@aws-sdk/client-inspector-scan 3.774.0 → 3.777.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -40,8 +40,6 @@ const defaultInspectorScanHttpAuthSchemeProvider = (authParameters) => {
40
40
  exports.defaultInspectorScanHttpAuthSchemeProvider = defaultInspectorScanHttpAuthSchemeProvider;
41
41
  const resolveHttpAuthSchemeConfig = (config) => {
42
42
  const config_0 = (0, core_1.resolveAwsSdkSigV4Config)(config);
43
- return {
44
- ...config_0,
45
- };
43
+ return Object.assign(config_0, {});
46
44
  };
47
45
  exports.resolveHttpAuthSchemeConfig = resolveHttpAuthSchemeConfig;
package/dist-cjs/index.js CHANGED
@@ -52,12 +52,11 @@ var import_httpAuthSchemeProvider = require("./auth/httpAuthSchemeProvider");
52
52
 
53
53
  // src/endpoint/EndpointParameters.ts
54
54
  var resolveClientEndpointParameters = /* @__PURE__ */ __name((options) => {
55
- return {
56
- ...options,
55
+ return Object.assign(options, {
57
56
  useDualstackEndpoint: options.useDualstackEndpoint ?? false,
58
57
  useFipsEndpoint: options.useFipsEndpoint ?? false,
59
58
  defaultSigningName: "inspector-scan"
60
- };
59
+ });
61
60
  }, "resolveClientEndpointParameters");
62
61
  var commonParams = {
63
62
  UseFIPS: { type: "builtInParams", name: "useFipsEndpoint" },
@@ -114,22 +113,21 @@ var resolveHttpAuthRuntimeConfig = /* @__PURE__ */ __name((config) => {
114
113
  }, "resolveHttpAuthRuntimeConfig");
115
114
 
116
115
  // src/runtimeExtensions.ts
117
- var asPartial = /* @__PURE__ */ __name((t) => t, "asPartial");
118
116
  var resolveRuntimeExtensions = /* @__PURE__ */ __name((runtimeConfig, extensions) => {
119
- const extensionConfiguration = {
120
- ...asPartial((0, import_region_config_resolver.getAwsRegionExtensionConfiguration)(runtimeConfig)),
121
- ...asPartial((0, import_smithy_client.getDefaultExtensionConfiguration)(runtimeConfig)),
122
- ...asPartial((0, import_protocol_http.getHttpHandlerExtensionConfiguration)(runtimeConfig)),
123
- ...asPartial(getHttpAuthExtensionConfiguration(runtimeConfig))
124
- };
117
+ const extensionConfiguration = Object.assign(
118
+ (0, import_region_config_resolver.getAwsRegionExtensionConfiguration)(runtimeConfig),
119
+ (0, import_smithy_client.getDefaultExtensionConfiguration)(runtimeConfig),
120
+ (0, import_protocol_http.getHttpHandlerExtensionConfiguration)(runtimeConfig),
121
+ getHttpAuthExtensionConfiguration(runtimeConfig)
122
+ );
125
123
  extensions.forEach((extension) => extension.configure(extensionConfiguration));
126
- return {
127
- ...runtimeConfig,
128
- ...(0, import_region_config_resolver.resolveAwsRegionExtensionConfiguration)(extensionConfiguration),
129
- ...(0, import_smithy_client.resolveDefaultRuntimeConfig)(extensionConfiguration),
130
- ...(0, import_protocol_http.resolveHttpHandlerRuntimeConfig)(extensionConfiguration),
131
- ...resolveHttpAuthRuntimeConfig(extensionConfiguration)
132
- };
124
+ return Object.assign(
125
+ runtimeConfig,
126
+ (0, import_region_config_resolver.resolveAwsRegionExtensionConfiguration)(extensionConfiguration),
127
+ (0, import_smithy_client.resolveDefaultRuntimeConfig)(extensionConfiguration),
128
+ (0, import_protocol_http.resolveHttpHandlerRuntimeConfig)(extensionConfiguration),
129
+ resolveHttpAuthRuntimeConfig(extensionConfiguration)
130
+ );
133
131
  }, "resolveRuntimeExtensions");
134
132
 
135
133
  // src/InspectorScanClient.ts
@@ -143,6 +141,8 @@ var InspectorScanClient = class extends import_smithy_client.Client {
143
141
  config;
144
142
  constructor(...[configuration]) {
145
143
  const _config_0 = (0, import_runtimeConfig.getRuntimeConfig)(configuration || {});
144
+ super(_config_0);
145
+ this.initConfig = _config_0;
146
146
  const _config_1 = resolveClientEndpointParameters(_config_0);
147
147
  const _config_2 = (0, import_middleware_user_agent.resolveUserAgentConfig)(_config_1);
148
148
  const _config_3 = (0, import_middleware_retry.resolveRetryConfig)(_config_2);
@@ -151,7 +151,6 @@ var InspectorScanClient = class extends import_smithy_client.Client {
151
151
  const _config_6 = (0, import_middleware_endpoint.resolveEndpointConfig)(_config_5);
152
152
  const _config_7 = (0, import_httpAuthSchemeProvider.resolveHttpAuthSchemeConfig)(_config_6);
153
153
  const _config_8 = resolveRuntimeExtensions(_config_7, configuration?.extensions || []);
154
- super(_config_8);
155
154
  this.config = _config_8;
156
155
  this.middlewareStack.use((0, import_middleware_user_agent.getUserAgentPlugin)(this.config));
157
156
  this.middlewareStack.use((0, import_middleware_retry.getRetryPlugin)(this.config));
@@ -17,6 +17,8 @@ export class InspectorScanClient extends __Client {
17
17
  config;
18
18
  constructor(...[configuration]) {
19
19
  const _config_0 = __getRuntimeConfig(configuration || {});
20
+ super(_config_0);
21
+ this.initConfig = _config_0;
20
22
  const _config_1 = resolveClientEndpointParameters(_config_0);
21
23
  const _config_2 = resolveUserAgentConfig(_config_1);
22
24
  const _config_3 = resolveRetryConfig(_config_2);
@@ -25,7 +27,6 @@ export class InspectorScanClient extends __Client {
25
27
  const _config_6 = resolveEndpointConfig(_config_5);
26
28
  const _config_7 = resolveHttpAuthSchemeConfig(_config_6);
27
29
  const _config_8 = resolveRuntimeExtensions(_config_7, configuration?.extensions || []);
28
- super(_config_8);
29
30
  this.config = _config_8;
30
31
  this.middlewareStack.use(getUserAgentPlugin(this.config));
31
32
  this.middlewareStack.use(getRetryPlugin(this.config));
@@ -35,7 +35,5 @@ export const defaultInspectorScanHttpAuthSchemeProvider = (authParameters) => {
35
35
  };
36
36
  export const resolveHttpAuthSchemeConfig = (config) => {
37
37
  const config_0 = resolveAwsSdkSigV4Config(config);
38
- return {
39
- ...config_0,
40
- };
38
+ return Object.assign(config_0, {});
41
39
  };
@@ -1,10 +1,9 @@
1
1
  export const resolveClientEndpointParameters = (options) => {
2
- return {
3
- ...options,
2
+ return Object.assign(options, {
4
3
  useDualstackEndpoint: options.useDualstackEndpoint ?? false,
5
4
  useFipsEndpoint: options.useFipsEndpoint ?? false,
6
5
  defaultSigningName: "inspector-scan",
7
- };
6
+ });
8
7
  };
9
8
  export const commonParams = {
10
9
  UseFIPS: { type: "builtInParams", name: "useFipsEndpoint" },
@@ -2,20 +2,8 @@ import { getAwsRegionExtensionConfiguration, resolveAwsRegionExtensionConfigurat
2
2
  import { getHttpHandlerExtensionConfiguration, resolveHttpHandlerRuntimeConfig } from "@smithy/protocol-http";
3
3
  import { getDefaultExtensionConfiguration, resolveDefaultRuntimeConfig } from "@smithy/smithy-client";
4
4
  import { getHttpAuthExtensionConfiguration, resolveHttpAuthRuntimeConfig } from "./auth/httpAuthExtensionConfiguration";
5
- const asPartial = (t) => t;
6
5
  export const resolveRuntimeExtensions = (runtimeConfig, extensions) => {
7
- const extensionConfiguration = {
8
- ...asPartial(getAwsRegionExtensionConfiguration(runtimeConfig)),
9
- ...asPartial(getDefaultExtensionConfiguration(runtimeConfig)),
10
- ...asPartial(getHttpHandlerExtensionConfiguration(runtimeConfig)),
11
- ...asPartial(getHttpAuthExtensionConfiguration(runtimeConfig)),
12
- };
6
+ const extensionConfiguration = Object.assign(getAwsRegionExtensionConfiguration(runtimeConfig), getDefaultExtensionConfiguration(runtimeConfig), getHttpHandlerExtensionConfiguration(runtimeConfig), getHttpAuthExtensionConfiguration(runtimeConfig));
13
7
  extensions.forEach((extension) => extension.configure(extensionConfiguration));
14
- return {
15
- ...runtimeConfig,
16
- ...resolveAwsRegionExtensionConfiguration(extensionConfiguration),
17
- ...resolveDefaultRuntimeConfig(extensionConfiguration),
18
- ...resolveHttpHandlerRuntimeConfig(extensionConfiguration),
19
- ...resolveHttpAuthRuntimeConfig(extensionConfiguration),
20
- };
8
+ return Object.assign(runtimeConfig, resolveAwsRegionExtensionConfiguration(extensionConfiguration), resolveDefaultRuntimeConfig(extensionConfiguration), resolveHttpHandlerRuntimeConfig(extensionConfiguration), resolveHttpAuthRuntimeConfig(extensionConfiguration));
21
9
  };
@@ -72,180 +72,180 @@ declare const ScanSbomCommand_base: {
72
72
  * @throws {@link InspectorScanServiceException}
73
73
  * <p>Base exception class for all service exceptions from InspectorScan service.</p>
74
74
  *
75
- * @public
75
+ *
76
76
  * @example Sample ScanSbom Call
77
77
  * ```javascript
78
78
  * //
79
79
  * const input = {
80
- * "outputFormat": "CYCLONE_DX_1_5",
81
- * "sbom": {
82
- * "bomFormat": "CycloneDX",
83
- * "components": [
80
+ * outputFormat: "CYCLONE_DX_1_5",
81
+ * sbom: {
82
+ * bomFormat: "CycloneDX",
83
+ * components: [
84
84
  * {
85
- * "name": "log4j-core",
86
- * "type": "library",
87
- * "purl": "pkg:maven/org.apache.logging.log4j/log4j-core@2.17.0"
85
+ * name: "log4j-core",
86
+ * purl: "pkg:maven/org.apache.logging.log4j/log4j-core@2.17.0",
87
+ * type: "library"
88
88
  * }
89
89
  * ],
90
- * "specVersion": "1.5"
90
+ * specVersion: "1.5"
91
91
  * }
92
92
  * };
93
93
  * const command = new ScanSbomCommand(input);
94
94
  * const response = await client.send(command);
95
- * /* response ==
95
+ * /* response is
96
96
  * {
97
- * "sbom": {
98
- * "metadata": {
99
- * "properties": [
97
+ * sbom: {
98
+ * bomFormat: "CycloneDX",
99
+ * components: [
100
+ * {
101
+ * bom-ref: "comp-1",
102
+ * name: "log4j-core",
103
+ * purl: "pkg:maven/org.apache.logging.log4j/log4j-core@2.17.0",
104
+ * type: "library"
105
+ * }
106
+ * ],
107
+ * metadata: {
108
+ * properties: [
100
109
  * {
101
- * "name": "amazon:inspector:sbom_scanner:critical_vulnerabilities",
102
- * "value": "0"
110
+ * name: "amazon:inspector:sbom_scanner:critical_vulnerabilities",
111
+ * value: "0"
103
112
  * },
104
113
  * {
105
- * "name": "amazon:inspector:sbom_scanner:high_vulnerabilities",
106
- * "value": "0"
114
+ * name: "amazon:inspector:sbom_scanner:high_vulnerabilities",
115
+ * value: "0"
107
116
  * },
108
117
  * {
109
- * "name": "amazon:inspector:sbom_scanner:medium_vulnerabilities",
110
- * "value": "1"
118
+ * name: "amazon:inspector:sbom_scanner:medium_vulnerabilities",
119
+ * value: "1"
111
120
  * },
112
121
  * {
113
- * "name": "amazon:inspector:sbom_scanner:low_vulnerabilities",
114
- * "value": "0"
122
+ * name: "amazon:inspector:sbom_scanner:low_vulnerabilities",
123
+ * value: "0"
115
124
  * }
116
125
  * ],
117
- * "timestamp": "2023-11-16T02:55:34.355Z",
118
- * "tools": [
126
+ * timestamp: "2023-11-16T02:55:34.355Z",
127
+ * tools: [
119
128
  * {
120
- * "version": "9f8c30ff+20b2305b",
121
- * "name": "CycloneDX SBOM API",
122
- * "vendor": "Amazon Inspector"
129
+ * name: "CycloneDX SBOM API",
130
+ * vendor: "Amazon Inspector",
131
+ * version: "9f8c30ff+20b2305b"
123
132
  * }
124
133
  * ]
125
134
  * },
126
- * "bomFormat": "CycloneDX",
127
- * "components": [
135
+ * serialNumber: "urn:uuid:26de5e0a-deb4-4b38-a208-7d19c1832e8c",
136
+ * specVersion: "1.5",
137
+ * vulnerabilities: [
128
138
  * {
129
- * "name": "log4j-core",
130
- * "type": "library",
131
- * "bom-ref": "comp-1",
132
- * "purl": "pkg:maven/org.apache.logging.log4j/log4j-core@2.17.0"
133
- * }
134
- * ],
135
- * "serialNumber": "urn:uuid:26de5e0a-deb4-4b38-a208-7d19c1832e8c",
136
- * "specVersion": "1.5",
137
- * "vulnerabilities": [
138
- * {
139
- * "advisories": [
139
+ * advisories: [
140
140
  * {
141
- * "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
141
+ * url: "https://www.oracle.com/security-alerts/cpujan2022.html"
142
142
  * },
143
143
  * {
144
- * "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00036.html"
144
+ * url: "https://lists.debian.org/debian-lts-announce/2021/12/msg00036.html"
145
145
  * },
146
146
  * {
147
- * "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-784507.pdf"
147
+ * url: "https://cert-portal.siemens.com/productcert/pdf/ssa-784507.pdf"
148
148
  * },
149
149
  * {
150
- * "url": "https://lists.apache.org/thread/s1o5vlo78ypqxnzn6p8zf6t9shtq5143"
150
+ * url: "https://lists.apache.org/thread/s1o5vlo78ypqxnzn6p8zf6t9shtq5143"
151
151
  * },
152
152
  * {
153
- * "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVV25FXL4FU5X6X5BSL7RLQ7T6F65MRA/"
153
+ * url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVV25FXL4FU5X6X5BSL7RLQ7T6F65MRA/"
154
154
  * },
155
155
  * {
156
- * "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
156
+ * url: "https://www.oracle.com/security-alerts/cpuapr2022.html"
157
157
  * },
158
158
  * {
159
- * "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
159
+ * url: "https://www.oracle.com/security-alerts/cpujul2022.html"
160
160
  * },
161
161
  * {
162
- * "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
162
+ * url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
163
163
  * },
164
164
  * {
165
- * "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T57MPJUW3MA6QGWZRTMCHHMMPQNVKGFC/"
165
+ * url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T57MPJUW3MA6QGWZRTMCHHMMPQNVKGFC/"
166
166
  * },
167
167
  * {
168
- * "url": "https://issues.apache.org/jira/browse/LOG4J2-3293"
168
+ * url: "https://issues.apache.org/jira/browse/LOG4J2-3293"
169
169
  * }
170
170
  * ],
171
- * "affects": [
171
+ * affects: [
172
172
  * {
173
- * "ref": "comp-1"
173
+ * ref: "comp-1"
174
174
  * }
175
175
  * ],
176
- * "bom-ref": "vuln-1",
177
- * "created": "2021-12-28T20:15:08Z",
178
- * "cwes": [
176
+ * bom-ref: "vuln-1",
177
+ * created: "2021-12-28T20:15:08Z",
178
+ * cwes: [
179
179
  * 20,
180
180
  * 74
181
181
  * ],
182
- * "description": "Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.",
183
- * "id": "CVE-2021-44832",
184
- * "properties": [
182
+ * description: "Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.",
183
+ * id: "CVE-2021-44832",
184
+ * properties: [
185
185
  * {
186
- * "name": "amazon:inspector:sbom_scanner:exploit_available",
187
- * "value": "true"
186
+ * name: "amazon:inspector:sbom_scanner:exploit_available",
187
+ * value: "true"
188
188
  * },
189
189
  * {
190
- * "name": "amazon:inspector:sbom_scanner:exploit_last_seen_in_public",
191
- * "value": "2023-01-02T00:00:00Z"
190
+ * name: "amazon:inspector:sbom_scanner:exploit_last_seen_in_public",
191
+ * value: "2023-01-02T00:00:00Z"
192
192
  * },
193
193
  * {
194
- * "name": "amazon:inspector:sbom_scanner:fixed_version:comp-1",
195
- * "value": "2.17.1"
194
+ * name: "amazon:inspector:sbom_scanner:fixed_version:comp-1",
195
+ * value: "2.17.1"
196
196
  * }
197
197
  * ],
198
- * "ratings": [
198
+ * ratings: [
199
199
  * {
200
- * "method": "CVSSv31",
201
- * "score": 6.5,
202
- * "severity": "medium",
203
- * "source": {
204
- * "name": "NVD",
205
- * "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44832"
200
+ * method: "CVSSv31",
201
+ * score: 6.5,
202
+ * severity: "medium",
203
+ * source: {
204
+ * name: "NVD",
205
+ * url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44832"
206
206
  * },
207
- * "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
207
+ * vector: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
208
208
  * },
209
209
  * {
210
- * "method": "other",
211
- * "score": 0.02686,
212
- * "severity": "none",
213
- * "source": {
214
- * "name": "EPSS",
215
- * "url": "https://www.first.org/epss/"
210
+ * method: "other",
211
+ * score: 0.02686,
212
+ * severity: "none",
213
+ * source: {
214
+ * name: "EPSS",
215
+ * url: "https://www.first.org/epss/"
216
216
  * },
217
- * "vector": "model:v2023.03.01,date:2023-11-15T00:00:00+0000"
217
+ * vector: "model:v2023.03.01,date:2023-11-15T00:00:00+0000"
218
218
  * }
219
219
  * ],
220
- * "references": [
220
+ * references: [
221
221
  * {
222
- * "id": "GHSA-8489-44mv-ggj8",
223
- * "source": {
224
- * "name": "GITHUB_SEC",
225
- * "url": "https://github.com/advisories"
222
+ * id: "GHSA-8489-44mv-ggj8",
223
+ * source: {
224
+ * name: "GITHUB_SEC",
225
+ * url: "https://github.com/advisories"
226
226
  * }
227
227
  * },
228
228
  * {
229
- * "id": "SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2327339",
230
- * "source": {
231
- * "name": "SNYK",
232
- * "url": "https://security.snyk.io/vuln"
229
+ * id: "SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2327339",
230
+ * source: {
231
+ * name: "SNYK",
232
+ * url: "https://security.snyk.io/vuln"
233
233
  * }
234
234
  * }
235
235
  * ],
236
- * "source": {
237
- * "name": "NVD",
238
- * "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44832"
236
+ * source: {
237
+ * name: "NVD",
238
+ * url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44832"
239
239
  * },
240
- * "updated": "2023-11-07T03:39:43Z"
240
+ * updated: "2023-11-07T03:39:43Z"
241
241
  * }
242
242
  * ]
243
243
  * }
244
244
  * }
245
245
  * *\/
246
- * // example id: example-1
247
246
  * ```
248
247
  *
248
+ * @public
249
249
  */
250
250
  export declare class ScanSbomCommand extends ScanSbomCommand_base {
251
251
  /** @internal type navigation helper, not in runtime. */
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-inspector-scan",
3
3
  "description": "AWS SDK for JavaScript Inspector Scan Client for Node.js, Browser and React Native",
4
- "version": "3.774.0",
4
+ "version": "3.777.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "node ../../scripts/compilation/inline client-inspector-scan",
@@ -20,41 +20,41 @@
20
20
  "dependencies": {
21
21
  "@aws-crypto/sha256-browser": "5.2.0",
22
22
  "@aws-crypto/sha256-js": "5.2.0",
23
- "@aws-sdk/core": "3.774.0",
24
- "@aws-sdk/credential-provider-node": "3.774.0",
25
- "@aws-sdk/middleware-host-header": "3.774.0",
26
- "@aws-sdk/middleware-logger": "3.734.0",
27
- "@aws-sdk/middleware-recursion-detection": "3.772.0",
28
- "@aws-sdk/middleware-user-agent": "3.774.0",
29
- "@aws-sdk/region-config-resolver": "3.734.0",
30
- "@aws-sdk/types": "3.734.0",
31
- "@aws-sdk/util-endpoints": "3.743.0",
32
- "@aws-sdk/util-user-agent-browser": "3.734.0",
33
- "@aws-sdk/util-user-agent-node": "3.774.0",
34
- "@smithy/config-resolver": "^4.0.1",
35
- "@smithy/core": "^3.1.5",
36
- "@smithy/fetch-http-handler": "^5.0.1",
37
- "@smithy/hash-node": "^4.0.1",
38
- "@smithy/invalid-dependency": "^4.0.1",
39
- "@smithy/middleware-content-length": "^4.0.1",
40
- "@smithy/middleware-endpoint": "^4.0.6",
41
- "@smithy/middleware-retry": "^4.0.7",
42
- "@smithy/middleware-serde": "^4.0.2",
43
- "@smithy/middleware-stack": "^4.0.1",
44
- "@smithy/node-config-provider": "^4.0.1",
45
- "@smithy/node-http-handler": "^4.0.3",
46
- "@smithy/protocol-http": "^5.0.1",
47
- "@smithy/smithy-client": "^4.1.6",
48
- "@smithy/types": "^4.1.0",
49
- "@smithy/url-parser": "^4.0.1",
23
+ "@aws-sdk/core": "3.775.0",
24
+ "@aws-sdk/credential-provider-node": "3.777.0",
25
+ "@aws-sdk/middleware-host-header": "3.775.0",
26
+ "@aws-sdk/middleware-logger": "3.775.0",
27
+ "@aws-sdk/middleware-recursion-detection": "3.775.0",
28
+ "@aws-sdk/middleware-user-agent": "3.775.0",
29
+ "@aws-sdk/region-config-resolver": "3.775.0",
30
+ "@aws-sdk/types": "3.775.0",
31
+ "@aws-sdk/util-endpoints": "3.775.0",
32
+ "@aws-sdk/util-user-agent-browser": "3.775.0",
33
+ "@aws-sdk/util-user-agent-node": "3.775.0",
34
+ "@smithy/config-resolver": "^4.1.0",
35
+ "@smithy/core": "^3.2.0",
36
+ "@smithy/fetch-http-handler": "^5.0.2",
37
+ "@smithy/hash-node": "^4.0.2",
38
+ "@smithy/invalid-dependency": "^4.0.2",
39
+ "@smithy/middleware-content-length": "^4.0.2",
40
+ "@smithy/middleware-endpoint": "^4.1.0",
41
+ "@smithy/middleware-retry": "^4.1.0",
42
+ "@smithy/middleware-serde": "^4.0.3",
43
+ "@smithy/middleware-stack": "^4.0.2",
44
+ "@smithy/node-config-provider": "^4.0.2",
45
+ "@smithy/node-http-handler": "^4.0.4",
46
+ "@smithy/protocol-http": "^5.1.0",
47
+ "@smithy/smithy-client": "^4.2.0",
48
+ "@smithy/types": "^4.2.0",
49
+ "@smithy/url-parser": "^4.0.2",
50
50
  "@smithy/util-base64": "^4.0.0",
51
51
  "@smithy/util-body-length-browser": "^4.0.0",
52
52
  "@smithy/util-body-length-node": "^4.0.0",
53
- "@smithy/util-defaults-mode-browser": "^4.0.7",
54
- "@smithy/util-defaults-mode-node": "^4.0.7",
55
- "@smithy/util-endpoints": "^3.0.1",
56
- "@smithy/util-middleware": "^4.0.1",
57
- "@smithy/util-retry": "^4.0.1",
53
+ "@smithy/util-defaults-mode-browser": "^4.0.8",
54
+ "@smithy/util-defaults-mode-node": "^4.0.8",
55
+ "@smithy/util-endpoints": "^3.0.2",
56
+ "@smithy/util-middleware": "^4.0.2",
57
+ "@smithy/util-retry": "^4.0.2",
58
58
  "@smithy/util-utf8": "^4.0.0",
59
59
  "tslib": "^2.6.2"
60
60
  },