@aws-sdk/client-secrets-manager 3.477.0 → 3.480.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/endpoint/ruleset.js +3 -3
- package/dist-cjs/pagination/BatchGetSecretValuePaginator.js +2 -24
- package/dist-cjs/pagination/ListSecretVersionIdsPaginator.js +2 -24
- package/dist-cjs/pagination/ListSecretsPaginator.js +2 -24
- package/dist-es/endpoint/ruleset.js +3 -3
- package/dist-es/pagination/BatchGetSecretValuePaginator.js +2 -23
- package/dist-es/pagination/ListSecretVersionIdsPaginator.js +2 -23
- package/dist-es/pagination/ListSecretsPaginator.js +2 -23
- package/dist-types/pagination/BatchGetSecretValuePaginator.d.ts +1 -1
- package/dist-types/pagination/ListSecretVersionIdsPaginator.d.ts +1 -1
- package/dist-types/pagination/ListSecretsPaginator.d.ts +1 -1
- package/dist-types/ts3.4/pagination/BatchGetSecretValuePaginator.d.ts +3 -3
- package/dist-types/ts3.4/pagination/ListSecretVersionIdsPaginator.d.ts +3 -3
- package/dist-types/ts3.4/pagination/ListSecretsPaginator.d.ts +3 -3
- package/package.json +6 -5
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
3
|
exports.ruleSet = void 0;
|
|
4
|
-
const
|
|
5
|
-
const a = true, b = "isSet", c = "booleanEquals", d = "error", e = "endpoint", f = "tree", g = "PartitionResult", h = { [
|
|
6
|
-
const _data = { version: "1.0", parameters: { Region:
|
|
4
|
+
const y = "required", z = "fn", A = "argv", B = "ref", C = "properties", D = "headers";
|
|
5
|
+
const a = true, b = "isSet", c = "booleanEquals", d = "error", e = "endpoint", f = "tree", g = "PartitionResult", h = "stringEquals", i = { [y]: false, "type": "String" }, j = { [y]: true, "default": false, "type": "Boolean" }, k = { [B]: "Endpoint" }, l = { [z]: c, [A]: [{ [B]: "UseFIPS" }, true] }, m = { [z]: c, [A]: [{ [B]: "UseDualStack" }, true] }, n = {}, o = { [z]: "getAttr", [A]: [{ [B]: g }, "supportsFIPS"] }, p = { [z]: c, [A]: [true, { [z]: "getAttr", [A]: [{ [B]: g }, "supportsDualStack"] }] }, q = { [z]: "getAttr", [A]: [{ [B]: g }, "name"] }, r = { "url": "https://secretsmanager-fips.{Region}.amazonaws.com", [C]: {}, [D]: {} }, s = { "url": "https://secretsmanager.{Region}.amazonaws.com", [C]: {}, [D]: {} }, t = [l], u = [m], v = [{ [B]: "Region" }], w = [{ [z]: h, [A]: ["aws", q] }], x = [{ [z]: h, [A]: ["aws-us-gov", q] }];
|
|
6
|
+
const _data = { version: "1.0", parameters: { Region: i, UseDualStack: j, UseFIPS: j, Endpoint: i }, rules: [{ conditions: [{ [z]: b, [A]: [k] }], rules: [{ conditions: t, error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: d }, { conditions: u, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", type: d }, { endpoint: { url: k, [C]: n, [D]: n }, type: e }], type: f }, { conditions: [{ [z]: b, [A]: v }], rules: [{ conditions: [{ [z]: "aws.partition", [A]: v, assign: g }], rules: [{ conditions: [l, m], rules: [{ conditions: [{ [z]: c, [A]: [a, o] }, p], rules: [{ conditions: w, endpoint: r, type: e }, { conditions: x, endpoint: r, type: e }, { endpoint: { url: "https://secretsmanager-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", [C]: n, [D]: n }, type: e }], type: f }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", type: d }], type: f }, { conditions: t, rules: [{ conditions: [{ [z]: c, [A]: [o, a] }], rules: [{ endpoint: { url: "https://secretsmanager-fips.{Region}.{PartitionResult#dnsSuffix}", [C]: n, [D]: n }, type: e }], type: f }, { error: "FIPS is enabled but this partition does not support FIPS", type: d }], type: f }, { conditions: u, rules: [{ conditions: [p], rules: [{ conditions: w, endpoint: s, type: e }, { conditions: [{ [z]: h, [A]: ["aws-cn", q] }], endpoint: { url: "https://secretsmanager.{Region}.amazonaws.com.cn", [C]: n, [D]: n }, type: e }, { conditions: x, endpoint: s, type: e }, { endpoint: { url: "https://secretsmanager.{Region}.{PartitionResult#dualStackDnsSuffix}", [C]: n, [D]: n }, type: e }], type: f }, { error: "DualStack is enabled but this partition does not support DualStack", type: d }], type: f }, { endpoint: { url: "https://secretsmanager.{Region}.{PartitionResult#dnsSuffix}", [C]: n, [D]: n }, type: e }], type: f }], type: f }, { error: "Invalid Configuration: Missing Region", type: d }] };
|
|
7
7
|
exports.ruleSet = _data;
|
|
@@ -1,29 +1,7 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
3
|
exports.paginateBatchGetSecretValue = void 0;
|
|
4
|
+
const core_1 = require("@smithy/core");
|
|
4
5
|
const BatchGetSecretValueCommand_1 = require("../commands/BatchGetSecretValueCommand");
|
|
5
6
|
const SecretsManagerClient_1 = require("../SecretsManagerClient");
|
|
6
|
-
|
|
7
|
-
return await client.send(new BatchGetSecretValueCommand_1.BatchGetSecretValueCommand(input), ...args);
|
|
8
|
-
};
|
|
9
|
-
async function* paginateBatchGetSecretValue(config, input, ...additionalArguments) {
|
|
10
|
-
let token = config.startingToken || undefined;
|
|
11
|
-
let hasNext = true;
|
|
12
|
-
let page;
|
|
13
|
-
while (hasNext) {
|
|
14
|
-
input.NextToken = token;
|
|
15
|
-
input["MaxResults"] = config.pageSize;
|
|
16
|
-
if (config.client instanceof SecretsManagerClient_1.SecretsManagerClient) {
|
|
17
|
-
page = await makePagedClientRequest(config.client, input, ...additionalArguments);
|
|
18
|
-
}
|
|
19
|
-
else {
|
|
20
|
-
throw new Error("Invalid client, expected SecretsManager | SecretsManagerClient");
|
|
21
|
-
}
|
|
22
|
-
yield page;
|
|
23
|
-
const prevToken = token;
|
|
24
|
-
token = page.NextToken;
|
|
25
|
-
hasNext = !!(token && (!config.stopOnSameToken || token !== prevToken));
|
|
26
|
-
}
|
|
27
|
-
return undefined;
|
|
28
|
-
}
|
|
29
|
-
exports.paginateBatchGetSecretValue = paginateBatchGetSecretValue;
|
|
7
|
+
exports.paginateBatchGetSecretValue = (0, core_1.createPaginator)(SecretsManagerClient_1.SecretsManagerClient, BatchGetSecretValueCommand_1.BatchGetSecretValueCommand, "NextToken", "NextToken", "MaxResults");
|
|
@@ -1,29 +1,7 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
3
|
exports.paginateListSecretVersionIds = void 0;
|
|
4
|
+
const core_1 = require("@smithy/core");
|
|
4
5
|
const ListSecretVersionIdsCommand_1 = require("../commands/ListSecretVersionIdsCommand");
|
|
5
6
|
const SecretsManagerClient_1 = require("../SecretsManagerClient");
|
|
6
|
-
|
|
7
|
-
return await client.send(new ListSecretVersionIdsCommand_1.ListSecretVersionIdsCommand(input), ...args);
|
|
8
|
-
};
|
|
9
|
-
async function* paginateListSecretVersionIds(config, input, ...additionalArguments) {
|
|
10
|
-
let token = config.startingToken || undefined;
|
|
11
|
-
let hasNext = true;
|
|
12
|
-
let page;
|
|
13
|
-
while (hasNext) {
|
|
14
|
-
input.NextToken = token;
|
|
15
|
-
input["MaxResults"] = config.pageSize;
|
|
16
|
-
if (config.client instanceof SecretsManagerClient_1.SecretsManagerClient) {
|
|
17
|
-
page = await makePagedClientRequest(config.client, input, ...additionalArguments);
|
|
18
|
-
}
|
|
19
|
-
else {
|
|
20
|
-
throw new Error("Invalid client, expected SecretsManager | SecretsManagerClient");
|
|
21
|
-
}
|
|
22
|
-
yield page;
|
|
23
|
-
const prevToken = token;
|
|
24
|
-
token = page.NextToken;
|
|
25
|
-
hasNext = !!(token && (!config.stopOnSameToken || token !== prevToken));
|
|
26
|
-
}
|
|
27
|
-
return undefined;
|
|
28
|
-
}
|
|
29
|
-
exports.paginateListSecretVersionIds = paginateListSecretVersionIds;
|
|
7
|
+
exports.paginateListSecretVersionIds = (0, core_1.createPaginator)(SecretsManagerClient_1.SecretsManagerClient, ListSecretVersionIdsCommand_1.ListSecretVersionIdsCommand, "NextToken", "NextToken", "MaxResults");
|
|
@@ -1,29 +1,7 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
3
|
exports.paginateListSecrets = void 0;
|
|
4
|
+
const core_1 = require("@smithy/core");
|
|
4
5
|
const ListSecretsCommand_1 = require("../commands/ListSecretsCommand");
|
|
5
6
|
const SecretsManagerClient_1 = require("../SecretsManagerClient");
|
|
6
|
-
|
|
7
|
-
return await client.send(new ListSecretsCommand_1.ListSecretsCommand(input), ...args);
|
|
8
|
-
};
|
|
9
|
-
async function* paginateListSecrets(config, input, ...additionalArguments) {
|
|
10
|
-
let token = config.startingToken || undefined;
|
|
11
|
-
let hasNext = true;
|
|
12
|
-
let page;
|
|
13
|
-
while (hasNext) {
|
|
14
|
-
input.NextToken = token;
|
|
15
|
-
input["MaxResults"] = config.pageSize;
|
|
16
|
-
if (config.client instanceof SecretsManagerClient_1.SecretsManagerClient) {
|
|
17
|
-
page = await makePagedClientRequest(config.client, input, ...additionalArguments);
|
|
18
|
-
}
|
|
19
|
-
else {
|
|
20
|
-
throw new Error("Invalid client, expected SecretsManager | SecretsManagerClient");
|
|
21
|
-
}
|
|
22
|
-
yield page;
|
|
23
|
-
const prevToken = token;
|
|
24
|
-
token = page.NextToken;
|
|
25
|
-
hasNext = !!(token && (!config.stopOnSameToken || token !== prevToken));
|
|
26
|
-
}
|
|
27
|
-
return undefined;
|
|
28
|
-
}
|
|
29
|
-
exports.paginateListSecrets = paginateListSecrets;
|
|
7
|
+
exports.paginateListSecrets = (0, core_1.createPaginator)(SecretsManagerClient_1.SecretsManagerClient, ListSecretsCommand_1.ListSecretsCommand, "NextToken", "NextToken", "MaxResults");
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
const
|
|
2
|
-
const a = true, b = "isSet", c = "booleanEquals", d = "error", e = "endpoint", f = "tree", g = "PartitionResult", h = { [
|
|
3
|
-
const _data = { version: "1.0", parameters: { Region:
|
|
1
|
+
const y = "required", z = "fn", A = "argv", B = "ref", C = "properties", D = "headers";
|
|
2
|
+
const a = true, b = "isSet", c = "booleanEquals", d = "error", e = "endpoint", f = "tree", g = "PartitionResult", h = "stringEquals", i = { [y]: false, "type": "String" }, j = { [y]: true, "default": false, "type": "Boolean" }, k = { [B]: "Endpoint" }, l = { [z]: c, [A]: [{ [B]: "UseFIPS" }, true] }, m = { [z]: c, [A]: [{ [B]: "UseDualStack" }, true] }, n = {}, o = { [z]: "getAttr", [A]: [{ [B]: g }, "supportsFIPS"] }, p = { [z]: c, [A]: [true, { [z]: "getAttr", [A]: [{ [B]: g }, "supportsDualStack"] }] }, q = { [z]: "getAttr", [A]: [{ [B]: g }, "name"] }, r = { "url": "https://secretsmanager-fips.{Region}.amazonaws.com", [C]: {}, [D]: {} }, s = { "url": "https://secretsmanager.{Region}.amazonaws.com", [C]: {}, [D]: {} }, t = [l], u = [m], v = [{ [B]: "Region" }], w = [{ [z]: h, [A]: ["aws", q] }], x = [{ [z]: h, [A]: ["aws-us-gov", q] }];
|
|
3
|
+
const _data = { version: "1.0", parameters: { Region: i, UseDualStack: j, UseFIPS: j, Endpoint: i }, rules: [{ conditions: [{ [z]: b, [A]: [k] }], rules: [{ conditions: t, error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: d }, { conditions: u, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", type: d }, { endpoint: { url: k, [C]: n, [D]: n }, type: e }], type: f }, { conditions: [{ [z]: b, [A]: v }], rules: [{ conditions: [{ [z]: "aws.partition", [A]: v, assign: g }], rules: [{ conditions: [l, m], rules: [{ conditions: [{ [z]: c, [A]: [a, o] }, p], rules: [{ conditions: w, endpoint: r, type: e }, { conditions: x, endpoint: r, type: e }, { endpoint: { url: "https://secretsmanager-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", [C]: n, [D]: n }, type: e }], type: f }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", type: d }], type: f }, { conditions: t, rules: [{ conditions: [{ [z]: c, [A]: [o, a] }], rules: [{ endpoint: { url: "https://secretsmanager-fips.{Region}.{PartitionResult#dnsSuffix}", [C]: n, [D]: n }, type: e }], type: f }, { error: "FIPS is enabled but this partition does not support FIPS", type: d }], type: f }, { conditions: u, rules: [{ conditions: [p], rules: [{ conditions: w, endpoint: s, type: e }, { conditions: [{ [z]: h, [A]: ["aws-cn", q] }], endpoint: { url: "https://secretsmanager.{Region}.amazonaws.com.cn", [C]: n, [D]: n }, type: e }, { conditions: x, endpoint: s, type: e }, { endpoint: { url: "https://secretsmanager.{Region}.{PartitionResult#dualStackDnsSuffix}", [C]: n, [D]: n }, type: e }], type: f }, { error: "DualStack is enabled but this partition does not support DualStack", type: d }], type: f }, { endpoint: { url: "https://secretsmanager.{Region}.{PartitionResult#dnsSuffix}", [C]: n, [D]: n }, type: e }], type: f }], type: f }, { error: "Invalid Configuration: Missing Region", type: d }] };
|
|
4
4
|
export const ruleSet = _data;
|
|
@@ -1,25 +1,4 @@
|
|
|
1
|
+
import { createPaginator } from "@smithy/core";
|
|
1
2
|
import { BatchGetSecretValueCommand, } from "../commands/BatchGetSecretValueCommand";
|
|
2
3
|
import { SecretsManagerClient } from "../SecretsManagerClient";
|
|
3
|
-
const
|
|
4
|
-
return await client.send(new BatchGetSecretValueCommand(input), ...args);
|
|
5
|
-
};
|
|
6
|
-
export async function* paginateBatchGetSecretValue(config, input, ...additionalArguments) {
|
|
7
|
-
let token = config.startingToken || undefined;
|
|
8
|
-
let hasNext = true;
|
|
9
|
-
let page;
|
|
10
|
-
while (hasNext) {
|
|
11
|
-
input.NextToken = token;
|
|
12
|
-
input["MaxResults"] = config.pageSize;
|
|
13
|
-
if (config.client instanceof SecretsManagerClient) {
|
|
14
|
-
page = await makePagedClientRequest(config.client, input, ...additionalArguments);
|
|
15
|
-
}
|
|
16
|
-
else {
|
|
17
|
-
throw new Error("Invalid client, expected SecretsManager | SecretsManagerClient");
|
|
18
|
-
}
|
|
19
|
-
yield page;
|
|
20
|
-
const prevToken = token;
|
|
21
|
-
token = page.NextToken;
|
|
22
|
-
hasNext = !!(token && (!config.stopOnSameToken || token !== prevToken));
|
|
23
|
-
}
|
|
24
|
-
return undefined;
|
|
25
|
-
}
|
|
4
|
+
export const paginateBatchGetSecretValue = createPaginator(SecretsManagerClient, BatchGetSecretValueCommand, "NextToken", "NextToken", "MaxResults");
|
|
@@ -1,25 +1,4 @@
|
|
|
1
|
+
import { createPaginator } from "@smithy/core";
|
|
1
2
|
import { ListSecretVersionIdsCommand, } from "../commands/ListSecretVersionIdsCommand";
|
|
2
3
|
import { SecretsManagerClient } from "../SecretsManagerClient";
|
|
3
|
-
const
|
|
4
|
-
return await client.send(new ListSecretVersionIdsCommand(input), ...args);
|
|
5
|
-
};
|
|
6
|
-
export async function* paginateListSecretVersionIds(config, input, ...additionalArguments) {
|
|
7
|
-
let token = config.startingToken || undefined;
|
|
8
|
-
let hasNext = true;
|
|
9
|
-
let page;
|
|
10
|
-
while (hasNext) {
|
|
11
|
-
input.NextToken = token;
|
|
12
|
-
input["MaxResults"] = config.pageSize;
|
|
13
|
-
if (config.client instanceof SecretsManagerClient) {
|
|
14
|
-
page = await makePagedClientRequest(config.client, input, ...additionalArguments);
|
|
15
|
-
}
|
|
16
|
-
else {
|
|
17
|
-
throw new Error("Invalid client, expected SecretsManager | SecretsManagerClient");
|
|
18
|
-
}
|
|
19
|
-
yield page;
|
|
20
|
-
const prevToken = token;
|
|
21
|
-
token = page.NextToken;
|
|
22
|
-
hasNext = !!(token && (!config.stopOnSameToken || token !== prevToken));
|
|
23
|
-
}
|
|
24
|
-
return undefined;
|
|
25
|
-
}
|
|
4
|
+
export const paginateListSecretVersionIds = createPaginator(SecretsManagerClient, ListSecretVersionIdsCommand, "NextToken", "NextToken", "MaxResults");
|
|
@@ -1,25 +1,4 @@
|
|
|
1
|
+
import { createPaginator } from "@smithy/core";
|
|
1
2
|
import { ListSecretsCommand } from "../commands/ListSecretsCommand";
|
|
2
3
|
import { SecretsManagerClient } from "../SecretsManagerClient";
|
|
3
|
-
const
|
|
4
|
-
return await client.send(new ListSecretsCommand(input), ...args);
|
|
5
|
-
};
|
|
6
|
-
export async function* paginateListSecrets(config, input, ...additionalArguments) {
|
|
7
|
-
let token = config.startingToken || undefined;
|
|
8
|
-
let hasNext = true;
|
|
9
|
-
let page;
|
|
10
|
-
while (hasNext) {
|
|
11
|
-
input.NextToken = token;
|
|
12
|
-
input["MaxResults"] = config.pageSize;
|
|
13
|
-
if (config.client instanceof SecretsManagerClient) {
|
|
14
|
-
page = await makePagedClientRequest(config.client, input, ...additionalArguments);
|
|
15
|
-
}
|
|
16
|
-
else {
|
|
17
|
-
throw new Error("Invalid client, expected SecretsManager | SecretsManagerClient");
|
|
18
|
-
}
|
|
19
|
-
yield page;
|
|
20
|
-
const prevToken = token;
|
|
21
|
-
token = page.NextToken;
|
|
22
|
-
hasNext = !!(token && (!config.stopOnSameToken || token !== prevToken));
|
|
23
|
-
}
|
|
24
|
-
return undefined;
|
|
25
|
-
}
|
|
4
|
+
export const paginateListSecrets = createPaginator(SecretsManagerClient, ListSecretsCommand, "NextToken", "NextToken", "MaxResults");
|
|
@@ -4,4 +4,4 @@ import { SecretsManagerPaginationConfiguration } from "./Interfaces";
|
|
|
4
4
|
/**
|
|
5
5
|
* @public
|
|
6
6
|
*/
|
|
7
|
-
export declare
|
|
7
|
+
export declare const paginateBatchGetSecretValue: (config: SecretsManagerPaginationConfiguration, input: BatchGetSecretValueCommandInput, ...rest: any[]) => Paginator<BatchGetSecretValueCommandOutput>;
|
|
@@ -4,4 +4,4 @@ import { SecretsManagerPaginationConfiguration } from "./Interfaces";
|
|
|
4
4
|
/**
|
|
5
5
|
* @public
|
|
6
6
|
*/
|
|
7
|
-
export declare
|
|
7
|
+
export declare const paginateListSecretVersionIds: (config: SecretsManagerPaginationConfiguration, input: ListSecretVersionIdsCommandInput, ...rest: any[]) => Paginator<ListSecretVersionIdsCommandOutput>;
|
|
@@ -4,4 +4,4 @@ import { SecretsManagerPaginationConfiguration } from "./Interfaces";
|
|
|
4
4
|
/**
|
|
5
5
|
* @public
|
|
6
6
|
*/
|
|
7
|
-
export declare
|
|
7
|
+
export declare const paginateListSecrets: (config: SecretsManagerPaginationConfiguration, input: ListSecretsCommandInput, ...rest: any[]) => Paginator<ListSecretsCommandOutput>;
|
|
@@ -4,8 +4,8 @@ import {
|
|
|
4
4
|
BatchGetSecretValueCommandOutput,
|
|
5
5
|
} from "../commands/BatchGetSecretValueCommand";
|
|
6
6
|
import { SecretsManagerPaginationConfiguration } from "./Interfaces";
|
|
7
|
-
export declare
|
|
7
|
+
export declare const paginateBatchGetSecretValue: (
|
|
8
8
|
config: SecretsManagerPaginationConfiguration,
|
|
9
9
|
input: BatchGetSecretValueCommandInput,
|
|
10
|
-
...
|
|
11
|
-
)
|
|
10
|
+
...rest: any[]
|
|
11
|
+
) => Paginator<BatchGetSecretValueCommandOutput>;
|
|
@@ -4,8 +4,8 @@ import {
|
|
|
4
4
|
ListSecretVersionIdsCommandOutput,
|
|
5
5
|
} from "../commands/ListSecretVersionIdsCommand";
|
|
6
6
|
import { SecretsManagerPaginationConfiguration } from "./Interfaces";
|
|
7
|
-
export declare
|
|
7
|
+
export declare const paginateListSecretVersionIds: (
|
|
8
8
|
config: SecretsManagerPaginationConfiguration,
|
|
9
9
|
input: ListSecretVersionIdsCommandInput,
|
|
10
|
-
...
|
|
11
|
-
)
|
|
10
|
+
...rest: any[]
|
|
11
|
+
) => Paginator<ListSecretVersionIdsCommandOutput>;
|
|
@@ -4,8 +4,8 @@ import {
|
|
|
4
4
|
ListSecretsCommandOutput,
|
|
5
5
|
} from "../commands/ListSecretsCommand";
|
|
6
6
|
import { SecretsManagerPaginationConfiguration } from "./Interfaces";
|
|
7
|
-
export declare
|
|
7
|
+
export declare const paginateListSecrets: (
|
|
8
8
|
config: SecretsManagerPaginationConfiguration,
|
|
9
9
|
input: ListSecretsCommandInput,
|
|
10
|
-
...
|
|
11
|
-
)
|
|
10
|
+
...rest: any[]
|
|
11
|
+
) => Paginator<ListSecretsCommandOutput>;
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-secrets-manager",
|
|
3
3
|
"description": "AWS SDK for JavaScript Secrets Manager Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.480.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
|
|
7
7
|
"build:cjs": "tsc -p tsconfig.cjs.json",
|
|
@@ -20,20 +20,21 @@
|
|
|
20
20
|
"dependencies": {
|
|
21
21
|
"@aws-crypto/sha256-browser": "3.0.0",
|
|
22
22
|
"@aws-crypto/sha256-js": "3.0.0",
|
|
23
|
-
"@aws-sdk/client-sts": "3.
|
|
23
|
+
"@aws-sdk/client-sts": "3.478.0",
|
|
24
24
|
"@aws-sdk/core": "3.477.0",
|
|
25
|
-
"@aws-sdk/credential-provider-node": "3.
|
|
25
|
+
"@aws-sdk/credential-provider-node": "3.478.0",
|
|
26
26
|
"@aws-sdk/middleware-host-header": "3.468.0",
|
|
27
27
|
"@aws-sdk/middleware-logger": "3.468.0",
|
|
28
28
|
"@aws-sdk/middleware-recursion-detection": "3.468.0",
|
|
29
29
|
"@aws-sdk/middleware-signing": "3.468.0",
|
|
30
|
-
"@aws-sdk/middleware-user-agent": "3.
|
|
30
|
+
"@aws-sdk/middleware-user-agent": "3.478.0",
|
|
31
31
|
"@aws-sdk/region-config-resolver": "3.470.0",
|
|
32
32
|
"@aws-sdk/types": "3.468.0",
|
|
33
|
-
"@aws-sdk/util-endpoints": "3.
|
|
33
|
+
"@aws-sdk/util-endpoints": "3.478.0",
|
|
34
34
|
"@aws-sdk/util-user-agent-browser": "3.468.0",
|
|
35
35
|
"@aws-sdk/util-user-agent-node": "3.470.0",
|
|
36
36
|
"@smithy/config-resolver": "^2.0.21",
|
|
37
|
+
"@smithy/core": "^1.2.0",
|
|
37
38
|
"@smithy/fetch-http-handler": "^2.3.1",
|
|
38
39
|
"@smithy/hash-node": "^2.0.17",
|
|
39
40
|
"@smithy/invalid-dependency": "^2.0.15",
|