@aws-sdk/client-eks-auth 3.957.0 → 3.958.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -6
- package/dist-cjs/auth/httpAuthSchemeProvider.js +3 -4
- package/dist-cjs/index.js +71 -33
- package/dist-cjs/runtimeConfig.browser.js +1 -2
- package/dist-cjs/runtimeConfig.js +2 -4
- package/dist-es/auth/httpAuthSchemeProvider.js +3 -4
- package/dist-es/runtimeConfig.browser.js +1 -2
- package/dist-es/runtimeConfig.js +4 -6
- package/dist-es/schemas/schemas_0.js +72 -34
- package/package.json +2 -2
package/README.md
CHANGED
|
@@ -10,10 +10,8 @@ AWS SDK for JavaScript EKSAuth Client for Node.js, Browser and React Native.
|
|
|
10
10
|
used by the EKS Pod Identity Agent.</p>
|
|
11
11
|
|
|
12
12
|
## Installing
|
|
13
|
-
|
|
14
13
|
To install this package, simply type add or install @aws-sdk/client-eks-auth
|
|
15
14
|
using your favorite package manager:
|
|
16
|
-
|
|
17
15
|
- `npm install @aws-sdk/client-eks-auth`
|
|
18
16
|
- `yarn add @aws-sdk/client-eks-auth`
|
|
19
17
|
- `pnpm add @aws-sdk/client-eks-auth`
|
|
@@ -49,9 +47,7 @@ To send a request, you:
|
|
|
49
47
|
// a client can be shared by different commands.
|
|
50
48
|
const client = new EKSAuthClient({ region: "REGION" });
|
|
51
49
|
|
|
52
|
-
const params = {
|
|
53
|
-
/** input parameters */
|
|
54
|
-
};
|
|
50
|
+
const params = { /** input parameters */ };
|
|
55
51
|
const command = new AssumeRoleForPodIdentityCommand(params);
|
|
56
52
|
```
|
|
57
53
|
|
|
@@ -210,5 +206,4 @@ AssumeRoleForPodIdentity
|
|
|
210
206
|
</summary>
|
|
211
207
|
|
|
212
208
|
[Command API Reference](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/client/eks-auth/command/AssumeRoleForPodIdentityCommand/) / [Input](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-eks-auth/Interface/AssumeRoleForPodIdentityCommandInput/) / [Output](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-eks-auth/Interface/AssumeRoleForPodIdentityCommandOutput/)
|
|
213
|
-
|
|
214
209
|
</details>
|
|
@@ -6,10 +6,9 @@ const util_middleware_1 = require("@smithy/util-middleware");
|
|
|
6
6
|
const defaultEKSAuthHttpAuthSchemeParametersProvider = async (config, context, input) => {
|
|
7
7
|
return {
|
|
8
8
|
operation: (0, util_middleware_1.getSmithyContext)(context).operation,
|
|
9
|
-
region:
|
|
10
|
-
(
|
|
11
|
-
|
|
12
|
-
})(),
|
|
9
|
+
region: await (0, util_middleware_1.normalizeProvider)(config.region)() || (() => {
|
|
10
|
+
throw new Error("expected `region` to be configured for `aws.auth#sigv4`");
|
|
11
|
+
})(),
|
|
13
12
|
};
|
|
14
13
|
};
|
|
15
14
|
exports.defaultEKSAuthHttpAuthSchemeParametersProvider = defaultEKSAuthHttpAuthSchemeParametersProvider;
|
package/dist-cjs/index.js
CHANGED
|
@@ -267,56 +267,94 @@ const _sm = "smithy.ts.sdk.synthetic.com.amazonaws.eksauth";
|
|
|
267
267
|
const _t = "token";
|
|
268
268
|
const n0 = "com.amazonaws.eksauth";
|
|
269
269
|
var JwtToken = [0, n0, _JT, 8, 0];
|
|
270
|
-
var AccessDeniedException$ = [-3, n0, _ADE,
|
|
270
|
+
var AccessDeniedException$ = [-3, n0, _ADE,
|
|
271
|
+
{ [_e]: _c, [_hE]: 400 },
|
|
272
|
+
[_m],
|
|
273
|
+
[0]
|
|
274
|
+
];
|
|
271
275
|
schema.TypeRegistry.for(n0).registerError(AccessDeniedException$, AccessDeniedException);
|
|
272
|
-
var AssumedRoleUser$ = [3, n0, _ARU,
|
|
273
|
-
|
|
274
|
-
|
|
275
|
-
|
|
276
|
-
|
|
276
|
+
var AssumedRoleUser$ = [3, n0, _ARU,
|
|
277
|
+
0,
|
|
278
|
+
[_a, _aRI],
|
|
279
|
+
[0, 0]
|
|
280
|
+
];
|
|
281
|
+
var AssumeRoleForPodIdentityRequest$ = [3, n0, _ARFPIR,
|
|
277
282
|
0,
|
|
278
283
|
[_cN, _t],
|
|
279
|
-
[
|
|
280
|
-
[0, 1],
|
|
281
|
-
[() => JwtToken, 0],
|
|
282
|
-
],
|
|
284
|
+
[[0, 1], [() => JwtToken, 0]]
|
|
283
285
|
];
|
|
284
|
-
var AssumeRoleForPodIdentityResponse$ = [
|
|
285
|
-
3,
|
|
286
|
-
n0,
|
|
287
|
-
_ARFPIRs,
|
|
286
|
+
var AssumeRoleForPodIdentityResponse$ = [3, n0, _ARFPIRs,
|
|
288
287
|
0,
|
|
289
288
|
[_s, _au, _pIA, _aRU, _cr],
|
|
290
|
-
[() => Subject$, 0, () => PodIdentityAssociation$, () => AssumedRoleUser$, [() => Credentials$, 0]]
|
|
289
|
+
[() => Subject$, 0, () => PodIdentityAssociation$, () => AssumedRoleUser$, [() => Credentials$, 0]]
|
|
290
|
+
];
|
|
291
|
+
var Credentials$ = [3, n0, _C,
|
|
292
|
+
8,
|
|
293
|
+
[_sT, _sAK, _aKI, _ex],
|
|
294
|
+
[0, 0, 0, 4]
|
|
295
|
+
];
|
|
296
|
+
var ExpiredTokenException$ = [-3, n0, _ETE,
|
|
297
|
+
{ [_e]: _c, [_hE]: 400 },
|
|
298
|
+
[_m],
|
|
299
|
+
[0]
|
|
291
300
|
];
|
|
292
|
-
var Credentials$ = [3, n0, _C, 8, [_sT, _sAK, _aKI, _ex], [0, 0, 0, 4]];
|
|
293
|
-
var ExpiredTokenException$ = [-3, n0, _ETE, { [_e]: _c, [_hE]: 400 }, [_m], [0]];
|
|
294
301
|
schema.TypeRegistry.for(n0).registerError(ExpiredTokenException$, ExpiredTokenException);
|
|
295
|
-
var InternalServerException$ = [-3, n0, _ISE,
|
|
302
|
+
var InternalServerException$ = [-3, n0, _ISE,
|
|
303
|
+
{ [_e]: _se, [_hE]: 500 },
|
|
304
|
+
[_m],
|
|
305
|
+
[0]
|
|
306
|
+
];
|
|
296
307
|
schema.TypeRegistry.for(n0).registerError(InternalServerException$, InternalServerException);
|
|
297
|
-
var InvalidParameterException$ = [-3, n0, _IPE,
|
|
308
|
+
var InvalidParameterException$ = [-3, n0, _IPE,
|
|
309
|
+
{ [_e]: _c, [_hE]: 400 },
|
|
310
|
+
[_m],
|
|
311
|
+
[0]
|
|
312
|
+
];
|
|
298
313
|
schema.TypeRegistry.for(n0).registerError(InvalidParameterException$, InvalidParameterException);
|
|
299
|
-
var InvalidRequestException$ = [-3, n0, _IRE,
|
|
314
|
+
var InvalidRequestException$ = [-3, n0, _IRE,
|
|
315
|
+
{ [_e]: _c, [_hE]: 400 },
|
|
316
|
+
[_m],
|
|
317
|
+
[0]
|
|
318
|
+
];
|
|
300
319
|
schema.TypeRegistry.for(n0).registerError(InvalidRequestException$, InvalidRequestException);
|
|
301
|
-
var InvalidTokenException$ = [-3, n0, _ITE,
|
|
320
|
+
var InvalidTokenException$ = [-3, n0, _ITE,
|
|
321
|
+
{ [_e]: _c, [_hE]: 400 },
|
|
322
|
+
[_m],
|
|
323
|
+
[0]
|
|
324
|
+
];
|
|
302
325
|
schema.TypeRegistry.for(n0).registerError(InvalidTokenException$, InvalidTokenException);
|
|
303
|
-
var PodIdentityAssociation$ = [3, n0, _PIA,
|
|
304
|
-
|
|
326
|
+
var PodIdentityAssociation$ = [3, n0, _PIA,
|
|
327
|
+
0,
|
|
328
|
+
[_aA, _aI],
|
|
329
|
+
[0, 0]
|
|
330
|
+
];
|
|
331
|
+
var ResourceNotFoundException$ = [-3, n0, _RNFE,
|
|
332
|
+
{ [_e]: _c, [_hE]: 404 },
|
|
333
|
+
[_m],
|
|
334
|
+
[0]
|
|
335
|
+
];
|
|
305
336
|
schema.TypeRegistry.for(n0).registerError(ResourceNotFoundException$, ResourceNotFoundException);
|
|
306
|
-
var ServiceUnavailableException$ = [-3, n0, _SUE,
|
|
337
|
+
var ServiceUnavailableException$ = [-3, n0, _SUE,
|
|
338
|
+
{ [_e]: _se, [_hE]: 503 },
|
|
339
|
+
[_m],
|
|
340
|
+
[0]
|
|
341
|
+
];
|
|
307
342
|
schema.TypeRegistry.for(n0).registerError(ServiceUnavailableException$, ServiceUnavailableException);
|
|
308
|
-
var Subject$ = [3, n0, _S,
|
|
309
|
-
|
|
343
|
+
var Subject$ = [3, n0, _S,
|
|
344
|
+
0,
|
|
345
|
+
[_n, _sA],
|
|
346
|
+
[0, 0]
|
|
347
|
+
];
|
|
348
|
+
var ThrottlingException$ = [-3, n0, _TE,
|
|
349
|
+
{ [_e]: _c, [_hE]: 429 },
|
|
350
|
+
[_m],
|
|
351
|
+
[0]
|
|
352
|
+
];
|
|
310
353
|
schema.TypeRegistry.for(n0).registerError(ThrottlingException$, ThrottlingException);
|
|
311
354
|
var EKSAuthServiceException$ = [-3, _sm, "EKSAuthServiceException", 0, [], []];
|
|
312
355
|
schema.TypeRegistry.for(_sm).registerError(EKSAuthServiceException$, EKSAuthServiceException);
|
|
313
|
-
var AssumeRoleForPodIdentity$ = [
|
|
314
|
-
|
|
315
|
-
n0,
|
|
316
|
-
_ARFPI,
|
|
317
|
-
{ [_h]: ["POST", "/clusters/{clusterName}/assume-role-for-pod-identity", 200] },
|
|
318
|
-
() => AssumeRoleForPodIdentityRequest$,
|
|
319
|
-
() => AssumeRoleForPodIdentityResponse$,
|
|
356
|
+
var AssumeRoleForPodIdentity$ = [9, n0, _ARFPI,
|
|
357
|
+
{ [_h]: ["POST", "/clusters/{clusterName}/assume-role-for-pod-identity", 200] }, () => AssumeRoleForPodIdentityRequest$, () => AssumeRoleForPodIdentityResponse$
|
|
320
358
|
];
|
|
321
359
|
|
|
322
360
|
class AssumeRoleForPodIdentityCommand extends smithyClient.Command
|
|
@@ -24,8 +24,7 @@ const getRuntimeConfig = (config) => {
|
|
|
24
24
|
defaultsMode,
|
|
25
25
|
bodyLengthChecker: config?.bodyLengthChecker ?? util_body_length_browser_1.calculateBodyLength,
|
|
26
26
|
credentialDefaultProvider: config?.credentialDefaultProvider ?? ((_) => () => Promise.reject(new Error("Credential is missing"))),
|
|
27
|
-
defaultUserAgentProvider: config?.defaultUserAgentProvider ??
|
|
28
|
-
(0, util_user_agent_browser_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
|
|
27
|
+
defaultUserAgentProvider: config?.defaultUserAgentProvider ?? (0, util_user_agent_browser_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
|
|
29
28
|
maxAttempts: config?.maxAttempts ?? util_retry_1.DEFAULT_MAX_ATTEMPTS,
|
|
30
29
|
region: config?.region ?? (0, invalid_dependency_1.invalidProvider)("Region is missing"),
|
|
31
30
|
requestHandler: fetch_http_handler_1.FetchHttpHandler.create(config?.requestHandler ?? defaultConfigProvider),
|
|
@@ -34,11 +34,9 @@ const getRuntimeConfig = (config) => {
|
|
|
34
34
|
authSchemePreference: config?.authSchemePreference ?? (0, node_config_provider_1.loadConfig)(core_1.NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, loaderConfig),
|
|
35
35
|
bodyLengthChecker: config?.bodyLengthChecker ?? util_body_length_node_1.calculateBodyLength,
|
|
36
36
|
credentialDefaultProvider: config?.credentialDefaultProvider ?? credential_provider_node_1.defaultProvider,
|
|
37
|
-
defaultUserAgentProvider: config?.defaultUserAgentProvider ??
|
|
38
|
-
(0, util_user_agent_node_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
|
|
37
|
+
defaultUserAgentProvider: config?.defaultUserAgentProvider ?? (0, util_user_agent_node_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
|
|
39
38
|
maxAttempts: config?.maxAttempts ?? (0, node_config_provider_1.loadConfig)(middleware_retry_1.NODE_MAX_ATTEMPT_CONFIG_OPTIONS, config),
|
|
40
|
-
region: config?.region ??
|
|
41
|
-
(0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_REGION_CONFIG_OPTIONS, { ...config_resolver_1.NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
|
|
39
|
+
region: config?.region ?? (0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_REGION_CONFIG_OPTIONS, { ...config_resolver_1.NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
|
|
42
40
|
requestHandler: node_http_handler_1.NodeHttpHandler.create(config?.requestHandler ?? defaultConfigProvider),
|
|
43
41
|
retryMode: config?.retryMode ??
|
|
44
42
|
(0, node_config_provider_1.loadConfig)({
|
|
@@ -3,10 +3,9 @@ import { getSmithyContext, normalizeProvider } from "@smithy/util-middleware";
|
|
|
3
3
|
export const defaultEKSAuthHttpAuthSchemeParametersProvider = async (config, context, input) => {
|
|
4
4
|
return {
|
|
5
5
|
operation: getSmithyContext(context).operation,
|
|
6
|
-
region:
|
|
7
|
-
(
|
|
8
|
-
|
|
9
|
-
})(),
|
|
6
|
+
region: await normalizeProvider(config.region)() || (() => {
|
|
7
|
+
throw new Error("expected `region` to be configured for `aws.auth#sigv4`");
|
|
8
|
+
})(),
|
|
10
9
|
};
|
|
11
10
|
};
|
|
12
11
|
function createAwsAuthSigv4HttpAuthOption(authParameters) {
|
|
@@ -20,8 +20,7 @@ export const getRuntimeConfig = (config) => {
|
|
|
20
20
|
defaultsMode,
|
|
21
21
|
bodyLengthChecker: config?.bodyLengthChecker ?? calculateBodyLength,
|
|
22
22
|
credentialDefaultProvider: config?.credentialDefaultProvider ?? ((_) => () => Promise.reject(new Error("Credential is missing"))),
|
|
23
|
-
defaultUserAgentProvider: config?.defaultUserAgentProvider ??
|
|
24
|
-
createDefaultUserAgentProvider({ serviceId: clientSharedValues.serviceId, clientVersion: packageInfo.version }),
|
|
23
|
+
defaultUserAgentProvider: config?.defaultUserAgentProvider ?? createDefaultUserAgentProvider({ serviceId: clientSharedValues.serviceId, clientVersion: packageInfo.version }),
|
|
25
24
|
maxAttempts: config?.maxAttempts ?? DEFAULT_MAX_ATTEMPTS,
|
|
26
25
|
region: config?.region ?? invalidProvider("Region is missing"),
|
|
27
26
|
requestHandler: RequestHandler.create(config?.requestHandler ?? defaultConfigProvider),
|
package/dist-es/runtimeConfig.js
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import packageInfo from "../package.json";
|
|
2
|
-
import {
|
|
2
|
+
import { emitWarningIfUnsupportedVersion as awsCheckVersion, NODE_AUTH_SCHEME_PREFERENCE_OPTIONS } from "@aws-sdk/core";
|
|
3
3
|
import { defaultProvider as credentialDefaultProvider } from "@aws-sdk/credential-provider-node";
|
|
4
|
-
import {
|
|
4
|
+
import { createDefaultUserAgentProvider, NODE_APP_ID_CONFIG_OPTIONS } from "@aws-sdk/util-user-agent-node";
|
|
5
5
|
import { NODE_REGION_CONFIG_FILE_OPTIONS, NODE_REGION_CONFIG_OPTIONS, NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS, NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS, } from "@smithy/config-resolver";
|
|
6
6
|
import { Hash } from "@smithy/hash-node";
|
|
7
7
|
import { NODE_MAX_ATTEMPT_CONFIG_OPTIONS, NODE_RETRY_MODE_CONFIG_OPTIONS } from "@smithy/middleware-retry";
|
|
@@ -30,11 +30,9 @@ export const getRuntimeConfig = (config) => {
|
|
|
30
30
|
authSchemePreference: config?.authSchemePreference ?? loadNodeConfig(NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, loaderConfig),
|
|
31
31
|
bodyLengthChecker: config?.bodyLengthChecker ?? calculateBodyLength,
|
|
32
32
|
credentialDefaultProvider: config?.credentialDefaultProvider ?? credentialDefaultProvider,
|
|
33
|
-
defaultUserAgentProvider: config?.defaultUserAgentProvider ??
|
|
34
|
-
createDefaultUserAgentProvider({ serviceId: clientSharedValues.serviceId, clientVersion: packageInfo.version }),
|
|
33
|
+
defaultUserAgentProvider: config?.defaultUserAgentProvider ?? createDefaultUserAgentProvider({ serviceId: clientSharedValues.serviceId, clientVersion: packageInfo.version }),
|
|
35
34
|
maxAttempts: config?.maxAttempts ?? loadNodeConfig(NODE_MAX_ATTEMPT_CONFIG_OPTIONS, config),
|
|
36
|
-
region: config?.region ??
|
|
37
|
-
loadNodeConfig(NODE_REGION_CONFIG_OPTIONS, { ...NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
|
|
35
|
+
region: config?.region ?? loadNodeConfig(NODE_REGION_CONFIG_OPTIONS, { ...NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
|
|
38
36
|
requestHandler: RequestHandler.create(config?.requestHandler ?? defaultConfigProvider),
|
|
39
37
|
retryMode: config?.retryMode ??
|
|
40
38
|
loadNodeConfig({
|
|
@@ -44,54 +44,92 @@ import { TypeRegistry } from "@smithy/core/schema";
|
|
|
44
44
|
import { EKSAuthServiceException } from "../models/EKSAuthServiceException";
|
|
45
45
|
import { AccessDeniedException, ExpiredTokenException, InternalServerException, InvalidParameterException, InvalidRequestException, InvalidTokenException, ResourceNotFoundException, ServiceUnavailableException, ThrottlingException, } from "../models/errors";
|
|
46
46
|
var JwtToken = [0, n0, _JT, 8, 0];
|
|
47
|
-
export var AccessDeniedException$ = [-3, n0, _ADE,
|
|
47
|
+
export var AccessDeniedException$ = [-3, n0, _ADE,
|
|
48
|
+
{ [_e]: _c, [_hE]: 400 },
|
|
49
|
+
[_m],
|
|
50
|
+
[0]
|
|
51
|
+
];
|
|
48
52
|
TypeRegistry.for(n0).registerError(AccessDeniedException$, AccessDeniedException);
|
|
49
|
-
export var AssumedRoleUser$ = [3, n0, _ARU,
|
|
50
|
-
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
53
|
+
export var AssumedRoleUser$ = [3, n0, _ARU,
|
|
54
|
+
0,
|
|
55
|
+
[_a, _aRI],
|
|
56
|
+
[0, 0]
|
|
57
|
+
];
|
|
58
|
+
export var AssumeRoleForPodIdentityRequest$ = [3, n0, _ARFPIR,
|
|
54
59
|
0,
|
|
55
60
|
[_cN, _t],
|
|
56
|
-
[
|
|
57
|
-
|
|
58
|
-
|
|
59
|
-
],
|
|
60
|
-
];
|
|
61
|
-
export var AssumeRoleForPodIdentityResponse$ = [
|
|
62
|
-
3,
|
|
63
|
-
n0,
|
|
64
|
-
_ARFPIRs,
|
|
61
|
+
[[0, 1], [() => JwtToken, 0]]
|
|
62
|
+
];
|
|
63
|
+
export var AssumeRoleForPodIdentityResponse$ = [3, n0, _ARFPIRs,
|
|
65
64
|
0,
|
|
66
65
|
[_s, _au, _pIA, _aRU, _cr],
|
|
67
|
-
[() => Subject$, 0, () => PodIdentityAssociation$, () => AssumedRoleUser$, [() => Credentials$, 0]]
|
|
66
|
+
[() => Subject$, 0, () => PodIdentityAssociation$, () => AssumedRoleUser$, [() => Credentials$, 0]]
|
|
67
|
+
];
|
|
68
|
+
export var Credentials$ = [3, n0, _C,
|
|
69
|
+
8,
|
|
70
|
+
[_sT, _sAK, _aKI, _ex],
|
|
71
|
+
[0, 0, 0, 4]
|
|
72
|
+
];
|
|
73
|
+
export var ExpiredTokenException$ = [-3, n0, _ETE,
|
|
74
|
+
{ [_e]: _c, [_hE]: 400 },
|
|
75
|
+
[_m],
|
|
76
|
+
[0]
|
|
68
77
|
];
|
|
69
|
-
export var Credentials$ = [3, n0, _C, 8, [_sT, _sAK, _aKI, _ex], [0, 0, 0, 4]];
|
|
70
|
-
export var ExpiredTokenException$ = [-3, n0, _ETE, { [_e]: _c, [_hE]: 400 }, [_m], [0]];
|
|
71
78
|
TypeRegistry.for(n0).registerError(ExpiredTokenException$, ExpiredTokenException);
|
|
72
|
-
export var InternalServerException$ = [-3, n0, _ISE,
|
|
79
|
+
export var InternalServerException$ = [-3, n0, _ISE,
|
|
80
|
+
{ [_e]: _se, [_hE]: 500 },
|
|
81
|
+
[_m],
|
|
82
|
+
[0]
|
|
83
|
+
];
|
|
73
84
|
TypeRegistry.for(n0).registerError(InternalServerException$, InternalServerException);
|
|
74
|
-
export var InvalidParameterException$ = [-3, n0, _IPE,
|
|
85
|
+
export var InvalidParameterException$ = [-3, n0, _IPE,
|
|
86
|
+
{ [_e]: _c, [_hE]: 400 },
|
|
87
|
+
[_m],
|
|
88
|
+
[0]
|
|
89
|
+
];
|
|
75
90
|
TypeRegistry.for(n0).registerError(InvalidParameterException$, InvalidParameterException);
|
|
76
|
-
export var InvalidRequestException$ = [-3, n0, _IRE,
|
|
91
|
+
export var InvalidRequestException$ = [-3, n0, _IRE,
|
|
92
|
+
{ [_e]: _c, [_hE]: 400 },
|
|
93
|
+
[_m],
|
|
94
|
+
[0]
|
|
95
|
+
];
|
|
77
96
|
TypeRegistry.for(n0).registerError(InvalidRequestException$, InvalidRequestException);
|
|
78
|
-
export var InvalidTokenException$ = [-3, n0, _ITE,
|
|
97
|
+
export var InvalidTokenException$ = [-3, n0, _ITE,
|
|
98
|
+
{ [_e]: _c, [_hE]: 400 },
|
|
99
|
+
[_m],
|
|
100
|
+
[0]
|
|
101
|
+
];
|
|
79
102
|
TypeRegistry.for(n0).registerError(InvalidTokenException$, InvalidTokenException);
|
|
80
|
-
export var PodIdentityAssociation$ = [3, n0, _PIA,
|
|
81
|
-
|
|
103
|
+
export var PodIdentityAssociation$ = [3, n0, _PIA,
|
|
104
|
+
0,
|
|
105
|
+
[_aA, _aI],
|
|
106
|
+
[0, 0]
|
|
107
|
+
];
|
|
108
|
+
export var ResourceNotFoundException$ = [-3, n0, _RNFE,
|
|
109
|
+
{ [_e]: _c, [_hE]: 404 },
|
|
110
|
+
[_m],
|
|
111
|
+
[0]
|
|
112
|
+
];
|
|
82
113
|
TypeRegistry.for(n0).registerError(ResourceNotFoundException$, ResourceNotFoundException);
|
|
83
|
-
export var ServiceUnavailableException$ = [-3, n0, _SUE,
|
|
114
|
+
export var ServiceUnavailableException$ = [-3, n0, _SUE,
|
|
115
|
+
{ [_e]: _se, [_hE]: 503 },
|
|
116
|
+
[_m],
|
|
117
|
+
[0]
|
|
118
|
+
];
|
|
84
119
|
TypeRegistry.for(n0).registerError(ServiceUnavailableException$, ServiceUnavailableException);
|
|
85
|
-
export var Subject$ = [3, n0, _S,
|
|
86
|
-
|
|
120
|
+
export var Subject$ = [3, n0, _S,
|
|
121
|
+
0,
|
|
122
|
+
[_n, _sA],
|
|
123
|
+
[0, 0]
|
|
124
|
+
];
|
|
125
|
+
export var ThrottlingException$ = [-3, n0, _TE,
|
|
126
|
+
{ [_e]: _c, [_hE]: 429 },
|
|
127
|
+
[_m],
|
|
128
|
+
[0]
|
|
129
|
+
];
|
|
87
130
|
TypeRegistry.for(n0).registerError(ThrottlingException$, ThrottlingException);
|
|
88
131
|
export var EKSAuthServiceException$ = [-3, _sm, "EKSAuthServiceException", 0, [], []];
|
|
89
132
|
TypeRegistry.for(_sm).registerError(EKSAuthServiceException$, EKSAuthServiceException);
|
|
90
|
-
export var AssumeRoleForPodIdentity$ = [
|
|
91
|
-
|
|
92
|
-
n0,
|
|
93
|
-
_ARFPI,
|
|
94
|
-
{ [_h]: ["POST", "/clusters/{clusterName}/assume-role-for-pod-identity", 200] },
|
|
95
|
-
() => AssumeRoleForPodIdentityRequest$,
|
|
96
|
-
() => AssumeRoleForPodIdentityResponse$,
|
|
133
|
+
export var AssumeRoleForPodIdentity$ = [9, n0, _ARFPI,
|
|
134
|
+
{ [_h]: ["POST", "/clusters/{clusterName}/assume-role-for-pod-identity", 200] }, () => AssumeRoleForPodIdentityRequest$, () => AssumeRoleForPodIdentityResponse$
|
|
97
135
|
];
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-eks-auth",
|
|
3
3
|
"description": "AWS SDK for JavaScript Eks Auth Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.958.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "concurrently 'yarn:build:types' 'yarn:build:es' && yarn build:cjs",
|
|
7
7
|
"build:cjs": "node ../../scripts/compilation/inline client-eks-auth",
|
|
@@ -22,7 +22,7 @@
|
|
|
22
22
|
"@aws-crypto/sha256-browser": "5.2.0",
|
|
23
23
|
"@aws-crypto/sha256-js": "5.2.0",
|
|
24
24
|
"@aws-sdk/core": "3.957.0",
|
|
25
|
-
"@aws-sdk/credential-provider-node": "3.
|
|
25
|
+
"@aws-sdk/credential-provider-node": "3.958.0",
|
|
26
26
|
"@aws-sdk/middleware-host-header": "3.957.0",
|
|
27
27
|
"@aws-sdk/middleware-logger": "3.957.0",
|
|
28
28
|
"@aws-sdk/middleware-recursion-detection": "3.957.0",
|