@aws-sdk/client-sts 3.986.0 → 3.988.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/index.js +30 -603
- package/dist-cjs/models/STSServiceException.js +12 -0
- package/dist-cjs/models/errors.js +160 -0
- package/dist-cjs/runtimeConfig.shared.js +2 -0
- package/dist-cjs/schemas/schemas_0.js +388 -0
- package/dist-es/runtimeConfig.shared.js +2 -0
- package/dist-es/schemas/schemas_0.js +80 -74
- package/dist-types/schemas/schemas_0.d.ts +20 -13
- package/dist-types/ts3.4/schemas/schemas_0.d.ts +15 -13
- package/package.json +13 -13
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.STSServiceException = exports.__ServiceException = void 0;
|
|
4
|
+
const smithy_client_1 = require("@smithy/smithy-client");
|
|
5
|
+
Object.defineProperty(exports, "__ServiceException", { enumerable: true, get: function () { return smithy_client_1.ServiceException; } });
|
|
6
|
+
class STSServiceException extends smithy_client_1.ServiceException {
|
|
7
|
+
constructor(options) {
|
|
8
|
+
super(options);
|
|
9
|
+
Object.setPrototypeOf(this, STSServiceException.prototype);
|
|
10
|
+
}
|
|
11
|
+
}
|
|
12
|
+
exports.STSServiceException = STSServiceException;
|
|
@@ -0,0 +1,160 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.SessionDurationEscalationException = exports.OutboundWebIdentityFederationDisabledException = exports.JWTPayloadSizeExceededException = exports.ExpiredTradeInTokenException = exports.InvalidAuthorizationMessageException = exports.IDPCommunicationErrorException = exports.InvalidIdentityTokenException = exports.IDPRejectedClaimException = exports.RegionDisabledException = exports.PackedPolicyTooLargeException = exports.MalformedPolicyDocumentException = exports.ExpiredTokenException = void 0;
|
|
4
|
+
const STSServiceException_1 = require("./STSServiceException");
|
|
5
|
+
class ExpiredTokenException extends STSServiceException_1.STSServiceException {
|
|
6
|
+
name = "ExpiredTokenException";
|
|
7
|
+
$fault = "client";
|
|
8
|
+
constructor(opts) {
|
|
9
|
+
super({
|
|
10
|
+
name: "ExpiredTokenException",
|
|
11
|
+
$fault: "client",
|
|
12
|
+
...opts,
|
|
13
|
+
});
|
|
14
|
+
Object.setPrototypeOf(this, ExpiredTokenException.prototype);
|
|
15
|
+
}
|
|
16
|
+
}
|
|
17
|
+
exports.ExpiredTokenException = ExpiredTokenException;
|
|
18
|
+
class MalformedPolicyDocumentException extends STSServiceException_1.STSServiceException {
|
|
19
|
+
name = "MalformedPolicyDocumentException";
|
|
20
|
+
$fault = "client";
|
|
21
|
+
constructor(opts) {
|
|
22
|
+
super({
|
|
23
|
+
name: "MalformedPolicyDocumentException",
|
|
24
|
+
$fault: "client",
|
|
25
|
+
...opts,
|
|
26
|
+
});
|
|
27
|
+
Object.setPrototypeOf(this, MalformedPolicyDocumentException.prototype);
|
|
28
|
+
}
|
|
29
|
+
}
|
|
30
|
+
exports.MalformedPolicyDocumentException = MalformedPolicyDocumentException;
|
|
31
|
+
class PackedPolicyTooLargeException extends STSServiceException_1.STSServiceException {
|
|
32
|
+
name = "PackedPolicyTooLargeException";
|
|
33
|
+
$fault = "client";
|
|
34
|
+
constructor(opts) {
|
|
35
|
+
super({
|
|
36
|
+
name: "PackedPolicyTooLargeException",
|
|
37
|
+
$fault: "client",
|
|
38
|
+
...opts,
|
|
39
|
+
});
|
|
40
|
+
Object.setPrototypeOf(this, PackedPolicyTooLargeException.prototype);
|
|
41
|
+
}
|
|
42
|
+
}
|
|
43
|
+
exports.PackedPolicyTooLargeException = PackedPolicyTooLargeException;
|
|
44
|
+
class RegionDisabledException extends STSServiceException_1.STSServiceException {
|
|
45
|
+
name = "RegionDisabledException";
|
|
46
|
+
$fault = "client";
|
|
47
|
+
constructor(opts) {
|
|
48
|
+
super({
|
|
49
|
+
name: "RegionDisabledException",
|
|
50
|
+
$fault: "client",
|
|
51
|
+
...opts,
|
|
52
|
+
});
|
|
53
|
+
Object.setPrototypeOf(this, RegionDisabledException.prototype);
|
|
54
|
+
}
|
|
55
|
+
}
|
|
56
|
+
exports.RegionDisabledException = RegionDisabledException;
|
|
57
|
+
class IDPRejectedClaimException extends STSServiceException_1.STSServiceException {
|
|
58
|
+
name = "IDPRejectedClaimException";
|
|
59
|
+
$fault = "client";
|
|
60
|
+
constructor(opts) {
|
|
61
|
+
super({
|
|
62
|
+
name: "IDPRejectedClaimException",
|
|
63
|
+
$fault: "client",
|
|
64
|
+
...opts,
|
|
65
|
+
});
|
|
66
|
+
Object.setPrototypeOf(this, IDPRejectedClaimException.prototype);
|
|
67
|
+
}
|
|
68
|
+
}
|
|
69
|
+
exports.IDPRejectedClaimException = IDPRejectedClaimException;
|
|
70
|
+
class InvalidIdentityTokenException extends STSServiceException_1.STSServiceException {
|
|
71
|
+
name = "InvalidIdentityTokenException";
|
|
72
|
+
$fault = "client";
|
|
73
|
+
constructor(opts) {
|
|
74
|
+
super({
|
|
75
|
+
name: "InvalidIdentityTokenException",
|
|
76
|
+
$fault: "client",
|
|
77
|
+
...opts,
|
|
78
|
+
});
|
|
79
|
+
Object.setPrototypeOf(this, InvalidIdentityTokenException.prototype);
|
|
80
|
+
}
|
|
81
|
+
}
|
|
82
|
+
exports.InvalidIdentityTokenException = InvalidIdentityTokenException;
|
|
83
|
+
class IDPCommunicationErrorException extends STSServiceException_1.STSServiceException {
|
|
84
|
+
name = "IDPCommunicationErrorException";
|
|
85
|
+
$fault = "client";
|
|
86
|
+
constructor(opts) {
|
|
87
|
+
super({
|
|
88
|
+
name: "IDPCommunicationErrorException",
|
|
89
|
+
$fault: "client",
|
|
90
|
+
...opts,
|
|
91
|
+
});
|
|
92
|
+
Object.setPrototypeOf(this, IDPCommunicationErrorException.prototype);
|
|
93
|
+
}
|
|
94
|
+
}
|
|
95
|
+
exports.IDPCommunicationErrorException = IDPCommunicationErrorException;
|
|
96
|
+
class InvalidAuthorizationMessageException extends STSServiceException_1.STSServiceException {
|
|
97
|
+
name = "InvalidAuthorizationMessageException";
|
|
98
|
+
$fault = "client";
|
|
99
|
+
constructor(opts) {
|
|
100
|
+
super({
|
|
101
|
+
name: "InvalidAuthorizationMessageException",
|
|
102
|
+
$fault: "client",
|
|
103
|
+
...opts,
|
|
104
|
+
});
|
|
105
|
+
Object.setPrototypeOf(this, InvalidAuthorizationMessageException.prototype);
|
|
106
|
+
}
|
|
107
|
+
}
|
|
108
|
+
exports.InvalidAuthorizationMessageException = InvalidAuthorizationMessageException;
|
|
109
|
+
class ExpiredTradeInTokenException extends STSServiceException_1.STSServiceException {
|
|
110
|
+
name = "ExpiredTradeInTokenException";
|
|
111
|
+
$fault = "client";
|
|
112
|
+
constructor(opts) {
|
|
113
|
+
super({
|
|
114
|
+
name: "ExpiredTradeInTokenException",
|
|
115
|
+
$fault: "client",
|
|
116
|
+
...opts,
|
|
117
|
+
});
|
|
118
|
+
Object.setPrototypeOf(this, ExpiredTradeInTokenException.prototype);
|
|
119
|
+
}
|
|
120
|
+
}
|
|
121
|
+
exports.ExpiredTradeInTokenException = ExpiredTradeInTokenException;
|
|
122
|
+
class JWTPayloadSizeExceededException extends STSServiceException_1.STSServiceException {
|
|
123
|
+
name = "JWTPayloadSizeExceededException";
|
|
124
|
+
$fault = "client";
|
|
125
|
+
constructor(opts) {
|
|
126
|
+
super({
|
|
127
|
+
name: "JWTPayloadSizeExceededException",
|
|
128
|
+
$fault: "client",
|
|
129
|
+
...opts,
|
|
130
|
+
});
|
|
131
|
+
Object.setPrototypeOf(this, JWTPayloadSizeExceededException.prototype);
|
|
132
|
+
}
|
|
133
|
+
}
|
|
134
|
+
exports.JWTPayloadSizeExceededException = JWTPayloadSizeExceededException;
|
|
135
|
+
class OutboundWebIdentityFederationDisabledException extends STSServiceException_1.STSServiceException {
|
|
136
|
+
name = "OutboundWebIdentityFederationDisabledException";
|
|
137
|
+
$fault = "client";
|
|
138
|
+
constructor(opts) {
|
|
139
|
+
super({
|
|
140
|
+
name: "OutboundWebIdentityFederationDisabledException",
|
|
141
|
+
$fault: "client",
|
|
142
|
+
...opts,
|
|
143
|
+
});
|
|
144
|
+
Object.setPrototypeOf(this, OutboundWebIdentityFederationDisabledException.prototype);
|
|
145
|
+
}
|
|
146
|
+
}
|
|
147
|
+
exports.OutboundWebIdentityFederationDisabledException = OutboundWebIdentityFederationDisabledException;
|
|
148
|
+
class SessionDurationEscalationException extends STSServiceException_1.STSServiceException {
|
|
149
|
+
name = "SessionDurationEscalationException";
|
|
150
|
+
$fault = "client";
|
|
151
|
+
constructor(opts) {
|
|
152
|
+
super({
|
|
153
|
+
name: "SessionDurationEscalationException",
|
|
154
|
+
$fault: "client",
|
|
155
|
+
...opts,
|
|
156
|
+
});
|
|
157
|
+
Object.setPrototypeOf(this, SessionDurationEscalationException.prototype);
|
|
158
|
+
}
|
|
159
|
+
}
|
|
160
|
+
exports.SessionDurationEscalationException = SessionDurationEscalationException;
|
|
@@ -10,6 +10,7 @@ const util_base64_1 = require("@smithy/util-base64");
|
|
|
10
10
|
const util_utf8_1 = require("@smithy/util-utf8");
|
|
11
11
|
const httpAuthSchemeProvider_1 = require("./auth/httpAuthSchemeProvider");
|
|
12
12
|
const endpointResolver_1 = require("./endpoint/endpointResolver");
|
|
13
|
+
const schemas_0_1 = require("./schemas/schemas_0");
|
|
13
14
|
const getRuntimeConfig = (config) => {
|
|
14
15
|
return {
|
|
15
16
|
apiVersion: "2011-06-15",
|
|
@@ -35,6 +36,7 @@ const getRuntimeConfig = (config) => {
|
|
|
35
36
|
protocol: config?.protocol ?? protocols_1.AwsQueryProtocol,
|
|
36
37
|
protocolSettings: config?.protocolSettings ?? {
|
|
37
38
|
defaultNamespace: "com.amazonaws.sts",
|
|
39
|
+
errorTypeRegistries: schemas_0_1.errorTypeRegistries,
|
|
38
40
|
xmlNamespace: "https://sts.amazonaws.com/doc/2011-06-15/",
|
|
39
41
|
version: "2011-06-15",
|
|
40
42
|
serviceTarget: "AWSSecurityTokenServiceV20110615",
|
|
@@ -0,0 +1,388 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.GetDelegatedAccessToken$ = exports.GetCallerIdentity$ = exports.GetAccessKeyInfo$ = exports.DecodeAuthorizationMessage$ = exports.AssumeRoot$ = exports.AssumeRoleWithWebIdentity$ = exports.AssumeRoleWithSAML$ = exports.AssumeRole$ = exports.Tag$ = exports.ProvidedContext$ = exports.PolicyDescriptorType$ = exports.GetWebIdentityTokenResponse$ = exports.GetWebIdentityTokenRequest$ = exports.GetSessionTokenResponse$ = exports.GetSessionTokenRequest$ = exports.GetFederationTokenResponse$ = exports.GetFederationTokenRequest$ = exports.GetDelegatedAccessTokenResponse$ = exports.GetDelegatedAccessTokenRequest$ = exports.GetCallerIdentityResponse$ = exports.GetCallerIdentityRequest$ = exports.GetAccessKeyInfoResponse$ = exports.GetAccessKeyInfoRequest$ = exports.FederatedUser$ = exports.DecodeAuthorizationMessageResponse$ = exports.DecodeAuthorizationMessageRequest$ = exports.Credentials$ = exports.AssumeRootResponse$ = exports.AssumeRootRequest$ = exports.AssumeRoleWithWebIdentityResponse$ = exports.AssumeRoleWithWebIdentityRequest$ = exports.AssumeRoleWithSAMLResponse$ = exports.AssumeRoleWithSAMLRequest$ = exports.AssumeRoleResponse$ = exports.AssumeRoleRequest$ = exports.AssumedRoleUser$ = exports.errorTypeRegistries = exports.SessionDurationEscalationException$ = exports.RegionDisabledException$ = exports.PackedPolicyTooLargeException$ = exports.OutboundWebIdentityFederationDisabledException$ = exports.MalformedPolicyDocumentException$ = exports.JWTPayloadSizeExceededException$ = exports.InvalidIdentityTokenException$ = exports.InvalidAuthorizationMessageException$ = exports.IDPRejectedClaimException$ = exports.IDPCommunicationErrorException$ = exports.ExpiredTradeInTokenException$ = exports.ExpiredTokenException$ = exports.STSServiceException$ = void 0;
|
|
4
|
+
exports.GetWebIdentityToken$ = exports.GetSessionToken$ = exports.GetFederationToken$ = void 0;
|
|
5
|
+
const _A = "Arn";
|
|
6
|
+
const _AKI = "AccessKeyId";
|
|
7
|
+
const _AP = "AssumedPrincipal";
|
|
8
|
+
const _AR = "AssumeRole";
|
|
9
|
+
const _ARI = "AssumedRoleId";
|
|
10
|
+
const _ARR = "AssumeRoleRequest";
|
|
11
|
+
const _ARRs = "AssumeRoleResponse";
|
|
12
|
+
const _ARRss = "AssumeRootRequest";
|
|
13
|
+
const _ARRssu = "AssumeRootResponse";
|
|
14
|
+
const _ARU = "AssumedRoleUser";
|
|
15
|
+
const _ARWSAML = "AssumeRoleWithSAML";
|
|
16
|
+
const _ARWSAMLR = "AssumeRoleWithSAMLRequest";
|
|
17
|
+
const _ARWSAMLRs = "AssumeRoleWithSAMLResponse";
|
|
18
|
+
const _ARWWI = "AssumeRoleWithWebIdentity";
|
|
19
|
+
const _ARWWIR = "AssumeRoleWithWebIdentityRequest";
|
|
20
|
+
const _ARWWIRs = "AssumeRoleWithWebIdentityResponse";
|
|
21
|
+
const _ARs = "AssumeRoot";
|
|
22
|
+
const _Ac = "Account";
|
|
23
|
+
const _Au = "Audience";
|
|
24
|
+
const _C = "Credentials";
|
|
25
|
+
const _CA = "ContextAssertion";
|
|
26
|
+
const _DAM = "DecodeAuthorizationMessage";
|
|
27
|
+
const _DAMR = "DecodeAuthorizationMessageRequest";
|
|
28
|
+
const _DAMRe = "DecodeAuthorizationMessageResponse";
|
|
29
|
+
const _DM = "DecodedMessage";
|
|
30
|
+
const _DS = "DurationSeconds";
|
|
31
|
+
const _E = "Expiration";
|
|
32
|
+
const _EI = "ExternalId";
|
|
33
|
+
const _EM = "EncodedMessage";
|
|
34
|
+
const _ETE = "ExpiredTokenException";
|
|
35
|
+
const _ETITE = "ExpiredTradeInTokenException";
|
|
36
|
+
const _FU = "FederatedUser";
|
|
37
|
+
const _FUI = "FederatedUserId";
|
|
38
|
+
const _GAKI = "GetAccessKeyInfo";
|
|
39
|
+
const _GAKIR = "GetAccessKeyInfoRequest";
|
|
40
|
+
const _GAKIRe = "GetAccessKeyInfoResponse";
|
|
41
|
+
const _GCI = "GetCallerIdentity";
|
|
42
|
+
const _GCIR = "GetCallerIdentityRequest";
|
|
43
|
+
const _GCIRe = "GetCallerIdentityResponse";
|
|
44
|
+
const _GDAT = "GetDelegatedAccessToken";
|
|
45
|
+
const _GDATR = "GetDelegatedAccessTokenRequest";
|
|
46
|
+
const _GDATRe = "GetDelegatedAccessTokenResponse";
|
|
47
|
+
const _GFT = "GetFederationToken";
|
|
48
|
+
const _GFTR = "GetFederationTokenRequest";
|
|
49
|
+
const _GFTRe = "GetFederationTokenResponse";
|
|
50
|
+
const _GST = "GetSessionToken";
|
|
51
|
+
const _GSTR = "GetSessionTokenRequest";
|
|
52
|
+
const _GSTRe = "GetSessionTokenResponse";
|
|
53
|
+
const _GWIT = "GetWebIdentityToken";
|
|
54
|
+
const _GWITR = "GetWebIdentityTokenRequest";
|
|
55
|
+
const _GWITRe = "GetWebIdentityTokenResponse";
|
|
56
|
+
const _I = "Issuer";
|
|
57
|
+
const _IAME = "InvalidAuthorizationMessageException";
|
|
58
|
+
const _IDPCEE = "IDPCommunicationErrorException";
|
|
59
|
+
const _IDPRCE = "IDPRejectedClaimException";
|
|
60
|
+
const _IITE = "InvalidIdentityTokenException";
|
|
61
|
+
const _JWTPSEE = "JWTPayloadSizeExceededException";
|
|
62
|
+
const _K = "Key";
|
|
63
|
+
const _MPDE = "MalformedPolicyDocumentException";
|
|
64
|
+
const _N = "Name";
|
|
65
|
+
const _NQ = "NameQualifier";
|
|
66
|
+
const _OWIFDE = "OutboundWebIdentityFederationDisabledException";
|
|
67
|
+
const _P = "Policy";
|
|
68
|
+
const _PA = "PolicyArns";
|
|
69
|
+
const _PAr = "PrincipalArn";
|
|
70
|
+
const _PAro = "ProviderArn";
|
|
71
|
+
const _PC = "ProvidedContexts";
|
|
72
|
+
const _PCLT = "ProvidedContextsListType";
|
|
73
|
+
const _PCr = "ProvidedContext";
|
|
74
|
+
const _PDT = "PolicyDescriptorType";
|
|
75
|
+
const _PI = "ProviderId";
|
|
76
|
+
const _PPS = "PackedPolicySize";
|
|
77
|
+
const _PPTLE = "PackedPolicyTooLargeException";
|
|
78
|
+
const _Pr = "Provider";
|
|
79
|
+
const _RA = "RoleArn";
|
|
80
|
+
const _RDE = "RegionDisabledException";
|
|
81
|
+
const _RSN = "RoleSessionName";
|
|
82
|
+
const _S = "Subject";
|
|
83
|
+
const _SA = "SigningAlgorithm";
|
|
84
|
+
const _SAK = "SecretAccessKey";
|
|
85
|
+
const _SAMLA = "SAMLAssertion";
|
|
86
|
+
const _SAMLAT = "SAMLAssertionType";
|
|
87
|
+
const _SDEE = "SessionDurationEscalationException";
|
|
88
|
+
const _SFWIT = "SubjectFromWebIdentityToken";
|
|
89
|
+
const _SI = "SourceIdentity";
|
|
90
|
+
const _SN = "SerialNumber";
|
|
91
|
+
const _ST = "SubjectType";
|
|
92
|
+
const _STe = "SessionToken";
|
|
93
|
+
const _T = "Tags";
|
|
94
|
+
const _TC = "TokenCode";
|
|
95
|
+
const _TIT = "TradeInToken";
|
|
96
|
+
const _TP = "TargetPrincipal";
|
|
97
|
+
const _TPA = "TaskPolicyArn";
|
|
98
|
+
const _TTK = "TransitiveTagKeys";
|
|
99
|
+
const _Ta = "Tag";
|
|
100
|
+
const _UI = "UserId";
|
|
101
|
+
const _V = "Value";
|
|
102
|
+
const _WIT = "WebIdentityToken";
|
|
103
|
+
const _a = "arn";
|
|
104
|
+
const _aKST = "accessKeySecretType";
|
|
105
|
+
const _aQE = "awsQueryError";
|
|
106
|
+
const _c = "client";
|
|
107
|
+
const _cTT = "clientTokenType";
|
|
108
|
+
const _e = "error";
|
|
109
|
+
const _hE = "httpError";
|
|
110
|
+
const _m = "message";
|
|
111
|
+
const _pDLT = "policyDescriptorListType";
|
|
112
|
+
const _s = "smithy.ts.sdk.synthetic.com.amazonaws.sts";
|
|
113
|
+
const _tITT = "tradeInTokenType";
|
|
114
|
+
const _tLT = "tagListType";
|
|
115
|
+
const _wITT = "webIdentityTokenType";
|
|
116
|
+
const n0 = "com.amazonaws.sts";
|
|
117
|
+
const schema_1 = require("@smithy/core/schema");
|
|
118
|
+
const errors_1 = require("../models/errors");
|
|
119
|
+
const STSServiceException_1 = require("../models/STSServiceException");
|
|
120
|
+
const _s_registry = schema_1.TypeRegistry.for(_s);
|
|
121
|
+
exports.STSServiceException$ = [-3, _s, "STSServiceException", 0, [], []];
|
|
122
|
+
_s_registry.registerError(exports.STSServiceException$, STSServiceException_1.STSServiceException);
|
|
123
|
+
const n0_registry = schema_1.TypeRegistry.for(n0);
|
|
124
|
+
exports.ExpiredTokenException$ = [-3, n0, _ETE,
|
|
125
|
+
{ [_aQE]: [`ExpiredTokenException`, 400], [_e]: _c, [_hE]: 400 },
|
|
126
|
+
[_m],
|
|
127
|
+
[0]
|
|
128
|
+
];
|
|
129
|
+
n0_registry.registerError(exports.ExpiredTokenException$, errors_1.ExpiredTokenException);
|
|
130
|
+
exports.ExpiredTradeInTokenException$ = [-3, n0, _ETITE,
|
|
131
|
+
{ [_aQE]: [`ExpiredTradeInTokenException`, 400], [_e]: _c, [_hE]: 400 },
|
|
132
|
+
[_m],
|
|
133
|
+
[0]
|
|
134
|
+
];
|
|
135
|
+
n0_registry.registerError(exports.ExpiredTradeInTokenException$, errors_1.ExpiredTradeInTokenException);
|
|
136
|
+
exports.IDPCommunicationErrorException$ = [-3, n0, _IDPCEE,
|
|
137
|
+
{ [_aQE]: [`IDPCommunicationError`, 400], [_e]: _c, [_hE]: 400 },
|
|
138
|
+
[_m],
|
|
139
|
+
[0]
|
|
140
|
+
];
|
|
141
|
+
n0_registry.registerError(exports.IDPCommunicationErrorException$, errors_1.IDPCommunicationErrorException);
|
|
142
|
+
exports.IDPRejectedClaimException$ = [-3, n0, _IDPRCE,
|
|
143
|
+
{ [_aQE]: [`IDPRejectedClaim`, 403], [_e]: _c, [_hE]: 403 },
|
|
144
|
+
[_m],
|
|
145
|
+
[0]
|
|
146
|
+
];
|
|
147
|
+
n0_registry.registerError(exports.IDPRejectedClaimException$, errors_1.IDPRejectedClaimException);
|
|
148
|
+
exports.InvalidAuthorizationMessageException$ = [-3, n0, _IAME,
|
|
149
|
+
{ [_aQE]: [`InvalidAuthorizationMessageException`, 400], [_e]: _c, [_hE]: 400 },
|
|
150
|
+
[_m],
|
|
151
|
+
[0]
|
|
152
|
+
];
|
|
153
|
+
n0_registry.registerError(exports.InvalidAuthorizationMessageException$, errors_1.InvalidAuthorizationMessageException);
|
|
154
|
+
exports.InvalidIdentityTokenException$ = [-3, n0, _IITE,
|
|
155
|
+
{ [_aQE]: [`InvalidIdentityToken`, 400], [_e]: _c, [_hE]: 400 },
|
|
156
|
+
[_m],
|
|
157
|
+
[0]
|
|
158
|
+
];
|
|
159
|
+
n0_registry.registerError(exports.InvalidIdentityTokenException$, errors_1.InvalidIdentityTokenException);
|
|
160
|
+
exports.JWTPayloadSizeExceededException$ = [-3, n0, _JWTPSEE,
|
|
161
|
+
{ [_aQE]: [`JWTPayloadSizeExceededException`, 400], [_e]: _c, [_hE]: 400 },
|
|
162
|
+
[_m],
|
|
163
|
+
[0]
|
|
164
|
+
];
|
|
165
|
+
n0_registry.registerError(exports.JWTPayloadSizeExceededException$, errors_1.JWTPayloadSizeExceededException);
|
|
166
|
+
exports.MalformedPolicyDocumentException$ = [-3, n0, _MPDE,
|
|
167
|
+
{ [_aQE]: [`MalformedPolicyDocument`, 400], [_e]: _c, [_hE]: 400 },
|
|
168
|
+
[_m],
|
|
169
|
+
[0]
|
|
170
|
+
];
|
|
171
|
+
n0_registry.registerError(exports.MalformedPolicyDocumentException$, errors_1.MalformedPolicyDocumentException);
|
|
172
|
+
exports.OutboundWebIdentityFederationDisabledException$ = [-3, n0, _OWIFDE,
|
|
173
|
+
{ [_aQE]: [`OutboundWebIdentityFederationDisabledException`, 403], [_e]: _c, [_hE]: 403 },
|
|
174
|
+
[_m],
|
|
175
|
+
[0]
|
|
176
|
+
];
|
|
177
|
+
n0_registry.registerError(exports.OutboundWebIdentityFederationDisabledException$, errors_1.OutboundWebIdentityFederationDisabledException);
|
|
178
|
+
exports.PackedPolicyTooLargeException$ = [-3, n0, _PPTLE,
|
|
179
|
+
{ [_aQE]: [`PackedPolicyTooLarge`, 400], [_e]: _c, [_hE]: 400 },
|
|
180
|
+
[_m],
|
|
181
|
+
[0]
|
|
182
|
+
];
|
|
183
|
+
n0_registry.registerError(exports.PackedPolicyTooLargeException$, errors_1.PackedPolicyTooLargeException);
|
|
184
|
+
exports.RegionDisabledException$ = [-3, n0, _RDE,
|
|
185
|
+
{ [_aQE]: [`RegionDisabledException`, 403], [_e]: _c, [_hE]: 403 },
|
|
186
|
+
[_m],
|
|
187
|
+
[0]
|
|
188
|
+
];
|
|
189
|
+
n0_registry.registerError(exports.RegionDisabledException$, errors_1.RegionDisabledException);
|
|
190
|
+
exports.SessionDurationEscalationException$ = [-3, n0, _SDEE,
|
|
191
|
+
{ [_aQE]: [`SessionDurationEscalationException`, 403], [_e]: _c, [_hE]: 403 },
|
|
192
|
+
[_m],
|
|
193
|
+
[0]
|
|
194
|
+
];
|
|
195
|
+
n0_registry.registerError(exports.SessionDurationEscalationException$, errors_1.SessionDurationEscalationException);
|
|
196
|
+
exports.errorTypeRegistries = [
|
|
197
|
+
_s_registry,
|
|
198
|
+
n0_registry,
|
|
199
|
+
];
|
|
200
|
+
var accessKeySecretType = [0, n0, _aKST, 8, 0];
|
|
201
|
+
var clientTokenType = [0, n0, _cTT, 8, 0];
|
|
202
|
+
var SAMLAssertionType = [0, n0, _SAMLAT, 8, 0];
|
|
203
|
+
var tradeInTokenType = [0, n0, _tITT, 8, 0];
|
|
204
|
+
var webIdentityTokenType = [0, n0, _wITT, 8, 0];
|
|
205
|
+
exports.AssumedRoleUser$ = [3, n0, _ARU,
|
|
206
|
+
0,
|
|
207
|
+
[_ARI, _A],
|
|
208
|
+
[0, 0], 2
|
|
209
|
+
];
|
|
210
|
+
exports.AssumeRoleRequest$ = [3, n0, _ARR,
|
|
211
|
+
0,
|
|
212
|
+
[_RA, _RSN, _PA, _P, _DS, _T, _TTK, _EI, _SN, _TC, _SI, _PC],
|
|
213
|
+
[0, 0, () => policyDescriptorListType, 0, 1, () => tagListType, 64 | 0, 0, 0, 0, 0, () => ProvidedContextsListType], 2
|
|
214
|
+
];
|
|
215
|
+
exports.AssumeRoleResponse$ = [3, n0, _ARRs,
|
|
216
|
+
0,
|
|
217
|
+
[_C, _ARU, _PPS, _SI],
|
|
218
|
+
[[() => exports.Credentials$, 0], () => exports.AssumedRoleUser$, 1, 0]
|
|
219
|
+
];
|
|
220
|
+
exports.AssumeRoleWithSAMLRequest$ = [3, n0, _ARWSAMLR,
|
|
221
|
+
0,
|
|
222
|
+
[_RA, _PAr, _SAMLA, _PA, _P, _DS],
|
|
223
|
+
[0, 0, [() => SAMLAssertionType, 0], () => policyDescriptorListType, 0, 1], 3
|
|
224
|
+
];
|
|
225
|
+
exports.AssumeRoleWithSAMLResponse$ = [3, n0, _ARWSAMLRs,
|
|
226
|
+
0,
|
|
227
|
+
[_C, _ARU, _PPS, _S, _ST, _I, _Au, _NQ, _SI],
|
|
228
|
+
[[() => exports.Credentials$, 0], () => exports.AssumedRoleUser$, 1, 0, 0, 0, 0, 0, 0]
|
|
229
|
+
];
|
|
230
|
+
exports.AssumeRoleWithWebIdentityRequest$ = [3, n0, _ARWWIR,
|
|
231
|
+
0,
|
|
232
|
+
[_RA, _RSN, _WIT, _PI, _PA, _P, _DS],
|
|
233
|
+
[0, 0, [() => clientTokenType, 0], 0, () => policyDescriptorListType, 0, 1], 3
|
|
234
|
+
];
|
|
235
|
+
exports.AssumeRoleWithWebIdentityResponse$ = [3, n0, _ARWWIRs,
|
|
236
|
+
0,
|
|
237
|
+
[_C, _SFWIT, _ARU, _PPS, _Pr, _Au, _SI],
|
|
238
|
+
[[() => exports.Credentials$, 0], 0, () => exports.AssumedRoleUser$, 1, 0, 0, 0]
|
|
239
|
+
];
|
|
240
|
+
exports.AssumeRootRequest$ = [3, n0, _ARRss,
|
|
241
|
+
0,
|
|
242
|
+
[_TP, _TPA, _DS],
|
|
243
|
+
[0, () => exports.PolicyDescriptorType$, 1], 2
|
|
244
|
+
];
|
|
245
|
+
exports.AssumeRootResponse$ = [3, n0, _ARRssu,
|
|
246
|
+
0,
|
|
247
|
+
[_C, _SI],
|
|
248
|
+
[[() => exports.Credentials$, 0], 0]
|
|
249
|
+
];
|
|
250
|
+
exports.Credentials$ = [3, n0, _C,
|
|
251
|
+
0,
|
|
252
|
+
[_AKI, _SAK, _STe, _E],
|
|
253
|
+
[0, [() => accessKeySecretType, 0], 0, 4], 4
|
|
254
|
+
];
|
|
255
|
+
exports.DecodeAuthorizationMessageRequest$ = [3, n0, _DAMR,
|
|
256
|
+
0,
|
|
257
|
+
[_EM],
|
|
258
|
+
[0], 1
|
|
259
|
+
];
|
|
260
|
+
exports.DecodeAuthorizationMessageResponse$ = [3, n0, _DAMRe,
|
|
261
|
+
0,
|
|
262
|
+
[_DM],
|
|
263
|
+
[0]
|
|
264
|
+
];
|
|
265
|
+
exports.FederatedUser$ = [3, n0, _FU,
|
|
266
|
+
0,
|
|
267
|
+
[_FUI, _A],
|
|
268
|
+
[0, 0], 2
|
|
269
|
+
];
|
|
270
|
+
exports.GetAccessKeyInfoRequest$ = [3, n0, _GAKIR,
|
|
271
|
+
0,
|
|
272
|
+
[_AKI],
|
|
273
|
+
[0], 1
|
|
274
|
+
];
|
|
275
|
+
exports.GetAccessKeyInfoResponse$ = [3, n0, _GAKIRe,
|
|
276
|
+
0,
|
|
277
|
+
[_Ac],
|
|
278
|
+
[0]
|
|
279
|
+
];
|
|
280
|
+
exports.GetCallerIdentityRequest$ = [3, n0, _GCIR,
|
|
281
|
+
0,
|
|
282
|
+
[],
|
|
283
|
+
[]
|
|
284
|
+
];
|
|
285
|
+
exports.GetCallerIdentityResponse$ = [3, n0, _GCIRe,
|
|
286
|
+
0,
|
|
287
|
+
[_UI, _Ac, _A],
|
|
288
|
+
[0, 0, 0]
|
|
289
|
+
];
|
|
290
|
+
exports.GetDelegatedAccessTokenRequest$ = [3, n0, _GDATR,
|
|
291
|
+
0,
|
|
292
|
+
[_TIT],
|
|
293
|
+
[[() => tradeInTokenType, 0]], 1
|
|
294
|
+
];
|
|
295
|
+
exports.GetDelegatedAccessTokenResponse$ = [3, n0, _GDATRe,
|
|
296
|
+
0,
|
|
297
|
+
[_C, _PPS, _AP],
|
|
298
|
+
[[() => exports.Credentials$, 0], 1, 0]
|
|
299
|
+
];
|
|
300
|
+
exports.GetFederationTokenRequest$ = [3, n0, _GFTR,
|
|
301
|
+
0,
|
|
302
|
+
[_N, _P, _PA, _DS, _T],
|
|
303
|
+
[0, 0, () => policyDescriptorListType, 1, () => tagListType], 1
|
|
304
|
+
];
|
|
305
|
+
exports.GetFederationTokenResponse$ = [3, n0, _GFTRe,
|
|
306
|
+
0,
|
|
307
|
+
[_C, _FU, _PPS],
|
|
308
|
+
[[() => exports.Credentials$, 0], () => exports.FederatedUser$, 1]
|
|
309
|
+
];
|
|
310
|
+
exports.GetSessionTokenRequest$ = [3, n0, _GSTR,
|
|
311
|
+
0,
|
|
312
|
+
[_DS, _SN, _TC],
|
|
313
|
+
[1, 0, 0]
|
|
314
|
+
];
|
|
315
|
+
exports.GetSessionTokenResponse$ = [3, n0, _GSTRe,
|
|
316
|
+
0,
|
|
317
|
+
[_C],
|
|
318
|
+
[[() => exports.Credentials$, 0]]
|
|
319
|
+
];
|
|
320
|
+
exports.GetWebIdentityTokenRequest$ = [3, n0, _GWITR,
|
|
321
|
+
0,
|
|
322
|
+
[_Au, _SA, _DS, _T],
|
|
323
|
+
[64 | 0, 0, 1, () => tagListType], 2
|
|
324
|
+
];
|
|
325
|
+
exports.GetWebIdentityTokenResponse$ = [3, n0, _GWITRe,
|
|
326
|
+
0,
|
|
327
|
+
[_WIT, _E],
|
|
328
|
+
[[() => webIdentityTokenType, 0], 4]
|
|
329
|
+
];
|
|
330
|
+
exports.PolicyDescriptorType$ = [3, n0, _PDT,
|
|
331
|
+
0,
|
|
332
|
+
[_a],
|
|
333
|
+
[0]
|
|
334
|
+
];
|
|
335
|
+
exports.ProvidedContext$ = [3, n0, _PCr,
|
|
336
|
+
0,
|
|
337
|
+
[_PAro, _CA],
|
|
338
|
+
[0, 0]
|
|
339
|
+
];
|
|
340
|
+
exports.Tag$ = [3, n0, _Ta,
|
|
341
|
+
0,
|
|
342
|
+
[_K, _V],
|
|
343
|
+
[0, 0], 2
|
|
344
|
+
];
|
|
345
|
+
var policyDescriptorListType = [1, n0, _pDLT,
|
|
346
|
+
0, () => exports.PolicyDescriptorType$
|
|
347
|
+
];
|
|
348
|
+
var ProvidedContextsListType = [1, n0, _PCLT,
|
|
349
|
+
0, () => exports.ProvidedContext$
|
|
350
|
+
];
|
|
351
|
+
var tagKeyListType = 64 | 0;
|
|
352
|
+
var tagListType = [1, n0, _tLT,
|
|
353
|
+
0, () => exports.Tag$
|
|
354
|
+
];
|
|
355
|
+
var webIdentityTokenAudienceListType = 64 | 0;
|
|
356
|
+
exports.AssumeRole$ = [9, n0, _AR,
|
|
357
|
+
0, () => exports.AssumeRoleRequest$, () => exports.AssumeRoleResponse$
|
|
358
|
+
];
|
|
359
|
+
exports.AssumeRoleWithSAML$ = [9, n0, _ARWSAML,
|
|
360
|
+
0, () => exports.AssumeRoleWithSAMLRequest$, () => exports.AssumeRoleWithSAMLResponse$
|
|
361
|
+
];
|
|
362
|
+
exports.AssumeRoleWithWebIdentity$ = [9, n0, _ARWWI,
|
|
363
|
+
0, () => exports.AssumeRoleWithWebIdentityRequest$, () => exports.AssumeRoleWithWebIdentityResponse$
|
|
364
|
+
];
|
|
365
|
+
exports.AssumeRoot$ = [9, n0, _ARs,
|
|
366
|
+
0, () => exports.AssumeRootRequest$, () => exports.AssumeRootResponse$
|
|
367
|
+
];
|
|
368
|
+
exports.DecodeAuthorizationMessage$ = [9, n0, _DAM,
|
|
369
|
+
0, () => exports.DecodeAuthorizationMessageRequest$, () => exports.DecodeAuthorizationMessageResponse$
|
|
370
|
+
];
|
|
371
|
+
exports.GetAccessKeyInfo$ = [9, n0, _GAKI,
|
|
372
|
+
0, () => exports.GetAccessKeyInfoRequest$, () => exports.GetAccessKeyInfoResponse$
|
|
373
|
+
];
|
|
374
|
+
exports.GetCallerIdentity$ = [9, n0, _GCI,
|
|
375
|
+
0, () => exports.GetCallerIdentityRequest$, () => exports.GetCallerIdentityResponse$
|
|
376
|
+
];
|
|
377
|
+
exports.GetDelegatedAccessToken$ = [9, n0, _GDAT,
|
|
378
|
+
0, () => exports.GetDelegatedAccessTokenRequest$, () => exports.GetDelegatedAccessTokenResponse$
|
|
379
|
+
];
|
|
380
|
+
exports.GetFederationToken$ = [9, n0, _GFT,
|
|
381
|
+
0, () => exports.GetFederationTokenRequest$, () => exports.GetFederationTokenResponse$
|
|
382
|
+
];
|
|
383
|
+
exports.GetSessionToken$ = [9, n0, _GST,
|
|
384
|
+
0, () => exports.GetSessionTokenRequest$, () => exports.GetSessionTokenResponse$
|
|
385
|
+
];
|
|
386
|
+
exports.GetWebIdentityToken$ = [9, n0, _GWIT,
|
|
387
|
+
0, () => exports.GetWebIdentityTokenRequest$, () => exports.GetWebIdentityTokenResponse$
|
|
388
|
+
];
|
|
@@ -7,6 +7,7 @@ import { fromBase64, toBase64 } from "@smithy/util-base64";
|
|
|
7
7
|
import { fromUtf8, toUtf8 } from "@smithy/util-utf8";
|
|
8
8
|
import { defaultSTSHttpAuthSchemeProvider } from "./auth/httpAuthSchemeProvider";
|
|
9
9
|
import { defaultEndpointResolver } from "./endpoint/endpointResolver";
|
|
10
|
+
import { errorTypeRegistries } from "./schemas/schemas_0";
|
|
10
11
|
export const getRuntimeConfig = (config) => {
|
|
11
12
|
return {
|
|
12
13
|
apiVersion: "2011-06-15",
|
|
@@ -32,6 +33,7 @@ export const getRuntimeConfig = (config) => {
|
|
|
32
33
|
protocol: config?.protocol ?? AwsQueryProtocol,
|
|
33
34
|
protocolSettings: config?.protocolSettings ?? {
|
|
34
35
|
defaultNamespace: "com.amazonaws.sts",
|
|
36
|
+
errorTypeRegistries,
|
|
35
37
|
xmlNamespace: "https://sts.amazonaws.com/doc/2011-06-15/",
|
|
36
38
|
version: "2011-06-15",
|
|
37
39
|
serviceTarget: "AWSSecurityTokenServiceV20110615",
|