@aws-sdk/client-sts 3.956.0 → 3.958.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -7,16 +7,13 @@
7
7
  AWS SDK for JavaScript STS Client for Node.js, Browser and React Native.
8
8
 
9
9
  <fullname>Security Token Service</fullname>
10
-
11
10
  <p>Security Token Service (STS) enables you to request temporary, limited-privilege
12
11
  credentials for users. This guide provides descriptions of the STS API. For
13
12
  more information about using this service, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp.html">Temporary Security Credentials</a>.</p>
14
13
 
15
14
  ## Installing
16
-
17
15
  To install this package, simply type add or install @aws-sdk/client-sts
18
16
  using your favorite package manager:
19
-
20
17
  - `npm install @aws-sdk/client-sts`
21
18
  - `yarn add @aws-sdk/client-sts`
22
19
  - `pnpm add @aws-sdk/client-sts`
@@ -52,9 +49,7 @@ To send a request, you:
52
49
  // a client can be shared by different commands.
53
50
  const client = new STSClient({ region: "REGION" });
54
51
 
55
- const params = {
56
- /** input parameters */
57
- };
52
+ const params = { /** input parameters */ };
58
53
  const command = new GetCallerIdentityCommand(params);
59
54
  ```
60
55
 
@@ -213,7 +208,6 @@ AssumeRole
213
208
  </summary>
214
209
 
215
210
  [Command API Reference](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/client/sts/command/AssumeRoleCommand/) / [Input](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/AssumeRoleCommandInput/) / [Output](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/AssumeRoleCommandOutput/)
216
-
217
211
  </details>
218
212
  <details>
219
213
  <summary>
@@ -221,7 +215,6 @@ AssumeRoleWithSAML
221
215
  </summary>
222
216
 
223
217
  [Command API Reference](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/client/sts/command/AssumeRoleWithSAMLCommand/) / [Input](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/AssumeRoleWithSAMLCommandInput/) / [Output](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/AssumeRoleWithSAMLCommandOutput/)
224
-
225
218
  </details>
226
219
  <details>
227
220
  <summary>
@@ -229,7 +222,6 @@ AssumeRoleWithWebIdentity
229
222
  </summary>
230
223
 
231
224
  [Command API Reference](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/client/sts/command/AssumeRoleWithWebIdentityCommand/) / [Input](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/AssumeRoleWithWebIdentityCommandInput/) / [Output](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/AssumeRoleWithWebIdentityCommandOutput/)
232
-
233
225
  </details>
234
226
  <details>
235
227
  <summary>
@@ -237,7 +229,6 @@ AssumeRoot
237
229
  </summary>
238
230
 
239
231
  [Command API Reference](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/client/sts/command/AssumeRootCommand/) / [Input](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/AssumeRootCommandInput/) / [Output](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/AssumeRootCommandOutput/)
240
-
241
232
  </details>
242
233
  <details>
243
234
  <summary>
@@ -245,7 +236,6 @@ DecodeAuthorizationMessage
245
236
  </summary>
246
237
 
247
238
  [Command API Reference](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/client/sts/command/DecodeAuthorizationMessageCommand/) / [Input](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/DecodeAuthorizationMessageCommandInput/) / [Output](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/DecodeAuthorizationMessageCommandOutput/)
248
-
249
239
  </details>
250
240
  <details>
251
241
  <summary>
@@ -253,7 +243,6 @@ GetAccessKeyInfo
253
243
  </summary>
254
244
 
255
245
  [Command API Reference](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/client/sts/command/GetAccessKeyInfoCommand/) / [Input](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/GetAccessKeyInfoCommandInput/) / [Output](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/GetAccessKeyInfoCommandOutput/)
256
-
257
246
  </details>
258
247
  <details>
259
248
  <summary>
@@ -261,7 +250,6 @@ GetCallerIdentity
261
250
  </summary>
262
251
 
263
252
  [Command API Reference](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/client/sts/command/GetCallerIdentityCommand/) / [Input](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/GetCallerIdentityCommandInput/) / [Output](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/GetCallerIdentityCommandOutput/)
264
-
265
253
  </details>
266
254
  <details>
267
255
  <summary>
@@ -269,7 +257,6 @@ GetDelegatedAccessToken
269
257
  </summary>
270
258
 
271
259
  [Command API Reference](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/client/sts/command/GetDelegatedAccessTokenCommand/) / [Input](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/GetDelegatedAccessTokenCommandInput/) / [Output](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/GetDelegatedAccessTokenCommandOutput/)
272
-
273
260
  </details>
274
261
  <details>
275
262
  <summary>
@@ -277,7 +264,6 @@ GetFederationToken
277
264
  </summary>
278
265
 
279
266
  [Command API Reference](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/client/sts/command/GetFederationTokenCommand/) / [Input](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/GetFederationTokenCommandInput/) / [Output](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/GetFederationTokenCommandOutput/)
280
-
281
267
  </details>
282
268
  <details>
283
269
  <summary>
@@ -285,7 +271,6 @@ GetSessionToken
285
271
  </summary>
286
272
 
287
273
  [Command API Reference](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/client/sts/command/GetSessionTokenCommand/) / [Input](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/GetSessionTokenCommandInput/) / [Output](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/GetSessionTokenCommandOutput/)
288
-
289
274
  </details>
290
275
  <details>
291
276
  <summary>
@@ -293,5 +278,4 @@ GetWebIdentityToken
293
278
  </summary>
294
279
 
295
280
  [Command API Reference](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/client/sts/command/GetWebIdentityTokenCommand/) / [Input](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/GetWebIdentityTokenCommandInput/) / [Output](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/GetWebIdentityTokenCommandOutput/)
296
-
297
281
  </details>
@@ -7,10 +7,9 @@ const STSClient_1 = require("../STSClient");
7
7
  const defaultSTSHttpAuthSchemeParametersProvider = async (config, context, input) => {
8
8
  return {
9
9
  operation: (0, util_middleware_1.getSmithyContext)(context).operation,
10
- region: (await (0, util_middleware_1.normalizeProvider)(config.region)()) ||
11
- (() => {
12
- throw new Error("expected `region` to be configured for `aws.auth#sigv4`");
13
- })(),
10
+ region: await (0, util_middleware_1.normalizeProvider)(config.region)() || (() => {
11
+ throw new Error("expected `region` to be configured for `aws.auth#sigv4`");
12
+ })(),
14
13
  };
15
14
  };
16
15
  exports.defaultSTSHttpAuthSchemeParametersProvider = defaultSTSHttpAuthSchemeParametersProvider;
@@ -37,14 +36,18 @@ function createSmithyApiNoAuthHttpAuthOption(authParameters) {
37
36
  const defaultSTSHttpAuthSchemeProvider = (authParameters) => {
38
37
  const options = [];
39
38
  switch (authParameters.operation) {
40
- case "AssumeRoleWithSAML": {
41
- options.push(createSmithyApiNoAuthHttpAuthOption(authParameters));
42
- break;
43
- }
44
- case "AssumeRoleWithWebIdentity": {
45
- options.push(createSmithyApiNoAuthHttpAuthOption(authParameters));
46
- break;
47
- }
39
+ case "AssumeRoleWithSAML":
40
+ {
41
+ options.push(createSmithyApiNoAuthHttpAuthOption(authParameters));
42
+ break;
43
+ }
44
+ ;
45
+ case "AssumeRoleWithWebIdentity":
46
+ {
47
+ options.push(createSmithyApiNoAuthHttpAuthOption(authParameters));
48
+ break;
49
+ }
50
+ ;
48
51
  default: {
49
52
  options.push(createAwsAuthSigv4HttpAuthOption(authParameters));
50
53
  }
package/dist-cjs/index.js CHANGED
@@ -277,318 +277,261 @@ var clientTokenType = [0, n0, _cTT, 8, 0];
277
277
  var SAMLAssertionType = [0, n0, _SAMLAT, 8, 0];
278
278
  var tradeInTokenType = [0, n0, _tITT, 8, 0];
279
279
  var webIdentityTokenType = [0, n0, _wITT, 8, 0];
280
- var AssumedRoleUser$ = [3, n0, _ARU, 0, [_ARI, _A], [0, 0]];
281
- var AssumeRoleRequest$ = [
282
- 3,
283
- n0,
284
- _ARR,
280
+ var AssumedRoleUser$ = [3, n0, _ARU,
281
+ 0,
282
+ [_ARI, _A],
283
+ [0, 0]
284
+ ];
285
+ var AssumeRoleRequest$ = [3, n0, _ARR,
285
286
  0,
286
287
  [_RA, _RSN, _PA, _P, _DS, _T, _TTK, _EI, _SN, _TC, _SI, _PC],
287
- [0, 0, () => policyDescriptorListType, 0, 1, () => tagListType, 64 | 0, 0, 0, 0, 0, () => ProvidedContextsListType],
288
+ [0, 0, () => policyDescriptorListType, 0, 1, () => tagListType, 64 | 0, 0, 0, 0, 0, () => ProvidedContextsListType]
288
289
  ];
289
- var AssumeRoleResponse$ = [
290
- 3,
291
- n0,
292
- _ARRs,
290
+ var AssumeRoleResponse$ = [3, n0, _ARRs,
293
291
  0,
294
292
  [_C, _ARU, _PPS, _SI],
295
- [[() => Credentials$, 0], () => AssumedRoleUser$, 1, 0],
293
+ [[() => Credentials$, 0], () => AssumedRoleUser$, 1, 0]
296
294
  ];
297
- var AssumeRoleWithSAMLRequest$ = [
298
- 3,
299
- n0,
300
- _ARWSAMLR,
295
+ var AssumeRoleWithSAMLRequest$ = [3, n0, _ARWSAMLR,
301
296
  0,
302
297
  [_RA, _PAr, _SAMLA, _PA, _P, _DS],
303
- [0, 0, [() => SAMLAssertionType, 0], () => policyDescriptorListType, 0, 1],
298
+ [0, 0, [() => SAMLAssertionType, 0], () => policyDescriptorListType, 0, 1]
304
299
  ];
305
- var AssumeRoleWithSAMLResponse$ = [
306
- 3,
307
- n0,
308
- _ARWSAMLRs,
300
+ var AssumeRoleWithSAMLResponse$ = [3, n0, _ARWSAMLRs,
309
301
  0,
310
302
  [_C, _ARU, _PPS, _S, _ST, _I, _Au, _NQ, _SI],
311
- [[() => Credentials$, 0], () => AssumedRoleUser$, 1, 0, 0, 0, 0, 0, 0],
303
+ [[() => Credentials$, 0], () => AssumedRoleUser$, 1, 0, 0, 0, 0, 0, 0]
312
304
  ];
313
- var AssumeRoleWithWebIdentityRequest$ = [
314
- 3,
315
- n0,
316
- _ARWWIR,
305
+ var AssumeRoleWithWebIdentityRequest$ = [3, n0, _ARWWIR,
317
306
  0,
318
307
  [_RA, _RSN, _WIT, _PI, _PA, _P, _DS],
319
- [0, 0, [() => clientTokenType, 0], 0, () => policyDescriptorListType, 0, 1],
308
+ [0, 0, [() => clientTokenType, 0], 0, () => policyDescriptorListType, 0, 1]
320
309
  ];
321
- var AssumeRoleWithWebIdentityResponse$ = [
322
- 3,
323
- n0,
324
- _ARWWIRs,
310
+ var AssumeRoleWithWebIdentityResponse$ = [3, n0, _ARWWIRs,
325
311
  0,
326
312
  [_C, _SFWIT, _ARU, _PPS, _Pr, _Au, _SI],
327
- [[() => Credentials$, 0], 0, () => AssumedRoleUser$, 1, 0, 0, 0],
313
+ [[() => Credentials$, 0], 0, () => AssumedRoleUser$, 1, 0, 0, 0]
328
314
  ];
329
- var AssumeRootRequest$ = [
330
- 3,
331
- n0,
332
- _ARRss,
315
+ var AssumeRootRequest$ = [3, n0, _ARRss,
333
316
  0,
334
317
  [_TP, _TPA, _DS],
335
- [0, () => PolicyDescriptorType$, 1],
318
+ [0, () => PolicyDescriptorType$, 1]
319
+ ];
320
+ var AssumeRootResponse$ = [3, n0, _ARRssu,
321
+ 0,
322
+ [_C, _SI],
323
+ [[() => Credentials$, 0], 0]
336
324
  ];
337
- var AssumeRootResponse$ = [3, n0, _ARRssu, 0, [_C, _SI], [[() => Credentials$, 0], 0]];
338
- var Credentials$ = [
339
- 3,
340
- n0,
341
- _C,
325
+ var Credentials$ = [3, n0, _C,
342
326
  0,
343
327
  [_AKI, _SAK, _STe, _E],
344
- [0, [() => accessKeySecretType, 0], 0, 4],
345
- ];
346
- var DecodeAuthorizationMessageRequest$ = [3, n0, _DAMR, 0, [_EM], [0]];
347
- var DecodeAuthorizationMessageResponse$ = [3, n0, _DAMRe, 0, [_DM], [0]];
348
- var ExpiredTokenException$ = [
349
- -3,
350
- n0,
351
- _ETE,
328
+ [0, [() => accessKeySecretType, 0], 0, 4]
329
+ ];
330
+ var DecodeAuthorizationMessageRequest$ = [3, n0, _DAMR,
331
+ 0,
332
+ [_EM],
333
+ [0]
334
+ ];
335
+ var DecodeAuthorizationMessageResponse$ = [3, n0, _DAMRe,
336
+ 0,
337
+ [_DM],
338
+ [0]
339
+ ];
340
+ var ExpiredTokenException$ = [-3, n0, _ETE,
352
341
  { [_aQE]: [`ExpiredTokenException`, 400], [_e]: _c, [_hE]: 400 },
353
342
  [_m],
354
- [0],
343
+ [0]
355
344
  ];
356
345
  schema.TypeRegistry.for(n0).registerError(ExpiredTokenException$, ExpiredTokenException);
357
- var ExpiredTradeInTokenException$ = [
358
- -3,
359
- n0,
360
- _ETITE,
346
+ var ExpiredTradeInTokenException$ = [-3, n0, _ETITE,
361
347
  { [_aQE]: [`ExpiredTradeInTokenException`, 400], [_e]: _c, [_hE]: 400 },
362
348
  [_m],
363
- [0],
349
+ [0]
364
350
  ];
365
351
  schema.TypeRegistry.for(n0).registerError(ExpiredTradeInTokenException$, ExpiredTradeInTokenException);
366
- var FederatedUser$ = [3, n0, _FU, 0, [_FUI, _A], [0, 0]];
367
- var GetAccessKeyInfoRequest$ = [3, n0, _GAKIR, 0, [_AKI], [0]];
368
- var GetAccessKeyInfoResponse$ = [3, n0, _GAKIRe, 0, [_Ac], [0]];
369
- var GetCallerIdentityRequest$ = [3, n0, _GCIR, 0, [], []];
370
- var GetCallerIdentityResponse$ = [3, n0, _GCIRe, 0, [_UI, _Ac, _A], [0, 0, 0]];
371
- var GetDelegatedAccessTokenRequest$ = [
372
- 3,
373
- n0,
374
- _GDATR,
352
+ var FederatedUser$ = [3, n0, _FU,
353
+ 0,
354
+ [_FUI, _A],
355
+ [0, 0]
356
+ ];
357
+ var GetAccessKeyInfoRequest$ = [3, n0, _GAKIR,
358
+ 0,
359
+ [_AKI],
360
+ [0]
361
+ ];
362
+ var GetAccessKeyInfoResponse$ = [3, n0, _GAKIRe,
363
+ 0,
364
+ [_Ac],
365
+ [0]
366
+ ];
367
+ var GetCallerIdentityRequest$ = [3, n0, _GCIR,
368
+ 0,
369
+ [],
370
+ []
371
+ ];
372
+ var GetCallerIdentityResponse$ = [3, n0, _GCIRe,
373
+ 0,
374
+ [_UI, _Ac, _A],
375
+ [0, 0, 0]
376
+ ];
377
+ var GetDelegatedAccessTokenRequest$ = [3, n0, _GDATR,
375
378
  0,
376
379
  [_TIT],
377
- [[() => tradeInTokenType, 0]],
380
+ [[() => tradeInTokenType, 0]]
378
381
  ];
379
- var GetDelegatedAccessTokenResponse$ = [
380
- 3,
381
- n0,
382
- _GDATRe,
382
+ var GetDelegatedAccessTokenResponse$ = [3, n0, _GDATRe,
383
383
  0,
384
384
  [_C, _PPS, _AP],
385
- [[() => Credentials$, 0], 1, 0],
385
+ [[() => Credentials$, 0], 1, 0]
386
386
  ];
387
- var GetFederationTokenRequest$ = [
388
- 3,
389
- n0,
390
- _GFTR,
387
+ var GetFederationTokenRequest$ = [3, n0, _GFTR,
391
388
  0,
392
389
  [_N, _P, _PA, _DS, _T],
393
- [0, 0, () => policyDescriptorListType, 1, () => tagListType],
390
+ [0, 0, () => policyDescriptorListType, 1, () => tagListType]
394
391
  ];
395
- var GetFederationTokenResponse$ = [
396
- 3,
397
- n0,
398
- _GFTRe,
392
+ var GetFederationTokenResponse$ = [3, n0, _GFTRe,
399
393
  0,
400
394
  [_C, _FU, _PPS],
401
- [[() => Credentials$, 0], () => FederatedUser$, 1],
402
- ];
403
- var GetSessionTokenRequest$ = [3, n0, _GSTR, 0, [_DS, _SN, _TC], [1, 0, 0]];
404
- var GetSessionTokenResponse$ = [3, n0, _GSTRe, 0, [_C], [[() => Credentials$, 0]]];
405
- var GetWebIdentityTokenRequest$ = [
406
- 3,
407
- n0,
408
- _GWITR,
395
+ [[() => Credentials$, 0], () => FederatedUser$, 1]
396
+ ];
397
+ var GetSessionTokenRequest$ = [3, n0, _GSTR,
398
+ 0,
399
+ [_DS, _SN, _TC],
400
+ [1, 0, 0]
401
+ ];
402
+ var GetSessionTokenResponse$ = [3, n0, _GSTRe,
403
+ 0,
404
+ [_C],
405
+ [[() => Credentials$, 0]]
406
+ ];
407
+ var GetWebIdentityTokenRequest$ = [3, n0, _GWITR,
409
408
  0,
410
409
  [_Au, _DS, _SA, _T],
411
- [64 | 0, 1, 0, () => tagListType],
410
+ [64 | 0, 1, 0, () => tagListType]
412
411
  ];
413
- var GetWebIdentityTokenResponse$ = [
414
- 3,
415
- n0,
416
- _GWITRe,
412
+ var GetWebIdentityTokenResponse$ = [3, n0, _GWITRe,
417
413
  0,
418
414
  [_WIT, _E],
419
- [[() => webIdentityTokenType, 0], 4],
415
+ [[() => webIdentityTokenType, 0], 4]
420
416
  ];
421
- var IDPCommunicationErrorException$ = [
422
- -3,
423
- n0,
424
- _IDPCEE,
417
+ var IDPCommunicationErrorException$ = [-3, n0, _IDPCEE,
425
418
  { [_aQE]: [`IDPCommunicationError`, 400], [_e]: _c, [_hE]: 400 },
426
419
  [_m],
427
- [0],
420
+ [0]
428
421
  ];
429
422
  schema.TypeRegistry.for(n0).registerError(IDPCommunicationErrorException$, IDPCommunicationErrorException);
430
- var IDPRejectedClaimException$ = [
431
- -3,
432
- n0,
433
- _IDPRCE,
423
+ var IDPRejectedClaimException$ = [-3, n0, _IDPRCE,
434
424
  { [_aQE]: [`IDPRejectedClaim`, 403], [_e]: _c, [_hE]: 403 },
435
425
  [_m],
436
- [0],
426
+ [0]
437
427
  ];
438
428
  schema.TypeRegistry.for(n0).registerError(IDPRejectedClaimException$, IDPRejectedClaimException);
439
- var InvalidAuthorizationMessageException$ = [
440
- -3,
441
- n0,
442
- _IAME,
429
+ var InvalidAuthorizationMessageException$ = [-3, n0, _IAME,
443
430
  { [_aQE]: [`InvalidAuthorizationMessageException`, 400], [_e]: _c, [_hE]: 400 },
444
431
  [_m],
445
- [0],
432
+ [0]
446
433
  ];
447
434
  schema.TypeRegistry.for(n0).registerError(InvalidAuthorizationMessageException$, InvalidAuthorizationMessageException);
448
- var InvalidIdentityTokenException$ = [
449
- -3,
450
- n0,
451
- _IITE,
435
+ var InvalidIdentityTokenException$ = [-3, n0, _IITE,
452
436
  { [_aQE]: [`InvalidIdentityToken`, 400], [_e]: _c, [_hE]: 400 },
453
437
  [_m],
454
- [0],
438
+ [0]
455
439
  ];
456
440
  schema.TypeRegistry.for(n0).registerError(InvalidIdentityTokenException$, InvalidIdentityTokenException);
457
- var JWTPayloadSizeExceededException$ = [
458
- -3,
459
- n0,
460
- _JWTPSEE,
441
+ var JWTPayloadSizeExceededException$ = [-3, n0, _JWTPSEE,
461
442
  { [_aQE]: [`JWTPayloadSizeExceededException`, 400], [_e]: _c, [_hE]: 400 },
462
443
  [_m],
463
- [0],
444
+ [0]
464
445
  ];
465
446
  schema.TypeRegistry.for(n0).registerError(JWTPayloadSizeExceededException$, JWTPayloadSizeExceededException);
466
- var MalformedPolicyDocumentException$ = [
467
- -3,
468
- n0,
469
- _MPDE,
447
+ var MalformedPolicyDocumentException$ = [-3, n0, _MPDE,
470
448
  { [_aQE]: [`MalformedPolicyDocument`, 400], [_e]: _c, [_hE]: 400 },
471
449
  [_m],
472
- [0],
450
+ [0]
473
451
  ];
474
452
  schema.TypeRegistry.for(n0).registerError(MalformedPolicyDocumentException$, MalformedPolicyDocumentException);
475
- var OutboundWebIdentityFederationDisabledException$ = [
476
- -3,
477
- n0,
478
- _OWIFDE,
453
+ var OutboundWebIdentityFederationDisabledException$ = [-3, n0, _OWIFDE,
479
454
  { [_aQE]: [`OutboundWebIdentityFederationDisabledException`, 403], [_e]: _c, [_hE]: 403 },
480
455
  [_m],
481
- [0],
456
+ [0]
482
457
  ];
483
458
  schema.TypeRegistry.for(n0).registerError(OutboundWebIdentityFederationDisabledException$, OutboundWebIdentityFederationDisabledException);
484
- var PackedPolicyTooLargeException$ = [
485
- -3,
486
- n0,
487
- _PPTLE,
459
+ var PackedPolicyTooLargeException$ = [-3, n0, _PPTLE,
488
460
  { [_aQE]: [`PackedPolicyTooLarge`, 400], [_e]: _c, [_hE]: 400 },
489
461
  [_m],
490
- [0],
462
+ [0]
491
463
  ];
492
464
  schema.TypeRegistry.for(n0).registerError(PackedPolicyTooLargeException$, PackedPolicyTooLargeException);
493
- var PolicyDescriptorType$ = [3, n0, _PDT, 0, [_a], [0]];
494
- var ProvidedContext$ = [3, n0, _PCr, 0, [_PAro, _CA], [0, 0]];
495
- var RegionDisabledException$ = [
496
- -3,
497
- n0,
498
- _RDE,
465
+ var PolicyDescriptorType$ = [3, n0, _PDT,
466
+ 0,
467
+ [_a],
468
+ [0]
469
+ ];
470
+ var ProvidedContext$ = [3, n0, _PCr,
471
+ 0,
472
+ [_PAro, _CA],
473
+ [0, 0]
474
+ ];
475
+ var RegionDisabledException$ = [-3, n0, _RDE,
499
476
  { [_aQE]: [`RegionDisabledException`, 403], [_e]: _c, [_hE]: 403 },
500
477
  [_m],
501
- [0],
478
+ [0]
502
479
  ];
503
480
  schema.TypeRegistry.for(n0).registerError(RegionDisabledException$, RegionDisabledException);
504
- var SessionDurationEscalationException$ = [
505
- -3,
506
- n0,
507
- _SDEE,
481
+ var SessionDurationEscalationException$ = [-3, n0, _SDEE,
508
482
  { [_aQE]: [`SessionDurationEscalationException`, 403], [_e]: _c, [_hE]: 403 },
509
483
  [_m],
510
- [0],
484
+ [0]
511
485
  ];
512
486
  schema.TypeRegistry.for(n0).registerError(SessionDurationEscalationException$, SessionDurationEscalationException);
513
- var Tag$ = [3, n0, _Ta, 0, [_K, _V], [0, 0]];
487
+ var Tag$ = [3, n0, _Ta,
488
+ 0,
489
+ [_K, _V],
490
+ [0, 0]
491
+ ];
514
492
  var STSServiceException$ = [-3, _s, "STSServiceException", 0, [], []];
515
493
  schema.TypeRegistry.for(_s).registerError(STSServiceException$, STSServiceException);
516
- var policyDescriptorListType = [1, n0, _pDLT, 0, () => PolicyDescriptorType$];
517
- var ProvidedContextsListType = [1, n0, _PCLT, 0, () => ProvidedContext$];
518
- var tagListType = [1, n0, _tLT, 0, () => Tag$];
519
- var AssumeRole$ = [9, n0, _AR, 0, () => AssumeRoleRequest$, () => AssumeRoleResponse$];
520
- var AssumeRoleWithSAML$ = [
521
- 9,
522
- n0,
523
- _ARWSAML,
524
- 0,
525
- () => AssumeRoleWithSAMLRequest$,
526
- () => AssumeRoleWithSAMLResponse$,
494
+ var policyDescriptorListType = [1, n0, _pDLT,
495
+ 0, () => PolicyDescriptorType$
527
496
  ];
528
- var AssumeRoleWithWebIdentity$ = [
529
- 9,
530
- n0,
531
- _ARWWI,
532
- 0,
533
- () => AssumeRoleWithWebIdentityRequest$,
534
- () => AssumeRoleWithWebIdentityResponse$,
535
- ];
536
- var AssumeRoot$ = [9, n0, _ARs, 0, () => AssumeRootRequest$, () => AssumeRootResponse$];
537
- var DecodeAuthorizationMessage$ = [
538
- 9,
539
- n0,
540
- _DAM,
541
- 0,
542
- () => DecodeAuthorizationMessageRequest$,
543
- () => DecodeAuthorizationMessageResponse$,
497
+ var ProvidedContextsListType = [1, n0, _PCLT,
498
+ 0, () => ProvidedContext$
544
499
  ];
545
- var GetAccessKeyInfo$ = [
546
- 9,
547
- n0,
548
- _GAKI,
549
- 0,
550
- () => GetAccessKeyInfoRequest$,
551
- () => GetAccessKeyInfoResponse$,
500
+ var tagListType = [1, n0, _tLT,
501
+ 0, () => Tag$
552
502
  ];
553
- var GetCallerIdentity$ = [
554
- 9,
555
- n0,
556
- _GCI,
557
- 0,
558
- () => GetCallerIdentityRequest$,
559
- () => GetCallerIdentityResponse$,
503
+ var AssumeRole$ = [9, n0, _AR,
504
+ 0, () => AssumeRoleRequest$, () => AssumeRoleResponse$
560
505
  ];
561
- var GetDelegatedAccessToken$ = [
562
- 9,
563
- n0,
564
- _GDAT,
565
- 0,
566
- () => GetDelegatedAccessTokenRequest$,
567
- () => GetDelegatedAccessTokenResponse$,
506
+ var AssumeRoleWithSAML$ = [9, n0, _ARWSAML,
507
+ 0, () => AssumeRoleWithSAMLRequest$, () => AssumeRoleWithSAMLResponse$
568
508
  ];
569
- var GetFederationToken$ = [
570
- 9,
571
- n0,
572
- _GFT,
573
- 0,
574
- () => GetFederationTokenRequest$,
575
- () => GetFederationTokenResponse$,
509
+ var AssumeRoleWithWebIdentity$ = [9, n0, _ARWWI,
510
+ 0, () => AssumeRoleWithWebIdentityRequest$, () => AssumeRoleWithWebIdentityResponse$
576
511
  ];
577
- var GetSessionToken$ = [
578
- 9,
579
- n0,
580
- _GST,
581
- 0,
582
- () => GetSessionTokenRequest$,
583
- () => GetSessionTokenResponse$,
512
+ var AssumeRoot$ = [9, n0, _ARs,
513
+ 0, () => AssumeRootRequest$, () => AssumeRootResponse$
584
514
  ];
585
- var GetWebIdentityToken$ = [
586
- 9,
587
- n0,
588
- _GWIT,
589
- 0,
590
- () => GetWebIdentityTokenRequest$,
591
- () => GetWebIdentityTokenResponse$,
515
+ var DecodeAuthorizationMessage$ = [9, n0, _DAM,
516
+ 0, () => DecodeAuthorizationMessageRequest$, () => DecodeAuthorizationMessageResponse$
517
+ ];
518
+ var GetAccessKeyInfo$ = [9, n0, _GAKI,
519
+ 0, () => GetAccessKeyInfoRequest$, () => GetAccessKeyInfoResponse$
520
+ ];
521
+ var GetCallerIdentity$ = [9, n0, _GCI,
522
+ 0, () => GetCallerIdentityRequest$, () => GetCallerIdentityResponse$
523
+ ];
524
+ var GetDelegatedAccessToken$ = [9, n0, _GDAT,
525
+ 0, () => GetDelegatedAccessTokenRequest$, () => GetDelegatedAccessTokenResponse$
526
+ ];
527
+ var GetFederationToken$ = [9, n0, _GFT,
528
+ 0, () => GetFederationTokenRequest$, () => GetFederationTokenResponse$
529
+ ];
530
+ var GetSessionToken$ = [9, n0, _GST,
531
+ 0, () => GetSessionTokenRequest$, () => GetSessionTokenResponse$
532
+ ];
533
+ var GetWebIdentityToken$ = [9, n0, _GWIT,
534
+ 0, () => GetWebIdentityTokenRequest$, () => GetWebIdentityTokenResponse$
592
535
  ];
593
536
 
594
537
  class AssumeRoleCommand extends smithyClient.Command
@@ -24,8 +24,7 @@ const getRuntimeConfig = (config) => {
24
24
  defaultsMode,
25
25
  bodyLengthChecker: config?.bodyLengthChecker ?? util_body_length_browser_1.calculateBodyLength,
26
26
  credentialDefaultProvider: config?.credentialDefaultProvider ?? ((_) => () => Promise.reject(new Error("Credential is missing"))),
27
- defaultUserAgentProvider: config?.defaultUserAgentProvider ??
28
- (0, util_user_agent_browser_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
27
+ defaultUserAgentProvider: config?.defaultUserAgentProvider ?? (0, util_user_agent_browser_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
29
28
  maxAttempts: config?.maxAttempts ?? util_retry_1.DEFAULT_MAX_ATTEMPTS,
30
29
  region: config?.region ?? (0, invalid_dependency_1.invalidProvider)("Region is missing"),
31
30
  requestHandler: fetch_http_handler_1.FetchHttpHandler.create(config?.requestHandler ?? defaultConfigProvider),
@@ -35,13 +35,11 @@ const getRuntimeConfig = (config) => {
35
35
  authSchemePreference: config?.authSchemePreference ?? (0, node_config_provider_1.loadConfig)(core_1.NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, loaderConfig),
36
36
  bodyLengthChecker: config?.bodyLengthChecker ?? util_body_length_node_1.calculateBodyLength,
37
37
  credentialDefaultProvider: config?.credentialDefaultProvider ?? credential_provider_node_1.defaultProvider,
38
- defaultUserAgentProvider: config?.defaultUserAgentProvider ??
39
- (0, util_user_agent_node_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
38
+ defaultUserAgentProvider: config?.defaultUserAgentProvider ?? (0, util_user_agent_node_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
40
39
  httpAuthSchemes: config?.httpAuthSchemes ?? [
41
40
  {
42
41
  schemeId: "aws.auth#sigv4",
43
- identityProvider: (ipc) => ipc.getIdentityProvider("aws.auth#sigv4") ||
44
- (async (idProps) => await (0, credential_provider_node_1.defaultProvider)(idProps?.__config || {})()),
42
+ identityProvider: (ipc) => ipc.getIdentityProvider("aws.auth#sigv4") || (async (idProps) => await (0, credential_provider_node_1.defaultProvider)(idProps?.__config || {})()),
45
43
  signer: new core_1.AwsSdkSigV4Signer(),
46
44
  },
47
45
  {
@@ -51,8 +49,7 @@ const getRuntimeConfig = (config) => {
51
49
  },
52
50
  ],
53
51
  maxAttempts: config?.maxAttempts ?? (0, node_config_provider_1.loadConfig)(middleware_retry_1.NODE_MAX_ATTEMPT_CONFIG_OPTIONS, config),
54
- region: config?.region ??
55
- (0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_REGION_CONFIG_OPTIONS, { ...config_resolver_1.NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
52
+ region: config?.region ?? (0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_REGION_CONFIG_OPTIONS, { ...config_resolver_1.NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
56
53
  requestHandler: node_http_handler_1.NodeHttpHandler.create(config?.requestHandler ?? defaultConfigProvider),
57
54
  retryMode: config?.retryMode ??
58
55
  (0, node_config_provider_1.loadConfig)({
@@ -4,10 +4,9 @@ import { STSClient } from "../STSClient";
4
4
  export const defaultSTSHttpAuthSchemeParametersProvider = async (config, context, input) => {
5
5
  return {
6
6
  operation: getSmithyContext(context).operation,
7
- region: (await normalizeProvider(config.region)()) ||
8
- (() => {
9
- throw new Error("expected `region` to be configured for `aws.auth#sigv4`");
10
- })(),
7
+ region: await normalizeProvider(config.region)() || (() => {
8
+ throw new Error("expected `region` to be configured for `aws.auth#sigv4`");
9
+ })(),
11
10
  };
12
11
  };
13
12
  function createAwsAuthSigv4HttpAuthOption(authParameters) {
@@ -33,14 +32,18 @@ function createSmithyApiNoAuthHttpAuthOption(authParameters) {
33
32
  export const defaultSTSHttpAuthSchemeProvider = (authParameters) => {
34
33
  const options = [];
35
34
  switch (authParameters.operation) {
36
- case "AssumeRoleWithSAML": {
37
- options.push(createSmithyApiNoAuthHttpAuthOption(authParameters));
38
- break;
39
- }
40
- case "AssumeRoleWithWebIdentity": {
41
- options.push(createSmithyApiNoAuthHttpAuthOption(authParameters));
42
- break;
43
- }
35
+ case "AssumeRoleWithSAML":
36
+ {
37
+ options.push(createSmithyApiNoAuthHttpAuthOption(authParameters));
38
+ break;
39
+ }
40
+ ;
41
+ case "AssumeRoleWithWebIdentity":
42
+ {
43
+ options.push(createSmithyApiNoAuthHttpAuthOption(authParameters));
44
+ break;
45
+ }
46
+ ;
44
47
  default: {
45
48
  options.push(createAwsAuthSigv4HttpAuthOption(authParameters));
46
49
  }
@@ -20,8 +20,7 @@ export const getRuntimeConfig = (config) => {
20
20
  defaultsMode,
21
21
  bodyLengthChecker: config?.bodyLengthChecker ?? calculateBodyLength,
22
22
  credentialDefaultProvider: config?.credentialDefaultProvider ?? ((_) => () => Promise.reject(new Error("Credential is missing"))),
23
- defaultUserAgentProvider: config?.defaultUserAgentProvider ??
24
- createDefaultUserAgentProvider({ serviceId: clientSharedValues.serviceId, clientVersion: packageInfo.version }),
23
+ defaultUserAgentProvider: config?.defaultUserAgentProvider ?? createDefaultUserAgentProvider({ serviceId: clientSharedValues.serviceId, clientVersion: packageInfo.version }),
25
24
  maxAttempts: config?.maxAttempts ?? DEFAULT_MAX_ATTEMPTS,
26
25
  region: config?.region ?? invalidProvider("Region is missing"),
27
26
  requestHandler: RequestHandler.create(config?.requestHandler ?? defaultConfigProvider),
@@ -1,7 +1,7 @@
1
1
  import packageInfo from "../package.json";
2
- import { AwsSdkSigV4Signer, NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, emitWarningIfUnsupportedVersion as awsCheckVersion, } from "@aws-sdk/core";
2
+ import { AwsSdkSigV4Signer, emitWarningIfUnsupportedVersion as awsCheckVersion, NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, } from "@aws-sdk/core";
3
3
  import { defaultProvider as credentialDefaultProvider } from "@aws-sdk/credential-provider-node";
4
- import { NODE_APP_ID_CONFIG_OPTIONS, createDefaultUserAgentProvider } from "@aws-sdk/util-user-agent-node";
4
+ import { createDefaultUserAgentProvider, NODE_APP_ID_CONFIG_OPTIONS } from "@aws-sdk/util-user-agent-node";
5
5
  import { NODE_REGION_CONFIG_FILE_OPTIONS, NODE_REGION_CONFIG_OPTIONS, NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS, NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS, } from "@smithy/config-resolver";
6
6
  import { NoAuthSigner } from "@smithy/core";
7
7
  import { Hash } from "@smithy/hash-node";
@@ -31,13 +31,11 @@ export const getRuntimeConfig = (config) => {
31
31
  authSchemePreference: config?.authSchemePreference ?? loadNodeConfig(NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, loaderConfig),
32
32
  bodyLengthChecker: config?.bodyLengthChecker ?? calculateBodyLength,
33
33
  credentialDefaultProvider: config?.credentialDefaultProvider ?? credentialDefaultProvider,
34
- defaultUserAgentProvider: config?.defaultUserAgentProvider ??
35
- createDefaultUserAgentProvider({ serviceId: clientSharedValues.serviceId, clientVersion: packageInfo.version }),
34
+ defaultUserAgentProvider: config?.defaultUserAgentProvider ?? createDefaultUserAgentProvider({ serviceId: clientSharedValues.serviceId, clientVersion: packageInfo.version }),
36
35
  httpAuthSchemes: config?.httpAuthSchemes ?? [
37
36
  {
38
37
  schemeId: "aws.auth#sigv4",
39
- identityProvider: (ipc) => ipc.getIdentityProvider("aws.auth#sigv4") ||
40
- (async (idProps) => await credentialDefaultProvider(idProps?.__config || {})()),
38
+ identityProvider: (ipc) => ipc.getIdentityProvider("aws.auth#sigv4") || (async (idProps) => await credentialDefaultProvider(idProps?.__config || {})()),
41
39
  signer: new AwsSdkSigV4Signer(),
42
40
  },
43
41
  {
@@ -47,8 +45,7 @@ export const getRuntimeConfig = (config) => {
47
45
  },
48
46
  ],
49
47
  maxAttempts: config?.maxAttempts ?? loadNodeConfig(NODE_MAX_ATTEMPT_CONFIG_OPTIONS, config),
50
- region: config?.region ??
51
- loadNodeConfig(NODE_REGION_CONFIG_OPTIONS, { ...NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
48
+ region: config?.region ?? loadNodeConfig(NODE_REGION_CONFIG_OPTIONS, { ...NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
52
49
  requestHandler: RequestHandler.create(config?.requestHandler ?? defaultConfigProvider),
53
50
  retryMode: config?.retryMode ??
54
51
  loadNodeConfig({
@@ -118,318 +118,261 @@ var clientTokenType = [0, n0, _cTT, 8, 0];
118
118
  var SAMLAssertionType = [0, n0, _SAMLAT, 8, 0];
119
119
  var tradeInTokenType = [0, n0, _tITT, 8, 0];
120
120
  var webIdentityTokenType = [0, n0, _wITT, 8, 0];
121
- export var AssumedRoleUser$ = [3, n0, _ARU, 0, [_ARI, _A], [0, 0]];
122
- export var AssumeRoleRequest$ = [
123
- 3,
124
- n0,
125
- _ARR,
121
+ export var AssumedRoleUser$ = [3, n0, _ARU,
122
+ 0,
123
+ [_ARI, _A],
124
+ [0, 0]
125
+ ];
126
+ export var AssumeRoleRequest$ = [3, n0, _ARR,
126
127
  0,
127
128
  [_RA, _RSN, _PA, _P, _DS, _T, _TTK, _EI, _SN, _TC, _SI, _PC],
128
- [0, 0, () => policyDescriptorListType, 0, 1, () => tagListType, 64 | 0, 0, 0, 0, 0, () => ProvidedContextsListType],
129
+ [0, 0, () => policyDescriptorListType, 0, 1, () => tagListType, 64 | 0, 0, 0, 0, 0, () => ProvidedContextsListType]
129
130
  ];
130
- export var AssumeRoleResponse$ = [
131
- 3,
132
- n0,
133
- _ARRs,
131
+ export var AssumeRoleResponse$ = [3, n0, _ARRs,
134
132
  0,
135
133
  [_C, _ARU, _PPS, _SI],
136
- [[() => Credentials$, 0], () => AssumedRoleUser$, 1, 0],
134
+ [[() => Credentials$, 0], () => AssumedRoleUser$, 1, 0]
137
135
  ];
138
- export var AssumeRoleWithSAMLRequest$ = [
139
- 3,
140
- n0,
141
- _ARWSAMLR,
136
+ export var AssumeRoleWithSAMLRequest$ = [3, n0, _ARWSAMLR,
142
137
  0,
143
138
  [_RA, _PAr, _SAMLA, _PA, _P, _DS],
144
- [0, 0, [() => SAMLAssertionType, 0], () => policyDescriptorListType, 0, 1],
139
+ [0, 0, [() => SAMLAssertionType, 0], () => policyDescriptorListType, 0, 1]
145
140
  ];
146
- export var AssumeRoleWithSAMLResponse$ = [
147
- 3,
148
- n0,
149
- _ARWSAMLRs,
141
+ export var AssumeRoleWithSAMLResponse$ = [3, n0, _ARWSAMLRs,
150
142
  0,
151
143
  [_C, _ARU, _PPS, _S, _ST, _I, _Au, _NQ, _SI],
152
- [[() => Credentials$, 0], () => AssumedRoleUser$, 1, 0, 0, 0, 0, 0, 0],
144
+ [[() => Credentials$, 0], () => AssumedRoleUser$, 1, 0, 0, 0, 0, 0, 0]
153
145
  ];
154
- export var AssumeRoleWithWebIdentityRequest$ = [
155
- 3,
156
- n0,
157
- _ARWWIR,
146
+ export var AssumeRoleWithWebIdentityRequest$ = [3, n0, _ARWWIR,
158
147
  0,
159
148
  [_RA, _RSN, _WIT, _PI, _PA, _P, _DS],
160
- [0, 0, [() => clientTokenType, 0], 0, () => policyDescriptorListType, 0, 1],
149
+ [0, 0, [() => clientTokenType, 0], 0, () => policyDescriptorListType, 0, 1]
161
150
  ];
162
- export var AssumeRoleWithWebIdentityResponse$ = [
163
- 3,
164
- n0,
165
- _ARWWIRs,
151
+ export var AssumeRoleWithWebIdentityResponse$ = [3, n0, _ARWWIRs,
166
152
  0,
167
153
  [_C, _SFWIT, _ARU, _PPS, _Pr, _Au, _SI],
168
- [[() => Credentials$, 0], 0, () => AssumedRoleUser$, 1, 0, 0, 0],
154
+ [[() => Credentials$, 0], 0, () => AssumedRoleUser$, 1, 0, 0, 0]
169
155
  ];
170
- export var AssumeRootRequest$ = [
171
- 3,
172
- n0,
173
- _ARRss,
156
+ export var AssumeRootRequest$ = [3, n0, _ARRss,
174
157
  0,
175
158
  [_TP, _TPA, _DS],
176
- [0, () => PolicyDescriptorType$, 1],
159
+ [0, () => PolicyDescriptorType$, 1]
160
+ ];
161
+ export var AssumeRootResponse$ = [3, n0, _ARRssu,
162
+ 0,
163
+ [_C, _SI],
164
+ [[() => Credentials$, 0], 0]
177
165
  ];
178
- export var AssumeRootResponse$ = [3, n0, _ARRssu, 0, [_C, _SI], [[() => Credentials$, 0], 0]];
179
- export var Credentials$ = [
180
- 3,
181
- n0,
182
- _C,
166
+ export var Credentials$ = [3, n0, _C,
183
167
  0,
184
168
  [_AKI, _SAK, _STe, _E],
185
- [0, [() => accessKeySecretType, 0], 0, 4],
186
- ];
187
- export var DecodeAuthorizationMessageRequest$ = [3, n0, _DAMR, 0, [_EM], [0]];
188
- export var DecodeAuthorizationMessageResponse$ = [3, n0, _DAMRe, 0, [_DM], [0]];
189
- export var ExpiredTokenException$ = [
190
- -3,
191
- n0,
192
- _ETE,
169
+ [0, [() => accessKeySecretType, 0], 0, 4]
170
+ ];
171
+ export var DecodeAuthorizationMessageRequest$ = [3, n0, _DAMR,
172
+ 0,
173
+ [_EM],
174
+ [0]
175
+ ];
176
+ export var DecodeAuthorizationMessageResponse$ = [3, n0, _DAMRe,
177
+ 0,
178
+ [_DM],
179
+ [0]
180
+ ];
181
+ export var ExpiredTokenException$ = [-3, n0, _ETE,
193
182
  { [_aQE]: [`ExpiredTokenException`, 400], [_e]: _c, [_hE]: 400 },
194
183
  [_m],
195
- [0],
184
+ [0]
196
185
  ];
197
186
  TypeRegistry.for(n0).registerError(ExpiredTokenException$, ExpiredTokenException);
198
- export var ExpiredTradeInTokenException$ = [
199
- -3,
200
- n0,
201
- _ETITE,
187
+ export var ExpiredTradeInTokenException$ = [-3, n0, _ETITE,
202
188
  { [_aQE]: [`ExpiredTradeInTokenException`, 400], [_e]: _c, [_hE]: 400 },
203
189
  [_m],
204
- [0],
190
+ [0]
205
191
  ];
206
192
  TypeRegistry.for(n0).registerError(ExpiredTradeInTokenException$, ExpiredTradeInTokenException);
207
- export var FederatedUser$ = [3, n0, _FU, 0, [_FUI, _A], [0, 0]];
208
- export var GetAccessKeyInfoRequest$ = [3, n0, _GAKIR, 0, [_AKI], [0]];
209
- export var GetAccessKeyInfoResponse$ = [3, n0, _GAKIRe, 0, [_Ac], [0]];
210
- export var GetCallerIdentityRequest$ = [3, n0, _GCIR, 0, [], []];
211
- export var GetCallerIdentityResponse$ = [3, n0, _GCIRe, 0, [_UI, _Ac, _A], [0, 0, 0]];
212
- export var GetDelegatedAccessTokenRequest$ = [
213
- 3,
214
- n0,
215
- _GDATR,
193
+ export var FederatedUser$ = [3, n0, _FU,
194
+ 0,
195
+ [_FUI, _A],
196
+ [0, 0]
197
+ ];
198
+ export var GetAccessKeyInfoRequest$ = [3, n0, _GAKIR,
199
+ 0,
200
+ [_AKI],
201
+ [0]
202
+ ];
203
+ export var GetAccessKeyInfoResponse$ = [3, n0, _GAKIRe,
204
+ 0,
205
+ [_Ac],
206
+ [0]
207
+ ];
208
+ export var GetCallerIdentityRequest$ = [3, n0, _GCIR,
209
+ 0,
210
+ [],
211
+ []
212
+ ];
213
+ export var GetCallerIdentityResponse$ = [3, n0, _GCIRe,
214
+ 0,
215
+ [_UI, _Ac, _A],
216
+ [0, 0, 0]
217
+ ];
218
+ export var GetDelegatedAccessTokenRequest$ = [3, n0, _GDATR,
216
219
  0,
217
220
  [_TIT],
218
- [[() => tradeInTokenType, 0]],
221
+ [[() => tradeInTokenType, 0]]
219
222
  ];
220
- export var GetDelegatedAccessTokenResponse$ = [
221
- 3,
222
- n0,
223
- _GDATRe,
223
+ export var GetDelegatedAccessTokenResponse$ = [3, n0, _GDATRe,
224
224
  0,
225
225
  [_C, _PPS, _AP],
226
- [[() => Credentials$, 0], 1, 0],
226
+ [[() => Credentials$, 0], 1, 0]
227
227
  ];
228
- export var GetFederationTokenRequest$ = [
229
- 3,
230
- n0,
231
- _GFTR,
228
+ export var GetFederationTokenRequest$ = [3, n0, _GFTR,
232
229
  0,
233
230
  [_N, _P, _PA, _DS, _T],
234
- [0, 0, () => policyDescriptorListType, 1, () => tagListType],
231
+ [0, 0, () => policyDescriptorListType, 1, () => tagListType]
235
232
  ];
236
- export var GetFederationTokenResponse$ = [
237
- 3,
238
- n0,
239
- _GFTRe,
233
+ export var GetFederationTokenResponse$ = [3, n0, _GFTRe,
240
234
  0,
241
235
  [_C, _FU, _PPS],
242
- [[() => Credentials$, 0], () => FederatedUser$, 1],
243
- ];
244
- export var GetSessionTokenRequest$ = [3, n0, _GSTR, 0, [_DS, _SN, _TC], [1, 0, 0]];
245
- export var GetSessionTokenResponse$ = [3, n0, _GSTRe, 0, [_C], [[() => Credentials$, 0]]];
246
- export var GetWebIdentityTokenRequest$ = [
247
- 3,
248
- n0,
249
- _GWITR,
236
+ [[() => Credentials$, 0], () => FederatedUser$, 1]
237
+ ];
238
+ export var GetSessionTokenRequest$ = [3, n0, _GSTR,
239
+ 0,
240
+ [_DS, _SN, _TC],
241
+ [1, 0, 0]
242
+ ];
243
+ export var GetSessionTokenResponse$ = [3, n0, _GSTRe,
244
+ 0,
245
+ [_C],
246
+ [[() => Credentials$, 0]]
247
+ ];
248
+ export var GetWebIdentityTokenRequest$ = [3, n0, _GWITR,
250
249
  0,
251
250
  [_Au, _DS, _SA, _T],
252
- [64 | 0, 1, 0, () => tagListType],
251
+ [64 | 0, 1, 0, () => tagListType]
253
252
  ];
254
- export var GetWebIdentityTokenResponse$ = [
255
- 3,
256
- n0,
257
- _GWITRe,
253
+ export var GetWebIdentityTokenResponse$ = [3, n0, _GWITRe,
258
254
  0,
259
255
  [_WIT, _E],
260
- [[() => webIdentityTokenType, 0], 4],
256
+ [[() => webIdentityTokenType, 0], 4]
261
257
  ];
262
- export var IDPCommunicationErrorException$ = [
263
- -3,
264
- n0,
265
- _IDPCEE,
258
+ export var IDPCommunicationErrorException$ = [-3, n0, _IDPCEE,
266
259
  { [_aQE]: [`IDPCommunicationError`, 400], [_e]: _c, [_hE]: 400 },
267
260
  [_m],
268
- [0],
261
+ [0]
269
262
  ];
270
263
  TypeRegistry.for(n0).registerError(IDPCommunicationErrorException$, IDPCommunicationErrorException);
271
- export var IDPRejectedClaimException$ = [
272
- -3,
273
- n0,
274
- _IDPRCE,
264
+ export var IDPRejectedClaimException$ = [-3, n0, _IDPRCE,
275
265
  { [_aQE]: [`IDPRejectedClaim`, 403], [_e]: _c, [_hE]: 403 },
276
266
  [_m],
277
- [0],
267
+ [0]
278
268
  ];
279
269
  TypeRegistry.for(n0).registerError(IDPRejectedClaimException$, IDPRejectedClaimException);
280
- export var InvalidAuthorizationMessageException$ = [
281
- -3,
282
- n0,
283
- _IAME,
270
+ export var InvalidAuthorizationMessageException$ = [-3, n0, _IAME,
284
271
  { [_aQE]: [`InvalidAuthorizationMessageException`, 400], [_e]: _c, [_hE]: 400 },
285
272
  [_m],
286
- [0],
273
+ [0]
287
274
  ];
288
275
  TypeRegistry.for(n0).registerError(InvalidAuthorizationMessageException$, InvalidAuthorizationMessageException);
289
- export var InvalidIdentityTokenException$ = [
290
- -3,
291
- n0,
292
- _IITE,
276
+ export var InvalidIdentityTokenException$ = [-3, n0, _IITE,
293
277
  { [_aQE]: [`InvalidIdentityToken`, 400], [_e]: _c, [_hE]: 400 },
294
278
  [_m],
295
- [0],
279
+ [0]
296
280
  ];
297
281
  TypeRegistry.for(n0).registerError(InvalidIdentityTokenException$, InvalidIdentityTokenException);
298
- export var JWTPayloadSizeExceededException$ = [
299
- -3,
300
- n0,
301
- _JWTPSEE,
282
+ export var JWTPayloadSizeExceededException$ = [-3, n0, _JWTPSEE,
302
283
  { [_aQE]: [`JWTPayloadSizeExceededException`, 400], [_e]: _c, [_hE]: 400 },
303
284
  [_m],
304
- [0],
285
+ [0]
305
286
  ];
306
287
  TypeRegistry.for(n0).registerError(JWTPayloadSizeExceededException$, JWTPayloadSizeExceededException);
307
- export var MalformedPolicyDocumentException$ = [
308
- -3,
309
- n0,
310
- _MPDE,
288
+ export var MalformedPolicyDocumentException$ = [-3, n0, _MPDE,
311
289
  { [_aQE]: [`MalformedPolicyDocument`, 400], [_e]: _c, [_hE]: 400 },
312
290
  [_m],
313
- [0],
291
+ [0]
314
292
  ];
315
293
  TypeRegistry.for(n0).registerError(MalformedPolicyDocumentException$, MalformedPolicyDocumentException);
316
- export var OutboundWebIdentityFederationDisabledException$ = [
317
- -3,
318
- n0,
319
- _OWIFDE,
294
+ export var OutboundWebIdentityFederationDisabledException$ = [-3, n0, _OWIFDE,
320
295
  { [_aQE]: [`OutboundWebIdentityFederationDisabledException`, 403], [_e]: _c, [_hE]: 403 },
321
296
  [_m],
322
- [0],
297
+ [0]
323
298
  ];
324
299
  TypeRegistry.for(n0).registerError(OutboundWebIdentityFederationDisabledException$, OutboundWebIdentityFederationDisabledException);
325
- export var PackedPolicyTooLargeException$ = [
326
- -3,
327
- n0,
328
- _PPTLE,
300
+ export var PackedPolicyTooLargeException$ = [-3, n0, _PPTLE,
329
301
  { [_aQE]: [`PackedPolicyTooLarge`, 400], [_e]: _c, [_hE]: 400 },
330
302
  [_m],
331
- [0],
303
+ [0]
332
304
  ];
333
305
  TypeRegistry.for(n0).registerError(PackedPolicyTooLargeException$, PackedPolicyTooLargeException);
334
- export var PolicyDescriptorType$ = [3, n0, _PDT, 0, [_a], [0]];
335
- export var ProvidedContext$ = [3, n0, _PCr, 0, [_PAro, _CA], [0, 0]];
336
- export var RegionDisabledException$ = [
337
- -3,
338
- n0,
339
- _RDE,
306
+ export var PolicyDescriptorType$ = [3, n0, _PDT,
307
+ 0,
308
+ [_a],
309
+ [0]
310
+ ];
311
+ export var ProvidedContext$ = [3, n0, _PCr,
312
+ 0,
313
+ [_PAro, _CA],
314
+ [0, 0]
315
+ ];
316
+ export var RegionDisabledException$ = [-3, n0, _RDE,
340
317
  { [_aQE]: [`RegionDisabledException`, 403], [_e]: _c, [_hE]: 403 },
341
318
  [_m],
342
- [0],
319
+ [0]
343
320
  ];
344
321
  TypeRegistry.for(n0).registerError(RegionDisabledException$, RegionDisabledException);
345
- export var SessionDurationEscalationException$ = [
346
- -3,
347
- n0,
348
- _SDEE,
322
+ export var SessionDurationEscalationException$ = [-3, n0, _SDEE,
349
323
  { [_aQE]: [`SessionDurationEscalationException`, 403], [_e]: _c, [_hE]: 403 },
350
324
  [_m],
351
- [0],
325
+ [0]
352
326
  ];
353
327
  TypeRegistry.for(n0).registerError(SessionDurationEscalationException$, SessionDurationEscalationException);
354
- export var Tag$ = [3, n0, _Ta, 0, [_K, _V], [0, 0]];
328
+ export var Tag$ = [3, n0, _Ta,
329
+ 0,
330
+ [_K, _V],
331
+ [0, 0]
332
+ ];
355
333
  export var STSServiceException$ = [-3, _s, "STSServiceException", 0, [], []];
356
334
  TypeRegistry.for(_s).registerError(STSServiceException$, STSServiceException);
357
- var policyDescriptorListType = [1, n0, _pDLT, 0, () => PolicyDescriptorType$];
358
- var ProvidedContextsListType = [1, n0, _PCLT, 0, () => ProvidedContext$];
335
+ var policyDescriptorListType = [1, n0, _pDLT,
336
+ 0, () => PolicyDescriptorType$
337
+ ];
338
+ var ProvidedContextsListType = [1, n0, _PCLT,
339
+ 0, () => ProvidedContext$
340
+ ];
359
341
  var tagKeyListType = 64 | 0;
360
- var tagListType = [1, n0, _tLT, 0, () => Tag$];
342
+ var tagListType = [1, n0, _tLT,
343
+ 0, () => Tag$
344
+ ];
361
345
  var webIdentityTokenAudienceListType = 64 | 0;
362
- export var AssumeRole$ = [9, n0, _AR, 0, () => AssumeRoleRequest$, () => AssumeRoleResponse$];
363
- export var AssumeRoleWithSAML$ = [
364
- 9,
365
- n0,
366
- _ARWSAML,
367
- 0,
368
- () => AssumeRoleWithSAMLRequest$,
369
- () => AssumeRoleWithSAMLResponse$,
346
+ export var AssumeRole$ = [9, n0, _AR,
347
+ 0, () => AssumeRoleRequest$, () => AssumeRoleResponse$
370
348
  ];
371
- export var AssumeRoleWithWebIdentity$ = [
372
- 9,
373
- n0,
374
- _ARWWI,
375
- 0,
376
- () => AssumeRoleWithWebIdentityRequest$,
377
- () => AssumeRoleWithWebIdentityResponse$,
378
- ];
379
- export var AssumeRoot$ = [9, n0, _ARs, 0, () => AssumeRootRequest$, () => AssumeRootResponse$];
380
- export var DecodeAuthorizationMessage$ = [
381
- 9,
382
- n0,
383
- _DAM,
384
- 0,
385
- () => DecodeAuthorizationMessageRequest$,
386
- () => DecodeAuthorizationMessageResponse$,
349
+ export var AssumeRoleWithSAML$ = [9, n0, _ARWSAML,
350
+ 0, () => AssumeRoleWithSAMLRequest$, () => AssumeRoleWithSAMLResponse$
387
351
  ];
388
- export var GetAccessKeyInfo$ = [
389
- 9,
390
- n0,
391
- _GAKI,
392
- 0,
393
- () => GetAccessKeyInfoRequest$,
394
- () => GetAccessKeyInfoResponse$,
352
+ export var AssumeRoleWithWebIdentity$ = [9, n0, _ARWWI,
353
+ 0, () => AssumeRoleWithWebIdentityRequest$, () => AssumeRoleWithWebIdentityResponse$
395
354
  ];
396
- export var GetCallerIdentity$ = [
397
- 9,
398
- n0,
399
- _GCI,
400
- 0,
401
- () => GetCallerIdentityRequest$,
402
- () => GetCallerIdentityResponse$,
355
+ export var AssumeRoot$ = [9, n0, _ARs,
356
+ 0, () => AssumeRootRequest$, () => AssumeRootResponse$
403
357
  ];
404
- export var GetDelegatedAccessToken$ = [
405
- 9,
406
- n0,
407
- _GDAT,
408
- 0,
409
- () => GetDelegatedAccessTokenRequest$,
410
- () => GetDelegatedAccessTokenResponse$,
358
+ export var DecodeAuthorizationMessage$ = [9, n0, _DAM,
359
+ 0, () => DecodeAuthorizationMessageRequest$, () => DecodeAuthorizationMessageResponse$
411
360
  ];
412
- export var GetFederationToken$ = [
413
- 9,
414
- n0,
415
- _GFT,
416
- 0,
417
- () => GetFederationTokenRequest$,
418
- () => GetFederationTokenResponse$,
361
+ export var GetAccessKeyInfo$ = [9, n0, _GAKI,
362
+ 0, () => GetAccessKeyInfoRequest$, () => GetAccessKeyInfoResponse$
419
363
  ];
420
- export var GetSessionToken$ = [
421
- 9,
422
- n0,
423
- _GST,
424
- 0,
425
- () => GetSessionTokenRequest$,
426
- () => GetSessionTokenResponse$,
364
+ export var GetCallerIdentity$ = [9, n0, _GCI,
365
+ 0, () => GetCallerIdentityRequest$, () => GetCallerIdentityResponse$
427
366
  ];
428
- export var GetWebIdentityToken$ = [
429
- 9,
430
- n0,
431
- _GWIT,
432
- 0,
433
- () => GetWebIdentityTokenRequest$,
434
- () => GetWebIdentityTokenResponse$,
367
+ export var GetDelegatedAccessToken$ = [9, n0, _GDAT,
368
+ 0, () => GetDelegatedAccessTokenRequest$, () => GetDelegatedAccessTokenResponse$
369
+ ];
370
+ export var GetFederationToken$ = [9, n0, _GFT,
371
+ 0, () => GetFederationTokenRequest$, () => GetFederationTokenResponse$
372
+ ];
373
+ export var GetSessionToken$ = [9, n0, _GST,
374
+ 0, () => GetSessionTokenRequest$, () => GetSessionTokenResponse$
375
+ ];
376
+ export var GetWebIdentityToken$ = [9, n0, _GWIT,
377
+ 0, () => GetWebIdentityTokenRequest$, () => GetWebIdentityTokenResponse$
435
378
  ];
package/package.json CHANGED
@@ -1,18 +1,20 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-sts",
3
3
  "description": "AWS SDK for JavaScript Sts Client for Node.js, Browser and React Native",
4
- "version": "3.956.0",
4
+ "version": "3.958.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:types' 'yarn:build:es' && yarn build:cjs",
7
7
  "build:cjs": "node ../../scripts/compilation/inline client-sts",
8
8
  "build:es": "tsc -p tsconfig.es.json",
9
- "build:include:deps": "lerna run --scope $npm_package_name --include-dependencies build",
9
+ "build:include:deps": "yarn g:turbo run build -F=\"$npm_package_name\"",
10
10
  "build:types": "rimraf ./dist-types tsconfig.types.tsbuildinfo && tsc -p tsconfig.types.json",
11
11
  "build:types:downlevel": "downlevel-dts dist-types dist-types/ts3.4",
12
12
  "clean": "rimraf ./dist-* && rimraf *.tsbuildinfo",
13
13
  "extract:docs": "api-extractor run --local",
14
14
  "generate:client": "node ../../scripts/generate-clients/single-service --solo sts",
15
15
  "test": "yarn g:vitest run",
16
+ "test:e2e": "yarn g:vitest run -c vitest.config.e2e.mts --mode development",
17
+ "test:e2e:watch": "yarn g:vitest watch -c vitest.config.e2e.mts",
16
18
  "test:index": "tsc --noEmit ./test/index-types.ts && node ./test/index-objects.spec.mjs",
17
19
  "test:watch": "yarn g:vitest watch"
18
20
  },
@@ -23,17 +25,17 @@
23
25
  "dependencies": {
24
26
  "@aws-crypto/sha256-browser": "5.2.0",
25
27
  "@aws-crypto/sha256-js": "5.2.0",
26
- "@aws-sdk/core": "3.956.0",
27
- "@aws-sdk/credential-provider-node": "3.956.0",
28
- "@aws-sdk/middleware-host-header": "3.956.0",
29
- "@aws-sdk/middleware-logger": "3.956.0",
30
- "@aws-sdk/middleware-recursion-detection": "3.956.0",
31
- "@aws-sdk/middleware-user-agent": "3.956.0",
32
- "@aws-sdk/region-config-resolver": "3.956.0",
33
- "@aws-sdk/types": "3.956.0",
34
- "@aws-sdk/util-endpoints": "3.956.0",
35
- "@aws-sdk/util-user-agent-browser": "3.956.0",
36
- "@aws-sdk/util-user-agent-node": "3.956.0",
28
+ "@aws-sdk/core": "3.957.0",
29
+ "@aws-sdk/credential-provider-node": "3.958.0",
30
+ "@aws-sdk/middleware-host-header": "3.957.0",
31
+ "@aws-sdk/middleware-logger": "3.957.0",
32
+ "@aws-sdk/middleware-recursion-detection": "3.957.0",
33
+ "@aws-sdk/middleware-user-agent": "3.957.0",
34
+ "@aws-sdk/region-config-resolver": "3.957.0",
35
+ "@aws-sdk/types": "3.957.0",
36
+ "@aws-sdk/util-endpoints": "3.957.0",
37
+ "@aws-sdk/util-user-agent-browser": "3.957.0",
38
+ "@aws-sdk/util-user-agent-node": "3.957.0",
37
39
  "@smithy/config-resolver": "^4.4.5",
38
40
  "@smithy/core": "^3.20.0",
39
41
  "@smithy/fetch-http-handler": "^5.3.8",