@aws-sdk/client-sts 3.952.0 → 3.954.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/index.js +194 -142
- package/dist-cjs/runtimeConfig.shared.js +7 -6
- package/dist-es/commands/AssumeRoleCommand.js +2 -2
- package/dist-es/commands/AssumeRoleWithSAMLCommand.js +2 -2
- package/dist-es/commands/AssumeRoleWithWebIdentityCommand.js +2 -2
- package/dist-es/commands/AssumeRootCommand.js +2 -2
- package/dist-es/commands/DecodeAuthorizationMessageCommand.js +2 -2
- package/dist-es/commands/GetAccessKeyInfoCommand.js +2 -2
- package/dist-es/commands/GetCallerIdentityCommand.js +2 -2
- package/dist-es/commands/GetDelegatedAccessTokenCommand.js +2 -2
- package/dist-es/commands/GetFederationTokenCommand.js +2 -2
- package/dist-es/commands/GetSessionTokenCommand.js +2 -2
- package/dist-es/commands/GetWebIdentityTokenCommand.js +2 -2
- package/dist-es/index.js +1 -0
- package/dist-es/runtimeConfig.shared.js +7 -6
- package/dist-es/schemas/schemas_0.js +101 -101
- package/dist-types/STSClient.d.ts +1 -10
- package/dist-types/index.d.ts +1 -0
- package/dist-types/runtimeConfig.browser.d.ts +6 -2
- package/dist-types/runtimeConfig.d.ts +6 -2
- package/dist-types/runtimeConfig.native.d.ts +6 -2
- package/dist-types/runtimeConfig.shared.d.ts +6 -1
- package/dist-types/schemas/schemas_0.d.ts +53 -63
- package/dist-types/ts3.4/STSClient.d.ts +0 -4
- package/dist-types/ts3.4/index.d.ts +1 -0
- package/dist-types/ts3.4/runtimeConfig.browser.d.ts +9 -5
- package/dist-types/ts3.4/runtimeConfig.d.ts +9 -5
- package/dist-types/ts3.4/runtimeConfig.native.d.ts +9 -5
- package/dist-types/ts3.4/runtimeConfig.shared.d.ts +9 -4
- package/dist-types/ts3.4/schemas/schemas_0.d.ts +52 -64
- package/package.json +34 -34
package/dist-cjs/index.js
CHANGED
|
@@ -8,14 +8,14 @@ var schema = require('@smithy/core/schema');
|
|
|
8
8
|
var client = require('@aws-sdk/core/client');
|
|
9
9
|
var regionConfigResolver = require('@aws-sdk/region-config-resolver');
|
|
10
10
|
|
|
11
|
-
|
|
11
|
+
class STSServiceException extends smithyClient.ServiceException {
|
|
12
12
|
constructor(options) {
|
|
13
13
|
super(options);
|
|
14
14
|
Object.setPrototypeOf(this, STSServiceException.prototype);
|
|
15
15
|
}
|
|
16
|
-
}
|
|
16
|
+
}
|
|
17
17
|
|
|
18
|
-
|
|
18
|
+
class ExpiredTokenException extends STSServiceException {
|
|
19
19
|
name = "ExpiredTokenException";
|
|
20
20
|
$fault = "client";
|
|
21
21
|
constructor(opts) {
|
|
@@ -26,8 +26,8 @@ let ExpiredTokenException$1 = class ExpiredTokenException extends STSServiceExce
|
|
|
26
26
|
});
|
|
27
27
|
Object.setPrototypeOf(this, ExpiredTokenException.prototype);
|
|
28
28
|
}
|
|
29
|
-
}
|
|
30
|
-
|
|
29
|
+
}
|
|
30
|
+
class MalformedPolicyDocumentException extends STSServiceException {
|
|
31
31
|
name = "MalformedPolicyDocumentException";
|
|
32
32
|
$fault = "client";
|
|
33
33
|
constructor(opts) {
|
|
@@ -38,8 +38,8 @@ let MalformedPolicyDocumentException$1 = class MalformedPolicyDocumentException
|
|
|
38
38
|
});
|
|
39
39
|
Object.setPrototypeOf(this, MalformedPolicyDocumentException.prototype);
|
|
40
40
|
}
|
|
41
|
-
}
|
|
42
|
-
|
|
41
|
+
}
|
|
42
|
+
class PackedPolicyTooLargeException extends STSServiceException {
|
|
43
43
|
name = "PackedPolicyTooLargeException";
|
|
44
44
|
$fault = "client";
|
|
45
45
|
constructor(opts) {
|
|
@@ -50,8 +50,8 @@ let PackedPolicyTooLargeException$1 = class PackedPolicyTooLargeException extend
|
|
|
50
50
|
});
|
|
51
51
|
Object.setPrototypeOf(this, PackedPolicyTooLargeException.prototype);
|
|
52
52
|
}
|
|
53
|
-
}
|
|
54
|
-
|
|
53
|
+
}
|
|
54
|
+
class RegionDisabledException extends STSServiceException {
|
|
55
55
|
name = "RegionDisabledException";
|
|
56
56
|
$fault = "client";
|
|
57
57
|
constructor(opts) {
|
|
@@ -62,8 +62,8 @@ let RegionDisabledException$1 = class RegionDisabledException extends STSService
|
|
|
62
62
|
});
|
|
63
63
|
Object.setPrototypeOf(this, RegionDisabledException.prototype);
|
|
64
64
|
}
|
|
65
|
-
}
|
|
66
|
-
|
|
65
|
+
}
|
|
66
|
+
class IDPRejectedClaimException extends STSServiceException {
|
|
67
67
|
name = "IDPRejectedClaimException";
|
|
68
68
|
$fault = "client";
|
|
69
69
|
constructor(opts) {
|
|
@@ -74,8 +74,8 @@ let IDPRejectedClaimException$1 = class IDPRejectedClaimException extends STSSer
|
|
|
74
74
|
});
|
|
75
75
|
Object.setPrototypeOf(this, IDPRejectedClaimException.prototype);
|
|
76
76
|
}
|
|
77
|
-
}
|
|
78
|
-
|
|
77
|
+
}
|
|
78
|
+
class InvalidIdentityTokenException extends STSServiceException {
|
|
79
79
|
name = "InvalidIdentityTokenException";
|
|
80
80
|
$fault = "client";
|
|
81
81
|
constructor(opts) {
|
|
@@ -86,8 +86,8 @@ let InvalidIdentityTokenException$1 = class InvalidIdentityTokenException extend
|
|
|
86
86
|
});
|
|
87
87
|
Object.setPrototypeOf(this, InvalidIdentityTokenException.prototype);
|
|
88
88
|
}
|
|
89
|
-
}
|
|
90
|
-
|
|
89
|
+
}
|
|
90
|
+
class IDPCommunicationErrorException extends STSServiceException {
|
|
91
91
|
name = "IDPCommunicationErrorException";
|
|
92
92
|
$fault = "client";
|
|
93
93
|
constructor(opts) {
|
|
@@ -98,8 +98,8 @@ let IDPCommunicationErrorException$1 = class IDPCommunicationErrorException exte
|
|
|
98
98
|
});
|
|
99
99
|
Object.setPrototypeOf(this, IDPCommunicationErrorException.prototype);
|
|
100
100
|
}
|
|
101
|
-
}
|
|
102
|
-
|
|
101
|
+
}
|
|
102
|
+
class InvalidAuthorizationMessageException extends STSServiceException {
|
|
103
103
|
name = "InvalidAuthorizationMessageException";
|
|
104
104
|
$fault = "client";
|
|
105
105
|
constructor(opts) {
|
|
@@ -110,8 +110,8 @@ let InvalidAuthorizationMessageException$1 = class InvalidAuthorizationMessageEx
|
|
|
110
110
|
});
|
|
111
111
|
Object.setPrototypeOf(this, InvalidAuthorizationMessageException.prototype);
|
|
112
112
|
}
|
|
113
|
-
}
|
|
114
|
-
|
|
113
|
+
}
|
|
114
|
+
class ExpiredTradeInTokenException extends STSServiceException {
|
|
115
115
|
name = "ExpiredTradeInTokenException";
|
|
116
116
|
$fault = "client";
|
|
117
117
|
constructor(opts) {
|
|
@@ -122,8 +122,8 @@ let ExpiredTradeInTokenException$1 = class ExpiredTradeInTokenException extends
|
|
|
122
122
|
});
|
|
123
123
|
Object.setPrototypeOf(this, ExpiredTradeInTokenException.prototype);
|
|
124
124
|
}
|
|
125
|
-
}
|
|
126
|
-
|
|
125
|
+
}
|
|
126
|
+
class JWTPayloadSizeExceededException extends STSServiceException {
|
|
127
127
|
name = "JWTPayloadSizeExceededException";
|
|
128
128
|
$fault = "client";
|
|
129
129
|
constructor(opts) {
|
|
@@ -134,8 +134,8 @@ let JWTPayloadSizeExceededException$1 = class JWTPayloadSizeExceededException ex
|
|
|
134
134
|
});
|
|
135
135
|
Object.setPrototypeOf(this, JWTPayloadSizeExceededException.prototype);
|
|
136
136
|
}
|
|
137
|
-
}
|
|
138
|
-
|
|
137
|
+
}
|
|
138
|
+
class OutboundWebIdentityFederationDisabledException extends STSServiceException {
|
|
139
139
|
name = "OutboundWebIdentityFederationDisabledException";
|
|
140
140
|
$fault = "client";
|
|
141
141
|
constructor(opts) {
|
|
@@ -146,8 +146,8 @@ let OutboundWebIdentityFederationDisabledException$1 = class OutboundWebIdentity
|
|
|
146
146
|
});
|
|
147
147
|
Object.setPrototypeOf(this, OutboundWebIdentityFederationDisabledException.prototype);
|
|
148
148
|
}
|
|
149
|
-
}
|
|
150
|
-
|
|
149
|
+
}
|
|
150
|
+
class SessionDurationEscalationException extends STSServiceException {
|
|
151
151
|
name = "SessionDurationEscalationException";
|
|
152
152
|
$fault = "client";
|
|
153
153
|
constructor(opts) {
|
|
@@ -158,7 +158,7 @@ let SessionDurationEscalationException$1 = class SessionDurationEscalationExcept
|
|
|
158
158
|
});
|
|
159
159
|
Object.setPrototypeOf(this, SessionDurationEscalationException.prototype);
|
|
160
160
|
}
|
|
161
|
-
}
|
|
161
|
+
}
|
|
162
162
|
|
|
163
163
|
const _A = "Arn";
|
|
164
164
|
const _AKI = "AccessKeyId";
|
|
@@ -277,8 +277,8 @@ var clientTokenType = [0, n0, _cTT, 8, 0];
|
|
|
277
277
|
var SAMLAssertionType = [0, n0, _SAMLAT, 8, 0];
|
|
278
278
|
var tradeInTokenType = [0, n0, _tITT, 8, 0];
|
|
279
279
|
var webIdentityTokenType = [0, n0, _wITT, 8, 0];
|
|
280
|
-
var AssumedRoleUser = [3, n0, _ARU, 0, [_ARI, _A], [0, 0]];
|
|
281
|
-
var AssumeRoleRequest = [
|
|
280
|
+
var AssumedRoleUser$ = [3, n0, _ARU, 0, [_ARI, _A], [0, 0]];
|
|
281
|
+
var AssumeRoleRequest$ = [
|
|
282
282
|
3,
|
|
283
283
|
n0,
|
|
284
284
|
_ARR,
|
|
@@ -286,15 +286,15 @@ var AssumeRoleRequest = [
|
|
|
286
286
|
[_RA, _RSN, _PA, _P, _DS, _T, _TTK, _EI, _SN, _TC, _SI, _PC],
|
|
287
287
|
[0, 0, () => policyDescriptorListType, 0, 1, () => tagListType, 64 | 0, 0, 0, 0, 0, () => ProvidedContextsListType],
|
|
288
288
|
];
|
|
289
|
-
var AssumeRoleResponse = [
|
|
289
|
+
var AssumeRoleResponse$ = [
|
|
290
290
|
3,
|
|
291
291
|
n0,
|
|
292
292
|
_ARRs,
|
|
293
293
|
0,
|
|
294
294
|
[_C, _ARU, _PPS, _SI],
|
|
295
|
-
[[() => Credentials
|
|
295
|
+
[[() => Credentials$, 0], () => AssumedRoleUser$, 1, 0],
|
|
296
296
|
];
|
|
297
|
-
var AssumeRoleWithSAMLRequest = [
|
|
297
|
+
var AssumeRoleWithSAMLRequest$ = [
|
|
298
298
|
3,
|
|
299
299
|
n0,
|
|
300
300
|
_ARWSAMLR,
|
|
@@ -302,15 +302,15 @@ var AssumeRoleWithSAMLRequest = [
|
|
|
302
302
|
[_RA, _PAr, _SAMLA, _PA, _P, _DS],
|
|
303
303
|
[0, 0, [() => SAMLAssertionType, 0], () => policyDescriptorListType, 0, 1],
|
|
304
304
|
];
|
|
305
|
-
var AssumeRoleWithSAMLResponse = [
|
|
305
|
+
var AssumeRoleWithSAMLResponse$ = [
|
|
306
306
|
3,
|
|
307
307
|
n0,
|
|
308
308
|
_ARWSAMLRs,
|
|
309
309
|
0,
|
|
310
310
|
[_C, _ARU, _PPS, _S, _ST, _I, _Au, _NQ, _SI],
|
|
311
|
-
[[() => Credentials
|
|
311
|
+
[[() => Credentials$, 0], () => AssumedRoleUser$, 1, 0, 0, 0, 0, 0, 0],
|
|
312
312
|
];
|
|
313
|
-
var AssumeRoleWithWebIdentityRequest = [
|
|
313
|
+
var AssumeRoleWithWebIdentityRequest$ = [
|
|
314
314
|
3,
|
|
315
315
|
n0,
|
|
316
316
|
_ARWWIR,
|
|
@@ -318,24 +318,24 @@ var AssumeRoleWithWebIdentityRequest = [
|
|
|
318
318
|
[_RA, _RSN, _WIT, _PI, _PA, _P, _DS],
|
|
319
319
|
[0, 0, [() => clientTokenType, 0], 0, () => policyDescriptorListType, 0, 1],
|
|
320
320
|
];
|
|
321
|
-
var AssumeRoleWithWebIdentityResponse = [
|
|
321
|
+
var AssumeRoleWithWebIdentityResponse$ = [
|
|
322
322
|
3,
|
|
323
323
|
n0,
|
|
324
324
|
_ARWWIRs,
|
|
325
325
|
0,
|
|
326
326
|
[_C, _SFWIT, _ARU, _PPS, _Pr, _Au, _SI],
|
|
327
|
-
[[() => Credentials
|
|
327
|
+
[[() => Credentials$, 0], 0, () => AssumedRoleUser$, 1, 0, 0, 0],
|
|
328
328
|
];
|
|
329
|
-
var AssumeRootRequest = [
|
|
329
|
+
var AssumeRootRequest$ = [
|
|
330
330
|
3,
|
|
331
331
|
n0,
|
|
332
332
|
_ARRss,
|
|
333
333
|
0,
|
|
334
334
|
[_TP, _TPA, _DS],
|
|
335
|
-
[0, () => PolicyDescriptorType
|
|
335
|
+
[0, () => PolicyDescriptorType$, 1],
|
|
336
336
|
];
|
|
337
|
-
var AssumeRootResponse = [3, n0, _ARRssu, 0, [_C, _SI], [[() => Credentials
|
|
338
|
-
var Credentials = [
|
|
337
|
+
var AssumeRootResponse$ = [3, n0, _ARRssu, 0, [_C, _SI], [[() => Credentials$, 0], 0]];
|
|
338
|
+
var Credentials$ = [
|
|
339
339
|
3,
|
|
340
340
|
n0,
|
|
341
341
|
_C,
|
|
@@ -343,9 +343,9 @@ var Credentials = [
|
|
|
343
343
|
[_AKI, _SAK, _STe, _E],
|
|
344
344
|
[0, [() => accessKeySecretType, 0], 0, 4],
|
|
345
345
|
];
|
|
346
|
-
var DecodeAuthorizationMessageRequest = [3, n0, _DAMR, 0, [_EM], [0]];
|
|
347
|
-
var DecodeAuthorizationMessageResponse = [3, n0, _DAMRe, 0, [_DM], [0]];
|
|
348
|
-
var ExpiredTokenException = [
|
|
346
|
+
var DecodeAuthorizationMessageRequest$ = [3, n0, _DAMR, 0, [_EM], [0]];
|
|
347
|
+
var DecodeAuthorizationMessageResponse$ = [3, n0, _DAMRe, 0, [_DM], [0]];
|
|
348
|
+
var ExpiredTokenException$ = [
|
|
349
349
|
-3,
|
|
350
350
|
n0,
|
|
351
351
|
_ETE,
|
|
@@ -353,8 +353,8 @@ var ExpiredTokenException = [
|
|
|
353
353
|
[_m],
|
|
354
354
|
[0],
|
|
355
355
|
];
|
|
356
|
-
schema.TypeRegistry.for(n0).registerError(ExpiredTokenException
|
|
357
|
-
var ExpiredTradeInTokenException = [
|
|
356
|
+
schema.TypeRegistry.for(n0).registerError(ExpiredTokenException$, ExpiredTokenException);
|
|
357
|
+
var ExpiredTradeInTokenException$ = [
|
|
358
358
|
-3,
|
|
359
359
|
n0,
|
|
360
360
|
_ETITE,
|
|
@@ -362,13 +362,13 @@ var ExpiredTradeInTokenException = [
|
|
|
362
362
|
[_m],
|
|
363
363
|
[0],
|
|
364
364
|
];
|
|
365
|
-
schema.TypeRegistry.for(n0).registerError(ExpiredTradeInTokenException
|
|
366
|
-
var FederatedUser = [3, n0, _FU, 0, [_FUI, _A], [0, 0]];
|
|
367
|
-
var GetAccessKeyInfoRequest = [3, n0, _GAKIR, 0, [_AKI], [0]];
|
|
368
|
-
var GetAccessKeyInfoResponse = [3, n0, _GAKIRe, 0, [_Ac], [0]];
|
|
369
|
-
var GetCallerIdentityRequest = [3, n0, _GCIR, 0, [], []];
|
|
370
|
-
var GetCallerIdentityResponse = [3, n0, _GCIRe, 0, [_UI, _Ac, _A], [0, 0, 0]];
|
|
371
|
-
var GetDelegatedAccessTokenRequest = [
|
|
365
|
+
schema.TypeRegistry.for(n0).registerError(ExpiredTradeInTokenException$, ExpiredTradeInTokenException);
|
|
366
|
+
var FederatedUser$ = [3, n0, _FU, 0, [_FUI, _A], [0, 0]];
|
|
367
|
+
var GetAccessKeyInfoRequest$ = [3, n0, _GAKIR, 0, [_AKI], [0]];
|
|
368
|
+
var GetAccessKeyInfoResponse$ = [3, n0, _GAKIRe, 0, [_Ac], [0]];
|
|
369
|
+
var GetCallerIdentityRequest$ = [3, n0, _GCIR, 0, [], []];
|
|
370
|
+
var GetCallerIdentityResponse$ = [3, n0, _GCIRe, 0, [_UI, _Ac, _A], [0, 0, 0]];
|
|
371
|
+
var GetDelegatedAccessTokenRequest$ = [
|
|
372
372
|
3,
|
|
373
373
|
n0,
|
|
374
374
|
_GDATR,
|
|
@@ -376,15 +376,15 @@ var GetDelegatedAccessTokenRequest = [
|
|
|
376
376
|
[_TIT],
|
|
377
377
|
[[() => tradeInTokenType, 0]],
|
|
378
378
|
];
|
|
379
|
-
var GetDelegatedAccessTokenResponse = [
|
|
379
|
+
var GetDelegatedAccessTokenResponse$ = [
|
|
380
380
|
3,
|
|
381
381
|
n0,
|
|
382
382
|
_GDATRe,
|
|
383
383
|
0,
|
|
384
384
|
[_C, _PPS, _AP],
|
|
385
|
-
[[() => Credentials
|
|
385
|
+
[[() => Credentials$, 0], 1, 0],
|
|
386
386
|
];
|
|
387
|
-
var GetFederationTokenRequest = [
|
|
387
|
+
var GetFederationTokenRequest$ = [
|
|
388
388
|
3,
|
|
389
389
|
n0,
|
|
390
390
|
_GFTR,
|
|
@@ -392,17 +392,17 @@ var GetFederationTokenRequest = [
|
|
|
392
392
|
[_N, _P, _PA, _DS, _T],
|
|
393
393
|
[0, 0, () => policyDescriptorListType, 1, () => tagListType],
|
|
394
394
|
];
|
|
395
|
-
var GetFederationTokenResponse = [
|
|
395
|
+
var GetFederationTokenResponse$ = [
|
|
396
396
|
3,
|
|
397
397
|
n0,
|
|
398
398
|
_GFTRe,
|
|
399
399
|
0,
|
|
400
400
|
[_C, _FU, _PPS],
|
|
401
|
-
[[() => Credentials
|
|
401
|
+
[[() => Credentials$, 0], () => FederatedUser$, 1],
|
|
402
402
|
];
|
|
403
|
-
var GetSessionTokenRequest = [3, n0, _GSTR, 0, [_DS, _SN, _TC], [1, 0, 0]];
|
|
404
|
-
var GetSessionTokenResponse = [3, n0, _GSTRe, 0, [_C], [[() => Credentials
|
|
405
|
-
var GetWebIdentityTokenRequest = [
|
|
403
|
+
var GetSessionTokenRequest$ = [3, n0, _GSTR, 0, [_DS, _SN, _TC], [1, 0, 0]];
|
|
404
|
+
var GetSessionTokenResponse$ = [3, n0, _GSTRe, 0, [_C], [[() => Credentials$, 0]]];
|
|
405
|
+
var GetWebIdentityTokenRequest$ = [
|
|
406
406
|
3,
|
|
407
407
|
n0,
|
|
408
408
|
_GWITR,
|
|
@@ -410,7 +410,7 @@ var GetWebIdentityTokenRequest = [
|
|
|
410
410
|
[_Au, _DS, _SA, _T],
|
|
411
411
|
[64 | 0, 1, 0, () => tagListType],
|
|
412
412
|
];
|
|
413
|
-
var GetWebIdentityTokenResponse = [
|
|
413
|
+
var GetWebIdentityTokenResponse$ = [
|
|
414
414
|
3,
|
|
415
415
|
n0,
|
|
416
416
|
_GWITRe,
|
|
@@ -418,7 +418,7 @@ var GetWebIdentityTokenResponse = [
|
|
|
418
418
|
[_WIT, _E],
|
|
419
419
|
[[() => webIdentityTokenType, 0], 4],
|
|
420
420
|
];
|
|
421
|
-
var IDPCommunicationErrorException = [
|
|
421
|
+
var IDPCommunicationErrorException$ = [
|
|
422
422
|
-3,
|
|
423
423
|
n0,
|
|
424
424
|
_IDPCEE,
|
|
@@ -426,8 +426,8 @@ var IDPCommunicationErrorException = [
|
|
|
426
426
|
[_m],
|
|
427
427
|
[0],
|
|
428
428
|
];
|
|
429
|
-
schema.TypeRegistry.for(n0).registerError(IDPCommunicationErrorException
|
|
430
|
-
var IDPRejectedClaimException = [
|
|
429
|
+
schema.TypeRegistry.for(n0).registerError(IDPCommunicationErrorException$, IDPCommunicationErrorException);
|
|
430
|
+
var IDPRejectedClaimException$ = [
|
|
431
431
|
-3,
|
|
432
432
|
n0,
|
|
433
433
|
_IDPRCE,
|
|
@@ -435,8 +435,8 @@ var IDPRejectedClaimException = [
|
|
|
435
435
|
[_m],
|
|
436
436
|
[0],
|
|
437
437
|
];
|
|
438
|
-
schema.TypeRegistry.for(n0).registerError(IDPRejectedClaimException
|
|
439
|
-
var InvalidAuthorizationMessageException = [
|
|
438
|
+
schema.TypeRegistry.for(n0).registerError(IDPRejectedClaimException$, IDPRejectedClaimException);
|
|
439
|
+
var InvalidAuthorizationMessageException$ = [
|
|
440
440
|
-3,
|
|
441
441
|
n0,
|
|
442
442
|
_IAME,
|
|
@@ -444,8 +444,8 @@ var InvalidAuthorizationMessageException = [
|
|
|
444
444
|
[_m],
|
|
445
445
|
[0],
|
|
446
446
|
];
|
|
447
|
-
schema.TypeRegistry.for(n0).registerError(InvalidAuthorizationMessageException
|
|
448
|
-
var InvalidIdentityTokenException = [
|
|
447
|
+
schema.TypeRegistry.for(n0).registerError(InvalidAuthorizationMessageException$, InvalidAuthorizationMessageException);
|
|
448
|
+
var InvalidIdentityTokenException$ = [
|
|
449
449
|
-3,
|
|
450
450
|
n0,
|
|
451
451
|
_IITE,
|
|
@@ -453,8 +453,8 @@ var InvalidIdentityTokenException = [
|
|
|
453
453
|
[_m],
|
|
454
454
|
[0],
|
|
455
455
|
];
|
|
456
|
-
schema.TypeRegistry.for(n0).registerError(InvalidIdentityTokenException
|
|
457
|
-
var JWTPayloadSizeExceededException = [
|
|
456
|
+
schema.TypeRegistry.for(n0).registerError(InvalidIdentityTokenException$, InvalidIdentityTokenException);
|
|
457
|
+
var JWTPayloadSizeExceededException$ = [
|
|
458
458
|
-3,
|
|
459
459
|
n0,
|
|
460
460
|
_JWTPSEE,
|
|
@@ -462,8 +462,8 @@ var JWTPayloadSizeExceededException = [
|
|
|
462
462
|
[_m],
|
|
463
463
|
[0],
|
|
464
464
|
];
|
|
465
|
-
schema.TypeRegistry.for(n0).registerError(JWTPayloadSizeExceededException
|
|
466
|
-
var MalformedPolicyDocumentException = [
|
|
465
|
+
schema.TypeRegistry.for(n0).registerError(JWTPayloadSizeExceededException$, JWTPayloadSizeExceededException);
|
|
466
|
+
var MalformedPolicyDocumentException$ = [
|
|
467
467
|
-3,
|
|
468
468
|
n0,
|
|
469
469
|
_MPDE,
|
|
@@ -471,8 +471,8 @@ var MalformedPolicyDocumentException = [
|
|
|
471
471
|
[_m],
|
|
472
472
|
[0],
|
|
473
473
|
];
|
|
474
|
-
schema.TypeRegistry.for(n0).registerError(MalformedPolicyDocumentException
|
|
475
|
-
var OutboundWebIdentityFederationDisabledException = [
|
|
474
|
+
schema.TypeRegistry.for(n0).registerError(MalformedPolicyDocumentException$, MalformedPolicyDocumentException);
|
|
475
|
+
var OutboundWebIdentityFederationDisabledException$ = [
|
|
476
476
|
-3,
|
|
477
477
|
n0,
|
|
478
478
|
_OWIFDE,
|
|
@@ -480,8 +480,8 @@ var OutboundWebIdentityFederationDisabledException = [
|
|
|
480
480
|
[_m],
|
|
481
481
|
[0],
|
|
482
482
|
];
|
|
483
|
-
schema.TypeRegistry.for(n0).registerError(OutboundWebIdentityFederationDisabledException
|
|
484
|
-
var PackedPolicyTooLargeException = [
|
|
483
|
+
schema.TypeRegistry.for(n0).registerError(OutboundWebIdentityFederationDisabledException$, OutboundWebIdentityFederationDisabledException);
|
|
484
|
+
var PackedPolicyTooLargeException$ = [
|
|
485
485
|
-3,
|
|
486
486
|
n0,
|
|
487
487
|
_PPTLE,
|
|
@@ -489,10 +489,10 @@ var PackedPolicyTooLargeException = [
|
|
|
489
489
|
[_m],
|
|
490
490
|
[0],
|
|
491
491
|
];
|
|
492
|
-
schema.TypeRegistry.for(n0).registerError(PackedPolicyTooLargeException
|
|
493
|
-
var PolicyDescriptorType = [3, n0, _PDT, 0, [_a], [0]];
|
|
494
|
-
var ProvidedContext = [3, n0, _PCr, 0, [_PAro, _CA], [0, 0]];
|
|
495
|
-
var RegionDisabledException = [
|
|
492
|
+
schema.TypeRegistry.for(n0).registerError(PackedPolicyTooLargeException$, PackedPolicyTooLargeException);
|
|
493
|
+
var PolicyDescriptorType$ = [3, n0, _PDT, 0, [_a], [0]];
|
|
494
|
+
var ProvidedContext$ = [3, n0, _PCr, 0, [_PAro, _CA], [0, 0]];
|
|
495
|
+
var RegionDisabledException$ = [
|
|
496
496
|
-3,
|
|
497
497
|
n0,
|
|
498
498
|
_RDE,
|
|
@@ -500,8 +500,8 @@ var RegionDisabledException = [
|
|
|
500
500
|
[_m],
|
|
501
501
|
[0],
|
|
502
502
|
];
|
|
503
|
-
schema.TypeRegistry.for(n0).registerError(RegionDisabledException
|
|
504
|
-
var SessionDurationEscalationException = [
|
|
503
|
+
schema.TypeRegistry.for(n0).registerError(RegionDisabledException$, RegionDisabledException);
|
|
504
|
+
var SessionDurationEscalationException$ = [
|
|
505
505
|
-3,
|
|
506
506
|
n0,
|
|
507
507
|
_SDEE,
|
|
@@ -509,86 +509,86 @@ var SessionDurationEscalationException = [
|
|
|
509
509
|
[_m],
|
|
510
510
|
[0],
|
|
511
511
|
];
|
|
512
|
-
schema.TypeRegistry.for(n0).registerError(SessionDurationEscalationException
|
|
513
|
-
var Tag = [3, n0, _Ta, 0, [_K, _V], [0, 0]];
|
|
514
|
-
var STSServiceException = [-3, _s, "STSServiceException", 0, [], []];
|
|
515
|
-
schema.TypeRegistry.for(_s).registerError(STSServiceException
|
|
516
|
-
var policyDescriptorListType = [1, n0, _pDLT, 0, () => PolicyDescriptorType];
|
|
517
|
-
var ProvidedContextsListType = [1, n0, _PCLT, 0, () => ProvidedContext];
|
|
518
|
-
var tagListType = [1, n0, _tLT, 0, () => Tag];
|
|
519
|
-
var AssumeRole = [9, n0, _AR, 0, () => AssumeRoleRequest
|
|
520
|
-
var AssumeRoleWithSAML = [
|
|
512
|
+
schema.TypeRegistry.for(n0).registerError(SessionDurationEscalationException$, SessionDurationEscalationException);
|
|
513
|
+
var Tag$ = [3, n0, _Ta, 0, [_K, _V], [0, 0]];
|
|
514
|
+
var STSServiceException$ = [-3, _s, "STSServiceException", 0, [], []];
|
|
515
|
+
schema.TypeRegistry.for(_s).registerError(STSServiceException$, STSServiceException);
|
|
516
|
+
var policyDescriptorListType = [1, n0, _pDLT, 0, () => PolicyDescriptorType$];
|
|
517
|
+
var ProvidedContextsListType = [1, n0, _PCLT, 0, () => ProvidedContext$];
|
|
518
|
+
var tagListType = [1, n0, _tLT, 0, () => Tag$];
|
|
519
|
+
var AssumeRole$ = [9, n0, _AR, 0, () => AssumeRoleRequest$, () => AssumeRoleResponse$];
|
|
520
|
+
var AssumeRoleWithSAML$ = [
|
|
521
521
|
9,
|
|
522
522
|
n0,
|
|
523
523
|
_ARWSAML,
|
|
524
524
|
0,
|
|
525
|
-
() => AssumeRoleWithSAMLRequest
|
|
526
|
-
() => AssumeRoleWithSAMLResponse
|
|
525
|
+
() => AssumeRoleWithSAMLRequest$,
|
|
526
|
+
() => AssumeRoleWithSAMLResponse$,
|
|
527
527
|
];
|
|
528
|
-
var AssumeRoleWithWebIdentity = [
|
|
528
|
+
var AssumeRoleWithWebIdentity$ = [
|
|
529
529
|
9,
|
|
530
530
|
n0,
|
|
531
531
|
_ARWWI,
|
|
532
532
|
0,
|
|
533
|
-
() => AssumeRoleWithWebIdentityRequest
|
|
534
|
-
() => AssumeRoleWithWebIdentityResponse
|
|
533
|
+
() => AssumeRoleWithWebIdentityRequest$,
|
|
534
|
+
() => AssumeRoleWithWebIdentityResponse$,
|
|
535
535
|
];
|
|
536
|
-
var AssumeRoot = [9, n0, _ARs, 0, () => AssumeRootRequest
|
|
537
|
-
var DecodeAuthorizationMessage = [
|
|
536
|
+
var AssumeRoot$ = [9, n0, _ARs, 0, () => AssumeRootRequest$, () => AssumeRootResponse$];
|
|
537
|
+
var DecodeAuthorizationMessage$ = [
|
|
538
538
|
9,
|
|
539
539
|
n0,
|
|
540
540
|
_DAM,
|
|
541
541
|
0,
|
|
542
|
-
() => DecodeAuthorizationMessageRequest
|
|
543
|
-
() => DecodeAuthorizationMessageResponse
|
|
542
|
+
() => DecodeAuthorizationMessageRequest$,
|
|
543
|
+
() => DecodeAuthorizationMessageResponse$,
|
|
544
544
|
];
|
|
545
|
-
var GetAccessKeyInfo = [
|
|
545
|
+
var GetAccessKeyInfo$ = [
|
|
546
546
|
9,
|
|
547
547
|
n0,
|
|
548
548
|
_GAKI,
|
|
549
549
|
0,
|
|
550
|
-
() => GetAccessKeyInfoRequest
|
|
551
|
-
() => GetAccessKeyInfoResponse
|
|
550
|
+
() => GetAccessKeyInfoRequest$,
|
|
551
|
+
() => GetAccessKeyInfoResponse$,
|
|
552
552
|
];
|
|
553
|
-
var GetCallerIdentity = [
|
|
553
|
+
var GetCallerIdentity$ = [
|
|
554
554
|
9,
|
|
555
555
|
n0,
|
|
556
556
|
_GCI,
|
|
557
557
|
0,
|
|
558
|
-
() => GetCallerIdentityRequest
|
|
559
|
-
() => GetCallerIdentityResponse
|
|
558
|
+
() => GetCallerIdentityRequest$,
|
|
559
|
+
() => GetCallerIdentityResponse$,
|
|
560
560
|
];
|
|
561
|
-
var GetDelegatedAccessToken = [
|
|
561
|
+
var GetDelegatedAccessToken$ = [
|
|
562
562
|
9,
|
|
563
563
|
n0,
|
|
564
564
|
_GDAT,
|
|
565
565
|
0,
|
|
566
|
-
() => GetDelegatedAccessTokenRequest
|
|
567
|
-
() => GetDelegatedAccessTokenResponse
|
|
566
|
+
() => GetDelegatedAccessTokenRequest$,
|
|
567
|
+
() => GetDelegatedAccessTokenResponse$,
|
|
568
568
|
];
|
|
569
|
-
var GetFederationToken = [
|
|
569
|
+
var GetFederationToken$ = [
|
|
570
570
|
9,
|
|
571
571
|
n0,
|
|
572
572
|
_GFT,
|
|
573
573
|
0,
|
|
574
|
-
() => GetFederationTokenRequest
|
|
575
|
-
() => GetFederationTokenResponse
|
|
574
|
+
() => GetFederationTokenRequest$,
|
|
575
|
+
() => GetFederationTokenResponse$,
|
|
576
576
|
];
|
|
577
|
-
var GetSessionToken = [
|
|
577
|
+
var GetSessionToken$ = [
|
|
578
578
|
9,
|
|
579
579
|
n0,
|
|
580
580
|
_GST,
|
|
581
581
|
0,
|
|
582
|
-
() => GetSessionTokenRequest
|
|
583
|
-
() => GetSessionTokenResponse
|
|
582
|
+
() => GetSessionTokenRequest$,
|
|
583
|
+
() => GetSessionTokenResponse$,
|
|
584
584
|
];
|
|
585
|
-
var GetWebIdentityToken = [
|
|
585
|
+
var GetWebIdentityToken$ = [
|
|
586
586
|
9,
|
|
587
587
|
n0,
|
|
588
588
|
_GWIT,
|
|
589
589
|
0,
|
|
590
|
-
() => GetWebIdentityTokenRequest
|
|
591
|
-
() => GetWebIdentityTokenResponse
|
|
590
|
+
() => GetWebIdentityTokenRequest$,
|
|
591
|
+
() => GetWebIdentityTokenResponse$,
|
|
592
592
|
];
|
|
593
593
|
|
|
594
594
|
class AssumeRoleCommand extends smithyClient.Command
|
|
@@ -599,7 +599,7 @@ class AssumeRoleCommand extends smithyClient.Command
|
|
|
599
599
|
})
|
|
600
600
|
.s("AWSSecurityTokenServiceV20110615", "AssumeRole", {})
|
|
601
601
|
.n("STSClient", "AssumeRoleCommand")
|
|
602
|
-
.sc(AssumeRole)
|
|
602
|
+
.sc(AssumeRole$)
|
|
603
603
|
.build() {
|
|
604
604
|
}
|
|
605
605
|
|
|
@@ -611,7 +611,7 @@ class AssumeRoleWithSAMLCommand extends smithyClient.Command
|
|
|
611
611
|
})
|
|
612
612
|
.s("AWSSecurityTokenServiceV20110615", "AssumeRoleWithSAML", {})
|
|
613
613
|
.n("STSClient", "AssumeRoleWithSAMLCommand")
|
|
614
|
-
.sc(AssumeRoleWithSAML)
|
|
614
|
+
.sc(AssumeRoleWithSAML$)
|
|
615
615
|
.build() {
|
|
616
616
|
}
|
|
617
617
|
|
|
@@ -623,7 +623,7 @@ class AssumeRoleWithWebIdentityCommand extends smithyClient.Command
|
|
|
623
623
|
})
|
|
624
624
|
.s("AWSSecurityTokenServiceV20110615", "AssumeRoleWithWebIdentity", {})
|
|
625
625
|
.n("STSClient", "AssumeRoleWithWebIdentityCommand")
|
|
626
|
-
.sc(AssumeRoleWithWebIdentity)
|
|
626
|
+
.sc(AssumeRoleWithWebIdentity$)
|
|
627
627
|
.build() {
|
|
628
628
|
}
|
|
629
629
|
|
|
@@ -635,7 +635,7 @@ class AssumeRootCommand extends smithyClient.Command
|
|
|
635
635
|
})
|
|
636
636
|
.s("AWSSecurityTokenServiceV20110615", "AssumeRoot", {})
|
|
637
637
|
.n("STSClient", "AssumeRootCommand")
|
|
638
|
-
.sc(AssumeRoot)
|
|
638
|
+
.sc(AssumeRoot$)
|
|
639
639
|
.build() {
|
|
640
640
|
}
|
|
641
641
|
|
|
@@ -647,7 +647,7 @@ class DecodeAuthorizationMessageCommand extends smithyClient.Command
|
|
|
647
647
|
})
|
|
648
648
|
.s("AWSSecurityTokenServiceV20110615", "DecodeAuthorizationMessage", {})
|
|
649
649
|
.n("STSClient", "DecodeAuthorizationMessageCommand")
|
|
650
|
-
.sc(DecodeAuthorizationMessage)
|
|
650
|
+
.sc(DecodeAuthorizationMessage$)
|
|
651
651
|
.build() {
|
|
652
652
|
}
|
|
653
653
|
|
|
@@ -659,7 +659,7 @@ class GetAccessKeyInfoCommand extends smithyClient.Command
|
|
|
659
659
|
})
|
|
660
660
|
.s("AWSSecurityTokenServiceV20110615", "GetAccessKeyInfo", {})
|
|
661
661
|
.n("STSClient", "GetAccessKeyInfoCommand")
|
|
662
|
-
.sc(GetAccessKeyInfo)
|
|
662
|
+
.sc(GetAccessKeyInfo$)
|
|
663
663
|
.build() {
|
|
664
664
|
}
|
|
665
665
|
|
|
@@ -671,7 +671,7 @@ class GetCallerIdentityCommand extends smithyClient.Command
|
|
|
671
671
|
})
|
|
672
672
|
.s("AWSSecurityTokenServiceV20110615", "GetCallerIdentity", {})
|
|
673
673
|
.n("STSClient", "GetCallerIdentityCommand")
|
|
674
|
-
.sc(GetCallerIdentity)
|
|
674
|
+
.sc(GetCallerIdentity$)
|
|
675
675
|
.build() {
|
|
676
676
|
}
|
|
677
677
|
|
|
@@ -683,7 +683,7 @@ class GetDelegatedAccessTokenCommand extends smithyClient.Command
|
|
|
683
683
|
})
|
|
684
684
|
.s("AWSSecurityTokenServiceV20110615", "GetDelegatedAccessToken", {})
|
|
685
685
|
.n("STSClient", "GetDelegatedAccessTokenCommand")
|
|
686
|
-
.sc(GetDelegatedAccessToken)
|
|
686
|
+
.sc(GetDelegatedAccessToken$)
|
|
687
687
|
.build() {
|
|
688
688
|
}
|
|
689
689
|
|
|
@@ -695,7 +695,7 @@ class GetFederationTokenCommand extends smithyClient.Command
|
|
|
695
695
|
})
|
|
696
696
|
.s("AWSSecurityTokenServiceV20110615", "GetFederationToken", {})
|
|
697
697
|
.n("STSClient", "GetFederationTokenCommand")
|
|
698
|
-
.sc(GetFederationToken)
|
|
698
|
+
.sc(GetFederationToken$)
|
|
699
699
|
.build() {
|
|
700
700
|
}
|
|
701
701
|
|
|
@@ -707,7 +707,7 @@ class GetSessionTokenCommand extends smithyClient.Command
|
|
|
707
707
|
})
|
|
708
708
|
.s("AWSSecurityTokenServiceV20110615", "GetSessionToken", {})
|
|
709
709
|
.n("STSClient", "GetSessionTokenCommand")
|
|
710
|
-
.sc(GetSessionToken)
|
|
710
|
+
.sc(GetSessionToken$)
|
|
711
711
|
.build() {
|
|
712
712
|
}
|
|
713
713
|
|
|
@@ -719,7 +719,7 @@ class GetWebIdentityTokenCommand extends smithyClient.Command
|
|
|
719
719
|
})
|
|
720
720
|
.s("AWSSecurityTokenServiceV20110615", "GetWebIdentityToken", {})
|
|
721
721
|
.n("STSClient", "GetWebIdentityTokenCommand")
|
|
722
|
-
.sc(GetWebIdentityToken)
|
|
722
|
+
.sc(GetWebIdentityToken$)
|
|
723
723
|
.build() {
|
|
724
724
|
}
|
|
725
725
|
|
|
@@ -864,31 +864,83 @@ Object.defineProperty(exports, "$Command", {
|
|
|
864
864
|
enumerable: true,
|
|
865
865
|
get: function () { return smithyClient.Command; }
|
|
866
866
|
});
|
|
867
|
+
exports.AssumeRole$ = AssumeRole$;
|
|
867
868
|
exports.AssumeRoleCommand = AssumeRoleCommand;
|
|
869
|
+
exports.AssumeRoleRequest$ = AssumeRoleRequest$;
|
|
870
|
+
exports.AssumeRoleResponse$ = AssumeRoleResponse$;
|
|
871
|
+
exports.AssumeRoleWithSAML$ = AssumeRoleWithSAML$;
|
|
868
872
|
exports.AssumeRoleWithSAMLCommand = AssumeRoleWithSAMLCommand;
|
|
873
|
+
exports.AssumeRoleWithSAMLRequest$ = AssumeRoleWithSAMLRequest$;
|
|
874
|
+
exports.AssumeRoleWithSAMLResponse$ = AssumeRoleWithSAMLResponse$;
|
|
875
|
+
exports.AssumeRoleWithWebIdentity$ = AssumeRoleWithWebIdentity$;
|
|
869
876
|
exports.AssumeRoleWithWebIdentityCommand = AssumeRoleWithWebIdentityCommand;
|
|
877
|
+
exports.AssumeRoleWithWebIdentityRequest$ = AssumeRoleWithWebIdentityRequest$;
|
|
878
|
+
exports.AssumeRoleWithWebIdentityResponse$ = AssumeRoleWithWebIdentityResponse$;
|
|
879
|
+
exports.AssumeRoot$ = AssumeRoot$;
|
|
870
880
|
exports.AssumeRootCommand = AssumeRootCommand;
|
|
881
|
+
exports.AssumeRootRequest$ = AssumeRootRequest$;
|
|
882
|
+
exports.AssumeRootResponse$ = AssumeRootResponse$;
|
|
883
|
+
exports.AssumedRoleUser$ = AssumedRoleUser$;
|
|
884
|
+
exports.Credentials$ = Credentials$;
|
|
885
|
+
exports.DecodeAuthorizationMessage$ = DecodeAuthorizationMessage$;
|
|
871
886
|
exports.DecodeAuthorizationMessageCommand = DecodeAuthorizationMessageCommand;
|
|
872
|
-
exports.
|
|
873
|
-
exports.
|
|
887
|
+
exports.DecodeAuthorizationMessageRequest$ = DecodeAuthorizationMessageRequest$;
|
|
888
|
+
exports.DecodeAuthorizationMessageResponse$ = DecodeAuthorizationMessageResponse$;
|
|
889
|
+
exports.ExpiredTokenException = ExpiredTokenException;
|
|
890
|
+
exports.ExpiredTokenException$ = ExpiredTokenException$;
|
|
891
|
+
exports.ExpiredTradeInTokenException = ExpiredTradeInTokenException;
|
|
892
|
+
exports.ExpiredTradeInTokenException$ = ExpiredTradeInTokenException$;
|
|
893
|
+
exports.FederatedUser$ = FederatedUser$;
|
|
894
|
+
exports.GetAccessKeyInfo$ = GetAccessKeyInfo$;
|
|
874
895
|
exports.GetAccessKeyInfoCommand = GetAccessKeyInfoCommand;
|
|
896
|
+
exports.GetAccessKeyInfoRequest$ = GetAccessKeyInfoRequest$;
|
|
897
|
+
exports.GetAccessKeyInfoResponse$ = GetAccessKeyInfoResponse$;
|
|
898
|
+
exports.GetCallerIdentity$ = GetCallerIdentity$;
|
|
875
899
|
exports.GetCallerIdentityCommand = GetCallerIdentityCommand;
|
|
900
|
+
exports.GetCallerIdentityRequest$ = GetCallerIdentityRequest$;
|
|
901
|
+
exports.GetCallerIdentityResponse$ = GetCallerIdentityResponse$;
|
|
902
|
+
exports.GetDelegatedAccessToken$ = GetDelegatedAccessToken$;
|
|
876
903
|
exports.GetDelegatedAccessTokenCommand = GetDelegatedAccessTokenCommand;
|
|
904
|
+
exports.GetDelegatedAccessTokenRequest$ = GetDelegatedAccessTokenRequest$;
|
|
905
|
+
exports.GetDelegatedAccessTokenResponse$ = GetDelegatedAccessTokenResponse$;
|
|
906
|
+
exports.GetFederationToken$ = GetFederationToken$;
|
|
877
907
|
exports.GetFederationTokenCommand = GetFederationTokenCommand;
|
|
908
|
+
exports.GetFederationTokenRequest$ = GetFederationTokenRequest$;
|
|
909
|
+
exports.GetFederationTokenResponse$ = GetFederationTokenResponse$;
|
|
910
|
+
exports.GetSessionToken$ = GetSessionToken$;
|
|
878
911
|
exports.GetSessionTokenCommand = GetSessionTokenCommand;
|
|
912
|
+
exports.GetSessionTokenRequest$ = GetSessionTokenRequest$;
|
|
913
|
+
exports.GetSessionTokenResponse$ = GetSessionTokenResponse$;
|
|
914
|
+
exports.GetWebIdentityToken$ = GetWebIdentityToken$;
|
|
879
915
|
exports.GetWebIdentityTokenCommand = GetWebIdentityTokenCommand;
|
|
880
|
-
exports.
|
|
881
|
-
exports.
|
|
882
|
-
exports.
|
|
883
|
-
exports.
|
|
884
|
-
exports.
|
|
885
|
-
exports.
|
|
886
|
-
exports.
|
|
887
|
-
exports.
|
|
888
|
-
exports.
|
|
916
|
+
exports.GetWebIdentityTokenRequest$ = GetWebIdentityTokenRequest$;
|
|
917
|
+
exports.GetWebIdentityTokenResponse$ = GetWebIdentityTokenResponse$;
|
|
918
|
+
exports.IDPCommunicationErrorException = IDPCommunicationErrorException;
|
|
919
|
+
exports.IDPCommunicationErrorException$ = IDPCommunicationErrorException$;
|
|
920
|
+
exports.IDPRejectedClaimException = IDPRejectedClaimException;
|
|
921
|
+
exports.IDPRejectedClaimException$ = IDPRejectedClaimException$;
|
|
922
|
+
exports.InvalidAuthorizationMessageException = InvalidAuthorizationMessageException;
|
|
923
|
+
exports.InvalidAuthorizationMessageException$ = InvalidAuthorizationMessageException$;
|
|
924
|
+
exports.InvalidIdentityTokenException = InvalidIdentityTokenException;
|
|
925
|
+
exports.InvalidIdentityTokenException$ = InvalidIdentityTokenException$;
|
|
926
|
+
exports.JWTPayloadSizeExceededException = JWTPayloadSizeExceededException;
|
|
927
|
+
exports.JWTPayloadSizeExceededException$ = JWTPayloadSizeExceededException$;
|
|
928
|
+
exports.MalformedPolicyDocumentException = MalformedPolicyDocumentException;
|
|
929
|
+
exports.MalformedPolicyDocumentException$ = MalformedPolicyDocumentException$;
|
|
930
|
+
exports.OutboundWebIdentityFederationDisabledException = OutboundWebIdentityFederationDisabledException;
|
|
931
|
+
exports.OutboundWebIdentityFederationDisabledException$ = OutboundWebIdentityFederationDisabledException$;
|
|
932
|
+
exports.PackedPolicyTooLargeException = PackedPolicyTooLargeException;
|
|
933
|
+
exports.PackedPolicyTooLargeException$ = PackedPolicyTooLargeException$;
|
|
934
|
+
exports.PolicyDescriptorType$ = PolicyDescriptorType$;
|
|
935
|
+
exports.ProvidedContext$ = ProvidedContext$;
|
|
936
|
+
exports.RegionDisabledException = RegionDisabledException;
|
|
937
|
+
exports.RegionDisabledException$ = RegionDisabledException$;
|
|
889
938
|
exports.STS = STS;
|
|
890
|
-
exports.STSServiceException = STSServiceException
|
|
891
|
-
exports.
|
|
939
|
+
exports.STSServiceException = STSServiceException;
|
|
940
|
+
exports.STSServiceException$ = STSServiceException$;
|
|
941
|
+
exports.SessionDurationEscalationException = SessionDurationEscalationException;
|
|
942
|
+
exports.SessionDurationEscalationException$ = SessionDurationEscalationException$;
|
|
943
|
+
exports.Tag$ = Tag$;
|
|
892
944
|
exports.decorateDefaultCredentialProvider = decorateDefaultCredentialProvider;
|
|
893
945
|
exports.getDefaultRoleAssumer = getDefaultRoleAssumer;
|
|
894
946
|
exports.getDefaultRoleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity;
|