@aws-sdk/client-sts 3.33.0 → 3.34.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (47) hide show
  1. package/CHANGELOG.md +11 -0
  2. package/dist/cjs/package.json +38 -38
  3. package/dist/es/STS.js +1 -8
  4. package/dist/es/STS.js.map +1 -1
  5. package/dist/es/STSClient.js +1 -13
  6. package/dist/es/STSClient.js.map +1 -1
  7. package/dist/es/commands/AssumeRoleCommand.js +2 -110
  8. package/dist/es/commands/AssumeRoleCommand.js.map +1 -1
  9. package/dist/es/commands/AssumeRoleWithSAMLCommand.js +2 -158
  10. package/dist/es/commands/AssumeRoleWithSAMLCommand.js.map +1 -1
  11. package/dist/es/commands/AssumeRoleWithWebIdentityCommand.js +2 -162
  12. package/dist/es/commands/AssumeRoleWithWebIdentityCommand.js.map +1 -1
  13. package/dist/es/commands/DecodeAuthorizationMessageCommand.js +2 -62
  14. package/dist/es/commands/DecodeAuthorizationMessageCommand.js.map +1 -1
  15. package/dist/es/commands/GetAccessKeyInfoCommand.js +2 -44
  16. package/dist/es/commands/GetAccessKeyInfoCommand.js.map +1 -1
  17. package/dist/es/commands/GetCallerIdentityCommand.js +2 -36
  18. package/dist/es/commands/GetCallerIdentityCommand.js.map +1 -1
  19. package/dist/es/commands/GetFederationTokenCommand.js +2 -165
  20. package/dist/es/commands/GetFederationTokenCommand.js.map +1 -1
  21. package/dist/es/commands/GetSessionTokenCommand.js +2 -78
  22. package/dist/es/commands/GetSessionTokenCommand.js.map +1 -1
  23. package/dist/es/defaultRoleAssumers.js +0 -16
  24. package/dist/es/defaultRoleAssumers.js.map +1 -1
  25. package/dist/es/defaultRoleAssumers.spec.js +9 -14
  26. package/dist/es/defaultRoleAssumers.spec.js.map +1 -1
  27. package/dist/es/defaultStsRoleAssumers.js +10 -31
  28. package/dist/es/defaultStsRoleAssumers.js.map +1 -1
  29. package/dist/es/endpoints.js +1 -1
  30. package/dist/es/endpoints.js.map +1 -1
  31. package/dist/es/models/models_0.js +0 -87
  32. package/dist/es/models/models_0.js.map +1 -1
  33. package/dist/es/package.json +38 -38
  34. package/dist/es/protocols/Aws_query.js +152 -154
  35. package/dist/es/protocols/Aws_query.js.map +1 -1
  36. package/dist/es/runtimeConfig.browser.js +0 -3
  37. package/dist/es/runtimeConfig.browser.js.map +1 -1
  38. package/dist/es/runtimeConfig.js +0 -3
  39. package/dist/es/runtimeConfig.js.map +1 -1
  40. package/dist/es/runtimeConfig.native.js +0 -3
  41. package/dist/es/runtimeConfig.native.js.map +1 -1
  42. package/dist/es/runtimeConfig.shared.js +0 -3
  43. package/dist/es/runtimeConfig.shared.js.map +1 -1
  44. package/package.json +38 -38
  45. package/tsconfig.es.json +0 -2
  46. package/tsconfig.json +4 -5
  47. package/tsconfig.types.json +8 -0
package/CHANGELOG.md CHANGED
@@ -3,6 +3,17 @@
3
3
  All notable changes to this project will be documented in this file.
4
4
  See [Conventional Commits](https://conventionalcommits.org) for commit guidelines.
5
5
 
6
+ # [3.34.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.33.0...v3.34.0) (2021-09-24)
7
+
8
+
9
+ ### Features
10
+
11
+ * **clients:** remove comments from transpiled JS files ([#2817](https://github.com/aws/aws-sdk-js-v3/issues/2817)) ([d01420b](https://github.com/aws/aws-sdk-js-v3/commit/d01420b247966c8ec84c1dd0a1b42512ede10c90))
12
+
13
+
14
+
15
+
16
+
6
17
  # [3.33.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.32.0...v3.33.0) (2021-09-21)
7
18
 
8
19
  **Note:** Version bump only for package @aws-sdk/client-sts
@@ -1,18 +1,18 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-sts",
3
3
  "description": "AWS SDK for JavaScript Sts Client for Node.js, Browser and React Native",
4
- "version": "3.33.0",
4
+ "version": "3.34.0",
5
5
  "scripts": {
6
- "clean": "yarn remove-definitions && yarn remove-dist && yarn remove-documentation",
7
- "build-documentation": "yarn remove-documentation && typedoc ./",
8
- "remove-definitions": "rimraf ./types",
9
- "remove-dist": "rimraf ./dist",
10
- "remove-documentation": "rimraf ./docs",
11
- "test": "exit 0",
6
+ "build": "yarn build:cjs && yarn build:es && yarn build:types",
12
7
  "build:cjs": "tsc -p tsconfig.json",
8
+ "build:docs": "yarn clean:docs && typedoc ./",
13
9
  "build:es": "tsc -p tsconfig.es.json",
14
- "build": "yarn build:cjs && yarn build:es",
15
- "downlevel-dts": "downlevel-dts dist/types dist/types/ts3.4"
10
+ "build:types": "tsc -p tsconfig.types.json",
11
+ "clean": "yarn clean:dist && yarn clean:docs",
12
+ "clean:dist": "rimraf ./dist",
13
+ "clean:docs": "rimraf ./docs",
14
+ "downlevel-dts": "downlevel-dts dist/types dist/types/ts3.4",
15
+ "test": "exit 0"
16
16
  },
17
17
  "main": "./dist/cjs/index.js",
18
18
  "types": "./dist/types/index.d.ts",
@@ -27,40 +27,40 @@
27
27
  "dependencies": {
28
28
  "@aws-crypto/sha256-browser": "^1.0.0",
29
29
  "@aws-crypto/sha256-js": "^1.0.0",
30
- "@aws-sdk/config-resolver": "3.33.0",
31
- "@aws-sdk/credential-provider-node": "3.33.0",
32
- "@aws-sdk/fetch-http-handler": "3.32.0",
33
- "@aws-sdk/hash-node": "3.32.0",
34
- "@aws-sdk/invalid-dependency": "3.32.0",
35
- "@aws-sdk/middleware-content-length": "3.32.0",
36
- "@aws-sdk/middleware-host-header": "3.32.0",
37
- "@aws-sdk/middleware-logger": "3.32.0",
38
- "@aws-sdk/middleware-retry": "3.32.0",
39
- "@aws-sdk/middleware-sdk-sts": "3.33.0",
40
- "@aws-sdk/middleware-serde": "3.32.0",
41
- "@aws-sdk/middleware-signing": "3.33.0",
42
- "@aws-sdk/middleware-stack": "3.32.0",
43
- "@aws-sdk/middleware-user-agent": "3.32.0",
44
- "@aws-sdk/node-config-provider": "3.32.0",
45
- "@aws-sdk/node-http-handler": "3.32.0",
46
- "@aws-sdk/protocol-http": "3.32.0",
47
- "@aws-sdk/smithy-client": "3.32.0",
48
- "@aws-sdk/types": "3.32.0",
49
- "@aws-sdk/url-parser": "3.32.0",
50
- "@aws-sdk/util-base64-browser": "3.32.0",
51
- "@aws-sdk/util-base64-node": "3.32.0",
52
- "@aws-sdk/util-body-length-browser": "3.32.0",
53
- "@aws-sdk/util-body-length-node": "3.32.0",
54
- "@aws-sdk/util-user-agent-browser": "3.32.0",
55
- "@aws-sdk/util-user-agent-node": "3.33.0",
56
- "@aws-sdk/util-utf8-browser": "3.32.0",
57
- "@aws-sdk/util-utf8-node": "3.32.0",
30
+ "@aws-sdk/config-resolver": "3.34.0",
31
+ "@aws-sdk/credential-provider-node": "3.34.0",
32
+ "@aws-sdk/fetch-http-handler": "3.34.0",
33
+ "@aws-sdk/hash-node": "3.34.0",
34
+ "@aws-sdk/invalid-dependency": "3.34.0",
35
+ "@aws-sdk/middleware-content-length": "3.34.0",
36
+ "@aws-sdk/middleware-host-header": "3.34.0",
37
+ "@aws-sdk/middleware-logger": "3.34.0",
38
+ "@aws-sdk/middleware-retry": "3.34.0",
39
+ "@aws-sdk/middleware-sdk-sts": "3.34.0",
40
+ "@aws-sdk/middleware-serde": "3.34.0",
41
+ "@aws-sdk/middleware-signing": "3.34.0",
42
+ "@aws-sdk/middleware-stack": "3.34.0",
43
+ "@aws-sdk/middleware-user-agent": "3.34.0",
44
+ "@aws-sdk/node-config-provider": "3.34.0",
45
+ "@aws-sdk/node-http-handler": "3.34.0",
46
+ "@aws-sdk/protocol-http": "3.34.0",
47
+ "@aws-sdk/smithy-client": "3.34.0",
48
+ "@aws-sdk/types": "3.34.0",
49
+ "@aws-sdk/url-parser": "3.34.0",
50
+ "@aws-sdk/util-base64-browser": "3.34.0",
51
+ "@aws-sdk/util-base64-node": "3.34.0",
52
+ "@aws-sdk/util-body-length-browser": "3.34.0",
53
+ "@aws-sdk/util-body-length-node": "3.34.0",
54
+ "@aws-sdk/util-user-agent-browser": "3.34.0",
55
+ "@aws-sdk/util-user-agent-node": "3.34.0",
56
+ "@aws-sdk/util-utf8-browser": "3.34.0",
57
+ "@aws-sdk/util-utf8-node": "3.34.0",
58
58
  "entities": "2.2.0",
59
59
  "fast-xml-parser": "3.19.0",
60
60
  "tslib": "^2.3.0"
61
61
  },
62
62
  "devDependencies": {
63
- "@aws-sdk/client-documentation-generator": "3.32.0",
63
+ "@aws-sdk/client-documentation-generator": "3.34.0",
64
64
  "@types/node": "^12.7.5",
65
65
  "downlevel-dts": "0.7.0",
66
66
  "jest": "^26.1.0",
package/dist/es/STS.js CHANGED
@@ -8,14 +8,7 @@ import { GetAccessKeyInfoCommand, } from "./commands/GetAccessKeyInfoCommand";
8
8
  import { GetCallerIdentityCommand, } from "./commands/GetCallerIdentityCommand";
9
9
  import { GetFederationTokenCommand, } from "./commands/GetFederationTokenCommand";
10
10
  import { GetSessionTokenCommand, } from "./commands/GetSessionTokenCommand";
11
- /**
12
- * <fullname>Security Token Service</fullname>
13
- * <p>Security Token Service (STS) enables you to request temporary, limited-privilege
14
- * credentials for Identity and Access Management (IAM) users or for users that you
15
- * authenticate (federated users). This guide provides descriptions of the STS API. For
16
- * more information about using this service, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp.html">Temporary Security Credentials</a>.</p>
17
- */
18
- var STS = /** @class */ (function (_super) {
11
+ var STS = (function (_super) {
19
12
  __extends(STS, _super);
20
13
  function STS() {
21
14
  return _super !== null && _super.apply(this, arguments) || this;
@@ -1 +1 @@
1
- {"version":3,"file":"STS.js","sourceRoot":"","sources":["../../STS.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,SAAS,EAAE,MAAM,aAAa,CAAC;AACxC,OAAO,EAAE,iBAAiB,EAAmD,MAAM,8BAA8B,CAAC;AAClH,OAAO,EACL,yBAAyB,GAG1B,MAAM,sCAAsC,CAAC;AAC9C,OAAO,EACL,gCAAgC,GAGjC,MAAM,6CAA6C,CAAC;AACrD,OAAO,EACL,iCAAiC,GAGlC,MAAM,8CAA8C,CAAC;AACtD,OAAO,EACL,uBAAuB,GAGxB,MAAM,oCAAoC,CAAC;AAC5C,OAAO,EACL,wBAAwB,GAGzB,MAAM,qCAAqC,CAAC;AAC7C,OAAO,EACL,yBAAyB,GAG1B,MAAM,sCAAsC,CAAC;AAC9C,OAAO,EACL,sBAAsB,GAGvB,MAAM,mCAAmC,CAAC;AAG3C;;;;;;GAMG;AACH;IAAyB,uBAAS;IAAlC;;IAi1BA,CAAC;IAnvBQ,wBAAU,GAAjB,UACE,IAA4B,EAC5B,WAAyF,EACzF,EAAuD;QAEvD,IAAM,OAAO,GAAG,IAAI,iBAAiB,CAAC,IAAI,CAAC,CAAC;QAC5C,IAAI,OAAO,WAAW,KAAK,UAAU,EAAE;YACrC,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACjC;aAAM,IAAI,OAAO,EAAE,KAAK,UAAU,EAAE;YACnC,IAAI,OAAO,WAAW,KAAK,QAAQ;gBAAE,MAAM,IAAI,KAAK,CAAC,iCAA+B,OAAO,WAAa,CAAC,CAAC;YAC1G,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,IAAI,EAAE,EAAE,EAAE,CAAC,CAAC;SAC3C;aAAM;YACL,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACxC;IACH,CAAC;IAqJM,gCAAkB,GAAzB,UACE,IAAoC,EACpC,WAAiG,EACjG,EAA+D;QAE/D,IAAM,OAAO,GAAG,IAAI,yBAAyB,CAAC,IAAI,CAAC,CAAC;QACpD,IAAI,OAAO,WAAW,KAAK,UAAU,EAAE;YACrC,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACjC;aAAM,IAAI,OAAO,EAAE,KAAK,UAAU,EAAE;YACnC,IAAI,OAAO,WAAW,KAAK,QAAQ;gBAAE,MAAM,IAAI,KAAK,CAAC,iCAA+B,OAAO,WAAa,CAAC,CAAC;YAC1G,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,IAAI,EAAE,EAAE,EAAE,CAAC,CAAC;SAC3C;aAAM;YACL,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACxC;IACH,CAAC;IAyJM,uCAAyB,GAAhC,UACE,IAA2C,EAC3C,WAAwG,EACxG,EAAsE;QAEtE,IAAM,OAAO,GAAG,IAAI,gCAAgC,CAAC,IAAI,CAAC,CAAC;QAC3D,IAAI,OAAO,WAAW,KAAK,UAAU,EAAE;YACrC,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACjC;aAAM,IAAI,OAAO,EAAE,KAAK,UAAU,EAAE;YACnC,IAAI,OAAO,WAAW,KAAK,QAAQ;gBAAE,MAAM,IAAI,KAAK,CAAC,iCAA+B,OAAO,WAAa,CAAC,CAAC;YAC1G,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,IAAI,EAAE,EAAE,EAAE,CAAC,CAAC;SAC3C;aAAM;YACL,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACxC;IACH,CAAC;IAqDM,wCAA0B,GAAjC,UACE,IAA4C,EAC5C,WAAyG,EACzG,EAAuE;QAEvE,IAAM,OAAO,GAAG,IAAI,iCAAiC,CAAC,IAAI,CAAC,CAAC;QAC5D,IAAI,OAAO,WAAW,KAAK,UAAU,EAAE;YACrC,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACjC;aAAM,IAAI,OAAO,EAAE,KAAK,UAAU,EAAE;YACnC,IAAI,OAAO,WAAW,KAAK,QAAQ;gBAAE,MAAM,IAAI,KAAK,CAAC,iCAA+B,OAAO,WAAa,CAAC,CAAC;YAC1G,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,IAAI,EAAE,EAAE,EAAE,CAAC,CAAC;SAC3C;aAAM;YACL,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACxC;IACH,CAAC;IAmCM,8BAAgB,GAAvB,UACE,IAAkC,EAClC,WAA+F,EAC/F,EAA6D;QAE7D,IAAM,OAAO,GAAG,IAAI,uBAAuB,CAAC,IAAI,CAAC,CAAC;QAClD,IAAI,OAAO,WAAW,KAAK,UAAU,EAAE;YACrC,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACjC;aAAM,IAAI,OAAO,EAAE,KAAK,UAAU,EAAE;YACnC,IAAI,OAAO,WAAW,KAAK,QAAQ;gBAAE,MAAM,IAAI,KAAK,CAAC,iCAA+B,OAAO,WAAa,CAAC,CAAC;YAC1G,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,IAAI,EAAE,EAAE,EAAE,CAAC,CAAC;SAC3C;aAAM;YACL,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACxC;IACH,CAAC;IA2BM,+BAAiB,GAAxB,UACE,IAAmC,EACnC,WAAgG,EAChG,EAA8D;QAE9D,IAAM,OAAO,GAAG,IAAI,wBAAwB,CAAC,IAAI,CAAC,CAAC;QACnD,IAAI,OAAO,WAAW,KAAK,UAAU,EAAE;YACrC,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACjC;aAAM,IAAI,OAAO,EAAE,KAAK,UAAU,EAAE;YACnC,IAAI,OAAO,WAAW,KAAK,QAAQ;gBAAE,MAAM,IAAI,KAAK,CAAC,iCAA+B,OAAO,WAAa,CAAC,CAAC;YAC1G,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,IAAI,EAAE,EAAE,EAAE,CAAC,CAAC;SAC3C;aAAM;YACL,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACxC;IACH,CAAC;IA4JM,gCAAkB,GAAzB,UACE,IAAoC,EACpC,WAAiG,EACjG,EAA+D;QAE/D,IAAM,OAAO,GAAG,IAAI,yBAAyB,CAAC,IAAI,CAAC,CAAC;QACpD,IAAI,OAAO,WAAW,KAAK,UAAU,EAAE;YACrC,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACjC;aAAM,IAAI,OAAO,EAAE,KAAK,UAAU,EAAE;YACnC,IAAI,OAAO,WAAW,KAAK,QAAQ;gBAAE,MAAM,IAAI,KAAK,CAAC,iCAA+B,OAAO,WAAa,CAAC,CAAC;YAC1G,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,IAAI,EAAE,EAAE,EAAE,CAAC,CAAC;SAC3C;aAAM;YACL,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACxC;IACH,CAAC;IAqEM,6BAAe,GAAtB,UACE,IAAiC,EACjC,WAA8F,EAC9F,EAA4D;QAE5D,IAAM,OAAO,GAAG,IAAI,sBAAsB,CAAC,IAAI,CAAC,CAAC;QACjD,IAAI,OAAO,WAAW,KAAK,UAAU,EAAE;YACrC,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACjC;aAAM,IAAI,OAAO,EAAE,KAAK,UAAU,EAAE;YACnC,IAAI,OAAO,WAAW,KAAK,QAAQ;gBAAE,MAAM,IAAI,KAAK,CAAC,iCAA+B,OAAO,WAAa,CAAC,CAAC;YAC1G,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,IAAI,EAAE,EAAE,EAAE,CAAC,CAAC;SAC3C;aAAM;YACL,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACxC;IACH,CAAC;IACH,UAAC;AAAD,CAAC,AAj1BD,CAAyB,SAAS,GAi1BjC"}
1
+ {"version":3,"file":"STS.js","sourceRoot":"","sources":["../../STS.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,SAAS,EAAE,MAAM,aAAa,CAAC;AACxC,OAAO,EAAE,iBAAiB,EAAmD,MAAM,8BAA8B,CAAC;AAClH,OAAO,EACL,yBAAyB,GAG1B,MAAM,sCAAsC,CAAC;AAC9C,OAAO,EACL,gCAAgC,GAGjC,MAAM,6CAA6C,CAAC;AACrD,OAAO,EACL,iCAAiC,GAGlC,MAAM,8CAA8C,CAAC;AACtD,OAAO,EACL,uBAAuB,GAGxB,MAAM,oCAAoC,CAAC;AAC5C,OAAO,EACL,wBAAwB,GAGzB,MAAM,qCAAqC,CAAC;AAC7C,OAAO,EACL,yBAAyB,GAG1B,MAAM,sCAAsC,CAAC;AAC9C,OAAO,EACL,sBAAsB,GAGvB,MAAM,mCAAmC,CAAC;AAU3C;IAAyB,uBAAS;IAAlC;;IAi1BA,CAAC;IAnvBQ,wBAAU,GAAjB,UACE,IAA4B,EAC5B,WAAyF,EACzF,EAAuD;QAEvD,IAAM,OAAO,GAAG,IAAI,iBAAiB,CAAC,IAAI,CAAC,CAAC;QAC5C,IAAI,OAAO,WAAW,KAAK,UAAU,EAAE;YACrC,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACjC;aAAM,IAAI,OAAO,EAAE,KAAK,UAAU,EAAE;YACnC,IAAI,OAAO,WAAW,KAAK,QAAQ;gBAAE,MAAM,IAAI,KAAK,CAAC,iCAA+B,OAAO,WAAa,CAAC,CAAC;YAC1G,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,IAAI,EAAE,EAAE,EAAE,CAAC,CAAC;SAC3C;aAAM;YACL,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACxC;IACH,CAAC;IAqJM,gCAAkB,GAAzB,UACE,IAAoC,EACpC,WAAiG,EACjG,EAA+D;QAE/D,IAAM,OAAO,GAAG,IAAI,yBAAyB,CAAC,IAAI,CAAC,CAAC;QACpD,IAAI,OAAO,WAAW,KAAK,UAAU,EAAE;YACrC,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACjC;aAAM,IAAI,OAAO,EAAE,KAAK,UAAU,EAAE;YACnC,IAAI,OAAO,WAAW,KAAK,QAAQ;gBAAE,MAAM,IAAI,KAAK,CAAC,iCAA+B,OAAO,WAAa,CAAC,CAAC;YAC1G,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,IAAI,EAAE,EAAE,EAAE,CAAC,CAAC;SAC3C;aAAM;YACL,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACxC;IACH,CAAC;IAyJM,uCAAyB,GAAhC,UACE,IAA2C,EAC3C,WAAwG,EACxG,EAAsE;QAEtE,IAAM,OAAO,GAAG,IAAI,gCAAgC,CAAC,IAAI,CAAC,CAAC;QAC3D,IAAI,OAAO,WAAW,KAAK,UAAU,EAAE;YACrC,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACjC;aAAM,IAAI,OAAO,EAAE,KAAK,UAAU,EAAE;YACnC,IAAI,OAAO,WAAW,KAAK,QAAQ;gBAAE,MAAM,IAAI,KAAK,CAAC,iCAA+B,OAAO,WAAa,CAAC,CAAC;YAC1G,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,IAAI,EAAE,EAAE,EAAE,CAAC,CAAC;SAC3C;aAAM;YACL,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACxC;IACH,CAAC;IAqDM,wCAA0B,GAAjC,UACE,IAA4C,EAC5C,WAAyG,EACzG,EAAuE;QAEvE,IAAM,OAAO,GAAG,IAAI,iCAAiC,CAAC,IAAI,CAAC,CAAC;QAC5D,IAAI,OAAO,WAAW,KAAK,UAAU,EAAE;YACrC,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACjC;aAAM,IAAI,OAAO,EAAE,KAAK,UAAU,EAAE;YACnC,IAAI,OAAO,WAAW,KAAK,QAAQ;gBAAE,MAAM,IAAI,KAAK,CAAC,iCAA+B,OAAO,WAAa,CAAC,CAAC;YAC1G,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,IAAI,EAAE,EAAE,EAAE,CAAC,CAAC;SAC3C;aAAM;YACL,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACxC;IACH,CAAC;IAmCM,8BAAgB,GAAvB,UACE,IAAkC,EAClC,WAA+F,EAC/F,EAA6D;QAE7D,IAAM,OAAO,GAAG,IAAI,uBAAuB,CAAC,IAAI,CAAC,CAAC;QAClD,IAAI,OAAO,WAAW,KAAK,UAAU,EAAE;YACrC,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACjC;aAAM,IAAI,OAAO,EAAE,KAAK,UAAU,EAAE;YACnC,IAAI,OAAO,WAAW,KAAK,QAAQ;gBAAE,MAAM,IAAI,KAAK,CAAC,iCAA+B,OAAO,WAAa,CAAC,CAAC;YAC1G,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,IAAI,EAAE,EAAE,EAAE,CAAC,CAAC;SAC3C;aAAM;YACL,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACxC;IACH,CAAC;IA2BM,+BAAiB,GAAxB,UACE,IAAmC,EACnC,WAAgG,EAChG,EAA8D;QAE9D,IAAM,OAAO,GAAG,IAAI,wBAAwB,CAAC,IAAI,CAAC,CAAC;QACnD,IAAI,OAAO,WAAW,KAAK,UAAU,EAAE;YACrC,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACjC;aAAM,IAAI,OAAO,EAAE,KAAK,UAAU,EAAE;YACnC,IAAI,OAAO,WAAW,KAAK,QAAQ;gBAAE,MAAM,IAAI,KAAK,CAAC,iCAA+B,OAAO,WAAa,CAAC,CAAC;YAC1G,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,IAAI,EAAE,EAAE,EAAE,CAAC,CAAC;SAC3C;aAAM;YACL,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACxC;IACH,CAAC;IA4JM,gCAAkB,GAAzB,UACE,IAAoC,EACpC,WAAiG,EACjG,EAA+D;QAE/D,IAAM,OAAO,GAAG,IAAI,yBAAyB,CAAC,IAAI,CAAC,CAAC;QACpD,IAAI,OAAO,WAAW,KAAK,UAAU,EAAE;YACrC,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACjC;aAAM,IAAI,OAAO,EAAE,KAAK,UAAU,EAAE;YACnC,IAAI,OAAO,WAAW,KAAK,QAAQ;gBAAE,MAAM,IAAI,KAAK,CAAC,iCAA+B,OAAO,WAAa,CAAC,CAAC;YAC1G,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,IAAI,EAAE,EAAE,EAAE,CAAC,CAAC;SAC3C;aAAM;YACL,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACxC;IACH,CAAC;IAqEM,6BAAe,GAAtB,UACE,IAAiC,EACjC,WAA8F,EAC9F,EAA4D;QAE5D,IAAM,OAAO,GAAG,IAAI,sBAAsB,CAAC,IAAI,CAAC,CAAC;QACjD,IAAI,OAAO,WAAW,KAAK,UAAU,EAAE;YACrC,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACjC;aAAM,IAAI,OAAO,EAAE,KAAK,UAAU,EAAE;YACnC,IAAI,OAAO,WAAW,KAAK,QAAQ;gBAAE,MAAM,IAAI,KAAK,CAAC,iCAA+B,OAAO,WAAa,CAAC,CAAC;YAC1G,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,IAAI,EAAE,EAAE,EAAE,CAAC,CAAC;SAC3C;aAAM;YACL,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;SACxC;IACH,CAAC;IACH,UAAC;AAAD,CAAC,AAj1BD,CAAyB,SAAS,GAi1BjC"}
@@ -8,14 +8,7 @@ import { getRetryPlugin, resolveRetryConfig } from "@aws-sdk/middleware-retry";
8
8
  import { resolveStsAuthConfig } from "@aws-sdk/middleware-sdk-sts";
9
9
  import { getUserAgentPlugin, resolveUserAgentConfig, } from "@aws-sdk/middleware-user-agent";
10
10
  import { Client as __Client, } from "@aws-sdk/smithy-client";
11
- /**
12
- * <fullname>Security Token Service</fullname>
13
- * <p>Security Token Service (STS) enables you to request temporary, limited-privilege
14
- * credentials for Identity and Access Management (IAM) users or for users that you
15
- * authenticate (federated users). This guide provides descriptions of the STS API. For
16
- * more information about using this service, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp.html">Temporary Security Credentials</a>.</p>
17
- */
18
- var STSClient = /** @class */ (function (_super) {
11
+ var STSClient = (function (_super) {
19
12
  __extends(STSClient, _super);
20
13
  function STSClient(configuration) {
21
14
  var _this = this;
@@ -35,11 +28,6 @@ var STSClient = /** @class */ (function (_super) {
35
28
  _this.middlewareStack.use(getUserAgentPlugin(_this.config));
36
29
  return _this;
37
30
  }
38
- /**
39
- * Destroy underlying resources, like sockets. It's usually not necessary to do this.
40
- * However in Node.js, it's best to explicitly shut down the client's agent when it is no longer needed.
41
- * Otherwise, sockets might stay open for quite a long time before the server terminates them.
42
- */
43
31
  STSClient.prototype.destroy = function () {
44
32
  _super.prototype.destroy.call(this);
45
33
  };
@@ -1 +1 @@
1
- {"version":3,"file":"STSClient.js","sourceRoot":"","sources":["../../STSClient.ts"],"names":[],"mappings":";AAcA,OAAO,EAAE,gBAAgB,IAAI,kBAAkB,EAAE,MAAM,iBAAiB,CAAC;AACzE,OAAO,EAKL,sBAAsB,EACtB,mBAAmB,GACpB,MAAM,0BAA0B,CAAC;AAClC,OAAO,EAAE,sBAAsB,EAAE,MAAM,oCAAoC,CAAC;AAC5E,OAAO,EAGL,mBAAmB,EACnB,uBAAuB,GACxB,MAAM,iCAAiC,CAAC;AACzC,OAAO,EAAE,eAAe,EAAE,MAAM,4BAA4B,CAAC;AAC7D,OAAO,EAAyC,cAAc,EAAE,kBAAkB,EAAE,MAAM,2BAA2B,CAAC;AACtH,OAAO,EAA6C,oBAAoB,EAAE,MAAM,6BAA6B,CAAC;AAC9G,OAAO,EAGL,kBAAkB,EAClB,sBAAsB,GACvB,MAAM,gCAAgC,CAAC;AAExC,OAAO,EACL,MAAM,IAAI,QAAQ,GAGnB,MAAM,wBAAwB,CAAC;AA+KhC;;;;;;GAMG;AACH;IAA+B,6BAK9B;IAMC,mBAAY,aAA8B;QAA1C,iBAeC;QAdC,IAAI,SAAS,GAAG,kBAAkB,CAAC,aAAa,CAAC,CAAC;QAClD,IAAI,SAAS,GAAG,mBAAmB,CAAC,SAAS,CAAC,CAAC;QAC/C,IAAI,SAAS,GAAG,sBAAsB,CAAC,SAAS,CAAC,CAAC;QAClD,IAAI,SAAS,GAAG,kBAAkB,CAAC,SAAS,CAAC,CAAC;QAC9C,IAAI,SAAS,GAAG,uBAAuB,CAAC,SAAS,CAAC,CAAC;QACnD,IAAI,SAAS,GAAG,oBAAoB,CAAC,SAAS,EAAE,EAAE,aAAa,EAAE,SAAS,EAAE,CAAC,CAAC;QAC9E,IAAI,SAAS,GAAG,sBAAsB,CAAC,SAAS,CAAC,CAAC;QAClD,QAAA,kBAAM,SAAS,CAAC,SAAC;QACjB,KAAI,CAAC,MAAM,GAAG,SAAS,CAAC;QACxB,KAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,KAAI,CAAC,MAAM,CAAC,CAAC,CAAC;QACtD,KAAI,CAAC,eAAe,CAAC,GAAG,CAAC,sBAAsB,CAAC,KAAI,CAAC,MAAM,CAAC,CAAC,CAAC;QAC9D,KAAI,CAAC,eAAe,CAAC,GAAG,CAAC,mBAAmB,CAAC,KAAI,CAAC,MAAM,CAAC,CAAC,CAAC;QAC3D,KAAI,CAAC,eAAe,CAAC,GAAG,CAAC,eAAe,CAAC,KAAI,CAAC,MAAM,CAAC,CAAC,CAAC;QACvD,KAAI,CAAC,eAAe,CAAC,GAAG,CAAC,kBAAkB,CAAC,KAAI,CAAC,MAAM,CAAC,CAAC,CAAC;;IAC5D,CAAC;IAED;;;;OAIG;IACH,2BAAO,GAAP;QACE,iBAAM,OAAO,WAAE,CAAC;IAClB,CAAC;IACH,gBAAC;AAAD,CAAC,AApCD,CAA+B,QAAQ,GAoCtC"}
1
+ {"version":3,"file":"STSClient.js","sourceRoot":"","sources":["../../STSClient.ts"],"names":[],"mappings":";AAcA,OAAO,EAAE,gBAAgB,IAAI,kBAAkB,EAAE,MAAM,iBAAiB,CAAC;AACzE,OAAO,EAKL,sBAAsB,EACtB,mBAAmB,GACpB,MAAM,0BAA0B,CAAC;AAClC,OAAO,EAAE,sBAAsB,EAAE,MAAM,oCAAoC,CAAC;AAC5E,OAAO,EAGL,mBAAmB,EACnB,uBAAuB,GACxB,MAAM,iCAAiC,CAAC;AACzC,OAAO,EAAE,eAAe,EAAE,MAAM,4BAA4B,CAAC;AAC7D,OAAO,EAAyC,cAAc,EAAE,kBAAkB,EAAE,MAAM,2BAA2B,CAAC;AACtH,OAAO,EAA6C,oBAAoB,EAAE,MAAM,6BAA6B,CAAC;AAC9G,OAAO,EAGL,kBAAkB,EAClB,sBAAsB,GACvB,MAAM,gCAAgC,CAAC;AAExC,OAAO,EACL,MAAM,IAAI,QAAQ,GAGnB,MAAM,wBAAwB,CAAC;AAsLhC;IAA+B,6BAK9B;IAMC,mBAAY,aAA8B;QAA1C,iBAeC;QAdC,IAAI,SAAS,GAAG,kBAAkB,CAAC,aAAa,CAAC,CAAC;QAClD,IAAI,SAAS,GAAG,mBAAmB,CAAC,SAAS,CAAC,CAAC;QAC/C,IAAI,SAAS,GAAG,sBAAsB,CAAC,SAAS,CAAC,CAAC;QAClD,IAAI,SAAS,GAAG,kBAAkB,CAAC,SAAS,CAAC,CAAC;QAC9C,IAAI,SAAS,GAAG,uBAAuB,CAAC,SAAS,CAAC,CAAC;QACnD,IAAI,SAAS,GAAG,oBAAoB,CAAC,SAAS,EAAE,EAAE,aAAa,EAAE,SAAS,EAAE,CAAC,CAAC;QAC9E,IAAI,SAAS,GAAG,sBAAsB,CAAC,SAAS,CAAC,CAAC;QAClD,QAAA,kBAAM,SAAS,CAAC,SAAC;QACjB,KAAI,CAAC,MAAM,GAAG,SAAS,CAAC;QACxB,KAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,KAAI,CAAC,MAAM,CAAC,CAAC,CAAC;QACtD,KAAI,CAAC,eAAe,CAAC,GAAG,CAAC,sBAAsB,CAAC,KAAI,CAAC,MAAM,CAAC,CAAC,CAAC;QAC9D,KAAI,CAAC,eAAe,CAAC,GAAG,CAAC,mBAAmB,CAAC,KAAI,CAAC,MAAM,CAAC,CAAC,CAAC;QAC3D,KAAI,CAAC,eAAe,CAAC,GAAG,CAAC,eAAe,CAAC,KAAI,CAAC,MAAM,CAAC,CAAC,CAAC;QACvD,KAAI,CAAC,eAAe,CAAC,GAAG,CAAC,kBAAkB,CAAC,KAAI,CAAC,MAAM,CAAC,CAAC,CAAC;;IAC5D,CAAC;IAOD,2BAAO,GAAP;QACE,iBAAM,OAAO,WAAE,CAAC;IAClB,CAAC;IACH,gBAAC;AAAD,CAAC,AApCD,CAA+B,QAAQ,GAoCtC"}
@@ -4,121 +4,13 @@ import { deserializeAws_queryAssumeRoleCommand, serializeAws_queryAssumeRoleComm
4
4
  import { getSerdePlugin } from "@aws-sdk/middleware-serde";
5
5
  import { getAwsAuthPlugin } from "@aws-sdk/middleware-signing";
6
6
  import { Command as $Command } from "@aws-sdk/smithy-client";
7
- /**
8
- * <p>Returns a set of temporary security credentials that you can use to access Amazon Web Services
9
- * resources that you might not normally have access to. These temporary credentials
10
- * consist of an access key ID, a secret access key, and a security token. Typically, you
11
- * use <code>AssumeRole</code> within your account or for cross-account access. For a
12
- * comparison of <code>AssumeRole</code> with other API operations that produce temporary
13
- * credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
14
- * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing
15
- * the STS API operations</a> in the
16
- * <i>IAM User Guide</i>.</p>
17
- * <p>
18
- * <b>Permissions</b>
19
- * </p>
20
- * <p>The temporary security credentials created by <code>AssumeRole</code> can be used to
21
- * make API calls to any Amazon Web Services service with the following exception: You cannot call the
22
- * STS <code>GetFederationToken</code> or <code>GetSessionToken</code> API
23
- * operations.</p>
24
- * <p>(Optional) You can pass inline or managed <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">session policies</a> to
25
- * this operation. You can pass a single JSON policy document to use as an inline session
26
- * policy. You can also specify up to 10 managed policies to use as managed session policies.
27
- * The plaintext that you use for both inline and managed session policies can't exceed 2,048
28
- * characters. Passing policies to this operation returns new
29
- * temporary credentials. The resulting session's permissions are the intersection of the
30
- * role's identity-based policy and the session policies. You can use the role's temporary
31
- * credentials in subsequent Amazon Web Services API calls to access resources in the account that owns
32
- * the role. You cannot use session policies to grant more permissions than those allowed
33
- * by the identity-based policy of the role that is being assumed. For more information, see
34
- * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">Session
35
- * Policies</a> in the <i>IAM User Guide</i>.</p>
36
- * <p>To assume a role from a different account, your account must be trusted by the
37
- * role. The trust relationship is defined in the role's trust policy when the role is
38
- * created. That trust policy states which accounts are allowed to delegate that access to
39
- * users in the account. </p>
40
- * <p>A user who wants to access a role in a different account must also have permissions that
41
- * are delegated from the user account administrator. The administrator must attach a policy
42
- * that allows the user to call <code>AssumeRole</code> for the ARN of the role in the other
43
- * account. If the user is in the same account as the role, then you can do either of the
44
- * following:</p>
45
- * <ul>
46
- * <li>
47
- * <p>Attach a policy to the user (identical to the previous user in a different
48
- * account).</p>
49
- * </li>
50
- * <li>
51
- * <p>Add the user as a principal directly in the role's trust policy.</p>
52
- * </li>
53
- * </ul>
54
- * <p>In this case, the trust policy acts as an IAM resource-based policy. Users in the same
55
- * account as the role do not need explicit permission to assume the role. For more
56
- * information about trust policies and resource-based policies, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html">IAM Policies</a> in
57
- * the <i>IAM User Guide</i>.</p>
58
- * <p>
59
- * <b>Tags</b>
60
- * </p>
61
- * <p>(Optional) You can pass tag key-value pairs to your session. These tags are called
62
- * session tags. For more information about session tags, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in the
63
- * <i>IAM User Guide</i>.</p>
64
- * <p>An administrator must grant you the permissions necessary to pass session tags. The
65
- * administrator can also create granular permissions to allow you to pass only specific
66
- * session tags. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html">Tutorial: Using Tags
67
- * for Attribute-Based Access Control</a> in the
68
- * <i>IAM User Guide</i>.</p>
69
- * <p>You can set the session tags as transitive. Transitive tags persist during role
70
- * chaining. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining">Chaining Roles
71
- * with Session Tags</a> in the <i>IAM User Guide</i>.</p>
72
- * <p>
73
- * <b>Using MFA with AssumeRole</b>
74
- * </p>
75
- * <p>(Optional) You can include multi-factor authentication (MFA) information when you call
76
- * <code>AssumeRole</code>. This is useful for cross-account scenarios to ensure that the
77
- * user that assumes the role has been authenticated with an Amazon Web Services MFA device. In that
78
- * scenario, the trust policy of the role being assumed includes a condition that tests for
79
- * MFA authentication. If the caller does not include valid MFA information, the request to
80
- * assume the role is denied. The condition in a trust policy that tests for MFA
81
- * authentication might look like the following example.</p>
82
- * <p>
83
- * <code>"Condition": {"Bool": {"aws:MultiFactorAuthPresent": true}}</code>
84
- * </p>
85
- * <p>For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/MFAProtectedAPI.html">Configuring MFA-Protected API Access</a>
86
- * in the <i>IAM User Guide</i> guide.</p>
87
- * <p>To use MFA with <code>AssumeRole</code>, you pass values for the
88
- * <code>SerialNumber</code> and <code>TokenCode</code> parameters. The
89
- * <code>SerialNumber</code> value identifies the user's hardware or virtual MFA device.
90
- * The <code>TokenCode</code> is the time-based one-time password (TOTP) that the MFA device
91
- * produces. </p>
92
- * @example
93
- * Use a bare-bones client and the command you need to make an API call.
94
- * ```javascript
95
- * import { STSClient, AssumeRoleCommand } from "@aws-sdk/client-sts"; // ES Modules import
96
- * // const { STSClient, AssumeRoleCommand } = require("@aws-sdk/client-sts"); // CommonJS import
97
- * const client = new STSClient(config);
98
- * const command = new AssumeRoleCommand(input);
99
- * const response = await client.send(command);
100
- * ```
101
- *
102
- * @see {@link AssumeRoleCommandInput} for command's `input` shape.
103
- * @see {@link AssumeRoleCommandOutput} for command's `response` shape.
104
- * @see {@link STSClientResolvedConfig | config} for command's `input` shape.
105
- *
106
- */
107
- var AssumeRoleCommand = /** @class */ (function (_super) {
7
+ var AssumeRoleCommand = (function (_super) {
108
8
  __extends(AssumeRoleCommand, _super);
109
- // Start section: command_properties
110
- // End section: command_properties
111
9
  function AssumeRoleCommand(input) {
112
- var _this =
113
- // Start section: command_constructor
114
- _super.call(this) || this;
10
+ var _this = _super.call(this) || this;
115
11
  _this.input = input;
116
12
  return _this;
117
- // End section: command_constructor
118
13
  }
119
- /**
120
- * @internal
121
- */
122
14
  AssumeRoleCommand.prototype.resolveMiddleware = function (clientStack, configuration, options) {
123
15
  this.middlewareStack.use(getSerdePlugin(configuration, this.serialize, this.deserialize));
124
16
  this.middlewareStack.use(getAwsAuthPlugin(configuration));
@@ -1 +1 @@
1
- {"version":3,"file":"AssumeRoleCommand.js","sourceRoot":"","sources":["../../../commands/AssumeRoleCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,iBAAiB,EAAE,kBAAkB,EAAE,MAAM,oBAAoB,CAAC;AAC3E,OAAO,EAAE,qCAAqC,EAAE,mCAAmC,EAAE,MAAM,wBAAwB,CAAC;AACpH,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAC3D,OAAO,EAAE,gBAAgB,EAAE,MAAM,6BAA6B,CAAC;AAE/D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAmGG;AACH;IAAuC,qCAItC;IACC,oCAAoC;IACpC,kCAAkC;IAElC,2BAAqB,KAA6B;QAAlD;QACE,qCAAqC;QACrC,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAAwB;;QAGhD,mCAAmC;IACrC,CAAC;IAED;;OAEG;IACH,6CAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAC1F,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,gBAAgB,CAAC,aAAa,CAAC,CAAC,CAAC;QAE1D,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,mBAAmB,CAAC;QACxC,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,iBAAiB,CAAC,kBAAkB;YAC7D,wBAAwB,EAAE,kBAAkB,CAAC,kBAAkB;SAChE,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,qCAAS,GAAjB,UAAkB,KAA6B,EAAE,OAAuB;QACtE,OAAO,mCAAmC,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IAC7D,CAAC;IAEO,uCAAW,GAAnB,UAAoB,MAAsB,EAAE,OAAuB;QACjE,OAAO,qCAAqC,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IAChE,CAAC;IAIH,wBAAC;AAAD,CAAC,AAvDD,CAAuC,QAAQ,GAuD9C"}
1
+ {"version":3,"file":"AssumeRoleCommand.js","sourceRoot":"","sources":["../../../commands/AssumeRoleCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,iBAAiB,EAAE,kBAAkB,EAAE,MAAM,oBAAoB,CAAC;AAC3E,OAAO,EAAE,qCAAqC,EAAE,mCAAmC,EAAE,MAAM,wBAAwB,CAAC;AACpH,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAC3D,OAAO,EAAE,gBAAgB,EAAE,MAAM,6BAA6B,CAAC;AAE/D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAkH7D;IAAuC,qCAItC;IAIC,2BAAqB,KAA6B;QAAlD,YAEE,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAAwB;;IAIlD,CAAC;IAKD,6CAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAC1F,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,gBAAgB,CAAC,aAAa,CAAC,CAAC,CAAC;QAE1D,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,mBAAmB,CAAC;QACxC,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,iBAAiB,CAAC,kBAAkB;YAC7D,wBAAwB,EAAE,kBAAkB,CAAC,kBAAkB;SAChE,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,qCAAS,GAAjB,UAAkB,KAA6B,EAAE,OAAuB;QACtE,OAAO,mCAAmC,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IAC7D,CAAC;IAEO,uCAAW,GAAnB,UAAoB,MAAsB,EAAE,OAAuB;QACjE,OAAO,qCAAqC,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IAChE,CAAC;IAIH,wBAAC;AAAD,CAAC,AAvDD,CAAuC,QAAQ,GAuD9C"}
@@ -3,169 +3,13 @@ import { AssumeRoleWithSAMLRequest, AssumeRoleWithSAMLResponse } from "../models
3
3
  import { deserializeAws_queryAssumeRoleWithSAMLCommand, serializeAws_queryAssumeRoleWithSAMLCommand, } from "../protocols/Aws_query";
4
4
  import { getSerdePlugin } from "@aws-sdk/middleware-serde";
5
5
  import { Command as $Command } from "@aws-sdk/smithy-client";
6
- /**
7
- * <p>Returns a set of temporary security credentials for users who have been authenticated
8
- * via a SAML authentication response. This operation provides a mechanism for tying an
9
- * enterprise identity store or directory to role-based Amazon Web Services access without user-specific
10
- * credentials or configuration. For a comparison of <code>AssumeRoleWithSAML</code> with the
11
- * other API operations that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
12
- * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
13
- * STS API operations</a> in the <i>IAM User Guide</i>.</p>
14
- * <p>The temporary security credentials returned by this operation consist of an access key
15
- * ID, a secret access key, and a security token. Applications can use these temporary
16
- * security credentials to sign calls to Amazon Web Services services.</p>
17
- * <p>
18
- * <b>Session Duration</b>
19
- * </p>
20
- * <p>By default, the temporary security credentials created by
21
- * <code>AssumeRoleWithSAML</code> last for one hour. However, you can use the optional
22
- * <code>DurationSeconds</code> parameter to specify the duration of your session. Your
23
- * role session lasts for the duration that you specify, or until the time specified in the
24
- * SAML authentication response's <code>SessionNotOnOrAfter</code> value, whichever is
25
- * shorter. You can provide a <code>DurationSeconds</code> value from 900 seconds (15 minutes)
26
- * up to the maximum session duration setting for the role. This setting can have a value from
27
- * 1 hour to 12 hours. To learn how to view the maximum value for your role, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session">View the
28
- * Maximum Session Duration Setting for a Role</a> in the
29
- * <i>IAM User Guide</i>. The maximum session duration limit applies when
30
- * you use the <code>AssumeRole*</code> API operations or the <code>assume-role*</code> CLI
31
- * commands. However the limit does not apply when you use those operations to create a
32
- * console URL. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html">Using IAM Roles</a> in the
33
- * <i>IAM User Guide</i>.</p>
34
- * <note>
35
- * <p>
36
- * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts.html#iam-term-role-chaining">Role chaining</a> limits your CLI or Amazon Web Services API
37
- * role session to a maximum of one hour. When you use the <code>AssumeRole</code> API
38
- * operation to assume a role, you can specify the duration of your role session with
39
- * the <code>DurationSeconds</code> parameter. You can specify a parameter value of up
40
- * to 43200 seconds (12 hours), depending on the maximum session duration setting for
41
- * your role. However, if you assume a role using role chaining and provide a
42
- * <code>DurationSeconds</code> parameter value greater than one hour, the
43
- * operation fails.</p>
44
- * </note>
45
- * <p>
46
- * <b>Permissions</b>
47
- * </p>
48
- * <p>The temporary security credentials created by <code>AssumeRoleWithSAML</code> can be
49
- * used to make API calls to any Amazon Web Services service with the following exception: you cannot call
50
- * the STS <code>GetFederationToken</code> or <code>GetSessionToken</code> API
51
- * operations.</p>
52
- * <p>(Optional) You can pass inline or managed <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">session policies</a> to
53
- * this operation. You can pass a single JSON policy document to use as an inline session
54
- * policy. You can also specify up to 10 managed policies to use as managed session policies.
55
- * The plaintext that you use for both inline and managed session policies can't exceed 2,048
56
- * characters. Passing policies to this operation returns new
57
- * temporary credentials. The resulting session's permissions are the intersection of the
58
- * role's identity-based policy and the session policies. You can use the role's temporary
59
- * credentials in subsequent Amazon Web Services API calls to access resources in the account that owns
60
- * the role. You cannot use session policies to grant more permissions than those allowed
61
- * by the identity-based policy of the role that is being assumed. For more information, see
62
- * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">Session
63
- * Policies</a> in the <i>IAM User Guide</i>.</p>
64
- * <p>Calling <code>AssumeRoleWithSAML</code> does not require the use of Amazon Web Services security
65
- * credentials. The identity of the caller is validated by using keys in the metadata document
66
- * that is uploaded for the SAML provider entity for your identity provider. </p>
67
- * <important>
68
- * <p>Calling <code>AssumeRoleWithSAML</code> can result in an entry in your CloudTrail logs.
69
- * The entry includes the value in the <code>NameID</code> element of the SAML assertion.
70
- * We recommend that you use a <code>NameIDType</code> that is not associated with any
71
- * personally identifiable information (PII). For example, you could instead use the
72
- * persistent identifier
73
- * (<code>urn:oasis:names:tc:SAML:2.0:nameid-format:persistent</code>).</p>
74
- * </important>
75
- * <p>
76
- * <b>Tags</b>
77
- * </p>
78
- * <p>(Optional) You can configure your IdP to pass attributes into your SAML assertion as
79
- * session tags. Each session tag consists of a key name and an associated value. For more
80
- * information about session tags, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in the
81
- * <i>IAM User Guide</i>.</p>
82
- * <p>You can pass up to 50 session tags. The plaintext session tag keys can’t exceed 128
83
- * characters and the values can’t exceed 256 characters. For these and additional limits, see
84
- * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length">IAM
85
- * and STS Character Limits</a> in the <i>IAM User Guide</i>.</p>
86
- *
87
- * <note>
88
- * <p>An Amazon Web Services conversion compresses the passed session policies and session tags into a
89
- * packed binary format that has a separate limit. Your request can fail for this limit
90
- * even if your plaintext meets the other requirements. The <code>PackedPolicySize</code>
91
- * response element indicates by percentage how close the policies and tags for your
92
- * request are to the upper size limit.
93
- * </p>
94
- * </note>
95
- * <p>You can pass a session tag with the same key as a tag that is
96
- * attached to the role. When you do, session tags override the role's tags with the same
97
- * key.</p>
98
- * <p>An administrator must grant you the permissions necessary to pass session tags. The
99
- * administrator can also create granular permissions to allow you to pass only specific
100
- * session tags. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html">Tutorial: Using Tags
101
- * for Attribute-Based Access Control</a> in the
102
- * <i>IAM User Guide</i>.</p>
103
- * <p>You can set the session tags as transitive. Transitive tags persist during role
104
- * chaining. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining">Chaining Roles
105
- * with Session Tags</a> in the <i>IAM User Guide</i>.</p>
106
- * <p>
107
- * <b>SAML Configuration</b>
108
- * </p>
109
- * <p>Before your application can call <code>AssumeRoleWithSAML</code>, you must configure
110
- * your SAML identity provider (IdP) to issue the claims required by Amazon Web Services. Additionally, you
111
- * must use Identity and Access Management (IAM) to create a SAML provider entity in your Amazon Web Services account that
112
- * represents your identity provider. You must also create an IAM role that specifies this
113
- * SAML provider in its trust policy. </p>
114
- * <p>For more information, see the following resources:</p>
115
- * <ul>
116
- * <li>
117
- * <p>
118
- * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html">About
119
- * SAML 2.0-based Federation</a> in the <i>IAM User Guide</i>.
120
- * </p>
121
- * </li>
122
- * <li>
123
- * <p>
124
- * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_saml.html">Creating SAML Identity Providers</a> in the
125
- * <i>IAM User Guide</i>. </p>
126
- * </li>
127
- * <li>
128
- * <p>
129
- * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_saml_relying-party.html">Configuring
130
- * a Relying Party and Claims</a> in the <i>IAM User Guide</i>.
131
- * </p>
132
- * </li>
133
- * <li>
134
- * <p>
135
- * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_saml.html">Creating a Role for SAML 2.0 Federation</a> in the
136
- * <i>IAM User Guide</i>. </p>
137
- * </li>
138
- * </ul>
139
- * @example
140
- * Use a bare-bones client and the command you need to make an API call.
141
- * ```javascript
142
- * import { STSClient, AssumeRoleWithSAMLCommand } from "@aws-sdk/client-sts"; // ES Modules import
143
- * // const { STSClient, AssumeRoleWithSAMLCommand } = require("@aws-sdk/client-sts"); // CommonJS import
144
- * const client = new STSClient(config);
145
- * const command = new AssumeRoleWithSAMLCommand(input);
146
- * const response = await client.send(command);
147
- * ```
148
- *
149
- * @see {@link AssumeRoleWithSAMLCommandInput} for command's `input` shape.
150
- * @see {@link AssumeRoleWithSAMLCommandOutput} for command's `response` shape.
151
- * @see {@link STSClientResolvedConfig | config} for command's `input` shape.
152
- *
153
- */
154
- var AssumeRoleWithSAMLCommand = /** @class */ (function (_super) {
6
+ var AssumeRoleWithSAMLCommand = (function (_super) {
155
7
  __extends(AssumeRoleWithSAMLCommand, _super);
156
- // Start section: command_properties
157
- // End section: command_properties
158
8
  function AssumeRoleWithSAMLCommand(input) {
159
- var _this =
160
- // Start section: command_constructor
161
- _super.call(this) || this;
9
+ var _this = _super.call(this) || this;
162
10
  _this.input = input;
163
11
  return _this;
164
- // End section: command_constructor
165
12
  }
166
- /**
167
- * @internal
168
- */
169
13
  AssumeRoleWithSAMLCommand.prototype.resolveMiddleware = function (clientStack, configuration, options) {
170
14
  this.middlewareStack.use(getSerdePlugin(configuration, this.serialize, this.deserialize));
171
15
  var stack = clientStack.concat(this.middlewareStack);
@@ -1 +1 @@
1
- {"version":3,"file":"AssumeRoleWithSAMLCommand.js","sourceRoot":"","sources":["../../../commands/AssumeRoleWithSAMLCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,yBAAyB,EAAE,0BAA0B,EAAE,MAAM,oBAAoB,CAAC;AAC3F,OAAO,EACL,6CAA6C,EAC7C,2CAA2C,GAC5C,MAAM,wBAAwB,CAAC;AAChC,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAmJG;AACH;IAA+C,6CAI9C;IACC,oCAAoC;IACpC,kCAAkC;IAElC,mCAAqB,KAAqC;QAA1D;QACE,qCAAqC;QACrC,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAAgC;;QAGxD,mCAAmC;IACrC,CAAC;IAED;;OAEG;IACH,qDAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAE1F,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,2BAA2B,CAAC;QAChD,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,yBAAyB,CAAC,kBAAkB;YACrE,wBAAwB,EAAE,0BAA0B,CAAC,kBAAkB;SACxE,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,6CAAS,GAAjB,UAAkB,KAAqC,EAAE,OAAuB;QAC9E,OAAO,2CAA2C,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IACrE,CAAC;IAEO,+CAAW,GAAnB,UAAoB,MAAsB,EAAE,OAAuB;QACjE,OAAO,6CAA6C,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IACxE,CAAC;IAIH,gCAAC;AAAD,CAAC,AAtDD,CAA+C,QAAQ,GAsDtD"}
1
+ {"version":3,"file":"AssumeRoleWithSAMLCommand.js","sourceRoot":"","sources":["../../../commands/AssumeRoleWithSAMLCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,yBAAyB,EAAE,0BAA0B,EAAE,MAAM,oBAAoB,CAAC;AAC3F,OAAO,EACL,6CAA6C,EAC7C,2CAA2C,GAC5C,MAAM,wBAAwB,CAAC;AAChC,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAkK7D;IAA+C,6CAI9C;IAIC,mCAAqB,KAAqC;QAA1D,YAEE,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAAgC;;IAI1D,CAAC;IAKD,qDAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAE1F,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,2BAA2B,CAAC;QAChD,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,yBAAyB,CAAC,kBAAkB;YACrE,wBAAwB,EAAE,0BAA0B,CAAC,kBAAkB;SACxE,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,6CAAS,GAAjB,UAAkB,KAAqC,EAAE,OAAuB;QAC9E,OAAO,2CAA2C,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IACrE,CAAC;IAEO,+CAAW,GAAnB,UAAoB,MAAsB,EAAE,OAAuB;QACjE,OAAO,6CAA6C,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IACxE,CAAC;IAIH,gCAAC;AAAD,CAAC,AAtDD,CAA+C,QAAQ,GAsDtD"}