@aws-sdk/client-sts 3.986.0 → 3.988.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/index.js +30 -603
- package/dist-cjs/models/STSServiceException.js +12 -0
- package/dist-cjs/models/errors.js +160 -0
- package/dist-cjs/runtimeConfig.shared.js +2 -0
- package/dist-cjs/schemas/schemas_0.js +388 -0
- package/dist-es/runtimeConfig.shared.js +2 -0
- package/dist-es/schemas/schemas_0.js +80 -74
- package/dist-types/schemas/schemas_0.d.ts +20 -13
- package/dist-types/ts3.4/schemas/schemas_0.d.ts +15 -13
- package/package.json +13 -13
package/dist-cjs/index.js
CHANGED
|
@@ -4,535 +4,11 @@ var STSClient = require('./STSClient');
|
|
|
4
4
|
var smithyClient = require('@smithy/smithy-client');
|
|
5
5
|
var middlewareEndpoint = require('@smithy/middleware-endpoint');
|
|
6
6
|
var EndpointParameters = require('./endpoint/EndpointParameters');
|
|
7
|
-
var
|
|
7
|
+
var schemas_0 = require('./schemas/schemas_0');
|
|
8
|
+
var errors = require('./models/errors');
|
|
8
9
|
var client = require('@aws-sdk/core/client');
|
|
9
10
|
var regionConfigResolver = require('@aws-sdk/region-config-resolver');
|
|
10
|
-
|
|
11
|
-
class STSServiceException extends smithyClient.ServiceException {
|
|
12
|
-
constructor(options) {
|
|
13
|
-
super(options);
|
|
14
|
-
Object.setPrototypeOf(this, STSServiceException.prototype);
|
|
15
|
-
}
|
|
16
|
-
}
|
|
17
|
-
|
|
18
|
-
class ExpiredTokenException extends STSServiceException {
|
|
19
|
-
name = "ExpiredTokenException";
|
|
20
|
-
$fault = "client";
|
|
21
|
-
constructor(opts) {
|
|
22
|
-
super({
|
|
23
|
-
name: "ExpiredTokenException",
|
|
24
|
-
$fault: "client",
|
|
25
|
-
...opts,
|
|
26
|
-
});
|
|
27
|
-
Object.setPrototypeOf(this, ExpiredTokenException.prototype);
|
|
28
|
-
}
|
|
29
|
-
}
|
|
30
|
-
class MalformedPolicyDocumentException extends STSServiceException {
|
|
31
|
-
name = "MalformedPolicyDocumentException";
|
|
32
|
-
$fault = "client";
|
|
33
|
-
constructor(opts) {
|
|
34
|
-
super({
|
|
35
|
-
name: "MalformedPolicyDocumentException",
|
|
36
|
-
$fault: "client",
|
|
37
|
-
...opts,
|
|
38
|
-
});
|
|
39
|
-
Object.setPrototypeOf(this, MalformedPolicyDocumentException.prototype);
|
|
40
|
-
}
|
|
41
|
-
}
|
|
42
|
-
class PackedPolicyTooLargeException extends STSServiceException {
|
|
43
|
-
name = "PackedPolicyTooLargeException";
|
|
44
|
-
$fault = "client";
|
|
45
|
-
constructor(opts) {
|
|
46
|
-
super({
|
|
47
|
-
name: "PackedPolicyTooLargeException",
|
|
48
|
-
$fault: "client",
|
|
49
|
-
...opts,
|
|
50
|
-
});
|
|
51
|
-
Object.setPrototypeOf(this, PackedPolicyTooLargeException.prototype);
|
|
52
|
-
}
|
|
53
|
-
}
|
|
54
|
-
class RegionDisabledException extends STSServiceException {
|
|
55
|
-
name = "RegionDisabledException";
|
|
56
|
-
$fault = "client";
|
|
57
|
-
constructor(opts) {
|
|
58
|
-
super({
|
|
59
|
-
name: "RegionDisabledException",
|
|
60
|
-
$fault: "client",
|
|
61
|
-
...opts,
|
|
62
|
-
});
|
|
63
|
-
Object.setPrototypeOf(this, RegionDisabledException.prototype);
|
|
64
|
-
}
|
|
65
|
-
}
|
|
66
|
-
class IDPRejectedClaimException extends STSServiceException {
|
|
67
|
-
name = "IDPRejectedClaimException";
|
|
68
|
-
$fault = "client";
|
|
69
|
-
constructor(opts) {
|
|
70
|
-
super({
|
|
71
|
-
name: "IDPRejectedClaimException",
|
|
72
|
-
$fault: "client",
|
|
73
|
-
...opts,
|
|
74
|
-
});
|
|
75
|
-
Object.setPrototypeOf(this, IDPRejectedClaimException.prototype);
|
|
76
|
-
}
|
|
77
|
-
}
|
|
78
|
-
class InvalidIdentityTokenException extends STSServiceException {
|
|
79
|
-
name = "InvalidIdentityTokenException";
|
|
80
|
-
$fault = "client";
|
|
81
|
-
constructor(opts) {
|
|
82
|
-
super({
|
|
83
|
-
name: "InvalidIdentityTokenException",
|
|
84
|
-
$fault: "client",
|
|
85
|
-
...opts,
|
|
86
|
-
});
|
|
87
|
-
Object.setPrototypeOf(this, InvalidIdentityTokenException.prototype);
|
|
88
|
-
}
|
|
89
|
-
}
|
|
90
|
-
class IDPCommunicationErrorException extends STSServiceException {
|
|
91
|
-
name = "IDPCommunicationErrorException";
|
|
92
|
-
$fault = "client";
|
|
93
|
-
constructor(opts) {
|
|
94
|
-
super({
|
|
95
|
-
name: "IDPCommunicationErrorException",
|
|
96
|
-
$fault: "client",
|
|
97
|
-
...opts,
|
|
98
|
-
});
|
|
99
|
-
Object.setPrototypeOf(this, IDPCommunicationErrorException.prototype);
|
|
100
|
-
}
|
|
101
|
-
}
|
|
102
|
-
class InvalidAuthorizationMessageException extends STSServiceException {
|
|
103
|
-
name = "InvalidAuthorizationMessageException";
|
|
104
|
-
$fault = "client";
|
|
105
|
-
constructor(opts) {
|
|
106
|
-
super({
|
|
107
|
-
name: "InvalidAuthorizationMessageException",
|
|
108
|
-
$fault: "client",
|
|
109
|
-
...opts,
|
|
110
|
-
});
|
|
111
|
-
Object.setPrototypeOf(this, InvalidAuthorizationMessageException.prototype);
|
|
112
|
-
}
|
|
113
|
-
}
|
|
114
|
-
class ExpiredTradeInTokenException extends STSServiceException {
|
|
115
|
-
name = "ExpiredTradeInTokenException";
|
|
116
|
-
$fault = "client";
|
|
117
|
-
constructor(opts) {
|
|
118
|
-
super({
|
|
119
|
-
name: "ExpiredTradeInTokenException",
|
|
120
|
-
$fault: "client",
|
|
121
|
-
...opts,
|
|
122
|
-
});
|
|
123
|
-
Object.setPrototypeOf(this, ExpiredTradeInTokenException.prototype);
|
|
124
|
-
}
|
|
125
|
-
}
|
|
126
|
-
class JWTPayloadSizeExceededException extends STSServiceException {
|
|
127
|
-
name = "JWTPayloadSizeExceededException";
|
|
128
|
-
$fault = "client";
|
|
129
|
-
constructor(opts) {
|
|
130
|
-
super({
|
|
131
|
-
name: "JWTPayloadSizeExceededException",
|
|
132
|
-
$fault: "client",
|
|
133
|
-
...opts,
|
|
134
|
-
});
|
|
135
|
-
Object.setPrototypeOf(this, JWTPayloadSizeExceededException.prototype);
|
|
136
|
-
}
|
|
137
|
-
}
|
|
138
|
-
class OutboundWebIdentityFederationDisabledException extends STSServiceException {
|
|
139
|
-
name = "OutboundWebIdentityFederationDisabledException";
|
|
140
|
-
$fault = "client";
|
|
141
|
-
constructor(opts) {
|
|
142
|
-
super({
|
|
143
|
-
name: "OutboundWebIdentityFederationDisabledException",
|
|
144
|
-
$fault: "client",
|
|
145
|
-
...opts,
|
|
146
|
-
});
|
|
147
|
-
Object.setPrototypeOf(this, OutboundWebIdentityFederationDisabledException.prototype);
|
|
148
|
-
}
|
|
149
|
-
}
|
|
150
|
-
class SessionDurationEscalationException extends STSServiceException {
|
|
151
|
-
name = "SessionDurationEscalationException";
|
|
152
|
-
$fault = "client";
|
|
153
|
-
constructor(opts) {
|
|
154
|
-
super({
|
|
155
|
-
name: "SessionDurationEscalationException",
|
|
156
|
-
$fault: "client",
|
|
157
|
-
...opts,
|
|
158
|
-
});
|
|
159
|
-
Object.setPrototypeOf(this, SessionDurationEscalationException.prototype);
|
|
160
|
-
}
|
|
161
|
-
}
|
|
162
|
-
|
|
163
|
-
const _A = "Arn";
|
|
164
|
-
const _AKI = "AccessKeyId";
|
|
165
|
-
const _AP = "AssumedPrincipal";
|
|
166
|
-
const _AR = "AssumeRole";
|
|
167
|
-
const _ARI = "AssumedRoleId";
|
|
168
|
-
const _ARR = "AssumeRoleRequest";
|
|
169
|
-
const _ARRs = "AssumeRoleResponse";
|
|
170
|
-
const _ARRss = "AssumeRootRequest";
|
|
171
|
-
const _ARRssu = "AssumeRootResponse";
|
|
172
|
-
const _ARU = "AssumedRoleUser";
|
|
173
|
-
const _ARWSAML = "AssumeRoleWithSAML";
|
|
174
|
-
const _ARWSAMLR = "AssumeRoleWithSAMLRequest";
|
|
175
|
-
const _ARWSAMLRs = "AssumeRoleWithSAMLResponse";
|
|
176
|
-
const _ARWWI = "AssumeRoleWithWebIdentity";
|
|
177
|
-
const _ARWWIR = "AssumeRoleWithWebIdentityRequest";
|
|
178
|
-
const _ARWWIRs = "AssumeRoleWithWebIdentityResponse";
|
|
179
|
-
const _ARs = "AssumeRoot";
|
|
180
|
-
const _Ac = "Account";
|
|
181
|
-
const _Au = "Audience";
|
|
182
|
-
const _C = "Credentials";
|
|
183
|
-
const _CA = "ContextAssertion";
|
|
184
|
-
const _DAM = "DecodeAuthorizationMessage";
|
|
185
|
-
const _DAMR = "DecodeAuthorizationMessageRequest";
|
|
186
|
-
const _DAMRe = "DecodeAuthorizationMessageResponse";
|
|
187
|
-
const _DM = "DecodedMessage";
|
|
188
|
-
const _DS = "DurationSeconds";
|
|
189
|
-
const _E = "Expiration";
|
|
190
|
-
const _EI = "ExternalId";
|
|
191
|
-
const _EM = "EncodedMessage";
|
|
192
|
-
const _ETE = "ExpiredTokenException";
|
|
193
|
-
const _ETITE = "ExpiredTradeInTokenException";
|
|
194
|
-
const _FU = "FederatedUser";
|
|
195
|
-
const _FUI = "FederatedUserId";
|
|
196
|
-
const _GAKI = "GetAccessKeyInfo";
|
|
197
|
-
const _GAKIR = "GetAccessKeyInfoRequest";
|
|
198
|
-
const _GAKIRe = "GetAccessKeyInfoResponse";
|
|
199
|
-
const _GCI = "GetCallerIdentity";
|
|
200
|
-
const _GCIR = "GetCallerIdentityRequest";
|
|
201
|
-
const _GCIRe = "GetCallerIdentityResponse";
|
|
202
|
-
const _GDAT = "GetDelegatedAccessToken";
|
|
203
|
-
const _GDATR = "GetDelegatedAccessTokenRequest";
|
|
204
|
-
const _GDATRe = "GetDelegatedAccessTokenResponse";
|
|
205
|
-
const _GFT = "GetFederationToken";
|
|
206
|
-
const _GFTR = "GetFederationTokenRequest";
|
|
207
|
-
const _GFTRe = "GetFederationTokenResponse";
|
|
208
|
-
const _GST = "GetSessionToken";
|
|
209
|
-
const _GSTR = "GetSessionTokenRequest";
|
|
210
|
-
const _GSTRe = "GetSessionTokenResponse";
|
|
211
|
-
const _GWIT = "GetWebIdentityToken";
|
|
212
|
-
const _GWITR = "GetWebIdentityTokenRequest";
|
|
213
|
-
const _GWITRe = "GetWebIdentityTokenResponse";
|
|
214
|
-
const _I = "Issuer";
|
|
215
|
-
const _IAME = "InvalidAuthorizationMessageException";
|
|
216
|
-
const _IDPCEE = "IDPCommunicationErrorException";
|
|
217
|
-
const _IDPRCE = "IDPRejectedClaimException";
|
|
218
|
-
const _IITE = "InvalidIdentityTokenException";
|
|
219
|
-
const _JWTPSEE = "JWTPayloadSizeExceededException";
|
|
220
|
-
const _K = "Key";
|
|
221
|
-
const _MPDE = "MalformedPolicyDocumentException";
|
|
222
|
-
const _N = "Name";
|
|
223
|
-
const _NQ = "NameQualifier";
|
|
224
|
-
const _OWIFDE = "OutboundWebIdentityFederationDisabledException";
|
|
225
|
-
const _P = "Policy";
|
|
226
|
-
const _PA = "PolicyArns";
|
|
227
|
-
const _PAr = "PrincipalArn";
|
|
228
|
-
const _PAro = "ProviderArn";
|
|
229
|
-
const _PC = "ProvidedContexts";
|
|
230
|
-
const _PCLT = "ProvidedContextsListType";
|
|
231
|
-
const _PCr = "ProvidedContext";
|
|
232
|
-
const _PDT = "PolicyDescriptorType";
|
|
233
|
-
const _PI = "ProviderId";
|
|
234
|
-
const _PPS = "PackedPolicySize";
|
|
235
|
-
const _PPTLE = "PackedPolicyTooLargeException";
|
|
236
|
-
const _Pr = "Provider";
|
|
237
|
-
const _RA = "RoleArn";
|
|
238
|
-
const _RDE = "RegionDisabledException";
|
|
239
|
-
const _RSN = "RoleSessionName";
|
|
240
|
-
const _S = "Subject";
|
|
241
|
-
const _SA = "SigningAlgorithm";
|
|
242
|
-
const _SAK = "SecretAccessKey";
|
|
243
|
-
const _SAMLA = "SAMLAssertion";
|
|
244
|
-
const _SAMLAT = "SAMLAssertionType";
|
|
245
|
-
const _SDEE = "SessionDurationEscalationException";
|
|
246
|
-
const _SFWIT = "SubjectFromWebIdentityToken";
|
|
247
|
-
const _SI = "SourceIdentity";
|
|
248
|
-
const _SN = "SerialNumber";
|
|
249
|
-
const _ST = "SubjectType";
|
|
250
|
-
const _STe = "SessionToken";
|
|
251
|
-
const _T = "Tags";
|
|
252
|
-
const _TC = "TokenCode";
|
|
253
|
-
const _TIT = "TradeInToken";
|
|
254
|
-
const _TP = "TargetPrincipal";
|
|
255
|
-
const _TPA = "TaskPolicyArn";
|
|
256
|
-
const _TTK = "TransitiveTagKeys";
|
|
257
|
-
const _Ta = "Tag";
|
|
258
|
-
const _UI = "UserId";
|
|
259
|
-
const _V = "Value";
|
|
260
|
-
const _WIT = "WebIdentityToken";
|
|
261
|
-
const _a = "arn";
|
|
262
|
-
const _aKST = "accessKeySecretType";
|
|
263
|
-
const _aQE = "awsQueryError";
|
|
264
|
-
const _c = "client";
|
|
265
|
-
const _cTT = "clientTokenType";
|
|
266
|
-
const _e = "error";
|
|
267
|
-
const _hE = "httpError";
|
|
268
|
-
const _m = "message";
|
|
269
|
-
const _pDLT = "policyDescriptorListType";
|
|
270
|
-
const _s = "smithy.ts.sdk.synthetic.com.amazonaws.sts";
|
|
271
|
-
const _tITT = "tradeInTokenType";
|
|
272
|
-
const _tLT = "tagListType";
|
|
273
|
-
const _wITT = "webIdentityTokenType";
|
|
274
|
-
const n0 = "com.amazonaws.sts";
|
|
275
|
-
var accessKeySecretType = [0, n0, _aKST, 8, 0];
|
|
276
|
-
var clientTokenType = [0, n0, _cTT, 8, 0];
|
|
277
|
-
var SAMLAssertionType = [0, n0, _SAMLAT, 8, 0];
|
|
278
|
-
var tradeInTokenType = [0, n0, _tITT, 8, 0];
|
|
279
|
-
var webIdentityTokenType = [0, n0, _wITT, 8, 0];
|
|
280
|
-
var AssumedRoleUser$ = [3, n0, _ARU,
|
|
281
|
-
0,
|
|
282
|
-
[_ARI, _A],
|
|
283
|
-
[0, 0], 2
|
|
284
|
-
];
|
|
285
|
-
var AssumeRoleRequest$ = [3, n0, _ARR,
|
|
286
|
-
0,
|
|
287
|
-
[_RA, _RSN, _PA, _P, _DS, _T, _TTK, _EI, _SN, _TC, _SI, _PC],
|
|
288
|
-
[0, 0, () => policyDescriptorListType, 0, 1, () => tagListType, 64 | 0, 0, 0, 0, 0, () => ProvidedContextsListType], 2
|
|
289
|
-
];
|
|
290
|
-
var AssumeRoleResponse$ = [3, n0, _ARRs,
|
|
291
|
-
0,
|
|
292
|
-
[_C, _ARU, _PPS, _SI],
|
|
293
|
-
[[() => Credentials$, 0], () => AssumedRoleUser$, 1, 0]
|
|
294
|
-
];
|
|
295
|
-
var AssumeRoleWithSAMLRequest$ = [3, n0, _ARWSAMLR,
|
|
296
|
-
0,
|
|
297
|
-
[_RA, _PAr, _SAMLA, _PA, _P, _DS],
|
|
298
|
-
[0, 0, [() => SAMLAssertionType, 0], () => policyDescriptorListType, 0, 1], 3
|
|
299
|
-
];
|
|
300
|
-
var AssumeRoleWithSAMLResponse$ = [3, n0, _ARWSAMLRs,
|
|
301
|
-
0,
|
|
302
|
-
[_C, _ARU, _PPS, _S, _ST, _I, _Au, _NQ, _SI],
|
|
303
|
-
[[() => Credentials$, 0], () => AssumedRoleUser$, 1, 0, 0, 0, 0, 0, 0]
|
|
304
|
-
];
|
|
305
|
-
var AssumeRoleWithWebIdentityRequest$ = [3, n0, _ARWWIR,
|
|
306
|
-
0,
|
|
307
|
-
[_RA, _RSN, _WIT, _PI, _PA, _P, _DS],
|
|
308
|
-
[0, 0, [() => clientTokenType, 0], 0, () => policyDescriptorListType, 0, 1], 3
|
|
309
|
-
];
|
|
310
|
-
var AssumeRoleWithWebIdentityResponse$ = [3, n0, _ARWWIRs,
|
|
311
|
-
0,
|
|
312
|
-
[_C, _SFWIT, _ARU, _PPS, _Pr, _Au, _SI],
|
|
313
|
-
[[() => Credentials$, 0], 0, () => AssumedRoleUser$, 1, 0, 0, 0]
|
|
314
|
-
];
|
|
315
|
-
var AssumeRootRequest$ = [3, n0, _ARRss,
|
|
316
|
-
0,
|
|
317
|
-
[_TP, _TPA, _DS],
|
|
318
|
-
[0, () => PolicyDescriptorType$, 1], 2
|
|
319
|
-
];
|
|
320
|
-
var AssumeRootResponse$ = [3, n0, _ARRssu,
|
|
321
|
-
0,
|
|
322
|
-
[_C, _SI],
|
|
323
|
-
[[() => Credentials$, 0], 0]
|
|
324
|
-
];
|
|
325
|
-
var Credentials$ = [3, n0, _C,
|
|
326
|
-
0,
|
|
327
|
-
[_AKI, _SAK, _STe, _E],
|
|
328
|
-
[0, [() => accessKeySecretType, 0], 0, 4], 4
|
|
329
|
-
];
|
|
330
|
-
var DecodeAuthorizationMessageRequest$ = [3, n0, _DAMR,
|
|
331
|
-
0,
|
|
332
|
-
[_EM],
|
|
333
|
-
[0], 1
|
|
334
|
-
];
|
|
335
|
-
var DecodeAuthorizationMessageResponse$ = [3, n0, _DAMRe,
|
|
336
|
-
0,
|
|
337
|
-
[_DM],
|
|
338
|
-
[0]
|
|
339
|
-
];
|
|
340
|
-
var ExpiredTokenException$ = [-3, n0, _ETE,
|
|
341
|
-
{ [_aQE]: [`ExpiredTokenException`, 400], [_e]: _c, [_hE]: 400 },
|
|
342
|
-
[_m],
|
|
343
|
-
[0]
|
|
344
|
-
];
|
|
345
|
-
schema.TypeRegistry.for(n0).registerError(ExpiredTokenException$, ExpiredTokenException);
|
|
346
|
-
var ExpiredTradeInTokenException$ = [-3, n0, _ETITE,
|
|
347
|
-
{ [_aQE]: [`ExpiredTradeInTokenException`, 400], [_e]: _c, [_hE]: 400 },
|
|
348
|
-
[_m],
|
|
349
|
-
[0]
|
|
350
|
-
];
|
|
351
|
-
schema.TypeRegistry.for(n0).registerError(ExpiredTradeInTokenException$, ExpiredTradeInTokenException);
|
|
352
|
-
var FederatedUser$ = [3, n0, _FU,
|
|
353
|
-
0,
|
|
354
|
-
[_FUI, _A],
|
|
355
|
-
[0, 0], 2
|
|
356
|
-
];
|
|
357
|
-
var GetAccessKeyInfoRequest$ = [3, n0, _GAKIR,
|
|
358
|
-
0,
|
|
359
|
-
[_AKI],
|
|
360
|
-
[0], 1
|
|
361
|
-
];
|
|
362
|
-
var GetAccessKeyInfoResponse$ = [3, n0, _GAKIRe,
|
|
363
|
-
0,
|
|
364
|
-
[_Ac],
|
|
365
|
-
[0]
|
|
366
|
-
];
|
|
367
|
-
var GetCallerIdentityRequest$ = [3, n0, _GCIR,
|
|
368
|
-
0,
|
|
369
|
-
[],
|
|
370
|
-
[]
|
|
371
|
-
];
|
|
372
|
-
var GetCallerIdentityResponse$ = [3, n0, _GCIRe,
|
|
373
|
-
0,
|
|
374
|
-
[_UI, _Ac, _A],
|
|
375
|
-
[0, 0, 0]
|
|
376
|
-
];
|
|
377
|
-
var GetDelegatedAccessTokenRequest$ = [3, n0, _GDATR,
|
|
378
|
-
0,
|
|
379
|
-
[_TIT],
|
|
380
|
-
[[() => tradeInTokenType, 0]], 1
|
|
381
|
-
];
|
|
382
|
-
var GetDelegatedAccessTokenResponse$ = [3, n0, _GDATRe,
|
|
383
|
-
0,
|
|
384
|
-
[_C, _PPS, _AP],
|
|
385
|
-
[[() => Credentials$, 0], 1, 0]
|
|
386
|
-
];
|
|
387
|
-
var GetFederationTokenRequest$ = [3, n0, _GFTR,
|
|
388
|
-
0,
|
|
389
|
-
[_N, _P, _PA, _DS, _T],
|
|
390
|
-
[0, 0, () => policyDescriptorListType, 1, () => tagListType], 1
|
|
391
|
-
];
|
|
392
|
-
var GetFederationTokenResponse$ = [3, n0, _GFTRe,
|
|
393
|
-
0,
|
|
394
|
-
[_C, _FU, _PPS],
|
|
395
|
-
[[() => Credentials$, 0], () => FederatedUser$, 1]
|
|
396
|
-
];
|
|
397
|
-
var GetSessionTokenRequest$ = [3, n0, _GSTR,
|
|
398
|
-
0,
|
|
399
|
-
[_DS, _SN, _TC],
|
|
400
|
-
[1, 0, 0]
|
|
401
|
-
];
|
|
402
|
-
var GetSessionTokenResponse$ = [3, n0, _GSTRe,
|
|
403
|
-
0,
|
|
404
|
-
[_C],
|
|
405
|
-
[[() => Credentials$, 0]]
|
|
406
|
-
];
|
|
407
|
-
var GetWebIdentityTokenRequest$ = [3, n0, _GWITR,
|
|
408
|
-
0,
|
|
409
|
-
[_Au, _SA, _DS, _T],
|
|
410
|
-
[64 | 0, 0, 1, () => tagListType], 2
|
|
411
|
-
];
|
|
412
|
-
var GetWebIdentityTokenResponse$ = [3, n0, _GWITRe,
|
|
413
|
-
0,
|
|
414
|
-
[_WIT, _E],
|
|
415
|
-
[[() => webIdentityTokenType, 0], 4]
|
|
416
|
-
];
|
|
417
|
-
var IDPCommunicationErrorException$ = [-3, n0, _IDPCEE,
|
|
418
|
-
{ [_aQE]: [`IDPCommunicationError`, 400], [_e]: _c, [_hE]: 400 },
|
|
419
|
-
[_m],
|
|
420
|
-
[0]
|
|
421
|
-
];
|
|
422
|
-
schema.TypeRegistry.for(n0).registerError(IDPCommunicationErrorException$, IDPCommunicationErrorException);
|
|
423
|
-
var IDPRejectedClaimException$ = [-3, n0, _IDPRCE,
|
|
424
|
-
{ [_aQE]: [`IDPRejectedClaim`, 403], [_e]: _c, [_hE]: 403 },
|
|
425
|
-
[_m],
|
|
426
|
-
[0]
|
|
427
|
-
];
|
|
428
|
-
schema.TypeRegistry.for(n0).registerError(IDPRejectedClaimException$, IDPRejectedClaimException);
|
|
429
|
-
var InvalidAuthorizationMessageException$ = [-3, n0, _IAME,
|
|
430
|
-
{ [_aQE]: [`InvalidAuthorizationMessageException`, 400], [_e]: _c, [_hE]: 400 },
|
|
431
|
-
[_m],
|
|
432
|
-
[0]
|
|
433
|
-
];
|
|
434
|
-
schema.TypeRegistry.for(n0).registerError(InvalidAuthorizationMessageException$, InvalidAuthorizationMessageException);
|
|
435
|
-
var InvalidIdentityTokenException$ = [-3, n0, _IITE,
|
|
436
|
-
{ [_aQE]: [`InvalidIdentityToken`, 400], [_e]: _c, [_hE]: 400 },
|
|
437
|
-
[_m],
|
|
438
|
-
[0]
|
|
439
|
-
];
|
|
440
|
-
schema.TypeRegistry.for(n0).registerError(InvalidIdentityTokenException$, InvalidIdentityTokenException);
|
|
441
|
-
var JWTPayloadSizeExceededException$ = [-3, n0, _JWTPSEE,
|
|
442
|
-
{ [_aQE]: [`JWTPayloadSizeExceededException`, 400], [_e]: _c, [_hE]: 400 },
|
|
443
|
-
[_m],
|
|
444
|
-
[0]
|
|
445
|
-
];
|
|
446
|
-
schema.TypeRegistry.for(n0).registerError(JWTPayloadSizeExceededException$, JWTPayloadSizeExceededException);
|
|
447
|
-
var MalformedPolicyDocumentException$ = [-3, n0, _MPDE,
|
|
448
|
-
{ [_aQE]: [`MalformedPolicyDocument`, 400], [_e]: _c, [_hE]: 400 },
|
|
449
|
-
[_m],
|
|
450
|
-
[0]
|
|
451
|
-
];
|
|
452
|
-
schema.TypeRegistry.for(n0).registerError(MalformedPolicyDocumentException$, MalformedPolicyDocumentException);
|
|
453
|
-
var OutboundWebIdentityFederationDisabledException$ = [-3, n0, _OWIFDE,
|
|
454
|
-
{ [_aQE]: [`OutboundWebIdentityFederationDisabledException`, 403], [_e]: _c, [_hE]: 403 },
|
|
455
|
-
[_m],
|
|
456
|
-
[0]
|
|
457
|
-
];
|
|
458
|
-
schema.TypeRegistry.for(n0).registerError(OutboundWebIdentityFederationDisabledException$, OutboundWebIdentityFederationDisabledException);
|
|
459
|
-
var PackedPolicyTooLargeException$ = [-3, n0, _PPTLE,
|
|
460
|
-
{ [_aQE]: [`PackedPolicyTooLarge`, 400], [_e]: _c, [_hE]: 400 },
|
|
461
|
-
[_m],
|
|
462
|
-
[0]
|
|
463
|
-
];
|
|
464
|
-
schema.TypeRegistry.for(n0).registerError(PackedPolicyTooLargeException$, PackedPolicyTooLargeException);
|
|
465
|
-
var PolicyDescriptorType$ = [3, n0, _PDT,
|
|
466
|
-
0,
|
|
467
|
-
[_a],
|
|
468
|
-
[0]
|
|
469
|
-
];
|
|
470
|
-
var ProvidedContext$ = [3, n0, _PCr,
|
|
471
|
-
0,
|
|
472
|
-
[_PAro, _CA],
|
|
473
|
-
[0, 0]
|
|
474
|
-
];
|
|
475
|
-
var RegionDisabledException$ = [-3, n0, _RDE,
|
|
476
|
-
{ [_aQE]: [`RegionDisabledException`, 403], [_e]: _c, [_hE]: 403 },
|
|
477
|
-
[_m],
|
|
478
|
-
[0]
|
|
479
|
-
];
|
|
480
|
-
schema.TypeRegistry.for(n0).registerError(RegionDisabledException$, RegionDisabledException);
|
|
481
|
-
var SessionDurationEscalationException$ = [-3, n0, _SDEE,
|
|
482
|
-
{ [_aQE]: [`SessionDurationEscalationException`, 403], [_e]: _c, [_hE]: 403 },
|
|
483
|
-
[_m],
|
|
484
|
-
[0]
|
|
485
|
-
];
|
|
486
|
-
schema.TypeRegistry.for(n0).registerError(SessionDurationEscalationException$, SessionDurationEscalationException);
|
|
487
|
-
var Tag$ = [3, n0, _Ta,
|
|
488
|
-
0,
|
|
489
|
-
[_K, _V],
|
|
490
|
-
[0, 0], 2
|
|
491
|
-
];
|
|
492
|
-
var STSServiceException$ = [-3, _s, "STSServiceException", 0, [], []];
|
|
493
|
-
schema.TypeRegistry.for(_s).registerError(STSServiceException$, STSServiceException);
|
|
494
|
-
var policyDescriptorListType = [1, n0, _pDLT,
|
|
495
|
-
0, () => PolicyDescriptorType$
|
|
496
|
-
];
|
|
497
|
-
var ProvidedContextsListType = [1, n0, _PCLT,
|
|
498
|
-
0, () => ProvidedContext$
|
|
499
|
-
];
|
|
500
|
-
var tagListType = [1, n0, _tLT,
|
|
501
|
-
0, () => Tag$
|
|
502
|
-
];
|
|
503
|
-
var AssumeRole$ = [9, n0, _AR,
|
|
504
|
-
0, () => AssumeRoleRequest$, () => AssumeRoleResponse$
|
|
505
|
-
];
|
|
506
|
-
var AssumeRoleWithSAML$ = [9, n0, _ARWSAML,
|
|
507
|
-
0, () => AssumeRoleWithSAMLRequest$, () => AssumeRoleWithSAMLResponse$
|
|
508
|
-
];
|
|
509
|
-
var AssumeRoleWithWebIdentity$ = [9, n0, _ARWWI,
|
|
510
|
-
0, () => AssumeRoleWithWebIdentityRequest$, () => AssumeRoleWithWebIdentityResponse$
|
|
511
|
-
];
|
|
512
|
-
var AssumeRoot$ = [9, n0, _ARs,
|
|
513
|
-
0, () => AssumeRootRequest$, () => AssumeRootResponse$
|
|
514
|
-
];
|
|
515
|
-
var DecodeAuthorizationMessage$ = [9, n0, _DAM,
|
|
516
|
-
0, () => DecodeAuthorizationMessageRequest$, () => DecodeAuthorizationMessageResponse$
|
|
517
|
-
];
|
|
518
|
-
var GetAccessKeyInfo$ = [9, n0, _GAKI,
|
|
519
|
-
0, () => GetAccessKeyInfoRequest$, () => GetAccessKeyInfoResponse$
|
|
520
|
-
];
|
|
521
|
-
var GetCallerIdentity$ = [9, n0, _GCI,
|
|
522
|
-
0, () => GetCallerIdentityRequest$, () => GetCallerIdentityResponse$
|
|
523
|
-
];
|
|
524
|
-
var GetDelegatedAccessToken$ = [9, n0, _GDAT,
|
|
525
|
-
0, () => GetDelegatedAccessTokenRequest$, () => GetDelegatedAccessTokenResponse$
|
|
526
|
-
];
|
|
527
|
-
var GetFederationToken$ = [9, n0, _GFT,
|
|
528
|
-
0, () => GetFederationTokenRequest$, () => GetFederationTokenResponse$
|
|
529
|
-
];
|
|
530
|
-
var GetSessionToken$ = [9, n0, _GST,
|
|
531
|
-
0, () => GetSessionTokenRequest$, () => GetSessionTokenResponse$
|
|
532
|
-
];
|
|
533
|
-
var GetWebIdentityToken$ = [9, n0, _GWIT,
|
|
534
|
-
0, () => GetWebIdentityTokenRequest$, () => GetWebIdentityTokenResponse$
|
|
535
|
-
];
|
|
11
|
+
var STSServiceException = require('./models/STSServiceException');
|
|
536
12
|
|
|
537
13
|
class AssumeRoleCommand extends smithyClient.Command
|
|
538
14
|
.classBuilder()
|
|
@@ -542,7 +18,7 @@ class AssumeRoleCommand extends smithyClient.Command
|
|
|
542
18
|
})
|
|
543
19
|
.s("AWSSecurityTokenServiceV20110615", "AssumeRole", {})
|
|
544
20
|
.n("STSClient", "AssumeRoleCommand")
|
|
545
|
-
.sc(AssumeRole$)
|
|
21
|
+
.sc(schemas_0.AssumeRole$)
|
|
546
22
|
.build() {
|
|
547
23
|
}
|
|
548
24
|
|
|
@@ -554,7 +30,7 @@ class AssumeRoleWithSAMLCommand extends smithyClient.Command
|
|
|
554
30
|
})
|
|
555
31
|
.s("AWSSecurityTokenServiceV20110615", "AssumeRoleWithSAML", {})
|
|
556
32
|
.n("STSClient", "AssumeRoleWithSAMLCommand")
|
|
557
|
-
.sc(AssumeRoleWithSAML$)
|
|
33
|
+
.sc(schemas_0.AssumeRoleWithSAML$)
|
|
558
34
|
.build() {
|
|
559
35
|
}
|
|
560
36
|
|
|
@@ -566,7 +42,7 @@ class AssumeRoleWithWebIdentityCommand extends smithyClient.Command
|
|
|
566
42
|
})
|
|
567
43
|
.s("AWSSecurityTokenServiceV20110615", "AssumeRoleWithWebIdentity", {})
|
|
568
44
|
.n("STSClient", "AssumeRoleWithWebIdentityCommand")
|
|
569
|
-
.sc(AssumeRoleWithWebIdentity$)
|
|
45
|
+
.sc(schemas_0.AssumeRoleWithWebIdentity$)
|
|
570
46
|
.build() {
|
|
571
47
|
}
|
|
572
48
|
|
|
@@ -578,7 +54,7 @@ class AssumeRootCommand extends smithyClient.Command
|
|
|
578
54
|
})
|
|
579
55
|
.s("AWSSecurityTokenServiceV20110615", "AssumeRoot", {})
|
|
580
56
|
.n("STSClient", "AssumeRootCommand")
|
|
581
|
-
.sc(AssumeRoot$)
|
|
57
|
+
.sc(schemas_0.AssumeRoot$)
|
|
582
58
|
.build() {
|
|
583
59
|
}
|
|
584
60
|
|
|
@@ -590,7 +66,7 @@ class DecodeAuthorizationMessageCommand extends smithyClient.Command
|
|
|
590
66
|
})
|
|
591
67
|
.s("AWSSecurityTokenServiceV20110615", "DecodeAuthorizationMessage", {})
|
|
592
68
|
.n("STSClient", "DecodeAuthorizationMessageCommand")
|
|
593
|
-
.sc(DecodeAuthorizationMessage$)
|
|
69
|
+
.sc(schemas_0.DecodeAuthorizationMessage$)
|
|
594
70
|
.build() {
|
|
595
71
|
}
|
|
596
72
|
|
|
@@ -602,7 +78,7 @@ class GetAccessKeyInfoCommand extends smithyClient.Command
|
|
|
602
78
|
})
|
|
603
79
|
.s("AWSSecurityTokenServiceV20110615", "GetAccessKeyInfo", {})
|
|
604
80
|
.n("STSClient", "GetAccessKeyInfoCommand")
|
|
605
|
-
.sc(GetAccessKeyInfo$)
|
|
81
|
+
.sc(schemas_0.GetAccessKeyInfo$)
|
|
606
82
|
.build() {
|
|
607
83
|
}
|
|
608
84
|
|
|
@@ -614,7 +90,7 @@ class GetCallerIdentityCommand extends smithyClient.Command
|
|
|
614
90
|
})
|
|
615
91
|
.s("AWSSecurityTokenServiceV20110615", "GetCallerIdentity", {})
|
|
616
92
|
.n("STSClient", "GetCallerIdentityCommand")
|
|
617
|
-
.sc(GetCallerIdentity$)
|
|
93
|
+
.sc(schemas_0.GetCallerIdentity$)
|
|
618
94
|
.build() {
|
|
619
95
|
}
|
|
620
96
|
|
|
@@ -626,7 +102,7 @@ class GetDelegatedAccessTokenCommand extends smithyClient.Command
|
|
|
626
102
|
})
|
|
627
103
|
.s("AWSSecurityTokenServiceV20110615", "GetDelegatedAccessToken", {})
|
|
628
104
|
.n("STSClient", "GetDelegatedAccessTokenCommand")
|
|
629
|
-
.sc(GetDelegatedAccessToken$)
|
|
105
|
+
.sc(schemas_0.GetDelegatedAccessToken$)
|
|
630
106
|
.build() {
|
|
631
107
|
}
|
|
632
108
|
|
|
@@ -638,7 +114,7 @@ class GetFederationTokenCommand extends smithyClient.Command
|
|
|
638
114
|
})
|
|
639
115
|
.s("AWSSecurityTokenServiceV20110615", "GetFederationToken", {})
|
|
640
116
|
.n("STSClient", "GetFederationTokenCommand")
|
|
641
|
-
.sc(GetFederationToken$)
|
|
117
|
+
.sc(schemas_0.GetFederationToken$)
|
|
642
118
|
.build() {
|
|
643
119
|
}
|
|
644
120
|
|
|
@@ -650,7 +126,7 @@ class GetSessionTokenCommand extends smithyClient.Command
|
|
|
650
126
|
})
|
|
651
127
|
.s("AWSSecurityTokenServiceV20110615", "GetSessionToken", {})
|
|
652
128
|
.n("STSClient", "GetSessionTokenCommand")
|
|
653
|
-
.sc(GetSessionToken$)
|
|
129
|
+
.sc(schemas_0.GetSessionToken$)
|
|
654
130
|
.build() {
|
|
655
131
|
}
|
|
656
132
|
|
|
@@ -662,7 +138,7 @@ class GetWebIdentityTokenCommand extends smithyClient.Command
|
|
|
662
138
|
})
|
|
663
139
|
.s("AWSSecurityTokenServiceV20110615", "GetWebIdentityToken", {})
|
|
664
140
|
.n("STSClient", "GetWebIdentityTokenCommand")
|
|
665
|
-
.sc(GetWebIdentityToken$)
|
|
141
|
+
.sc(schemas_0.GetWebIdentityToken$)
|
|
666
142
|
.build() {
|
|
667
143
|
}
|
|
668
144
|
|
|
@@ -807,83 +283,22 @@ Object.defineProperty(exports, "$Command", {
|
|
|
807
283
|
enumerable: true,
|
|
808
284
|
get: function () { return smithyClient.Command; }
|
|
809
285
|
});
|
|
810
|
-
exports
|
|
286
|
+
Object.defineProperty(exports, "STSServiceException", {
|
|
287
|
+
enumerable: true,
|
|
288
|
+
get: function () { return STSServiceException.STSServiceException; }
|
|
289
|
+
});
|
|
811
290
|
exports.AssumeRoleCommand = AssumeRoleCommand;
|
|
812
|
-
exports.AssumeRoleRequest$ = AssumeRoleRequest$;
|
|
813
|
-
exports.AssumeRoleResponse$ = AssumeRoleResponse$;
|
|
814
|
-
exports.AssumeRoleWithSAML$ = AssumeRoleWithSAML$;
|
|
815
291
|
exports.AssumeRoleWithSAMLCommand = AssumeRoleWithSAMLCommand;
|
|
816
|
-
exports.AssumeRoleWithSAMLRequest$ = AssumeRoleWithSAMLRequest$;
|
|
817
|
-
exports.AssumeRoleWithSAMLResponse$ = AssumeRoleWithSAMLResponse$;
|
|
818
|
-
exports.AssumeRoleWithWebIdentity$ = AssumeRoleWithWebIdentity$;
|
|
819
292
|
exports.AssumeRoleWithWebIdentityCommand = AssumeRoleWithWebIdentityCommand;
|
|
820
|
-
exports.AssumeRoleWithWebIdentityRequest$ = AssumeRoleWithWebIdentityRequest$;
|
|
821
|
-
exports.AssumeRoleWithWebIdentityResponse$ = AssumeRoleWithWebIdentityResponse$;
|
|
822
|
-
exports.AssumeRoot$ = AssumeRoot$;
|
|
823
293
|
exports.AssumeRootCommand = AssumeRootCommand;
|
|
824
|
-
exports.AssumeRootRequest$ = AssumeRootRequest$;
|
|
825
|
-
exports.AssumeRootResponse$ = AssumeRootResponse$;
|
|
826
|
-
exports.AssumedRoleUser$ = AssumedRoleUser$;
|
|
827
|
-
exports.Credentials$ = Credentials$;
|
|
828
|
-
exports.DecodeAuthorizationMessage$ = DecodeAuthorizationMessage$;
|
|
829
294
|
exports.DecodeAuthorizationMessageCommand = DecodeAuthorizationMessageCommand;
|
|
830
|
-
exports.DecodeAuthorizationMessageRequest$ = DecodeAuthorizationMessageRequest$;
|
|
831
|
-
exports.DecodeAuthorizationMessageResponse$ = DecodeAuthorizationMessageResponse$;
|
|
832
|
-
exports.ExpiredTokenException = ExpiredTokenException;
|
|
833
|
-
exports.ExpiredTokenException$ = ExpiredTokenException$;
|
|
834
|
-
exports.ExpiredTradeInTokenException = ExpiredTradeInTokenException;
|
|
835
|
-
exports.ExpiredTradeInTokenException$ = ExpiredTradeInTokenException$;
|
|
836
|
-
exports.FederatedUser$ = FederatedUser$;
|
|
837
|
-
exports.GetAccessKeyInfo$ = GetAccessKeyInfo$;
|
|
838
295
|
exports.GetAccessKeyInfoCommand = GetAccessKeyInfoCommand;
|
|
839
|
-
exports.GetAccessKeyInfoRequest$ = GetAccessKeyInfoRequest$;
|
|
840
|
-
exports.GetAccessKeyInfoResponse$ = GetAccessKeyInfoResponse$;
|
|
841
|
-
exports.GetCallerIdentity$ = GetCallerIdentity$;
|
|
842
296
|
exports.GetCallerIdentityCommand = GetCallerIdentityCommand;
|
|
843
|
-
exports.GetCallerIdentityRequest$ = GetCallerIdentityRequest$;
|
|
844
|
-
exports.GetCallerIdentityResponse$ = GetCallerIdentityResponse$;
|
|
845
|
-
exports.GetDelegatedAccessToken$ = GetDelegatedAccessToken$;
|
|
846
297
|
exports.GetDelegatedAccessTokenCommand = GetDelegatedAccessTokenCommand;
|
|
847
|
-
exports.GetDelegatedAccessTokenRequest$ = GetDelegatedAccessTokenRequest$;
|
|
848
|
-
exports.GetDelegatedAccessTokenResponse$ = GetDelegatedAccessTokenResponse$;
|
|
849
|
-
exports.GetFederationToken$ = GetFederationToken$;
|
|
850
298
|
exports.GetFederationTokenCommand = GetFederationTokenCommand;
|
|
851
|
-
exports.GetFederationTokenRequest$ = GetFederationTokenRequest$;
|
|
852
|
-
exports.GetFederationTokenResponse$ = GetFederationTokenResponse$;
|
|
853
|
-
exports.GetSessionToken$ = GetSessionToken$;
|
|
854
299
|
exports.GetSessionTokenCommand = GetSessionTokenCommand;
|
|
855
|
-
exports.GetSessionTokenRequest$ = GetSessionTokenRequest$;
|
|
856
|
-
exports.GetSessionTokenResponse$ = GetSessionTokenResponse$;
|
|
857
|
-
exports.GetWebIdentityToken$ = GetWebIdentityToken$;
|
|
858
300
|
exports.GetWebIdentityTokenCommand = GetWebIdentityTokenCommand;
|
|
859
|
-
exports.GetWebIdentityTokenRequest$ = GetWebIdentityTokenRequest$;
|
|
860
|
-
exports.GetWebIdentityTokenResponse$ = GetWebIdentityTokenResponse$;
|
|
861
|
-
exports.IDPCommunicationErrorException = IDPCommunicationErrorException;
|
|
862
|
-
exports.IDPCommunicationErrorException$ = IDPCommunicationErrorException$;
|
|
863
|
-
exports.IDPRejectedClaimException = IDPRejectedClaimException;
|
|
864
|
-
exports.IDPRejectedClaimException$ = IDPRejectedClaimException$;
|
|
865
|
-
exports.InvalidAuthorizationMessageException = InvalidAuthorizationMessageException;
|
|
866
|
-
exports.InvalidAuthorizationMessageException$ = InvalidAuthorizationMessageException$;
|
|
867
|
-
exports.InvalidIdentityTokenException = InvalidIdentityTokenException;
|
|
868
|
-
exports.InvalidIdentityTokenException$ = InvalidIdentityTokenException$;
|
|
869
|
-
exports.JWTPayloadSizeExceededException = JWTPayloadSizeExceededException;
|
|
870
|
-
exports.JWTPayloadSizeExceededException$ = JWTPayloadSizeExceededException$;
|
|
871
|
-
exports.MalformedPolicyDocumentException = MalformedPolicyDocumentException;
|
|
872
|
-
exports.MalformedPolicyDocumentException$ = MalformedPolicyDocumentException$;
|
|
873
|
-
exports.OutboundWebIdentityFederationDisabledException = OutboundWebIdentityFederationDisabledException;
|
|
874
|
-
exports.OutboundWebIdentityFederationDisabledException$ = OutboundWebIdentityFederationDisabledException$;
|
|
875
|
-
exports.PackedPolicyTooLargeException = PackedPolicyTooLargeException;
|
|
876
|
-
exports.PackedPolicyTooLargeException$ = PackedPolicyTooLargeException$;
|
|
877
|
-
exports.PolicyDescriptorType$ = PolicyDescriptorType$;
|
|
878
|
-
exports.ProvidedContext$ = ProvidedContext$;
|
|
879
|
-
exports.RegionDisabledException = RegionDisabledException;
|
|
880
|
-
exports.RegionDisabledException$ = RegionDisabledException$;
|
|
881
301
|
exports.STS = STS;
|
|
882
|
-
exports.STSServiceException = STSServiceException;
|
|
883
|
-
exports.STSServiceException$ = STSServiceException$;
|
|
884
|
-
exports.SessionDurationEscalationException = SessionDurationEscalationException;
|
|
885
|
-
exports.SessionDurationEscalationException$ = SessionDurationEscalationException$;
|
|
886
|
-
exports.Tag$ = Tag$;
|
|
887
302
|
exports.decorateDefaultCredentialProvider = decorateDefaultCredentialProvider;
|
|
888
303
|
exports.getDefaultRoleAssumer = getDefaultRoleAssumer;
|
|
889
304
|
exports.getDefaultRoleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity;
|
|
@@ -893,3 +308,15 @@ Object.keys(STSClient).forEach(function (k) {
|
|
|
893
308
|
get: function () { return STSClient[k]; }
|
|
894
309
|
});
|
|
895
310
|
});
|
|
311
|
+
Object.keys(schemas_0).forEach(function (k) {
|
|
312
|
+
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) Object.defineProperty(exports, k, {
|
|
313
|
+
enumerable: true,
|
|
314
|
+
get: function () { return schemas_0[k]; }
|
|
315
|
+
});
|
|
316
|
+
});
|
|
317
|
+
Object.keys(errors).forEach(function (k) {
|
|
318
|
+
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) Object.defineProperty(exports, k, {
|
|
319
|
+
enumerable: true,
|
|
320
|
+
get: function () { return errors[k]; }
|
|
321
|
+
});
|
|
322
|
+
});
|