@aws-sdk/client-eks-auth 3.957.0 → 3.958.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -10,10 +10,8 @@ AWS SDK for JavaScript EKSAuth Client for Node.js, Browser and React Native.
10
10
  used by the EKS Pod Identity Agent.</p>
11
11
 
12
12
  ## Installing
13
-
14
13
  To install this package, simply type add or install @aws-sdk/client-eks-auth
15
14
  using your favorite package manager:
16
-
17
15
  - `npm install @aws-sdk/client-eks-auth`
18
16
  - `yarn add @aws-sdk/client-eks-auth`
19
17
  - `pnpm add @aws-sdk/client-eks-auth`
@@ -49,9 +47,7 @@ To send a request, you:
49
47
  // a client can be shared by different commands.
50
48
  const client = new EKSAuthClient({ region: "REGION" });
51
49
 
52
- const params = {
53
- /** input parameters */
54
- };
50
+ const params = { /** input parameters */ };
55
51
  const command = new AssumeRoleForPodIdentityCommand(params);
56
52
  ```
57
53
 
@@ -210,5 +206,4 @@ AssumeRoleForPodIdentity
210
206
  </summary>
211
207
 
212
208
  [Command API Reference](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/client/eks-auth/command/AssumeRoleForPodIdentityCommand/) / [Input](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-eks-auth/Interface/AssumeRoleForPodIdentityCommandInput/) / [Output](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-eks-auth/Interface/AssumeRoleForPodIdentityCommandOutput/)
213
-
214
209
  </details>
@@ -6,10 +6,9 @@ const util_middleware_1 = require("@smithy/util-middleware");
6
6
  const defaultEKSAuthHttpAuthSchemeParametersProvider = async (config, context, input) => {
7
7
  return {
8
8
  operation: (0, util_middleware_1.getSmithyContext)(context).operation,
9
- region: (await (0, util_middleware_1.normalizeProvider)(config.region)()) ||
10
- (() => {
11
- throw new Error("expected `region` to be configured for `aws.auth#sigv4`");
12
- })(),
9
+ region: await (0, util_middleware_1.normalizeProvider)(config.region)() || (() => {
10
+ throw new Error("expected `region` to be configured for `aws.auth#sigv4`");
11
+ })(),
13
12
  };
14
13
  };
15
14
  exports.defaultEKSAuthHttpAuthSchemeParametersProvider = defaultEKSAuthHttpAuthSchemeParametersProvider;
package/dist-cjs/index.js CHANGED
@@ -267,56 +267,94 @@ const _sm = "smithy.ts.sdk.synthetic.com.amazonaws.eksauth";
267
267
  const _t = "token";
268
268
  const n0 = "com.amazonaws.eksauth";
269
269
  var JwtToken = [0, n0, _JT, 8, 0];
270
- var AccessDeniedException$ = [-3, n0, _ADE, { [_e]: _c, [_hE]: 400 }, [_m], [0]];
270
+ var AccessDeniedException$ = [-3, n0, _ADE,
271
+ { [_e]: _c, [_hE]: 400 },
272
+ [_m],
273
+ [0]
274
+ ];
271
275
  schema.TypeRegistry.for(n0).registerError(AccessDeniedException$, AccessDeniedException);
272
- var AssumedRoleUser$ = [3, n0, _ARU, 0, [_a, _aRI], [0, 0]];
273
- var AssumeRoleForPodIdentityRequest$ = [
274
- 3,
275
- n0,
276
- _ARFPIR,
276
+ var AssumedRoleUser$ = [3, n0, _ARU,
277
+ 0,
278
+ [_a, _aRI],
279
+ [0, 0]
280
+ ];
281
+ var AssumeRoleForPodIdentityRequest$ = [3, n0, _ARFPIR,
277
282
  0,
278
283
  [_cN, _t],
279
- [
280
- [0, 1],
281
- [() => JwtToken, 0],
282
- ],
284
+ [[0, 1], [() => JwtToken, 0]]
283
285
  ];
284
- var AssumeRoleForPodIdentityResponse$ = [
285
- 3,
286
- n0,
287
- _ARFPIRs,
286
+ var AssumeRoleForPodIdentityResponse$ = [3, n0, _ARFPIRs,
288
287
  0,
289
288
  [_s, _au, _pIA, _aRU, _cr],
290
- [() => Subject$, 0, () => PodIdentityAssociation$, () => AssumedRoleUser$, [() => Credentials$, 0]],
289
+ [() => Subject$, 0, () => PodIdentityAssociation$, () => AssumedRoleUser$, [() => Credentials$, 0]]
290
+ ];
291
+ var Credentials$ = [3, n0, _C,
292
+ 8,
293
+ [_sT, _sAK, _aKI, _ex],
294
+ [0, 0, 0, 4]
295
+ ];
296
+ var ExpiredTokenException$ = [-3, n0, _ETE,
297
+ { [_e]: _c, [_hE]: 400 },
298
+ [_m],
299
+ [0]
291
300
  ];
292
- var Credentials$ = [3, n0, _C, 8, [_sT, _sAK, _aKI, _ex], [0, 0, 0, 4]];
293
- var ExpiredTokenException$ = [-3, n0, _ETE, { [_e]: _c, [_hE]: 400 }, [_m], [0]];
294
301
  schema.TypeRegistry.for(n0).registerError(ExpiredTokenException$, ExpiredTokenException);
295
- var InternalServerException$ = [-3, n0, _ISE, { [_e]: _se, [_hE]: 500 }, [_m], [0]];
302
+ var InternalServerException$ = [-3, n0, _ISE,
303
+ { [_e]: _se, [_hE]: 500 },
304
+ [_m],
305
+ [0]
306
+ ];
296
307
  schema.TypeRegistry.for(n0).registerError(InternalServerException$, InternalServerException);
297
- var InvalidParameterException$ = [-3, n0, _IPE, { [_e]: _c, [_hE]: 400 }, [_m], [0]];
308
+ var InvalidParameterException$ = [-3, n0, _IPE,
309
+ { [_e]: _c, [_hE]: 400 },
310
+ [_m],
311
+ [0]
312
+ ];
298
313
  schema.TypeRegistry.for(n0).registerError(InvalidParameterException$, InvalidParameterException);
299
- var InvalidRequestException$ = [-3, n0, _IRE, { [_e]: _c, [_hE]: 400 }, [_m], [0]];
314
+ var InvalidRequestException$ = [-3, n0, _IRE,
315
+ { [_e]: _c, [_hE]: 400 },
316
+ [_m],
317
+ [0]
318
+ ];
300
319
  schema.TypeRegistry.for(n0).registerError(InvalidRequestException$, InvalidRequestException);
301
- var InvalidTokenException$ = [-3, n0, _ITE, { [_e]: _c, [_hE]: 400 }, [_m], [0]];
320
+ var InvalidTokenException$ = [-3, n0, _ITE,
321
+ { [_e]: _c, [_hE]: 400 },
322
+ [_m],
323
+ [0]
324
+ ];
302
325
  schema.TypeRegistry.for(n0).registerError(InvalidTokenException$, InvalidTokenException);
303
- var PodIdentityAssociation$ = [3, n0, _PIA, 0, [_aA, _aI], [0, 0]];
304
- var ResourceNotFoundException$ = [-3, n0, _RNFE, { [_e]: _c, [_hE]: 404 }, [_m], [0]];
326
+ var PodIdentityAssociation$ = [3, n0, _PIA,
327
+ 0,
328
+ [_aA, _aI],
329
+ [0, 0]
330
+ ];
331
+ var ResourceNotFoundException$ = [-3, n0, _RNFE,
332
+ { [_e]: _c, [_hE]: 404 },
333
+ [_m],
334
+ [0]
335
+ ];
305
336
  schema.TypeRegistry.for(n0).registerError(ResourceNotFoundException$, ResourceNotFoundException);
306
- var ServiceUnavailableException$ = [-3, n0, _SUE, { [_e]: _se, [_hE]: 503 }, [_m], [0]];
337
+ var ServiceUnavailableException$ = [-3, n0, _SUE,
338
+ { [_e]: _se, [_hE]: 503 },
339
+ [_m],
340
+ [0]
341
+ ];
307
342
  schema.TypeRegistry.for(n0).registerError(ServiceUnavailableException$, ServiceUnavailableException);
308
- var Subject$ = [3, n0, _S, 0, [_n, _sA], [0, 0]];
309
- var ThrottlingException$ = [-3, n0, _TE, { [_e]: _c, [_hE]: 429 }, [_m], [0]];
343
+ var Subject$ = [3, n0, _S,
344
+ 0,
345
+ [_n, _sA],
346
+ [0, 0]
347
+ ];
348
+ var ThrottlingException$ = [-3, n0, _TE,
349
+ { [_e]: _c, [_hE]: 429 },
350
+ [_m],
351
+ [0]
352
+ ];
310
353
  schema.TypeRegistry.for(n0).registerError(ThrottlingException$, ThrottlingException);
311
354
  var EKSAuthServiceException$ = [-3, _sm, "EKSAuthServiceException", 0, [], []];
312
355
  schema.TypeRegistry.for(_sm).registerError(EKSAuthServiceException$, EKSAuthServiceException);
313
- var AssumeRoleForPodIdentity$ = [
314
- 9,
315
- n0,
316
- _ARFPI,
317
- { [_h]: ["POST", "/clusters/{clusterName}/assume-role-for-pod-identity", 200] },
318
- () => AssumeRoleForPodIdentityRequest$,
319
- () => AssumeRoleForPodIdentityResponse$,
356
+ var AssumeRoleForPodIdentity$ = [9, n0, _ARFPI,
357
+ { [_h]: ["POST", "/clusters/{clusterName}/assume-role-for-pod-identity", 200] }, () => AssumeRoleForPodIdentityRequest$, () => AssumeRoleForPodIdentityResponse$
320
358
  ];
321
359
 
322
360
  class AssumeRoleForPodIdentityCommand extends smithyClient.Command
@@ -24,8 +24,7 @@ const getRuntimeConfig = (config) => {
24
24
  defaultsMode,
25
25
  bodyLengthChecker: config?.bodyLengthChecker ?? util_body_length_browser_1.calculateBodyLength,
26
26
  credentialDefaultProvider: config?.credentialDefaultProvider ?? ((_) => () => Promise.reject(new Error("Credential is missing"))),
27
- defaultUserAgentProvider: config?.defaultUserAgentProvider ??
28
- (0, util_user_agent_browser_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
27
+ defaultUserAgentProvider: config?.defaultUserAgentProvider ?? (0, util_user_agent_browser_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
29
28
  maxAttempts: config?.maxAttempts ?? util_retry_1.DEFAULT_MAX_ATTEMPTS,
30
29
  region: config?.region ?? (0, invalid_dependency_1.invalidProvider)("Region is missing"),
31
30
  requestHandler: fetch_http_handler_1.FetchHttpHandler.create(config?.requestHandler ?? defaultConfigProvider),
@@ -34,11 +34,9 @@ const getRuntimeConfig = (config) => {
34
34
  authSchemePreference: config?.authSchemePreference ?? (0, node_config_provider_1.loadConfig)(core_1.NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, loaderConfig),
35
35
  bodyLengthChecker: config?.bodyLengthChecker ?? util_body_length_node_1.calculateBodyLength,
36
36
  credentialDefaultProvider: config?.credentialDefaultProvider ?? credential_provider_node_1.defaultProvider,
37
- defaultUserAgentProvider: config?.defaultUserAgentProvider ??
38
- (0, util_user_agent_node_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
37
+ defaultUserAgentProvider: config?.defaultUserAgentProvider ?? (0, util_user_agent_node_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
39
38
  maxAttempts: config?.maxAttempts ?? (0, node_config_provider_1.loadConfig)(middleware_retry_1.NODE_MAX_ATTEMPT_CONFIG_OPTIONS, config),
40
- region: config?.region ??
41
- (0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_REGION_CONFIG_OPTIONS, { ...config_resolver_1.NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
39
+ region: config?.region ?? (0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_REGION_CONFIG_OPTIONS, { ...config_resolver_1.NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
42
40
  requestHandler: node_http_handler_1.NodeHttpHandler.create(config?.requestHandler ?? defaultConfigProvider),
43
41
  retryMode: config?.retryMode ??
44
42
  (0, node_config_provider_1.loadConfig)({
@@ -3,10 +3,9 @@ import { getSmithyContext, normalizeProvider } from "@smithy/util-middleware";
3
3
  export const defaultEKSAuthHttpAuthSchemeParametersProvider = async (config, context, input) => {
4
4
  return {
5
5
  operation: getSmithyContext(context).operation,
6
- region: (await normalizeProvider(config.region)()) ||
7
- (() => {
8
- throw new Error("expected `region` to be configured for `aws.auth#sigv4`");
9
- })(),
6
+ region: await normalizeProvider(config.region)() || (() => {
7
+ throw new Error("expected `region` to be configured for `aws.auth#sigv4`");
8
+ })(),
10
9
  };
11
10
  };
12
11
  function createAwsAuthSigv4HttpAuthOption(authParameters) {
@@ -20,8 +20,7 @@ export const getRuntimeConfig = (config) => {
20
20
  defaultsMode,
21
21
  bodyLengthChecker: config?.bodyLengthChecker ?? calculateBodyLength,
22
22
  credentialDefaultProvider: config?.credentialDefaultProvider ?? ((_) => () => Promise.reject(new Error("Credential is missing"))),
23
- defaultUserAgentProvider: config?.defaultUserAgentProvider ??
24
- createDefaultUserAgentProvider({ serviceId: clientSharedValues.serviceId, clientVersion: packageInfo.version }),
23
+ defaultUserAgentProvider: config?.defaultUserAgentProvider ?? createDefaultUserAgentProvider({ serviceId: clientSharedValues.serviceId, clientVersion: packageInfo.version }),
25
24
  maxAttempts: config?.maxAttempts ?? DEFAULT_MAX_ATTEMPTS,
26
25
  region: config?.region ?? invalidProvider("Region is missing"),
27
26
  requestHandler: RequestHandler.create(config?.requestHandler ?? defaultConfigProvider),
@@ -1,7 +1,7 @@
1
1
  import packageInfo from "../package.json";
2
- import { NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, emitWarningIfUnsupportedVersion as awsCheckVersion } from "@aws-sdk/core";
2
+ import { emitWarningIfUnsupportedVersion as awsCheckVersion, NODE_AUTH_SCHEME_PREFERENCE_OPTIONS } from "@aws-sdk/core";
3
3
  import { defaultProvider as credentialDefaultProvider } from "@aws-sdk/credential-provider-node";
4
- import { NODE_APP_ID_CONFIG_OPTIONS, createDefaultUserAgentProvider } from "@aws-sdk/util-user-agent-node";
4
+ import { createDefaultUserAgentProvider, NODE_APP_ID_CONFIG_OPTIONS } from "@aws-sdk/util-user-agent-node";
5
5
  import { NODE_REGION_CONFIG_FILE_OPTIONS, NODE_REGION_CONFIG_OPTIONS, NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS, NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS, } from "@smithy/config-resolver";
6
6
  import { Hash } from "@smithy/hash-node";
7
7
  import { NODE_MAX_ATTEMPT_CONFIG_OPTIONS, NODE_RETRY_MODE_CONFIG_OPTIONS } from "@smithy/middleware-retry";
@@ -30,11 +30,9 @@ export const getRuntimeConfig = (config) => {
30
30
  authSchemePreference: config?.authSchemePreference ?? loadNodeConfig(NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, loaderConfig),
31
31
  bodyLengthChecker: config?.bodyLengthChecker ?? calculateBodyLength,
32
32
  credentialDefaultProvider: config?.credentialDefaultProvider ?? credentialDefaultProvider,
33
- defaultUserAgentProvider: config?.defaultUserAgentProvider ??
34
- createDefaultUserAgentProvider({ serviceId: clientSharedValues.serviceId, clientVersion: packageInfo.version }),
33
+ defaultUserAgentProvider: config?.defaultUserAgentProvider ?? createDefaultUserAgentProvider({ serviceId: clientSharedValues.serviceId, clientVersion: packageInfo.version }),
35
34
  maxAttempts: config?.maxAttempts ?? loadNodeConfig(NODE_MAX_ATTEMPT_CONFIG_OPTIONS, config),
36
- region: config?.region ??
37
- loadNodeConfig(NODE_REGION_CONFIG_OPTIONS, { ...NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
35
+ region: config?.region ?? loadNodeConfig(NODE_REGION_CONFIG_OPTIONS, { ...NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
38
36
  requestHandler: RequestHandler.create(config?.requestHandler ?? defaultConfigProvider),
39
37
  retryMode: config?.retryMode ??
40
38
  loadNodeConfig({
@@ -44,54 +44,92 @@ import { TypeRegistry } from "@smithy/core/schema";
44
44
  import { EKSAuthServiceException } from "../models/EKSAuthServiceException";
45
45
  import { AccessDeniedException, ExpiredTokenException, InternalServerException, InvalidParameterException, InvalidRequestException, InvalidTokenException, ResourceNotFoundException, ServiceUnavailableException, ThrottlingException, } from "../models/errors";
46
46
  var JwtToken = [0, n0, _JT, 8, 0];
47
- export var AccessDeniedException$ = [-3, n0, _ADE, { [_e]: _c, [_hE]: 400 }, [_m], [0]];
47
+ export var AccessDeniedException$ = [-3, n0, _ADE,
48
+ { [_e]: _c, [_hE]: 400 },
49
+ [_m],
50
+ [0]
51
+ ];
48
52
  TypeRegistry.for(n0).registerError(AccessDeniedException$, AccessDeniedException);
49
- export var AssumedRoleUser$ = [3, n0, _ARU, 0, [_a, _aRI], [0, 0]];
50
- export var AssumeRoleForPodIdentityRequest$ = [
51
- 3,
52
- n0,
53
- _ARFPIR,
53
+ export var AssumedRoleUser$ = [3, n0, _ARU,
54
+ 0,
55
+ [_a, _aRI],
56
+ [0, 0]
57
+ ];
58
+ export var AssumeRoleForPodIdentityRequest$ = [3, n0, _ARFPIR,
54
59
  0,
55
60
  [_cN, _t],
56
- [
57
- [0, 1],
58
- [() => JwtToken, 0],
59
- ],
60
- ];
61
- export var AssumeRoleForPodIdentityResponse$ = [
62
- 3,
63
- n0,
64
- _ARFPIRs,
61
+ [[0, 1], [() => JwtToken, 0]]
62
+ ];
63
+ export var AssumeRoleForPodIdentityResponse$ = [3, n0, _ARFPIRs,
65
64
  0,
66
65
  [_s, _au, _pIA, _aRU, _cr],
67
- [() => Subject$, 0, () => PodIdentityAssociation$, () => AssumedRoleUser$, [() => Credentials$, 0]],
66
+ [() => Subject$, 0, () => PodIdentityAssociation$, () => AssumedRoleUser$, [() => Credentials$, 0]]
67
+ ];
68
+ export var Credentials$ = [3, n0, _C,
69
+ 8,
70
+ [_sT, _sAK, _aKI, _ex],
71
+ [0, 0, 0, 4]
72
+ ];
73
+ export var ExpiredTokenException$ = [-3, n0, _ETE,
74
+ { [_e]: _c, [_hE]: 400 },
75
+ [_m],
76
+ [0]
68
77
  ];
69
- export var Credentials$ = [3, n0, _C, 8, [_sT, _sAK, _aKI, _ex], [0, 0, 0, 4]];
70
- export var ExpiredTokenException$ = [-3, n0, _ETE, { [_e]: _c, [_hE]: 400 }, [_m], [0]];
71
78
  TypeRegistry.for(n0).registerError(ExpiredTokenException$, ExpiredTokenException);
72
- export var InternalServerException$ = [-3, n0, _ISE, { [_e]: _se, [_hE]: 500 }, [_m], [0]];
79
+ export var InternalServerException$ = [-3, n0, _ISE,
80
+ { [_e]: _se, [_hE]: 500 },
81
+ [_m],
82
+ [0]
83
+ ];
73
84
  TypeRegistry.for(n0).registerError(InternalServerException$, InternalServerException);
74
- export var InvalidParameterException$ = [-3, n0, _IPE, { [_e]: _c, [_hE]: 400 }, [_m], [0]];
85
+ export var InvalidParameterException$ = [-3, n0, _IPE,
86
+ { [_e]: _c, [_hE]: 400 },
87
+ [_m],
88
+ [0]
89
+ ];
75
90
  TypeRegistry.for(n0).registerError(InvalidParameterException$, InvalidParameterException);
76
- export var InvalidRequestException$ = [-3, n0, _IRE, { [_e]: _c, [_hE]: 400 }, [_m], [0]];
91
+ export var InvalidRequestException$ = [-3, n0, _IRE,
92
+ { [_e]: _c, [_hE]: 400 },
93
+ [_m],
94
+ [0]
95
+ ];
77
96
  TypeRegistry.for(n0).registerError(InvalidRequestException$, InvalidRequestException);
78
- export var InvalidTokenException$ = [-3, n0, _ITE, { [_e]: _c, [_hE]: 400 }, [_m], [0]];
97
+ export var InvalidTokenException$ = [-3, n0, _ITE,
98
+ { [_e]: _c, [_hE]: 400 },
99
+ [_m],
100
+ [0]
101
+ ];
79
102
  TypeRegistry.for(n0).registerError(InvalidTokenException$, InvalidTokenException);
80
- export var PodIdentityAssociation$ = [3, n0, _PIA, 0, [_aA, _aI], [0, 0]];
81
- export var ResourceNotFoundException$ = [-3, n0, _RNFE, { [_e]: _c, [_hE]: 404 }, [_m], [0]];
103
+ export var PodIdentityAssociation$ = [3, n0, _PIA,
104
+ 0,
105
+ [_aA, _aI],
106
+ [0, 0]
107
+ ];
108
+ export var ResourceNotFoundException$ = [-3, n0, _RNFE,
109
+ { [_e]: _c, [_hE]: 404 },
110
+ [_m],
111
+ [0]
112
+ ];
82
113
  TypeRegistry.for(n0).registerError(ResourceNotFoundException$, ResourceNotFoundException);
83
- export var ServiceUnavailableException$ = [-3, n0, _SUE, { [_e]: _se, [_hE]: 503 }, [_m], [0]];
114
+ export var ServiceUnavailableException$ = [-3, n0, _SUE,
115
+ { [_e]: _se, [_hE]: 503 },
116
+ [_m],
117
+ [0]
118
+ ];
84
119
  TypeRegistry.for(n0).registerError(ServiceUnavailableException$, ServiceUnavailableException);
85
- export var Subject$ = [3, n0, _S, 0, [_n, _sA], [0, 0]];
86
- export var ThrottlingException$ = [-3, n0, _TE, { [_e]: _c, [_hE]: 429 }, [_m], [0]];
120
+ export var Subject$ = [3, n0, _S,
121
+ 0,
122
+ [_n, _sA],
123
+ [0, 0]
124
+ ];
125
+ export var ThrottlingException$ = [-3, n0, _TE,
126
+ { [_e]: _c, [_hE]: 429 },
127
+ [_m],
128
+ [0]
129
+ ];
87
130
  TypeRegistry.for(n0).registerError(ThrottlingException$, ThrottlingException);
88
131
  export var EKSAuthServiceException$ = [-3, _sm, "EKSAuthServiceException", 0, [], []];
89
132
  TypeRegistry.for(_sm).registerError(EKSAuthServiceException$, EKSAuthServiceException);
90
- export var AssumeRoleForPodIdentity$ = [
91
- 9,
92
- n0,
93
- _ARFPI,
94
- { [_h]: ["POST", "/clusters/{clusterName}/assume-role-for-pod-identity", 200] },
95
- () => AssumeRoleForPodIdentityRequest$,
96
- () => AssumeRoleForPodIdentityResponse$,
133
+ export var AssumeRoleForPodIdentity$ = [9, n0, _ARFPI,
134
+ { [_h]: ["POST", "/clusters/{clusterName}/assume-role-for-pod-identity", 200] }, () => AssumeRoleForPodIdentityRequest$, () => AssumeRoleForPodIdentityResponse$
97
135
  ];
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-eks-auth",
3
3
  "description": "AWS SDK for JavaScript Eks Auth Client for Node.js, Browser and React Native",
4
- "version": "3.957.0",
4
+ "version": "3.958.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:types' 'yarn:build:es' && yarn build:cjs",
7
7
  "build:cjs": "node ../../scripts/compilation/inline client-eks-auth",
@@ -22,7 +22,7 @@
22
22
  "@aws-crypto/sha256-browser": "5.2.0",
23
23
  "@aws-crypto/sha256-js": "5.2.0",
24
24
  "@aws-sdk/core": "3.957.0",
25
- "@aws-sdk/credential-provider-node": "3.957.0",
25
+ "@aws-sdk/credential-provider-node": "3.958.0",
26
26
  "@aws-sdk/middleware-host-header": "3.957.0",
27
27
  "@aws-sdk/middleware-logger": "3.957.0",
28
28
  "@aws-sdk/middleware-recursion-detection": "3.957.0",