@aws-sdk/client-cloudfront 3.468.0 → 3.472.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
|
@@ -75,9 +75,6 @@ const se_CreateCachePolicyCommand = async (input, context) => {
|
|
|
75
75
|
};
|
|
76
76
|
const resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/cache-policy";
|
|
77
77
|
let body;
|
|
78
|
-
if (input.CachePolicyConfig !== undefined) {
|
|
79
|
-
body = se_CachePolicyConfig(input.CachePolicyConfig, context);
|
|
80
|
-
}
|
|
81
78
|
let contents;
|
|
82
79
|
if (input.CachePolicyConfig !== undefined) {
|
|
83
80
|
contents = se_CachePolicyConfig(input.CachePolicyConfig, context);
|
|
@@ -104,9 +101,6 @@ const se_CreateCloudFrontOriginAccessIdentityCommand = async (input, context) =>
|
|
|
104
101
|
const resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` +
|
|
105
102
|
"/2020-05-31/origin-access-identity/cloudfront";
|
|
106
103
|
let body;
|
|
107
|
-
if (input.CloudFrontOriginAccessIdentityConfig !== undefined) {
|
|
108
|
-
body = se_CloudFrontOriginAccessIdentityConfig(input.CloudFrontOriginAccessIdentityConfig, context);
|
|
109
|
-
}
|
|
110
104
|
let contents;
|
|
111
105
|
if (input.CloudFrontOriginAccessIdentityConfig !== undefined) {
|
|
112
106
|
contents = se_CloudFrontOriginAccessIdentityConfig(input.CloudFrontOriginAccessIdentityConfig, context);
|
|
@@ -132,9 +126,6 @@ const se_CreateContinuousDeploymentPolicyCommand = async (input, context) => {
|
|
|
132
126
|
};
|
|
133
127
|
const resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/continuous-deployment-policy";
|
|
134
128
|
let body;
|
|
135
|
-
if (input.ContinuousDeploymentPolicyConfig !== undefined) {
|
|
136
|
-
body = se_ContinuousDeploymentPolicyConfig(input.ContinuousDeploymentPolicyConfig, context);
|
|
137
|
-
}
|
|
138
129
|
let contents;
|
|
139
130
|
if (input.ContinuousDeploymentPolicyConfig !== undefined) {
|
|
140
131
|
contents = se_ContinuousDeploymentPolicyConfig(input.ContinuousDeploymentPolicyConfig, context);
|
|
@@ -160,9 +151,6 @@ const se_CreateDistributionCommand = async (input, context) => {
|
|
|
160
151
|
};
|
|
161
152
|
const resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/distribution";
|
|
162
153
|
let body;
|
|
163
|
-
if (input.DistributionConfig !== undefined) {
|
|
164
|
-
body = se_DistributionConfig(input.DistributionConfig, context);
|
|
165
|
-
}
|
|
166
154
|
let contents;
|
|
167
155
|
if (input.DistributionConfig !== undefined) {
|
|
168
156
|
contents = se_DistributionConfig(input.DistributionConfig, context);
|
|
@@ -191,9 +179,6 @@ const se_CreateDistributionWithTagsCommand = async (input, context) => {
|
|
|
191
179
|
WithTags: [, ""],
|
|
192
180
|
});
|
|
193
181
|
let body;
|
|
194
|
-
if (input.DistributionConfigWithTags !== undefined) {
|
|
195
|
-
body = se_DistributionConfigWithTags(input.DistributionConfigWithTags, context);
|
|
196
|
-
}
|
|
197
182
|
let contents;
|
|
198
183
|
if (input.DistributionConfigWithTags !== undefined) {
|
|
199
184
|
contents = se_DistributionConfigWithTags(input.DistributionConfigWithTags, context);
|
|
@@ -220,9 +205,6 @@ const se_CreateFieldLevelEncryptionConfigCommand = async (input, context) => {
|
|
|
220
205
|
};
|
|
221
206
|
const resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/field-level-encryption";
|
|
222
207
|
let body;
|
|
223
|
-
if (input.FieldLevelEncryptionConfig !== undefined) {
|
|
224
|
-
body = se_FieldLevelEncryptionConfig(input.FieldLevelEncryptionConfig, context);
|
|
225
|
-
}
|
|
226
208
|
let contents;
|
|
227
209
|
if (input.FieldLevelEncryptionConfig !== undefined) {
|
|
228
210
|
contents = se_FieldLevelEncryptionConfig(input.FieldLevelEncryptionConfig, context);
|
|
@@ -249,9 +231,6 @@ const se_CreateFieldLevelEncryptionProfileCommand = async (input, context) => {
|
|
|
249
231
|
const resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` +
|
|
250
232
|
"/2020-05-31/field-level-encryption-profile";
|
|
251
233
|
let body;
|
|
252
|
-
if (input.FieldLevelEncryptionProfileConfig !== undefined) {
|
|
253
|
-
body = se_FieldLevelEncryptionProfileConfig(input.FieldLevelEncryptionProfileConfig, context);
|
|
254
|
-
}
|
|
255
234
|
let contents;
|
|
256
235
|
if (input.FieldLevelEncryptionProfileConfig !== undefined) {
|
|
257
236
|
contents = se_FieldLevelEncryptionProfileConfig(input.FieldLevelEncryptionProfileConfig, context);
|
|
@@ -313,9 +292,6 @@ const se_CreateInvalidationCommand = async (input, context) => {
|
|
|
313
292
|
"/2020-05-31/distribution/{DistributionId}/invalidation";
|
|
314
293
|
resolvedPath = (0, smithy_client_1.resolvedPath)(resolvedPath, input, "DistributionId", () => input.DistributionId, "{DistributionId}", false);
|
|
315
294
|
let body;
|
|
316
|
-
if (input.InvalidationBatch !== undefined) {
|
|
317
|
-
body = se_InvalidationBatch(input.InvalidationBatch, context);
|
|
318
|
-
}
|
|
319
295
|
let contents;
|
|
320
296
|
if (input.InvalidationBatch !== undefined) {
|
|
321
297
|
contents = se_InvalidationBatch(input.InvalidationBatch, context);
|
|
@@ -341,9 +317,6 @@ const se_CreateKeyGroupCommand = async (input, context) => {
|
|
|
341
317
|
};
|
|
342
318
|
const resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/key-group";
|
|
343
319
|
let body;
|
|
344
|
-
if (input.KeyGroupConfig !== undefined) {
|
|
345
|
-
body = se_KeyGroupConfig(input.KeyGroupConfig, context);
|
|
346
|
-
}
|
|
347
320
|
let contents;
|
|
348
321
|
if (input.KeyGroupConfig !== undefined) {
|
|
349
322
|
contents = se_KeyGroupConfig(input.KeyGroupConfig, context);
|
|
@@ -405,9 +378,6 @@ const se_CreateMonitoringSubscriptionCommand = async (input, context) => {
|
|
|
405
378
|
"/2020-05-31/distributions/{DistributionId}/monitoring-subscription";
|
|
406
379
|
resolvedPath = (0, smithy_client_1.resolvedPath)(resolvedPath, input, "DistributionId", () => input.DistributionId, "{DistributionId}", false);
|
|
407
380
|
let body;
|
|
408
|
-
if (input.MonitoringSubscription !== undefined) {
|
|
409
|
-
body = se_MonitoringSubscription(input.MonitoringSubscription, context);
|
|
410
|
-
}
|
|
411
381
|
let contents;
|
|
412
382
|
if (input.MonitoringSubscription !== undefined) {
|
|
413
383
|
contents = se_MonitoringSubscription(input.MonitoringSubscription, context);
|
|
@@ -433,9 +403,6 @@ const se_CreateOriginAccessControlCommand = async (input, context) => {
|
|
|
433
403
|
};
|
|
434
404
|
const resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/origin-access-control";
|
|
435
405
|
let body;
|
|
436
|
-
if (input.OriginAccessControlConfig !== undefined) {
|
|
437
|
-
body = se_OriginAccessControlConfig(input.OriginAccessControlConfig, context);
|
|
438
|
-
}
|
|
439
406
|
let contents;
|
|
440
407
|
if (input.OriginAccessControlConfig !== undefined) {
|
|
441
408
|
contents = se_OriginAccessControlConfig(input.OriginAccessControlConfig, context);
|
|
@@ -461,9 +428,6 @@ const se_CreateOriginRequestPolicyCommand = async (input, context) => {
|
|
|
461
428
|
};
|
|
462
429
|
const resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/origin-request-policy";
|
|
463
430
|
let body;
|
|
464
|
-
if (input.OriginRequestPolicyConfig !== undefined) {
|
|
465
|
-
body = se_OriginRequestPolicyConfig(input.OriginRequestPolicyConfig, context);
|
|
466
|
-
}
|
|
467
431
|
let contents;
|
|
468
432
|
if (input.OriginRequestPolicyConfig !== undefined) {
|
|
469
433
|
contents = se_OriginRequestPolicyConfig(input.OriginRequestPolicyConfig, context);
|
|
@@ -489,9 +453,6 @@ const se_CreatePublicKeyCommand = async (input, context) => {
|
|
|
489
453
|
};
|
|
490
454
|
const resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/public-key";
|
|
491
455
|
let body;
|
|
492
|
-
if (input.PublicKeyConfig !== undefined) {
|
|
493
|
-
body = se_PublicKeyConfig(input.PublicKeyConfig, context);
|
|
494
|
-
}
|
|
495
456
|
let contents;
|
|
496
457
|
if (input.PublicKeyConfig !== undefined) {
|
|
497
458
|
contents = se_PublicKeyConfig(input.PublicKeyConfig, context);
|
|
@@ -563,9 +524,6 @@ const se_CreateResponseHeadersPolicyCommand = async (input, context) => {
|
|
|
563
524
|
};
|
|
564
525
|
const resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/response-headers-policy";
|
|
565
526
|
let body;
|
|
566
|
-
if (input.ResponseHeadersPolicyConfig !== undefined) {
|
|
567
|
-
body = se_ResponseHeadersPolicyConfig(input.ResponseHeadersPolicyConfig, context);
|
|
568
|
-
}
|
|
569
527
|
let contents;
|
|
570
528
|
if (input.ResponseHeadersPolicyConfig !== undefined) {
|
|
571
529
|
contents = se_ResponseHeadersPolicyConfig(input.ResponseHeadersPolicyConfig, context);
|
|
@@ -591,9 +549,6 @@ const se_CreateStreamingDistributionCommand = async (input, context) => {
|
|
|
591
549
|
};
|
|
592
550
|
const resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/streaming-distribution";
|
|
593
551
|
let body;
|
|
594
|
-
if (input.StreamingDistributionConfig !== undefined) {
|
|
595
|
-
body = se_StreamingDistributionConfig(input.StreamingDistributionConfig, context);
|
|
596
|
-
}
|
|
597
552
|
let contents;
|
|
598
553
|
if (input.StreamingDistributionConfig !== undefined) {
|
|
599
554
|
contents = se_StreamingDistributionConfig(input.StreamingDistributionConfig, context);
|
|
@@ -622,9 +577,6 @@ const se_CreateStreamingDistributionWithTagsCommand = async (input, context) =>
|
|
|
622
577
|
WithTags: [, ""],
|
|
623
578
|
});
|
|
624
579
|
let body;
|
|
625
|
-
if (input.StreamingDistributionConfigWithTags !== undefined) {
|
|
626
|
-
body = se_StreamingDistributionConfigWithTags(input.StreamingDistributionConfigWithTags, context);
|
|
627
|
-
}
|
|
628
580
|
let contents;
|
|
629
581
|
if (input.StreamingDistributionConfigWithTags !== undefined) {
|
|
630
582
|
contents = se_StreamingDistributionConfigWithTags(input.StreamingDistributionConfigWithTags, context);
|
|
@@ -2078,9 +2030,6 @@ const se_TagResourceCommand = async (input, context) => {
|
|
|
2078
2030
|
Resource: [, (0, smithy_client_1.expectNonNull)(input.Resource, `Resource`)],
|
|
2079
2031
|
});
|
|
2080
2032
|
let body;
|
|
2081
|
-
if (input.Tags !== undefined) {
|
|
2082
|
-
body = se_Tags(input.Tags, context);
|
|
2083
|
-
}
|
|
2084
2033
|
let contents;
|
|
2085
2034
|
if (input.Tags !== undefined) {
|
|
2086
2035
|
contents = se_Tags(input.Tags, context);
|
|
@@ -2143,9 +2092,6 @@ const se_UntagResourceCommand = async (input, context) => {
|
|
|
2143
2092
|
Resource: [, (0, smithy_client_1.expectNonNull)(input.Resource, `Resource`)],
|
|
2144
2093
|
});
|
|
2145
2094
|
let body;
|
|
2146
|
-
if (input.TagKeys !== undefined) {
|
|
2147
|
-
body = se_TagKeys(input.TagKeys, context);
|
|
2148
|
-
}
|
|
2149
2095
|
let contents;
|
|
2150
2096
|
if (input.TagKeys !== undefined) {
|
|
2151
2097
|
contents = se_TagKeys(input.TagKeys, context);
|
|
@@ -2174,9 +2120,6 @@ const se_UpdateCachePolicyCommand = async (input, context) => {
|
|
|
2174
2120
|
let resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/cache-policy/{Id}";
|
|
2175
2121
|
resolvedPath = (0, smithy_client_1.resolvedPath)(resolvedPath, input, "Id", () => input.Id, "{Id}", false);
|
|
2176
2122
|
let body;
|
|
2177
|
-
if (input.CachePolicyConfig !== undefined) {
|
|
2178
|
-
body = se_CachePolicyConfig(input.CachePolicyConfig, context);
|
|
2179
|
-
}
|
|
2180
2123
|
let contents;
|
|
2181
2124
|
if (input.CachePolicyConfig !== undefined) {
|
|
2182
2125
|
contents = se_CachePolicyConfig(input.CachePolicyConfig, context);
|
|
@@ -2205,9 +2148,6 @@ const se_UpdateCloudFrontOriginAccessIdentityCommand = async (input, context) =>
|
|
|
2205
2148
|
"/2020-05-31/origin-access-identity/cloudfront/{Id}/config";
|
|
2206
2149
|
resolvedPath = (0, smithy_client_1.resolvedPath)(resolvedPath, input, "Id", () => input.Id, "{Id}", false);
|
|
2207
2150
|
let body;
|
|
2208
|
-
if (input.CloudFrontOriginAccessIdentityConfig !== undefined) {
|
|
2209
|
-
body = se_CloudFrontOriginAccessIdentityConfig(input.CloudFrontOriginAccessIdentityConfig, context);
|
|
2210
|
-
}
|
|
2211
2151
|
let contents;
|
|
2212
2152
|
if (input.CloudFrontOriginAccessIdentityConfig !== undefined) {
|
|
2213
2153
|
contents = se_CloudFrontOriginAccessIdentityConfig(input.CloudFrontOriginAccessIdentityConfig, context);
|
|
@@ -2236,9 +2176,6 @@ const se_UpdateContinuousDeploymentPolicyCommand = async (input, context) => {
|
|
|
2236
2176
|
"/2020-05-31/continuous-deployment-policy/{Id}";
|
|
2237
2177
|
resolvedPath = (0, smithy_client_1.resolvedPath)(resolvedPath, input, "Id", () => input.Id, "{Id}", false);
|
|
2238
2178
|
let body;
|
|
2239
|
-
if (input.ContinuousDeploymentPolicyConfig !== undefined) {
|
|
2240
|
-
body = se_ContinuousDeploymentPolicyConfig(input.ContinuousDeploymentPolicyConfig, context);
|
|
2241
|
-
}
|
|
2242
2179
|
let contents;
|
|
2243
2180
|
if (input.ContinuousDeploymentPolicyConfig !== undefined) {
|
|
2244
2181
|
contents = se_ContinuousDeploymentPolicyConfig(input.ContinuousDeploymentPolicyConfig, context);
|
|
@@ -2266,9 +2203,6 @@ const se_UpdateDistributionCommand = async (input, context) => {
|
|
|
2266
2203
|
let resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/distribution/{Id}/config";
|
|
2267
2204
|
resolvedPath = (0, smithy_client_1.resolvedPath)(resolvedPath, input, "Id", () => input.Id, "{Id}", false);
|
|
2268
2205
|
let body;
|
|
2269
|
-
if (input.DistributionConfig !== undefined) {
|
|
2270
|
-
body = se_DistributionConfig(input.DistributionConfig, context);
|
|
2271
|
-
}
|
|
2272
2206
|
let contents;
|
|
2273
2207
|
if (input.DistributionConfig !== undefined) {
|
|
2274
2208
|
contents = se_DistributionConfig(input.DistributionConfig, context);
|
|
@@ -2321,9 +2255,6 @@ const se_UpdateFieldLevelEncryptionConfigCommand = async (input, context) => {
|
|
|
2321
2255
|
"/2020-05-31/field-level-encryption/{Id}/config";
|
|
2322
2256
|
resolvedPath = (0, smithy_client_1.resolvedPath)(resolvedPath, input, "Id", () => input.Id, "{Id}", false);
|
|
2323
2257
|
let body;
|
|
2324
|
-
if (input.FieldLevelEncryptionConfig !== undefined) {
|
|
2325
|
-
body = se_FieldLevelEncryptionConfig(input.FieldLevelEncryptionConfig, context);
|
|
2326
|
-
}
|
|
2327
2258
|
let contents;
|
|
2328
2259
|
if (input.FieldLevelEncryptionConfig !== undefined) {
|
|
2329
2260
|
contents = se_FieldLevelEncryptionConfig(input.FieldLevelEncryptionConfig, context);
|
|
@@ -2352,9 +2283,6 @@ const se_UpdateFieldLevelEncryptionProfileCommand = async (input, context) => {
|
|
|
2352
2283
|
"/2020-05-31/field-level-encryption-profile/{Id}/config";
|
|
2353
2284
|
resolvedPath = (0, smithy_client_1.resolvedPath)(resolvedPath, input, "Id", () => input.Id, "{Id}", false);
|
|
2354
2285
|
let body;
|
|
2355
|
-
if (input.FieldLevelEncryptionProfileConfig !== undefined) {
|
|
2356
|
-
body = se_FieldLevelEncryptionProfileConfig(input.FieldLevelEncryptionProfileConfig, context);
|
|
2357
|
-
}
|
|
2358
2286
|
let contents;
|
|
2359
2287
|
if (input.FieldLevelEncryptionProfileConfig !== undefined) {
|
|
2360
2288
|
contents = se_FieldLevelEncryptionProfileConfig(input.FieldLevelEncryptionProfileConfig, context);
|
|
@@ -2414,9 +2342,6 @@ const se_UpdateKeyGroupCommand = async (input, context) => {
|
|
|
2414
2342
|
let resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/key-group/{Id}";
|
|
2415
2343
|
resolvedPath = (0, smithy_client_1.resolvedPath)(resolvedPath, input, "Id", () => input.Id, "{Id}", false);
|
|
2416
2344
|
let body;
|
|
2417
|
-
if (input.KeyGroupConfig !== undefined) {
|
|
2418
|
-
body = se_KeyGroupConfig(input.KeyGroupConfig, context);
|
|
2419
|
-
}
|
|
2420
2345
|
let contents;
|
|
2421
2346
|
if (input.KeyGroupConfig !== undefined) {
|
|
2422
2347
|
contents = se_KeyGroupConfig(input.KeyGroupConfig, context);
|
|
@@ -2473,9 +2398,6 @@ const se_UpdateOriginAccessControlCommand = async (input, context) => {
|
|
|
2473
2398
|
"/2020-05-31/origin-access-control/{Id}/config";
|
|
2474
2399
|
resolvedPath = (0, smithy_client_1.resolvedPath)(resolvedPath, input, "Id", () => input.Id, "{Id}", false);
|
|
2475
2400
|
let body;
|
|
2476
|
-
if (input.OriginAccessControlConfig !== undefined) {
|
|
2477
|
-
body = se_OriginAccessControlConfig(input.OriginAccessControlConfig, context);
|
|
2478
|
-
}
|
|
2479
2401
|
let contents;
|
|
2480
2402
|
if (input.OriginAccessControlConfig !== undefined) {
|
|
2481
2403
|
contents = se_OriginAccessControlConfig(input.OriginAccessControlConfig, context);
|
|
@@ -2503,9 +2425,6 @@ const se_UpdateOriginRequestPolicyCommand = async (input, context) => {
|
|
|
2503
2425
|
let resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/origin-request-policy/{Id}";
|
|
2504
2426
|
resolvedPath = (0, smithy_client_1.resolvedPath)(resolvedPath, input, "Id", () => input.Id, "{Id}", false);
|
|
2505
2427
|
let body;
|
|
2506
|
-
if (input.OriginRequestPolicyConfig !== undefined) {
|
|
2507
|
-
body = se_OriginRequestPolicyConfig(input.OriginRequestPolicyConfig, context);
|
|
2508
|
-
}
|
|
2509
2428
|
let contents;
|
|
2510
2429
|
if (input.OriginRequestPolicyConfig !== undefined) {
|
|
2511
2430
|
contents = se_OriginRequestPolicyConfig(input.OriginRequestPolicyConfig, context);
|
|
@@ -2533,9 +2452,6 @@ const se_UpdatePublicKeyCommand = async (input, context) => {
|
|
|
2533
2452
|
let resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/public-key/{Id}/config";
|
|
2534
2453
|
resolvedPath = (0, smithy_client_1.resolvedPath)(resolvedPath, input, "Id", () => input.Id, "{Id}", false);
|
|
2535
2454
|
let body;
|
|
2536
|
-
if (input.PublicKeyConfig !== undefined) {
|
|
2537
|
-
body = se_PublicKeyConfig(input.PublicKeyConfig, context);
|
|
2538
|
-
}
|
|
2539
2455
|
let contents;
|
|
2540
2456
|
if (input.PublicKeyConfig !== undefined) {
|
|
2541
2457
|
contents = se_PublicKeyConfig(input.PublicKeyConfig, context);
|
|
@@ -2613,9 +2529,6 @@ const se_UpdateResponseHeadersPolicyCommand = async (input, context) => {
|
|
|
2613
2529
|
let resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/response-headers-policy/{Id}";
|
|
2614
2530
|
resolvedPath = (0, smithy_client_1.resolvedPath)(resolvedPath, input, "Id", () => input.Id, "{Id}", false);
|
|
2615
2531
|
let body;
|
|
2616
|
-
if (input.ResponseHeadersPolicyConfig !== undefined) {
|
|
2617
|
-
body = se_ResponseHeadersPolicyConfig(input.ResponseHeadersPolicyConfig, context);
|
|
2618
|
-
}
|
|
2619
2532
|
let contents;
|
|
2620
2533
|
if (input.ResponseHeadersPolicyConfig !== undefined) {
|
|
2621
2534
|
contents = se_ResponseHeadersPolicyConfig(input.ResponseHeadersPolicyConfig, context);
|
|
@@ -2644,9 +2557,6 @@ const se_UpdateStreamingDistributionCommand = async (input, context) => {
|
|
|
2644
2557
|
"/2020-05-31/streaming-distribution/{Id}/config";
|
|
2645
2558
|
resolvedPath = (0, smithy_client_1.resolvedPath)(resolvedPath, input, "Id", () => input.Id, "{Id}", false);
|
|
2646
2559
|
let body;
|
|
2647
|
-
if (input.StreamingDistributionConfig !== undefined) {
|
|
2648
|
-
body = se_StreamingDistributionConfig(input.StreamingDistributionConfig, context);
|
|
2649
|
-
}
|
|
2650
2560
|
let contents;
|
|
2651
2561
|
if (input.StreamingDistributionConfig !== undefined) {
|
|
2652
2562
|
contents = se_StreamingDistributionConfig(input.StreamingDistributionConfig, context);
|
|
@@ -66,9 +66,6 @@ export const se_CreateCachePolicyCommand = async (input, context) => {
|
|
|
66
66
|
};
|
|
67
67
|
const resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/cache-policy";
|
|
68
68
|
let body;
|
|
69
|
-
if (input.CachePolicyConfig !== undefined) {
|
|
70
|
-
body = se_CachePolicyConfig(input.CachePolicyConfig, context);
|
|
71
|
-
}
|
|
72
69
|
let contents;
|
|
73
70
|
if (input.CachePolicyConfig !== undefined) {
|
|
74
71
|
contents = se_CachePolicyConfig(input.CachePolicyConfig, context);
|
|
@@ -94,9 +91,6 @@ export const se_CreateCloudFrontOriginAccessIdentityCommand = async (input, cont
|
|
|
94
91
|
const resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` +
|
|
95
92
|
"/2020-05-31/origin-access-identity/cloudfront";
|
|
96
93
|
let body;
|
|
97
|
-
if (input.CloudFrontOriginAccessIdentityConfig !== undefined) {
|
|
98
|
-
body = se_CloudFrontOriginAccessIdentityConfig(input.CloudFrontOriginAccessIdentityConfig, context);
|
|
99
|
-
}
|
|
100
94
|
let contents;
|
|
101
95
|
if (input.CloudFrontOriginAccessIdentityConfig !== undefined) {
|
|
102
96
|
contents = se_CloudFrontOriginAccessIdentityConfig(input.CloudFrontOriginAccessIdentityConfig, context);
|
|
@@ -121,9 +115,6 @@ export const se_CreateContinuousDeploymentPolicyCommand = async (input, context)
|
|
|
121
115
|
};
|
|
122
116
|
const resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/continuous-deployment-policy";
|
|
123
117
|
let body;
|
|
124
|
-
if (input.ContinuousDeploymentPolicyConfig !== undefined) {
|
|
125
|
-
body = se_ContinuousDeploymentPolicyConfig(input.ContinuousDeploymentPolicyConfig, context);
|
|
126
|
-
}
|
|
127
118
|
let contents;
|
|
128
119
|
if (input.ContinuousDeploymentPolicyConfig !== undefined) {
|
|
129
120
|
contents = se_ContinuousDeploymentPolicyConfig(input.ContinuousDeploymentPolicyConfig, context);
|
|
@@ -148,9 +139,6 @@ export const se_CreateDistributionCommand = async (input, context) => {
|
|
|
148
139
|
};
|
|
149
140
|
const resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/distribution";
|
|
150
141
|
let body;
|
|
151
|
-
if (input.DistributionConfig !== undefined) {
|
|
152
|
-
body = se_DistributionConfig(input.DistributionConfig, context);
|
|
153
|
-
}
|
|
154
142
|
let contents;
|
|
155
143
|
if (input.DistributionConfig !== undefined) {
|
|
156
144
|
contents = se_DistributionConfig(input.DistributionConfig, context);
|
|
@@ -178,9 +166,6 @@ export const se_CreateDistributionWithTagsCommand = async (input, context) => {
|
|
|
178
166
|
WithTags: [, ""],
|
|
179
167
|
});
|
|
180
168
|
let body;
|
|
181
|
-
if (input.DistributionConfigWithTags !== undefined) {
|
|
182
|
-
body = se_DistributionConfigWithTags(input.DistributionConfigWithTags, context);
|
|
183
|
-
}
|
|
184
169
|
let contents;
|
|
185
170
|
if (input.DistributionConfigWithTags !== undefined) {
|
|
186
171
|
contents = se_DistributionConfigWithTags(input.DistributionConfigWithTags, context);
|
|
@@ -206,9 +191,6 @@ export const se_CreateFieldLevelEncryptionConfigCommand = async (input, context)
|
|
|
206
191
|
};
|
|
207
192
|
const resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/field-level-encryption";
|
|
208
193
|
let body;
|
|
209
|
-
if (input.FieldLevelEncryptionConfig !== undefined) {
|
|
210
|
-
body = se_FieldLevelEncryptionConfig(input.FieldLevelEncryptionConfig, context);
|
|
211
|
-
}
|
|
212
194
|
let contents;
|
|
213
195
|
if (input.FieldLevelEncryptionConfig !== undefined) {
|
|
214
196
|
contents = se_FieldLevelEncryptionConfig(input.FieldLevelEncryptionConfig, context);
|
|
@@ -234,9 +216,6 @@ export const se_CreateFieldLevelEncryptionProfileCommand = async (input, context
|
|
|
234
216
|
const resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` +
|
|
235
217
|
"/2020-05-31/field-level-encryption-profile";
|
|
236
218
|
let body;
|
|
237
|
-
if (input.FieldLevelEncryptionProfileConfig !== undefined) {
|
|
238
|
-
body = se_FieldLevelEncryptionProfileConfig(input.FieldLevelEncryptionProfileConfig, context);
|
|
239
|
-
}
|
|
240
219
|
let contents;
|
|
241
220
|
if (input.FieldLevelEncryptionProfileConfig !== undefined) {
|
|
242
221
|
contents = se_FieldLevelEncryptionProfileConfig(input.FieldLevelEncryptionProfileConfig, context);
|
|
@@ -296,9 +275,6 @@ export const se_CreateInvalidationCommand = async (input, context) => {
|
|
|
296
275
|
"/2020-05-31/distribution/{DistributionId}/invalidation";
|
|
297
276
|
resolvedPath = __resolvedPath(resolvedPath, input, "DistributionId", () => input.DistributionId, "{DistributionId}", false);
|
|
298
277
|
let body;
|
|
299
|
-
if (input.InvalidationBatch !== undefined) {
|
|
300
|
-
body = se_InvalidationBatch(input.InvalidationBatch, context);
|
|
301
|
-
}
|
|
302
278
|
let contents;
|
|
303
279
|
if (input.InvalidationBatch !== undefined) {
|
|
304
280
|
contents = se_InvalidationBatch(input.InvalidationBatch, context);
|
|
@@ -323,9 +299,6 @@ export const se_CreateKeyGroupCommand = async (input, context) => {
|
|
|
323
299
|
};
|
|
324
300
|
const resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/key-group";
|
|
325
301
|
let body;
|
|
326
|
-
if (input.KeyGroupConfig !== undefined) {
|
|
327
|
-
body = se_KeyGroupConfig(input.KeyGroupConfig, context);
|
|
328
|
-
}
|
|
329
302
|
let contents;
|
|
330
303
|
if (input.KeyGroupConfig !== undefined) {
|
|
331
304
|
contents = se_KeyGroupConfig(input.KeyGroupConfig, context);
|
|
@@ -385,9 +358,6 @@ export const se_CreateMonitoringSubscriptionCommand = async (input, context) =>
|
|
|
385
358
|
"/2020-05-31/distributions/{DistributionId}/monitoring-subscription";
|
|
386
359
|
resolvedPath = __resolvedPath(resolvedPath, input, "DistributionId", () => input.DistributionId, "{DistributionId}", false);
|
|
387
360
|
let body;
|
|
388
|
-
if (input.MonitoringSubscription !== undefined) {
|
|
389
|
-
body = se_MonitoringSubscription(input.MonitoringSubscription, context);
|
|
390
|
-
}
|
|
391
361
|
let contents;
|
|
392
362
|
if (input.MonitoringSubscription !== undefined) {
|
|
393
363
|
contents = se_MonitoringSubscription(input.MonitoringSubscription, context);
|
|
@@ -412,9 +382,6 @@ export const se_CreateOriginAccessControlCommand = async (input, context) => {
|
|
|
412
382
|
};
|
|
413
383
|
const resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/origin-access-control";
|
|
414
384
|
let body;
|
|
415
|
-
if (input.OriginAccessControlConfig !== undefined) {
|
|
416
|
-
body = se_OriginAccessControlConfig(input.OriginAccessControlConfig, context);
|
|
417
|
-
}
|
|
418
385
|
let contents;
|
|
419
386
|
if (input.OriginAccessControlConfig !== undefined) {
|
|
420
387
|
contents = se_OriginAccessControlConfig(input.OriginAccessControlConfig, context);
|
|
@@ -439,9 +406,6 @@ export const se_CreateOriginRequestPolicyCommand = async (input, context) => {
|
|
|
439
406
|
};
|
|
440
407
|
const resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/origin-request-policy";
|
|
441
408
|
let body;
|
|
442
|
-
if (input.OriginRequestPolicyConfig !== undefined) {
|
|
443
|
-
body = se_OriginRequestPolicyConfig(input.OriginRequestPolicyConfig, context);
|
|
444
|
-
}
|
|
445
409
|
let contents;
|
|
446
410
|
if (input.OriginRequestPolicyConfig !== undefined) {
|
|
447
411
|
contents = se_OriginRequestPolicyConfig(input.OriginRequestPolicyConfig, context);
|
|
@@ -466,9 +430,6 @@ export const se_CreatePublicKeyCommand = async (input, context) => {
|
|
|
466
430
|
};
|
|
467
431
|
const resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/public-key";
|
|
468
432
|
let body;
|
|
469
|
-
if (input.PublicKeyConfig !== undefined) {
|
|
470
|
-
body = se_PublicKeyConfig(input.PublicKeyConfig, context);
|
|
471
|
-
}
|
|
472
433
|
let contents;
|
|
473
434
|
if (input.PublicKeyConfig !== undefined) {
|
|
474
435
|
contents = se_PublicKeyConfig(input.PublicKeyConfig, context);
|
|
@@ -538,9 +499,6 @@ export const se_CreateResponseHeadersPolicyCommand = async (input, context) => {
|
|
|
538
499
|
};
|
|
539
500
|
const resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/response-headers-policy";
|
|
540
501
|
let body;
|
|
541
|
-
if (input.ResponseHeadersPolicyConfig !== undefined) {
|
|
542
|
-
body = se_ResponseHeadersPolicyConfig(input.ResponseHeadersPolicyConfig, context);
|
|
543
|
-
}
|
|
544
502
|
let contents;
|
|
545
503
|
if (input.ResponseHeadersPolicyConfig !== undefined) {
|
|
546
504
|
contents = se_ResponseHeadersPolicyConfig(input.ResponseHeadersPolicyConfig, context);
|
|
@@ -565,9 +523,6 @@ export const se_CreateStreamingDistributionCommand = async (input, context) => {
|
|
|
565
523
|
};
|
|
566
524
|
const resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/streaming-distribution";
|
|
567
525
|
let body;
|
|
568
|
-
if (input.StreamingDistributionConfig !== undefined) {
|
|
569
|
-
body = se_StreamingDistributionConfig(input.StreamingDistributionConfig, context);
|
|
570
|
-
}
|
|
571
526
|
let contents;
|
|
572
527
|
if (input.StreamingDistributionConfig !== undefined) {
|
|
573
528
|
contents = se_StreamingDistributionConfig(input.StreamingDistributionConfig, context);
|
|
@@ -595,9 +550,6 @@ export const se_CreateStreamingDistributionWithTagsCommand = async (input, conte
|
|
|
595
550
|
WithTags: [, ""],
|
|
596
551
|
});
|
|
597
552
|
let body;
|
|
598
|
-
if (input.StreamingDistributionConfigWithTags !== undefined) {
|
|
599
|
-
body = se_StreamingDistributionConfigWithTags(input.StreamingDistributionConfigWithTags, context);
|
|
600
|
-
}
|
|
601
553
|
let contents;
|
|
602
554
|
if (input.StreamingDistributionConfigWithTags !== undefined) {
|
|
603
555
|
contents = se_StreamingDistributionConfigWithTags(input.StreamingDistributionConfigWithTags, context);
|
|
@@ -1979,9 +1931,6 @@ export const se_TagResourceCommand = async (input, context) => {
|
|
|
1979
1931
|
Resource: [, __expectNonNull(input.Resource, `Resource`)],
|
|
1980
1932
|
});
|
|
1981
1933
|
let body;
|
|
1982
|
-
if (input.Tags !== undefined) {
|
|
1983
|
-
body = se_Tags(input.Tags, context);
|
|
1984
|
-
}
|
|
1985
1934
|
let contents;
|
|
1986
1935
|
if (input.Tags !== undefined) {
|
|
1987
1936
|
contents = se_Tags(input.Tags, context);
|
|
@@ -2042,9 +1991,6 @@ export const se_UntagResourceCommand = async (input, context) => {
|
|
|
2042
1991
|
Resource: [, __expectNonNull(input.Resource, `Resource`)],
|
|
2043
1992
|
});
|
|
2044
1993
|
let body;
|
|
2045
|
-
if (input.TagKeys !== undefined) {
|
|
2046
|
-
body = se_TagKeys(input.TagKeys, context);
|
|
2047
|
-
}
|
|
2048
1994
|
let contents;
|
|
2049
1995
|
if (input.TagKeys !== undefined) {
|
|
2050
1996
|
contents = se_TagKeys(input.TagKeys, context);
|
|
@@ -2072,9 +2018,6 @@ export const se_UpdateCachePolicyCommand = async (input, context) => {
|
|
|
2072
2018
|
let resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/cache-policy/{Id}";
|
|
2073
2019
|
resolvedPath = __resolvedPath(resolvedPath, input, "Id", () => input.Id, "{Id}", false);
|
|
2074
2020
|
let body;
|
|
2075
|
-
if (input.CachePolicyConfig !== undefined) {
|
|
2076
|
-
body = se_CachePolicyConfig(input.CachePolicyConfig, context);
|
|
2077
|
-
}
|
|
2078
2021
|
let contents;
|
|
2079
2022
|
if (input.CachePolicyConfig !== undefined) {
|
|
2080
2023
|
contents = se_CachePolicyConfig(input.CachePolicyConfig, context);
|
|
@@ -2102,9 +2045,6 @@ export const se_UpdateCloudFrontOriginAccessIdentityCommand = async (input, cont
|
|
|
2102
2045
|
"/2020-05-31/origin-access-identity/cloudfront/{Id}/config";
|
|
2103
2046
|
resolvedPath = __resolvedPath(resolvedPath, input, "Id", () => input.Id, "{Id}", false);
|
|
2104
2047
|
let body;
|
|
2105
|
-
if (input.CloudFrontOriginAccessIdentityConfig !== undefined) {
|
|
2106
|
-
body = se_CloudFrontOriginAccessIdentityConfig(input.CloudFrontOriginAccessIdentityConfig, context);
|
|
2107
|
-
}
|
|
2108
2048
|
let contents;
|
|
2109
2049
|
if (input.CloudFrontOriginAccessIdentityConfig !== undefined) {
|
|
2110
2050
|
contents = se_CloudFrontOriginAccessIdentityConfig(input.CloudFrontOriginAccessIdentityConfig, context);
|
|
@@ -2132,9 +2072,6 @@ export const se_UpdateContinuousDeploymentPolicyCommand = async (input, context)
|
|
|
2132
2072
|
"/2020-05-31/continuous-deployment-policy/{Id}";
|
|
2133
2073
|
resolvedPath = __resolvedPath(resolvedPath, input, "Id", () => input.Id, "{Id}", false);
|
|
2134
2074
|
let body;
|
|
2135
|
-
if (input.ContinuousDeploymentPolicyConfig !== undefined) {
|
|
2136
|
-
body = se_ContinuousDeploymentPolicyConfig(input.ContinuousDeploymentPolicyConfig, context);
|
|
2137
|
-
}
|
|
2138
2075
|
let contents;
|
|
2139
2076
|
if (input.ContinuousDeploymentPolicyConfig !== undefined) {
|
|
2140
2077
|
contents = se_ContinuousDeploymentPolicyConfig(input.ContinuousDeploymentPolicyConfig, context);
|
|
@@ -2161,9 +2098,6 @@ export const se_UpdateDistributionCommand = async (input, context) => {
|
|
|
2161
2098
|
let resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/distribution/{Id}/config";
|
|
2162
2099
|
resolvedPath = __resolvedPath(resolvedPath, input, "Id", () => input.Id, "{Id}", false);
|
|
2163
2100
|
let body;
|
|
2164
|
-
if (input.DistributionConfig !== undefined) {
|
|
2165
|
-
body = se_DistributionConfig(input.DistributionConfig, context);
|
|
2166
|
-
}
|
|
2167
2101
|
let contents;
|
|
2168
2102
|
if (input.DistributionConfig !== undefined) {
|
|
2169
2103
|
contents = se_DistributionConfig(input.DistributionConfig, context);
|
|
@@ -2214,9 +2148,6 @@ export const se_UpdateFieldLevelEncryptionConfigCommand = async (input, context)
|
|
|
2214
2148
|
"/2020-05-31/field-level-encryption/{Id}/config";
|
|
2215
2149
|
resolvedPath = __resolvedPath(resolvedPath, input, "Id", () => input.Id, "{Id}", false);
|
|
2216
2150
|
let body;
|
|
2217
|
-
if (input.FieldLevelEncryptionConfig !== undefined) {
|
|
2218
|
-
body = se_FieldLevelEncryptionConfig(input.FieldLevelEncryptionConfig, context);
|
|
2219
|
-
}
|
|
2220
2151
|
let contents;
|
|
2221
2152
|
if (input.FieldLevelEncryptionConfig !== undefined) {
|
|
2222
2153
|
contents = se_FieldLevelEncryptionConfig(input.FieldLevelEncryptionConfig, context);
|
|
@@ -2244,9 +2175,6 @@ export const se_UpdateFieldLevelEncryptionProfileCommand = async (input, context
|
|
|
2244
2175
|
"/2020-05-31/field-level-encryption-profile/{Id}/config";
|
|
2245
2176
|
resolvedPath = __resolvedPath(resolvedPath, input, "Id", () => input.Id, "{Id}", false);
|
|
2246
2177
|
let body;
|
|
2247
|
-
if (input.FieldLevelEncryptionProfileConfig !== undefined) {
|
|
2248
|
-
body = se_FieldLevelEncryptionProfileConfig(input.FieldLevelEncryptionProfileConfig, context);
|
|
2249
|
-
}
|
|
2250
2178
|
let contents;
|
|
2251
2179
|
if (input.FieldLevelEncryptionProfileConfig !== undefined) {
|
|
2252
2180
|
contents = se_FieldLevelEncryptionProfileConfig(input.FieldLevelEncryptionProfileConfig, context);
|
|
@@ -2304,9 +2232,6 @@ export const se_UpdateKeyGroupCommand = async (input, context) => {
|
|
|
2304
2232
|
let resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/key-group/{Id}";
|
|
2305
2233
|
resolvedPath = __resolvedPath(resolvedPath, input, "Id", () => input.Id, "{Id}", false);
|
|
2306
2234
|
let body;
|
|
2307
|
-
if (input.KeyGroupConfig !== undefined) {
|
|
2308
|
-
body = se_KeyGroupConfig(input.KeyGroupConfig, context);
|
|
2309
|
-
}
|
|
2310
2235
|
let contents;
|
|
2311
2236
|
if (input.KeyGroupConfig !== undefined) {
|
|
2312
2237
|
contents = se_KeyGroupConfig(input.KeyGroupConfig, context);
|
|
@@ -2361,9 +2286,6 @@ export const se_UpdateOriginAccessControlCommand = async (input, context) => {
|
|
|
2361
2286
|
"/2020-05-31/origin-access-control/{Id}/config";
|
|
2362
2287
|
resolvedPath = __resolvedPath(resolvedPath, input, "Id", () => input.Id, "{Id}", false);
|
|
2363
2288
|
let body;
|
|
2364
|
-
if (input.OriginAccessControlConfig !== undefined) {
|
|
2365
|
-
body = se_OriginAccessControlConfig(input.OriginAccessControlConfig, context);
|
|
2366
|
-
}
|
|
2367
2289
|
let contents;
|
|
2368
2290
|
if (input.OriginAccessControlConfig !== undefined) {
|
|
2369
2291
|
contents = se_OriginAccessControlConfig(input.OriginAccessControlConfig, context);
|
|
@@ -2390,9 +2312,6 @@ export const se_UpdateOriginRequestPolicyCommand = async (input, context) => {
|
|
|
2390
2312
|
let resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/origin-request-policy/{Id}";
|
|
2391
2313
|
resolvedPath = __resolvedPath(resolvedPath, input, "Id", () => input.Id, "{Id}", false);
|
|
2392
2314
|
let body;
|
|
2393
|
-
if (input.OriginRequestPolicyConfig !== undefined) {
|
|
2394
|
-
body = se_OriginRequestPolicyConfig(input.OriginRequestPolicyConfig, context);
|
|
2395
|
-
}
|
|
2396
2315
|
let contents;
|
|
2397
2316
|
if (input.OriginRequestPolicyConfig !== undefined) {
|
|
2398
2317
|
contents = se_OriginRequestPolicyConfig(input.OriginRequestPolicyConfig, context);
|
|
@@ -2419,9 +2338,6 @@ export const se_UpdatePublicKeyCommand = async (input, context) => {
|
|
|
2419
2338
|
let resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/public-key/{Id}/config";
|
|
2420
2339
|
resolvedPath = __resolvedPath(resolvedPath, input, "Id", () => input.Id, "{Id}", false);
|
|
2421
2340
|
let body;
|
|
2422
|
-
if (input.PublicKeyConfig !== undefined) {
|
|
2423
|
-
body = se_PublicKeyConfig(input.PublicKeyConfig, context);
|
|
2424
|
-
}
|
|
2425
2341
|
let contents;
|
|
2426
2342
|
if (input.PublicKeyConfig !== undefined) {
|
|
2427
2343
|
contents = se_PublicKeyConfig(input.PublicKeyConfig, context);
|
|
@@ -2497,9 +2413,6 @@ export const se_UpdateResponseHeadersPolicyCommand = async (input, context) => {
|
|
|
2497
2413
|
let resolvedPath = `${basePath?.endsWith("/") ? basePath.slice(0, -1) : basePath || ""}` + "/2020-05-31/response-headers-policy/{Id}";
|
|
2498
2414
|
resolvedPath = __resolvedPath(resolvedPath, input, "Id", () => input.Id, "{Id}", false);
|
|
2499
2415
|
let body;
|
|
2500
|
-
if (input.ResponseHeadersPolicyConfig !== undefined) {
|
|
2501
|
-
body = se_ResponseHeadersPolicyConfig(input.ResponseHeadersPolicyConfig, context);
|
|
2502
|
-
}
|
|
2503
2416
|
let contents;
|
|
2504
2417
|
if (input.ResponseHeadersPolicyConfig !== undefined) {
|
|
2505
2418
|
contents = se_ResponseHeadersPolicyConfig(input.ResponseHeadersPolicyConfig, context);
|
|
@@ -2527,9 +2440,6 @@ export const se_UpdateStreamingDistributionCommand = async (input, context) => {
|
|
|
2527
2440
|
"/2020-05-31/streaming-distribution/{Id}/config";
|
|
2528
2441
|
resolvedPath = __resolvedPath(resolvedPath, input, "Id", () => input.Id, "{Id}", false);
|
|
2529
2442
|
let body;
|
|
2530
|
-
if (input.StreamingDistributionConfig !== undefined) {
|
|
2531
|
-
body = se_StreamingDistributionConfig(input.StreamingDistributionConfig, context);
|
|
2532
|
-
}
|
|
2533
2443
|
let contents;
|
|
2534
2444
|
if (input.StreamingDistributionConfig !== undefined) {
|
|
2535
2445
|
contents = se_StreamingDistributionConfig(input.StreamingDistributionConfig, context);
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-cloudfront",
|
|
3
3
|
"description": "AWS SDK for JavaScript Cloudfront Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.472.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
|
|
7
7
|
"build:cjs": "tsc -p tsconfig.cjs.json",
|
|
@@ -20,30 +20,30 @@
|
|
|
20
20
|
"dependencies": {
|
|
21
21
|
"@aws-crypto/sha256-browser": "3.0.0",
|
|
22
22
|
"@aws-crypto/sha256-js": "3.0.0",
|
|
23
|
-
"@aws-sdk/client-sts": "3.
|
|
23
|
+
"@aws-sdk/client-sts": "3.470.0",
|
|
24
24
|
"@aws-sdk/core": "3.468.0",
|
|
25
|
-
"@aws-sdk/credential-provider-node": "3.
|
|
25
|
+
"@aws-sdk/credential-provider-node": "3.470.0",
|
|
26
26
|
"@aws-sdk/middleware-host-header": "3.468.0",
|
|
27
27
|
"@aws-sdk/middleware-logger": "3.468.0",
|
|
28
28
|
"@aws-sdk/middleware-recursion-detection": "3.468.0",
|
|
29
29
|
"@aws-sdk/middleware-signing": "3.468.0",
|
|
30
|
-
"@aws-sdk/middleware-user-agent": "3.
|
|
31
|
-
"@aws-sdk/region-config-resolver": "3.
|
|
30
|
+
"@aws-sdk/middleware-user-agent": "3.470.0",
|
|
31
|
+
"@aws-sdk/region-config-resolver": "3.470.0",
|
|
32
32
|
"@aws-sdk/types": "3.468.0",
|
|
33
|
-
"@aws-sdk/util-endpoints": "3.
|
|
33
|
+
"@aws-sdk/util-endpoints": "3.470.0",
|
|
34
34
|
"@aws-sdk/util-user-agent-browser": "3.468.0",
|
|
35
|
-
"@aws-sdk/util-user-agent-node": "3.
|
|
36
|
-
"@aws-sdk/xml-builder": "3.
|
|
37
|
-
"@smithy/config-resolver": "^2.0.
|
|
35
|
+
"@aws-sdk/util-user-agent-node": "3.470.0",
|
|
36
|
+
"@aws-sdk/xml-builder": "3.472.0",
|
|
37
|
+
"@smithy/config-resolver": "^2.0.21",
|
|
38
38
|
"@smithy/fetch-http-handler": "^2.3.1",
|
|
39
39
|
"@smithy/hash-node": "^2.0.17",
|
|
40
40
|
"@smithy/invalid-dependency": "^2.0.15",
|
|
41
41
|
"@smithy/middleware-content-length": "^2.0.17",
|
|
42
|
-
"@smithy/middleware-endpoint": "^2.2.
|
|
43
|
-
"@smithy/middleware-retry": "^2.0.
|
|
42
|
+
"@smithy/middleware-endpoint": "^2.2.3",
|
|
43
|
+
"@smithy/middleware-retry": "^2.0.24",
|
|
44
44
|
"@smithy/middleware-serde": "^2.0.15",
|
|
45
45
|
"@smithy/middleware-stack": "^2.0.9",
|
|
46
|
-
"@smithy/node-config-provider": "^2.1.
|
|
46
|
+
"@smithy/node-config-provider": "^2.1.8",
|
|
47
47
|
"@smithy/node-http-handler": "^2.2.1",
|
|
48
48
|
"@smithy/protocol-http": "^3.0.11",
|
|
49
49
|
"@smithy/smithy-client": "^2.1.18",
|
|
@@ -53,8 +53,8 @@
|
|
|
53
53
|
"@smithy/util-body-length-browser": "^2.0.1",
|
|
54
54
|
"@smithy/util-body-length-node": "^2.1.0",
|
|
55
55
|
"@smithy/util-defaults-mode-browser": "^2.0.22",
|
|
56
|
-
"@smithy/util-defaults-mode-node": "^2.0.
|
|
57
|
-
"@smithy/util-endpoints": "^1.0.
|
|
56
|
+
"@smithy/util-defaults-mode-node": "^2.0.29",
|
|
57
|
+
"@smithy/util-endpoints": "^1.0.7",
|
|
58
58
|
"@smithy/util-retry": "^2.0.8",
|
|
59
59
|
"@smithy/util-stream": "^2.0.23",
|
|
60
60
|
"@smithy/util-utf8": "^2.0.2",
|