@aws-sdk/client-sts 3.929.0 → 3.930.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (35) hide show
  1. package/dist-cjs/STSClient.js +2 -0
  2. package/dist-cjs/index.js +400 -1095
  3. package/dist-cjs/runtimeConfig.shared.js +7 -0
  4. package/dist-es/STSClient.js +2 -0
  5. package/dist-es/commands/AssumeRoleCommand.js +3 -10
  6. package/dist-es/commands/AssumeRoleWithSAMLCommand.js +3 -10
  7. package/dist-es/commands/AssumeRoleWithWebIdentityCommand.js +3 -10
  8. package/dist-es/commands/AssumeRootCommand.js +3 -10
  9. package/dist-es/commands/DecodeAuthorizationMessageCommand.js +3 -9
  10. package/dist-es/commands/GetAccessKeyInfoCommand.js +3 -9
  11. package/dist-es/commands/GetCallerIdentityCommand.js +3 -9
  12. package/dist-es/commands/GetDelegatedAccessTokenCommand.js +3 -10
  13. package/dist-es/commands/GetFederationTokenCommand.js +3 -10
  14. package/dist-es/commands/GetSessionTokenCommand.js +3 -10
  15. package/dist-es/models/models_0.js +0 -45
  16. package/dist-es/runtimeConfig.shared.js +7 -0
  17. package/dist-es/schemas/schemas_0.js +410 -0
  18. package/dist-types/STSClient.d.ts +10 -1
  19. package/dist-types/models/models_0.d.ts +0 -44
  20. package/dist-types/runtimeConfig.browser.d.ts +1 -0
  21. package/dist-types/runtimeConfig.d.ts +1 -0
  22. package/dist-types/runtimeConfig.native.d.ts +1 -0
  23. package/dist-types/runtimeConfig.shared.d.ts +1 -0
  24. package/dist-types/schemas/schemas_0.d.ts +55 -0
  25. package/dist-types/ts3.4/STSClient.d.ts +4 -0
  26. package/dist-types/ts3.4/models/models_0.d.ts +0 -31
  27. package/dist-types/ts3.4/runtimeConfig.browser.d.ts +4 -0
  28. package/dist-types/ts3.4/runtimeConfig.d.ts +4 -0
  29. package/dist-types/ts3.4/runtimeConfig.native.d.ts +4 -0
  30. package/dist-types/ts3.4/runtimeConfig.shared.d.ts +4 -0
  31. package/dist-types/ts3.4/schemas/schemas_0.d.ts +61 -0
  32. package/package.json +33 -33
  33. package/dist-es/protocols/Aws_query.js +0 -1003
  34. package/dist-types/protocols/Aws_query.d.ts +0 -92
  35. package/dist-types/ts3.4/protocols/Aws_query.d.ts +0 -125
package/dist-cjs/index.js CHANGED
@@ -3,21 +3,19 @@
3
3
  var STSClient = require('./STSClient');
4
4
  var smithyClient = require('@smithy/smithy-client');
5
5
  var middlewareEndpoint = require('@smithy/middleware-endpoint');
6
- var middlewareSerde = require('@smithy/middleware-serde');
7
6
  var EndpointParameters = require('./endpoint/EndpointParameters');
8
- var core = require('@aws-sdk/core');
9
- var protocolHttp = require('@smithy/protocol-http');
7
+ var schema = require('@smithy/core/schema');
10
8
  var client = require('@aws-sdk/core/client');
11
9
  var regionConfigResolver = require('@aws-sdk/region-config-resolver');
12
10
 
13
- class STSServiceException extends smithyClient.ServiceException {
11
+ let STSServiceException$1 = class STSServiceException extends smithyClient.ServiceException {
14
12
  constructor(options) {
15
13
  super(options);
16
14
  Object.setPrototypeOf(this, STSServiceException.prototype);
17
15
  }
18
- }
16
+ };
19
17
 
20
- class ExpiredTokenException extends STSServiceException {
18
+ let ExpiredTokenException$1 = class ExpiredTokenException extends STSServiceException$1 {
21
19
  name = "ExpiredTokenException";
22
20
  $fault = "client";
23
21
  constructor(opts) {
@@ -28,8 +26,8 @@ class ExpiredTokenException extends STSServiceException {
28
26
  });
29
27
  Object.setPrototypeOf(this, ExpiredTokenException.prototype);
30
28
  }
31
- }
32
- class MalformedPolicyDocumentException extends STSServiceException {
29
+ };
30
+ let MalformedPolicyDocumentException$1 = class MalformedPolicyDocumentException extends STSServiceException$1 {
33
31
  name = "MalformedPolicyDocumentException";
34
32
  $fault = "client";
35
33
  constructor(opts) {
@@ -40,8 +38,8 @@ class MalformedPolicyDocumentException extends STSServiceException {
40
38
  });
41
39
  Object.setPrototypeOf(this, MalformedPolicyDocumentException.prototype);
42
40
  }
43
- }
44
- class PackedPolicyTooLargeException extends STSServiceException {
41
+ };
42
+ let PackedPolicyTooLargeException$1 = class PackedPolicyTooLargeException extends STSServiceException$1 {
45
43
  name = "PackedPolicyTooLargeException";
46
44
  $fault = "client";
47
45
  constructor(opts) {
@@ -52,8 +50,8 @@ class PackedPolicyTooLargeException extends STSServiceException {
52
50
  });
53
51
  Object.setPrototypeOf(this, PackedPolicyTooLargeException.prototype);
54
52
  }
55
- }
56
- class RegionDisabledException extends STSServiceException {
53
+ };
54
+ let RegionDisabledException$1 = class RegionDisabledException extends STSServiceException$1 {
57
55
  name = "RegionDisabledException";
58
56
  $fault = "client";
59
57
  constructor(opts) {
@@ -64,8 +62,8 @@ class RegionDisabledException extends STSServiceException {
64
62
  });
65
63
  Object.setPrototypeOf(this, RegionDisabledException.prototype);
66
64
  }
67
- }
68
- class IDPRejectedClaimException extends STSServiceException {
65
+ };
66
+ let IDPRejectedClaimException$1 = class IDPRejectedClaimException extends STSServiceException$1 {
69
67
  name = "IDPRejectedClaimException";
70
68
  $fault = "client";
71
69
  constructor(opts) {
@@ -76,8 +74,8 @@ class IDPRejectedClaimException extends STSServiceException {
76
74
  });
77
75
  Object.setPrototypeOf(this, IDPRejectedClaimException.prototype);
78
76
  }
79
- }
80
- class InvalidIdentityTokenException extends STSServiceException {
77
+ };
78
+ let InvalidIdentityTokenException$1 = class InvalidIdentityTokenException extends STSServiceException$1 {
81
79
  name = "InvalidIdentityTokenException";
82
80
  $fault = "client";
83
81
  constructor(opts) {
@@ -88,8 +86,8 @@ class InvalidIdentityTokenException extends STSServiceException {
88
86
  });
89
87
  Object.setPrototypeOf(this, InvalidIdentityTokenException.prototype);
90
88
  }
91
- }
92
- class IDPCommunicationErrorException extends STSServiceException {
89
+ };
90
+ let IDPCommunicationErrorException$1 = class IDPCommunicationErrorException extends STSServiceException$1 {
93
91
  name = "IDPCommunicationErrorException";
94
92
  $fault = "client";
95
93
  constructor(opts) {
@@ -100,8 +98,8 @@ class IDPCommunicationErrorException extends STSServiceException {
100
98
  });
101
99
  Object.setPrototypeOf(this, IDPCommunicationErrorException.prototype);
102
100
  }
103
- }
104
- class InvalidAuthorizationMessageException extends STSServiceException {
101
+ };
102
+ let InvalidAuthorizationMessageException$1 = class InvalidAuthorizationMessageException extends STSServiceException$1 {
105
103
  name = "InvalidAuthorizationMessageException";
106
104
  $fault = "client";
107
105
  constructor(opts) {
@@ -112,8 +110,8 @@ class InvalidAuthorizationMessageException extends STSServiceException {
112
110
  });
113
111
  Object.setPrototypeOf(this, InvalidAuthorizationMessageException.prototype);
114
112
  }
115
- }
116
- class ExpiredTradeInTokenException extends STSServiceException {
113
+ };
114
+ let ExpiredTradeInTokenException$1 = class ExpiredTradeInTokenException extends STSServiceException$1 {
117
115
  name = "ExpiredTradeInTokenException";
118
116
  $fault = "client";
119
117
  constructor(opts) {
@@ -124,1003 +122,63 @@ class ExpiredTradeInTokenException extends STSServiceException {
124
122
  });
125
123
  Object.setPrototypeOf(this, ExpiredTradeInTokenException.prototype);
126
124
  }
127
- }
128
- const CredentialsFilterSensitiveLog = (obj) => ({
129
- ...obj,
130
- ...(obj.SecretAccessKey && { SecretAccessKey: smithyClient.SENSITIVE_STRING }),
131
- });
132
- const AssumeRoleResponseFilterSensitiveLog = (obj) => ({
133
- ...obj,
134
- ...(obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }),
135
- });
136
- const AssumeRoleWithSAMLRequestFilterSensitiveLog = (obj) => ({
137
- ...obj,
138
- ...(obj.SAMLAssertion && { SAMLAssertion: smithyClient.SENSITIVE_STRING }),
139
- });
140
- const AssumeRoleWithSAMLResponseFilterSensitiveLog = (obj) => ({
141
- ...obj,
142
- ...(obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }),
143
- });
144
- const AssumeRoleWithWebIdentityRequestFilterSensitiveLog = (obj) => ({
145
- ...obj,
146
- ...(obj.WebIdentityToken && { WebIdentityToken: smithyClient.SENSITIVE_STRING }),
147
- });
148
- const AssumeRoleWithWebIdentityResponseFilterSensitiveLog = (obj) => ({
149
- ...obj,
150
- ...(obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }),
151
- });
152
- const AssumeRootResponseFilterSensitiveLog = (obj) => ({
153
- ...obj,
154
- ...(obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }),
155
- });
156
- const GetDelegatedAccessTokenRequestFilterSensitiveLog = (obj) => ({
157
- ...obj,
158
- ...(obj.TradeInToken && { TradeInToken: smithyClient.SENSITIVE_STRING }),
159
- });
160
- const GetDelegatedAccessTokenResponseFilterSensitiveLog = (obj) => ({
161
- ...obj,
162
- ...(obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }),
163
- });
164
- const GetFederationTokenResponseFilterSensitiveLog = (obj) => ({
165
- ...obj,
166
- ...(obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }),
167
- });
168
- const GetSessionTokenResponseFilterSensitiveLog = (obj) => ({
169
- ...obj,
170
- ...(obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }),
171
- });
172
-
173
- const se_AssumeRoleCommand = async (input, context) => {
174
- const headers = SHARED_HEADERS;
175
- let body;
176
- body = buildFormUrlencodedString({
177
- ...se_AssumeRoleRequest(input),
178
- [_A]: _AR,
179
- [_V]: _,
180
- });
181
- return buildHttpRpcRequest(context, headers, "/", undefined, body);
182
- };
183
- const se_AssumeRoleWithSAMLCommand = async (input, context) => {
184
- const headers = SHARED_HEADERS;
185
- let body;
186
- body = buildFormUrlencodedString({
187
- ...se_AssumeRoleWithSAMLRequest(input),
188
- [_A]: _ARWSAML,
189
- [_V]: _,
190
- });
191
- return buildHttpRpcRequest(context, headers, "/", undefined, body);
192
125
  };
193
- const se_AssumeRoleWithWebIdentityCommand = async (input, context) => {
194
- const headers = SHARED_HEADERS;
195
- let body;
196
- body = buildFormUrlencodedString({
197
- ...se_AssumeRoleWithWebIdentityRequest(input),
198
- [_A]: _ARWWI,
199
- [_V]: _,
200
- });
201
- return buildHttpRpcRequest(context, headers, "/", undefined, body);
202
- };
203
- const se_AssumeRootCommand = async (input, context) => {
204
- const headers = SHARED_HEADERS;
205
- let body;
206
- body = buildFormUrlencodedString({
207
- ...se_AssumeRootRequest(input),
208
- [_A]: _ARs,
209
- [_V]: _,
210
- });
211
- return buildHttpRpcRequest(context, headers, "/", undefined, body);
212
- };
213
- const se_DecodeAuthorizationMessageCommand = async (input, context) => {
214
- const headers = SHARED_HEADERS;
215
- let body;
216
- body = buildFormUrlencodedString({
217
- ...se_DecodeAuthorizationMessageRequest(input),
218
- [_A]: _DAM,
219
- [_V]: _,
220
- });
221
- return buildHttpRpcRequest(context, headers, "/", undefined, body);
222
- };
223
- const se_GetAccessKeyInfoCommand = async (input, context) => {
224
- const headers = SHARED_HEADERS;
225
- let body;
226
- body = buildFormUrlencodedString({
227
- ...se_GetAccessKeyInfoRequest(input),
228
- [_A]: _GAKI,
229
- [_V]: _,
230
- });
231
- return buildHttpRpcRequest(context, headers, "/", undefined, body);
232
- };
233
- const se_GetCallerIdentityCommand = async (input, context) => {
234
- const headers = SHARED_HEADERS;
235
- let body;
236
- body = buildFormUrlencodedString({
237
- ...se_GetCallerIdentityRequest(),
238
- [_A]: _GCI,
239
- [_V]: _,
240
- });
241
- return buildHttpRpcRequest(context, headers, "/", undefined, body);
242
- };
243
- const se_GetDelegatedAccessTokenCommand = async (input, context) => {
244
- const headers = SHARED_HEADERS;
245
- let body;
246
- body = buildFormUrlencodedString({
247
- ...se_GetDelegatedAccessTokenRequest(input),
248
- [_A]: _GDAT,
249
- [_V]: _,
250
- });
251
- return buildHttpRpcRequest(context, headers, "/", undefined, body);
252
- };
253
- const se_GetFederationTokenCommand = async (input, context) => {
254
- const headers = SHARED_HEADERS;
255
- let body;
256
- body = buildFormUrlencodedString({
257
- ...se_GetFederationTokenRequest(input),
258
- [_A]: _GFT,
259
- [_V]: _,
260
- });
261
- return buildHttpRpcRequest(context, headers, "/", undefined, body);
262
- };
263
- const se_GetSessionTokenCommand = async (input, context) => {
264
- const headers = SHARED_HEADERS;
265
- let body;
266
- body = buildFormUrlencodedString({
267
- ...se_GetSessionTokenRequest(input),
268
- [_A]: _GST,
269
- [_V]: _,
270
- });
271
- return buildHttpRpcRequest(context, headers, "/", undefined, body);
272
- };
273
- const de_AssumeRoleCommand = async (output, context) => {
274
- if (output.statusCode >= 300) {
275
- return de_CommandError(output, context);
276
- }
277
- const data = await core.parseXmlBody(output.body, context);
278
- let contents = {};
279
- contents = de_AssumeRoleResponse(data.AssumeRoleResult);
280
- const response = {
281
- $metadata: deserializeMetadata(output),
282
- ...contents,
283
- };
284
- return response;
285
- };
286
- const de_AssumeRoleWithSAMLCommand = async (output, context) => {
287
- if (output.statusCode >= 300) {
288
- return de_CommandError(output, context);
289
- }
290
- const data = await core.parseXmlBody(output.body, context);
291
- let contents = {};
292
- contents = de_AssumeRoleWithSAMLResponse(data.AssumeRoleWithSAMLResult);
293
- const response = {
294
- $metadata: deserializeMetadata(output),
295
- ...contents,
296
- };
297
- return response;
298
- };
299
- const de_AssumeRoleWithWebIdentityCommand = async (output, context) => {
300
- if (output.statusCode >= 300) {
301
- return de_CommandError(output, context);
302
- }
303
- const data = await core.parseXmlBody(output.body, context);
304
- let contents = {};
305
- contents = de_AssumeRoleWithWebIdentityResponse(data.AssumeRoleWithWebIdentityResult);
306
- const response = {
307
- $metadata: deserializeMetadata(output),
308
- ...contents,
309
- };
310
- return response;
311
- };
312
- const de_AssumeRootCommand = async (output, context) => {
313
- if (output.statusCode >= 300) {
314
- return de_CommandError(output, context);
315
- }
316
- const data = await core.parseXmlBody(output.body, context);
317
- let contents = {};
318
- contents = de_AssumeRootResponse(data.AssumeRootResult);
319
- const response = {
320
- $metadata: deserializeMetadata(output),
321
- ...contents,
322
- };
323
- return response;
324
- };
325
- const de_DecodeAuthorizationMessageCommand = async (output, context) => {
326
- if (output.statusCode >= 300) {
327
- return de_CommandError(output, context);
328
- }
329
- const data = await core.parseXmlBody(output.body, context);
330
- let contents = {};
331
- contents = de_DecodeAuthorizationMessageResponse(data.DecodeAuthorizationMessageResult);
332
- const response = {
333
- $metadata: deserializeMetadata(output),
334
- ...contents,
335
- };
336
- return response;
337
- };
338
- const de_GetAccessKeyInfoCommand = async (output, context) => {
339
- if (output.statusCode >= 300) {
340
- return de_CommandError(output, context);
341
- }
342
- const data = await core.parseXmlBody(output.body, context);
343
- let contents = {};
344
- contents = de_GetAccessKeyInfoResponse(data.GetAccessKeyInfoResult);
345
- const response = {
346
- $metadata: deserializeMetadata(output),
347
- ...contents,
348
- };
349
- return response;
350
- };
351
- const de_GetCallerIdentityCommand = async (output, context) => {
352
- if (output.statusCode >= 300) {
353
- return de_CommandError(output, context);
354
- }
355
- const data = await core.parseXmlBody(output.body, context);
356
- let contents = {};
357
- contents = de_GetCallerIdentityResponse(data.GetCallerIdentityResult);
358
- const response = {
359
- $metadata: deserializeMetadata(output),
360
- ...contents,
361
- };
362
- return response;
363
- };
364
- const de_GetDelegatedAccessTokenCommand = async (output, context) => {
365
- if (output.statusCode >= 300) {
366
- return de_CommandError(output, context);
367
- }
368
- const data = await core.parseXmlBody(output.body, context);
369
- let contents = {};
370
- contents = de_GetDelegatedAccessTokenResponse(data.GetDelegatedAccessTokenResult);
371
- const response = {
372
- $metadata: deserializeMetadata(output),
373
- ...contents,
374
- };
375
- return response;
376
- };
377
- const de_GetFederationTokenCommand = async (output, context) => {
378
- if (output.statusCode >= 300) {
379
- return de_CommandError(output, context);
380
- }
381
- const data = await core.parseXmlBody(output.body, context);
382
- let contents = {};
383
- contents = de_GetFederationTokenResponse(data.GetFederationTokenResult);
384
- const response = {
385
- $metadata: deserializeMetadata(output),
386
- ...contents,
387
- };
388
- return response;
389
- };
390
- const de_GetSessionTokenCommand = async (output, context) => {
391
- if (output.statusCode >= 300) {
392
- return de_CommandError(output, context);
393
- }
394
- const data = await core.parseXmlBody(output.body, context);
395
- let contents = {};
396
- contents = de_GetSessionTokenResponse(data.GetSessionTokenResult);
397
- const response = {
398
- $metadata: deserializeMetadata(output),
399
- ...contents,
400
- };
401
- return response;
402
- };
403
- const de_CommandError = async (output, context) => {
404
- const parsedOutput = {
405
- ...output,
406
- body: await core.parseXmlErrorBody(output.body, context),
407
- };
408
- const errorCode = loadQueryErrorCode(output, parsedOutput.body);
409
- switch (errorCode) {
410
- case "ExpiredTokenException":
411
- case "com.amazonaws.sts#ExpiredTokenException":
412
- throw await de_ExpiredTokenExceptionRes(parsedOutput);
413
- case "MalformedPolicyDocument":
414
- case "com.amazonaws.sts#MalformedPolicyDocumentException":
415
- throw await de_MalformedPolicyDocumentExceptionRes(parsedOutput);
416
- case "PackedPolicyTooLarge":
417
- case "com.amazonaws.sts#PackedPolicyTooLargeException":
418
- throw await de_PackedPolicyTooLargeExceptionRes(parsedOutput);
419
- case "RegionDisabledException":
420
- case "com.amazonaws.sts#RegionDisabledException":
421
- throw await de_RegionDisabledExceptionRes(parsedOutput);
422
- case "IDPRejectedClaim":
423
- case "com.amazonaws.sts#IDPRejectedClaimException":
424
- throw await de_IDPRejectedClaimExceptionRes(parsedOutput);
425
- case "InvalidIdentityToken":
426
- case "com.amazonaws.sts#InvalidIdentityTokenException":
427
- throw await de_InvalidIdentityTokenExceptionRes(parsedOutput);
428
- case "IDPCommunicationError":
429
- case "com.amazonaws.sts#IDPCommunicationErrorException":
430
- throw await de_IDPCommunicationErrorExceptionRes(parsedOutput);
431
- case "InvalidAuthorizationMessageException":
432
- case "com.amazonaws.sts#InvalidAuthorizationMessageException":
433
- throw await de_InvalidAuthorizationMessageExceptionRes(parsedOutput);
434
- case "ExpiredTradeInTokenException":
435
- case "com.amazonaws.sts#ExpiredTradeInTokenException":
436
- throw await de_ExpiredTradeInTokenExceptionRes(parsedOutput);
437
- default:
438
- const parsedBody = parsedOutput.body;
439
- return throwDefaultError({
440
- output,
441
- parsedBody: parsedBody.Error,
442
- errorCode,
443
- });
444
- }
445
- };
446
- const de_ExpiredTokenExceptionRes = async (parsedOutput, context) => {
447
- const body = parsedOutput.body;
448
- const deserialized = de_ExpiredTokenException(body.Error);
449
- const exception = new ExpiredTokenException({
450
- $metadata: deserializeMetadata(parsedOutput),
451
- ...deserialized,
452
- });
453
- return smithyClient.decorateServiceException(exception, body);
454
- };
455
- const de_ExpiredTradeInTokenExceptionRes = async (parsedOutput, context) => {
456
- const body = parsedOutput.body;
457
- const deserialized = de_ExpiredTradeInTokenException(body.Error);
458
- const exception = new ExpiredTradeInTokenException({
459
- $metadata: deserializeMetadata(parsedOutput),
460
- ...deserialized,
461
- });
462
- return smithyClient.decorateServiceException(exception, body);
463
- };
464
- const de_IDPCommunicationErrorExceptionRes = async (parsedOutput, context) => {
465
- const body = parsedOutput.body;
466
- const deserialized = de_IDPCommunicationErrorException(body.Error);
467
- const exception = new IDPCommunicationErrorException({
468
- $metadata: deserializeMetadata(parsedOutput),
469
- ...deserialized,
470
- });
471
- return smithyClient.decorateServiceException(exception, body);
472
- };
473
- const de_IDPRejectedClaimExceptionRes = async (parsedOutput, context) => {
474
- const body = parsedOutput.body;
475
- const deserialized = de_IDPRejectedClaimException(body.Error);
476
- const exception = new IDPRejectedClaimException({
477
- $metadata: deserializeMetadata(parsedOutput),
478
- ...deserialized,
479
- });
480
- return smithyClient.decorateServiceException(exception, body);
481
- };
482
- const de_InvalidAuthorizationMessageExceptionRes = async (parsedOutput, context) => {
483
- const body = parsedOutput.body;
484
- const deserialized = de_InvalidAuthorizationMessageException(body.Error);
485
- const exception = new InvalidAuthorizationMessageException({
486
- $metadata: deserializeMetadata(parsedOutput),
487
- ...deserialized,
488
- });
489
- return smithyClient.decorateServiceException(exception, body);
490
- };
491
- const de_InvalidIdentityTokenExceptionRes = async (parsedOutput, context) => {
492
- const body = parsedOutput.body;
493
- const deserialized = de_InvalidIdentityTokenException(body.Error);
494
- const exception = new InvalidIdentityTokenException({
495
- $metadata: deserializeMetadata(parsedOutput),
496
- ...deserialized,
497
- });
498
- return smithyClient.decorateServiceException(exception, body);
499
- };
500
- const de_MalformedPolicyDocumentExceptionRes = async (parsedOutput, context) => {
501
- const body = parsedOutput.body;
502
- const deserialized = de_MalformedPolicyDocumentException(body.Error);
503
- const exception = new MalformedPolicyDocumentException({
504
- $metadata: deserializeMetadata(parsedOutput),
505
- ...deserialized,
506
- });
507
- return smithyClient.decorateServiceException(exception, body);
508
- };
509
- const de_PackedPolicyTooLargeExceptionRes = async (parsedOutput, context) => {
510
- const body = parsedOutput.body;
511
- const deserialized = de_PackedPolicyTooLargeException(body.Error);
512
- const exception = new PackedPolicyTooLargeException({
513
- $metadata: deserializeMetadata(parsedOutput),
514
- ...deserialized,
515
- });
516
- return smithyClient.decorateServiceException(exception, body);
517
- };
518
- const de_RegionDisabledExceptionRes = async (parsedOutput, context) => {
519
- const body = parsedOutput.body;
520
- const deserialized = de_RegionDisabledException(body.Error);
521
- const exception = new RegionDisabledException({
522
- $metadata: deserializeMetadata(parsedOutput),
523
- ...deserialized,
524
- });
525
- return smithyClient.decorateServiceException(exception, body);
526
- };
527
- const se_AssumeRoleRequest = (input, context) => {
528
- const entries = {};
529
- if (input[_RA] != null) {
530
- entries[_RA] = input[_RA];
531
- }
532
- if (input[_RSN] != null) {
533
- entries[_RSN] = input[_RSN];
534
- }
535
- if (input[_PA] != null) {
536
- const memberEntries = se_policyDescriptorListType(input[_PA]);
537
- if (input[_PA]?.length === 0) {
538
- entries.PolicyArns = [];
539
- }
540
- Object.entries(memberEntries).forEach(([key, value]) => {
541
- const loc = `PolicyArns.${key}`;
542
- entries[loc] = value;
543
- });
544
- }
545
- if (input[_P] != null) {
546
- entries[_P] = input[_P];
547
- }
548
- if (input[_DS] != null) {
549
- entries[_DS] = input[_DS];
550
- }
551
- if (input[_T] != null) {
552
- const memberEntries = se_tagListType(input[_T]);
553
- if (input[_T]?.length === 0) {
554
- entries.Tags = [];
555
- }
556
- Object.entries(memberEntries).forEach(([key, value]) => {
557
- const loc = `Tags.${key}`;
558
- entries[loc] = value;
559
- });
560
- }
561
- if (input[_TTK] != null) {
562
- const memberEntries = se_tagKeyListType(input[_TTK]);
563
- if (input[_TTK]?.length === 0) {
564
- entries.TransitiveTagKeys = [];
565
- }
566
- Object.entries(memberEntries).forEach(([key, value]) => {
567
- const loc = `TransitiveTagKeys.${key}`;
568
- entries[loc] = value;
569
- });
570
- }
571
- if (input[_EI] != null) {
572
- entries[_EI] = input[_EI];
573
- }
574
- if (input[_SN] != null) {
575
- entries[_SN] = input[_SN];
576
- }
577
- if (input[_TC] != null) {
578
- entries[_TC] = input[_TC];
579
- }
580
- if (input[_SI] != null) {
581
- entries[_SI] = input[_SI];
582
- }
583
- if (input[_PC] != null) {
584
- const memberEntries = se_ProvidedContextsListType(input[_PC]);
585
- if (input[_PC]?.length === 0) {
586
- entries.ProvidedContexts = [];
587
- }
588
- Object.entries(memberEntries).forEach(([key, value]) => {
589
- const loc = `ProvidedContexts.${key}`;
590
- entries[loc] = value;
591
- });
592
- }
593
- return entries;
594
- };
595
- const se_AssumeRoleWithSAMLRequest = (input, context) => {
596
- const entries = {};
597
- if (input[_RA] != null) {
598
- entries[_RA] = input[_RA];
599
- }
600
- if (input[_PAr] != null) {
601
- entries[_PAr] = input[_PAr];
602
- }
603
- if (input[_SAMLA] != null) {
604
- entries[_SAMLA] = input[_SAMLA];
605
- }
606
- if (input[_PA] != null) {
607
- const memberEntries = se_policyDescriptorListType(input[_PA]);
608
- if (input[_PA]?.length === 0) {
609
- entries.PolicyArns = [];
610
- }
611
- Object.entries(memberEntries).forEach(([key, value]) => {
612
- const loc = `PolicyArns.${key}`;
613
- entries[loc] = value;
614
- });
615
- }
616
- if (input[_P] != null) {
617
- entries[_P] = input[_P];
618
- }
619
- if (input[_DS] != null) {
620
- entries[_DS] = input[_DS];
621
- }
622
- return entries;
623
- };
624
- const se_AssumeRoleWithWebIdentityRequest = (input, context) => {
625
- const entries = {};
626
- if (input[_RA] != null) {
627
- entries[_RA] = input[_RA];
628
- }
629
- if (input[_RSN] != null) {
630
- entries[_RSN] = input[_RSN];
631
- }
632
- if (input[_WIT] != null) {
633
- entries[_WIT] = input[_WIT];
634
- }
635
- if (input[_PI] != null) {
636
- entries[_PI] = input[_PI];
637
- }
638
- if (input[_PA] != null) {
639
- const memberEntries = se_policyDescriptorListType(input[_PA]);
640
- if (input[_PA]?.length === 0) {
641
- entries.PolicyArns = [];
642
- }
643
- Object.entries(memberEntries).forEach(([key, value]) => {
644
- const loc = `PolicyArns.${key}`;
645
- entries[loc] = value;
646
- });
647
- }
648
- if (input[_P] != null) {
649
- entries[_P] = input[_P];
650
- }
651
- if (input[_DS] != null) {
652
- entries[_DS] = input[_DS];
653
- }
654
- return entries;
655
- };
656
- const se_AssumeRootRequest = (input, context) => {
657
- const entries = {};
658
- if (input[_TP] != null) {
659
- entries[_TP] = input[_TP];
660
- }
661
- if (input[_TPA] != null) {
662
- const memberEntries = se_PolicyDescriptorType(input[_TPA]);
663
- Object.entries(memberEntries).forEach(([key, value]) => {
664
- const loc = `TaskPolicyArn.${key}`;
665
- entries[loc] = value;
666
- });
667
- }
668
- if (input[_DS] != null) {
669
- entries[_DS] = input[_DS];
670
- }
671
- return entries;
672
- };
673
- const se_DecodeAuthorizationMessageRequest = (input, context) => {
674
- const entries = {};
675
- if (input[_EM] != null) {
676
- entries[_EM] = input[_EM];
677
- }
678
- return entries;
679
- };
680
- const se_GetAccessKeyInfoRequest = (input, context) => {
681
- const entries = {};
682
- if (input[_AKI] != null) {
683
- entries[_AKI] = input[_AKI];
684
- }
685
- return entries;
686
- };
687
- const se_GetCallerIdentityRequest = (input, context) => {
688
- const entries = {};
689
- return entries;
690
- };
691
- const se_GetDelegatedAccessTokenRequest = (input, context) => {
692
- const entries = {};
693
- if (input[_TIT] != null) {
694
- entries[_TIT] = input[_TIT];
695
- }
696
- return entries;
697
- };
698
- const se_GetFederationTokenRequest = (input, context) => {
699
- const entries = {};
700
- if (input[_N] != null) {
701
- entries[_N] = input[_N];
702
- }
703
- if (input[_P] != null) {
704
- entries[_P] = input[_P];
705
- }
706
- if (input[_PA] != null) {
707
- const memberEntries = se_policyDescriptorListType(input[_PA]);
708
- if (input[_PA]?.length === 0) {
709
- entries.PolicyArns = [];
710
- }
711
- Object.entries(memberEntries).forEach(([key, value]) => {
712
- const loc = `PolicyArns.${key}`;
713
- entries[loc] = value;
714
- });
715
- }
716
- if (input[_DS] != null) {
717
- entries[_DS] = input[_DS];
718
- }
719
- if (input[_T] != null) {
720
- const memberEntries = se_tagListType(input[_T]);
721
- if (input[_T]?.length === 0) {
722
- entries.Tags = [];
723
- }
724
- Object.entries(memberEntries).forEach(([key, value]) => {
725
- const loc = `Tags.${key}`;
726
- entries[loc] = value;
727
- });
728
- }
729
- return entries;
730
- };
731
- const se_GetSessionTokenRequest = (input, context) => {
732
- const entries = {};
733
- if (input[_DS] != null) {
734
- entries[_DS] = input[_DS];
735
- }
736
- if (input[_SN] != null) {
737
- entries[_SN] = input[_SN];
738
- }
739
- if (input[_TC] != null) {
740
- entries[_TC] = input[_TC];
741
- }
742
- return entries;
743
- };
744
- const se_policyDescriptorListType = (input, context) => {
745
- const entries = {};
746
- let counter = 1;
747
- for (const entry of input) {
748
- if (entry === null) {
749
- continue;
750
- }
751
- const memberEntries = se_PolicyDescriptorType(entry);
752
- Object.entries(memberEntries).forEach(([key, value]) => {
753
- entries[`member.${counter}.${key}`] = value;
754
- });
755
- counter++;
756
- }
757
- return entries;
758
- };
759
- const se_PolicyDescriptorType = (input, context) => {
760
- const entries = {};
761
- if (input[_a] != null) {
762
- entries[_a] = input[_a];
763
- }
764
- return entries;
765
- };
766
- const se_ProvidedContext = (input, context) => {
767
- const entries = {};
768
- if (input[_PAro] != null) {
769
- entries[_PAro] = input[_PAro];
770
- }
771
- if (input[_CA] != null) {
772
- entries[_CA] = input[_CA];
773
- }
774
- return entries;
775
- };
776
- const se_ProvidedContextsListType = (input, context) => {
777
- const entries = {};
778
- let counter = 1;
779
- for (const entry of input) {
780
- if (entry === null) {
781
- continue;
782
- }
783
- const memberEntries = se_ProvidedContext(entry);
784
- Object.entries(memberEntries).forEach(([key, value]) => {
785
- entries[`member.${counter}.${key}`] = value;
786
- });
787
- counter++;
788
- }
789
- return entries;
790
- };
791
- const se_Tag = (input, context) => {
792
- const entries = {};
793
- if (input[_K] != null) {
794
- entries[_K] = input[_K];
795
- }
796
- if (input[_Va] != null) {
797
- entries[_Va] = input[_Va];
798
- }
799
- return entries;
800
- };
801
- const se_tagKeyListType = (input, context) => {
802
- const entries = {};
803
- let counter = 1;
804
- for (const entry of input) {
805
- if (entry === null) {
806
- continue;
807
- }
808
- entries[`member.${counter}`] = entry;
809
- counter++;
810
- }
811
- return entries;
812
- };
813
- const se_tagListType = (input, context) => {
814
- const entries = {};
815
- let counter = 1;
816
- for (const entry of input) {
817
- if (entry === null) {
818
- continue;
819
- }
820
- const memberEntries = se_Tag(entry);
821
- Object.entries(memberEntries).forEach(([key, value]) => {
822
- entries[`member.${counter}.${key}`] = value;
823
- });
824
- counter++;
825
- }
826
- return entries;
827
- };
828
- const de_AssumedRoleUser = (output, context) => {
829
- const contents = {};
830
- if (output[_ARI] != null) {
831
- contents[_ARI] = smithyClient.expectString(output[_ARI]);
832
- }
833
- if (output[_Ar] != null) {
834
- contents[_Ar] = smithyClient.expectString(output[_Ar]);
835
- }
836
- return contents;
837
- };
838
- const de_AssumeRoleResponse = (output, context) => {
839
- const contents = {};
840
- if (output[_C] != null) {
841
- contents[_C] = de_Credentials(output[_C]);
842
- }
843
- if (output[_ARU] != null) {
844
- contents[_ARU] = de_AssumedRoleUser(output[_ARU]);
845
- }
846
- if (output[_PPS] != null) {
847
- contents[_PPS] = smithyClient.strictParseInt32(output[_PPS]);
848
- }
849
- if (output[_SI] != null) {
850
- contents[_SI] = smithyClient.expectString(output[_SI]);
851
- }
852
- return contents;
853
- };
854
- const de_AssumeRoleWithSAMLResponse = (output, context) => {
855
- const contents = {};
856
- if (output[_C] != null) {
857
- contents[_C] = de_Credentials(output[_C]);
858
- }
859
- if (output[_ARU] != null) {
860
- contents[_ARU] = de_AssumedRoleUser(output[_ARU]);
861
- }
862
- if (output[_PPS] != null) {
863
- contents[_PPS] = smithyClient.strictParseInt32(output[_PPS]);
864
- }
865
- if (output[_S] != null) {
866
- contents[_S] = smithyClient.expectString(output[_S]);
867
- }
868
- if (output[_ST] != null) {
869
- contents[_ST] = smithyClient.expectString(output[_ST]);
870
- }
871
- if (output[_I] != null) {
872
- contents[_I] = smithyClient.expectString(output[_I]);
873
- }
874
- if (output[_Au] != null) {
875
- contents[_Au] = smithyClient.expectString(output[_Au]);
876
- }
877
- if (output[_NQ] != null) {
878
- contents[_NQ] = smithyClient.expectString(output[_NQ]);
879
- }
880
- if (output[_SI] != null) {
881
- contents[_SI] = smithyClient.expectString(output[_SI]);
882
- }
883
- return contents;
884
- };
885
- const de_AssumeRoleWithWebIdentityResponse = (output, context) => {
886
- const contents = {};
887
- if (output[_C] != null) {
888
- contents[_C] = de_Credentials(output[_C]);
889
- }
890
- if (output[_SFWIT] != null) {
891
- contents[_SFWIT] = smithyClient.expectString(output[_SFWIT]);
892
- }
893
- if (output[_ARU] != null) {
894
- contents[_ARU] = de_AssumedRoleUser(output[_ARU]);
895
- }
896
- if (output[_PPS] != null) {
897
- contents[_PPS] = smithyClient.strictParseInt32(output[_PPS]);
898
- }
899
- if (output[_Pr] != null) {
900
- contents[_Pr] = smithyClient.expectString(output[_Pr]);
901
- }
902
- if (output[_Au] != null) {
903
- contents[_Au] = smithyClient.expectString(output[_Au]);
904
- }
905
- if (output[_SI] != null) {
906
- contents[_SI] = smithyClient.expectString(output[_SI]);
907
- }
908
- return contents;
909
- };
910
- const de_AssumeRootResponse = (output, context) => {
911
- const contents = {};
912
- if (output[_C] != null) {
913
- contents[_C] = de_Credentials(output[_C]);
914
- }
915
- if (output[_SI] != null) {
916
- contents[_SI] = smithyClient.expectString(output[_SI]);
917
- }
918
- return contents;
919
- };
920
- const de_Credentials = (output, context) => {
921
- const contents = {};
922
- if (output[_AKI] != null) {
923
- contents[_AKI] = smithyClient.expectString(output[_AKI]);
924
- }
925
- if (output[_SAK] != null) {
926
- contents[_SAK] = smithyClient.expectString(output[_SAK]);
927
- }
928
- if (output[_STe] != null) {
929
- contents[_STe] = smithyClient.expectString(output[_STe]);
930
- }
931
- if (output[_E] != null) {
932
- contents[_E] = smithyClient.expectNonNull(smithyClient.parseRfc3339DateTimeWithOffset(output[_E]));
933
- }
934
- return contents;
935
- };
936
- const de_DecodeAuthorizationMessageResponse = (output, context) => {
937
- const contents = {};
938
- if (output[_DM] != null) {
939
- contents[_DM] = smithyClient.expectString(output[_DM]);
940
- }
941
- return contents;
942
- };
943
- const de_ExpiredTokenException = (output, context) => {
944
- const contents = {};
945
- if (output[_m] != null) {
946
- contents[_m] = smithyClient.expectString(output[_m]);
947
- }
948
- return contents;
949
- };
950
- const de_ExpiredTradeInTokenException = (output, context) => {
951
- const contents = {};
952
- if (output[_m] != null) {
953
- contents[_m] = smithyClient.expectString(output[_m]);
954
- }
955
- return contents;
956
- };
957
- const de_FederatedUser = (output, context) => {
958
- const contents = {};
959
- if (output[_FUI] != null) {
960
- contents[_FUI] = smithyClient.expectString(output[_FUI]);
961
- }
962
- if (output[_Ar] != null) {
963
- contents[_Ar] = smithyClient.expectString(output[_Ar]);
964
- }
965
- return contents;
966
- };
967
- const de_GetAccessKeyInfoResponse = (output, context) => {
968
- const contents = {};
969
- if (output[_Ac] != null) {
970
- contents[_Ac] = smithyClient.expectString(output[_Ac]);
971
- }
972
- return contents;
973
- };
974
- const de_GetCallerIdentityResponse = (output, context) => {
975
- const contents = {};
976
- if (output[_UI] != null) {
977
- contents[_UI] = smithyClient.expectString(output[_UI]);
978
- }
979
- if (output[_Ac] != null) {
980
- contents[_Ac] = smithyClient.expectString(output[_Ac]);
981
- }
982
- if (output[_Ar] != null) {
983
- contents[_Ar] = smithyClient.expectString(output[_Ar]);
984
- }
985
- return contents;
986
- };
987
- const de_GetDelegatedAccessTokenResponse = (output, context) => {
988
- const contents = {};
989
- if (output[_C] != null) {
990
- contents[_C] = de_Credentials(output[_C]);
991
- }
992
- if (output[_PPS] != null) {
993
- contents[_PPS] = smithyClient.strictParseInt32(output[_PPS]);
994
- }
995
- if (output[_AP] != null) {
996
- contents[_AP] = smithyClient.expectString(output[_AP]);
997
- }
998
- return contents;
999
- };
1000
- const de_GetFederationTokenResponse = (output, context) => {
1001
- const contents = {};
1002
- if (output[_C] != null) {
1003
- contents[_C] = de_Credentials(output[_C]);
1004
- }
1005
- if (output[_FU] != null) {
1006
- contents[_FU] = de_FederatedUser(output[_FU]);
1007
- }
1008
- if (output[_PPS] != null) {
1009
- contents[_PPS] = smithyClient.strictParseInt32(output[_PPS]);
1010
- }
1011
- return contents;
1012
- };
1013
- const de_GetSessionTokenResponse = (output, context) => {
1014
- const contents = {};
1015
- if (output[_C] != null) {
1016
- contents[_C] = de_Credentials(output[_C]);
1017
- }
1018
- return contents;
1019
- };
1020
- const de_IDPCommunicationErrorException = (output, context) => {
1021
- const contents = {};
1022
- if (output[_m] != null) {
1023
- contents[_m] = smithyClient.expectString(output[_m]);
1024
- }
1025
- return contents;
1026
- };
1027
- const de_IDPRejectedClaimException = (output, context) => {
1028
- const contents = {};
1029
- if (output[_m] != null) {
1030
- contents[_m] = smithyClient.expectString(output[_m]);
1031
- }
1032
- return contents;
1033
- };
1034
- const de_InvalidAuthorizationMessageException = (output, context) => {
1035
- const contents = {};
1036
- if (output[_m] != null) {
1037
- contents[_m] = smithyClient.expectString(output[_m]);
1038
- }
1039
- return contents;
1040
- };
1041
- const de_InvalidIdentityTokenException = (output, context) => {
1042
- const contents = {};
1043
- if (output[_m] != null) {
1044
- contents[_m] = smithyClient.expectString(output[_m]);
1045
- }
1046
- return contents;
1047
- };
1048
- const de_MalformedPolicyDocumentException = (output, context) => {
1049
- const contents = {};
1050
- if (output[_m] != null) {
1051
- contents[_m] = smithyClient.expectString(output[_m]);
1052
- }
1053
- return contents;
1054
- };
1055
- const de_PackedPolicyTooLargeException = (output, context) => {
1056
- const contents = {};
1057
- if (output[_m] != null) {
1058
- contents[_m] = smithyClient.expectString(output[_m]);
1059
- }
1060
- return contents;
1061
- };
1062
- const de_RegionDisabledException = (output, context) => {
1063
- const contents = {};
1064
- if (output[_m] != null) {
1065
- contents[_m] = smithyClient.expectString(output[_m]);
1066
- }
1067
- return contents;
1068
- };
1069
- const deserializeMetadata = (output) => ({
1070
- httpStatusCode: output.statusCode,
1071
- requestId: output.headers["x-amzn-requestid"] ?? output.headers["x-amzn-request-id"] ?? output.headers["x-amz-request-id"],
1072
- extendedRequestId: output.headers["x-amz-id-2"],
1073
- cfId: output.headers["x-amz-cf-id"],
1074
- });
1075
- const throwDefaultError = smithyClient.withBaseException(STSServiceException);
1076
- const buildHttpRpcRequest = async (context, headers, path, resolvedHostname, body) => {
1077
- const { hostname, protocol = "https", port, path: basePath } = await context.endpoint();
1078
- const contents = {
1079
- protocol,
1080
- hostname,
1081
- port,
1082
- method: "POST",
1083
- path: basePath.endsWith("/") ? basePath.slice(0, -1) + path : basePath + path,
1084
- headers,
1085
- };
1086
- if (body !== undefined) {
1087
- contents.body = body;
1088
- }
1089
- return new protocolHttp.HttpRequest(contents);
1090
- };
1091
- const SHARED_HEADERS = {
1092
- "content-type": "application/x-www-form-urlencoded",
1093
- };
1094
- const _ = "2011-06-15";
1095
- const _A = "Action";
126
+
127
+ const _A = "Arn";
1096
128
  const _AKI = "AccessKeyId";
1097
129
  const _AP = "AssumedPrincipal";
1098
130
  const _AR = "AssumeRole";
1099
131
  const _ARI = "AssumedRoleId";
132
+ const _ARR = "AssumeRoleRequest";
133
+ const _ARRs = "AssumeRoleResponse";
134
+ const _ARRss = "AssumeRootRequest";
135
+ const _ARRssu = "AssumeRootResponse";
1100
136
  const _ARU = "AssumedRoleUser";
1101
137
  const _ARWSAML = "AssumeRoleWithSAML";
138
+ const _ARWSAMLR = "AssumeRoleWithSAMLRequest";
139
+ const _ARWSAMLRs = "AssumeRoleWithSAMLResponse";
1102
140
  const _ARWWI = "AssumeRoleWithWebIdentity";
141
+ const _ARWWIR = "AssumeRoleWithWebIdentityRequest";
142
+ const _ARWWIRs = "AssumeRoleWithWebIdentityResponse";
1103
143
  const _ARs = "AssumeRoot";
1104
144
  const _Ac = "Account";
1105
- const _Ar = "Arn";
1106
145
  const _Au = "Audience";
1107
146
  const _C = "Credentials";
1108
147
  const _CA = "ContextAssertion";
1109
148
  const _DAM = "DecodeAuthorizationMessage";
149
+ const _DAMR = "DecodeAuthorizationMessageRequest";
150
+ const _DAMRe = "DecodeAuthorizationMessageResponse";
1110
151
  const _DM = "DecodedMessage";
1111
152
  const _DS = "DurationSeconds";
1112
153
  const _E = "Expiration";
1113
154
  const _EI = "ExternalId";
1114
155
  const _EM = "EncodedMessage";
156
+ const _ETE = "ExpiredTokenException";
157
+ const _ETITE = "ExpiredTradeInTokenException";
1115
158
  const _FU = "FederatedUser";
1116
159
  const _FUI = "FederatedUserId";
1117
160
  const _GAKI = "GetAccessKeyInfo";
161
+ const _GAKIR = "GetAccessKeyInfoRequest";
162
+ const _GAKIRe = "GetAccessKeyInfoResponse";
1118
163
  const _GCI = "GetCallerIdentity";
164
+ const _GCIR = "GetCallerIdentityRequest";
165
+ const _GCIRe = "GetCallerIdentityResponse";
1119
166
  const _GDAT = "GetDelegatedAccessToken";
167
+ const _GDATR = "GetDelegatedAccessTokenRequest";
168
+ const _GDATRe = "GetDelegatedAccessTokenResponse";
1120
169
  const _GFT = "GetFederationToken";
170
+ const _GFTR = "GetFederationTokenRequest";
171
+ const _GFTRe = "GetFederationTokenResponse";
1121
172
  const _GST = "GetSessionToken";
173
+ const _GSTR = "GetSessionTokenRequest";
174
+ const _GSTRe = "GetSessionTokenResponse";
1122
175
  const _I = "Issuer";
176
+ const _IAME = "InvalidAuthorizationMessageException";
177
+ const _IDPCEE = "IDPCommunicationErrorException";
178
+ const _IDPRCE = "IDPRejectedClaimException";
179
+ const _IITE = "InvalidIdentityTokenException";
1123
180
  const _K = "Key";
181
+ const _MPDE = "MalformedPolicyDocumentException";
1124
182
  const _N = "Name";
1125
183
  const _NQ = "NameQualifier";
1126
184
  const _P = "Policy";
@@ -1128,14 +186,20 @@ const _PA = "PolicyArns";
1128
186
  const _PAr = "PrincipalArn";
1129
187
  const _PAro = "ProviderArn";
1130
188
  const _PC = "ProvidedContexts";
189
+ const _PCLT = "ProvidedContextsListType";
190
+ const _PCr = "ProvidedContext";
191
+ const _PDT = "PolicyDescriptorType";
1131
192
  const _PI = "ProviderId";
1132
193
  const _PPS = "PackedPolicySize";
194
+ const _PPTLE = "PackedPolicyTooLargeException";
1133
195
  const _Pr = "Provider";
1134
196
  const _RA = "RoleArn";
197
+ const _RDE = "RegionDisabledException";
1135
198
  const _RSN = "RoleSessionName";
1136
199
  const _S = "Subject";
1137
200
  const _SAK = "SecretAccessKey";
1138
201
  const _SAMLA = "SAMLAssertion";
202
+ const _SAMLAT = "SAMLAssertionType";
1139
203
  const _SFWIT = "SubjectFromWebIdentityToken";
1140
204
  const _SI = "SourceIdentity";
1141
205
  const _SN = "SerialNumber";
@@ -1147,38 +211,335 @@ const _TIT = "TradeInToken";
1147
211
  const _TP = "TargetPrincipal";
1148
212
  const _TPA = "TaskPolicyArn";
1149
213
  const _TTK = "TransitiveTagKeys";
214
+ const _Ta = "Tag";
1150
215
  const _UI = "UserId";
1151
- const _V = "Version";
1152
- const _Va = "Value";
216
+ const _V = "Value";
1153
217
  const _WIT = "WebIdentityToken";
1154
218
  const _a = "arn";
219
+ const _aKST = "accessKeySecretType";
220
+ const _aQE = "awsQueryError";
221
+ const _c = "client";
222
+ const _cTT = "clientTokenType";
223
+ const _e = "error";
224
+ const _hE = "httpError";
1155
225
  const _m = "message";
1156
- const buildFormUrlencodedString = (formEntries) => Object.entries(formEntries)
1157
- .map(([key, value]) => smithyClient.extendedEncodeURIComponent(key) + "=" + smithyClient.extendedEncodeURIComponent(value))
1158
- .join("&");
1159
- const loadQueryErrorCode = (output, data) => {
1160
- if (data.Error?.Code !== undefined) {
1161
- return data.Error.Code;
1162
- }
1163
- if (output.statusCode == 404) {
1164
- return "NotFound";
1165
- }
1166
- };
226
+ const _pDLT = "policyDescriptorListType";
227
+ const _s = "smithy.ts.sdk.synthetic.com.amazonaws.sts";
228
+ const _tITT = "tradeInTokenType";
229
+ const _tLT = "tagListType";
230
+ const n0 = "com.amazonaws.sts";
231
+ var accessKeySecretType = [0, n0, _aKST, 8, 0];
232
+ var clientTokenType = [0, n0, _cTT, 8, 0];
233
+ var SAMLAssertionType = [0, n0, _SAMLAT, 8, 0];
234
+ var tradeInTokenType = [0, n0, _tITT, 8, 0];
235
+ var AssumedRoleUser = [3, n0, _ARU, 0, [_ARI, _A], [0, 0]];
236
+ var AssumeRoleRequest = [
237
+ 3,
238
+ n0,
239
+ _ARR,
240
+ 0,
241
+ [_RA, _RSN, _PA, _P, _DS, _T, _TTK, _EI, _SN, _TC, _SI, _PC],
242
+ [0, 0, () => policyDescriptorListType, 0, 1, () => tagListType, 64 | 0, 0, 0, 0, 0, () => ProvidedContextsListType],
243
+ ];
244
+ var AssumeRoleResponse = [
245
+ 3,
246
+ n0,
247
+ _ARRs,
248
+ 0,
249
+ [_C, _ARU, _PPS, _SI],
250
+ [[() => Credentials, 0], () => AssumedRoleUser, 1, 0],
251
+ ];
252
+ var AssumeRoleWithSAMLRequest = [
253
+ 3,
254
+ n0,
255
+ _ARWSAMLR,
256
+ 0,
257
+ [_RA, _PAr, _SAMLA, _PA, _P, _DS],
258
+ [0, 0, [() => SAMLAssertionType, 0], () => policyDescriptorListType, 0, 1],
259
+ ];
260
+ var AssumeRoleWithSAMLResponse = [
261
+ 3,
262
+ n0,
263
+ _ARWSAMLRs,
264
+ 0,
265
+ [_C, _ARU, _PPS, _S, _ST, _I, _Au, _NQ, _SI],
266
+ [[() => Credentials, 0], () => AssumedRoleUser, 1, 0, 0, 0, 0, 0, 0],
267
+ ];
268
+ var AssumeRoleWithWebIdentityRequest = [
269
+ 3,
270
+ n0,
271
+ _ARWWIR,
272
+ 0,
273
+ [_RA, _RSN, _WIT, _PI, _PA, _P, _DS],
274
+ [0, 0, [() => clientTokenType, 0], 0, () => policyDescriptorListType, 0, 1],
275
+ ];
276
+ var AssumeRoleWithWebIdentityResponse = [
277
+ 3,
278
+ n0,
279
+ _ARWWIRs,
280
+ 0,
281
+ [_C, _SFWIT, _ARU, _PPS, _Pr, _Au, _SI],
282
+ [[() => Credentials, 0], 0, () => AssumedRoleUser, 1, 0, 0, 0],
283
+ ];
284
+ var AssumeRootRequest = [
285
+ 3,
286
+ n0,
287
+ _ARRss,
288
+ 0,
289
+ [_TP, _TPA, _DS],
290
+ [0, () => PolicyDescriptorType, 1],
291
+ ];
292
+ var AssumeRootResponse = [3, n0, _ARRssu, 0, [_C, _SI], [[() => Credentials, 0], 0]];
293
+ var Credentials = [
294
+ 3,
295
+ n0,
296
+ _C,
297
+ 0,
298
+ [_AKI, _SAK, _STe, _E],
299
+ [0, [() => accessKeySecretType, 0], 0, 4],
300
+ ];
301
+ var DecodeAuthorizationMessageRequest = [3, n0, _DAMR, 0, [_EM], [0]];
302
+ var DecodeAuthorizationMessageResponse = [3, n0, _DAMRe, 0, [_DM], [0]];
303
+ var ExpiredTokenException = [
304
+ -3,
305
+ n0,
306
+ _ETE,
307
+ {
308
+ [_e]: _c,
309
+ [_hE]: 400,
310
+ [_aQE]: [`ExpiredTokenException`, 400],
311
+ },
312
+ [_m],
313
+ [0],
314
+ ];
315
+ schema.TypeRegistry.for(n0).registerError(ExpiredTokenException, ExpiredTokenException$1);
316
+ var ExpiredTradeInTokenException = [
317
+ -3,
318
+ n0,
319
+ _ETITE,
320
+ {
321
+ [_e]: _c,
322
+ [_hE]: 400,
323
+ [_aQE]: [`ExpiredTradeInTokenException`, 400],
324
+ },
325
+ [_m],
326
+ [0],
327
+ ];
328
+ schema.TypeRegistry.for(n0).registerError(ExpiredTradeInTokenException, ExpiredTradeInTokenException$1);
329
+ var FederatedUser = [3, n0, _FU, 0, [_FUI, _A], [0, 0]];
330
+ var GetAccessKeyInfoRequest = [3, n0, _GAKIR, 0, [_AKI], [0]];
331
+ var GetAccessKeyInfoResponse = [3, n0, _GAKIRe, 0, [_Ac], [0]];
332
+ var GetCallerIdentityRequest = [3, n0, _GCIR, 0, [], []];
333
+ var GetCallerIdentityResponse = [3, n0, _GCIRe, 0, [_UI, _Ac, _A], [0, 0, 0]];
334
+ var GetDelegatedAccessTokenRequest = [
335
+ 3,
336
+ n0,
337
+ _GDATR,
338
+ 0,
339
+ [_TIT],
340
+ [[() => tradeInTokenType, 0]],
341
+ ];
342
+ var GetDelegatedAccessTokenResponse = [
343
+ 3,
344
+ n0,
345
+ _GDATRe,
346
+ 0,
347
+ [_C, _PPS, _AP],
348
+ [[() => Credentials, 0], 1, 0],
349
+ ];
350
+ var GetFederationTokenRequest = [
351
+ 3,
352
+ n0,
353
+ _GFTR,
354
+ 0,
355
+ [_N, _P, _PA, _DS, _T],
356
+ [0, 0, () => policyDescriptorListType, 1, () => tagListType],
357
+ ];
358
+ var GetFederationTokenResponse = [
359
+ 3,
360
+ n0,
361
+ _GFTRe,
362
+ 0,
363
+ [_C, _FU, _PPS],
364
+ [[() => Credentials, 0], () => FederatedUser, 1],
365
+ ];
366
+ var GetSessionTokenRequest = [3, n0, _GSTR, 0, [_DS, _SN, _TC], [1, 0, 0]];
367
+ var GetSessionTokenResponse = [3, n0, _GSTRe, 0, [_C], [[() => Credentials, 0]]];
368
+ var IDPCommunicationErrorException = [
369
+ -3,
370
+ n0,
371
+ _IDPCEE,
372
+ {
373
+ [_e]: _c,
374
+ [_hE]: 400,
375
+ [_aQE]: [`IDPCommunicationError`, 400],
376
+ },
377
+ [_m],
378
+ [0],
379
+ ];
380
+ schema.TypeRegistry.for(n0).registerError(IDPCommunicationErrorException, IDPCommunicationErrorException$1);
381
+ var IDPRejectedClaimException = [
382
+ -3,
383
+ n0,
384
+ _IDPRCE,
385
+ {
386
+ [_e]: _c,
387
+ [_hE]: 403,
388
+ [_aQE]: [`IDPRejectedClaim`, 403],
389
+ },
390
+ [_m],
391
+ [0],
392
+ ];
393
+ schema.TypeRegistry.for(n0).registerError(IDPRejectedClaimException, IDPRejectedClaimException$1);
394
+ var InvalidAuthorizationMessageException = [
395
+ -3,
396
+ n0,
397
+ _IAME,
398
+ {
399
+ [_e]: _c,
400
+ [_hE]: 400,
401
+ [_aQE]: [`InvalidAuthorizationMessageException`, 400],
402
+ },
403
+ [_m],
404
+ [0],
405
+ ];
406
+ schema.TypeRegistry.for(n0).registerError(InvalidAuthorizationMessageException, InvalidAuthorizationMessageException$1);
407
+ var InvalidIdentityTokenException = [
408
+ -3,
409
+ n0,
410
+ _IITE,
411
+ {
412
+ [_e]: _c,
413
+ [_hE]: 400,
414
+ [_aQE]: [`InvalidIdentityToken`, 400],
415
+ },
416
+ [_m],
417
+ [0],
418
+ ];
419
+ schema.TypeRegistry.for(n0).registerError(InvalidIdentityTokenException, InvalidIdentityTokenException$1);
420
+ var MalformedPolicyDocumentException = [
421
+ -3,
422
+ n0,
423
+ _MPDE,
424
+ {
425
+ [_e]: _c,
426
+ [_hE]: 400,
427
+ [_aQE]: [`MalformedPolicyDocument`, 400],
428
+ },
429
+ [_m],
430
+ [0],
431
+ ];
432
+ schema.TypeRegistry.for(n0).registerError(MalformedPolicyDocumentException, MalformedPolicyDocumentException$1);
433
+ var PackedPolicyTooLargeException = [
434
+ -3,
435
+ n0,
436
+ _PPTLE,
437
+ {
438
+ [_e]: _c,
439
+ [_hE]: 400,
440
+ [_aQE]: [`PackedPolicyTooLarge`, 400],
441
+ },
442
+ [_m],
443
+ [0],
444
+ ];
445
+ schema.TypeRegistry.for(n0).registerError(PackedPolicyTooLargeException, PackedPolicyTooLargeException$1);
446
+ var PolicyDescriptorType = [3, n0, _PDT, 0, [_a], [0]];
447
+ var ProvidedContext = [3, n0, _PCr, 0, [_PAro, _CA], [0, 0]];
448
+ var RegionDisabledException = [
449
+ -3,
450
+ n0,
451
+ _RDE,
452
+ {
453
+ [_e]: _c,
454
+ [_hE]: 403,
455
+ [_aQE]: [`RegionDisabledException`, 403],
456
+ },
457
+ [_m],
458
+ [0],
459
+ ];
460
+ schema.TypeRegistry.for(n0).registerError(RegionDisabledException, RegionDisabledException$1);
461
+ var Tag = [3, n0, _Ta, 0, [_K, _V], [0, 0]];
462
+ var STSServiceException = [-3, _s, "STSServiceException", 0, [], []];
463
+ schema.TypeRegistry.for(_s).registerError(STSServiceException, STSServiceException$1);
464
+ var policyDescriptorListType = [1, n0, _pDLT, 0, () => PolicyDescriptorType];
465
+ var ProvidedContextsListType = [1, n0, _PCLT, 0, () => ProvidedContext];
466
+ var tagListType = [1, n0, _tLT, 0, () => Tag];
467
+ var AssumeRole = [9, n0, _AR, 0, () => AssumeRoleRequest, () => AssumeRoleResponse];
468
+ var AssumeRoleWithSAML = [
469
+ 9,
470
+ n0,
471
+ _ARWSAML,
472
+ 0,
473
+ () => AssumeRoleWithSAMLRequest,
474
+ () => AssumeRoleWithSAMLResponse,
475
+ ];
476
+ var AssumeRoleWithWebIdentity = [
477
+ 9,
478
+ n0,
479
+ _ARWWI,
480
+ 0,
481
+ () => AssumeRoleWithWebIdentityRequest,
482
+ () => AssumeRoleWithWebIdentityResponse,
483
+ ];
484
+ var AssumeRoot = [9, n0, _ARs, 0, () => AssumeRootRequest, () => AssumeRootResponse];
485
+ var DecodeAuthorizationMessage = [
486
+ 9,
487
+ n0,
488
+ _DAM,
489
+ 0,
490
+ () => DecodeAuthorizationMessageRequest,
491
+ () => DecodeAuthorizationMessageResponse,
492
+ ];
493
+ var GetAccessKeyInfo = [
494
+ 9,
495
+ n0,
496
+ _GAKI,
497
+ 0,
498
+ () => GetAccessKeyInfoRequest,
499
+ () => GetAccessKeyInfoResponse,
500
+ ];
501
+ var GetCallerIdentity = [
502
+ 9,
503
+ n0,
504
+ _GCI,
505
+ 0,
506
+ () => GetCallerIdentityRequest,
507
+ () => GetCallerIdentityResponse,
508
+ ];
509
+ var GetDelegatedAccessToken = [
510
+ 9,
511
+ n0,
512
+ _GDAT,
513
+ 0,
514
+ () => GetDelegatedAccessTokenRequest,
515
+ () => GetDelegatedAccessTokenResponse,
516
+ ];
517
+ var GetFederationToken = [
518
+ 9,
519
+ n0,
520
+ _GFT,
521
+ 0,
522
+ () => GetFederationTokenRequest,
523
+ () => GetFederationTokenResponse,
524
+ ];
525
+ var GetSessionToken = [
526
+ 9,
527
+ n0,
528
+ _GST,
529
+ 0,
530
+ () => GetSessionTokenRequest,
531
+ () => GetSessionTokenResponse,
532
+ ];
1167
533
 
1168
534
  class AssumeRoleCommand extends smithyClient.Command
1169
535
  .classBuilder()
1170
536
  .ep(EndpointParameters.commonParams)
1171
537
  .m(function (Command, cs, config, o) {
1172
- return [
1173
- middlewareSerde.getSerdePlugin(config, this.serialize, this.deserialize),
1174
- middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions()),
1175
- ];
538
+ return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
1176
539
  })
1177
540
  .s("AWSSecurityTokenServiceV20110615", "AssumeRole", {})
1178
541
  .n("STSClient", "AssumeRoleCommand")
1179
- .f(void 0, AssumeRoleResponseFilterSensitiveLog)
1180
- .ser(se_AssumeRoleCommand)
1181
- .de(de_AssumeRoleCommand)
542
+ .sc(AssumeRole)
1182
543
  .build() {
1183
544
  }
1184
545
 
@@ -1186,16 +547,11 @@ class AssumeRoleWithSAMLCommand extends smithyClient.Command
1186
547
  .classBuilder()
1187
548
  .ep(EndpointParameters.commonParams)
1188
549
  .m(function (Command, cs, config, o) {
1189
- return [
1190
- middlewareSerde.getSerdePlugin(config, this.serialize, this.deserialize),
1191
- middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions()),
1192
- ];
550
+ return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
1193
551
  })
1194
552
  .s("AWSSecurityTokenServiceV20110615", "AssumeRoleWithSAML", {})
1195
553
  .n("STSClient", "AssumeRoleWithSAMLCommand")
1196
- .f(AssumeRoleWithSAMLRequestFilterSensitiveLog, AssumeRoleWithSAMLResponseFilterSensitiveLog)
1197
- .ser(se_AssumeRoleWithSAMLCommand)
1198
- .de(de_AssumeRoleWithSAMLCommand)
554
+ .sc(AssumeRoleWithSAML)
1199
555
  .build() {
1200
556
  }
1201
557
 
@@ -1203,16 +559,11 @@ class AssumeRoleWithWebIdentityCommand extends smithyClient.Command
1203
559
  .classBuilder()
1204
560
  .ep(EndpointParameters.commonParams)
1205
561
  .m(function (Command, cs, config, o) {
1206
- return [
1207
- middlewareSerde.getSerdePlugin(config, this.serialize, this.deserialize),
1208
- middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions()),
1209
- ];
562
+ return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
1210
563
  })
1211
564
  .s("AWSSecurityTokenServiceV20110615", "AssumeRoleWithWebIdentity", {})
1212
565
  .n("STSClient", "AssumeRoleWithWebIdentityCommand")
1213
- .f(AssumeRoleWithWebIdentityRequestFilterSensitiveLog, AssumeRoleWithWebIdentityResponseFilterSensitiveLog)
1214
- .ser(se_AssumeRoleWithWebIdentityCommand)
1215
- .de(de_AssumeRoleWithWebIdentityCommand)
566
+ .sc(AssumeRoleWithWebIdentity)
1216
567
  .build() {
1217
568
  }
1218
569
 
@@ -1220,16 +571,11 @@ class AssumeRootCommand extends smithyClient.Command
1220
571
  .classBuilder()
1221
572
  .ep(EndpointParameters.commonParams)
1222
573
  .m(function (Command, cs, config, o) {
1223
- return [
1224
- middlewareSerde.getSerdePlugin(config, this.serialize, this.deserialize),
1225
- middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions()),
1226
- ];
574
+ return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
1227
575
  })
1228
576
  .s("AWSSecurityTokenServiceV20110615", "AssumeRoot", {})
1229
577
  .n("STSClient", "AssumeRootCommand")
1230
- .f(void 0, AssumeRootResponseFilterSensitiveLog)
1231
- .ser(se_AssumeRootCommand)
1232
- .de(de_AssumeRootCommand)
578
+ .sc(AssumeRoot)
1233
579
  .build() {
1234
580
  }
1235
581
 
@@ -1237,16 +583,11 @@ class DecodeAuthorizationMessageCommand extends smithyClient.Command
1237
583
  .classBuilder()
1238
584
  .ep(EndpointParameters.commonParams)
1239
585
  .m(function (Command, cs, config, o) {
1240
- return [
1241
- middlewareSerde.getSerdePlugin(config, this.serialize, this.deserialize),
1242
- middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions()),
1243
- ];
586
+ return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
1244
587
  })
1245
588
  .s("AWSSecurityTokenServiceV20110615", "DecodeAuthorizationMessage", {})
1246
589
  .n("STSClient", "DecodeAuthorizationMessageCommand")
1247
- .f(void 0, void 0)
1248
- .ser(se_DecodeAuthorizationMessageCommand)
1249
- .de(de_DecodeAuthorizationMessageCommand)
590
+ .sc(DecodeAuthorizationMessage)
1250
591
  .build() {
1251
592
  }
1252
593
 
@@ -1254,16 +595,11 @@ class GetAccessKeyInfoCommand extends smithyClient.Command
1254
595
  .classBuilder()
1255
596
  .ep(EndpointParameters.commonParams)
1256
597
  .m(function (Command, cs, config, o) {
1257
- return [
1258
- middlewareSerde.getSerdePlugin(config, this.serialize, this.deserialize),
1259
- middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions()),
1260
- ];
598
+ return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
1261
599
  })
1262
600
  .s("AWSSecurityTokenServiceV20110615", "GetAccessKeyInfo", {})
1263
601
  .n("STSClient", "GetAccessKeyInfoCommand")
1264
- .f(void 0, void 0)
1265
- .ser(se_GetAccessKeyInfoCommand)
1266
- .de(de_GetAccessKeyInfoCommand)
602
+ .sc(GetAccessKeyInfo)
1267
603
  .build() {
1268
604
  }
1269
605
 
@@ -1271,16 +607,11 @@ class GetCallerIdentityCommand extends smithyClient.Command
1271
607
  .classBuilder()
1272
608
  .ep(EndpointParameters.commonParams)
1273
609
  .m(function (Command, cs, config, o) {
1274
- return [
1275
- middlewareSerde.getSerdePlugin(config, this.serialize, this.deserialize),
1276
- middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions()),
1277
- ];
610
+ return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
1278
611
  })
1279
612
  .s("AWSSecurityTokenServiceV20110615", "GetCallerIdentity", {})
1280
613
  .n("STSClient", "GetCallerIdentityCommand")
1281
- .f(void 0, void 0)
1282
- .ser(se_GetCallerIdentityCommand)
1283
- .de(de_GetCallerIdentityCommand)
614
+ .sc(GetCallerIdentity)
1284
615
  .build() {
1285
616
  }
1286
617
 
@@ -1288,16 +619,11 @@ class GetDelegatedAccessTokenCommand extends smithyClient.Command
1288
619
  .classBuilder()
1289
620
  .ep(EndpointParameters.commonParams)
1290
621
  .m(function (Command, cs, config, o) {
1291
- return [
1292
- middlewareSerde.getSerdePlugin(config, this.serialize, this.deserialize),
1293
- middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions()),
1294
- ];
622
+ return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
1295
623
  })
1296
624
  .s("AWSSecurityTokenServiceV20110615", "GetDelegatedAccessToken", {})
1297
625
  .n("STSClient", "GetDelegatedAccessTokenCommand")
1298
- .f(GetDelegatedAccessTokenRequestFilterSensitiveLog, GetDelegatedAccessTokenResponseFilterSensitiveLog)
1299
- .ser(se_GetDelegatedAccessTokenCommand)
1300
- .de(de_GetDelegatedAccessTokenCommand)
626
+ .sc(GetDelegatedAccessToken)
1301
627
  .build() {
1302
628
  }
1303
629
 
@@ -1305,16 +631,11 @@ class GetFederationTokenCommand extends smithyClient.Command
1305
631
  .classBuilder()
1306
632
  .ep(EndpointParameters.commonParams)
1307
633
  .m(function (Command, cs, config, o) {
1308
- return [
1309
- middlewareSerde.getSerdePlugin(config, this.serialize, this.deserialize),
1310
- middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions()),
1311
- ];
634
+ return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
1312
635
  })
1313
636
  .s("AWSSecurityTokenServiceV20110615", "GetFederationToken", {})
1314
637
  .n("STSClient", "GetFederationTokenCommand")
1315
- .f(void 0, GetFederationTokenResponseFilterSensitiveLog)
1316
- .ser(se_GetFederationTokenCommand)
1317
- .de(de_GetFederationTokenCommand)
638
+ .sc(GetFederationToken)
1318
639
  .build() {
1319
640
  }
1320
641
 
@@ -1322,16 +643,11 @@ class GetSessionTokenCommand extends smithyClient.Command
1322
643
  .classBuilder()
1323
644
  .ep(EndpointParameters.commonParams)
1324
645
  .m(function (Command, cs, config, o) {
1325
- return [
1326
- middlewareSerde.getSerdePlugin(config, this.serialize, this.deserialize),
1327
- middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions()),
1328
- ];
646
+ return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
1329
647
  })
1330
648
  .s("AWSSecurityTokenServiceV20110615", "GetSessionToken", {})
1331
649
  .n("STSClient", "GetSessionTokenCommand")
1332
- .f(void 0, GetSessionTokenResponseFilterSensitiveLog)
1333
- .ser(se_GetSessionTokenCommand)
1334
- .de(de_GetSessionTokenCommand)
650
+ .sc(GetSessionToken)
1335
651
  .build() {
1336
652
  }
1337
653
 
@@ -1475,37 +791,26 @@ Object.defineProperty(exports, "$Command", {
1475
791
  get: function () { return smithyClient.Command; }
1476
792
  });
1477
793
  exports.AssumeRoleCommand = AssumeRoleCommand;
1478
- exports.AssumeRoleResponseFilterSensitiveLog = AssumeRoleResponseFilterSensitiveLog;
1479
794
  exports.AssumeRoleWithSAMLCommand = AssumeRoleWithSAMLCommand;
1480
- exports.AssumeRoleWithSAMLRequestFilterSensitiveLog = AssumeRoleWithSAMLRequestFilterSensitiveLog;
1481
- exports.AssumeRoleWithSAMLResponseFilterSensitiveLog = AssumeRoleWithSAMLResponseFilterSensitiveLog;
1482
795
  exports.AssumeRoleWithWebIdentityCommand = AssumeRoleWithWebIdentityCommand;
1483
- exports.AssumeRoleWithWebIdentityRequestFilterSensitiveLog = AssumeRoleWithWebIdentityRequestFilterSensitiveLog;
1484
- exports.AssumeRoleWithWebIdentityResponseFilterSensitiveLog = AssumeRoleWithWebIdentityResponseFilterSensitiveLog;
1485
796
  exports.AssumeRootCommand = AssumeRootCommand;
1486
- exports.AssumeRootResponseFilterSensitiveLog = AssumeRootResponseFilterSensitiveLog;
1487
- exports.CredentialsFilterSensitiveLog = CredentialsFilterSensitiveLog;
1488
797
  exports.DecodeAuthorizationMessageCommand = DecodeAuthorizationMessageCommand;
1489
- exports.ExpiredTokenException = ExpiredTokenException;
1490
- exports.ExpiredTradeInTokenException = ExpiredTradeInTokenException;
798
+ exports.ExpiredTokenException = ExpiredTokenException$1;
799
+ exports.ExpiredTradeInTokenException = ExpiredTradeInTokenException$1;
1491
800
  exports.GetAccessKeyInfoCommand = GetAccessKeyInfoCommand;
1492
801
  exports.GetCallerIdentityCommand = GetCallerIdentityCommand;
1493
802
  exports.GetDelegatedAccessTokenCommand = GetDelegatedAccessTokenCommand;
1494
- exports.GetDelegatedAccessTokenRequestFilterSensitiveLog = GetDelegatedAccessTokenRequestFilterSensitiveLog;
1495
- exports.GetDelegatedAccessTokenResponseFilterSensitiveLog = GetDelegatedAccessTokenResponseFilterSensitiveLog;
1496
803
  exports.GetFederationTokenCommand = GetFederationTokenCommand;
1497
- exports.GetFederationTokenResponseFilterSensitiveLog = GetFederationTokenResponseFilterSensitiveLog;
1498
804
  exports.GetSessionTokenCommand = GetSessionTokenCommand;
1499
- exports.GetSessionTokenResponseFilterSensitiveLog = GetSessionTokenResponseFilterSensitiveLog;
1500
- exports.IDPCommunicationErrorException = IDPCommunicationErrorException;
1501
- exports.IDPRejectedClaimException = IDPRejectedClaimException;
1502
- exports.InvalidAuthorizationMessageException = InvalidAuthorizationMessageException;
1503
- exports.InvalidIdentityTokenException = InvalidIdentityTokenException;
1504
- exports.MalformedPolicyDocumentException = MalformedPolicyDocumentException;
1505
- exports.PackedPolicyTooLargeException = PackedPolicyTooLargeException;
1506
- exports.RegionDisabledException = RegionDisabledException;
805
+ exports.IDPCommunicationErrorException = IDPCommunicationErrorException$1;
806
+ exports.IDPRejectedClaimException = IDPRejectedClaimException$1;
807
+ exports.InvalidAuthorizationMessageException = InvalidAuthorizationMessageException$1;
808
+ exports.InvalidIdentityTokenException = InvalidIdentityTokenException$1;
809
+ exports.MalformedPolicyDocumentException = MalformedPolicyDocumentException$1;
810
+ exports.PackedPolicyTooLargeException = PackedPolicyTooLargeException$1;
811
+ exports.RegionDisabledException = RegionDisabledException$1;
1507
812
  exports.STS = STS;
1508
- exports.STSServiceException = STSServiceException;
813
+ exports.STSServiceException = STSServiceException$1;
1509
814
  exports.decorateDefaultCredentialProvider = decorateDefaultCredentialProvider;
1510
815
  exports.getDefaultRoleAssumer = getDefaultRoleAssumer;
1511
816
  exports.getDefaultRoleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity;