@aws-sdk/client-sts 3.257.0 → 3.259.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,7 +1,7 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
3
  exports.ruleSet = void 0;
4
- const H = "required", I = "fn", J = "argv", K = "ref", L = "properties", M = "headers";
5
- const a = false, b = true, c = "PartitionResult", d = "tree", e = "booleanEquals", f = "stringEquals", g = "https://sts.amazonaws.com", h = "sigv4", i = "sts", j = "us-east-1", k = "endpoint", l = "https://sts.{Region}.{PartitionResult#dnsSuffix}", m = "error", n = "getAttr", o = { [H]: false, "type": "String" }, p = { [H]: true, "default": false, "type": "Boolean" }, q = { [K]: "Region" }, r = { [K]: "UseFIPS" }, s = { [K]: "UseDualStack" }, t = { [I]: "isSet", [J]: [{ [K]: "Endpoint" }] }, u = { [K]: "Endpoint" }, v = { "url": g, [L]: { "authSchemes": [{ "name": h, "signingName": i, "signingRegion": j }] }, [M]: {} }, w = {}, x = { [I]: e, [J]: [r, true] }, y = { [I]: e, [J]: [s, true] }, z = { [I]: e, [J]: [true, { [I]: n, [J]: [{ [K]: c }, "supportsFIPS"] }] }, A = { [K]: c }, B = { [I]: e, [J]: [true, { [I]: n, [J]: [A, "supportsDualStack"] }] }, C = { "url": l, [L]: {}, [M]: {} }, D = [u], E = [{ [I]: f, [J]: [q, "aws-global"] }], F = [x], G = [y];
6
- const _data = { version: "1.0", parameters: { Region: o, UseDualStack: p, UseFIPS: p, Endpoint: o, UseGlobalEndpoint: p }, rules: [{ conditions: [{ [I]: "aws.partition", [J]: [q], assign: c }], type: d, rules: [{ conditions: [{ [I]: e, [J]: [{ [K]: "UseGlobalEndpoint" }, b] }, { [I]: e, [J]: [r, a] }, { [I]: e, [J]: [s, a] }, { [I]: "not", [J]: [t] }], type: d, rules: [{ conditions: [{ [I]: f, [J]: [q, "ap-northeast-1"] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "ap-south-1"] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "ap-southeast-1"] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "ap-southeast-2"] }], endpoint: v, type: k }, { conditions: E, endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "ca-central-1"] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "eu-central-1"] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "eu-north-1"] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "eu-west-1"] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "eu-west-2"] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "eu-west-3"] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "sa-east-1"] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, j] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "us-east-2"] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "us-west-1"] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "us-west-2"] }], endpoint: v, type: k }, { endpoint: { url: l, [L]: { authSchemes: [{ name: h, signingName: i, signingRegion: "{Region}" }] }, [M]: w }, type: k }] }, { conditions: [t, { [I]: "parseURL", [J]: D, assign: "url" }], type: d, rules: [{ conditions: F, error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: m }, { type: d, rules: [{ conditions: G, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", type: m }, { endpoint: { url: u, [L]: w, [M]: w }, type: k }] }] }, { conditions: [x, y], type: d, rules: [{ conditions: [z, B], type: d, rules: [{ endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", [L]: w, [M]: w }, type: k }] }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", type: m }] }, { conditions: F, type: d, rules: [{ conditions: [z], type: d, rules: [{ type: d, rules: [{ conditions: [{ [I]: f, [J]: ["aws-us-gov", { [I]: n, [J]: [A, "name"] }] }], endpoint: C, type: k }, { endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dnsSuffix}", [L]: w, [M]: w }, type: k }] }] }, { error: "FIPS is enabled but this partition does not support FIPS", type: m }] }, { conditions: G, type: d, rules: [{ conditions: [B], type: d, rules: [{ endpoint: { url: "https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}", [L]: w, [M]: w }, type: k }] }, { error: "DualStack is enabled but this partition does not support DualStack", type: m }] }, { type: d, rules: [{ conditions: E, endpoint: { url: g, [L]: { authSchemes: [{ name: h, signingRegion: j, signingName: i }] }, [M]: w }, type: k }, { endpoint: C, type: k }] }] }] };
4
+ const G = "required", H = "type", I = "fn", J = "argv", K = "ref", L = "properties", M = "headers";
5
+ const a = false, b = true, c = "PartitionResult", d = "tree", e = "booleanEquals", f = "stringEquals", g = "sigv4", h = "us-east-1", i = "sts", j = "endpoint", k = "https://sts.{Region}.{PartitionResult#dnsSuffix}", l = "error", m = "getAttr", n = { [G]: false, [H]: "String" }, o = { [G]: true, "default": false, [H]: "Boolean" }, p = { [K]: "Region" }, q = { [K]: "UseFIPS" }, r = { [K]: "UseDualStack" }, s = { [I]: "isSet", [J]: [{ [K]: "Endpoint" }] }, t = { [K]: "Endpoint" }, u = { "url": "https://sts.amazonaws.com", [L]: { "authSchemes": [{ "name": g, "signingRegion": h, "signingName": i }] }, [M]: {} }, v = {}, w = { "conditions": [{ [I]: f, [J]: [p, "aws-global"] }], [j]: u, [H]: j }, x = { [I]: e, [J]: [q, true] }, y = { [I]: e, [J]: [r, true] }, z = { [I]: e, [J]: [true, { [I]: m, [J]: [{ [K]: c }, "supportsFIPS"] }] }, A = { [K]: c }, B = { [I]: e, [J]: [true, { [I]: m, [J]: [A, "supportsDualStack"] }] }, C = { "url": k, [L]: {}, [M]: {} }, D = [t], E = [x], F = [y];
6
+ const _data = { version: "1.0", parameters: { Region: n, UseDualStack: o, UseFIPS: o, Endpoint: n, UseGlobalEndpoint: o }, rules: [{ conditions: [{ [I]: "aws.partition", [J]: [p], assign: c }], [H]: d, rules: [{ conditions: [{ [I]: e, [J]: [{ [K]: "UseGlobalEndpoint" }, b] }, { [I]: e, [J]: [q, a] }, { [I]: e, [J]: [r, a] }, { [I]: "not", [J]: [s] }], [H]: d, rules: [{ conditions: [{ [I]: f, [J]: [p, "ap-northeast-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "ap-south-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "ap-southeast-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "ap-southeast-2"] }], endpoint: u, [H]: j }, w, { conditions: [{ [I]: f, [J]: [p, "ca-central-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "eu-central-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "eu-north-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "eu-west-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "eu-west-2"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "eu-west-3"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "sa-east-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, h] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "us-east-2"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "us-west-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "us-west-2"] }], endpoint: u, [H]: j }, { endpoint: { url: k, [L]: { authSchemes: [{ name: g, signingRegion: "{Region}", signingName: i }] }, [M]: v }, [H]: j }] }, { conditions: [s, { [I]: "parseURL", [J]: D, assign: "url" }], [H]: d, rules: [{ conditions: E, error: "Invalid Configuration: FIPS and custom endpoint are not supported", [H]: l }, { [H]: d, rules: [{ conditions: F, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", [H]: l }, { endpoint: { url: t, [L]: v, [M]: v }, [H]: j }] }] }, { conditions: [x, y], [H]: d, rules: [{ conditions: [z, B], [H]: d, rules: [{ endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", [L]: v, [M]: v }, [H]: j }] }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", [H]: l }] }, { conditions: E, [H]: d, rules: [{ conditions: [z], [H]: d, rules: [{ [H]: d, rules: [{ conditions: [{ [I]: f, [J]: ["aws-us-gov", { [I]: m, [J]: [A, "name"] }] }], endpoint: C, [H]: j }, { endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dnsSuffix}", [L]: v, [M]: v }, [H]: j }] }] }, { error: "FIPS is enabled but this partition does not support FIPS", [H]: l }] }, { conditions: F, [H]: d, rules: [{ conditions: [B], [H]: d, rules: [{ endpoint: { url: "https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}", [L]: v, [M]: v }, [H]: j }] }, { error: "DualStack is enabled but this partition does not support DualStack", [H]: l }] }, { [H]: d, rules: [w, { endpoint: C, [H]: j }] }] }] };
7
7
  exports.ruleSet = _data;
@@ -10,7 +10,6 @@ const invalid_dependency_1 = require("@aws-sdk/invalid-dependency");
10
10
  const util_body_length_browser_1 = require("@aws-sdk/util-body-length-browser");
11
11
  const util_retry_1 = require("@aws-sdk/util-retry");
12
12
  const util_user_agent_browser_1 = require("@aws-sdk/util-user-agent-browser");
13
- const util_utf8_browser_1 = require("@aws-sdk/util-utf8-browser");
14
13
  const runtimeConfig_shared_1 = require("./runtimeConfig.shared");
15
14
  const smithy_client_1 = require("@aws-sdk/smithy-client");
16
15
  const util_defaults_mode_browser_1 = require("@aws-sdk/util-defaults-mode-browser");
@@ -35,8 +34,6 @@ const getRuntimeConfig = (config) => {
35
34
  streamCollector: config?.streamCollector ?? fetch_http_handler_1.streamCollector,
36
35
  useDualstackEndpoint: config?.useDualstackEndpoint ?? (() => Promise.resolve(config_resolver_1.DEFAULT_USE_DUALSTACK_ENDPOINT)),
37
36
  useFipsEndpoint: config?.useFipsEndpoint ?? (() => Promise.resolve(config_resolver_1.DEFAULT_USE_FIPS_ENDPOINT)),
38
- utf8Decoder: config?.utf8Decoder ?? util_utf8_browser_1.fromUtf8,
39
- utf8Encoder: config?.utf8Encoder ?? util_utf8_browser_1.toUtf8,
40
37
  };
41
38
  };
42
39
  exports.getRuntimeConfig = getRuntimeConfig;
@@ -13,7 +13,6 @@ const node_http_handler_1 = require("@aws-sdk/node-http-handler");
13
13
  const util_body_length_node_1 = require("@aws-sdk/util-body-length-node");
14
14
  const util_retry_1 = require("@aws-sdk/util-retry");
15
15
  const util_user_agent_node_1 = require("@aws-sdk/util-user-agent-node");
16
- const util_utf8_node_1 = require("@aws-sdk/util-utf8-node");
17
16
  const runtimeConfig_shared_1 = require("./runtimeConfig.shared");
18
17
  const smithy_client_1 = require("@aws-sdk/smithy-client");
19
18
  const util_defaults_mode_node_1 = require("@aws-sdk/util-defaults-mode-node");
@@ -44,8 +43,6 @@ const getRuntimeConfig = (config) => {
44
43
  streamCollector: config?.streamCollector ?? node_http_handler_1.streamCollector,
45
44
  useDualstackEndpoint: config?.useDualstackEndpoint ?? (0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS),
46
45
  useFipsEndpoint: config?.useFipsEndpoint ?? (0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS),
47
- utf8Decoder: config?.utf8Decoder ?? util_utf8_node_1.fromUtf8,
48
- utf8Encoder: config?.utf8Encoder ?? util_utf8_node_1.toUtf8,
49
46
  };
50
47
  };
51
48
  exports.getRuntimeConfig = getRuntimeConfig;
@@ -4,6 +4,7 @@ exports.getRuntimeConfig = void 0;
4
4
  const smithy_client_1 = require("@aws-sdk/smithy-client");
5
5
  const url_parser_1 = require("@aws-sdk/url-parser");
6
6
  const util_base64_1 = require("@aws-sdk/util-base64");
7
+ const util_utf8_1 = require("@aws-sdk/util-utf8");
7
8
  const endpointResolver_1 = require("./endpoint/endpointResolver");
8
9
  const getRuntimeConfig = (config) => ({
9
10
  apiVersion: "2011-06-15",
@@ -14,5 +15,7 @@ const getRuntimeConfig = (config) => ({
14
15
  logger: config?.logger ?? new smithy_client_1.NoOpLogger(),
15
16
  serviceId: config?.serviceId ?? "STS",
16
17
  urlParser: config?.urlParser ?? url_parser_1.parseUrl,
18
+ utf8Decoder: config?.utf8Decoder ?? util_utf8_1.fromUtf8,
19
+ utf8Encoder: config?.utf8Encoder ?? util_utf8_1.toUtf8,
17
20
  });
18
21
  exports.getRuntimeConfig = getRuntimeConfig;
@@ -1,4 +1,4 @@
1
- const H = "required", I = "fn", J = "argv", K = "ref", L = "properties", M = "headers";
2
- const a = false, b = true, c = "PartitionResult", d = "tree", e = "booleanEquals", f = "stringEquals", g = "https://sts.amazonaws.com", h = "sigv4", i = "sts", j = "us-east-1", k = "endpoint", l = "https://sts.{Region}.{PartitionResult#dnsSuffix}", m = "error", n = "getAttr", o = { [H]: false, "type": "String" }, p = { [H]: true, "default": false, "type": "Boolean" }, q = { [K]: "Region" }, r = { [K]: "UseFIPS" }, s = { [K]: "UseDualStack" }, t = { [I]: "isSet", [J]: [{ [K]: "Endpoint" }] }, u = { [K]: "Endpoint" }, v = { "url": g, [L]: { "authSchemes": [{ "name": h, "signingName": i, "signingRegion": j }] }, [M]: {} }, w = {}, x = { [I]: e, [J]: [r, true] }, y = { [I]: e, [J]: [s, true] }, z = { [I]: e, [J]: [true, { [I]: n, [J]: [{ [K]: c }, "supportsFIPS"] }] }, A = { [K]: c }, B = { [I]: e, [J]: [true, { [I]: n, [J]: [A, "supportsDualStack"] }] }, C = { "url": l, [L]: {}, [M]: {} }, D = [u], E = [{ [I]: f, [J]: [q, "aws-global"] }], F = [x], G = [y];
3
- const _data = { version: "1.0", parameters: { Region: o, UseDualStack: p, UseFIPS: p, Endpoint: o, UseGlobalEndpoint: p }, rules: [{ conditions: [{ [I]: "aws.partition", [J]: [q], assign: c }], type: d, rules: [{ conditions: [{ [I]: e, [J]: [{ [K]: "UseGlobalEndpoint" }, b] }, { [I]: e, [J]: [r, a] }, { [I]: e, [J]: [s, a] }, { [I]: "not", [J]: [t] }], type: d, rules: [{ conditions: [{ [I]: f, [J]: [q, "ap-northeast-1"] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "ap-south-1"] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "ap-southeast-1"] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "ap-southeast-2"] }], endpoint: v, type: k }, { conditions: E, endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "ca-central-1"] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "eu-central-1"] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "eu-north-1"] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "eu-west-1"] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "eu-west-2"] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "eu-west-3"] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "sa-east-1"] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, j] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "us-east-2"] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "us-west-1"] }], endpoint: v, type: k }, { conditions: [{ [I]: f, [J]: [q, "us-west-2"] }], endpoint: v, type: k }, { endpoint: { url: l, [L]: { authSchemes: [{ name: h, signingName: i, signingRegion: "{Region}" }] }, [M]: w }, type: k }] }, { conditions: [t, { [I]: "parseURL", [J]: D, assign: "url" }], type: d, rules: [{ conditions: F, error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: m }, { type: d, rules: [{ conditions: G, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", type: m }, { endpoint: { url: u, [L]: w, [M]: w }, type: k }] }] }, { conditions: [x, y], type: d, rules: [{ conditions: [z, B], type: d, rules: [{ endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", [L]: w, [M]: w }, type: k }] }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", type: m }] }, { conditions: F, type: d, rules: [{ conditions: [z], type: d, rules: [{ type: d, rules: [{ conditions: [{ [I]: f, [J]: ["aws-us-gov", { [I]: n, [J]: [A, "name"] }] }], endpoint: C, type: k }, { endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dnsSuffix}", [L]: w, [M]: w }, type: k }] }] }, { error: "FIPS is enabled but this partition does not support FIPS", type: m }] }, { conditions: G, type: d, rules: [{ conditions: [B], type: d, rules: [{ endpoint: { url: "https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}", [L]: w, [M]: w }, type: k }] }, { error: "DualStack is enabled but this partition does not support DualStack", type: m }] }, { type: d, rules: [{ conditions: E, endpoint: { url: g, [L]: { authSchemes: [{ name: h, signingRegion: j, signingName: i }] }, [M]: w }, type: k }, { endpoint: C, type: k }] }] }] };
1
+ const G = "required", H = "type", I = "fn", J = "argv", K = "ref", L = "properties", M = "headers";
2
+ const a = false, b = true, c = "PartitionResult", d = "tree", e = "booleanEquals", f = "stringEquals", g = "sigv4", h = "us-east-1", i = "sts", j = "endpoint", k = "https://sts.{Region}.{PartitionResult#dnsSuffix}", l = "error", m = "getAttr", n = { [G]: false, [H]: "String" }, o = { [G]: true, "default": false, [H]: "Boolean" }, p = { [K]: "Region" }, q = { [K]: "UseFIPS" }, r = { [K]: "UseDualStack" }, s = { [I]: "isSet", [J]: [{ [K]: "Endpoint" }] }, t = { [K]: "Endpoint" }, u = { "url": "https://sts.amazonaws.com", [L]: { "authSchemes": [{ "name": g, "signingRegion": h, "signingName": i }] }, [M]: {} }, v = {}, w = { "conditions": [{ [I]: f, [J]: [p, "aws-global"] }], [j]: u, [H]: j }, x = { [I]: e, [J]: [q, true] }, y = { [I]: e, [J]: [r, true] }, z = { [I]: e, [J]: [true, { [I]: m, [J]: [{ [K]: c }, "supportsFIPS"] }] }, A = { [K]: c }, B = { [I]: e, [J]: [true, { [I]: m, [J]: [A, "supportsDualStack"] }] }, C = { "url": k, [L]: {}, [M]: {} }, D = [t], E = [x], F = [y];
3
+ const _data = { version: "1.0", parameters: { Region: n, UseDualStack: o, UseFIPS: o, Endpoint: n, UseGlobalEndpoint: o }, rules: [{ conditions: [{ [I]: "aws.partition", [J]: [p], assign: c }], [H]: d, rules: [{ conditions: [{ [I]: e, [J]: [{ [K]: "UseGlobalEndpoint" }, b] }, { [I]: e, [J]: [q, a] }, { [I]: e, [J]: [r, a] }, { [I]: "not", [J]: [s] }], [H]: d, rules: [{ conditions: [{ [I]: f, [J]: [p, "ap-northeast-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "ap-south-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "ap-southeast-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "ap-southeast-2"] }], endpoint: u, [H]: j }, w, { conditions: [{ [I]: f, [J]: [p, "ca-central-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "eu-central-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "eu-north-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "eu-west-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "eu-west-2"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "eu-west-3"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "sa-east-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, h] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "us-east-2"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "us-west-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "us-west-2"] }], endpoint: u, [H]: j }, { endpoint: { url: k, [L]: { authSchemes: [{ name: g, signingRegion: "{Region}", signingName: i }] }, [M]: v }, [H]: j }] }, { conditions: [s, { [I]: "parseURL", [J]: D, assign: "url" }], [H]: d, rules: [{ conditions: E, error: "Invalid Configuration: FIPS and custom endpoint are not supported", [H]: l }, { [H]: d, rules: [{ conditions: F, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", [H]: l }, { endpoint: { url: t, [L]: v, [M]: v }, [H]: j }] }] }, { conditions: [x, y], [H]: d, rules: [{ conditions: [z, B], [H]: d, rules: [{ endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", [L]: v, [M]: v }, [H]: j }] }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", [H]: l }] }, { conditions: E, [H]: d, rules: [{ conditions: [z], [H]: d, rules: [{ [H]: d, rules: [{ conditions: [{ [I]: f, [J]: ["aws-us-gov", { [I]: m, [J]: [A, "name"] }] }], endpoint: C, [H]: j }, { endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dnsSuffix}", [L]: v, [M]: v }, [H]: j }] }] }, { error: "FIPS is enabled but this partition does not support FIPS", [H]: l }] }, { conditions: F, [H]: d, rules: [{ conditions: [B], [H]: d, rules: [{ endpoint: { url: "https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}", [L]: v, [M]: v }, [H]: j }] }, { error: "DualStack is enabled but this partition does not support DualStack", [H]: l }] }, { [H]: d, rules: [w, { endpoint: C, [H]: j }] }] }] };
4
4
  export const ruleSet = _data;
@@ -6,7 +6,6 @@ import { invalidProvider } from "@aws-sdk/invalid-dependency";
6
6
  import { calculateBodyLength } from "@aws-sdk/util-body-length-browser";
7
7
  import { DEFAULT_MAX_ATTEMPTS, DEFAULT_RETRY_MODE } from "@aws-sdk/util-retry";
8
8
  import { defaultUserAgent } from "@aws-sdk/util-user-agent-browser";
9
- import { fromUtf8, toUtf8 } from "@aws-sdk/util-utf8-browser";
10
9
  import { getRuntimeConfig as getSharedRuntimeConfig } from "./runtimeConfig.shared";
11
10
  import { loadConfigsForDefaultMode } from "@aws-sdk/smithy-client";
12
11
  import { resolveDefaultsModeConfig } from "@aws-sdk/util-defaults-mode-browser";
@@ -31,7 +30,5 @@ export const getRuntimeConfig = (config) => {
31
30
  streamCollector: config?.streamCollector ?? streamCollector,
32
31
  useDualstackEndpoint: config?.useDualstackEndpoint ?? (() => Promise.resolve(DEFAULT_USE_DUALSTACK_ENDPOINT)),
33
32
  useFipsEndpoint: config?.useFipsEndpoint ?? (() => Promise.resolve(DEFAULT_USE_FIPS_ENDPOINT)),
34
- utf8Decoder: config?.utf8Decoder ?? fromUtf8,
35
- utf8Encoder: config?.utf8Encoder ?? toUtf8,
36
33
  };
37
34
  };
@@ -9,7 +9,6 @@ import { NodeHttpHandler as RequestHandler, streamCollector } from "@aws-sdk/nod
9
9
  import { calculateBodyLength } from "@aws-sdk/util-body-length-node";
10
10
  import { DEFAULT_RETRY_MODE } from "@aws-sdk/util-retry";
11
11
  import { defaultUserAgent } from "@aws-sdk/util-user-agent-node";
12
- import { fromUtf8, toUtf8 } from "@aws-sdk/util-utf8-node";
13
12
  import { getRuntimeConfig as getSharedRuntimeConfig } from "./runtimeConfig.shared";
14
13
  import { loadConfigsForDefaultMode } from "@aws-sdk/smithy-client";
15
14
  import { resolveDefaultsModeConfig } from "@aws-sdk/util-defaults-mode-node";
@@ -40,7 +39,5 @@ export const getRuntimeConfig = (config) => {
40
39
  streamCollector: config?.streamCollector ?? streamCollector,
41
40
  useDualstackEndpoint: config?.useDualstackEndpoint ?? loadNodeConfig(NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS),
42
41
  useFipsEndpoint: config?.useFipsEndpoint ?? loadNodeConfig(NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS),
43
- utf8Decoder: config?.utf8Decoder ?? fromUtf8,
44
- utf8Encoder: config?.utf8Encoder ?? toUtf8,
45
42
  };
46
43
  };
@@ -1,6 +1,7 @@
1
1
  import { NoOpLogger } from "@aws-sdk/smithy-client";
2
2
  import { parseUrl } from "@aws-sdk/url-parser";
3
3
  import { fromBase64, toBase64 } from "@aws-sdk/util-base64";
4
+ import { fromUtf8, toUtf8 } from "@aws-sdk/util-utf8";
4
5
  import { defaultEndpointResolver } from "./endpoint/endpointResolver";
5
6
  export const getRuntimeConfig = (config) => ({
6
7
  apiVersion: "2011-06-15",
@@ -11,4 +12,6 @@ export const getRuntimeConfig = (config) => ({
11
12
  logger: config?.logger ?? new NoOpLogger(),
12
13
  serviceId: config?.serviceId ?? "STS",
13
14
  urlParser: config?.urlParser ?? parseUrl,
15
+ utf8Decoder: config?.utf8Decoder ?? fromUtf8,
16
+ utf8Encoder: config?.utf8Encoder ?? toUtf8,
14
17
  });
@@ -18,11 +18,10 @@ import { STSClient } from "./STSClient";
18
18
  export declare class STS extends STSClient {
19
19
  /**
20
20
  * <p>Returns a set of temporary security credentials that you can use to access Amazon Web Services
21
- * resources that you might not normally have access to. These temporary credentials consist
22
- * of an access key ID, a secret access key, and a security token. Typically, you use
23
- * <code>AssumeRole</code> within your account or for cross-account access. For a
24
- * comparison of <code>AssumeRole</code> with other API operations that produce temporary
25
- * credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
21
+ * resources. These temporary credentials consist of an access key ID, a secret access key,
22
+ * and a security token. Typically, you use <code>AssumeRole</code> within your account or for
23
+ * cross-account access. For a comparison of <code>AssumeRole</code> with other API operations
24
+ * that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
26
25
  * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
27
26
  * Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
28
27
  * <p>
@@ -72,7 +71,6 @@ export declare class STS extends STSClient {
72
71
  * additional identity-based policy is required. For more information about trust policies and
73
72
  * resource-based policies, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html">IAM Policies</a> in the
74
73
  * <i>IAM User Guide</i>.</p>
75
- *
76
74
  * <p>
77
75
  * <b>Tags</b>
78
76
  * </p>
@@ -191,7 +189,6 @@ export declare class STS extends STSClient {
191
189
  * characters and the values can’t exceed 256 characters. For these and additional limits, see
192
190
  * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length">IAM
193
191
  * and STS Character Limits</a> in the <i>IAM User Guide</i>.</p>
194
- *
195
192
  * <note>
196
193
  * <p>An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs,
197
194
  * and session tags into a packed binary format that has a separate limit. Your request can
@@ -199,7 +196,6 @@ export declare class STS extends STSClient {
199
196
  * <code>PackedPolicySize</code> response element indicates by percentage how close the
200
197
  * policies and tags for your request are to the upper size limit.</p>
201
198
  * </note>
202
- *
203
199
  * <p>You can pass a session tag with the same key as a tag that is attached to the role. When
204
200
  * you do, session tags override the role's tags with the same key.</p>
205
201
  * <p>An administrator must grant you the permissions necessary to pass session tags. The
@@ -319,7 +315,6 @@ export declare class STS extends STSClient {
319
315
  * characters and the values can’t exceed 256 characters. For these and additional limits, see
320
316
  * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length">IAM
321
317
  * and STS Character Limits</a> in the <i>IAM User Guide</i>.</p>
322
- *
323
318
  * <note>
324
319
  * <p>An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs,
325
320
  * and session tags into a packed binary format that has a separate limit. Your request can
@@ -327,7 +322,6 @@ export declare class STS extends STSClient {
327
322
  * <code>PackedPolicySize</code> response element indicates by percentage how close the
328
323
  * policies and tags for your request are to the upper size limit.</p>
329
324
  * </note>
330
- *
331
325
  * <p>You can pass a session tag with the same key as a tag that is attached to the role. When
332
326
  * you do, the session tag overrides the role tag with the same key.</p>
333
327
  * <p>An administrator must grant you the permissions necessary to pass session tags. The
@@ -501,15 +495,16 @@ export declare class STS extends STSClient {
501
495
  * <b>Permissions</b>
502
496
  * </p>
503
497
  * <p>You can use the temporary credentials created by <code>GetFederationToken</code> in any
504
- * Amazon Web Services service except the following:</p>
498
+ * Amazon Web Services service with the following exceptions:</p>
505
499
  * <ul>
506
500
  * <li>
507
- * <p>You cannot call any IAM operations using the CLI or the Amazon Web Services API. </p>
501
+ * <p>You cannot call any IAM operations using the CLI or the Amazon Web Services API. This limitation does not apply to console sessions.</p>
508
502
  * </li>
509
503
  * <li>
510
504
  * <p>You cannot call any STS operations except <code>GetCallerIdentity</code>.</p>
511
505
  * </li>
512
506
  * </ul>
507
+ * <p>You can use temporary credentials for single sign-on (SSO) to the console.</p>
513
508
  * <p>You must pass an inline or managed <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">session policy</a> to
514
509
  * this operation. You can pass a single JSON policy document to use as an inline session
515
510
  * policy. You can also specify up to 10 managed policy Amazon Resource Names (ARNs) to use as
@@ -9,11 +9,10 @@ export interface AssumeRoleCommandOutput extends AssumeRoleResponse, __MetadataB
9
9
  }
10
10
  /**
11
11
  * <p>Returns a set of temporary security credentials that you can use to access Amazon Web Services
12
- * resources that you might not normally have access to. These temporary credentials consist
13
- * of an access key ID, a secret access key, and a security token. Typically, you use
14
- * <code>AssumeRole</code> within your account or for cross-account access. For a
15
- * comparison of <code>AssumeRole</code> with other API operations that produce temporary
16
- * credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
12
+ * resources. These temporary credentials consist of an access key ID, a secret access key,
13
+ * and a security token. Typically, you use <code>AssumeRole</code> within your account or for
14
+ * cross-account access. For a comparison of <code>AssumeRole</code> with other API operations
15
+ * that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
17
16
  * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
18
17
  * Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
19
18
  * <p>
@@ -63,7 +62,6 @@ export interface AssumeRoleCommandOutput extends AssumeRoleResponse, __MetadataB
63
62
  * additional identity-based policy is required. For more information about trust policies and
64
63
  * resource-based policies, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html">IAM Policies</a> in the
65
64
  * <i>IAM User Guide</i>.</p>
66
- *
67
65
  * <p>
68
66
  * <b>Tags</b>
69
67
  * </p>
@@ -87,7 +87,6 @@ export interface AssumeRoleWithSAMLCommandOutput extends AssumeRoleWithSAMLRespo
87
87
  * characters and the values can’t exceed 256 characters. For these and additional limits, see
88
88
  * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length">IAM
89
89
  * and STS Character Limits</a> in the <i>IAM User Guide</i>.</p>
90
- *
91
90
  * <note>
92
91
  * <p>An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs,
93
92
  * and session tags into a packed binary format that has a separate limit. Your request can
@@ -95,7 +94,6 @@ export interface AssumeRoleWithSAMLCommandOutput extends AssumeRoleWithSAMLRespo
95
94
  * <code>PackedPolicySize</code> response element indicates by percentage how close the
96
95
  * policies and tags for your request are to the upper size limit.</p>
97
96
  * </note>
98
- *
99
97
  * <p>You can pass a session tag with the same key as a tag that is attached to the role. When
100
98
  * you do, session tags override the role's tags with the same key.</p>
101
99
  * <p>An administrator must grant you the permissions necessary to pass session tags. The
@@ -79,7 +79,6 @@ export interface AssumeRoleWithWebIdentityCommandOutput extends AssumeRoleWithWe
79
79
  * characters and the values can’t exceed 256 characters. For these and additional limits, see
80
80
  * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length">IAM
81
81
  * and STS Character Limits</a> in the <i>IAM User Guide</i>.</p>
82
- *
83
82
  * <note>
84
83
  * <p>An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs,
85
84
  * and session tags into a packed binary format that has a separate limit. Your request can
@@ -87,7 +86,6 @@ export interface AssumeRoleWithWebIdentityCommandOutput extends AssumeRoleWithWe
87
86
  * <code>PackedPolicySize</code> response element indicates by percentage how close the
88
87
  * policies and tags for your request are to the upper size limit.</p>
89
88
  * </note>
90
- *
91
89
  * <p>You can pass a session tag with the same key as a tag that is attached to the role. When
92
90
  * you do, the session tag overrides the role tag with the same key.</p>
93
91
  * <p>An administrator must grant you the permissions necessary to pass session tags. The
@@ -42,15 +42,16 @@ export interface GetFederationTokenCommandOutput extends GetFederationTokenRespo
42
42
  * <b>Permissions</b>
43
43
  * </p>
44
44
  * <p>You can use the temporary credentials created by <code>GetFederationToken</code> in any
45
- * Amazon Web Services service except the following:</p>
45
+ * Amazon Web Services service with the following exceptions:</p>
46
46
  * <ul>
47
47
  * <li>
48
- * <p>You cannot call any IAM operations using the CLI or the Amazon Web Services API. </p>
48
+ * <p>You cannot call any IAM operations using the CLI or the Amazon Web Services API. This limitation does not apply to console sessions.</p>
49
49
  * </li>
50
50
  * <li>
51
51
  * <p>You cannot call any STS operations except <code>GetCallerIdentity</code>.</p>
52
52
  * </li>
53
53
  * </ul>
54
+ * <p>You can use temporary credentials for single sign-on (SSO) to the console.</p>
54
55
  * <p>You must pass an inline or managed <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">session policy</a> to
55
56
  * this operation. You can pass a single JSON policy document to use as an inline session
56
57
  * policy. You can also specify up to 10 managed policy Amazon Resource Names (ARNs) to use as
@@ -76,7 +76,6 @@ export interface AssumeRoleRequest {
76
76
  * plaintext that you use for both inline and managed session policies can't exceed 2,048
77
77
  * characters. For more information about ARNs, see <a href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and Amazon Web Services
78
78
  * Service Namespaces</a> in the Amazon Web Services General Reference.</p>
79
- *
80
79
  * <note>
81
80
  * <p>An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs,
82
81
  * and session tags into a packed binary format that has a separate limit. Your request can
@@ -84,7 +83,6 @@ export interface AssumeRoleRequest {
84
83
  * <code>PackedPolicySize</code> response element indicates by percentage how close the
85
84
  * policies and tags for your request are to the upper size limit.</p>
86
85
  * </note>
87
- *
88
86
  * <p>Passing policies to this operation returns new
89
87
  * temporary credentials. The resulting session's permissions are the intersection of the
90
88
  * role's identity-based policy and the session policies. You can use the role's temporary
@@ -110,7 +108,6 @@ export interface AssumeRoleRequest {
110
108
  * character to the end of the valid character list (\u0020 through \u00FF). It can also
111
109
  * include the tab (\u0009), linefeed (\u000A), and carriage return (\u000D)
112
110
  * characters.</p>
113
- *
114
111
  * <note>
115
112
  * <p>An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs,
116
113
  * and session tags into a packed binary format that has a separate limit. Your request can
@@ -156,7 +153,6 @@ export interface AssumeRoleRequest {
156
153
  * tag keys can’t exceed 128 characters, and the values can’t exceed 256 characters. For these
157
154
  * and additional limits, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length">IAM
158
155
  * and STS Character Limits</a> in the <i>IAM User Guide</i>.</p>
159
- *
160
156
  * <note>
161
157
  * <p>An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs,
162
158
  * and session tags into a packed binary format that has a separate limit. Your request can
@@ -164,7 +160,6 @@ export interface AssumeRoleRequest {
164
160
  * <code>PackedPolicySize</code> response element indicates by percentage how close the
165
161
  * policies and tags for your request are to the upper size limit.</p>
166
162
  * </note>
167
- *
168
163
  * <p>You can pass a session tag with the same key as a tag that is already attached to the
169
164
  * role. When you do, session tags override a role tag with the same key. </p>
170
165
  * <p>Tag key–value pairs are not case sensitive, but case is preserved. This means that you
@@ -276,7 +271,6 @@ export interface AssumeRoleResponse {
276
271
  /**
277
272
  * <p>The temporary security credentials, which include an access key ID, a secret access key,
278
273
  * and a security (or session) token.</p>
279
- *
280
274
  * <note>
281
275
  * <p>The size of the security token that STS API operations return is not fixed. We
282
276
  * strongly recommend that you make no assumptions about the maximum size.</p>
@@ -345,7 +339,7 @@ export declare class MalformedPolicyDocumentException extends __BaseException {
345
339
  * separate limit. The error message indicates by percentage how close the policies and
346
340
  * tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in
347
341
  * the <i>IAM User Guide</i>.</p>
348
- * <p>You could receive this error even though you meet other defined session policy and
342
+ * <p>You could receive this error even though you meet other defined session policy and
349
343
  * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
350
344
  * Character Limits</a> in the <i>IAM User Guide</i>.</p>
351
345
  */
@@ -395,7 +389,6 @@ export interface AssumeRoleWithSAMLRequest {
395
389
  * plaintext that you use for both inline and managed session policies can't exceed 2,048
396
390
  * characters. For more information about ARNs, see <a href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and Amazon Web Services
397
391
  * Service Namespaces</a> in the Amazon Web Services General Reference.</p>
398
- *
399
392
  * <note>
400
393
  * <p>An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs,
401
394
  * and session tags into a packed binary format that has a separate limit. Your request can
@@ -403,7 +396,6 @@ export interface AssumeRoleWithSAMLRequest {
403
396
  * <code>PackedPolicySize</code> response element indicates by percentage how close the
404
397
  * policies and tags for your request are to the upper size limit.</p>
405
398
  * </note>
406
- *
407
399
  * <p>Passing policies to this operation returns new
408
400
  * temporary credentials. The resulting session's permissions are the intersection of the
409
401
  * role's identity-based policy and the session policies. You can use the role's temporary
@@ -429,7 +421,6 @@ export interface AssumeRoleWithSAMLRequest {
429
421
  * character to the end of the valid character list (\u0020 through \u00FF). It can also
430
422
  * include the tab (\u0009), linefeed (\u000A), and carriage return (\u000D)
431
423
  * characters.</p>
432
- *
433
424
  * <note>
434
425
  * <p>An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs,
435
426
  * and session tags into a packed binary format that has a separate limit. Your request can
@@ -472,7 +463,6 @@ export interface AssumeRoleWithSAMLResponse {
472
463
  /**
473
464
  * <p>The temporary security credentials, which include an access key ID, a secret access key,
474
465
  * and a security (or session) token.</p>
475
- *
476
466
  * <note>
477
467
  * <p>The size of the security token that STS API operations return is not fixed. We
478
468
  * strongly recommend that you make no assumptions about the maximum size.</p>
@@ -558,7 +548,7 @@ export interface AssumeRoleWithSAMLResponse {
558
548
  /**
559
549
  * <p>The identity provider (IdP) reported that authentication failed. This might be because
560
550
  * the claim is invalid.</p>
561
- * <p>If this error is returned for the <code>AssumeRoleWithWebIdentity</code> operation, it
551
+ * <p>If this error is returned for the <code>AssumeRoleWithWebIdentity</code> operation, it
562
552
  * can also mean that the claim has expired or has been explicitly revoked. </p>
563
553
  */
564
554
  export declare class IDPRejectedClaimException extends __BaseException {
@@ -620,7 +610,6 @@ export interface AssumeRoleWithWebIdentityRequest {
620
610
  * plaintext that you use for both inline and managed session policies can't exceed 2,048
621
611
  * characters. For more information about ARNs, see <a href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and Amazon Web Services
622
612
  * Service Namespaces</a> in the Amazon Web Services General Reference.</p>
623
- *
624
613
  * <note>
625
614
  * <p>An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs,
626
615
  * and session tags into a packed binary format that has a separate limit. Your request can
@@ -628,7 +617,6 @@ export interface AssumeRoleWithWebIdentityRequest {
628
617
  * <code>PackedPolicySize</code> response element indicates by percentage how close the
629
618
  * policies and tags for your request are to the upper size limit.</p>
630
619
  * </note>
631
- *
632
620
  * <p>Passing policies to this operation returns new
633
621
  * temporary credentials. The resulting session's permissions are the intersection of the
634
622
  * role's identity-based policy and the session policies. You can use the role's temporary
@@ -654,7 +642,6 @@ export interface AssumeRoleWithWebIdentityRequest {
654
642
  * character to the end of the valid character list (\u0020 through \u00FF). It can also
655
643
  * include the tab (\u0009), linefeed (\u000A), and carriage return (\u000D)
656
644
  * characters.</p>
657
- *
658
645
  * <note>
659
646
  * <p>An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs,
660
647
  * and session tags into a packed binary format that has a separate limit. Your request can
@@ -694,7 +681,6 @@ export interface AssumeRoleWithWebIdentityResponse {
694
681
  /**
695
682
  * <p>The temporary security credentials, which include an access key ID, a secret access key,
696
683
  * and a security token.</p>
697
- *
698
684
  * <note>
699
685
  * <p>The size of the security token that STS API operations return is not fixed. We
700
686
  * strongly recommend that you make no assumptions about the maximum size.</p>
@@ -874,7 +860,6 @@ export interface GetFederationTokenRequest {
874
860
  * character to the end of the valid character list (\u0020 through \u00FF). It can also
875
861
  * include the tab (\u0009), linefeed (\u000A), and carriage return (\u000D)
876
862
  * characters.</p>
877
- *
878
863
  * <note>
879
864
  * <p>An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs,
880
865
  * and session tags into a packed binary format that has a separate limit. Your request can
@@ -908,7 +893,6 @@ export interface GetFederationTokenRequest {
908
893
  * <code>Principal</code> element of the policy, the session has the permissions allowed by
909
894
  * the policy. These permissions are granted in addition to the permissions that are granted
910
895
  * by the session policies.</p>
911
- *
912
896
  * <note>
913
897
  * <p>An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs,
914
898
  * and session tags into a packed binary format that has a separate limit. Your request can
@@ -935,7 +919,6 @@ export interface GetFederationTokenRequest {
935
919
  * tag keys can’t exceed 128 characters and the values can’t exceed 256 characters. For these
936
920
  * and additional limits, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length">IAM
937
921
  * and STS Character Limits</a> in the <i>IAM User Guide</i>.</p>
938
- *
939
922
  * <note>
940
923
  * <p>An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs,
941
924
  * and session tags into a packed binary format that has a separate limit. Your request can
@@ -943,7 +926,6 @@ export interface GetFederationTokenRequest {
943
926
  * <code>PackedPolicySize</code> response element indicates by percentage how close the
944
927
  * policies and tags for your request are to the upper size limit.</p>
945
928
  * </note>
946
- *
947
929
  * <p>You can pass a session tag with the same key as a tag that is already attached to the
948
930
  * user you are federating. When you do, session tags override a user tag with the same key. </p>
949
931
  * <p>Tag key–value pairs are not case sensitive, but case is preserved. This means that you
@@ -979,7 +961,6 @@ export interface GetFederationTokenResponse {
979
961
  /**
980
962
  * <p>The temporary security credentials, which include an access key ID, a secret access key,
981
963
  * and a security (or session) token.</p>
982
- *
983
964
  * <note>
984
965
  * <p>The size of the security token that STS API operations return is not fixed. We
985
966
  * strongly recommend that you make no assumptions about the maximum size.</p>
@@ -1041,7 +1022,6 @@ export interface GetSessionTokenResponse {
1041
1022
  /**
1042
1023
  * <p>The temporary security credentials, which include an access key ID, a secret access key,
1043
1024
  * and a security (or session) token.</p>
1044
- *
1045
1025
  * <note>
1046
1026
  * <p>The size of the security token that STS API operations return is not fixed. We
1047
1027
  * strongly recommend that you make no assumptions about the maximum size.</p>
@@ -17,12 +17,12 @@ export declare const getRuntimeConfig: (config: STSClientConfig) => {
17
17
  streamCollector: import("@aws-sdk/types").StreamCollector;
18
18
  useDualstackEndpoint: boolean | import("@aws-sdk/types").Provider<boolean>;
19
19
  useFipsEndpoint: boolean | import("@aws-sdk/types").Provider<boolean>;
20
- utf8Decoder: import("@aws-sdk/types").Decoder;
21
- utf8Encoder: import("@aws-sdk/types").Encoder;
22
20
  apiVersion: string;
23
21
  urlParser: import("@aws-sdk/types").UrlParser;
24
22
  base64Decoder: import("@aws-sdk/types").Decoder;
25
23
  base64Encoder: import("@aws-sdk/types").Encoder;
24
+ utf8Decoder: import("@aws-sdk/types").Decoder;
25
+ utf8Encoder: import("@aws-sdk/types").Encoder;
26
26
  disableHostPrefix: boolean;
27
27
  logger: import("@aws-sdk/types").Logger;
28
28
  serviceId: string;
@@ -17,12 +17,12 @@ export declare const getRuntimeConfig: (config: STSClientConfig) => {
17
17
  streamCollector: import("@aws-sdk/types").StreamCollector;
18
18
  useDualstackEndpoint: boolean | import("@aws-sdk/types").Provider<boolean>;
19
19
  useFipsEndpoint: boolean | import("@aws-sdk/types").Provider<boolean>;
20
- utf8Decoder: import("@aws-sdk/types").Decoder;
21
- utf8Encoder: import("@aws-sdk/types").Encoder;
22
20
  apiVersion: string;
23
21
  urlParser: import("@aws-sdk/types").UrlParser;
24
22
  base64Decoder: import("@aws-sdk/types").Decoder;
25
23
  base64Encoder: import("@aws-sdk/types").Encoder;
24
+ utf8Decoder: import("@aws-sdk/types").Decoder;
25
+ utf8Encoder: import("@aws-sdk/types").Encoder;
26
26
  disableHostPrefix: boolean;
27
27
  logger: import("@aws-sdk/types").Logger;
28
28
  serviceId: string;
@@ -13,4 +13,6 @@ export declare const getRuntimeConfig: (config: STSClientConfig) => {
13
13
  logger: import("@aws-sdk/types").Logger;
14
14
  serviceId: string;
15
15
  urlParser: import("@aws-sdk/types").UrlParser;
16
+ utf8Decoder: import("@aws-sdk/types").Decoder;
17
+ utf8Encoder: import("@aws-sdk/types").Encoder;
16
18
  };
@@ -27,12 +27,12 @@ export declare const getRuntimeConfig: (config: STSClientConfig) => {
27
27
  streamCollector: import("@aws-sdk/types").StreamCollector;
28
28
  useDualstackEndpoint: boolean | import("@aws-sdk/types").Provider<boolean>;
29
29
  useFipsEndpoint: boolean | import("@aws-sdk/types").Provider<boolean>;
30
- utf8Decoder: import("@aws-sdk/types").Decoder;
31
- utf8Encoder: import("@aws-sdk/types").Encoder;
32
30
  apiVersion: string;
33
31
  urlParser: import("@aws-sdk/types").UrlParser;
34
32
  base64Decoder: import("@aws-sdk/types").Decoder;
35
33
  base64Encoder: import("@aws-sdk/types").Encoder;
34
+ utf8Decoder: import("@aws-sdk/types").Decoder;
35
+ utf8Encoder: import("@aws-sdk/types").Encoder;
36
36
  disableHostPrefix: boolean;
37
37
  logger: import("@aws-sdk/types").Logger;
38
38
  serviceId: string;
@@ -25,12 +25,12 @@ export declare const getRuntimeConfig: (config: STSClientConfig) => {
25
25
  streamCollector: import("@aws-sdk/types").StreamCollector;
26
26
  useDualstackEndpoint: boolean | import("@aws-sdk/types").Provider<boolean>;
27
27
  useFipsEndpoint: boolean | import("@aws-sdk/types").Provider<boolean>;
28
- utf8Decoder: import("@aws-sdk/types").Decoder;
29
- utf8Encoder: import("@aws-sdk/types").Encoder;
30
28
  apiVersion: string;
31
29
  urlParser: import("@aws-sdk/types").UrlParser;
32
30
  base64Decoder: import("@aws-sdk/types").Decoder;
33
31
  base64Encoder: import("@aws-sdk/types").Encoder;
32
+ utf8Decoder: import("@aws-sdk/types").Decoder;
33
+ utf8Encoder: import("@aws-sdk/types").Encoder;
34
34
  disableHostPrefix: boolean;
35
35
  logger: import("@aws-sdk/types").Logger;
36
36
  serviceId: string;
@@ -13,4 +13,6 @@ export declare const getRuntimeConfig: (config: STSClientConfig) => {
13
13
  logger: import("@aws-sdk/types").Logger;
14
14
  serviceId: string;
15
15
  urlParser: import("@aws-sdk/types").UrlParser;
16
+ utf8Decoder: import("@aws-sdk/types").Decoder;
17
+ utf8Encoder: import("@aws-sdk/types").Encoder;
16
18
  };
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-sts",
3
3
  "description": "AWS SDK for JavaScript Sts Client for Node.js, Browser and React Native",
4
- "version": "3.257.0",
4
+ "version": "3.259.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "tsc -p tsconfig.cjs.json",
@@ -22,8 +22,8 @@
22
22
  "dependencies": {
23
23
  "@aws-crypto/sha256-browser": "3.0.0",
24
24
  "@aws-crypto/sha256-js": "3.0.0",
25
- "@aws-sdk/config-resolver": "3.257.0",
26
- "@aws-sdk/credential-provider-node": "3.257.0",
25
+ "@aws-sdk/config-resolver": "3.259.0",
26
+ "@aws-sdk/credential-provider-node": "3.259.0",
27
27
  "@aws-sdk/fetch-http-handler": "3.257.0",
28
28
  "@aws-sdk/hash-node": "3.257.0",
29
29
  "@aws-sdk/invalid-dependency": "3.257.0",
@@ -32,13 +32,13 @@
32
32
  "@aws-sdk/middleware-host-header": "3.257.0",
33
33
  "@aws-sdk/middleware-logger": "3.257.0",
34
34
  "@aws-sdk/middleware-recursion-detection": "3.257.0",
35
- "@aws-sdk/middleware-retry": "3.257.0",
35
+ "@aws-sdk/middleware-retry": "3.259.0",
36
36
  "@aws-sdk/middleware-sdk-sts": "3.257.0",
37
37
  "@aws-sdk/middleware-serde": "3.257.0",
38
38
  "@aws-sdk/middleware-signing": "3.257.0",
39
39
  "@aws-sdk/middleware-stack": "3.257.0",
40
40
  "@aws-sdk/middleware-user-agent": "3.257.0",
41
- "@aws-sdk/node-config-provider": "3.257.0",
41
+ "@aws-sdk/node-config-provider": "3.259.0",
42
42
  "@aws-sdk/node-http-handler": "3.257.0",
43
43
  "@aws-sdk/protocol-http": "3.257.0",
44
44
  "@aws-sdk/smithy-client": "3.257.0",
@@ -48,13 +48,12 @@
48
48
  "@aws-sdk/util-body-length-browser": "3.188.0",
49
49
  "@aws-sdk/util-body-length-node": "3.208.0",
50
50
  "@aws-sdk/util-defaults-mode-browser": "3.257.0",
51
- "@aws-sdk/util-defaults-mode-node": "3.257.0",
51
+ "@aws-sdk/util-defaults-mode-node": "3.259.0",
52
52
  "@aws-sdk/util-endpoints": "3.257.0",
53
53
  "@aws-sdk/util-retry": "3.257.0",
54
54
  "@aws-sdk/util-user-agent-browser": "3.257.0",
55
- "@aws-sdk/util-user-agent-node": "3.257.0",
56
- "@aws-sdk/util-utf8-browser": "3.188.0",
57
- "@aws-sdk/util-utf8-node": "3.208.0",
55
+ "@aws-sdk/util-user-agent-node": "3.259.0",
56
+ "@aws-sdk/util-utf8": "3.254.0",
58
57
  "fast-xml-parser": "4.0.11",
59
58
  "tslib": "^2.3.1"
60
59
  },