specify either the name or the ARN of the investigation group that you want to view.</p>
|
|
233
|
+
* <p>Specify either the name or the ARN of the investigation group that you want to view. This is used to set the name of the investigation group.</p>
|
|
234
234
|
* @public
|
|
235
235
|
*/
|
|
236
236
|
identifier: string | undefined;
|
|
@@ -248,7 +248,7 @@ export interface GetInvestigationGroupResponse {
|
|
|
248
248
|
* <p>The date and time that the investigation group was created.</p>
|
|
249
249
|
* @public
|
|
250
250
|
*/
|
|
251
|
-
createdAt?:
|
|
251
|
+
createdAt?: number | undefined;
|
|
252
252
|
/**
|
|
253
253
|
* <p>The name of the user who created the investigation group.</p>
|
|
254
254
|
* @public
|
|
@@ -258,7 +258,7 @@ export interface GetInvestigationGroupResponse {
|
|
|
258
258
|
* <p>The date and time that the investigation group was most recently modified.</p>
|
|
259
259
|
* @public
|
|
260
260
|
*/
|
|
261
|
-
lastModifiedAt?:
|
|
261
|
+
lastModifiedAt?: number | undefined;
|
|
262
262
|
/**
|
|
263
263
|
* <p>The name of the investigation group.</p>
|
|
264
264
|
* @public
|
|
@@ -285,12 +285,12 @@ export interface GetInvestigationGroupResponse {
|
|
|
285
285
|
*/
|
|
286
286
|
retentionInDays?: number | undefined;
|
|
287
287
|
/**
|
|
288
|
-
* <p>This structure is a string array. The first string is the ARN of a Amazon SNS topic. The array of strings display the ARNs of
|
|
288
|
+
* <p>This structure is a string array. The first string is the ARN of a Amazon SNS topic. The array of strings display the ARNs of chat applications configurations that are associated with that topic. For more information about these configuration ARNs, see <a href="https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html">Getting started with Amazon Q in chat applications</a> and <a href="https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies">Resource type defined by Amazon Web Services Chatbot</a>.</p>
|
|
289
289
|
* @public
|
|
290
290
|
*/
|
|
291
291
|
chatbotNotificationChannel?: Record<string, string[]> | undefined;
|
|
292
292
|
/**
|
|
293
|
-
* <p>Displays the custom tag keys for custom applications in your system that you have specified in the investigation group. Resource tags help
|
|
293
|
+
* <p>Displays the custom tag keys for custom applications in your system that you have specified in the investigation group. Resource tags help CloudWatch investigations narrow the search space when it is unable to discover definite relationships between resources. </p>
|
|
294
294
|
* @public
|
|
295
295
|
*/
|
|
296
296
|
tagKeyBoundaries?: string[] | undefined;
|
|
@@ -366,7 +366,7 @@ export interface UpdateInvestigationGroupRequest {
|
|
|
366
366
|
*/
|
|
367
367
|
identifier: string | undefined;
|
|
368
368
|
/**
|
|
369
|
-
* <p>Specify this field if you want to change the IAM role that CloudWatch investigations will use when it gathers investigation data. To do so, specify the ARN of the new role.</p> <p>The permissions in this role determine which of your resources that CloudWatch investigations will have access to during investigations.</p> <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data">
|
|
369
|
+
* <p>Specify this field if you want to change the IAM role that CloudWatch investigations will use when it gathers investigation data. To do so, specify the ARN of the new role.</p> <p>The permissions in this role determine which of your resources that CloudWatch investigations will have access to during investigations.</p> <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data">How to control what data CloudWatch investigations has access to during investigations</a>.</p>
|
|
370
370
|
* @public
|
|
371
371
|
*/
|
|
372
372
|
roleArn?: string | undefined;
|
|
@@ -376,12 +376,12 @@ export interface UpdateInvestigationGroupRequest {
|
|
|
376
376
|
*/
|
|
377
377
|
encryptionConfiguration?: EncryptionConfiguration | undefined;
|
|
378
378
|
/**
|
|
379
|
-
* <p>Enter the existing custom tag keys for custom applications in your system. Resource tags help
|
|
379
|
+
* <p>Enter the existing custom tag keys for custom applications in your system. Resource tags help CloudWatch investigations narrow the search space when it is unable to discover definite relationships between resources. For example, to discover that an Amazon ECS service depends on an Amazon RDS database, CloudWatch investigations can discover this relationship using data sources such as X-Ray and CloudWatch Application Signals. However, if you haven't deployed these features, CloudWatch investigations will attempt to identify possible relationships. Tag boundaries can be used to narrow the resources that will be discovered by CloudWatch investigations in these cases.</p> <p>You don't need to enter tags created by myApplications or CloudFormation, because CloudWatch investigations can automatically detect those tags.</p>
|
|
380
380
|
* @public
|
|
381
381
|
*/
|
|
382
382
|
tagKeyBoundaries?: string[] | undefined;
|
|
383
383
|
/**
|
|
384
|
-
* <p>Use this structure to integrate CloudWatch investigations with
|
|
384
|
+
* <p>Use this structure to integrate CloudWatch investigations with chat applications. This structure is a string array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see <a href="https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html">Getting started with Amazon Q in chat applications</a> and <a href="https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies">Resource type defined by Amazon Web Services Chatbot</a>.</p>
|
|
385
385
|
* @public
|
|
386
386
|
*/
|
|
387
387
|
chatbotNotificationChannel?: Record<string, string[]> | undefined;
|
|
@@ -476,7 +476,7 @@ export interface ListTagsForResourceOutput {
|
|
|
476
476
|
*/
|
|
477
477
|
export interface ListTagsForResourceRequest {
|
|
478
478
|
/**
|
|
479
|
-
* <p>The ARN of the CloudWatch investigations resource that you want to view tags for. You can use the <
|
|
479
|
+
* <p>The ARN of the CloudWatch investigations resource that you want to view tags for. You can use the <code>ListInvestigationGroups</code> operation to find the ARNs of investigation groups.</p> <p>The ARN format for an investigation group is <code>arn:aws:aiops:<i>Region</i>:<i>account-id</i>:investigation-group:<i>investigation-group-id</i> </code>.</p>
|
|
480
480
|
* @public
|
|
481
481
|
*/
|
|
482
482
|
resourceArn: string | undefined;
|
|
@@ -486,7 +486,7 @@ export interface ListTagsForResourceRequest {
|
|
|
486
486
|
*/
|
|
487
487
|
export interface TagResourceRequest {
|
|
488
488
|
/**
|
|
489
|
-
* <p>The Amazon Resource Name (ARN) of the resource that you want to apply the tags to. You can use the <
|
|
489
|
+
* <p>The Amazon Resource Name (ARN) of the resource that you want to apply the tags to. You can use the <code>ListInvestigationGroups</code> operation to find the ARNs of investigation groups.</p>
|
|
490
490
|
* @public
|
|
491
491
|
*/
|
|
492
492
|
resourceArn: string | undefined;
|
|
@@ -506,7 +506,7 @@ export interface TagResourceResponse {
|
|
|
506
506
|
*/
|
|
507
507
|
export interface UntagResourceRequest {
|
|
508
508
|
/**
|
|
509
|
-
* <p>The Amazon Resource Name (ARN) of the resource that you want to remove the tags from. You can use the
|
|
509
|
+
* <p>The Amazon Resource Name (ARN) of the resource that you want to remove the tags from. You can use the<code>ListInvestigationGroups</code> operation to find the ARNs of investigation groups.</p>
|
|
510
510
|
* @public
|
|
511
511
|
*/
|
|
512
512
|
resourceArn: string | undefined;
|
|
@@ -91,9 +91,9 @@ export interface GetInvestigationGroupRequest {
|
|
|
91
91
|
}
|
|
92
92
|
export interface GetInvestigationGroupResponse {
|
|
93
93
|
createdBy?: string | undefined;
|
|
94
|
-
createdAt?:
|
|
94
|
+
createdAt?: number | undefined;
|
|
95
95
|
lastModifiedBy?: string | undefined;
|
|
96
|
-
lastModifiedAt?:
|
|
96
|
+
lastModifiedAt?: number | undefined;
|
|
97
97
|
name?: string | undefined;
|
|
98
98
|
arn?: string | undefined;
|
|
99
99
|
roleArn?: string | undefined;
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-aiops",
|
|
3
3
|
"description": "AWS SDK for JavaScript Aiops Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.859.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
|
|
7
7
|
"build:cjs": "tsc -p tsconfig.cjs.json",
|
|
@@ -20,17 +20,17 @@
|
|
|
20
20
|
"dependencies": {
|
|
21
21
|
"@aws-crypto/sha256-browser": "5.2.0",
|
|
22
22
|
"@aws-crypto/sha256-js": "5.2.0",
|
|
23
|
-
"@aws-sdk/core": "3.
|
|
24
|
-
"@aws-sdk/credential-provider-node": "3.
|
|
23
|
+
"@aws-sdk/core": "3.858.0",
|
|
24
|
+
"@aws-sdk/credential-provider-node": "3.859.0",
|
|
25
25
|
"@aws-sdk/middleware-host-header": "3.840.0",
|
|
26
26
|
"@aws-sdk/middleware-logger": "3.840.0",
|
|
27
27
|
"@aws-sdk/middleware-recursion-detection": "3.840.0",
|
|
28
|
-
"@aws-sdk/middleware-user-agent": "3.
|
|
28
|
+
"@aws-sdk/middleware-user-agent": "3.858.0",
|
|
29
29
|
"@aws-sdk/region-config-resolver": "3.840.0",
|
|
30
30
|
"@aws-sdk/types": "3.840.0",
|
|
31
31
|
"@aws-sdk/util-endpoints": "3.848.0",
|
|
32
32
|
"@aws-sdk/util-user-agent-browser": "3.840.0",
|
|
33
|
-
"@aws-sdk/util-user-agent-node": "3.
|
|
33
|
+
"@aws-sdk/util-user-agent-node": "3.858.0",
|
|
34
34
|
"@smithy/config-resolver": "^4.1.4",
|
|
35
35
|
"@smithy/core": "^3.7.2",
|
|
36
36
|
"@smithy/fetch-http-handler": "^5.1.0",
|