@aws-sdk/client-sts 3.30.0 → 3.34.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +35 -0
- package/dist/cjs/STSClient.js +12 -12
- package/dist/cjs/STSClient.js.map +1 -1
- package/dist/cjs/commands/AssumeRoleCommand.js +4 -4
- package/dist/cjs/commands/AssumeRoleCommand.js.map +1 -1
- package/dist/cjs/commands/AssumeRoleWithSAMLCommand.js +3 -3
- package/dist/cjs/commands/AssumeRoleWithSAMLCommand.js.map +1 -1
- package/dist/cjs/commands/AssumeRoleWithWebIdentityCommand.js +3 -3
- package/dist/cjs/commands/AssumeRoleWithWebIdentityCommand.js.map +1 -1
- package/dist/cjs/commands/DecodeAuthorizationMessageCommand.js +4 -4
- package/dist/cjs/commands/DecodeAuthorizationMessageCommand.js.map +1 -1
- package/dist/cjs/commands/GetAccessKeyInfoCommand.js +4 -4
- package/dist/cjs/commands/GetAccessKeyInfoCommand.js.map +1 -1
- package/dist/cjs/commands/GetCallerIdentityCommand.js +4 -4
- package/dist/cjs/commands/GetCallerIdentityCommand.js.map +1 -1
- package/dist/cjs/commands/GetFederationTokenCommand.js +4 -4
- package/dist/cjs/commands/GetFederationTokenCommand.js.map +1 -1
- package/dist/cjs/commands/GetSessionTokenCommand.js +4 -4
- package/dist/cjs/commands/GetSessionTokenCommand.js.map +1 -1
- package/dist/cjs/defaultRoleAssumers.js +4 -4
- package/dist/cjs/defaultRoleAssumers.js.map +1 -1
- package/dist/cjs/defaultRoleAssumers.spec.js +3 -3
- package/dist/cjs/defaultRoleAssumers.spec.js.map +1 -1
- package/dist/cjs/defaultStsRoleAssumers.js +2 -2
- package/dist/cjs/defaultStsRoleAssumers.js.map +1 -1
- package/dist/cjs/endpoints.js +1 -1
- package/dist/cjs/endpoints.js.map +1 -1
- package/dist/cjs/index.js +12 -12
- package/dist/cjs/index.js.map +1 -1
- package/dist/cjs/models/index.js +1 -1
- package/dist/cjs/models/index.js.map +1 -1
- package/dist/cjs/package.json +39 -39
- package/dist/cjs/protocols/Aws_query.js +40 -40
- package/dist/cjs/protocols/Aws_query.js.map +1 -1
- package/dist/cjs/runtimeConfig.browser.js +4 -4
- package/dist/cjs/runtimeConfig.browser.js.map +1 -1
- package/dist/cjs/runtimeConfig.js +8 -8
- package/dist/cjs/runtimeConfig.js.map +1 -1
- package/dist/cjs/runtimeConfig.native.js +1 -1
- package/dist/cjs/runtimeConfig.native.js.map +1 -1
- package/dist/es/STS.js +1 -8
- package/dist/es/STS.js.map +1 -1
- package/dist/es/STSClient.js +1 -13
- package/dist/es/STSClient.js.map +1 -1
- package/dist/es/commands/AssumeRoleCommand.js +2 -110
- package/dist/es/commands/AssumeRoleCommand.js.map +1 -1
- package/dist/es/commands/AssumeRoleWithSAMLCommand.js +2 -158
- package/dist/es/commands/AssumeRoleWithSAMLCommand.js.map +1 -1
- package/dist/es/commands/AssumeRoleWithWebIdentityCommand.js +2 -162
- package/dist/es/commands/AssumeRoleWithWebIdentityCommand.js.map +1 -1
- package/dist/es/commands/DecodeAuthorizationMessageCommand.js +2 -62
- package/dist/es/commands/DecodeAuthorizationMessageCommand.js.map +1 -1
- package/dist/es/commands/GetAccessKeyInfoCommand.js +2 -44
- package/dist/es/commands/GetAccessKeyInfoCommand.js.map +1 -1
- package/dist/es/commands/GetCallerIdentityCommand.js +2 -36
- package/dist/es/commands/GetCallerIdentityCommand.js.map +1 -1
- package/dist/es/commands/GetFederationTokenCommand.js +2 -165
- package/dist/es/commands/GetFederationTokenCommand.js.map +1 -1
- package/dist/es/commands/GetSessionTokenCommand.js +2 -78
- package/dist/es/commands/GetSessionTokenCommand.js.map +1 -1
- package/dist/es/defaultRoleAssumers.js +0 -16
- package/dist/es/defaultRoleAssumers.js.map +1 -1
- package/dist/es/defaultRoleAssumers.spec.js +9 -14
- package/dist/es/defaultRoleAssumers.spec.js.map +1 -1
- package/dist/es/defaultStsRoleAssumers.js +10 -31
- package/dist/es/defaultStsRoleAssumers.js.map +1 -1
- package/dist/es/endpoints.js +1 -1
- package/dist/es/endpoints.js.map +1 -1
- package/dist/es/models/models_0.js +0 -87
- package/dist/es/models/models_0.js.map +1 -1
- package/dist/es/package.json +39 -39
- package/dist/es/protocols/Aws_query.js +154 -156
- package/dist/es/protocols/Aws_query.js.map +1 -1
- package/dist/es/runtimeConfig.browser.js +0 -3
- package/dist/es/runtimeConfig.browser.js.map +1 -1
- package/dist/es/runtimeConfig.js +0 -3
- package/dist/es/runtimeConfig.js.map +1 -1
- package/dist/es/runtimeConfig.native.js +0 -3
- package/dist/es/runtimeConfig.native.js.map +1 -1
- package/dist/es/runtimeConfig.shared.js +0 -3
- package/dist/es/runtimeConfig.shared.js.map +1 -1
- package/dist/types/runtimeConfig.browser.d.ts +1 -0
- package/dist/types/runtimeConfig.d.ts +1 -0
- package/dist/types/runtimeConfig.native.d.ts +1 -0
- package/dist/types/ts3.4/runtimeConfig.browser.d.ts +1 -0
- package/dist/types/ts3.4/runtimeConfig.d.ts +1 -0
- package/dist/types/ts3.4/runtimeConfig.native.d.ts +1 -0
- package/package.json +39 -39
- package/protocols/Aws_query.ts +3 -1
- package/tsconfig.es.json +0 -2
- package/tsconfig.json +3 -5
- package/tsconfig.types.json +8 -0
|
@@ -4,89 +4,13 @@ import { deserializeAws_queryGetSessionTokenCommand, serializeAws_queryGetSessio
|
|
|
4
4
|
import { getSerdePlugin } from "@aws-sdk/middleware-serde";
|
|
5
5
|
import { getAwsAuthPlugin } from "@aws-sdk/middleware-signing";
|
|
6
6
|
import { Command as $Command } from "@aws-sdk/smithy-client";
|
|
7
|
-
|
|
8
|
-
* <p>Returns a set of temporary credentials for an Amazon Web Services account or IAM user. The
|
|
9
|
-
* credentials consist of an access key ID, a secret access key, and a security token.
|
|
10
|
-
* Typically, you use <code>GetSessionToken</code> if you want to use MFA to protect
|
|
11
|
-
* programmatic calls to specific Amazon Web Services API operations like Amazon EC2 <code>StopInstances</code>.
|
|
12
|
-
* MFA-enabled IAM users would need to call <code>GetSessionToken</code> and submit an MFA
|
|
13
|
-
* code that is associated with their MFA device. Using the temporary security credentials
|
|
14
|
-
* that are returned from the call, IAM users can then make programmatic calls to API
|
|
15
|
-
* operations that require MFA authentication. If you do not supply a correct MFA code, then
|
|
16
|
-
* the API returns an access denied error. For a comparison of <code>GetSessionToken</code>
|
|
17
|
-
* with the other API operations that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting
|
|
18
|
-
* Temporary Security Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
|
|
19
|
-
* STS API operations</a> in the <i>IAM User Guide</i>.</p>
|
|
20
|
-
* <p>
|
|
21
|
-
* <b>Session Duration</b>
|
|
22
|
-
* </p>
|
|
23
|
-
* <p>The <code>GetSessionToken</code> operation must be called by using the long-term Amazon Web Services
|
|
24
|
-
* security credentials of the Amazon Web Services account root user or an IAM user. Credentials that are
|
|
25
|
-
* created by IAM users are valid for the duration that you specify. This duration can range
|
|
26
|
-
* from 900 seconds (15 minutes) up to a maximum of 129,600 seconds (36 hours), with a default
|
|
27
|
-
* of 43,200 seconds (12 hours). Credentials based on account credentials can range from 900
|
|
28
|
-
* seconds (15 minutes) up to 3,600 seconds (1 hour), with a default of 1 hour. </p>
|
|
29
|
-
* <p>
|
|
30
|
-
* <b>Permissions</b>
|
|
31
|
-
* </p>
|
|
32
|
-
* <p>The temporary security credentials created by <code>GetSessionToken</code> can be used
|
|
33
|
-
* to make API calls to any Amazon Web Services service with the following exceptions:</p>
|
|
34
|
-
* <ul>
|
|
35
|
-
* <li>
|
|
36
|
-
* <p>You cannot call any IAM API operations unless MFA authentication information is
|
|
37
|
-
* included in the request.</p>
|
|
38
|
-
* </li>
|
|
39
|
-
* <li>
|
|
40
|
-
* <p>You cannot call any STS API <i>except</i>
|
|
41
|
-
* <code>AssumeRole</code> or <code>GetCallerIdentity</code>.</p>
|
|
42
|
-
* </li>
|
|
43
|
-
* </ul>
|
|
44
|
-
* <note>
|
|
45
|
-
* <p>We recommend that you do not call <code>GetSessionToken</code> with Amazon Web Services account
|
|
46
|
-
* root user credentials. Instead, follow our <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#create-iam-users">best practices</a> by
|
|
47
|
-
* creating one or more IAM users, giving them the necessary permissions, and using IAM
|
|
48
|
-
* users for everyday interaction with Amazon Web Services. </p>
|
|
49
|
-
* </note>
|
|
50
|
-
* <p>The credentials that are returned by <code>GetSessionToken</code> are based on
|
|
51
|
-
* permissions associated with the user whose credentials were used to call the operation. If
|
|
52
|
-
* <code>GetSessionToken</code> is called using Amazon Web Services account root user credentials, the
|
|
53
|
-
* temporary credentials have root user permissions. Similarly, if
|
|
54
|
-
* <code>GetSessionToken</code> is called using the credentials of an IAM user, the
|
|
55
|
-
* temporary credentials have the same permissions as the IAM user. </p>
|
|
56
|
-
* <p>For more information about using <code>GetSessionToken</code> to create temporary
|
|
57
|
-
* credentials, go to <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getsessiontoken">Temporary
|
|
58
|
-
* Credentials for Users in Untrusted Environments</a> in the
|
|
59
|
-
* <i>IAM User Guide</i>. </p>
|
|
60
|
-
* @example
|
|
61
|
-
* Use a bare-bones client and the command you need to make an API call.
|
|
62
|
-
* ```javascript
|
|
63
|
-
* import { STSClient, GetSessionTokenCommand } from "@aws-sdk/client-sts"; // ES Modules import
|
|
64
|
-
* // const { STSClient, GetSessionTokenCommand } = require("@aws-sdk/client-sts"); // CommonJS import
|
|
65
|
-
* const client = new STSClient(config);
|
|
66
|
-
* const command = new GetSessionTokenCommand(input);
|
|
67
|
-
* const response = await client.send(command);
|
|
68
|
-
* ```
|
|
69
|
-
*
|
|
70
|
-
* @see {@link GetSessionTokenCommandInput} for command's `input` shape.
|
|
71
|
-
* @see {@link GetSessionTokenCommandOutput} for command's `response` shape.
|
|
72
|
-
* @see {@link STSClientResolvedConfig | config} for command's `input` shape.
|
|
73
|
-
*
|
|
74
|
-
*/
|
|
75
|
-
var GetSessionTokenCommand = /** @class */ (function (_super) {
|
|
7
|
+
var GetSessionTokenCommand = (function (_super) {
|
|
76
8
|
__extends(GetSessionTokenCommand, _super);
|
|
77
|
-
// Start section: command_properties
|
|
78
|
-
// End section: command_properties
|
|
79
9
|
function GetSessionTokenCommand(input) {
|
|
80
|
-
var _this =
|
|
81
|
-
// Start section: command_constructor
|
|
82
|
-
_super.call(this) || this;
|
|
10
|
+
var _this = _super.call(this) || this;
|
|
83
11
|
_this.input = input;
|
|
84
12
|
return _this;
|
|
85
|
-
// End section: command_constructor
|
|
86
13
|
}
|
|
87
|
-
/**
|
|
88
|
-
* @internal
|
|
89
|
-
*/
|
|
90
14
|
GetSessionTokenCommand.prototype.resolveMiddleware = function (clientStack, configuration, options) {
|
|
91
15
|
this.middlewareStack.use(getSerdePlugin(configuration, this.serialize, this.deserialize));
|
|
92
16
|
this.middlewareStack.use(getAwsAuthPlugin(configuration));
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"GetSessionTokenCommand.js","sourceRoot":"","sources":["../../../commands/GetSessionTokenCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,sBAAsB,EAAE,uBAAuB,EAAE,MAAM,oBAAoB,CAAC;AACrF,OAAO,EACL,0CAA0C,EAC1C,wCAAwC,GACzC,MAAM,wBAAwB,CAAC;AAChC,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAC3D,OAAO,EAAE,gBAAgB,EAAE,MAAM,6BAA6B,CAAC;AAE/D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;
|
|
1
|
+
{"version":3,"file":"GetSessionTokenCommand.js","sourceRoot":"","sources":["../../../commands/GetSessionTokenCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,sBAAsB,EAAE,uBAAuB,EAAE,MAAM,oBAAoB,CAAC;AACrF,OAAO,EACL,0CAA0C,EAC1C,wCAAwC,GACzC,MAAM,wBAAwB,CAAC;AAChC,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAC3D,OAAO,EAAE,gBAAgB,EAAE,MAAM,6BAA6B,CAAC;AAE/D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAkF7D;IAA4C,0CAI3C;IAIC,gCAAqB,KAAkC;QAAvD,YAEE,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAA6B;;IAIvD,CAAC;IAKD,kDAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAC1F,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,gBAAgB,CAAC,aAAa,CAAC,CAAC,CAAC;QAE1D,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,wBAAwB,CAAC;QAC7C,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,sBAAsB,CAAC,kBAAkB;YAClE,wBAAwB,EAAE,uBAAuB,CAAC,kBAAkB;SACrE,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,0CAAS,GAAjB,UAAkB,KAAkC,EAAE,OAAuB;QAC3E,OAAO,wCAAwC,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IAClE,CAAC;IAEO,4CAAW,GAAnB,UAAoB,MAAsB,EAAE,OAAuB;QACjE,OAAO,0CAA0C,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IACrE,CAAC;IAIH,6BAAC;AAAD,CAAC,AAvDD,CAA4C,QAAQ,GAuDnD"}
|
|
@@ -1,30 +1,14 @@
|
|
|
1
1
|
import { __assign } from "tslib";
|
|
2
|
-
// Please do not touch this file. It's generated from template in:
|
|
3
|
-
// https://github.com/aws/aws-sdk-js-v3/blob/main/codegen/smithy-aws-typescript-codegen/src/main/resources/software/amazon/smithy/aws/typescript/codegen/sts-client-defaultRoleAssumers.ts
|
|
4
2
|
import { getDefaultRoleAssumer as StsGetDefaultRoleAssumer, getDefaultRoleAssumerWithWebIdentity as StsGetDefaultRoleAssumerWithWebIdentity, } from "./defaultStsRoleAssumers";
|
|
5
3
|
import { STSClient } from "./STSClient";
|
|
6
|
-
/**
|
|
7
|
-
* The default role assumer that used by credential providers when sts:AssumeRole API is needed.
|
|
8
|
-
*/
|
|
9
4
|
export var getDefaultRoleAssumer = function (stsOptions) {
|
|
10
5
|
if (stsOptions === void 0) { stsOptions = {}; }
|
|
11
6
|
return StsGetDefaultRoleAssumer(stsOptions, STSClient);
|
|
12
7
|
};
|
|
13
|
-
/**
|
|
14
|
-
* The default role assumer that used by credential providers when sts:AssumeRoleWithWebIdentity API is needed.
|
|
15
|
-
*/
|
|
16
8
|
export var getDefaultRoleAssumerWithWebIdentity = function (stsOptions) {
|
|
17
9
|
if (stsOptions === void 0) { stsOptions = {}; }
|
|
18
10
|
return StsGetDefaultRoleAssumerWithWebIdentity(stsOptions, STSClient);
|
|
19
11
|
};
|
|
20
|
-
/**
|
|
21
|
-
* The default credential providers depend STS client to assume role with desired API: sts:assumeRole,
|
|
22
|
-
* sts:assumeRoleWithWebIdentity, etc. This function decorates the default credential provider with role assumers which
|
|
23
|
-
* encapsulates the process of calling STS commands. This can only be imported by AWS client packages to avoid circular
|
|
24
|
-
* dependencies.
|
|
25
|
-
*
|
|
26
|
-
* @internal
|
|
27
|
-
*/
|
|
28
12
|
export var decorateDefaultCredentialProvider = function (provider) {
|
|
29
13
|
return function (input) {
|
|
30
14
|
return provider(__assign({ roleAssumer: getDefaultRoleAssumer(input), roleAssumerWithWebIdentity: getDefaultRoleAssumerWithWebIdentity(input) }, input));
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"defaultRoleAssumers.js","sourceRoot":"","sources":["../../defaultRoleAssumers.ts"],"names":[],"mappings":";
|
|
1
|
+
{"version":3,"file":"defaultRoleAssumers.js","sourceRoot":"","sources":["../../defaultRoleAssumers.ts"],"names":[],"mappings":";AAEA,OAAO,EAEL,qBAAqB,IAAI,wBAAwB,EACjD,oCAAoC,IAAI,uCAAuC,GAGhF,MAAM,0BAA0B,CAAC;AAClC,OAAO,EAAE,SAAS,EAAmB,MAAM,aAAa,CAAC;AAKzD,MAAM,CAAC,IAAM,qBAAqB,GAAG,UACnC,UAA8E;IAA9E,2BAAA,EAAA,eAA8E;IAC9D,OAAA,wBAAwB,CAAC,UAAU,EAAE,SAAS,CAAC;AAA/C,CAA+C,CAAC;AAKlE,MAAM,CAAC,IAAM,oCAAoC,GAAG,UAClD,UAA8E;IAA9E,2BAAA,EAAA,eAA8E;IAC/C,OAAA,uCAAuC,CAAC,UAAU,EAAE,SAAS,CAAC;AAA9D,CAA8D,CAAC;AAUhG,MAAM,CAAC,IAAM,iCAAiC,GAC5C,UAAC,QAAmC;IACpC,OAAA,UAAC,KAAU;QACT,OAAA,QAAQ,YACN,WAAW,EAAE,qBAAqB,CAAC,KAAK,CAAC,EACzC,0BAA0B,EAAE,oCAAoC,CAAC,KAAK,CAAC,IACpE,KAAK,EACR;IAJF,CAIE;AALJ,CAKI,CAAC"}
|
|
@@ -1,6 +1,4 @@
|
|
|
1
1
|
import { __awaiter, __generator } from "tslib";
|
|
2
|
-
// Please do not touch this file. It's generated from template in:
|
|
3
|
-
// https://github.com/aws/aws-sdk-js-v3/blob/main/codegen/smithy-aws-typescript-codegen/src/main/resources/software/amazon/smithy/aws/typescript/codegen/sts-client-defaultRoleAssumers.spec.ts
|
|
4
2
|
import { HttpResponse } from "@aws-sdk/protocol-http";
|
|
5
3
|
import { Readable } from "stream";
|
|
6
4
|
var mockHandle = jest.fn().mockResolvedValue({
|
|
@@ -22,7 +20,6 @@ var mockConstructorInput = jest.fn();
|
|
|
22
20
|
jest.mock("./STSClient", function () { return ({
|
|
23
21
|
STSClient: function (params) {
|
|
24
22
|
mockConstructorInput(params);
|
|
25
|
-
//@ts-ignore
|
|
26
23
|
return new (jest.requireActual("./STSClient").STSClient)(params);
|
|
27
24
|
},
|
|
28
25
|
}); });
|
|
@@ -30,7 +27,7 @@ describe("getDefaultRoleAssumer", function () {
|
|
|
30
27
|
var assumeRoleResponse = "<AssumeRoleResponse xmlns=\"https://sts.amazonaws.com/doc/2011-06-15/\">\n<AssumeRoleResult>\n <AssumedRoleUser>\n <AssumedRoleId>AROAZOX2IL27GNRBJHWC2:session</AssumedRoleId>\n <Arn>arn:aws:sts::123:assumed-role/assume-role-test/session</Arn>\n </AssumedRoleUser>\n <Credentials>\n <AccessKeyId>key</AccessKeyId>\n <SecretAccessKey>secrete</SecretAccessKey>\n <SessionToken>session-token</SessionToken>\n <Expiration>2021-05-05T23:22:08Z</Expiration>\n </Credentials>\n</AssumeRoleResult>\n<ResponseMetadata>\n <RequestId>12345678id</RequestId>\n</ResponseMetadata>\n</AssumeRoleResponse>";
|
|
31
28
|
beforeAll(function () {
|
|
32
29
|
streamCollector.mockImplementation(function () { return __awaiter(void 0, void 0, void 0, function () { return __generator(this, function (_a) {
|
|
33
|
-
return [2
|
|
30
|
+
return [2, Buffer.from(assumeRoleResponse)];
|
|
34
31
|
}); }); });
|
|
35
32
|
});
|
|
36
33
|
beforeEach(function () {
|
|
@@ -48,20 +45,18 @@ describe("getDefaultRoleAssumer", function () {
|
|
|
48
45
|
RoleSessionName: "session",
|
|
49
46
|
};
|
|
50
47
|
sourceCred1 = { accessKeyId: "key1", secretAccessKey: "secrete1" };
|
|
51
|
-
return [4
|
|
48
|
+
return [4, roleAssumer(sourceCred1, params)];
|
|
52
49
|
case 1:
|
|
53
50
|
_c.sent();
|
|
54
51
|
expect(mockHandle).toBeCalledTimes(1);
|
|
55
|
-
// Validate request is signed by sourceCred1
|
|
56
52
|
expect((_a = mockHandle.mock.calls[0][0].headers) === null || _a === void 0 ? void 0 : _a.authorization).toEqual(expect.stringContaining("AWS4-HMAC-SHA256 Credential=key1/"));
|
|
57
53
|
sourceCred2 = { accessKeyId: "key2", secretAccessKey: "secrete1" };
|
|
58
|
-
return [4
|
|
54
|
+
return [4, roleAssumer(sourceCred2, params)];
|
|
59
55
|
case 2:
|
|
60
56
|
_c.sent();
|
|
61
|
-
// Validate request is signed by sourceCred2
|
|
62
57
|
expect(mockHandle).toBeCalledTimes(2);
|
|
63
58
|
expect((_b = mockHandle.mock.calls[1][0].headers) === null || _b === void 0 ? void 0 : _b.authorization).toEqual(expect.stringContaining("AWS4-HMAC-SHA256 Credential=key2/"));
|
|
64
|
-
return [2
|
|
59
|
+
return [2];
|
|
65
60
|
}
|
|
66
61
|
});
|
|
67
62
|
}); });
|
|
@@ -83,7 +78,7 @@ describe("getDefaultRoleAssumer", function () {
|
|
|
83
78
|
RoleSessionName: "session",
|
|
84
79
|
};
|
|
85
80
|
sourceCred = { accessKeyId: "key", secretAccessKey: "secrete" };
|
|
86
|
-
return [4
|
|
81
|
+
return [4, roleAssumer(sourceCred, params)];
|
|
87
82
|
case 1:
|
|
88
83
|
_a.sent();
|
|
89
84
|
expect(mockConstructorInput).toHaveBeenCalledTimes(1);
|
|
@@ -92,7 +87,7 @@ describe("getDefaultRoleAssumer", function () {
|
|
|
92
87
|
requestHandler: handler,
|
|
93
88
|
region: region,
|
|
94
89
|
});
|
|
95
|
-
return [2
|
|
90
|
+
return [2];
|
|
96
91
|
}
|
|
97
92
|
});
|
|
98
93
|
}); });
|
|
@@ -101,7 +96,7 @@ describe("getDefaultRoleAssumerWithWebIdentity", function () {
|
|
|
101
96
|
var assumeRoleResponse = "<Response xmlns=\"https://sts.amazonaws.com/doc/2011-06-15/\">\n <AssumeRoleWithWebIdentityResult>\n <Credentials>\n <AccessKeyId>key</AccessKeyId>\n <SecretAccessKey>secrete</SecretAccessKey>\n <SessionToken>session-token</SessionToken>\n <Expiration>2021-05-05T23:22:08Z</Expiration>\n </Credentials>\n </AssumeRoleWithWebIdentityResult>\n </Response>";
|
|
102
97
|
beforeAll(function () {
|
|
103
98
|
streamCollector.mockImplementation(function () { return __awaiter(void 0, void 0, void 0, function () { return __generator(this, function (_a) {
|
|
104
|
-
return [2
|
|
99
|
+
return [2, Buffer.from(assumeRoleResponse)];
|
|
105
100
|
}); }); });
|
|
106
101
|
});
|
|
107
102
|
beforeEach(function () {
|
|
@@ -125,7 +120,7 @@ describe("getDefaultRoleAssumerWithWebIdentity", function () {
|
|
|
125
120
|
RoleSessionName: "session",
|
|
126
121
|
WebIdentityToken: "token",
|
|
127
122
|
};
|
|
128
|
-
return [4
|
|
123
|
+
return [4, roleAssumerWithWebIdentity(params)];
|
|
129
124
|
case 1:
|
|
130
125
|
_a.sent();
|
|
131
126
|
expect(mockConstructorInput).toHaveBeenCalledTimes(1);
|
|
@@ -134,7 +129,7 @@ describe("getDefaultRoleAssumerWithWebIdentity", function () {
|
|
|
134
129
|
requestHandler: handler,
|
|
135
130
|
region: region,
|
|
136
131
|
});
|
|
137
|
-
return [2
|
|
132
|
+
return [2];
|
|
138
133
|
}
|
|
139
134
|
});
|
|
140
135
|
}); });
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"defaultRoleAssumers.spec.js","sourceRoot":"","sources":["../../defaultRoleAssumers.spec.ts"],"names":[],"mappings":";
|
|
1
|
+
{"version":3,"file":"defaultRoleAssumers.spec.js","sourceRoot":"","sources":["../../defaultRoleAssumers.spec.ts"],"names":[],"mappings":";AAEA,OAAO,EAAE,YAAY,EAAE,MAAM,wBAAwB,CAAC;AACtD,OAAO,EAAE,QAAQ,EAAE,MAAM,QAAQ,CAAC;AAElC,IAAM,UAAU,GAAG,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;IAC7C,QAAQ,EAAE,IAAI,YAAY,CAAC;QACzB,UAAU,EAAE,GAAG;QACf,IAAI,EAAE,QAAQ,CAAC,IAAI,CAAC,CAAC,EAAE,CAAC,CAAC;KAC1B,CAAC;CACH,CAAC,CAAC;AACH,IAAI,CAAC,IAAI,CAAC,4BAA4B,EAAE,cAAM,OAAA,CAAC;IAC7C,eAAe,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,kBAAkB,CAAC,cAAM,OAAA,CAAC;QACnD,OAAO,EAAE,cAAO,CAAC;QACjB,MAAM,EAAE,UAAU;KACnB,CAAC,EAHkD,CAGlD,CAAC;IACH,eAAe,EAAE,IAAI,CAAC,EAAE,EAAE;CAC3B,CAAC,EAN4C,CAM5C,CAAC,CAAC;AAEJ,OAAO,EAAE,qBAAqB,EAAE,oCAAoC,EAAE,MAAM,uBAAuB,CAAC;AAEpG,OAAO,EAAE,eAAe,EAAE,eAAe,EAAE,MAAM,4BAA4B,CAAC;AAE9E,IAAM,oBAAoB,GAAG,IAAI,CAAC,EAAE,EAAE,CAAC;AACvC,IAAI,CAAC,IAAI,CAAC,aAAa,EAAE,cAAM,OAAA,CAAC;IAC9B,SAAS,EAAE,UAAU,MAAW;QAC9B,oBAAoB,CAAC,MAAM,CAAC,CAAC;QAE7B,OAAO,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC,SAAS,CAAC,CAAC,MAAM,CAAC,CAAC;IACnE,CAAC;CACF,CAAC,EAN6B,CAM7B,CAAC,CAAC;AAEJ,QAAQ,CAAC,uBAAuB,EAAE;IAChC,IAAM,kBAAkB,GAAG,smBAgBP,CAAC;IAErB,SAAS,CAAC;QACP,eAA6B,CAAC,kBAAkB,CAAC;YAAY,WAAA,MAAM,CAAC,IAAI,CAAC,kBAAkB,CAAC,EAAA;iBAAA,CAAC,CAAC;IACjG,CAAC,CAAC,CAAC;IAEH,UAAU,CAAC;QACT,IAAI,CAAC,aAAa,EAAE,CAAC;IACvB,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,wCAAwC,EAAE;;;;;;oBACrC,WAAW,GAAG,qBAAqB,EAAE,CAAC;oBACtC,MAAM,GAA2B;wBACrC,OAAO,EAAE,aAAa;wBACtB,eAAe,EAAE,SAAS;qBAC3B,CAAC;oBACI,WAAW,GAAG,EAAE,WAAW,EAAE,MAAM,EAAE,eAAe,EAAE,UAAU,EAAE,CAAC;oBACzE,WAAM,WAAW,CAAC,WAAW,EAAE,MAAM,CAAC,EAAA;;oBAAtC,SAAsC,CAAC;oBACvC,MAAM,CAAC,UAAU,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC;oBAEtC,MAAM,CAAC,MAAA,UAAU,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,OAAO,0CAAE,aAAa,CAAC,CAAC,OAAO,CAChE,MAAM,CAAC,gBAAgB,CAAC,mCAAmC,CAAC,CAC7D,CAAC;oBACI,WAAW,GAAG,EAAE,WAAW,EAAE,MAAM,EAAE,eAAe,EAAE,UAAU,EAAE,CAAC;oBACzE,WAAM,WAAW,CAAC,WAAW,EAAE,MAAM,CAAC,EAAA;;oBAAtC,SAAsC,CAAC;oBAEvC,MAAM,CAAC,UAAU,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC;oBACtC,MAAM,CAAC,MAAA,UAAU,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,OAAO,0CAAE,aAAa,CAAC,CAAC,OAAO,CAChE,MAAM,CAAC,gBAAgB,CAAC,mCAAmC,CAAC,CAC7D,CAAC;;;;SACH,CAAC,CAAC;IAEH,EAAE,CAAC,kCAAkC,EAAE;;;;;oBAC/B,MAAM,GAAG,OAAO,CAAC;oBACjB,MAAM,GAAG,aAAa,CAAC;oBACvB,OAAO,GAAG,IAAI,eAAe,EAAE,CAAC;oBAChC,WAAW,GAAG,qBAAqB,CAAC;wBACxC,MAAM,QAAA;wBACN,MAAM,QAAA;wBACN,cAAc,EAAE,OAAO;qBACxB,CAAC,CAAC;oBACG,MAAM,GAA2B;wBACrC,OAAO,EAAE,aAAa;wBACtB,eAAe,EAAE,SAAS;qBAC3B,CAAC;oBACI,UAAU,GAAG,EAAE,WAAW,EAAE,KAAK,EAAE,eAAe,EAAE,SAAS,EAAE,CAAC;oBACtE,WAAM,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,EAAA;;oBAArC,SAAqC,CAAC;oBACtC,MAAM,CAAC,oBAAoB,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAC;oBACtD,MAAM,CAAC,oBAAoB,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC;wBAC1D,MAAM,QAAA;wBACN,cAAc,EAAE,OAAO;wBACvB,MAAM,QAAA;qBACP,CAAC,CAAC;;;;SACJ,CAAC,CAAC;AACL,CAAC,CAAC,CAAC;AAEH,QAAQ,CAAC,sCAAsC,EAAE;IAC/C,IAAM,kBAAkB,GAAG,gYASf,CAAC;IAEb,SAAS,CAAC;QACP,eAA6B,CAAC,kBAAkB,CAAC;YAAY,WAAA,MAAM,CAAC,IAAI,CAAC,kBAAkB,CAAC,EAAA;iBAAA,CAAC,CAAC;IACjG,CAAC,CAAC,CAAC;IAEH,UAAU,CAAC;QACT,IAAI,CAAC,aAAa,EAAE,CAAC;IACvB,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,kCAAkC,EAAE;;;;;oBAC/B,MAAM,GAAG,OAAO,CAAC;oBACjB,MAAM,GAAG,aAAa,CAAC;oBACvB,OAAO,GAAG,IAAI,eAAe,EAAE,CAAC;oBAChC,0BAA0B,GAAG,oCAAoC,CAAC;wBACtE,MAAM,QAAA;wBACN,MAAM,QAAA;wBACN,cAAc,EAAE,OAAO;qBACxB,CAAC,CAAC;oBACG,MAAM,GAA0C;wBACpD,OAAO,EAAE,aAAa;wBACtB,eAAe,EAAE,SAAS;wBAC1B,gBAAgB,EAAE,OAAO;qBAC1B,CAAC;oBACF,WAAM,0BAA0B,CAAC,MAAM,CAAC,EAAA;;oBAAxC,SAAwC,CAAC;oBACzC,MAAM,CAAC,oBAAoB,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAC;oBACtD,MAAM,CAAC,oBAAoB,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC;wBAC1D,MAAM,QAAA;wBACN,cAAc,EAAE,OAAO;wBACvB,MAAM,QAAA;qBACP,CAAC,CAAC;;;;SACJ,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
|
|
@@ -2,9 +2,6 @@ import { __assign, __awaiter, __generator } from "tslib";
|
|
|
2
2
|
import { AssumeRoleCommand } from "./commands/AssumeRoleCommand";
|
|
3
3
|
import { AssumeRoleWithWebIdentityCommand, } from "./commands/AssumeRoleWithWebIdentityCommand";
|
|
4
4
|
var ASSUME_ROLE_DEFAULT_REGION = "us-east-1";
|
|
5
|
-
/**
|
|
6
|
-
* Inject the fallback STS region of us-east-1.
|
|
7
|
-
*/
|
|
8
5
|
var decorateDefaultRegion = function (region) {
|
|
9
6
|
if (typeof region !== "function") {
|
|
10
7
|
return region === undefined ? ASSUME_ROLE_DEFAULT_REGION : region;
|
|
@@ -15,20 +12,16 @@ var decorateDefaultRegion = function (region) {
|
|
|
15
12
|
switch (_a.label) {
|
|
16
13
|
case 0:
|
|
17
14
|
_a.trys.push([0, 2, , 3]);
|
|
18
|
-
return [4
|
|
19
|
-
case 1: return [2
|
|
15
|
+
return [4, region()];
|
|
16
|
+
case 1: return [2, _a.sent()];
|
|
20
17
|
case 2:
|
|
21
18
|
e_1 = _a.sent();
|
|
22
|
-
return [2
|
|
23
|
-
case 3: return [2
|
|
19
|
+
return [2, ASSUME_ROLE_DEFAULT_REGION];
|
|
20
|
+
case 3: return [2];
|
|
24
21
|
}
|
|
25
22
|
});
|
|
26
23
|
}); };
|
|
27
24
|
};
|
|
28
|
-
/**
|
|
29
|
-
* The default role assumer that used by credential providers when sts:AssumeRole API is needed.
|
|
30
|
-
* @internal
|
|
31
|
-
*/
|
|
32
25
|
export var getDefaultRoleAssumer = function (stsOptions, stsClientCtor) {
|
|
33
26
|
var stsClient;
|
|
34
27
|
var closureSourceCreds;
|
|
@@ -40,19 +33,17 @@ export var getDefaultRoleAssumer = function (stsOptions, stsClientCtor) {
|
|
|
40
33
|
closureSourceCreds = sourceCreds;
|
|
41
34
|
if (!stsClient) {
|
|
42
35
|
logger = stsOptions.logger, region = stsOptions.region, requestHandler = stsOptions.requestHandler;
|
|
43
|
-
stsClient = new stsClientCtor(__assign({ logger: logger,
|
|
44
|
-
|
|
45
|
-
credentialDefaultProvider: function () { return function () { return __awaiter(void 0, void 0, void 0, function () { return __generator(this, function (_a) {
|
|
46
|
-
return [2 /*return*/, closureSourceCreds];
|
|
36
|
+
stsClient = new stsClientCtor(__assign({ logger: logger, credentialDefaultProvider: function () { return function () { return __awaiter(void 0, void 0, void 0, function () { return __generator(this, function (_a) {
|
|
37
|
+
return [2, closureSourceCreds];
|
|
47
38
|
}); }); }; }, region: decorateDefaultRegion(region || stsOptions.region) }, (requestHandler ? { requestHandler: requestHandler } : {})));
|
|
48
39
|
}
|
|
49
|
-
return [4
|
|
40
|
+
return [4, stsClient.send(new AssumeRoleCommand(params))];
|
|
50
41
|
case 1:
|
|
51
42
|
Credentials = (_a.sent()).Credentials;
|
|
52
43
|
if (!Credentials || !Credentials.AccessKeyId || !Credentials.SecretAccessKey) {
|
|
53
44
|
throw new Error("Invalid response from STS.assumeRole call with role " + params.RoleArn);
|
|
54
45
|
}
|
|
55
|
-
return [2
|
|
46
|
+
return [2, {
|
|
56
47
|
accessKeyId: Credentials.AccessKeyId,
|
|
57
48
|
secretAccessKey: Credentials.SecretAccessKey,
|
|
58
49
|
sessionToken: Credentials.SessionToken,
|
|
@@ -62,10 +53,6 @@ export var getDefaultRoleAssumer = function (stsOptions, stsClientCtor) {
|
|
|
62
53
|
});
|
|
63
54
|
}); };
|
|
64
55
|
};
|
|
65
|
-
/**
|
|
66
|
-
* The default role assumer that used by credential providers when sts:AssumeRoleWithWebIdentity API is needed.
|
|
67
|
-
* @internal
|
|
68
|
-
*/
|
|
69
56
|
export var getDefaultRoleAssumerWithWebIdentity = function (stsOptions, stsClientCtor) {
|
|
70
57
|
var stsClient;
|
|
71
58
|
return function (params) { return __awaiter(void 0, void 0, void 0, function () {
|
|
@@ -77,13 +64,13 @@ export var getDefaultRoleAssumerWithWebIdentity = function (stsOptions, stsClien
|
|
|
77
64
|
logger = stsOptions.logger, region = stsOptions.region, requestHandler = stsOptions.requestHandler;
|
|
78
65
|
stsClient = new stsClientCtor(__assign({ logger: logger, region: decorateDefaultRegion(region || stsOptions.region) }, (requestHandler ? { requestHandler: requestHandler } : {})));
|
|
79
66
|
}
|
|
80
|
-
return [4
|
|
67
|
+
return [4, stsClient.send(new AssumeRoleWithWebIdentityCommand(params))];
|
|
81
68
|
case 1:
|
|
82
69
|
Credentials = (_a.sent()).Credentials;
|
|
83
70
|
if (!Credentials || !Credentials.AccessKeyId || !Credentials.SecretAccessKey) {
|
|
84
71
|
throw new Error("Invalid response from STS.assumeRoleWithWebIdentity call with role " + params.RoleArn);
|
|
85
72
|
}
|
|
86
|
-
return [2
|
|
73
|
+
return [2, {
|
|
87
74
|
accessKeyId: Credentials.AccessKeyId,
|
|
88
75
|
secretAccessKey: Credentials.SecretAccessKey,
|
|
89
76
|
sessionToken: Credentials.SessionToken,
|
|
@@ -93,14 +80,6 @@ export var getDefaultRoleAssumerWithWebIdentity = function (stsOptions, stsClien
|
|
|
93
80
|
});
|
|
94
81
|
}); };
|
|
95
82
|
};
|
|
96
|
-
/**
|
|
97
|
-
* The default credential providers depend STS client to assume role with desired API: sts:assumeRole,
|
|
98
|
-
* sts:assumeRoleWithWebIdentity, etc. This function decorates the default credential provider with role assumers which
|
|
99
|
-
* encapsulates the process of calling STS commands. This can only be imported by AWS client packages to avoid circular
|
|
100
|
-
* dependencies.
|
|
101
|
-
*
|
|
102
|
-
* @internal
|
|
103
|
-
*/
|
|
104
83
|
export var decorateDefaultCredentialProvider = function (provider) {
|
|
105
84
|
return function (input) {
|
|
106
85
|
return provider(__assign({ roleAssumer: getDefaultRoleAssumer(input, input.stsClientCtor), roleAssumerWithWebIdentity: getDefaultRoleAssumerWithWebIdentity(input, input.stsClientCtor) }, input));
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"defaultStsRoleAssumers.js","sourceRoot":"","sources":["../../defaultStsRoleAssumers.ts"],"names":[],"mappings":";AAIA,OAAO,EAAE,iBAAiB,EAA0B,MAAM,8BAA8B,CAAC;AACzF,OAAO,EACL,gCAAgC,GAEjC,MAAM,6CAA6C,CAAC;AAQrD,IAAM,0BAA0B,GAAG,WAAW,CAAC;
|
|
1
|
+
{"version":3,"file":"defaultStsRoleAssumers.js","sourceRoot":"","sources":["../../defaultStsRoleAssumers.ts"],"names":[],"mappings":";AAIA,OAAO,EAAE,iBAAiB,EAA0B,MAAM,8BAA8B,CAAC;AACzF,OAAO,EACL,gCAAgC,GAEjC,MAAM,6CAA6C,CAAC;AAQrD,IAAM,0BAA0B,GAAG,WAAW,CAAC;AAK/C,IAAM,qBAAqB,GAAG,UAAC,MAA6C;IAC1E,IAAI,OAAO,MAAM,KAAK,UAAU,EAAE;QAChC,OAAO,MAAM,KAAK,SAAS,CAAC,CAAC,CAAC,0BAA0B,CAAC,CAAC,CAAC,MAAM,CAAC;KACnE;IACD,OAAO;;;;;;oBAEI,WAAM,MAAM,EAAE,EAAA;wBAArB,WAAO,SAAc,EAAC;;;oBAEtB,WAAO,0BAA0B,EAAC;;;;SAErC,CAAC;AACJ,CAAC,CAAC;AAMF,MAAM,CAAC,IAAM,qBAAqB,GAAG,UACnC,UAAyE,EACzE,aAA0D;IAE1D,IAAI,SAAoB,CAAC;IACzB,IAAI,kBAA+B,CAAC;IACpC,OAAO,UAAO,WAAW,EAAE,MAAM;;;;;oBAC/B,kBAAkB,GAAG,WAAW,CAAC;oBACjC,IAAI,CAAC,SAAS,EAAE;wBACN,MAAM,GAA6B,UAAU,OAAvC,EAAE,MAAM,GAAqB,UAAU,OAA/B,EAAE,cAAc,GAAK,UAAU,eAAf,CAAgB;wBACtD,SAAS,GAAG,IAAI,aAAa,YAC3B,MAAM,QAAA,EAEN,yBAAyB,EAAE,cAAM,OAAA;gCAAY,WAAA,kBAAkB,EAAA;qCAAA,EAA9B,CAA8B,EAC/D,MAAM,EAAE,qBAAqB,CAAC,MAAM,IAAI,UAAU,CAAC,MAAM,CAAC,IACvD,CAAC,cAAc,CAAC,CAAC,CAAC,EAAE,cAAc,gBAAA,EAAE,CAAC,CAAC,CAAC,EAAE,CAAC,EAC7C,CAAC;qBACJ;oBACuB,WAAM,SAAS,CAAC,IAAI,CAAC,IAAI,iBAAiB,CAAC,MAAM,CAAC,CAAC,EAAA;;oBAAnE,WAAW,GAAK,CAAA,SAAmD,CAAA,YAAxD;oBACnB,IAAI,CAAC,WAAW,IAAI,CAAC,WAAW,CAAC,WAAW,IAAI,CAAC,WAAW,CAAC,eAAe,EAAE;wBAC5E,MAAM,IAAI,KAAK,CAAC,yDAAuD,MAAM,CAAC,OAAS,CAAC,CAAC;qBAC1F;oBACD,WAAO;4BACL,WAAW,EAAE,WAAW,CAAC,WAAW;4BACpC,eAAe,EAAE,WAAW,CAAC,eAAe;4BAC5C,YAAY,EAAE,WAAW,CAAC,YAAY;4BACtC,UAAU,EAAE,WAAW,CAAC,UAAU;yBACnC,EAAC;;;SACH,CAAC;AACJ,CAAC,CAAC;AAWF,MAAM,CAAC,IAAM,oCAAoC,GAAG,UAClD,UAAyE,EACzE,aAA0D;IAE1D,IAAI,SAAoB,CAAC;IACzB,OAAO,UAAO,MAAM;;;;;oBAClB,IAAI,CAAC,SAAS,EAAE;wBACN,MAAM,GAA6B,UAAU,OAAvC,EAAE,MAAM,GAAqB,UAAU,OAA/B,EAAE,cAAc,GAAK,UAAU,eAAf,CAAgB;wBACtD,SAAS,GAAG,IAAI,aAAa,YAC3B,MAAM,QAAA,EACN,MAAM,EAAE,qBAAqB,CAAC,MAAM,IAAI,UAAU,CAAC,MAAM,CAAC,IACvD,CAAC,cAAc,CAAC,CAAC,CAAC,EAAE,cAAc,gBAAA,EAAE,CAAC,CAAC,CAAC,EAAE,CAAC,EAC7C,CAAC;qBACJ;oBACuB,WAAM,SAAS,CAAC,IAAI,CAAC,IAAI,gCAAgC,CAAC,MAAM,CAAC,CAAC,EAAA;;oBAAlF,WAAW,GAAK,CAAA,SAAkE,CAAA,YAAvE;oBACnB,IAAI,CAAC,WAAW,IAAI,CAAC,WAAW,CAAC,WAAW,IAAI,CAAC,WAAW,CAAC,eAAe,EAAE;wBAC5E,MAAM,IAAI,KAAK,CAAC,wEAAsE,MAAM,CAAC,OAAS,CAAC,CAAC;qBACzG;oBACD,WAAO;4BACL,WAAW,EAAE,WAAW,CAAC,WAAW;4BACpC,eAAe,EAAE,WAAW,CAAC,eAAe;4BAC5C,YAAY,EAAE,WAAW,CAAC,YAAY;4BACtC,UAAU,EAAE,WAAW,CAAC,UAAU;yBACnC,EAAC;;;SACH,CAAC;AACJ,CAAC,CAAC;AAeF,MAAM,CAAC,IAAM,iCAAiC,GAC5C,UAAC,QAAmC;IACpC,OAAA,UAAC,KAA8B;QAC7B,OAAA,QAAQ,YACN,WAAW,EAAE,qBAAqB,CAAC,KAAK,EAAE,KAAK,CAAC,aAAa,CAAC,EAC9D,0BAA0B,EAAE,oCAAoC,CAAC,KAAK,EAAE,KAAK,CAAC,aAAa,CAAC,IACzF,KAAK,EACR;IAJF,CAIE;AALJ,CAKI,CAAC"}
|
package/dist/es/endpoints.js
CHANGED
|
@@ -81,7 +81,7 @@ var partitionHash = {
|
|
|
81
81
|
};
|
|
82
82
|
export var defaultRegionInfoProvider = function (region, options) { return __awaiter(void 0, void 0, void 0, function () {
|
|
83
83
|
return __generator(this, function (_a) {
|
|
84
|
-
return [2
|
|
84
|
+
return [2, getRegionInfo(region, __assign(__assign({}, options), { signingService: "sts", regionHash: regionHash, partitionHash: partitionHash }))];
|
|
85
85
|
});
|
|
86
86
|
}); };
|
|
87
87
|
//# sourceMappingURL=endpoints.js.map
|
package/dist/es/endpoints.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"endpoints.js","sourceRoot":"","sources":["../../endpoints.ts"],"names":[],"mappings":";AAAA,OAAO,EAA6B,aAAa,EAAE,MAAM,0BAA0B,CAAC;AAGpF,IAAM,UAAU,GAAe;IAC7B,YAAY,EAAE;QACZ,QAAQ,EAAE,mBAAmB;QAC7B,aAAa,EAAE,WAAW;KAC3B;IACD,gBAAgB,EAAE;QAChB,QAAQ,EAAE,kCAAkC;QAC5C,aAAa,EAAE,WAAW;KAC3B;IACD,gBAAgB,EAAE;QAChB,QAAQ,EAAE,kCAAkC;QAC5C,aAAa,EAAE,WAAW;KAC3B;IACD,oBAAoB,EAAE;QACpB,QAAQ,EAAE,iCAAiC;QAC3C,aAAa,EAAE,eAAe;KAC/B;IACD,oBAAoB,EAAE;QACpB,QAAQ,EAAE,iCAAiC;QAC3C,aAAa,EAAE,eAAe;KAC/B;IACD,gBAAgB,EAAE;QAChB,QAAQ,EAAE,kCAAkC;QAC5C,aAAa,EAAE,WAAW;KAC3B;IACD,gBAAgB,EAAE;QAChB,QAAQ,EAAE,kCAAkC;QAC5C,aAAa,EAAE,WAAW;KAC3B;CACF,CAAC;AAEF,IAAM,aAAa,GAAkB;IACnC,GAAG,EAAE;QACH,OAAO,EAAE;YACP,YAAY;YACZ,WAAW;YACX,gBAAgB;YAChB,gBAAgB;YAChB,gBAAgB;YAChB,YAAY;YACZ,gBAAgB;YAChB,gBAAgB;YAChB,YAAY;YACZ,cAAc;YACd,cAAc;YACd,YAAY;YACZ,YAAY;YACZ,WAAW;YACX,WAAW;YACX,WAAW;YACX,YAAY;YACZ,WAAW;YACX,WAAW;YACX,gBAAgB;YAChB,WAAW;YACX,gBAAgB;YAChB,WAAW;YACX,gBAAgB;YAChB,WAAW;YACX,gBAAgB;SACjB;QACD,QAAQ,EAAE,4BAA4B;KACvC;IACD,QAAQ,EAAE;QACR,OAAO,EAAE,CAAC,YAAY,EAAE,gBAAgB,CAAC;QACzC,QAAQ,EAAE,+BAA+B;KAC1C;IACD,SAAS,EAAE;QACT,OAAO,EAAE,CAAC,eAAe,CAAC;QAC1B,QAAQ,EAAE,yBAAyB;KACpC;IACD,WAAW,EAAE;QACX,OAAO,EAAE,CAAC,gBAAgB,CAAC;QAC3B,QAAQ,EAAE,4BAA4B;KACvC;IACD,YAAY,EAAE;QACZ,OAAO,EAAE,CAAC,eAAe,EAAE,oBAAoB,EAAE,eAAe,EAAE,oBAAoB,CAAC;QACvF,QAAQ,EAAE,4BAA4B;KACvC;CACF,CAAC;AAEF,MAAM,CAAC,IAAM,yBAAyB,GAAuB,UAAO,MAAc,EAAE,OAAa;;QAC/F,
|
|
1
|
+
{"version":3,"file":"endpoints.js","sourceRoot":"","sources":["../../endpoints.ts"],"names":[],"mappings":";AAAA,OAAO,EAA6B,aAAa,EAAE,MAAM,0BAA0B,CAAC;AAGpF,IAAM,UAAU,GAAe;IAC7B,YAAY,EAAE;QACZ,QAAQ,EAAE,mBAAmB;QAC7B,aAAa,EAAE,WAAW;KAC3B;IACD,gBAAgB,EAAE;QAChB,QAAQ,EAAE,kCAAkC;QAC5C,aAAa,EAAE,WAAW;KAC3B;IACD,gBAAgB,EAAE;QAChB,QAAQ,EAAE,kCAAkC;QAC5C,aAAa,EAAE,WAAW;KAC3B;IACD,oBAAoB,EAAE;QACpB,QAAQ,EAAE,iCAAiC;QAC3C,aAAa,EAAE,eAAe;KAC/B;IACD,oBAAoB,EAAE;QACpB,QAAQ,EAAE,iCAAiC;QAC3C,aAAa,EAAE,eAAe;KAC/B;IACD,gBAAgB,EAAE;QAChB,QAAQ,EAAE,kCAAkC;QAC5C,aAAa,EAAE,WAAW;KAC3B;IACD,gBAAgB,EAAE;QAChB,QAAQ,EAAE,kCAAkC;QAC5C,aAAa,EAAE,WAAW;KAC3B;CACF,CAAC;AAEF,IAAM,aAAa,GAAkB;IACnC,GAAG,EAAE;QACH,OAAO,EAAE;YACP,YAAY;YACZ,WAAW;YACX,gBAAgB;YAChB,gBAAgB;YAChB,gBAAgB;YAChB,YAAY;YACZ,gBAAgB;YAChB,gBAAgB;YAChB,YAAY;YACZ,cAAc;YACd,cAAc;YACd,YAAY;YACZ,YAAY;YACZ,WAAW;YACX,WAAW;YACX,WAAW;YACX,YAAY;YACZ,WAAW;YACX,WAAW;YACX,gBAAgB;YAChB,WAAW;YACX,gBAAgB;YAChB,WAAW;YACX,gBAAgB;YAChB,WAAW;YACX,gBAAgB;SACjB;QACD,QAAQ,EAAE,4BAA4B;KACvC;IACD,QAAQ,EAAE;QACR,OAAO,EAAE,CAAC,YAAY,EAAE,gBAAgB,CAAC;QACzC,QAAQ,EAAE,+BAA+B;KAC1C;IACD,SAAS,EAAE;QACT,OAAO,EAAE,CAAC,eAAe,CAAC;QAC1B,QAAQ,EAAE,yBAAyB;KACpC;IACD,WAAW,EAAE;QACX,OAAO,EAAE,CAAC,gBAAgB,CAAC;QAC3B,QAAQ,EAAE,4BAA4B;KACvC;IACD,YAAY,EAAE;QACZ,OAAO,EAAE,CAAC,eAAe,EAAE,oBAAoB,EAAE,eAAe,EAAE,oBAAoB,CAAC;QACvF,QAAQ,EAAE,4BAA4B;KACvC;CACF,CAAC;AAEF,MAAM,CAAC,IAAM,yBAAyB,GAAuB,UAAO,MAAc,EAAE,OAAa;;QAC/F,WAAA,aAAa,CAAC,MAAM,wBACf,OAAO,KACV,cAAc,EAAE,KAAK,EACrB,UAAU,YAAA,EACV,aAAa,eAAA,IACb,EAAA;;KAAA,CAAC"}
|
|
@@ -1,205 +1,118 @@
|
|
|
1
1
|
import { __assign } from "tslib";
|
|
2
2
|
export var AssumedRoleUser;
|
|
3
3
|
(function (AssumedRoleUser) {
|
|
4
|
-
/**
|
|
5
|
-
* @internal
|
|
6
|
-
*/
|
|
7
4
|
AssumedRoleUser.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
8
5
|
})(AssumedRoleUser || (AssumedRoleUser = {}));
|
|
9
6
|
export var PolicyDescriptorType;
|
|
10
7
|
(function (PolicyDescriptorType) {
|
|
11
|
-
/**
|
|
12
|
-
* @internal
|
|
13
|
-
*/
|
|
14
8
|
PolicyDescriptorType.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
15
9
|
})(PolicyDescriptorType || (PolicyDescriptorType = {}));
|
|
16
10
|
export var Tag;
|
|
17
11
|
(function (Tag) {
|
|
18
|
-
/**
|
|
19
|
-
* @internal
|
|
20
|
-
*/
|
|
21
12
|
Tag.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
22
13
|
})(Tag || (Tag = {}));
|
|
23
14
|
export var AssumeRoleRequest;
|
|
24
15
|
(function (AssumeRoleRequest) {
|
|
25
|
-
/**
|
|
26
|
-
* @internal
|
|
27
|
-
*/
|
|
28
16
|
AssumeRoleRequest.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
29
17
|
})(AssumeRoleRequest || (AssumeRoleRequest = {}));
|
|
30
18
|
export var Credentials;
|
|
31
19
|
(function (Credentials) {
|
|
32
|
-
/**
|
|
33
|
-
* @internal
|
|
34
|
-
*/
|
|
35
20
|
Credentials.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
36
21
|
})(Credentials || (Credentials = {}));
|
|
37
22
|
export var AssumeRoleResponse;
|
|
38
23
|
(function (AssumeRoleResponse) {
|
|
39
|
-
/**
|
|
40
|
-
* @internal
|
|
41
|
-
*/
|
|
42
24
|
AssumeRoleResponse.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
43
25
|
})(AssumeRoleResponse || (AssumeRoleResponse = {}));
|
|
44
26
|
export var ExpiredTokenException;
|
|
45
27
|
(function (ExpiredTokenException) {
|
|
46
|
-
/**
|
|
47
|
-
* @internal
|
|
48
|
-
*/
|
|
49
28
|
ExpiredTokenException.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
50
29
|
})(ExpiredTokenException || (ExpiredTokenException = {}));
|
|
51
30
|
export var MalformedPolicyDocumentException;
|
|
52
31
|
(function (MalformedPolicyDocumentException) {
|
|
53
|
-
/**
|
|
54
|
-
* @internal
|
|
55
|
-
*/
|
|
56
32
|
MalformedPolicyDocumentException.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
57
33
|
})(MalformedPolicyDocumentException || (MalformedPolicyDocumentException = {}));
|
|
58
34
|
export var PackedPolicyTooLargeException;
|
|
59
35
|
(function (PackedPolicyTooLargeException) {
|
|
60
|
-
/**
|
|
61
|
-
* @internal
|
|
62
|
-
*/
|
|
63
36
|
PackedPolicyTooLargeException.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
64
37
|
})(PackedPolicyTooLargeException || (PackedPolicyTooLargeException = {}));
|
|
65
38
|
export var RegionDisabledException;
|
|
66
39
|
(function (RegionDisabledException) {
|
|
67
|
-
/**
|
|
68
|
-
* @internal
|
|
69
|
-
*/
|
|
70
40
|
RegionDisabledException.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
71
41
|
})(RegionDisabledException || (RegionDisabledException = {}));
|
|
72
42
|
export var AssumeRoleWithSAMLRequest;
|
|
73
43
|
(function (AssumeRoleWithSAMLRequest) {
|
|
74
|
-
/**
|
|
75
|
-
* @internal
|
|
76
|
-
*/
|
|
77
44
|
AssumeRoleWithSAMLRequest.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
78
45
|
})(AssumeRoleWithSAMLRequest || (AssumeRoleWithSAMLRequest = {}));
|
|
79
46
|
export var AssumeRoleWithSAMLResponse;
|
|
80
47
|
(function (AssumeRoleWithSAMLResponse) {
|
|
81
|
-
/**
|
|
82
|
-
* @internal
|
|
83
|
-
*/
|
|
84
48
|
AssumeRoleWithSAMLResponse.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
85
49
|
})(AssumeRoleWithSAMLResponse || (AssumeRoleWithSAMLResponse = {}));
|
|
86
50
|
export var IDPRejectedClaimException;
|
|
87
51
|
(function (IDPRejectedClaimException) {
|
|
88
|
-
/**
|
|
89
|
-
* @internal
|
|
90
|
-
*/
|
|
91
52
|
IDPRejectedClaimException.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
92
53
|
})(IDPRejectedClaimException || (IDPRejectedClaimException = {}));
|
|
93
54
|
export var InvalidIdentityTokenException;
|
|
94
55
|
(function (InvalidIdentityTokenException) {
|
|
95
|
-
/**
|
|
96
|
-
* @internal
|
|
97
|
-
*/
|
|
98
56
|
InvalidIdentityTokenException.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
99
57
|
})(InvalidIdentityTokenException || (InvalidIdentityTokenException = {}));
|
|
100
58
|
export var AssumeRoleWithWebIdentityRequest;
|
|
101
59
|
(function (AssumeRoleWithWebIdentityRequest) {
|
|
102
|
-
/**
|
|
103
|
-
* @internal
|
|
104
|
-
*/
|
|
105
60
|
AssumeRoleWithWebIdentityRequest.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
106
61
|
})(AssumeRoleWithWebIdentityRequest || (AssumeRoleWithWebIdentityRequest = {}));
|
|
107
62
|
export var AssumeRoleWithWebIdentityResponse;
|
|
108
63
|
(function (AssumeRoleWithWebIdentityResponse) {
|
|
109
|
-
/**
|
|
110
|
-
* @internal
|
|
111
|
-
*/
|
|
112
64
|
AssumeRoleWithWebIdentityResponse.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
113
65
|
})(AssumeRoleWithWebIdentityResponse || (AssumeRoleWithWebIdentityResponse = {}));
|
|
114
66
|
export var IDPCommunicationErrorException;
|
|
115
67
|
(function (IDPCommunicationErrorException) {
|
|
116
|
-
/**
|
|
117
|
-
* @internal
|
|
118
|
-
*/
|
|
119
68
|
IDPCommunicationErrorException.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
120
69
|
})(IDPCommunicationErrorException || (IDPCommunicationErrorException = {}));
|
|
121
70
|
export var DecodeAuthorizationMessageRequest;
|
|
122
71
|
(function (DecodeAuthorizationMessageRequest) {
|
|
123
|
-
/**
|
|
124
|
-
* @internal
|
|
125
|
-
*/
|
|
126
72
|
DecodeAuthorizationMessageRequest.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
127
73
|
})(DecodeAuthorizationMessageRequest || (DecodeAuthorizationMessageRequest = {}));
|
|
128
74
|
export var DecodeAuthorizationMessageResponse;
|
|
129
75
|
(function (DecodeAuthorizationMessageResponse) {
|
|
130
|
-
/**
|
|
131
|
-
* @internal
|
|
132
|
-
*/
|
|
133
76
|
DecodeAuthorizationMessageResponse.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
134
77
|
})(DecodeAuthorizationMessageResponse || (DecodeAuthorizationMessageResponse = {}));
|
|
135
78
|
export var InvalidAuthorizationMessageException;
|
|
136
79
|
(function (InvalidAuthorizationMessageException) {
|
|
137
|
-
/**
|
|
138
|
-
* @internal
|
|
139
|
-
*/
|
|
140
80
|
InvalidAuthorizationMessageException.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
141
81
|
})(InvalidAuthorizationMessageException || (InvalidAuthorizationMessageException = {}));
|
|
142
82
|
export var GetAccessKeyInfoRequest;
|
|
143
83
|
(function (GetAccessKeyInfoRequest) {
|
|
144
|
-
/**
|
|
145
|
-
* @internal
|
|
146
|
-
*/
|
|
147
84
|
GetAccessKeyInfoRequest.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
148
85
|
})(GetAccessKeyInfoRequest || (GetAccessKeyInfoRequest = {}));
|
|
149
86
|
export var GetAccessKeyInfoResponse;
|
|
150
87
|
(function (GetAccessKeyInfoResponse) {
|
|
151
|
-
/**
|
|
152
|
-
* @internal
|
|
153
|
-
*/
|
|
154
88
|
GetAccessKeyInfoResponse.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
155
89
|
})(GetAccessKeyInfoResponse || (GetAccessKeyInfoResponse = {}));
|
|
156
90
|
export var GetCallerIdentityRequest;
|
|
157
91
|
(function (GetCallerIdentityRequest) {
|
|
158
|
-
/**
|
|
159
|
-
* @internal
|
|
160
|
-
*/
|
|
161
92
|
GetCallerIdentityRequest.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
162
93
|
})(GetCallerIdentityRequest || (GetCallerIdentityRequest = {}));
|
|
163
94
|
export var GetCallerIdentityResponse;
|
|
164
95
|
(function (GetCallerIdentityResponse) {
|
|
165
|
-
/**
|
|
166
|
-
* @internal
|
|
167
|
-
*/
|
|
168
96
|
GetCallerIdentityResponse.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
169
97
|
})(GetCallerIdentityResponse || (GetCallerIdentityResponse = {}));
|
|
170
98
|
export var GetFederationTokenRequest;
|
|
171
99
|
(function (GetFederationTokenRequest) {
|
|
172
|
-
/**
|
|
173
|
-
* @internal
|
|
174
|
-
*/
|
|
175
100
|
GetFederationTokenRequest.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
176
101
|
})(GetFederationTokenRequest || (GetFederationTokenRequest = {}));
|
|
177
102
|
export var FederatedUser;
|
|
178
103
|
(function (FederatedUser) {
|
|
179
|
-
/**
|
|
180
|
-
* @internal
|
|
181
|
-
*/
|
|
182
104
|
FederatedUser.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
183
105
|
})(FederatedUser || (FederatedUser = {}));
|
|
184
106
|
export var GetFederationTokenResponse;
|
|
185
107
|
(function (GetFederationTokenResponse) {
|
|
186
|
-
/**
|
|
187
|
-
* @internal
|
|
188
|
-
*/
|
|
189
108
|
GetFederationTokenResponse.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
190
109
|
})(GetFederationTokenResponse || (GetFederationTokenResponse = {}));
|
|
191
110
|
export var GetSessionTokenRequest;
|
|
192
111
|
(function (GetSessionTokenRequest) {
|
|
193
|
-
/**
|
|
194
|
-
* @internal
|
|
195
|
-
*/
|
|
196
112
|
GetSessionTokenRequest.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
197
113
|
})(GetSessionTokenRequest || (GetSessionTokenRequest = {}));
|
|
198
114
|
export var GetSessionTokenResponse;
|
|
199
115
|
(function (GetSessionTokenResponse) {
|
|
200
|
-
/**
|
|
201
|
-
* @internal
|
|
202
|
-
*/
|
|
203
116
|
GetSessionTokenResponse.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
204
117
|
})(GetSessionTokenResponse || (GetSessionTokenResponse = {}));
|
|
205
118
|
//# sourceMappingURL=models_0.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"models_0.js","sourceRoot":"","sources":["../../../models/models_0.ts"],"names":[],"mappings":";AAqBA,MAAM,KAAW,eAAe,CAO/B;AAPD,WAAiB,eAAe;
|
|
1
|
+
{"version":3,"file":"models_0.js","sourceRoot":"","sources":["../../../models/models_0.ts"],"names":[],"mappings":";AAqBA,MAAM,KAAW,eAAe,CAO/B;AAPD,WAAiB,eAAe;IAIjB,kCAAkB,GAAG,UAAC,GAAoB,IAAU,OAAA,cAC5D,GAAG,EACN,EAF+D,CAE/D,CAAC;AACL,CAAC,EAPgB,eAAe,KAAf,eAAe,QAO/B;AAeD,MAAM,KAAW,oBAAoB,CAOpC;AAPD,WAAiB,oBAAoB;IAItB,uCAAkB,GAAG,UAAC,GAAyB,IAAU,OAAA,cACjE,GAAG,EACN,EAFoE,CAEpE,CAAC;AACL,CAAC,EAPgB,oBAAoB,KAApB,oBAAoB,QAOpC;AA0BD,MAAM,KAAW,GAAG,CAOnB;AAPD,WAAiB,GAAG;IAIL,sBAAkB,GAAG,UAAC,GAAQ,IAAU,OAAA,cAChD,GAAG,EACN,EAFmD,CAEnD,CAAC;AACL,CAAC,EAPgB,GAAG,KAAH,GAAG,QAOnB;AA2MD,MAAM,KAAW,iBAAiB,CAOjC;AAPD,WAAiB,iBAAiB;IAInB,oCAAkB,GAAG,UAAC,GAAsB,IAAU,OAAA,cAC9D,GAAG,EACN,EAFiE,CAEjE,CAAC;AACL,CAAC,EAPgB,iBAAiB,KAAjB,iBAAiB,QAOjC;AA4BD,MAAM,KAAW,WAAW,CAO3B;AAPD,WAAiB,WAAW;IAIb,8BAAkB,GAAG,UAAC,GAAgB,IAAU,OAAA,cACxD,GAAG,EACN,EAF2D,CAE3D,CAAC;AACL,CAAC,EAPgB,WAAW,KAAX,WAAW,QAO3B;AAmDD,MAAM,KAAW,kBAAkB,CAOlC;AAPD,WAAiB,kBAAkB;IAIpB,qCAAkB,GAAG,UAAC,GAAuB,IAAU,OAAA,cAC/D,GAAG,EACN,EAFkE,CAElE,CAAC;AACL,CAAC,EAPgB,kBAAkB,KAAlB,kBAAkB,QAOlC;AAYD,MAAM,KAAW,qBAAqB,CAOrC;AAPD,WAAiB,qBAAqB;IAIvB,wCAAkB,GAAG,UAAC,GAA0B,IAAU,OAAA,cAClE,GAAG,EACN,EAFqE,CAErE,CAAC;AACL,CAAC,EAPgB,qBAAqB,KAArB,qBAAqB,QAOrC;AAYD,MAAM,KAAW,gCAAgC,CAOhD;AAPD,WAAiB,gCAAgC;IAIlC,mDAAkB,GAAG,UAAC,GAAqC,IAAU,OAAA,cAC7E,GAAG,EACN,EAFgF,CAEhF,CAAC;AACL,CAAC,EAPgB,gCAAgC,KAAhC,gCAAgC,QAOhD;AAmBD,MAAM,KAAW,6BAA6B,CAO7C;AAPD,WAAiB,6BAA6B;IAI/B,gDAAkB,GAAG,UAAC,GAAkC,IAAU,OAAA,cAC1E,GAAG,EACN,EAF6E,CAE7E,CAAC;AACL,CAAC,EAPgB,6BAA6B,KAA7B,6BAA6B,QAO7C;AAeD,MAAM,KAAW,uBAAuB,CAOvC;AAPD,WAAiB,uBAAuB;IAIzB,0CAAkB,GAAG,UAAC,GAA4B,IAAU,OAAA,cACpE,GAAG,EACN,EAFuE,CAEvE,CAAC;AACL,CAAC,EAPgB,uBAAuB,KAAvB,uBAAuB,QAOvC;AAoGD,MAAM,KAAW,yBAAyB,CAOzC;AAPD,WAAiB,yBAAyB;IAI3B,4CAAkB,GAAG,UAAC,GAA8B,IAAU,OAAA,cACtE,GAAG,EACN,EAFyE,CAEzE,CAAC;AACL,CAAC,EAPgB,yBAAyB,KAAzB,yBAAyB,QAOzC;AAqGD,MAAM,KAAW,0BAA0B,CAO1C;AAPD,WAAiB,0BAA0B;IAI5B,6CAAkB,GAAG,UAAC,GAA+B,IAAU,OAAA,cACvE,GAAG,EACN,EAF0E,CAE1E,CAAC;AACL,CAAC,EAPgB,0BAA0B,KAA1B,0BAA0B,QAO1C;AAcD,MAAM,KAAW,yBAAyB,CAOzC;AAPD,WAAiB,yBAAyB;IAI3B,4CAAkB,GAAG,UAAC,GAA8B,IAAU,OAAA,cACtE,GAAG,EACN,EAFyE,CAEzE,CAAC;AACL,CAAC,EAPgB,yBAAyB,KAAzB,yBAAyB,QAOzC;AAYD,MAAM,KAAW,6BAA6B,CAO7C;AAPD,WAAiB,6BAA6B;IAI/B,gDAAkB,GAAG,UAAC,GAAkC,IAAU,OAAA,cAC1E,GAAG,EACN,EAF6E,CAE7E,CAAC;AACL,CAAC,EAPgB,6BAA6B,KAA7B,6BAA6B,QAO7C;AAkHD,MAAM,KAAW,gCAAgC,CAOhD;AAPD,WAAiB,gCAAgC;IAIlC,mDAAkB,GAAG,UAAC,GAAqC,IAAU,OAAA,cAC7E,GAAG,EACN,EAFgF,CAEhF,CAAC;AACL,CAAC,EAPgB,gCAAgC,KAAhC,gCAAgC,QAOhD;AAgFD,MAAM,KAAW,iCAAiC,CAOjD;AAPD,WAAiB,iCAAiC;IAInC,oDAAkB,GAAG,UAAC,GAAsC,IAAU,OAAA,cAC9E,GAAG,EACN,EAFiF,CAEjF,CAAC;AACL,CAAC,EAPgB,iCAAiC,KAAjC,iCAAiC,QAOjD;AAeD,MAAM,KAAW,8BAA8B,CAO9C;AAPD,WAAiB,8BAA8B;IAIhC,iDAAkB,GAAG,UAAC,GAAmC,IAAU,OAAA,cAC3E,GAAG,EACN,EAF8E,CAE9E,CAAC;AACL,CAAC,EAPgB,8BAA8B,KAA9B,8BAA8B,QAO9C;AASD,MAAM,KAAW,iCAAiC,CAOjD;AAPD,WAAiB,iCAAiC;IAInC,oDAAkB,GAAG,UAAC,GAAsC,IAAU,OAAA,cAC9E,GAAG,EACN,EAFiF,CAEjF,CAAC;AACL,CAAC,EAPgB,iCAAiC,KAAjC,iCAAiC,QAOjD;AAaD,MAAM,KAAW,kCAAkC,CAOlD;AAPD,WAAiB,kCAAkC;IAIpC,qDAAkB,GAAG,UAAC,GAAuC,IAAU,OAAA,cAC/E,GAAG,EACN,EAFkF,CAElF,CAAC;AACL,CAAC,EAPgB,kCAAkC,KAAlC,kCAAkC,QAOlD;AAaD,MAAM,KAAW,oCAAoC,CAOpD;AAPD,WAAiB,oCAAoC;IAItC,uDAAkB,GAAG,UAAC,GAAyC,IAAU,OAAA,cACjF,GAAG,EACN,EAFoF,CAEpF,CAAC;AACL,CAAC,EAPgB,oCAAoC,KAApC,oCAAoC,QAOpD;AAWD,MAAM,KAAW,uBAAuB,CAOvC;AAPD,WAAiB,uBAAuB;IAIzB,0CAAkB,GAAG,UAAC,GAA4B,IAAU,OAAA,cACpE,GAAG,EACN,EAFuE,CAEvE,CAAC;AACL,CAAC,EAPgB,uBAAuB,KAAvB,uBAAuB,QAOvC;AASD,MAAM,KAAW,wBAAwB,CAOxC;AAPD,WAAiB,wBAAwB;IAI1B,2CAAkB,GAAG,UAAC,GAA6B,IAAU,OAAA,cACrE,GAAG,EACN,EAFwE,CAExE,CAAC;AACL,CAAC,EAPgB,wBAAwB,KAAxB,wBAAwB,QAOxC;AAID,MAAM,KAAW,wBAAwB,CAOxC;AAPD,WAAiB,wBAAwB;IAI1B,2CAAkB,GAAG,UAAC,GAA6B,IAAU,OAAA,cACrE,GAAG,EACN,EAFwE,CAExE,CAAC;AACL,CAAC,EAPgB,wBAAwB,KAAxB,wBAAwB,QAOxC;AA2BD,MAAM,KAAW,yBAAyB,CAOzC;AAPD,WAAiB,yBAAyB;IAI3B,4CAAkB,GAAG,UAAC,GAA8B,IAAU,OAAA,cACtE,GAAG,EACN,EAFyE,CAEzE,CAAC;AACL,CAAC,EAPgB,yBAAyB,KAAzB,yBAAyB,QAOzC;AA2HD,MAAM,KAAW,yBAAyB,CAOzC;AAPD,WAAiB,yBAAyB;IAI3B,4CAAkB,GAAG,UAAC,GAA8B,IAAU,OAAA,cACtE,GAAG,EACN,EAFyE,CAEzE,CAAC;AACL,CAAC,EAPgB,yBAAyB,KAAzB,yBAAyB,QAOzC;AAoBD,MAAM,KAAW,aAAa,CAO7B;AAPD,WAAiB,aAAa;IAIf,gCAAkB,GAAG,UAAC,GAAkB,IAAU,OAAA,cAC1D,GAAG,EACN,EAF6D,CAE7D,CAAC;AACL,CAAC,EAPgB,aAAa,KAAb,aAAa,QAO7B;AAiCD,MAAM,KAAW,0BAA0B,CAO1C;AAPD,WAAiB,0BAA0B;IAI5B,6CAAkB,GAAG,UAAC,GAA+B,IAAU,OAAA,cACvE,GAAG,EACN,EAF0E,CAE1E,CAAC;AACL,CAAC,EAPgB,0BAA0B,KAA1B,0BAA0B,QAO1C;AAsCD,MAAM,KAAW,sBAAsB,CAOtC;AAPD,WAAiB,sBAAsB;IAIxB,yCAAkB,GAAG,UAAC,GAA2B,IAAU,OAAA,cACnE,GAAG,EACN,EAFsE,CAEtE,CAAC;AACL,CAAC,EAPgB,sBAAsB,KAAtB,sBAAsB,QAOtC;AAmBD,MAAM,KAAW,uBAAuB,CAOvC;AAPD,WAAiB,uBAAuB;IAIzB,0CAAkB,GAAG,UAAC,GAA4B,IAAU,OAAA,cACpE,GAAG,EACN,EAFuE,CAEvE,CAAC;AACL,CAAC,EAPgB,uBAAuB,KAAvB,uBAAuB,QAOvC"}
|