@aws-sdk/client-eks-auth 3.928.0 → 3.930.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/index.js +220 -260
- package/dist-cjs/runtimeConfig.shared.js +2 -0
- package/dist-es/EKSAuthClient.js +2 -0
- package/dist-es/commands/AssumeRoleForPodIdentityCommand.js +3 -10
- package/dist-es/models/models_0.js +0 -12
- package/dist-es/runtimeConfig.shared.js +2 -0
- package/dist-es/schemas/schemas_0.js +189 -0
- package/dist-types/EKSAuthClient.d.ts +10 -1
- package/dist-types/models/models_0.d.ts +0 -12
- package/dist-types/runtimeConfig.browser.d.ts +1 -0
- package/dist-types/runtimeConfig.d.ts +1 -0
- package/dist-types/runtimeConfig.native.d.ts +1 -0
- package/dist-types/runtimeConfig.shared.d.ts +1 -0
- package/dist-types/schemas/schemas_0.d.ts +19 -0
- package/dist-types/ts3.4/EKSAuthClient.d.ts +4 -0
- package/dist-types/ts3.4/models/models_0.d.ts +0 -7
- package/dist-types/ts3.4/runtimeConfig.browser.d.ts +4 -0
- package/dist-types/ts3.4/runtimeConfig.d.ts +4 -0
- package/dist-types/ts3.4/runtimeConfig.native.d.ts +4 -0
- package/dist-types/ts3.4/runtimeConfig.shared.d.ts +4 -0
- package/dist-types/ts3.4/schemas/schemas_0.d.ts +24 -0
- package/package.json +33 -33
- package/dist-es/protocols/Aws_restJson1.js +0 -213
- package/dist-types/protocols/Aws_restJson1.d.ts +0 -11
- package/dist-types/ts3.4/protocols/Aws_restJson1.d.ts +0 -17
package/dist-cjs/index.js
CHANGED
|
@@ -6,6 +6,7 @@ var middlewareRecursionDetection = require('@aws-sdk/middleware-recursion-detect
|
|
|
6
6
|
var middlewareUserAgent = require('@aws-sdk/middleware-user-agent');
|
|
7
7
|
var configResolver = require('@smithy/config-resolver');
|
|
8
8
|
var core = require('@smithy/core');
|
|
9
|
+
var schema = require('@smithy/core/schema');
|
|
9
10
|
var middlewareContentLength = require('@smithy/middleware-content-length');
|
|
10
11
|
var middlewareEndpoint = require('@smithy/middleware-endpoint');
|
|
11
12
|
var middlewareRetry = require('@smithy/middleware-retry');
|
|
@@ -14,8 +15,6 @@ var httpAuthSchemeProvider = require('./auth/httpAuthSchemeProvider');
|
|
|
14
15
|
var runtimeConfig = require('./runtimeConfig');
|
|
15
16
|
var regionConfigResolver = require('@aws-sdk/region-config-resolver');
|
|
16
17
|
var protocolHttp = require('@smithy/protocol-http');
|
|
17
|
-
var middlewareSerde = require('@smithy/middleware-serde');
|
|
18
|
-
var core$1 = require('@aws-sdk/core');
|
|
19
18
|
|
|
20
19
|
const resolveClientEndpointParameters = (options) => {
|
|
21
20
|
return Object.assign(options, {
|
|
@@ -89,6 +88,7 @@ class EKSAuthClient extends smithyClient.Client {
|
|
|
89
88
|
const _config_7 = httpAuthSchemeProvider.resolveHttpAuthSchemeConfig(_config_6);
|
|
90
89
|
const _config_8 = resolveRuntimeExtensions(_config_7, configuration?.extensions || []);
|
|
91
90
|
this.config = _config_8;
|
|
91
|
+
this.middlewareStack.use(schema.getSchemaSerdePlugin(this.config));
|
|
92
92
|
this.middlewareStack.use(middlewareUserAgent.getUserAgentPlugin(this.config));
|
|
93
93
|
this.middlewareStack.use(middlewareRetry.getRetryPlugin(this.config));
|
|
94
94
|
this.middlewareStack.use(middlewareContentLength.getContentLengthPlugin(this.config));
|
|
@@ -108,14 +108,14 @@ class EKSAuthClient extends smithyClient.Client {
|
|
|
108
108
|
}
|
|
109
109
|
}
|
|
110
110
|
|
|
111
|
-
class EKSAuthServiceException extends smithyClient.ServiceException {
|
|
111
|
+
let EKSAuthServiceException$1 = class EKSAuthServiceException extends smithyClient.ServiceException {
|
|
112
112
|
constructor(options) {
|
|
113
113
|
super(options);
|
|
114
114
|
Object.setPrototypeOf(this, EKSAuthServiceException.prototype);
|
|
115
115
|
}
|
|
116
|
-
}
|
|
116
|
+
};
|
|
117
117
|
|
|
118
|
-
class AccessDeniedException extends EKSAuthServiceException {
|
|
118
|
+
let AccessDeniedException$1 = class AccessDeniedException extends EKSAuthServiceException$1 {
|
|
119
119
|
name = "AccessDeniedException";
|
|
120
120
|
$fault = "client";
|
|
121
121
|
constructor(opts) {
|
|
@@ -126,8 +126,8 @@ class AccessDeniedException extends EKSAuthServiceException {
|
|
|
126
126
|
});
|
|
127
127
|
Object.setPrototypeOf(this, AccessDeniedException.prototype);
|
|
128
128
|
}
|
|
129
|
-
}
|
|
130
|
-
class ExpiredTokenException extends EKSAuthServiceException {
|
|
129
|
+
};
|
|
130
|
+
let ExpiredTokenException$1 = class ExpiredTokenException extends EKSAuthServiceException$1 {
|
|
131
131
|
name = "ExpiredTokenException";
|
|
132
132
|
$fault = "client";
|
|
133
133
|
constructor(opts) {
|
|
@@ -138,8 +138,8 @@ class ExpiredTokenException extends EKSAuthServiceException {
|
|
|
138
138
|
});
|
|
139
139
|
Object.setPrototypeOf(this, ExpiredTokenException.prototype);
|
|
140
140
|
}
|
|
141
|
-
}
|
|
142
|
-
class InternalServerException extends EKSAuthServiceException {
|
|
141
|
+
};
|
|
142
|
+
let InternalServerException$1 = class InternalServerException extends EKSAuthServiceException$1 {
|
|
143
143
|
name = "InternalServerException";
|
|
144
144
|
$fault = "server";
|
|
145
145
|
constructor(opts) {
|
|
@@ -150,8 +150,8 @@ class InternalServerException extends EKSAuthServiceException {
|
|
|
150
150
|
});
|
|
151
151
|
Object.setPrototypeOf(this, InternalServerException.prototype);
|
|
152
152
|
}
|
|
153
|
-
}
|
|
154
|
-
class InvalidParameterException extends EKSAuthServiceException {
|
|
153
|
+
};
|
|
154
|
+
let InvalidParameterException$1 = class InvalidParameterException extends EKSAuthServiceException$1 {
|
|
155
155
|
name = "InvalidParameterException";
|
|
156
156
|
$fault = "client";
|
|
157
157
|
constructor(opts) {
|
|
@@ -162,8 +162,8 @@ class InvalidParameterException extends EKSAuthServiceException {
|
|
|
162
162
|
});
|
|
163
163
|
Object.setPrototypeOf(this, InvalidParameterException.prototype);
|
|
164
164
|
}
|
|
165
|
-
}
|
|
166
|
-
class InvalidRequestException extends EKSAuthServiceException {
|
|
165
|
+
};
|
|
166
|
+
let InvalidRequestException$1 = class InvalidRequestException extends EKSAuthServiceException$1 {
|
|
167
167
|
name = "InvalidRequestException";
|
|
168
168
|
$fault = "client";
|
|
169
169
|
constructor(opts) {
|
|
@@ -174,8 +174,8 @@ class InvalidRequestException extends EKSAuthServiceException {
|
|
|
174
174
|
});
|
|
175
175
|
Object.setPrototypeOf(this, InvalidRequestException.prototype);
|
|
176
176
|
}
|
|
177
|
-
}
|
|
178
|
-
class InvalidTokenException extends EKSAuthServiceException {
|
|
177
|
+
};
|
|
178
|
+
let InvalidTokenException$1 = class InvalidTokenException extends EKSAuthServiceException$1 {
|
|
179
179
|
name = "InvalidTokenException";
|
|
180
180
|
$fault = "client";
|
|
181
181
|
constructor(opts) {
|
|
@@ -186,8 +186,8 @@ class InvalidTokenException extends EKSAuthServiceException {
|
|
|
186
186
|
});
|
|
187
187
|
Object.setPrototypeOf(this, InvalidTokenException.prototype);
|
|
188
188
|
}
|
|
189
|
-
}
|
|
190
|
-
class ResourceNotFoundException extends EKSAuthServiceException {
|
|
189
|
+
};
|
|
190
|
+
let ResourceNotFoundException$1 = class ResourceNotFoundException extends EKSAuthServiceException$1 {
|
|
191
191
|
name = "ResourceNotFoundException";
|
|
192
192
|
$fault = "client";
|
|
193
193
|
constructor(opts) {
|
|
@@ -198,8 +198,8 @@ class ResourceNotFoundException extends EKSAuthServiceException {
|
|
|
198
198
|
});
|
|
199
199
|
Object.setPrototypeOf(this, ResourceNotFoundException.prototype);
|
|
200
200
|
}
|
|
201
|
-
}
|
|
202
|
-
class ServiceUnavailableException extends EKSAuthServiceException {
|
|
201
|
+
};
|
|
202
|
+
let ServiceUnavailableException$1 = class ServiceUnavailableException extends EKSAuthServiceException$1 {
|
|
203
203
|
name = "ServiceUnavailableException";
|
|
204
204
|
$fault = "server";
|
|
205
205
|
constructor(opts) {
|
|
@@ -210,8 +210,8 @@ class ServiceUnavailableException extends EKSAuthServiceException {
|
|
|
210
210
|
});
|
|
211
211
|
Object.setPrototypeOf(this, ServiceUnavailableException.prototype);
|
|
212
212
|
}
|
|
213
|
-
}
|
|
214
|
-
class ThrottlingException extends EKSAuthServiceException {
|
|
213
|
+
};
|
|
214
|
+
let ThrottlingException$1 = class ThrottlingException extends EKSAuthServiceException$1 {
|
|
215
215
|
name = "ThrottlingException";
|
|
216
216
|
$fault = "client";
|
|
217
217
|
constructor(opts) {
|
|
@@ -222,241 +222,204 @@ class ThrottlingException extends EKSAuthServiceException {
|
|
|
222
222
|
});
|
|
223
223
|
Object.setPrototypeOf(this, ThrottlingException.prototype);
|
|
224
224
|
}
|
|
225
|
-
}
|
|
226
|
-
const AssumeRoleForPodIdentityRequestFilterSensitiveLog = (obj) => ({
|
|
227
|
-
...obj,
|
|
228
|
-
...(obj.token && { token: smithyClient.SENSITIVE_STRING }),
|
|
229
|
-
});
|
|
230
|
-
const CredentialsFilterSensitiveLog = (obj) => ({
|
|
231
|
-
...obj,
|
|
232
|
-
});
|
|
233
|
-
const AssumeRoleForPodIdentityResponseFilterSensitiveLog = (obj) => ({
|
|
234
|
-
...obj,
|
|
235
|
-
...(obj.credentials && { credentials: smithyClient.SENSITIVE_STRING }),
|
|
236
|
-
});
|
|
237
|
-
|
|
238
|
-
const se_AssumeRoleForPodIdentityCommand = async (input, context) => {
|
|
239
|
-
const b = core.requestBuilder(input, context);
|
|
240
|
-
const headers = {
|
|
241
|
-
"content-type": "application/json",
|
|
242
|
-
};
|
|
243
|
-
b.bp("/clusters/{clusterName}/assume-role-for-pod-identity");
|
|
244
|
-
b.p("clusterName", () => input.clusterName, "{clusterName}", false);
|
|
245
|
-
let body;
|
|
246
|
-
body = JSON.stringify(smithyClient.take(input, {
|
|
247
|
-
token: [],
|
|
248
|
-
}));
|
|
249
|
-
b.m("POST").h(headers).b(body);
|
|
250
|
-
return b.build();
|
|
251
|
-
};
|
|
252
|
-
const de_AssumeRoleForPodIdentityCommand = async (output, context) => {
|
|
253
|
-
if (output.statusCode !== 200 && output.statusCode >= 300) {
|
|
254
|
-
return de_CommandError(output, context);
|
|
255
|
-
}
|
|
256
|
-
const contents = smithyClient.map({
|
|
257
|
-
$metadata: deserializeMetadata(output),
|
|
258
|
-
});
|
|
259
|
-
const data = smithyClient.expectNonNull(smithyClient.expectObject(await core$1.parseJsonBody(output.body, context)), "body");
|
|
260
|
-
const doc = smithyClient.take(data, {
|
|
261
|
-
assumedRoleUser: smithyClient._json,
|
|
262
|
-
audience: smithyClient.expectString,
|
|
263
|
-
credentials: (_) => de_Credentials(_),
|
|
264
|
-
podIdentityAssociation: smithyClient._json,
|
|
265
|
-
subject: smithyClient._json,
|
|
266
|
-
});
|
|
267
|
-
Object.assign(contents, doc);
|
|
268
|
-
return contents;
|
|
269
|
-
};
|
|
270
|
-
const de_CommandError = async (output, context) => {
|
|
271
|
-
const parsedOutput = {
|
|
272
|
-
...output,
|
|
273
|
-
body: await core$1.parseJsonErrorBody(output.body, context),
|
|
274
|
-
};
|
|
275
|
-
const errorCode = core$1.loadRestJsonErrorCode(output, parsedOutput.body);
|
|
276
|
-
switch (errorCode) {
|
|
277
|
-
case "AccessDeniedException":
|
|
278
|
-
case "com.amazonaws.eksauth#AccessDeniedException":
|
|
279
|
-
throw await de_AccessDeniedExceptionRes(parsedOutput);
|
|
280
|
-
case "ExpiredTokenException":
|
|
281
|
-
case "com.amazonaws.eksauth#ExpiredTokenException":
|
|
282
|
-
throw await de_ExpiredTokenExceptionRes(parsedOutput);
|
|
283
|
-
case "InternalServerException":
|
|
284
|
-
case "com.amazonaws.eksauth#InternalServerException":
|
|
285
|
-
throw await de_InternalServerExceptionRes(parsedOutput);
|
|
286
|
-
case "InvalidParameterException":
|
|
287
|
-
case "com.amazonaws.eksauth#InvalidParameterException":
|
|
288
|
-
throw await de_InvalidParameterExceptionRes(parsedOutput);
|
|
289
|
-
case "InvalidRequestException":
|
|
290
|
-
case "com.amazonaws.eksauth#InvalidRequestException":
|
|
291
|
-
throw await de_InvalidRequestExceptionRes(parsedOutput);
|
|
292
|
-
case "InvalidTokenException":
|
|
293
|
-
case "com.amazonaws.eksauth#InvalidTokenException":
|
|
294
|
-
throw await de_InvalidTokenExceptionRes(parsedOutput);
|
|
295
|
-
case "ResourceNotFoundException":
|
|
296
|
-
case "com.amazonaws.eksauth#ResourceNotFoundException":
|
|
297
|
-
throw await de_ResourceNotFoundExceptionRes(parsedOutput);
|
|
298
|
-
case "ServiceUnavailableException":
|
|
299
|
-
case "com.amazonaws.eksauth#ServiceUnavailableException":
|
|
300
|
-
throw await de_ServiceUnavailableExceptionRes(parsedOutput);
|
|
301
|
-
case "ThrottlingException":
|
|
302
|
-
case "com.amazonaws.eksauth#ThrottlingException":
|
|
303
|
-
throw await de_ThrottlingExceptionRes(parsedOutput);
|
|
304
|
-
default:
|
|
305
|
-
const parsedBody = parsedOutput.body;
|
|
306
|
-
return throwDefaultError({
|
|
307
|
-
output,
|
|
308
|
-
parsedBody,
|
|
309
|
-
errorCode,
|
|
310
|
-
});
|
|
311
|
-
}
|
|
312
225
|
};
|
|
313
|
-
|
|
314
|
-
const
|
|
315
|
-
|
|
316
|
-
|
|
317
|
-
|
|
318
|
-
|
|
319
|
-
|
|
320
|
-
|
|
321
|
-
|
|
322
|
-
|
|
323
|
-
|
|
324
|
-
|
|
325
|
-
|
|
326
|
-
|
|
327
|
-
const
|
|
328
|
-
|
|
329
|
-
|
|
330
|
-
|
|
331
|
-
|
|
332
|
-
|
|
333
|
-
|
|
334
|
-
|
|
335
|
-
|
|
336
|
-
|
|
337
|
-
|
|
338
|
-
|
|
339
|
-
|
|
340
|
-
const
|
|
341
|
-
|
|
342
|
-
|
|
343
|
-
|
|
344
|
-
|
|
345
|
-
|
|
346
|
-
|
|
347
|
-
|
|
348
|
-
|
|
349
|
-
|
|
350
|
-
|
|
351
|
-
|
|
352
|
-
|
|
353
|
-
const
|
|
354
|
-
|
|
355
|
-
|
|
356
|
-
|
|
357
|
-
|
|
358
|
-
|
|
359
|
-
|
|
360
|
-
|
|
361
|
-
|
|
362
|
-
|
|
363
|
-
|
|
364
|
-
|
|
365
|
-
|
|
366
|
-
|
|
367
|
-
|
|
368
|
-
|
|
369
|
-
|
|
370
|
-
|
|
371
|
-
|
|
372
|
-
|
|
373
|
-
|
|
374
|
-
|
|
375
|
-
|
|
376
|
-
|
|
377
|
-
|
|
378
|
-
|
|
379
|
-
|
|
380
|
-
|
|
381
|
-
|
|
382
|
-
|
|
383
|
-
|
|
384
|
-
|
|
385
|
-
|
|
386
|
-
|
|
387
|
-
|
|
388
|
-
|
|
389
|
-
|
|
390
|
-
|
|
391
|
-
|
|
392
|
-
|
|
393
|
-
|
|
394
|
-
|
|
395
|
-
|
|
396
|
-
|
|
397
|
-
}
|
|
398
|
-
|
|
399
|
-
|
|
400
|
-
|
|
401
|
-
|
|
402
|
-
|
|
403
|
-
|
|
404
|
-
|
|
405
|
-
|
|
406
|
-
|
|
407
|
-
|
|
408
|
-
|
|
409
|
-
|
|
410
|
-
|
|
411
|
-
|
|
412
|
-
|
|
413
|
-
|
|
414
|
-
|
|
415
|
-
|
|
416
|
-
|
|
417
|
-
|
|
418
|
-
|
|
419
|
-
|
|
420
|
-
|
|
421
|
-
|
|
422
|
-
|
|
423
|
-
|
|
424
|
-
|
|
425
|
-
|
|
426
|
-
|
|
427
|
-
|
|
428
|
-
|
|
429
|
-
|
|
430
|
-
|
|
431
|
-
|
|
432
|
-
|
|
433
|
-
|
|
434
|
-
|
|
435
|
-
|
|
436
|
-
|
|
437
|
-
|
|
438
|
-
|
|
439
|
-
|
|
440
|
-
|
|
441
|
-
|
|
442
|
-
|
|
443
|
-
|
|
444
|
-
|
|
226
|
+
|
|
227
|
+
const _ADE = "AccessDeniedException";
|
|
228
|
+
const _ARFPI = "AssumeRoleForPodIdentity";
|
|
229
|
+
const _ARFPIR = "AssumeRoleForPodIdentityRequest";
|
|
230
|
+
const _ARFPIRs = "AssumeRoleForPodIdentityResponse";
|
|
231
|
+
const _ARU = "AssumedRoleUser";
|
|
232
|
+
const _C = "Credentials";
|
|
233
|
+
const _ETE = "ExpiredTokenException";
|
|
234
|
+
const _IPE = "InvalidParameterException";
|
|
235
|
+
const _IRE = "InvalidRequestException";
|
|
236
|
+
const _ISE = "InternalServerException";
|
|
237
|
+
const _ITE = "InvalidTokenException";
|
|
238
|
+
const _JT = "JwtToken";
|
|
239
|
+
const _PIA = "PodIdentityAssociation";
|
|
240
|
+
const _RNFE = "ResourceNotFoundException";
|
|
241
|
+
const _S = "Subject";
|
|
242
|
+
const _SUE = "ServiceUnavailableException";
|
|
243
|
+
const _TE = "ThrottlingException";
|
|
244
|
+
const _a = "arn";
|
|
245
|
+
const _aA = "associationArn";
|
|
246
|
+
const _aI = "associationId";
|
|
247
|
+
const _aKI = "accessKeyId";
|
|
248
|
+
const _aRI = "assumeRoleId";
|
|
249
|
+
const _aRU = "assumedRoleUser";
|
|
250
|
+
const _au = "audience";
|
|
251
|
+
const _c = "client";
|
|
252
|
+
const _cN = "clusterName";
|
|
253
|
+
const _cr = "credentials";
|
|
254
|
+
const _e = "error";
|
|
255
|
+
const _ex = "expiration";
|
|
256
|
+
const _h = "http";
|
|
257
|
+
const _hE = "httpError";
|
|
258
|
+
const _m = "message";
|
|
259
|
+
const _n = "namespace";
|
|
260
|
+
const _pIA = "podIdentityAssociation";
|
|
261
|
+
const _s = "subject";
|
|
262
|
+
const _sA = "serviceAccount";
|
|
263
|
+
const _sAK = "secretAccessKey";
|
|
264
|
+
const _sT = "sessionToken";
|
|
265
|
+
const _se = "server";
|
|
266
|
+
const _sm = "smithy.ts.sdk.synthetic.com.amazonaws.eksauth";
|
|
267
|
+
const _t = "token";
|
|
268
|
+
const n0 = "com.amazonaws.eksauth";
|
|
269
|
+
var JwtToken = [0, n0, _JT, 8, 0];
|
|
270
|
+
var AccessDeniedException = [
|
|
271
|
+
-3,
|
|
272
|
+
n0,
|
|
273
|
+
_ADE,
|
|
274
|
+
{
|
|
275
|
+
[_e]: _c,
|
|
276
|
+
[_hE]: 400,
|
|
277
|
+
},
|
|
278
|
+
[_m],
|
|
279
|
+
[0],
|
|
280
|
+
];
|
|
281
|
+
schema.TypeRegistry.for(n0).registerError(AccessDeniedException, AccessDeniedException$1);
|
|
282
|
+
var AssumedRoleUser = [3, n0, _ARU, 0, [_a, _aRI], [0, 0]];
|
|
283
|
+
var AssumeRoleForPodIdentityRequest = [
|
|
284
|
+
3,
|
|
285
|
+
n0,
|
|
286
|
+
_ARFPIR,
|
|
287
|
+
0,
|
|
288
|
+
[_cN, _t],
|
|
289
|
+
[
|
|
290
|
+
[0, 1],
|
|
291
|
+
[() => JwtToken, 0],
|
|
292
|
+
],
|
|
293
|
+
];
|
|
294
|
+
var AssumeRoleForPodIdentityResponse = [
|
|
295
|
+
3,
|
|
296
|
+
n0,
|
|
297
|
+
_ARFPIRs,
|
|
298
|
+
0,
|
|
299
|
+
[_s, _au, _pIA, _aRU, _cr],
|
|
300
|
+
[() => Subject, 0, () => PodIdentityAssociation, () => AssumedRoleUser, [() => Credentials, 0]],
|
|
301
|
+
];
|
|
302
|
+
var Credentials = [3, n0, _C, 8, [_sT, _sAK, _aKI, _ex], [0, 0, 0, 4]];
|
|
303
|
+
var ExpiredTokenException = [
|
|
304
|
+
-3,
|
|
305
|
+
n0,
|
|
306
|
+
_ETE,
|
|
307
|
+
{
|
|
308
|
+
[_e]: _c,
|
|
309
|
+
[_hE]: 400,
|
|
310
|
+
},
|
|
311
|
+
[_m],
|
|
312
|
+
[0],
|
|
313
|
+
];
|
|
314
|
+
schema.TypeRegistry.for(n0).registerError(ExpiredTokenException, ExpiredTokenException$1);
|
|
315
|
+
var InternalServerException = [
|
|
316
|
+
-3,
|
|
317
|
+
n0,
|
|
318
|
+
_ISE,
|
|
319
|
+
{
|
|
320
|
+
[_e]: _se,
|
|
321
|
+
[_hE]: 500,
|
|
322
|
+
},
|
|
323
|
+
[_m],
|
|
324
|
+
[0],
|
|
325
|
+
];
|
|
326
|
+
schema.TypeRegistry.for(n0).registerError(InternalServerException, InternalServerException$1);
|
|
327
|
+
var InvalidParameterException = [
|
|
328
|
+
-3,
|
|
329
|
+
n0,
|
|
330
|
+
_IPE,
|
|
331
|
+
{
|
|
332
|
+
[_e]: _c,
|
|
333
|
+
[_hE]: 400,
|
|
334
|
+
},
|
|
335
|
+
[_m],
|
|
336
|
+
[0],
|
|
337
|
+
];
|
|
338
|
+
schema.TypeRegistry.for(n0).registerError(InvalidParameterException, InvalidParameterException$1);
|
|
339
|
+
var InvalidRequestException = [
|
|
340
|
+
-3,
|
|
341
|
+
n0,
|
|
342
|
+
_IRE,
|
|
343
|
+
{
|
|
344
|
+
[_e]: _c,
|
|
345
|
+
[_hE]: 400,
|
|
346
|
+
},
|
|
347
|
+
[_m],
|
|
348
|
+
[0],
|
|
349
|
+
];
|
|
350
|
+
schema.TypeRegistry.for(n0).registerError(InvalidRequestException, InvalidRequestException$1);
|
|
351
|
+
var InvalidTokenException = [
|
|
352
|
+
-3,
|
|
353
|
+
n0,
|
|
354
|
+
_ITE,
|
|
355
|
+
{
|
|
356
|
+
[_e]: _c,
|
|
357
|
+
[_hE]: 400,
|
|
358
|
+
},
|
|
359
|
+
[_m],
|
|
360
|
+
[0],
|
|
361
|
+
];
|
|
362
|
+
schema.TypeRegistry.for(n0).registerError(InvalidTokenException, InvalidTokenException$1);
|
|
363
|
+
var PodIdentityAssociation = [3, n0, _PIA, 0, [_aA, _aI], [0, 0]];
|
|
364
|
+
var ResourceNotFoundException = [
|
|
365
|
+
-3,
|
|
366
|
+
n0,
|
|
367
|
+
_RNFE,
|
|
368
|
+
{
|
|
369
|
+
[_e]: _c,
|
|
370
|
+
[_hE]: 404,
|
|
371
|
+
},
|
|
372
|
+
[_m],
|
|
373
|
+
[0],
|
|
374
|
+
];
|
|
375
|
+
schema.TypeRegistry.for(n0).registerError(ResourceNotFoundException, ResourceNotFoundException$1);
|
|
376
|
+
var ServiceUnavailableException = [
|
|
377
|
+
-3,
|
|
378
|
+
n0,
|
|
379
|
+
_SUE,
|
|
380
|
+
{
|
|
381
|
+
[_e]: _se,
|
|
382
|
+
[_hE]: 503,
|
|
383
|
+
},
|
|
384
|
+
[_m],
|
|
385
|
+
[0],
|
|
386
|
+
];
|
|
387
|
+
schema.TypeRegistry.for(n0).registerError(ServiceUnavailableException, ServiceUnavailableException$1);
|
|
388
|
+
var Subject = [3, n0, _S, 0, [_n, _sA], [0, 0]];
|
|
389
|
+
var ThrottlingException = [
|
|
390
|
+
-3,
|
|
391
|
+
n0,
|
|
392
|
+
_TE,
|
|
393
|
+
{
|
|
394
|
+
[_e]: _c,
|
|
395
|
+
[_hE]: 429,
|
|
396
|
+
},
|
|
397
|
+
[_m],
|
|
398
|
+
[0],
|
|
399
|
+
];
|
|
400
|
+
schema.TypeRegistry.for(n0).registerError(ThrottlingException, ThrottlingException$1);
|
|
401
|
+
var EKSAuthServiceException = [-3, _sm, "EKSAuthServiceException", 0, [], []];
|
|
402
|
+
schema.TypeRegistry.for(_sm).registerError(EKSAuthServiceException, EKSAuthServiceException$1);
|
|
403
|
+
var AssumeRoleForPodIdentity = [
|
|
404
|
+
9,
|
|
405
|
+
n0,
|
|
406
|
+
_ARFPI,
|
|
407
|
+
{
|
|
408
|
+
[_h]: ["POST", "/clusters/{clusterName}/assume-role-for-pod-identity", 200],
|
|
409
|
+
},
|
|
410
|
+
() => AssumeRoleForPodIdentityRequest,
|
|
411
|
+
() => AssumeRoleForPodIdentityResponse,
|
|
412
|
+
];
|
|
445
413
|
|
|
446
414
|
class AssumeRoleForPodIdentityCommand extends smithyClient.Command
|
|
447
415
|
.classBuilder()
|
|
448
416
|
.ep(commonParams)
|
|
449
417
|
.m(function (Command, cs, config, o) {
|
|
450
|
-
return [
|
|
451
|
-
middlewareSerde.getSerdePlugin(config, this.serialize, this.deserialize),
|
|
452
|
-
middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions()),
|
|
453
|
-
];
|
|
418
|
+
return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
|
|
454
419
|
})
|
|
455
420
|
.s("EKSAuthFrontend", "AssumeRoleForPodIdentity", {})
|
|
456
421
|
.n("EKSAuthClient", "AssumeRoleForPodIdentityCommand")
|
|
457
|
-
.
|
|
458
|
-
.ser(se_AssumeRoleForPodIdentityCommand)
|
|
459
|
-
.de(de_AssumeRoleForPodIdentityCommand)
|
|
422
|
+
.sc(AssumeRoleForPodIdentity)
|
|
460
423
|
.build() {
|
|
461
424
|
}
|
|
462
425
|
|
|
@@ -475,19 +438,16 @@ Object.defineProperty(exports, "__Client", {
|
|
|
475
438
|
enumerable: true,
|
|
476
439
|
get: function () { return smithyClient.Client; }
|
|
477
440
|
});
|
|
478
|
-
exports.AccessDeniedException = AccessDeniedException;
|
|
441
|
+
exports.AccessDeniedException = AccessDeniedException$1;
|
|
479
442
|
exports.AssumeRoleForPodIdentityCommand = AssumeRoleForPodIdentityCommand;
|
|
480
|
-
exports.AssumeRoleForPodIdentityRequestFilterSensitiveLog = AssumeRoleForPodIdentityRequestFilterSensitiveLog;
|
|
481
|
-
exports.AssumeRoleForPodIdentityResponseFilterSensitiveLog = AssumeRoleForPodIdentityResponseFilterSensitiveLog;
|
|
482
|
-
exports.CredentialsFilterSensitiveLog = CredentialsFilterSensitiveLog;
|
|
483
443
|
exports.EKSAuth = EKSAuth;
|
|
484
444
|
exports.EKSAuthClient = EKSAuthClient;
|
|
485
|
-
exports.EKSAuthServiceException = EKSAuthServiceException;
|
|
486
|
-
exports.ExpiredTokenException = ExpiredTokenException;
|
|
487
|
-
exports.InternalServerException = InternalServerException;
|
|
488
|
-
exports.InvalidParameterException = InvalidParameterException;
|
|
489
|
-
exports.InvalidRequestException = InvalidRequestException;
|
|
490
|
-
exports.InvalidTokenException = InvalidTokenException;
|
|
491
|
-
exports.ResourceNotFoundException = ResourceNotFoundException;
|
|
492
|
-
exports.ServiceUnavailableException = ServiceUnavailableException;
|
|
493
|
-
exports.ThrottlingException = ThrottlingException;
|
|
445
|
+
exports.EKSAuthServiceException = EKSAuthServiceException$1;
|
|
446
|
+
exports.ExpiredTokenException = ExpiredTokenException$1;
|
|
447
|
+
exports.InternalServerException = InternalServerException$1;
|
|
448
|
+
exports.InvalidParameterException = InvalidParameterException$1;
|
|
449
|
+
exports.InvalidRequestException = InvalidRequestException$1;
|
|
450
|
+
exports.InvalidTokenException = InvalidTokenException$1;
|
|
451
|
+
exports.ResourceNotFoundException = ResourceNotFoundException$1;
|
|
452
|
+
exports.ServiceUnavailableException = ServiceUnavailableException$1;
|
|
453
|
+
exports.ThrottlingException = ThrottlingException$1;
|
|
@@ -2,6 +2,7 @@
|
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
3
|
exports.getRuntimeConfig = void 0;
|
|
4
4
|
const core_1 = require("@aws-sdk/core");
|
|
5
|
+
const protocols_1 = require("@aws-sdk/core/protocols");
|
|
5
6
|
const smithy_client_1 = require("@smithy/smithy-client");
|
|
6
7
|
const url_parser_1 = require("@smithy/url-parser");
|
|
7
8
|
const util_base64_1 = require("@smithy/util-base64");
|
|
@@ -25,6 +26,7 @@ const getRuntimeConfig = (config) => {
|
|
|
25
26
|
},
|
|
26
27
|
],
|
|
27
28
|
logger: config?.logger ?? new smithy_client_1.NoOpLogger(),
|
|
29
|
+
protocol: config?.protocol ?? new protocols_1.AwsRestJsonProtocol({ defaultNamespace: "com.amazonaws.eksauth" }),
|
|
28
30
|
serviceId: config?.serviceId ?? "EKS Auth",
|
|
29
31
|
urlParser: config?.urlParser ?? url_parser_1.parseUrl,
|
|
30
32
|
utf8Decoder: config?.utf8Decoder ?? util_utf8_1.fromUtf8,
|
package/dist-es/EKSAuthClient.js
CHANGED
|
@@ -4,6 +4,7 @@ import { getRecursionDetectionPlugin } from "@aws-sdk/middleware-recursion-detec
|
|
|
4
4
|
import { getUserAgentPlugin, resolveUserAgentConfig, } from "@aws-sdk/middleware-user-agent";
|
|
5
5
|
import { resolveRegionConfig } from "@smithy/config-resolver";
|
|
6
6
|
import { DefaultIdentityProviderConfig, getHttpAuthSchemeEndpointRuleSetPlugin, getHttpSigningPlugin, } from "@smithy/core";
|
|
7
|
+
import { getSchemaSerdePlugin } from "@smithy/core/schema";
|
|
7
8
|
import { getContentLengthPlugin } from "@smithy/middleware-content-length";
|
|
8
9
|
import { resolveEndpointConfig } from "@smithy/middleware-endpoint";
|
|
9
10
|
import { getRetryPlugin, resolveRetryConfig } from "@smithy/middleware-retry";
|
|
@@ -28,6 +29,7 @@ export class EKSAuthClient extends __Client {
|
|
|
28
29
|
const _config_7 = resolveHttpAuthSchemeConfig(_config_6);
|
|
29
30
|
const _config_8 = resolveRuntimeExtensions(_config_7, configuration?.extensions || []);
|
|
30
31
|
this.config = _config_8;
|
|
32
|
+
this.middlewareStack.use(getSchemaSerdePlugin(this.config));
|
|
31
33
|
this.middlewareStack.use(getUserAgentPlugin(this.config));
|
|
32
34
|
this.middlewareStack.use(getRetryPlugin(this.config));
|
|
33
35
|
this.middlewareStack.use(getContentLengthPlugin(this.config));
|
|
@@ -1,23 +1,16 @@
|
|
|
1
1
|
import { getEndpointPlugin } from "@smithy/middleware-endpoint";
|
|
2
|
-
import { getSerdePlugin } from "@smithy/middleware-serde";
|
|
3
2
|
import { Command as $Command } from "@smithy/smithy-client";
|
|
4
3
|
import { commonParams } from "../endpoint/EndpointParameters";
|
|
5
|
-
import {
|
|
6
|
-
import { de_AssumeRoleForPodIdentityCommand, se_AssumeRoleForPodIdentityCommand } from "../protocols/Aws_restJson1";
|
|
4
|
+
import { AssumeRoleForPodIdentity } from "../schemas/schemas_0";
|
|
7
5
|
export { $Command };
|
|
8
6
|
export class AssumeRoleForPodIdentityCommand extends $Command
|
|
9
7
|
.classBuilder()
|
|
10
8
|
.ep(commonParams)
|
|
11
9
|
.m(function (Command, cs, config, o) {
|
|
12
|
-
return [
|
|
13
|
-
getSerdePlugin(config, this.serialize, this.deserialize),
|
|
14
|
-
getEndpointPlugin(config, Command.getEndpointParameterInstructions()),
|
|
15
|
-
];
|
|
10
|
+
return [getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
|
|
16
11
|
})
|
|
17
12
|
.s("EKSAuthFrontend", "AssumeRoleForPodIdentity", {})
|
|
18
13
|
.n("EKSAuthClient", "AssumeRoleForPodIdentityCommand")
|
|
19
|
-
.
|
|
20
|
-
.ser(se_AssumeRoleForPodIdentityCommand)
|
|
21
|
-
.de(de_AssumeRoleForPodIdentityCommand)
|
|
14
|
+
.sc(AssumeRoleForPodIdentity)
|
|
22
15
|
.build() {
|
|
23
16
|
}
|
|
@@ -1,4 +1,3 @@
|
|
|
1
|
-
import { SENSITIVE_STRING } from "@smithy/smithy-client";
|
|
2
1
|
import { EKSAuthServiceException as __BaseException } from "./EKSAuthServiceException";
|
|
3
2
|
export class AccessDeniedException extends __BaseException {
|
|
4
3
|
name = "AccessDeniedException";
|
|
@@ -108,14 +107,3 @@ export class ThrottlingException extends __BaseException {
|
|
|
108
107
|
Object.setPrototypeOf(this, ThrottlingException.prototype);
|
|
109
108
|
}
|
|
110
109
|
}
|
|
111
|
-
export const AssumeRoleForPodIdentityRequestFilterSensitiveLog = (obj) => ({
|
|
112
|
-
...obj,
|
|
113
|
-
...(obj.token && { token: SENSITIVE_STRING }),
|
|
114
|
-
});
|
|
115
|
-
export const CredentialsFilterSensitiveLog = (obj) => ({
|
|
116
|
-
...obj,
|
|
117
|
-
});
|
|
118
|
-
export const AssumeRoleForPodIdentityResponseFilterSensitiveLog = (obj) => ({
|
|
119
|
-
...obj,
|
|
120
|
-
...(obj.credentials && { credentials: SENSITIVE_STRING }),
|
|
121
|
-
});
|