@aws-sdk/client-signin 3.956.0 → 3.958.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -10,10 +10,8 @@ AWS Sign-In manages authentication for AWS services. This service provides
10
10
  secure authentication flows for accessing AWS resources from the console and developer tools.
11
11
 
12
12
  ## Installing
13
-
14
13
  To install this package, simply type add or install @aws-sdk/client-signin
15
14
  using your favorite package manager:
16
-
17
15
  - `npm install @aws-sdk/client-signin`
18
16
  - `yarn add @aws-sdk/client-signin`
19
17
  - `pnpm add @aws-sdk/client-signin`
@@ -49,9 +47,7 @@ To send a request, you:
49
47
  // a client can be shared by different commands.
50
48
  const client = new SigninClient({ region: "REGION" });
51
49
 
52
- const params = {
53
- /** input parameters */
54
- };
50
+ const params = { /** input parameters */ };
55
51
  const command = new CreateOAuth2TokenCommand(params);
56
52
  ```
57
53
 
@@ -210,5 +206,4 @@ CreateOAuth2Token
210
206
  </summary>
211
207
 
212
208
  [Command API Reference](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/client/signin/command/CreateOAuth2TokenCommand/) / [Input](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-signin/Interface/CreateOAuth2TokenCommandInput/) / [Output](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-signin/Interface/CreateOAuth2TokenCommandOutput/)
213
-
214
209
  </details>
@@ -6,10 +6,9 @@ const util_middleware_1 = require("@smithy/util-middleware");
6
6
  const defaultSigninHttpAuthSchemeParametersProvider = async (config, context, input) => {
7
7
  return {
8
8
  operation: (0, util_middleware_1.getSmithyContext)(context).operation,
9
- region: (await (0, util_middleware_1.normalizeProvider)(config.region)()) ||
10
- (() => {
11
- throw new Error("expected `region` to be configured for `aws.auth#sigv4`");
12
- })(),
9
+ region: await (0, util_middleware_1.normalizeProvider)(config.region)() || (() => {
10
+ throw new Error("expected `region` to be configured for `aws.auth#sigv4`");
11
+ })(),
13
12
  };
14
13
  };
15
14
  exports.defaultSigninHttpAuthSchemeParametersProvider = defaultSigninHttpAuthSchemeParametersProvider;
@@ -36,10 +35,12 @@ function createSmithyApiNoAuthHttpAuthOption(authParameters) {
36
35
  const defaultSigninHttpAuthSchemeProvider = (authParameters) => {
37
36
  const options = [];
38
37
  switch (authParameters.operation) {
39
- case "CreateOAuth2Token": {
40
- options.push(createSmithyApiNoAuthHttpAuthOption(authParameters));
41
- break;
42
- }
38
+ case "CreateOAuth2Token":
39
+ {
40
+ options.push(createSmithyApiNoAuthHttpAuthOption(authParameters));
41
+ break;
42
+ }
43
+ ;
43
44
  default: {
44
45
  options.push(createAwsAuthSigv4HttpAuthOption(authParameters));
45
46
  }
package/dist-cjs/index.js CHANGED
@@ -210,80 +210,59 @@ const _tO = "tokenOutput";
210
210
  const _tT = "tokenType";
211
211
  const n0 = "com.amazonaws.signin";
212
212
  var RefreshToken = [0, n0, _RT, 8, 0];
213
- var AccessDeniedException$ = [-3, n0, _ADE, { [_e]: _c }, [_e, _m], [0, 0]];
213
+ var AccessDeniedException$ = [-3, n0, _ADE,
214
+ { [_e]: _c },
215
+ [_e, _m],
216
+ [0, 0]
217
+ ];
214
218
  schema.TypeRegistry.for(n0).registerError(AccessDeniedException$, AccessDeniedException);
215
- var AccessToken$ = [
216
- 3,
217
- n0,
218
- _AT,
219
+ var AccessToken$ = [3, n0, _AT,
219
220
  8,
220
221
  [_aKI, _sAK, _sT],
221
- [
222
- [0, { [_jN]: _aKI }],
223
- [0, { [_jN]: _sAK }],
224
- [0, { [_jN]: _sT }],
225
- ],
222
+ [[0, { [_jN]: _aKI }], [0, { [_jN]: _sAK }], [0, { [_jN]: _sT }]]
226
223
  ];
227
- var CreateOAuth2TokenRequest$ = [
228
- 3,
229
- n0,
230
- _COATR,
224
+ var CreateOAuth2TokenRequest$ = [3, n0, _COATR,
231
225
  0,
232
226
  [_tI],
233
- [[() => CreateOAuth2TokenRequestBody$, 16]],
227
+ [[() => CreateOAuth2TokenRequestBody$, 16]]
234
228
  ];
235
- var CreateOAuth2TokenRequestBody$ = [
236
- 3,
237
- n0,
238
- _COATRB,
229
+ var CreateOAuth2TokenRequestBody$ = [3, n0, _COATRB,
239
230
  0,
240
231
  [_cI, _gT, _co, _rU, _cV, _rT],
241
- [
242
- [0, { [_jN]: _cI }],
243
- [0, { [_jN]: _gT }],
244
- 0,
245
- [0, { [_jN]: _rU }],
246
- [0, { [_jN]: _cV }],
247
- [() => RefreshToken, { [_jN]: _rT }],
248
- ],
232
+ [[0, { [_jN]: _cI }], [0, { [_jN]: _gT }], 0, [0, { [_jN]: _rU }], [0, { [_jN]: _cV }], [() => RefreshToken, { [_jN]: _rT }]]
249
233
  ];
250
- var CreateOAuth2TokenResponse$ = [
251
- 3,
252
- n0,
253
- _COATRr,
234
+ var CreateOAuth2TokenResponse$ = [3, n0, _COATRr,
254
235
  0,
255
236
  [_tO],
256
- [[() => CreateOAuth2TokenResponseBody$, 16]],
237
+ [[() => CreateOAuth2TokenResponseBody$, 16]]
257
238
  ];
258
- var CreateOAuth2TokenResponseBody$ = [
259
- 3,
260
- n0,
261
- _COATRBr,
239
+ var CreateOAuth2TokenResponseBody$ = [3, n0, _COATRBr,
262
240
  0,
263
241
  [_aT, _tT, _eI, _rT, _iT],
264
- [
265
- [() => AccessToken$, { [_jN]: _aT }],
266
- [0, { [_jN]: _tT }],
267
- [1, { [_jN]: _eI }],
268
- [() => RefreshToken, { [_jN]: _rT }],
269
- [0, { [_jN]: _iT }],
270
- ],
242
+ [[() => AccessToken$, { [_jN]: _aT }], [0, { [_jN]: _tT }], [1, { [_jN]: _eI }], [() => RefreshToken, { [_jN]: _rT }], [0, { [_jN]: _iT }]]
243
+ ];
244
+ var InternalServerException$ = [-3, n0, _ISE,
245
+ { [_e]: _s, [_hE]: 500 },
246
+ [_e, _m],
247
+ [0, 0]
271
248
  ];
272
- var InternalServerException$ = [-3, n0, _ISE, { [_e]: _s, [_hE]: 500 }, [_e, _m], [0, 0]];
273
249
  schema.TypeRegistry.for(n0).registerError(InternalServerException$, InternalServerException);
274
- var TooManyRequestsError$ = [-3, n0, _TMRE, { [_e]: _c, [_hE]: 429 }, [_e, _m], [0, 0]];
250
+ var TooManyRequestsError$ = [-3, n0, _TMRE,
251
+ { [_e]: _c, [_hE]: 429 },
252
+ [_e, _m],
253
+ [0, 0]
254
+ ];
275
255
  schema.TypeRegistry.for(n0).registerError(TooManyRequestsError$, TooManyRequestsError);
276
- var ValidationException$ = [-3, n0, _VE, { [_e]: _c, [_hE]: 400 }, [_e, _m], [0, 0]];
256
+ var ValidationException$ = [-3, n0, _VE,
257
+ { [_e]: _c, [_hE]: 400 },
258
+ [_e, _m],
259
+ [0, 0]
260
+ ];
277
261
  schema.TypeRegistry.for(n0).registerError(ValidationException$, ValidationException);
278
262
  var SigninServiceException$ = [-3, _sm, "SigninServiceException", 0, [], []];
279
263
  schema.TypeRegistry.for(_sm).registerError(SigninServiceException$, SigninServiceException);
280
- var CreateOAuth2Token$ = [
281
- 9,
282
- n0,
283
- _COAT,
284
- { [_h]: ["POST", "/v1/token", 200] },
285
- () => CreateOAuth2TokenRequest$,
286
- () => CreateOAuth2TokenResponse$,
264
+ var CreateOAuth2Token$ = [9, n0, _COAT,
265
+ { [_h]: ["POST", "/v1/token", 200] }, () => CreateOAuth2TokenRequest$, () => CreateOAuth2TokenResponse$
287
266
  ];
288
267
 
289
268
  class CreateOAuth2TokenCommand extends smithyClient.Command
@@ -24,8 +24,7 @@ const getRuntimeConfig = (config) => {
24
24
  defaultsMode,
25
25
  bodyLengthChecker: config?.bodyLengthChecker ?? util_body_length_browser_1.calculateBodyLength,
26
26
  credentialDefaultProvider: config?.credentialDefaultProvider ?? ((_) => () => Promise.reject(new Error("Credential is missing"))),
27
- defaultUserAgentProvider: config?.defaultUserAgentProvider ??
28
- (0, util_user_agent_browser_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
27
+ defaultUserAgentProvider: config?.defaultUserAgentProvider ?? (0, util_user_agent_browser_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
29
28
  maxAttempts: config?.maxAttempts ?? util_retry_1.DEFAULT_MAX_ATTEMPTS,
30
29
  region: config?.region ?? (0, invalid_dependency_1.invalidProvider)("Region is missing"),
31
30
  requestHandler: fetch_http_handler_1.FetchHttpHandler.create(config?.requestHandler ?? defaultConfigProvider),
@@ -34,11 +34,9 @@ const getRuntimeConfig = (config) => {
34
34
  authSchemePreference: config?.authSchemePreference ?? (0, node_config_provider_1.loadConfig)(core_1.NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, loaderConfig),
35
35
  bodyLengthChecker: config?.bodyLengthChecker ?? util_body_length_node_1.calculateBodyLength,
36
36
  credentialDefaultProvider: config?.credentialDefaultProvider ?? credential_provider_node_1.defaultProvider,
37
- defaultUserAgentProvider: config?.defaultUserAgentProvider ??
38
- (0, util_user_agent_node_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
37
+ defaultUserAgentProvider: config?.defaultUserAgentProvider ?? (0, util_user_agent_node_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
39
38
  maxAttempts: config?.maxAttempts ?? (0, node_config_provider_1.loadConfig)(middleware_retry_1.NODE_MAX_ATTEMPT_CONFIG_OPTIONS, config),
40
- region: config?.region ??
41
- (0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_REGION_CONFIG_OPTIONS, { ...config_resolver_1.NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
39
+ region: config?.region ?? (0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_REGION_CONFIG_OPTIONS, { ...config_resolver_1.NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
42
40
  requestHandler: node_http_handler_1.NodeHttpHandler.create(config?.requestHandler ?? defaultConfigProvider),
43
41
  retryMode: config?.retryMode ??
44
42
  (0, node_config_provider_1.loadConfig)({
@@ -3,10 +3,9 @@ import { getSmithyContext, normalizeProvider } from "@smithy/util-middleware";
3
3
  export const defaultSigninHttpAuthSchemeParametersProvider = async (config, context, input) => {
4
4
  return {
5
5
  operation: getSmithyContext(context).operation,
6
- region: (await normalizeProvider(config.region)()) ||
7
- (() => {
8
- throw new Error("expected `region` to be configured for `aws.auth#sigv4`");
9
- })(),
6
+ region: await normalizeProvider(config.region)() || (() => {
7
+ throw new Error("expected `region` to be configured for `aws.auth#sigv4`");
8
+ })(),
10
9
  };
11
10
  };
12
11
  function createAwsAuthSigv4HttpAuthOption(authParameters) {
@@ -32,10 +31,12 @@ function createSmithyApiNoAuthHttpAuthOption(authParameters) {
32
31
  export const defaultSigninHttpAuthSchemeProvider = (authParameters) => {
33
32
  const options = [];
34
33
  switch (authParameters.operation) {
35
- case "CreateOAuth2Token": {
36
- options.push(createSmithyApiNoAuthHttpAuthOption(authParameters));
37
- break;
38
- }
34
+ case "CreateOAuth2Token":
35
+ {
36
+ options.push(createSmithyApiNoAuthHttpAuthOption(authParameters));
37
+ break;
38
+ }
39
+ ;
39
40
  default: {
40
41
  options.push(createAwsAuthSigv4HttpAuthOption(authParameters));
41
42
  }
@@ -20,8 +20,7 @@ export const getRuntimeConfig = (config) => {
20
20
  defaultsMode,
21
21
  bodyLengthChecker: config?.bodyLengthChecker ?? calculateBodyLength,
22
22
  credentialDefaultProvider: config?.credentialDefaultProvider ?? ((_) => () => Promise.reject(new Error("Credential is missing"))),
23
- defaultUserAgentProvider: config?.defaultUserAgentProvider ??
24
- createDefaultUserAgentProvider({ serviceId: clientSharedValues.serviceId, clientVersion: packageInfo.version }),
23
+ defaultUserAgentProvider: config?.defaultUserAgentProvider ?? createDefaultUserAgentProvider({ serviceId: clientSharedValues.serviceId, clientVersion: packageInfo.version }),
25
24
  maxAttempts: config?.maxAttempts ?? DEFAULT_MAX_ATTEMPTS,
26
25
  region: config?.region ?? invalidProvider("Region is missing"),
27
26
  requestHandler: RequestHandler.create(config?.requestHandler ?? defaultConfigProvider),
@@ -1,7 +1,7 @@
1
1
  import packageInfo from "../package.json";
2
- import { NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, emitWarningIfUnsupportedVersion as awsCheckVersion } from "@aws-sdk/core";
2
+ import { emitWarningIfUnsupportedVersion as awsCheckVersion, NODE_AUTH_SCHEME_PREFERENCE_OPTIONS } from "@aws-sdk/core";
3
3
  import { defaultProvider as credentialDefaultProvider } from "@aws-sdk/credential-provider-node";
4
- import { NODE_APP_ID_CONFIG_OPTIONS, createDefaultUserAgentProvider } from "@aws-sdk/util-user-agent-node";
4
+ import { createDefaultUserAgentProvider, NODE_APP_ID_CONFIG_OPTIONS } from "@aws-sdk/util-user-agent-node";
5
5
  import { NODE_REGION_CONFIG_FILE_OPTIONS, NODE_REGION_CONFIG_OPTIONS, NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS, NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS, } from "@smithy/config-resolver";
6
6
  import { Hash } from "@smithy/hash-node";
7
7
  import { NODE_MAX_ATTEMPT_CONFIG_OPTIONS, NODE_RETRY_MODE_CONFIG_OPTIONS } from "@smithy/middleware-retry";
@@ -30,11 +30,9 @@ export const getRuntimeConfig = (config) => {
30
30
  authSchemePreference: config?.authSchemePreference ?? loadNodeConfig(NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, loaderConfig),
31
31
  bodyLengthChecker: config?.bodyLengthChecker ?? calculateBodyLength,
32
32
  credentialDefaultProvider: config?.credentialDefaultProvider ?? credentialDefaultProvider,
33
- defaultUserAgentProvider: config?.defaultUserAgentProvider ??
34
- createDefaultUserAgentProvider({ serviceId: clientSharedValues.serviceId, clientVersion: packageInfo.version }),
33
+ defaultUserAgentProvider: config?.defaultUserAgentProvider ?? createDefaultUserAgentProvider({ serviceId: clientSharedValues.serviceId, clientVersion: packageInfo.version }),
35
34
  maxAttempts: config?.maxAttempts ?? loadNodeConfig(NODE_MAX_ATTEMPT_CONFIG_OPTIONS, config),
36
- region: config?.region ??
37
- loadNodeConfig(NODE_REGION_CONFIG_OPTIONS, { ...NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
35
+ region: config?.region ?? loadNodeConfig(NODE_REGION_CONFIG_OPTIONS, { ...NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
38
36
  requestHandler: RequestHandler.create(config?.requestHandler ?? defaultConfigProvider),
39
37
  retryMode: config?.retryMode ??
40
38
  loadNodeConfig({
@@ -37,78 +37,57 @@ import { TypeRegistry } from "@smithy/core/schema";
37
37
  import { AccessDeniedException, InternalServerException, TooManyRequestsError, ValidationException, } from "../models/errors";
38
38
  import { SigninServiceException } from "../models/SigninServiceException";
39
39
  var RefreshToken = [0, n0, _RT, 8, 0];
40
- export var AccessDeniedException$ = [-3, n0, _ADE, { [_e]: _c }, [_e, _m], [0, 0]];
40
+ export var AccessDeniedException$ = [-3, n0, _ADE,
41
+ { [_e]: _c },
42
+ [_e, _m],
43
+ [0, 0]
44
+ ];
41
45
  TypeRegistry.for(n0).registerError(AccessDeniedException$, AccessDeniedException);
42
- export var AccessToken$ = [
43
- 3,
44
- n0,
45
- _AT,
46
+ export var AccessToken$ = [3, n0, _AT,
46
47
  8,
47
48
  [_aKI, _sAK, _sT],
48
- [
49
- [0, { [_jN]: _aKI }],
50
- [0, { [_jN]: _sAK }],
51
- [0, { [_jN]: _sT }],
52
- ],
49
+ [[0, { [_jN]: _aKI }], [0, { [_jN]: _sAK }], [0, { [_jN]: _sT }]]
53
50
  ];
54
- export var CreateOAuth2TokenRequest$ = [
55
- 3,
56
- n0,
57
- _COATR,
51
+ export var CreateOAuth2TokenRequest$ = [3, n0, _COATR,
58
52
  0,
59
53
  [_tI],
60
- [[() => CreateOAuth2TokenRequestBody$, 16]],
54
+ [[() => CreateOAuth2TokenRequestBody$, 16]]
61
55
  ];
62
- export var CreateOAuth2TokenRequestBody$ = [
63
- 3,
64
- n0,
65
- _COATRB,
56
+ export var CreateOAuth2TokenRequestBody$ = [3, n0, _COATRB,
66
57
  0,
67
58
  [_cI, _gT, _co, _rU, _cV, _rT],
68
- [
69
- [0, { [_jN]: _cI }],
70
- [0, { [_jN]: _gT }],
71
- 0,
72
- [0, { [_jN]: _rU }],
73
- [0, { [_jN]: _cV }],
74
- [() => RefreshToken, { [_jN]: _rT }],
75
- ],
59
+ [[0, { [_jN]: _cI }], [0, { [_jN]: _gT }], 0, [0, { [_jN]: _rU }], [0, { [_jN]: _cV }], [() => RefreshToken, { [_jN]: _rT }]]
76
60
  ];
77
- export var CreateOAuth2TokenResponse$ = [
78
- 3,
79
- n0,
80
- _COATRr,
61
+ export var CreateOAuth2TokenResponse$ = [3, n0, _COATRr,
81
62
  0,
82
63
  [_tO],
83
- [[() => CreateOAuth2TokenResponseBody$, 16]],
64
+ [[() => CreateOAuth2TokenResponseBody$, 16]]
84
65
  ];
85
- export var CreateOAuth2TokenResponseBody$ = [
86
- 3,
87
- n0,
88
- _COATRBr,
66
+ export var CreateOAuth2TokenResponseBody$ = [3, n0, _COATRBr,
89
67
  0,
90
68
  [_aT, _tT, _eI, _rT, _iT],
91
- [
92
- [() => AccessToken$, { [_jN]: _aT }],
93
- [0, { [_jN]: _tT }],
94
- [1, { [_jN]: _eI }],
95
- [() => RefreshToken, { [_jN]: _rT }],
96
- [0, { [_jN]: _iT }],
97
- ],
69
+ [[() => AccessToken$, { [_jN]: _aT }], [0, { [_jN]: _tT }], [1, { [_jN]: _eI }], [() => RefreshToken, { [_jN]: _rT }], [0, { [_jN]: _iT }]]
70
+ ];
71
+ export var InternalServerException$ = [-3, n0, _ISE,
72
+ { [_e]: _s, [_hE]: 500 },
73
+ [_e, _m],
74
+ [0, 0]
98
75
  ];
99
- export var InternalServerException$ = [-3, n0, _ISE, { [_e]: _s, [_hE]: 500 }, [_e, _m], [0, 0]];
100
76
  TypeRegistry.for(n0).registerError(InternalServerException$, InternalServerException);
101
- export var TooManyRequestsError$ = [-3, n0, _TMRE, { [_e]: _c, [_hE]: 429 }, [_e, _m], [0, 0]];
77
+ export var TooManyRequestsError$ = [-3, n0, _TMRE,
78
+ { [_e]: _c, [_hE]: 429 },
79
+ [_e, _m],
80
+ [0, 0]
81
+ ];
102
82
  TypeRegistry.for(n0).registerError(TooManyRequestsError$, TooManyRequestsError);
103
- export var ValidationException$ = [-3, n0, _VE, { [_e]: _c, [_hE]: 400 }, [_e, _m], [0, 0]];
83
+ export var ValidationException$ = [-3, n0, _VE,
84
+ { [_e]: _c, [_hE]: 400 },
85
+ [_e, _m],
86
+ [0, 0]
87
+ ];
104
88
  TypeRegistry.for(n0).registerError(ValidationException$, ValidationException);
105
89
  export var SigninServiceException$ = [-3, _sm, "SigninServiceException", 0, [], []];
106
90
  TypeRegistry.for(_sm).registerError(SigninServiceException$, SigninServiceException);
107
- export var CreateOAuth2Token$ = [
108
- 9,
109
- n0,
110
- _COAT,
111
- { [_h]: ["POST", "/v1/token", 200] },
112
- () => CreateOAuth2TokenRequest$,
113
- () => CreateOAuth2TokenResponse$,
91
+ export var CreateOAuth2Token$ = [9, n0, _COAT,
92
+ { [_h]: ["POST", "/v1/token", 200] }, () => CreateOAuth2TokenRequest$, () => CreateOAuth2TokenResponse$
114
93
  ];
package/package.json CHANGED
@@ -1,12 +1,12 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-signin",
3
3
  "description": "AWS SDK for JavaScript Signin Client for Node.js, Browser and React Native",
4
- "version": "3.956.0",
4
+ "version": "3.958.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:types' 'yarn:build:es' && yarn build:cjs",
7
7
  "build:cjs": "node ../../scripts/compilation/inline client-signin",
8
8
  "build:es": "tsc -p tsconfig.es.json",
9
- "build:include:deps": "lerna run --scope $npm_package_name --include-dependencies build",
9
+ "build:include:deps": "yarn g:turbo run build -F=\"$npm_package_name\"",
10
10
  "build:types": "tsc -p tsconfig.types.json",
11
11
  "build:types:downlevel": "downlevel-dts dist-types dist-types/ts3.4",
12
12
  "clean": "rimraf ./dist-* && rimraf *.tsbuildinfo || exit 0",
@@ -21,17 +21,17 @@
21
21
  "dependencies": {
22
22
  "@aws-crypto/sha256-browser": "5.2.0",
23
23
  "@aws-crypto/sha256-js": "5.2.0",
24
- "@aws-sdk/core": "3.956.0",
25
- "@aws-sdk/credential-provider-node": "3.956.0",
26
- "@aws-sdk/middleware-host-header": "3.956.0",
27
- "@aws-sdk/middleware-logger": "3.956.0",
28
- "@aws-sdk/middleware-recursion-detection": "3.956.0",
29
- "@aws-sdk/middleware-user-agent": "3.956.0",
30
- "@aws-sdk/region-config-resolver": "3.956.0",
31
- "@aws-sdk/types": "3.956.0",
32
- "@aws-sdk/util-endpoints": "3.956.0",
33
- "@aws-sdk/util-user-agent-browser": "3.956.0",
34
- "@aws-sdk/util-user-agent-node": "3.956.0",
24
+ "@aws-sdk/core": "3.957.0",
25
+ "@aws-sdk/credential-provider-node": "3.958.0",
26
+ "@aws-sdk/middleware-host-header": "3.957.0",
27
+ "@aws-sdk/middleware-logger": "3.957.0",
28
+ "@aws-sdk/middleware-recursion-detection": "3.957.0",
29
+ "@aws-sdk/middleware-user-agent": "3.957.0",
30
+ "@aws-sdk/region-config-resolver": "3.957.0",
31
+ "@aws-sdk/types": "3.957.0",
32
+ "@aws-sdk/util-endpoints": "3.957.0",
33
+ "@aws-sdk/util-user-agent-browser": "3.957.0",
34
+ "@aws-sdk/util-user-agent-node": "3.957.0",
35
35
  "@smithy/config-resolver": "^4.4.5",
36
36
  "@smithy/core": "^3.20.0",
37
37
  "@smithy/fetch-http-handler": "^5.3.8",