@aws-sdk/nested-clients 3.730.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +13 -0
- package/dist-cjs/index.js +2 -0
- package/dist-cjs/submodules/sso-oidc/auth/httpAuthSchemeProvider.js +56 -0
- package/dist-cjs/submodules/sso-oidc/endpoint/endpointResolver.js +18 -0
- package/dist-cjs/submodules/sso-oidc/endpoint/ruleset.js +106 -0
- package/dist-cjs/submodules/sso-oidc/index.js +804 -0
- package/dist-cjs/submodules/sso-oidc/runtimeConfig.browser.js +38 -0
- package/dist-cjs/submodules/sso-oidc/runtimeConfig.js +50 -0
- package/dist-cjs/submodules/sso-oidc/runtimeConfig.native.js +15 -0
- package/dist-cjs/submodules/sso-oidc/runtimeConfig.shared.js +40 -0
- package/dist-cjs/submodules/sts/STSClient.js +51 -0
- package/dist-cjs/submodules/sts/auth/httpAuthExtensionConfiguration.js +43 -0
- package/dist-cjs/submodules/sts/auth/httpAuthSchemeProvider.js +63 -0
- package/dist-cjs/submodules/sts/endpoint/EndpointParameters.js +20 -0
- package/dist-cjs/submodules/sts/endpoint/endpointResolver.js +18 -0
- package/dist-cjs/submodules/sts/endpoint/ruleset.js +145 -0
- package/dist-cjs/submodules/sts/index.js +950 -0
- package/dist-cjs/submodules/sts/runtimeConfig.browser.js +39 -0
- package/dist-cjs/submodules/sts/runtimeConfig.js +64 -0
- package/dist-cjs/submodules/sts/runtimeConfig.native.js +15 -0
- package/dist-cjs/submodules/sts/runtimeConfig.shared.js +40 -0
- package/dist-cjs/submodules/sts/runtimeExtensions.js +25 -0
- package/dist-es/index.js +1 -0
- package/dist-es/submodules/sso-oidc/SSOOIDC.js +9 -0
- package/dist-es/submodules/sso-oidc/SSOOIDCClient.js +47 -0
- package/dist-es/submodules/sso-oidc/auth/httpAuthExtensionConfiguration.js +38 -0
- package/dist-es/submodules/sso-oidc/auth/httpAuthSchemeProvider.js +50 -0
- package/dist-es/submodules/sso-oidc/commands/CreateTokenCommand.js +23 -0
- package/dist-es/submodules/sso-oidc/commands/index.js +1 -0
- package/dist-es/submodules/sso-oidc/endpoint/EndpointParameters.js +14 -0
- package/dist-es/submodules/sso-oidc/endpoint/endpointResolver.js +14 -0
- package/dist-es/submodules/sso-oidc/endpoint/ruleset.js +103 -0
- package/dist-es/submodules/sso-oidc/extensionConfiguration.js +1 -0
- package/dist-es/submodules/sso-oidc/index.js +5 -0
- package/dist-es/submodules/sso-oidc/models/SSOOIDCServiceException.js +8 -0
- package/dist-es/submodules/sso-oidc/models/index.js +1 -0
- package/dist-es/submodules/sso-oidc/models/models_0.js +190 -0
- package/dist-es/submodules/sso-oidc/protocols/Aws_restJson1.js +255 -0
- package/dist-es/submodules/sso-oidc/runtimeConfig.browser.js +33 -0
- package/dist-es/submodules/sso-oidc/runtimeConfig.js +45 -0
- package/dist-es/submodules/sso-oidc/runtimeConfig.native.js +11 -0
- package/dist-es/submodules/sso-oidc/runtimeConfig.shared.js +36 -0
- package/dist-es/submodules/sso-oidc/runtimeExtensions.js +21 -0
- package/dist-es/submodules/sts/STS.js +11 -0
- package/dist-es/submodules/sts/STSClient.js +47 -0
- package/dist-es/submodules/sts/auth/httpAuthExtensionConfiguration.js +38 -0
- package/dist-es/submodules/sts/auth/httpAuthSchemeProvider.js +56 -0
- package/dist-es/submodules/sts/commands/AssumeRoleCommand.js +23 -0
- package/dist-es/submodules/sts/commands/AssumeRoleWithWebIdentityCommand.js +23 -0
- package/dist-es/submodules/sts/commands/index.js +2 -0
- package/dist-es/submodules/sts/defaultRoleAssumers.js +22 -0
- package/dist-es/submodules/sts/defaultStsRoleAssumers.js +93 -0
- package/dist-es/submodules/sts/endpoint/EndpointParameters.js +16 -0
- package/dist-es/submodules/sts/endpoint/endpointResolver.js +14 -0
- package/dist-es/submodules/sts/endpoint/ruleset.js +142 -0
- package/dist-es/submodules/sts/extensionConfiguration.js +1 -0
- package/dist-es/submodules/sts/index.js +6 -0
- package/dist-es/submodules/sts/models/STSServiceException.js +8 -0
- package/dist-es/submodules/sts/models/index.js +1 -0
- package/dist-es/submodules/sts/models/models_0.js +102 -0
- package/dist-es/submodules/sts/protocols/Aws_query.js +528 -0
- package/dist-es/submodules/sts/runtimeConfig.browser.js +34 -0
- package/dist-es/submodules/sts/runtimeConfig.js +59 -0
- package/dist-es/submodules/sts/runtimeConfig.native.js +11 -0
- package/dist-es/submodules/sts/runtimeConfig.shared.js +36 -0
- package/dist-es/submodules/sts/runtimeExtensions.js +21 -0
- package/dist-types/index.d.ts +6 -0
- package/dist-types/submodules/sso-oidc/SSOOIDC.d.ts +54 -0
- package/dist-types/submodules/sso-oidc/SSOOIDCClient.d.ts +219 -0
- package/dist-types/submodules/sso-oidc/auth/httpAuthExtensionConfiguration.d.ts +29 -0
- package/dist-types/submodules/sso-oidc/auth/httpAuthSchemeProvider.d.ts +61 -0
- package/dist-types/submodules/sso-oidc/commands/CreateTokenCommand.d.ts +128 -0
- package/dist-types/submodules/sso-oidc/commands/index.d.ts +1 -0
- package/dist-types/submodules/sso-oidc/endpoint/EndpointParameters.d.ts +40 -0
- package/dist-types/submodules/sso-oidc/endpoint/endpointResolver.d.ts +5 -0
- package/dist-types/submodules/sso-oidc/endpoint/ruleset.d.ts +2 -0
- package/dist-types/submodules/sso-oidc/extensionConfiguration.d.ts +9 -0
- package/dist-types/submodules/sso-oidc/index.d.ts +50 -0
- package/dist-types/submodules/sso-oidc/models/SSOOIDCServiceException.d.ts +14 -0
- package/dist-types/submodules/sso-oidc/models/index.d.ts +1 -0
- package/dist-types/submodules/sso-oidc/models/models_0.d.ts +396 -0
- package/dist-types/submodules/sso-oidc/protocols/Aws_restJson1.d.ts +11 -0
- package/dist-types/submodules/sso-oidc/runtimeConfig.browser.d.ts +56 -0
- package/dist-types/submodules/sso-oidc/runtimeConfig.d.ts +56 -0
- package/dist-types/submodules/sso-oidc/runtimeConfig.native.d.ts +55 -0
- package/dist-types/submodules/sso-oidc/runtimeConfig.shared.d.ts +32 -0
- package/dist-types/submodules/sso-oidc/runtimeExtensions.d.ts +17 -0
- package/dist-types/submodules/sts/STS.d.ts +27 -0
- package/dist-types/submodules/sts/STSClient.d.ts +192 -0
- package/dist-types/submodules/sts/auth/httpAuthExtensionConfiguration.d.ts +29 -0
- package/dist-types/submodules/sts/auth/httpAuthSchemeProvider.d.ts +71 -0
- package/dist-types/submodules/sts/commands/AssumeRoleCommand.d.ts +222 -0
- package/dist-types/submodules/sts/commands/AssumeRoleWithWebIdentityCommand.d.ts +254 -0
- package/dist-types/submodules/sts/commands/index.d.ts +2 -0
- package/dist-types/submodules/sts/defaultRoleAssumers.d.ts +23 -0
- package/dist-types/submodules/sts/defaultStsRoleAssumers.d.ts +43 -0
- package/dist-types/submodules/sts/endpoint/EndpointParameters.d.ts +46 -0
- package/dist-types/submodules/sts/endpoint/endpointResolver.d.ts +5 -0
- package/dist-types/submodules/sts/endpoint/ruleset.d.ts +2 -0
- package/dist-types/submodules/sts/extensionConfiguration.d.ts +9 -0
- package/dist-types/submodules/sts/index.d.ts +17 -0
- package/dist-types/submodules/sts/models/STSServiceException.d.ts +14 -0
- package/dist-types/submodules/sts/models/index.d.ts +1 -0
- package/dist-types/submodules/sts/models/models_0.d.ts +712 -0
- package/dist-types/submodules/sts/protocols/Aws_query.d.ts +20 -0
- package/dist-types/submodules/sts/runtimeConfig.browser.d.ts +58 -0
- package/dist-types/submodules/sts/runtimeConfig.d.ts +56 -0
- package/dist-types/submodules/sts/runtimeConfig.native.d.ts +57 -0
- package/dist-types/submodules/sts/runtimeConfig.shared.d.ts +32 -0
- package/dist-types/submodules/sts/runtimeExtensions.d.ts +17 -0
- package/dist-types/ts3.4/index.d.ts +1 -0
- package/dist-types/ts3.4/submodules/sso-oidc/SSOOIDC.d.ts +22 -0
- package/dist-types/ts3.4/submodules/sso-oidc/SSOOIDCClient.d.ts +121 -0
- package/dist-types/ts3.4/submodules/sso-oidc/auth/httpAuthExtensionConfiguration.d.ts +32 -0
- package/dist-types/ts3.4/submodules/sso-oidc/auth/httpAuthSchemeProvider.d.ts +44 -0
- package/dist-types/ts3.4/submodules/sso-oidc/commands/CreateTokenCommand.d.ts +43 -0
- package/dist-types/ts3.4/submodules/sso-oidc/commands/index.d.ts +1 -0
- package/dist-types/ts3.4/submodules/sso-oidc/endpoint/EndpointParameters.d.ts +51 -0
- package/dist-types/ts3.4/submodules/sso-oidc/endpoint/endpointResolver.d.ts +8 -0
- package/dist-types/ts3.4/submodules/sso-oidc/endpoint/ruleset.d.ts +2 -0
- package/dist-types/ts3.4/submodules/sso-oidc/extensionConfiguration.d.ts +9 -0
- package/dist-types/ts3.4/submodules/sso-oidc/index.d.ts +8 -0
- package/dist-types/ts3.4/submodules/sso-oidc/models/SSOOIDCServiceException.d.ts +9 -0
- package/dist-types/ts3.4/submodules/sso-oidc/models/index.d.ts +1 -0
- package/dist-types/ts3.4/submodules/sso-oidc/models/models_0.d.ts +123 -0
- package/dist-types/ts3.4/submodules/sso-oidc/protocols/Aws_restJson1.d.ts +17 -0
- package/dist-types/ts3.4/submodules/sso-oidc/runtimeConfig.browser.d.ts +116 -0
- package/dist-types/ts3.4/submodules/sso-oidc/runtimeConfig.d.ts +113 -0
- package/dist-types/ts3.4/submodules/sso-oidc/runtimeConfig.native.d.ts +120 -0
- package/dist-types/ts3.4/submodules/sso-oidc/runtimeConfig.shared.d.ts +49 -0
- package/dist-types/ts3.4/submodules/sso-oidc/runtimeExtensions.d.ts +11 -0
- package/dist-types/ts3.4/submodules/sts/STS.d.ts +39 -0
- package/dist-types/ts3.4/submodules/sts/STSClient.d.ts +128 -0
- package/dist-types/ts3.4/submodules/sts/auth/httpAuthExtensionConfiguration.d.ts +32 -0
- package/dist-types/ts3.4/submodules/sts/auth/httpAuthSchemeProvider.d.ts +54 -0
- package/dist-types/ts3.4/submodules/sts/commands/AssumeRoleCommand.d.ts +47 -0
- package/dist-types/ts3.4/submodules/sts/commands/AssumeRoleWithWebIdentityCommand.d.ts +51 -0
- package/dist-types/ts3.4/submodules/sts/commands/index.d.ts +2 -0
- package/dist-types/ts3.4/submodules/sts/defaultRoleAssumers.d.ts +19 -0
- package/dist-types/ts3.4/submodules/sts/defaultStsRoleAssumers.d.ts +33 -0
- package/dist-types/ts3.4/submodules/sts/endpoint/EndpointParameters.d.ts +57 -0
- package/dist-types/ts3.4/submodules/sts/endpoint/endpointResolver.d.ts +8 -0
- package/dist-types/ts3.4/submodules/sts/endpoint/ruleset.d.ts +2 -0
- package/dist-types/ts3.4/submodules/sts/extensionConfiguration.d.ts +9 -0
- package/dist-types/ts3.4/submodules/sts/index.d.ts +9 -0
- package/dist-types/ts3.4/submodules/sts/models/STSServiceException.d.ts +9 -0
- package/dist-types/ts3.4/submodules/sts/models/index.d.ts +1 -0
- package/dist-types/ts3.4/submodules/sts/models/models_0.d.ts +123 -0
- package/dist-types/ts3.4/submodules/sts/protocols/Aws_query.d.ts +29 -0
- package/dist-types/ts3.4/submodules/sts/runtimeConfig.browser.d.ts +127 -0
- package/dist-types/ts3.4/submodules/sts/runtimeConfig.d.ts +111 -0
- package/dist-types/ts3.4/submodules/sts/runtimeConfig.native.d.ts +131 -0
- package/dist-types/ts3.4/submodules/sts/runtimeConfig.shared.d.ts +51 -0
- package/dist-types/ts3.4/submodules/sts/runtimeExtensions.d.ts +11 -0
- package/package.json +115 -0
- package/sso-oidc.d.ts +7 -0
- package/sso-oidc.js +5 -0
- package/sts.d.ts +7 -0
- package/sts.js +5 -0
|
@@ -0,0 +1,950 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __defProp = Object.defineProperty;
|
|
3
|
+
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
|
|
4
|
+
var __getOwnPropNames = Object.getOwnPropertyNames;
|
|
5
|
+
var __hasOwnProp = Object.prototype.hasOwnProperty;
|
|
6
|
+
var __name = (target, value) => __defProp(target, "name", { value, configurable: true });
|
|
7
|
+
var __export = (target, all) => {
|
|
8
|
+
for (var name in all)
|
|
9
|
+
__defProp(target, name, { get: all[name], enumerable: true });
|
|
10
|
+
};
|
|
11
|
+
var __copyProps = (to, from, except, desc) => {
|
|
12
|
+
if (from && typeof from === "object" || typeof from === "function") {
|
|
13
|
+
for (let key of __getOwnPropNames(from))
|
|
14
|
+
if (!__hasOwnProp.call(to, key) && key !== except)
|
|
15
|
+
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
|
|
16
|
+
}
|
|
17
|
+
return to;
|
|
18
|
+
};
|
|
19
|
+
var __reExport = (target, mod, secondTarget) => (__copyProps(target, mod, "default"), secondTarget && __copyProps(secondTarget, mod, "default"));
|
|
20
|
+
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
21
|
+
|
|
22
|
+
// src/submodules/sts/index.ts
|
|
23
|
+
var sts_exports = {};
|
|
24
|
+
__export(sts_exports, {
|
|
25
|
+
AssumeRoleCommand: () => AssumeRoleCommand,
|
|
26
|
+
AssumeRoleResponseFilterSensitiveLog: () => AssumeRoleResponseFilterSensitiveLog,
|
|
27
|
+
AssumeRoleWithWebIdentityCommand: () => AssumeRoleWithWebIdentityCommand,
|
|
28
|
+
AssumeRoleWithWebIdentityRequestFilterSensitiveLog: () => AssumeRoleWithWebIdentityRequestFilterSensitiveLog,
|
|
29
|
+
AssumeRoleWithWebIdentityResponseFilterSensitiveLog: () => AssumeRoleWithWebIdentityResponseFilterSensitiveLog,
|
|
30
|
+
ClientInputEndpointParameters: () => import_EndpointParameters3.ClientInputEndpointParameters,
|
|
31
|
+
CredentialsFilterSensitiveLog: () => CredentialsFilterSensitiveLog,
|
|
32
|
+
ExpiredTokenException: () => ExpiredTokenException,
|
|
33
|
+
IDPCommunicationErrorException: () => IDPCommunicationErrorException,
|
|
34
|
+
IDPRejectedClaimException: () => IDPRejectedClaimException,
|
|
35
|
+
InvalidIdentityTokenException: () => InvalidIdentityTokenException,
|
|
36
|
+
MalformedPolicyDocumentException: () => MalformedPolicyDocumentException,
|
|
37
|
+
PackedPolicyTooLargeException: () => PackedPolicyTooLargeException,
|
|
38
|
+
RegionDisabledException: () => RegionDisabledException,
|
|
39
|
+
STS: () => STS,
|
|
40
|
+
STSServiceException: () => STSServiceException,
|
|
41
|
+
decorateDefaultCredentialProvider: () => decorateDefaultCredentialProvider,
|
|
42
|
+
getDefaultRoleAssumer: () => getDefaultRoleAssumer2,
|
|
43
|
+
getDefaultRoleAssumerWithWebIdentity: () => getDefaultRoleAssumerWithWebIdentity2
|
|
44
|
+
});
|
|
45
|
+
module.exports = __toCommonJS(sts_exports);
|
|
46
|
+
__reExport(sts_exports, require("./STSClient"), module.exports);
|
|
47
|
+
|
|
48
|
+
// src/submodules/sts/STS.ts
|
|
49
|
+
var import_smithy_client6 = require("@smithy/smithy-client");
|
|
50
|
+
|
|
51
|
+
// src/submodules/sts/commands/AssumeRoleCommand.ts
|
|
52
|
+
var import_middleware_endpoint = require("@smithy/middleware-endpoint");
|
|
53
|
+
var import_middleware_serde = require("@smithy/middleware-serde");
|
|
54
|
+
var import_smithy_client4 = require("@smithy/smithy-client");
|
|
55
|
+
var import_EndpointParameters = require("./endpoint/EndpointParameters");
|
|
56
|
+
|
|
57
|
+
// src/submodules/sts/models/models_0.ts
|
|
58
|
+
var import_smithy_client2 = require("@smithy/smithy-client");
|
|
59
|
+
|
|
60
|
+
// src/submodules/sts/models/STSServiceException.ts
|
|
61
|
+
var import_smithy_client = require("@smithy/smithy-client");
|
|
62
|
+
var STSServiceException = class _STSServiceException extends import_smithy_client.ServiceException {
|
|
63
|
+
static {
|
|
64
|
+
__name(this, "STSServiceException");
|
|
65
|
+
}
|
|
66
|
+
/**
|
|
67
|
+
* @internal
|
|
68
|
+
*/
|
|
69
|
+
constructor(options) {
|
|
70
|
+
super(options);
|
|
71
|
+
Object.setPrototypeOf(this, _STSServiceException.prototype);
|
|
72
|
+
}
|
|
73
|
+
};
|
|
74
|
+
|
|
75
|
+
// src/submodules/sts/models/models_0.ts
|
|
76
|
+
var CredentialsFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
77
|
+
...obj,
|
|
78
|
+
...obj.SecretAccessKey && { SecretAccessKey: import_smithy_client2.SENSITIVE_STRING }
|
|
79
|
+
}), "CredentialsFilterSensitiveLog");
|
|
80
|
+
var AssumeRoleResponseFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
81
|
+
...obj,
|
|
82
|
+
...obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }
|
|
83
|
+
}), "AssumeRoleResponseFilterSensitiveLog");
|
|
84
|
+
var ExpiredTokenException = class _ExpiredTokenException extends STSServiceException {
|
|
85
|
+
static {
|
|
86
|
+
__name(this, "ExpiredTokenException");
|
|
87
|
+
}
|
|
88
|
+
name = "ExpiredTokenException";
|
|
89
|
+
$fault = "client";
|
|
90
|
+
/**
|
|
91
|
+
* @internal
|
|
92
|
+
*/
|
|
93
|
+
constructor(opts) {
|
|
94
|
+
super({
|
|
95
|
+
name: "ExpiredTokenException",
|
|
96
|
+
$fault: "client",
|
|
97
|
+
...opts
|
|
98
|
+
});
|
|
99
|
+
Object.setPrototypeOf(this, _ExpiredTokenException.prototype);
|
|
100
|
+
}
|
|
101
|
+
};
|
|
102
|
+
var MalformedPolicyDocumentException = class _MalformedPolicyDocumentException extends STSServiceException {
|
|
103
|
+
static {
|
|
104
|
+
__name(this, "MalformedPolicyDocumentException");
|
|
105
|
+
}
|
|
106
|
+
name = "MalformedPolicyDocumentException";
|
|
107
|
+
$fault = "client";
|
|
108
|
+
/**
|
|
109
|
+
* @internal
|
|
110
|
+
*/
|
|
111
|
+
constructor(opts) {
|
|
112
|
+
super({
|
|
113
|
+
name: "MalformedPolicyDocumentException",
|
|
114
|
+
$fault: "client",
|
|
115
|
+
...opts
|
|
116
|
+
});
|
|
117
|
+
Object.setPrototypeOf(this, _MalformedPolicyDocumentException.prototype);
|
|
118
|
+
}
|
|
119
|
+
};
|
|
120
|
+
var PackedPolicyTooLargeException = class _PackedPolicyTooLargeException extends STSServiceException {
|
|
121
|
+
static {
|
|
122
|
+
__name(this, "PackedPolicyTooLargeException");
|
|
123
|
+
}
|
|
124
|
+
name = "PackedPolicyTooLargeException";
|
|
125
|
+
$fault = "client";
|
|
126
|
+
/**
|
|
127
|
+
* @internal
|
|
128
|
+
*/
|
|
129
|
+
constructor(opts) {
|
|
130
|
+
super({
|
|
131
|
+
name: "PackedPolicyTooLargeException",
|
|
132
|
+
$fault: "client",
|
|
133
|
+
...opts
|
|
134
|
+
});
|
|
135
|
+
Object.setPrototypeOf(this, _PackedPolicyTooLargeException.prototype);
|
|
136
|
+
}
|
|
137
|
+
};
|
|
138
|
+
var RegionDisabledException = class _RegionDisabledException extends STSServiceException {
|
|
139
|
+
static {
|
|
140
|
+
__name(this, "RegionDisabledException");
|
|
141
|
+
}
|
|
142
|
+
name = "RegionDisabledException";
|
|
143
|
+
$fault = "client";
|
|
144
|
+
/**
|
|
145
|
+
* @internal
|
|
146
|
+
*/
|
|
147
|
+
constructor(opts) {
|
|
148
|
+
super({
|
|
149
|
+
name: "RegionDisabledException",
|
|
150
|
+
$fault: "client",
|
|
151
|
+
...opts
|
|
152
|
+
});
|
|
153
|
+
Object.setPrototypeOf(this, _RegionDisabledException.prototype);
|
|
154
|
+
}
|
|
155
|
+
};
|
|
156
|
+
var IDPRejectedClaimException = class _IDPRejectedClaimException extends STSServiceException {
|
|
157
|
+
static {
|
|
158
|
+
__name(this, "IDPRejectedClaimException");
|
|
159
|
+
}
|
|
160
|
+
name = "IDPRejectedClaimException";
|
|
161
|
+
$fault = "client";
|
|
162
|
+
/**
|
|
163
|
+
* @internal
|
|
164
|
+
*/
|
|
165
|
+
constructor(opts) {
|
|
166
|
+
super({
|
|
167
|
+
name: "IDPRejectedClaimException",
|
|
168
|
+
$fault: "client",
|
|
169
|
+
...opts
|
|
170
|
+
});
|
|
171
|
+
Object.setPrototypeOf(this, _IDPRejectedClaimException.prototype);
|
|
172
|
+
}
|
|
173
|
+
};
|
|
174
|
+
var InvalidIdentityTokenException = class _InvalidIdentityTokenException extends STSServiceException {
|
|
175
|
+
static {
|
|
176
|
+
__name(this, "InvalidIdentityTokenException");
|
|
177
|
+
}
|
|
178
|
+
name = "InvalidIdentityTokenException";
|
|
179
|
+
$fault = "client";
|
|
180
|
+
/**
|
|
181
|
+
* @internal
|
|
182
|
+
*/
|
|
183
|
+
constructor(opts) {
|
|
184
|
+
super({
|
|
185
|
+
name: "InvalidIdentityTokenException",
|
|
186
|
+
$fault: "client",
|
|
187
|
+
...opts
|
|
188
|
+
});
|
|
189
|
+
Object.setPrototypeOf(this, _InvalidIdentityTokenException.prototype);
|
|
190
|
+
}
|
|
191
|
+
};
|
|
192
|
+
var AssumeRoleWithWebIdentityRequestFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
193
|
+
...obj,
|
|
194
|
+
...obj.WebIdentityToken && { WebIdentityToken: import_smithy_client2.SENSITIVE_STRING }
|
|
195
|
+
}), "AssumeRoleWithWebIdentityRequestFilterSensitiveLog");
|
|
196
|
+
var AssumeRoleWithWebIdentityResponseFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
197
|
+
...obj,
|
|
198
|
+
...obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }
|
|
199
|
+
}), "AssumeRoleWithWebIdentityResponseFilterSensitiveLog");
|
|
200
|
+
var IDPCommunicationErrorException = class _IDPCommunicationErrorException extends STSServiceException {
|
|
201
|
+
static {
|
|
202
|
+
__name(this, "IDPCommunicationErrorException");
|
|
203
|
+
}
|
|
204
|
+
name = "IDPCommunicationErrorException";
|
|
205
|
+
$fault = "client";
|
|
206
|
+
/**
|
|
207
|
+
* @internal
|
|
208
|
+
*/
|
|
209
|
+
constructor(opts) {
|
|
210
|
+
super({
|
|
211
|
+
name: "IDPCommunicationErrorException",
|
|
212
|
+
$fault: "client",
|
|
213
|
+
...opts
|
|
214
|
+
});
|
|
215
|
+
Object.setPrototypeOf(this, _IDPCommunicationErrorException.prototype);
|
|
216
|
+
}
|
|
217
|
+
};
|
|
218
|
+
|
|
219
|
+
// src/submodules/sts/protocols/Aws_query.ts
|
|
220
|
+
var import_core = require("@aws-sdk/core");
|
|
221
|
+
var import_protocol_http = require("@smithy/protocol-http");
|
|
222
|
+
var import_smithy_client3 = require("@smithy/smithy-client");
|
|
223
|
+
var se_AssumeRoleCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
224
|
+
const headers = SHARED_HEADERS;
|
|
225
|
+
let body;
|
|
226
|
+
body = buildFormUrlencodedString({
|
|
227
|
+
...se_AssumeRoleRequest(input, context),
|
|
228
|
+
[_A]: _AR,
|
|
229
|
+
[_V]: _
|
|
230
|
+
});
|
|
231
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
|
232
|
+
}, "se_AssumeRoleCommand");
|
|
233
|
+
var se_AssumeRoleWithWebIdentityCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
234
|
+
const headers = SHARED_HEADERS;
|
|
235
|
+
let body;
|
|
236
|
+
body = buildFormUrlencodedString({
|
|
237
|
+
...se_AssumeRoleWithWebIdentityRequest(input, context),
|
|
238
|
+
[_A]: _ARWWI,
|
|
239
|
+
[_V]: _
|
|
240
|
+
});
|
|
241
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
|
242
|
+
}, "se_AssumeRoleWithWebIdentityCommand");
|
|
243
|
+
var de_AssumeRoleCommand = /* @__PURE__ */ __name(async (output, context) => {
|
|
244
|
+
if (output.statusCode >= 300) {
|
|
245
|
+
return de_CommandError(output, context);
|
|
246
|
+
}
|
|
247
|
+
const data = await (0, import_core.parseXmlBody)(output.body, context);
|
|
248
|
+
let contents = {};
|
|
249
|
+
contents = de_AssumeRoleResponse(data.AssumeRoleResult, context);
|
|
250
|
+
const response = {
|
|
251
|
+
$metadata: deserializeMetadata(output),
|
|
252
|
+
...contents
|
|
253
|
+
};
|
|
254
|
+
return response;
|
|
255
|
+
}, "de_AssumeRoleCommand");
|
|
256
|
+
var de_AssumeRoleWithWebIdentityCommand = /* @__PURE__ */ __name(async (output, context) => {
|
|
257
|
+
if (output.statusCode >= 300) {
|
|
258
|
+
return de_CommandError(output, context);
|
|
259
|
+
}
|
|
260
|
+
const data = await (0, import_core.parseXmlBody)(output.body, context);
|
|
261
|
+
let contents = {};
|
|
262
|
+
contents = de_AssumeRoleWithWebIdentityResponse(data.AssumeRoleWithWebIdentityResult, context);
|
|
263
|
+
const response = {
|
|
264
|
+
$metadata: deserializeMetadata(output),
|
|
265
|
+
...contents
|
|
266
|
+
};
|
|
267
|
+
return response;
|
|
268
|
+
}, "de_AssumeRoleWithWebIdentityCommand");
|
|
269
|
+
var de_CommandError = /* @__PURE__ */ __name(async (output, context) => {
|
|
270
|
+
const parsedOutput = {
|
|
271
|
+
...output,
|
|
272
|
+
body: await (0, import_core.parseXmlErrorBody)(output.body, context)
|
|
273
|
+
};
|
|
274
|
+
const errorCode = loadQueryErrorCode(output, parsedOutput.body);
|
|
275
|
+
switch (errorCode) {
|
|
276
|
+
case "ExpiredTokenException":
|
|
277
|
+
case "com.amazonaws.sts#ExpiredTokenException":
|
|
278
|
+
throw await de_ExpiredTokenExceptionRes(parsedOutput, context);
|
|
279
|
+
case "MalformedPolicyDocument":
|
|
280
|
+
case "com.amazonaws.sts#MalformedPolicyDocumentException":
|
|
281
|
+
throw await de_MalformedPolicyDocumentExceptionRes(parsedOutput, context);
|
|
282
|
+
case "PackedPolicyTooLarge":
|
|
283
|
+
case "com.amazonaws.sts#PackedPolicyTooLargeException":
|
|
284
|
+
throw await de_PackedPolicyTooLargeExceptionRes(parsedOutput, context);
|
|
285
|
+
case "RegionDisabledException":
|
|
286
|
+
case "com.amazonaws.sts#RegionDisabledException":
|
|
287
|
+
throw await de_RegionDisabledExceptionRes(parsedOutput, context);
|
|
288
|
+
case "IDPCommunicationError":
|
|
289
|
+
case "com.amazonaws.sts#IDPCommunicationErrorException":
|
|
290
|
+
throw await de_IDPCommunicationErrorExceptionRes(parsedOutput, context);
|
|
291
|
+
case "IDPRejectedClaim":
|
|
292
|
+
case "com.amazonaws.sts#IDPRejectedClaimException":
|
|
293
|
+
throw await de_IDPRejectedClaimExceptionRes(parsedOutput, context);
|
|
294
|
+
case "InvalidIdentityToken":
|
|
295
|
+
case "com.amazonaws.sts#InvalidIdentityTokenException":
|
|
296
|
+
throw await de_InvalidIdentityTokenExceptionRes(parsedOutput, context);
|
|
297
|
+
default:
|
|
298
|
+
const parsedBody = parsedOutput.body;
|
|
299
|
+
return throwDefaultError({
|
|
300
|
+
output,
|
|
301
|
+
parsedBody: parsedBody.Error,
|
|
302
|
+
errorCode
|
|
303
|
+
});
|
|
304
|
+
}
|
|
305
|
+
}, "de_CommandError");
|
|
306
|
+
var de_ExpiredTokenExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
|
307
|
+
const body = parsedOutput.body;
|
|
308
|
+
const deserialized = de_ExpiredTokenException(body.Error, context);
|
|
309
|
+
const exception = new ExpiredTokenException({
|
|
310
|
+
$metadata: deserializeMetadata(parsedOutput),
|
|
311
|
+
...deserialized
|
|
312
|
+
});
|
|
313
|
+
return (0, import_smithy_client3.decorateServiceException)(exception, body);
|
|
314
|
+
}, "de_ExpiredTokenExceptionRes");
|
|
315
|
+
var de_IDPCommunicationErrorExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
|
316
|
+
const body = parsedOutput.body;
|
|
317
|
+
const deserialized = de_IDPCommunicationErrorException(body.Error, context);
|
|
318
|
+
const exception = new IDPCommunicationErrorException({
|
|
319
|
+
$metadata: deserializeMetadata(parsedOutput),
|
|
320
|
+
...deserialized
|
|
321
|
+
});
|
|
322
|
+
return (0, import_smithy_client3.decorateServiceException)(exception, body);
|
|
323
|
+
}, "de_IDPCommunicationErrorExceptionRes");
|
|
324
|
+
var de_IDPRejectedClaimExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
|
325
|
+
const body = parsedOutput.body;
|
|
326
|
+
const deserialized = de_IDPRejectedClaimException(body.Error, context);
|
|
327
|
+
const exception = new IDPRejectedClaimException({
|
|
328
|
+
$metadata: deserializeMetadata(parsedOutput),
|
|
329
|
+
...deserialized
|
|
330
|
+
});
|
|
331
|
+
return (0, import_smithy_client3.decorateServiceException)(exception, body);
|
|
332
|
+
}, "de_IDPRejectedClaimExceptionRes");
|
|
333
|
+
var de_InvalidIdentityTokenExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
|
334
|
+
const body = parsedOutput.body;
|
|
335
|
+
const deserialized = de_InvalidIdentityTokenException(body.Error, context);
|
|
336
|
+
const exception = new InvalidIdentityTokenException({
|
|
337
|
+
$metadata: deserializeMetadata(parsedOutput),
|
|
338
|
+
...deserialized
|
|
339
|
+
});
|
|
340
|
+
return (0, import_smithy_client3.decorateServiceException)(exception, body);
|
|
341
|
+
}, "de_InvalidIdentityTokenExceptionRes");
|
|
342
|
+
var de_MalformedPolicyDocumentExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
|
343
|
+
const body = parsedOutput.body;
|
|
344
|
+
const deserialized = de_MalformedPolicyDocumentException(body.Error, context);
|
|
345
|
+
const exception = new MalformedPolicyDocumentException({
|
|
346
|
+
$metadata: deserializeMetadata(parsedOutput),
|
|
347
|
+
...deserialized
|
|
348
|
+
});
|
|
349
|
+
return (0, import_smithy_client3.decorateServiceException)(exception, body);
|
|
350
|
+
}, "de_MalformedPolicyDocumentExceptionRes");
|
|
351
|
+
var de_PackedPolicyTooLargeExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
|
352
|
+
const body = parsedOutput.body;
|
|
353
|
+
const deserialized = de_PackedPolicyTooLargeException(body.Error, context);
|
|
354
|
+
const exception = new PackedPolicyTooLargeException({
|
|
355
|
+
$metadata: deserializeMetadata(parsedOutput),
|
|
356
|
+
...deserialized
|
|
357
|
+
});
|
|
358
|
+
return (0, import_smithy_client3.decorateServiceException)(exception, body);
|
|
359
|
+
}, "de_PackedPolicyTooLargeExceptionRes");
|
|
360
|
+
var de_RegionDisabledExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
|
361
|
+
const body = parsedOutput.body;
|
|
362
|
+
const deserialized = de_RegionDisabledException(body.Error, context);
|
|
363
|
+
const exception = new RegionDisabledException({
|
|
364
|
+
$metadata: deserializeMetadata(parsedOutput),
|
|
365
|
+
...deserialized
|
|
366
|
+
});
|
|
367
|
+
return (0, import_smithy_client3.decorateServiceException)(exception, body);
|
|
368
|
+
}, "de_RegionDisabledExceptionRes");
|
|
369
|
+
var se_AssumeRoleRequest = /* @__PURE__ */ __name((input, context) => {
|
|
370
|
+
const entries = {};
|
|
371
|
+
if (input[_RA] != null) {
|
|
372
|
+
entries[_RA] = input[_RA];
|
|
373
|
+
}
|
|
374
|
+
if (input[_RSN] != null) {
|
|
375
|
+
entries[_RSN] = input[_RSN];
|
|
376
|
+
}
|
|
377
|
+
if (input[_PA] != null) {
|
|
378
|
+
const memberEntries = se_policyDescriptorListType(input[_PA], context);
|
|
379
|
+
if (input[_PA]?.length === 0) {
|
|
380
|
+
entries.PolicyArns = [];
|
|
381
|
+
}
|
|
382
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
|
383
|
+
const loc = `PolicyArns.${key}`;
|
|
384
|
+
entries[loc] = value;
|
|
385
|
+
});
|
|
386
|
+
}
|
|
387
|
+
if (input[_P] != null) {
|
|
388
|
+
entries[_P] = input[_P];
|
|
389
|
+
}
|
|
390
|
+
if (input[_DS] != null) {
|
|
391
|
+
entries[_DS] = input[_DS];
|
|
392
|
+
}
|
|
393
|
+
if (input[_T] != null) {
|
|
394
|
+
const memberEntries = se_tagListType(input[_T], context);
|
|
395
|
+
if (input[_T]?.length === 0) {
|
|
396
|
+
entries.Tags = [];
|
|
397
|
+
}
|
|
398
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
|
399
|
+
const loc = `Tags.${key}`;
|
|
400
|
+
entries[loc] = value;
|
|
401
|
+
});
|
|
402
|
+
}
|
|
403
|
+
if (input[_TTK] != null) {
|
|
404
|
+
const memberEntries = se_tagKeyListType(input[_TTK], context);
|
|
405
|
+
if (input[_TTK]?.length === 0) {
|
|
406
|
+
entries.TransitiveTagKeys = [];
|
|
407
|
+
}
|
|
408
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
|
409
|
+
const loc = `TransitiveTagKeys.${key}`;
|
|
410
|
+
entries[loc] = value;
|
|
411
|
+
});
|
|
412
|
+
}
|
|
413
|
+
if (input[_EI] != null) {
|
|
414
|
+
entries[_EI] = input[_EI];
|
|
415
|
+
}
|
|
416
|
+
if (input[_SN] != null) {
|
|
417
|
+
entries[_SN] = input[_SN];
|
|
418
|
+
}
|
|
419
|
+
if (input[_TC] != null) {
|
|
420
|
+
entries[_TC] = input[_TC];
|
|
421
|
+
}
|
|
422
|
+
if (input[_SI] != null) {
|
|
423
|
+
entries[_SI] = input[_SI];
|
|
424
|
+
}
|
|
425
|
+
if (input[_PC] != null) {
|
|
426
|
+
const memberEntries = se_ProvidedContextsListType(input[_PC], context);
|
|
427
|
+
if (input[_PC]?.length === 0) {
|
|
428
|
+
entries.ProvidedContexts = [];
|
|
429
|
+
}
|
|
430
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
|
431
|
+
const loc = `ProvidedContexts.${key}`;
|
|
432
|
+
entries[loc] = value;
|
|
433
|
+
});
|
|
434
|
+
}
|
|
435
|
+
return entries;
|
|
436
|
+
}, "se_AssumeRoleRequest");
|
|
437
|
+
var se_AssumeRoleWithWebIdentityRequest = /* @__PURE__ */ __name((input, context) => {
|
|
438
|
+
const entries = {};
|
|
439
|
+
if (input[_RA] != null) {
|
|
440
|
+
entries[_RA] = input[_RA];
|
|
441
|
+
}
|
|
442
|
+
if (input[_RSN] != null) {
|
|
443
|
+
entries[_RSN] = input[_RSN];
|
|
444
|
+
}
|
|
445
|
+
if (input[_WIT] != null) {
|
|
446
|
+
entries[_WIT] = input[_WIT];
|
|
447
|
+
}
|
|
448
|
+
if (input[_PI] != null) {
|
|
449
|
+
entries[_PI] = input[_PI];
|
|
450
|
+
}
|
|
451
|
+
if (input[_PA] != null) {
|
|
452
|
+
const memberEntries = se_policyDescriptorListType(input[_PA], context);
|
|
453
|
+
if (input[_PA]?.length === 0) {
|
|
454
|
+
entries.PolicyArns = [];
|
|
455
|
+
}
|
|
456
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
|
457
|
+
const loc = `PolicyArns.${key}`;
|
|
458
|
+
entries[loc] = value;
|
|
459
|
+
});
|
|
460
|
+
}
|
|
461
|
+
if (input[_P] != null) {
|
|
462
|
+
entries[_P] = input[_P];
|
|
463
|
+
}
|
|
464
|
+
if (input[_DS] != null) {
|
|
465
|
+
entries[_DS] = input[_DS];
|
|
466
|
+
}
|
|
467
|
+
return entries;
|
|
468
|
+
}, "se_AssumeRoleWithWebIdentityRequest");
|
|
469
|
+
var se_policyDescriptorListType = /* @__PURE__ */ __name((input, context) => {
|
|
470
|
+
const entries = {};
|
|
471
|
+
let counter = 1;
|
|
472
|
+
for (const entry of input) {
|
|
473
|
+
if (entry === null) {
|
|
474
|
+
continue;
|
|
475
|
+
}
|
|
476
|
+
const memberEntries = se_PolicyDescriptorType(entry, context);
|
|
477
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
|
478
|
+
entries[`member.${counter}.${key}`] = value;
|
|
479
|
+
});
|
|
480
|
+
counter++;
|
|
481
|
+
}
|
|
482
|
+
return entries;
|
|
483
|
+
}, "se_policyDescriptorListType");
|
|
484
|
+
var se_PolicyDescriptorType = /* @__PURE__ */ __name((input, context) => {
|
|
485
|
+
const entries = {};
|
|
486
|
+
if (input[_a] != null) {
|
|
487
|
+
entries[_a] = input[_a];
|
|
488
|
+
}
|
|
489
|
+
return entries;
|
|
490
|
+
}, "se_PolicyDescriptorType");
|
|
491
|
+
var se_ProvidedContext = /* @__PURE__ */ __name((input, context) => {
|
|
492
|
+
const entries = {};
|
|
493
|
+
if (input[_PAr] != null) {
|
|
494
|
+
entries[_PAr] = input[_PAr];
|
|
495
|
+
}
|
|
496
|
+
if (input[_CA] != null) {
|
|
497
|
+
entries[_CA] = input[_CA];
|
|
498
|
+
}
|
|
499
|
+
return entries;
|
|
500
|
+
}, "se_ProvidedContext");
|
|
501
|
+
var se_ProvidedContextsListType = /* @__PURE__ */ __name((input, context) => {
|
|
502
|
+
const entries = {};
|
|
503
|
+
let counter = 1;
|
|
504
|
+
for (const entry of input) {
|
|
505
|
+
if (entry === null) {
|
|
506
|
+
continue;
|
|
507
|
+
}
|
|
508
|
+
const memberEntries = se_ProvidedContext(entry, context);
|
|
509
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
|
510
|
+
entries[`member.${counter}.${key}`] = value;
|
|
511
|
+
});
|
|
512
|
+
counter++;
|
|
513
|
+
}
|
|
514
|
+
return entries;
|
|
515
|
+
}, "se_ProvidedContextsListType");
|
|
516
|
+
var se_Tag = /* @__PURE__ */ __name((input, context) => {
|
|
517
|
+
const entries = {};
|
|
518
|
+
if (input[_K] != null) {
|
|
519
|
+
entries[_K] = input[_K];
|
|
520
|
+
}
|
|
521
|
+
if (input[_Va] != null) {
|
|
522
|
+
entries[_Va] = input[_Va];
|
|
523
|
+
}
|
|
524
|
+
return entries;
|
|
525
|
+
}, "se_Tag");
|
|
526
|
+
var se_tagKeyListType = /* @__PURE__ */ __name((input, context) => {
|
|
527
|
+
const entries = {};
|
|
528
|
+
let counter = 1;
|
|
529
|
+
for (const entry of input) {
|
|
530
|
+
if (entry === null) {
|
|
531
|
+
continue;
|
|
532
|
+
}
|
|
533
|
+
entries[`member.${counter}`] = entry;
|
|
534
|
+
counter++;
|
|
535
|
+
}
|
|
536
|
+
return entries;
|
|
537
|
+
}, "se_tagKeyListType");
|
|
538
|
+
var se_tagListType = /* @__PURE__ */ __name((input, context) => {
|
|
539
|
+
const entries = {};
|
|
540
|
+
let counter = 1;
|
|
541
|
+
for (const entry of input) {
|
|
542
|
+
if (entry === null) {
|
|
543
|
+
continue;
|
|
544
|
+
}
|
|
545
|
+
const memberEntries = se_Tag(entry, context);
|
|
546
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
|
547
|
+
entries[`member.${counter}.${key}`] = value;
|
|
548
|
+
});
|
|
549
|
+
counter++;
|
|
550
|
+
}
|
|
551
|
+
return entries;
|
|
552
|
+
}, "se_tagListType");
|
|
553
|
+
var de_AssumedRoleUser = /* @__PURE__ */ __name((output, context) => {
|
|
554
|
+
const contents = {};
|
|
555
|
+
if (output[_ARI] != null) {
|
|
556
|
+
contents[_ARI] = (0, import_smithy_client3.expectString)(output[_ARI]);
|
|
557
|
+
}
|
|
558
|
+
if (output[_Ar] != null) {
|
|
559
|
+
contents[_Ar] = (0, import_smithy_client3.expectString)(output[_Ar]);
|
|
560
|
+
}
|
|
561
|
+
return contents;
|
|
562
|
+
}, "de_AssumedRoleUser");
|
|
563
|
+
var de_AssumeRoleResponse = /* @__PURE__ */ __name((output, context) => {
|
|
564
|
+
const contents = {};
|
|
565
|
+
if (output[_C] != null) {
|
|
566
|
+
contents[_C] = de_Credentials(output[_C], context);
|
|
567
|
+
}
|
|
568
|
+
if (output[_ARU] != null) {
|
|
569
|
+
contents[_ARU] = de_AssumedRoleUser(output[_ARU], context);
|
|
570
|
+
}
|
|
571
|
+
if (output[_PPS] != null) {
|
|
572
|
+
contents[_PPS] = (0, import_smithy_client3.strictParseInt32)(output[_PPS]);
|
|
573
|
+
}
|
|
574
|
+
if (output[_SI] != null) {
|
|
575
|
+
contents[_SI] = (0, import_smithy_client3.expectString)(output[_SI]);
|
|
576
|
+
}
|
|
577
|
+
return contents;
|
|
578
|
+
}, "de_AssumeRoleResponse");
|
|
579
|
+
var de_AssumeRoleWithWebIdentityResponse = /* @__PURE__ */ __name((output, context) => {
|
|
580
|
+
const contents = {};
|
|
581
|
+
if (output[_C] != null) {
|
|
582
|
+
contents[_C] = de_Credentials(output[_C], context);
|
|
583
|
+
}
|
|
584
|
+
if (output[_SFWIT] != null) {
|
|
585
|
+
contents[_SFWIT] = (0, import_smithy_client3.expectString)(output[_SFWIT]);
|
|
586
|
+
}
|
|
587
|
+
if (output[_ARU] != null) {
|
|
588
|
+
contents[_ARU] = de_AssumedRoleUser(output[_ARU], context);
|
|
589
|
+
}
|
|
590
|
+
if (output[_PPS] != null) {
|
|
591
|
+
contents[_PPS] = (0, import_smithy_client3.strictParseInt32)(output[_PPS]);
|
|
592
|
+
}
|
|
593
|
+
if (output[_Pr] != null) {
|
|
594
|
+
contents[_Pr] = (0, import_smithy_client3.expectString)(output[_Pr]);
|
|
595
|
+
}
|
|
596
|
+
if (output[_Au] != null) {
|
|
597
|
+
contents[_Au] = (0, import_smithy_client3.expectString)(output[_Au]);
|
|
598
|
+
}
|
|
599
|
+
if (output[_SI] != null) {
|
|
600
|
+
contents[_SI] = (0, import_smithy_client3.expectString)(output[_SI]);
|
|
601
|
+
}
|
|
602
|
+
return contents;
|
|
603
|
+
}, "de_AssumeRoleWithWebIdentityResponse");
|
|
604
|
+
var de_Credentials = /* @__PURE__ */ __name((output, context) => {
|
|
605
|
+
const contents = {};
|
|
606
|
+
if (output[_AKI] != null) {
|
|
607
|
+
contents[_AKI] = (0, import_smithy_client3.expectString)(output[_AKI]);
|
|
608
|
+
}
|
|
609
|
+
if (output[_SAK] != null) {
|
|
610
|
+
contents[_SAK] = (0, import_smithy_client3.expectString)(output[_SAK]);
|
|
611
|
+
}
|
|
612
|
+
if (output[_ST] != null) {
|
|
613
|
+
contents[_ST] = (0, import_smithy_client3.expectString)(output[_ST]);
|
|
614
|
+
}
|
|
615
|
+
if (output[_E] != null) {
|
|
616
|
+
contents[_E] = (0, import_smithy_client3.expectNonNull)((0, import_smithy_client3.parseRfc3339DateTimeWithOffset)(output[_E]));
|
|
617
|
+
}
|
|
618
|
+
return contents;
|
|
619
|
+
}, "de_Credentials");
|
|
620
|
+
var de_ExpiredTokenException = /* @__PURE__ */ __name((output, context) => {
|
|
621
|
+
const contents = {};
|
|
622
|
+
if (output[_m] != null) {
|
|
623
|
+
contents[_m] = (0, import_smithy_client3.expectString)(output[_m]);
|
|
624
|
+
}
|
|
625
|
+
return contents;
|
|
626
|
+
}, "de_ExpiredTokenException");
|
|
627
|
+
var de_IDPCommunicationErrorException = /* @__PURE__ */ __name((output, context) => {
|
|
628
|
+
const contents = {};
|
|
629
|
+
if (output[_m] != null) {
|
|
630
|
+
contents[_m] = (0, import_smithy_client3.expectString)(output[_m]);
|
|
631
|
+
}
|
|
632
|
+
return contents;
|
|
633
|
+
}, "de_IDPCommunicationErrorException");
|
|
634
|
+
var de_IDPRejectedClaimException = /* @__PURE__ */ __name((output, context) => {
|
|
635
|
+
const contents = {};
|
|
636
|
+
if (output[_m] != null) {
|
|
637
|
+
contents[_m] = (0, import_smithy_client3.expectString)(output[_m]);
|
|
638
|
+
}
|
|
639
|
+
return contents;
|
|
640
|
+
}, "de_IDPRejectedClaimException");
|
|
641
|
+
var de_InvalidIdentityTokenException = /* @__PURE__ */ __name((output, context) => {
|
|
642
|
+
const contents = {};
|
|
643
|
+
if (output[_m] != null) {
|
|
644
|
+
contents[_m] = (0, import_smithy_client3.expectString)(output[_m]);
|
|
645
|
+
}
|
|
646
|
+
return contents;
|
|
647
|
+
}, "de_InvalidIdentityTokenException");
|
|
648
|
+
var de_MalformedPolicyDocumentException = /* @__PURE__ */ __name((output, context) => {
|
|
649
|
+
const contents = {};
|
|
650
|
+
if (output[_m] != null) {
|
|
651
|
+
contents[_m] = (0, import_smithy_client3.expectString)(output[_m]);
|
|
652
|
+
}
|
|
653
|
+
return contents;
|
|
654
|
+
}, "de_MalformedPolicyDocumentException");
|
|
655
|
+
var de_PackedPolicyTooLargeException = /* @__PURE__ */ __name((output, context) => {
|
|
656
|
+
const contents = {};
|
|
657
|
+
if (output[_m] != null) {
|
|
658
|
+
contents[_m] = (0, import_smithy_client3.expectString)(output[_m]);
|
|
659
|
+
}
|
|
660
|
+
return contents;
|
|
661
|
+
}, "de_PackedPolicyTooLargeException");
|
|
662
|
+
var de_RegionDisabledException = /* @__PURE__ */ __name((output, context) => {
|
|
663
|
+
const contents = {};
|
|
664
|
+
if (output[_m] != null) {
|
|
665
|
+
contents[_m] = (0, import_smithy_client3.expectString)(output[_m]);
|
|
666
|
+
}
|
|
667
|
+
return contents;
|
|
668
|
+
}, "de_RegionDisabledException");
|
|
669
|
+
var deserializeMetadata = /* @__PURE__ */ __name((output) => ({
|
|
670
|
+
httpStatusCode: output.statusCode,
|
|
671
|
+
requestId: output.headers["x-amzn-requestid"] ?? output.headers["x-amzn-request-id"] ?? output.headers["x-amz-request-id"],
|
|
672
|
+
extendedRequestId: output.headers["x-amz-id-2"],
|
|
673
|
+
cfId: output.headers["x-amz-cf-id"]
|
|
674
|
+
}), "deserializeMetadata");
|
|
675
|
+
var throwDefaultError = (0, import_smithy_client3.withBaseException)(STSServiceException);
|
|
676
|
+
var buildHttpRpcRequest = /* @__PURE__ */ __name(async (context, headers, path, resolvedHostname, body) => {
|
|
677
|
+
const { hostname, protocol = "https", port, path: basePath } = await context.endpoint();
|
|
678
|
+
const contents = {
|
|
679
|
+
protocol,
|
|
680
|
+
hostname,
|
|
681
|
+
port,
|
|
682
|
+
method: "POST",
|
|
683
|
+
path: basePath.endsWith("/") ? basePath.slice(0, -1) + path : basePath + path,
|
|
684
|
+
headers
|
|
685
|
+
};
|
|
686
|
+
if (resolvedHostname !== void 0) {
|
|
687
|
+
contents.hostname = resolvedHostname;
|
|
688
|
+
}
|
|
689
|
+
if (body !== void 0) {
|
|
690
|
+
contents.body = body;
|
|
691
|
+
}
|
|
692
|
+
return new import_protocol_http.HttpRequest(contents);
|
|
693
|
+
}, "buildHttpRpcRequest");
|
|
694
|
+
var SHARED_HEADERS = {
|
|
695
|
+
"content-type": "application/x-www-form-urlencoded"
|
|
696
|
+
};
|
|
697
|
+
var _ = "2011-06-15";
|
|
698
|
+
var _A = "Action";
|
|
699
|
+
var _AKI = "AccessKeyId";
|
|
700
|
+
var _AR = "AssumeRole";
|
|
701
|
+
var _ARI = "AssumedRoleId";
|
|
702
|
+
var _ARU = "AssumedRoleUser";
|
|
703
|
+
var _ARWWI = "AssumeRoleWithWebIdentity";
|
|
704
|
+
var _Ar = "Arn";
|
|
705
|
+
var _Au = "Audience";
|
|
706
|
+
var _C = "Credentials";
|
|
707
|
+
var _CA = "ContextAssertion";
|
|
708
|
+
var _DS = "DurationSeconds";
|
|
709
|
+
var _E = "Expiration";
|
|
710
|
+
var _EI = "ExternalId";
|
|
711
|
+
var _K = "Key";
|
|
712
|
+
var _P = "Policy";
|
|
713
|
+
var _PA = "PolicyArns";
|
|
714
|
+
var _PAr = "ProviderArn";
|
|
715
|
+
var _PC = "ProvidedContexts";
|
|
716
|
+
var _PI = "ProviderId";
|
|
717
|
+
var _PPS = "PackedPolicySize";
|
|
718
|
+
var _Pr = "Provider";
|
|
719
|
+
var _RA = "RoleArn";
|
|
720
|
+
var _RSN = "RoleSessionName";
|
|
721
|
+
var _SAK = "SecretAccessKey";
|
|
722
|
+
var _SFWIT = "SubjectFromWebIdentityToken";
|
|
723
|
+
var _SI = "SourceIdentity";
|
|
724
|
+
var _SN = "SerialNumber";
|
|
725
|
+
var _ST = "SessionToken";
|
|
726
|
+
var _T = "Tags";
|
|
727
|
+
var _TC = "TokenCode";
|
|
728
|
+
var _TTK = "TransitiveTagKeys";
|
|
729
|
+
var _V = "Version";
|
|
730
|
+
var _Va = "Value";
|
|
731
|
+
var _WIT = "WebIdentityToken";
|
|
732
|
+
var _a = "arn";
|
|
733
|
+
var _m = "message";
|
|
734
|
+
var buildFormUrlencodedString = /* @__PURE__ */ __name((formEntries) => Object.entries(formEntries).map(([key, value]) => (0, import_smithy_client3.extendedEncodeURIComponent)(key) + "=" + (0, import_smithy_client3.extendedEncodeURIComponent)(value)).join("&"), "buildFormUrlencodedString");
|
|
735
|
+
var loadQueryErrorCode = /* @__PURE__ */ __name((output, data) => {
|
|
736
|
+
if (data.Error?.Code !== void 0) {
|
|
737
|
+
return data.Error.Code;
|
|
738
|
+
}
|
|
739
|
+
if (output.statusCode == 404) {
|
|
740
|
+
return "NotFound";
|
|
741
|
+
}
|
|
742
|
+
}, "loadQueryErrorCode");
|
|
743
|
+
|
|
744
|
+
// src/submodules/sts/commands/AssumeRoleCommand.ts
|
|
745
|
+
var AssumeRoleCommand = class extends import_smithy_client4.Command.classBuilder().ep(import_EndpointParameters.commonParams).m(function(Command, cs, config, o) {
|
|
746
|
+
return [
|
|
747
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
748
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
749
|
+
];
|
|
750
|
+
}).s("AWSSecurityTokenServiceV20110615", "AssumeRole", {}).n("STSClient", "AssumeRoleCommand").f(void 0, AssumeRoleResponseFilterSensitiveLog).ser(se_AssumeRoleCommand).de(de_AssumeRoleCommand).build() {
|
|
751
|
+
static {
|
|
752
|
+
__name(this, "AssumeRoleCommand");
|
|
753
|
+
}
|
|
754
|
+
};
|
|
755
|
+
|
|
756
|
+
// src/submodules/sts/commands/AssumeRoleWithWebIdentityCommand.ts
|
|
757
|
+
var import_middleware_endpoint2 = require("@smithy/middleware-endpoint");
|
|
758
|
+
var import_middleware_serde2 = require("@smithy/middleware-serde");
|
|
759
|
+
var import_smithy_client5 = require("@smithy/smithy-client");
|
|
760
|
+
var import_EndpointParameters2 = require("./endpoint/EndpointParameters");
|
|
761
|
+
var AssumeRoleWithWebIdentityCommand = class extends import_smithy_client5.Command.classBuilder().ep(import_EndpointParameters2.commonParams).m(function(Command, cs, config, o) {
|
|
762
|
+
return [
|
|
763
|
+
(0, import_middleware_serde2.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
764
|
+
(0, import_middleware_endpoint2.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
765
|
+
];
|
|
766
|
+
}).s("AWSSecurityTokenServiceV20110615", "AssumeRoleWithWebIdentity", {}).n("STSClient", "AssumeRoleWithWebIdentityCommand").f(AssumeRoleWithWebIdentityRequestFilterSensitiveLog, AssumeRoleWithWebIdentityResponseFilterSensitiveLog).ser(se_AssumeRoleWithWebIdentityCommand).de(de_AssumeRoleWithWebIdentityCommand).build() {
|
|
767
|
+
static {
|
|
768
|
+
__name(this, "AssumeRoleWithWebIdentityCommand");
|
|
769
|
+
}
|
|
770
|
+
};
|
|
771
|
+
|
|
772
|
+
// src/submodules/sts/STS.ts
|
|
773
|
+
var import_STSClient = require("./STSClient");
|
|
774
|
+
var commands = {
|
|
775
|
+
AssumeRoleCommand,
|
|
776
|
+
AssumeRoleWithWebIdentityCommand
|
|
777
|
+
};
|
|
778
|
+
var STS = class extends import_STSClient.STSClient {
|
|
779
|
+
static {
|
|
780
|
+
__name(this, "STS");
|
|
781
|
+
}
|
|
782
|
+
};
|
|
783
|
+
(0, import_smithy_client6.createAggregatedClient)(commands, STS);
|
|
784
|
+
|
|
785
|
+
// src/submodules/sts/index.ts
|
|
786
|
+
var import_EndpointParameters3 = require("./endpoint/EndpointParameters");
|
|
787
|
+
|
|
788
|
+
// src/submodules/sts/defaultStsRoleAssumers.ts
|
|
789
|
+
var import_client = require("@aws-sdk/core/client");
|
|
790
|
+
var ASSUME_ROLE_DEFAULT_REGION = "us-east-1";
|
|
791
|
+
var getAccountIdFromAssumedRoleUser = /* @__PURE__ */ __name((assumedRoleUser) => {
|
|
792
|
+
if (typeof assumedRoleUser?.Arn === "string") {
|
|
793
|
+
const arnComponents = assumedRoleUser.Arn.split(":");
|
|
794
|
+
if (arnComponents.length > 4 && arnComponents[4] !== "") {
|
|
795
|
+
return arnComponents[4];
|
|
796
|
+
}
|
|
797
|
+
}
|
|
798
|
+
return void 0;
|
|
799
|
+
}, "getAccountIdFromAssumedRoleUser");
|
|
800
|
+
var resolveRegion = /* @__PURE__ */ __name(async (_region, _parentRegion, credentialProviderLogger) => {
|
|
801
|
+
const region = typeof _region === "function" ? await _region() : _region;
|
|
802
|
+
const parentRegion = typeof _parentRegion === "function" ? await _parentRegion() : _parentRegion;
|
|
803
|
+
credentialProviderLogger?.debug?.(
|
|
804
|
+
"@aws-sdk/client-sts::resolveRegion",
|
|
805
|
+
"accepting first of:",
|
|
806
|
+
`${region} (provider)`,
|
|
807
|
+
`${parentRegion} (parent client)`,
|
|
808
|
+
`${ASSUME_ROLE_DEFAULT_REGION} (STS default)`
|
|
809
|
+
);
|
|
810
|
+
return region ?? parentRegion ?? ASSUME_ROLE_DEFAULT_REGION;
|
|
811
|
+
}, "resolveRegion");
|
|
812
|
+
var getDefaultRoleAssumer = /* @__PURE__ */ __name((stsOptions, stsClientCtor) => {
|
|
813
|
+
let stsClient;
|
|
814
|
+
let closureSourceCreds;
|
|
815
|
+
return async (sourceCreds, params) => {
|
|
816
|
+
closureSourceCreds = sourceCreds;
|
|
817
|
+
if (!stsClient) {
|
|
818
|
+
const {
|
|
819
|
+
logger = stsOptions?.parentClientConfig?.logger,
|
|
820
|
+
region,
|
|
821
|
+
requestHandler = stsOptions?.parentClientConfig?.requestHandler,
|
|
822
|
+
credentialProviderLogger
|
|
823
|
+
} = stsOptions;
|
|
824
|
+
const resolvedRegion = await resolveRegion(
|
|
825
|
+
region,
|
|
826
|
+
stsOptions?.parentClientConfig?.region,
|
|
827
|
+
credentialProviderLogger
|
|
828
|
+
);
|
|
829
|
+
const isCompatibleRequestHandler = !isH2(requestHandler);
|
|
830
|
+
stsClient = new stsClientCtor({
|
|
831
|
+
// A hack to make sts client uses the credential in current closure.
|
|
832
|
+
credentialDefaultProvider: () => async () => closureSourceCreds,
|
|
833
|
+
region: resolvedRegion,
|
|
834
|
+
requestHandler: isCompatibleRequestHandler ? requestHandler : void 0,
|
|
835
|
+
logger
|
|
836
|
+
});
|
|
837
|
+
}
|
|
838
|
+
const { Credentials: Credentials2, AssumedRoleUser: AssumedRoleUser2 } = await stsClient.send(new AssumeRoleCommand(params));
|
|
839
|
+
if (!Credentials2 || !Credentials2.AccessKeyId || !Credentials2.SecretAccessKey) {
|
|
840
|
+
throw new Error(`Invalid response from STS.assumeRole call with role ${params.RoleArn}`);
|
|
841
|
+
}
|
|
842
|
+
const accountId = getAccountIdFromAssumedRoleUser(AssumedRoleUser2);
|
|
843
|
+
const credentials = {
|
|
844
|
+
accessKeyId: Credentials2.AccessKeyId,
|
|
845
|
+
secretAccessKey: Credentials2.SecretAccessKey,
|
|
846
|
+
sessionToken: Credentials2.SessionToken,
|
|
847
|
+
expiration: Credentials2.Expiration,
|
|
848
|
+
// TODO(credentialScope): access normally when shape is updated.
|
|
849
|
+
...Credentials2.CredentialScope && { credentialScope: Credentials2.CredentialScope },
|
|
850
|
+
...accountId && { accountId }
|
|
851
|
+
};
|
|
852
|
+
(0, import_client.setCredentialFeature)(credentials, "CREDENTIALS_STS_ASSUME_ROLE", "i");
|
|
853
|
+
return credentials;
|
|
854
|
+
};
|
|
855
|
+
}, "getDefaultRoleAssumer");
|
|
856
|
+
var getDefaultRoleAssumerWithWebIdentity = /* @__PURE__ */ __name((stsOptions, stsClientCtor) => {
|
|
857
|
+
let stsClient;
|
|
858
|
+
return async (params) => {
|
|
859
|
+
if (!stsClient) {
|
|
860
|
+
const {
|
|
861
|
+
logger = stsOptions?.parentClientConfig?.logger,
|
|
862
|
+
region,
|
|
863
|
+
requestHandler = stsOptions?.parentClientConfig?.requestHandler,
|
|
864
|
+
credentialProviderLogger
|
|
865
|
+
} = stsOptions;
|
|
866
|
+
const resolvedRegion = await resolveRegion(
|
|
867
|
+
region,
|
|
868
|
+
stsOptions?.parentClientConfig?.region,
|
|
869
|
+
credentialProviderLogger
|
|
870
|
+
);
|
|
871
|
+
const isCompatibleRequestHandler = !isH2(requestHandler);
|
|
872
|
+
stsClient = new stsClientCtor({
|
|
873
|
+
region: resolvedRegion,
|
|
874
|
+
requestHandler: isCompatibleRequestHandler ? requestHandler : void 0,
|
|
875
|
+
logger
|
|
876
|
+
});
|
|
877
|
+
}
|
|
878
|
+
const { Credentials: Credentials2, AssumedRoleUser: AssumedRoleUser2 } = await stsClient.send(new AssumeRoleWithWebIdentityCommand(params));
|
|
879
|
+
if (!Credentials2 || !Credentials2.AccessKeyId || !Credentials2.SecretAccessKey) {
|
|
880
|
+
throw new Error(`Invalid response from STS.assumeRoleWithWebIdentity call with role ${params.RoleArn}`);
|
|
881
|
+
}
|
|
882
|
+
const accountId = getAccountIdFromAssumedRoleUser(AssumedRoleUser2);
|
|
883
|
+
const credentials = {
|
|
884
|
+
accessKeyId: Credentials2.AccessKeyId,
|
|
885
|
+
secretAccessKey: Credentials2.SecretAccessKey,
|
|
886
|
+
sessionToken: Credentials2.SessionToken,
|
|
887
|
+
expiration: Credentials2.Expiration,
|
|
888
|
+
// TODO(credentialScope): access normally when shape is updated.
|
|
889
|
+
...Credentials2.CredentialScope && { credentialScope: Credentials2.CredentialScope },
|
|
890
|
+
...accountId && { accountId }
|
|
891
|
+
};
|
|
892
|
+
if (accountId) {
|
|
893
|
+
(0, import_client.setCredentialFeature)(credentials, "RESOLVED_ACCOUNT_ID", "T");
|
|
894
|
+
}
|
|
895
|
+
(0, import_client.setCredentialFeature)(credentials, "CREDENTIALS_STS_ASSUME_ROLE_WEB_ID", "k");
|
|
896
|
+
return credentials;
|
|
897
|
+
};
|
|
898
|
+
}, "getDefaultRoleAssumerWithWebIdentity");
|
|
899
|
+
var isH2 = /* @__PURE__ */ __name((requestHandler) => {
|
|
900
|
+
return requestHandler?.metadata?.handlerProtocol === "h2";
|
|
901
|
+
}, "isH2");
|
|
902
|
+
|
|
903
|
+
// src/submodules/sts/defaultRoleAssumers.ts
|
|
904
|
+
var import_STSClient2 = require("./STSClient");
|
|
905
|
+
var getCustomizableStsClientCtor = /* @__PURE__ */ __name((baseCtor, customizations) => {
|
|
906
|
+
if (!customizations)
|
|
907
|
+
return baseCtor;
|
|
908
|
+
else
|
|
909
|
+
return class CustomizableSTSClient extends baseCtor {
|
|
910
|
+
static {
|
|
911
|
+
__name(this, "CustomizableSTSClient");
|
|
912
|
+
}
|
|
913
|
+
constructor(config) {
|
|
914
|
+
super(config);
|
|
915
|
+
for (const customization of customizations) {
|
|
916
|
+
this.middlewareStack.use(customization);
|
|
917
|
+
}
|
|
918
|
+
}
|
|
919
|
+
};
|
|
920
|
+
}, "getCustomizableStsClientCtor");
|
|
921
|
+
var getDefaultRoleAssumer2 = /* @__PURE__ */ __name((stsOptions = {}, stsPlugins) => getDefaultRoleAssumer(stsOptions, getCustomizableStsClientCtor(import_STSClient2.STSClient, stsPlugins)), "getDefaultRoleAssumer");
|
|
922
|
+
var getDefaultRoleAssumerWithWebIdentity2 = /* @__PURE__ */ __name((stsOptions = {}, stsPlugins) => getDefaultRoleAssumerWithWebIdentity(stsOptions, getCustomizableStsClientCtor(import_STSClient2.STSClient, stsPlugins)), "getDefaultRoleAssumerWithWebIdentity");
|
|
923
|
+
var decorateDefaultCredentialProvider = /* @__PURE__ */ __name((provider) => (input) => provider({
|
|
924
|
+
roleAssumer: getDefaultRoleAssumer2(input),
|
|
925
|
+
roleAssumerWithWebIdentity: getDefaultRoleAssumerWithWebIdentity2(input),
|
|
926
|
+
...input
|
|
927
|
+
}), "decorateDefaultCredentialProvider");
|
|
928
|
+
// Annotate the CommonJS export names for ESM import in node:
|
|
929
|
+
0 && (module.exports = {
|
|
930
|
+
AssumeRoleCommand,
|
|
931
|
+
AssumeRoleResponseFilterSensitiveLog,
|
|
932
|
+
AssumeRoleWithWebIdentityCommand,
|
|
933
|
+
AssumeRoleWithWebIdentityRequestFilterSensitiveLog,
|
|
934
|
+
AssumeRoleWithWebIdentityResponseFilterSensitiveLog,
|
|
935
|
+
ClientInputEndpointParameters,
|
|
936
|
+
CredentialsFilterSensitiveLog,
|
|
937
|
+
ExpiredTokenException,
|
|
938
|
+
IDPCommunicationErrorException,
|
|
939
|
+
IDPRejectedClaimException,
|
|
940
|
+
InvalidIdentityTokenException,
|
|
941
|
+
MalformedPolicyDocumentException,
|
|
942
|
+
PackedPolicyTooLargeException,
|
|
943
|
+
RegionDisabledException,
|
|
944
|
+
STS,
|
|
945
|
+
STSServiceException,
|
|
946
|
+
decorateDefaultCredentialProvider,
|
|
947
|
+
getDefaultRoleAssumer,
|
|
948
|
+
getDefaultRoleAssumerWithWebIdentity,
|
|
949
|
+
...require("./STSClient")
|
|
950
|
+
});
|