@aws-sdk/nested-clients 3.952.0 → 3.954.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/submodules/signin/index.js +48 -37
- package/dist-cjs/submodules/signin/runtimeConfig.shared.js +6 -1
- package/dist-cjs/submodules/sso-oidc/index.js +88 -66
- package/dist-cjs/submodules/sso-oidc/runtimeConfig.shared.js +6 -1
- package/dist-cjs/submodules/sts/index.js +79 -60
- package/dist-cjs/submodules/sts/runtimeConfig.shared.js +7 -6
- package/dist-es/submodules/signin/commands/CreateOAuth2TokenCommand.js +2 -2
- package/dist-es/submodules/signin/index.js +1 -0
- package/dist-es/submodules/signin/runtimeConfig.shared.js +6 -1
- package/dist-es/submodules/signin/schemas/schemas_0.js +24 -24
- package/dist-es/submodules/sso-oidc/commands/CreateTokenCommand.js +2 -2
- package/dist-es/submodules/sso-oidc/index.js +1 -0
- package/dist-es/submodules/sso-oidc/runtimeConfig.shared.js +6 -1
- package/dist-es/submodules/sso-oidc/schemas/schemas_0.js +44 -37
- package/dist-es/submodules/sts/commands/AssumeRoleCommand.js +2 -2
- package/dist-es/submodules/sts/commands/AssumeRoleWithWebIdentityCommand.js +2 -2
- package/dist-es/submodules/sts/index.js +1 -0
- package/dist-es/submodules/sts/runtimeConfig.shared.js +7 -6
- package/dist-es/submodules/sts/schemas/schemas_0.js +39 -39
- package/dist-types/submodules/signin/SigninClient.d.ts +1 -10
- package/dist-types/submodules/signin/index.d.ts +1 -0
- package/dist-types/submodules/signin/runtimeConfig.browser.d.ts +6 -2
- package/dist-types/submodules/signin/runtimeConfig.d.ts +6 -2
- package/dist-types/submodules/signin/runtimeConfig.native.d.ts +6 -2
- package/dist-types/submodules/signin/runtimeConfig.shared.d.ts +6 -1
- package/dist-types/submodules/signin/schemas/schemas_0.d.ts +12 -13
- package/dist-types/submodules/sso-oidc/SSOOIDCClient.d.ts +1 -10
- package/dist-types/submodules/sso-oidc/index.d.ts +1 -0
- package/dist-types/submodules/sso-oidc/runtimeConfig.browser.d.ts +6 -2
- package/dist-types/submodules/sso-oidc/runtimeConfig.d.ts +6 -2
- package/dist-types/submodules/sso-oidc/runtimeConfig.native.d.ts +6 -2
- package/dist-types/submodules/sso-oidc/runtimeConfig.shared.d.ts +6 -1
- package/dist-types/submodules/sso-oidc/schemas/schemas_0.d.ts +16 -22
- package/dist-types/submodules/sts/STSClient.d.ts +1 -10
- package/dist-types/submodules/sts/index.d.ts +1 -0
- package/dist-types/submodules/sts/runtimeConfig.browser.d.ts +6 -2
- package/dist-types/submodules/sts/runtimeConfig.d.ts +6 -2
- package/dist-types/submodules/sts/runtimeConfig.native.d.ts +6 -2
- package/dist-types/submodules/sts/runtimeConfig.shared.d.ts +6 -1
- package/dist-types/submodules/sts/schemas/schemas_0.d.ts +20 -26
- package/dist-types/ts3.4/submodules/signin/SigninClient.d.ts +0 -4
- package/dist-types/ts3.4/submodules/signin/index.d.ts +1 -0
- package/dist-types/ts3.4/submodules/signin/runtimeConfig.browser.d.ts +9 -5
- package/dist-types/ts3.4/submodules/signin/runtimeConfig.d.ts +9 -5
- package/dist-types/ts3.4/submodules/signin/runtimeConfig.native.d.ts +9 -5
- package/dist-types/ts3.4/submodules/signin/runtimeConfig.shared.d.ts +9 -4
- package/dist-types/ts3.4/submodules/signin/schemas/schemas_0.d.ts +11 -13
- package/dist-types/ts3.4/submodules/sso-oidc/SSOOIDCClient.d.ts +0 -4
- package/dist-types/ts3.4/submodules/sso-oidc/index.d.ts +1 -0
- package/dist-types/ts3.4/submodules/sso-oidc/runtimeConfig.browser.d.ts +9 -5
- package/dist-types/ts3.4/submodules/sso-oidc/runtimeConfig.d.ts +9 -5
- package/dist-types/ts3.4/submodules/sso-oidc/runtimeConfig.native.d.ts +9 -5
- package/dist-types/ts3.4/submodules/sso-oidc/runtimeConfig.shared.d.ts +9 -4
- package/dist-types/ts3.4/submodules/sso-oidc/schemas/schemas_0.d.ts +15 -22
- package/dist-types/ts3.4/submodules/sts/STSClient.d.ts +0 -4
- package/dist-types/ts3.4/submodules/sts/index.d.ts +1 -0
- package/dist-types/ts3.4/submodules/sts/runtimeConfig.browser.d.ts +9 -5
- package/dist-types/ts3.4/submodules/sts/runtimeConfig.d.ts +9 -5
- package/dist-types/ts3.4/submodules/sts/runtimeConfig.native.d.ts +9 -5
- package/dist-types/ts3.4/submodules/sts/runtimeConfig.shared.d.ts +9 -4
- package/dist-types/ts3.4/submodules/sts/schemas/schemas_0.d.ts +19 -27
- package/package.json +32 -32
|
@@ -8,14 +8,14 @@ var schema = require('@smithy/core/schema');
|
|
|
8
8
|
var client = require('@aws-sdk/core/client');
|
|
9
9
|
var regionConfigResolver = require('@aws-sdk/region-config-resolver');
|
|
10
10
|
|
|
11
|
-
|
|
11
|
+
class STSServiceException extends smithyClient.ServiceException {
|
|
12
12
|
constructor(options) {
|
|
13
13
|
super(options);
|
|
14
14
|
Object.setPrototypeOf(this, STSServiceException.prototype);
|
|
15
15
|
}
|
|
16
|
-
}
|
|
16
|
+
}
|
|
17
17
|
|
|
18
|
-
|
|
18
|
+
class ExpiredTokenException extends STSServiceException {
|
|
19
19
|
name = "ExpiredTokenException";
|
|
20
20
|
$fault = "client";
|
|
21
21
|
constructor(opts) {
|
|
@@ -26,8 +26,8 @@ let ExpiredTokenException$1 = class ExpiredTokenException extends STSServiceExce
|
|
|
26
26
|
});
|
|
27
27
|
Object.setPrototypeOf(this, ExpiredTokenException.prototype);
|
|
28
28
|
}
|
|
29
|
-
}
|
|
30
|
-
|
|
29
|
+
}
|
|
30
|
+
class MalformedPolicyDocumentException extends STSServiceException {
|
|
31
31
|
name = "MalformedPolicyDocumentException";
|
|
32
32
|
$fault = "client";
|
|
33
33
|
constructor(opts) {
|
|
@@ -38,8 +38,8 @@ let MalformedPolicyDocumentException$1 = class MalformedPolicyDocumentException
|
|
|
38
38
|
});
|
|
39
39
|
Object.setPrototypeOf(this, MalformedPolicyDocumentException.prototype);
|
|
40
40
|
}
|
|
41
|
-
}
|
|
42
|
-
|
|
41
|
+
}
|
|
42
|
+
class PackedPolicyTooLargeException extends STSServiceException {
|
|
43
43
|
name = "PackedPolicyTooLargeException";
|
|
44
44
|
$fault = "client";
|
|
45
45
|
constructor(opts) {
|
|
@@ -50,8 +50,8 @@ let PackedPolicyTooLargeException$1 = class PackedPolicyTooLargeException extend
|
|
|
50
50
|
});
|
|
51
51
|
Object.setPrototypeOf(this, PackedPolicyTooLargeException.prototype);
|
|
52
52
|
}
|
|
53
|
-
}
|
|
54
|
-
|
|
53
|
+
}
|
|
54
|
+
class RegionDisabledException extends STSServiceException {
|
|
55
55
|
name = "RegionDisabledException";
|
|
56
56
|
$fault = "client";
|
|
57
57
|
constructor(opts) {
|
|
@@ -62,8 +62,8 @@ let RegionDisabledException$1 = class RegionDisabledException extends STSService
|
|
|
62
62
|
});
|
|
63
63
|
Object.setPrototypeOf(this, RegionDisabledException.prototype);
|
|
64
64
|
}
|
|
65
|
-
}
|
|
66
|
-
|
|
65
|
+
}
|
|
66
|
+
class IDPRejectedClaimException extends STSServiceException {
|
|
67
67
|
name = "IDPRejectedClaimException";
|
|
68
68
|
$fault = "client";
|
|
69
69
|
constructor(opts) {
|
|
@@ -74,8 +74,8 @@ let IDPRejectedClaimException$1 = class IDPRejectedClaimException extends STSSer
|
|
|
74
74
|
});
|
|
75
75
|
Object.setPrototypeOf(this, IDPRejectedClaimException.prototype);
|
|
76
76
|
}
|
|
77
|
-
}
|
|
78
|
-
|
|
77
|
+
}
|
|
78
|
+
class InvalidIdentityTokenException extends STSServiceException {
|
|
79
79
|
name = "InvalidIdentityTokenException";
|
|
80
80
|
$fault = "client";
|
|
81
81
|
constructor(opts) {
|
|
@@ -86,8 +86,8 @@ let InvalidIdentityTokenException$1 = class InvalidIdentityTokenException extend
|
|
|
86
86
|
});
|
|
87
87
|
Object.setPrototypeOf(this, InvalidIdentityTokenException.prototype);
|
|
88
88
|
}
|
|
89
|
-
}
|
|
90
|
-
|
|
89
|
+
}
|
|
90
|
+
class IDPCommunicationErrorException extends STSServiceException {
|
|
91
91
|
name = "IDPCommunicationErrorException";
|
|
92
92
|
$fault = "client";
|
|
93
93
|
constructor(opts) {
|
|
@@ -98,7 +98,7 @@ let IDPCommunicationErrorException$1 = class IDPCommunicationErrorException exte
|
|
|
98
98
|
});
|
|
99
99
|
Object.setPrototypeOf(this, IDPCommunicationErrorException.prototype);
|
|
100
100
|
}
|
|
101
|
-
}
|
|
101
|
+
}
|
|
102
102
|
|
|
103
103
|
const _A = "Arn";
|
|
104
104
|
const _AKI = "AccessKeyId";
|
|
@@ -161,8 +161,8 @@ const _tLT = "tagListType";
|
|
|
161
161
|
const n0 = "com.amazonaws.sts";
|
|
162
162
|
var accessKeySecretType = [0, n0, _aKST, 8, 0];
|
|
163
163
|
var clientTokenType = [0, n0, _cTT, 8, 0];
|
|
164
|
-
var AssumedRoleUser = [3, n0, _ARU, 0, [_ARI, _A], [0, 0]];
|
|
165
|
-
var AssumeRoleRequest = [
|
|
164
|
+
var AssumedRoleUser$ = [3, n0, _ARU, 0, [_ARI, _A], [0, 0]];
|
|
165
|
+
var AssumeRoleRequest$ = [
|
|
166
166
|
3,
|
|
167
167
|
n0,
|
|
168
168
|
_ARR,
|
|
@@ -170,15 +170,15 @@ var AssumeRoleRequest = [
|
|
|
170
170
|
[_RA, _RSN, _PA, _P, _DS, _T, _TTK, _EI, _SN, _TC, _SI, _PC],
|
|
171
171
|
[0, 0, () => policyDescriptorListType, 0, 1, () => tagListType, 64 | 0, 0, 0, 0, 0, () => ProvidedContextsListType],
|
|
172
172
|
];
|
|
173
|
-
var AssumeRoleResponse = [
|
|
173
|
+
var AssumeRoleResponse$ = [
|
|
174
174
|
3,
|
|
175
175
|
n0,
|
|
176
176
|
_ARRs,
|
|
177
177
|
0,
|
|
178
178
|
[_C, _ARU, _PPS, _SI],
|
|
179
|
-
[[() => Credentials
|
|
179
|
+
[[() => Credentials$, 0], () => AssumedRoleUser$, 1, 0],
|
|
180
180
|
];
|
|
181
|
-
var AssumeRoleWithWebIdentityRequest = [
|
|
181
|
+
var AssumeRoleWithWebIdentityRequest$ = [
|
|
182
182
|
3,
|
|
183
183
|
n0,
|
|
184
184
|
_ARWWIR,
|
|
@@ -186,15 +186,15 @@ var AssumeRoleWithWebIdentityRequest = [
|
|
|
186
186
|
[_RA, _RSN, _WIT, _PI, _PA, _P, _DS],
|
|
187
187
|
[0, 0, [() => clientTokenType, 0], 0, () => policyDescriptorListType, 0, 1],
|
|
188
188
|
];
|
|
189
|
-
var AssumeRoleWithWebIdentityResponse = [
|
|
189
|
+
var AssumeRoleWithWebIdentityResponse$ = [
|
|
190
190
|
3,
|
|
191
191
|
n0,
|
|
192
192
|
_ARWWIRs,
|
|
193
193
|
0,
|
|
194
194
|
[_C, _SFWIT, _ARU, _PPS, _Pr, _Au, _SI],
|
|
195
|
-
[[() => Credentials
|
|
195
|
+
[[() => Credentials$, 0], 0, () => AssumedRoleUser$, 1, 0, 0, 0],
|
|
196
196
|
];
|
|
197
|
-
var Credentials = [
|
|
197
|
+
var Credentials$ = [
|
|
198
198
|
3,
|
|
199
199
|
n0,
|
|
200
200
|
_C,
|
|
@@ -202,7 +202,7 @@ var Credentials = [
|
|
|
202
202
|
[_AKI, _SAK, _ST, _E],
|
|
203
203
|
[0, [() => accessKeySecretType, 0], 0, 4],
|
|
204
204
|
];
|
|
205
|
-
var ExpiredTokenException = [
|
|
205
|
+
var ExpiredTokenException$ = [
|
|
206
206
|
-3,
|
|
207
207
|
n0,
|
|
208
208
|
_ETE,
|
|
@@ -210,8 +210,8 @@ var ExpiredTokenException = [
|
|
|
210
210
|
[_m],
|
|
211
211
|
[0],
|
|
212
212
|
];
|
|
213
|
-
schema.TypeRegistry.for(n0).registerError(ExpiredTokenException
|
|
214
|
-
var IDPCommunicationErrorException = [
|
|
213
|
+
schema.TypeRegistry.for(n0).registerError(ExpiredTokenException$, ExpiredTokenException);
|
|
214
|
+
var IDPCommunicationErrorException$ = [
|
|
215
215
|
-3,
|
|
216
216
|
n0,
|
|
217
217
|
_IDPCEE,
|
|
@@ -219,8 +219,8 @@ var IDPCommunicationErrorException = [
|
|
|
219
219
|
[_m],
|
|
220
220
|
[0],
|
|
221
221
|
];
|
|
222
|
-
schema.TypeRegistry.for(n0).registerError(IDPCommunicationErrorException
|
|
223
|
-
var IDPRejectedClaimException = [
|
|
222
|
+
schema.TypeRegistry.for(n0).registerError(IDPCommunicationErrorException$, IDPCommunicationErrorException);
|
|
223
|
+
var IDPRejectedClaimException$ = [
|
|
224
224
|
-3,
|
|
225
225
|
n0,
|
|
226
226
|
_IDPRCE,
|
|
@@ -228,8 +228,8 @@ var IDPRejectedClaimException = [
|
|
|
228
228
|
[_m],
|
|
229
229
|
[0],
|
|
230
230
|
];
|
|
231
|
-
schema.TypeRegistry.for(n0).registerError(IDPRejectedClaimException
|
|
232
|
-
var InvalidIdentityTokenException = [
|
|
231
|
+
schema.TypeRegistry.for(n0).registerError(IDPRejectedClaimException$, IDPRejectedClaimException);
|
|
232
|
+
var InvalidIdentityTokenException$ = [
|
|
233
233
|
-3,
|
|
234
234
|
n0,
|
|
235
235
|
_IITE,
|
|
@@ -237,8 +237,8 @@ var InvalidIdentityTokenException = [
|
|
|
237
237
|
[_m],
|
|
238
238
|
[0],
|
|
239
239
|
];
|
|
240
|
-
schema.TypeRegistry.for(n0).registerError(InvalidIdentityTokenException
|
|
241
|
-
var MalformedPolicyDocumentException = [
|
|
240
|
+
schema.TypeRegistry.for(n0).registerError(InvalidIdentityTokenException$, InvalidIdentityTokenException);
|
|
241
|
+
var MalformedPolicyDocumentException$ = [
|
|
242
242
|
-3,
|
|
243
243
|
n0,
|
|
244
244
|
_MPDE,
|
|
@@ -246,8 +246,8 @@ var MalformedPolicyDocumentException = [
|
|
|
246
246
|
[_m],
|
|
247
247
|
[0],
|
|
248
248
|
];
|
|
249
|
-
schema.TypeRegistry.for(n0).registerError(MalformedPolicyDocumentException
|
|
250
|
-
var PackedPolicyTooLargeException = [
|
|
249
|
+
schema.TypeRegistry.for(n0).registerError(MalformedPolicyDocumentException$, MalformedPolicyDocumentException);
|
|
250
|
+
var PackedPolicyTooLargeException$ = [
|
|
251
251
|
-3,
|
|
252
252
|
n0,
|
|
253
253
|
_PPTLE,
|
|
@@ -255,10 +255,10 @@ var PackedPolicyTooLargeException = [
|
|
|
255
255
|
[_m],
|
|
256
256
|
[0],
|
|
257
257
|
];
|
|
258
|
-
schema.TypeRegistry.for(n0).registerError(PackedPolicyTooLargeException
|
|
259
|
-
var PolicyDescriptorType = [3, n0, _PDT, 0, [_a], [0]];
|
|
260
|
-
var ProvidedContext = [3, n0, _PCr, 0, [_PAr, _CA], [0, 0]];
|
|
261
|
-
var RegionDisabledException = [
|
|
258
|
+
schema.TypeRegistry.for(n0).registerError(PackedPolicyTooLargeException$, PackedPolicyTooLargeException);
|
|
259
|
+
var PolicyDescriptorType$ = [3, n0, _PDT, 0, [_a], [0]];
|
|
260
|
+
var ProvidedContext$ = [3, n0, _PCr, 0, [_PAr, _CA], [0, 0]];
|
|
261
|
+
var RegionDisabledException$ = [
|
|
262
262
|
-3,
|
|
263
263
|
n0,
|
|
264
264
|
_RDE,
|
|
@@ -266,21 +266,21 @@ var RegionDisabledException = [
|
|
|
266
266
|
[_m],
|
|
267
267
|
[0],
|
|
268
268
|
];
|
|
269
|
-
schema.TypeRegistry.for(n0).registerError(RegionDisabledException
|
|
270
|
-
var Tag = [3, n0, _Ta, 0, [_K, _V], [0, 0]];
|
|
271
|
-
var STSServiceException = [-3, _s, "STSServiceException", 0, [], []];
|
|
272
|
-
schema.TypeRegistry.for(_s).registerError(STSServiceException
|
|
273
|
-
var policyDescriptorListType = [1, n0, _pDLT, 0, () => PolicyDescriptorType];
|
|
274
|
-
var ProvidedContextsListType = [1, n0, _PCLT, 0, () => ProvidedContext];
|
|
275
|
-
var tagListType = [1, n0, _tLT, 0, () => Tag];
|
|
276
|
-
var AssumeRole = [9, n0, _AR, 0, () => AssumeRoleRequest
|
|
277
|
-
var AssumeRoleWithWebIdentity = [
|
|
269
|
+
schema.TypeRegistry.for(n0).registerError(RegionDisabledException$, RegionDisabledException);
|
|
270
|
+
var Tag$ = [3, n0, _Ta, 0, [_K, _V], [0, 0]];
|
|
271
|
+
var STSServiceException$ = [-3, _s, "STSServiceException", 0, [], []];
|
|
272
|
+
schema.TypeRegistry.for(_s).registerError(STSServiceException$, STSServiceException);
|
|
273
|
+
var policyDescriptorListType = [1, n0, _pDLT, 0, () => PolicyDescriptorType$];
|
|
274
|
+
var ProvidedContextsListType = [1, n0, _PCLT, 0, () => ProvidedContext$];
|
|
275
|
+
var tagListType = [1, n0, _tLT, 0, () => Tag$];
|
|
276
|
+
var AssumeRole$ = [9, n0, _AR, 0, () => AssumeRoleRequest$, () => AssumeRoleResponse$];
|
|
277
|
+
var AssumeRoleWithWebIdentity$ = [
|
|
278
278
|
9,
|
|
279
279
|
n0,
|
|
280
280
|
_ARWWI,
|
|
281
281
|
0,
|
|
282
|
-
() => AssumeRoleWithWebIdentityRequest
|
|
283
|
-
() => AssumeRoleWithWebIdentityResponse
|
|
282
|
+
() => AssumeRoleWithWebIdentityRequest$,
|
|
283
|
+
() => AssumeRoleWithWebIdentityResponse$,
|
|
284
284
|
];
|
|
285
285
|
|
|
286
286
|
class AssumeRoleCommand extends smithyClient.Command
|
|
@@ -291,7 +291,7 @@ class AssumeRoleCommand extends smithyClient.Command
|
|
|
291
291
|
})
|
|
292
292
|
.s("AWSSecurityTokenServiceV20110615", "AssumeRole", {})
|
|
293
293
|
.n("STSClient", "AssumeRoleCommand")
|
|
294
|
-
.sc(AssumeRole)
|
|
294
|
+
.sc(AssumeRole$)
|
|
295
295
|
.build() {
|
|
296
296
|
}
|
|
297
297
|
|
|
@@ -303,7 +303,7 @@ class AssumeRoleWithWebIdentityCommand extends smithyClient.Command
|
|
|
303
303
|
})
|
|
304
304
|
.s("AWSSecurityTokenServiceV20110615", "AssumeRoleWithWebIdentity", {})
|
|
305
305
|
.n("STSClient", "AssumeRoleWithWebIdentityCommand")
|
|
306
|
-
.sc(AssumeRoleWithWebIdentity)
|
|
306
|
+
.sc(AssumeRoleWithWebIdentity$)
|
|
307
307
|
.build() {
|
|
308
308
|
}
|
|
309
309
|
|
|
@@ -439,17 +439,36 @@ Object.defineProperty(exports, "$Command", {
|
|
|
439
439
|
enumerable: true,
|
|
440
440
|
get: function () { return smithyClient.Command; }
|
|
441
441
|
});
|
|
442
|
+
exports.AssumeRole$ = AssumeRole$;
|
|
442
443
|
exports.AssumeRoleCommand = AssumeRoleCommand;
|
|
444
|
+
exports.AssumeRoleRequest$ = AssumeRoleRequest$;
|
|
445
|
+
exports.AssumeRoleResponse$ = AssumeRoleResponse$;
|
|
446
|
+
exports.AssumeRoleWithWebIdentity$ = AssumeRoleWithWebIdentity$;
|
|
443
447
|
exports.AssumeRoleWithWebIdentityCommand = AssumeRoleWithWebIdentityCommand;
|
|
444
|
-
exports.
|
|
445
|
-
exports.
|
|
446
|
-
exports.
|
|
447
|
-
exports.
|
|
448
|
-
exports.
|
|
449
|
-
exports.
|
|
450
|
-
exports.
|
|
448
|
+
exports.AssumeRoleWithWebIdentityRequest$ = AssumeRoleWithWebIdentityRequest$;
|
|
449
|
+
exports.AssumeRoleWithWebIdentityResponse$ = AssumeRoleWithWebIdentityResponse$;
|
|
450
|
+
exports.AssumedRoleUser$ = AssumedRoleUser$;
|
|
451
|
+
exports.Credentials$ = Credentials$;
|
|
452
|
+
exports.ExpiredTokenException = ExpiredTokenException;
|
|
453
|
+
exports.ExpiredTokenException$ = ExpiredTokenException$;
|
|
454
|
+
exports.IDPCommunicationErrorException = IDPCommunicationErrorException;
|
|
455
|
+
exports.IDPCommunicationErrorException$ = IDPCommunicationErrorException$;
|
|
456
|
+
exports.IDPRejectedClaimException = IDPRejectedClaimException;
|
|
457
|
+
exports.IDPRejectedClaimException$ = IDPRejectedClaimException$;
|
|
458
|
+
exports.InvalidIdentityTokenException = InvalidIdentityTokenException;
|
|
459
|
+
exports.InvalidIdentityTokenException$ = InvalidIdentityTokenException$;
|
|
460
|
+
exports.MalformedPolicyDocumentException = MalformedPolicyDocumentException;
|
|
461
|
+
exports.MalformedPolicyDocumentException$ = MalformedPolicyDocumentException$;
|
|
462
|
+
exports.PackedPolicyTooLargeException = PackedPolicyTooLargeException;
|
|
463
|
+
exports.PackedPolicyTooLargeException$ = PackedPolicyTooLargeException$;
|
|
464
|
+
exports.PolicyDescriptorType$ = PolicyDescriptorType$;
|
|
465
|
+
exports.ProvidedContext$ = ProvidedContext$;
|
|
466
|
+
exports.RegionDisabledException = RegionDisabledException;
|
|
467
|
+
exports.RegionDisabledException$ = RegionDisabledException$;
|
|
451
468
|
exports.STS = STS;
|
|
452
|
-
exports.STSServiceException = STSServiceException
|
|
469
|
+
exports.STSServiceException = STSServiceException;
|
|
470
|
+
exports.STSServiceException$ = STSServiceException$;
|
|
471
|
+
exports.Tag$ = Tag$;
|
|
453
472
|
exports.decorateDefaultCredentialProvider = decorateDefaultCredentialProvider;
|
|
454
473
|
exports.getDefaultRoleAssumer = getDefaultRoleAssumer;
|
|
455
474
|
exports.getDefaultRoleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity;
|
|
@@ -32,12 +32,13 @@ const getRuntimeConfig = (config) => {
|
|
|
32
32
|
},
|
|
33
33
|
],
|
|
34
34
|
logger: config?.logger ?? new smithy_client_1.NoOpLogger(),
|
|
35
|
-
protocol: config?.protocol ??
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
35
|
+
protocol: config?.protocol ?? protocols_1.AwsQueryProtocol,
|
|
36
|
+
protocolSettings: config?.protocolSettings ?? {
|
|
37
|
+
defaultNamespace: "com.amazonaws.sts",
|
|
38
|
+
xmlNamespace: "https://sts.amazonaws.com/doc/2011-06-15/",
|
|
39
|
+
version: "2011-06-15",
|
|
40
|
+
serviceTarget: "AWSSecurityTokenServiceV20110615",
|
|
41
|
+
},
|
|
41
42
|
serviceId: config?.serviceId ?? "STS",
|
|
42
43
|
urlParser: config?.urlParser ?? url_parser_1.parseUrl,
|
|
43
44
|
utf8Decoder: config?.utf8Decoder ?? util_utf8_1.fromUtf8,
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { getEndpointPlugin } from "@smithy/middleware-endpoint";
|
|
2
2
|
import { Command as $Command } from "@smithy/smithy-client";
|
|
3
3
|
import { commonParams } from "../endpoint/EndpointParameters";
|
|
4
|
-
import { CreateOAuth2Token } from "../schemas/schemas_0";
|
|
4
|
+
import { CreateOAuth2Token$ } from "../schemas/schemas_0";
|
|
5
5
|
export { $Command };
|
|
6
6
|
export class CreateOAuth2TokenCommand extends $Command
|
|
7
7
|
.classBuilder()
|
|
@@ -11,6 +11,6 @@ export class CreateOAuth2TokenCommand extends $Command
|
|
|
11
11
|
})
|
|
12
12
|
.s("Signin", "CreateOAuth2Token", {})
|
|
13
13
|
.n("SigninClient", "CreateOAuth2TokenCommand")
|
|
14
|
-
.sc(CreateOAuth2Token)
|
|
14
|
+
.sc(CreateOAuth2Token$)
|
|
15
15
|
.build() {
|
|
16
16
|
}
|
|
@@ -1,6 +1,7 @@
|
|
|
1
1
|
export * from "./SigninClient";
|
|
2
2
|
export * from "./Signin";
|
|
3
3
|
export * from "./commands";
|
|
4
|
+
export * from "./schemas/schemas_0";
|
|
4
5
|
export * from "./models/enums";
|
|
5
6
|
export * from "./models/errors";
|
|
6
7
|
export { SigninServiceException } from "./models/SigninServiceException";
|
|
@@ -29,7 +29,12 @@ export const getRuntimeConfig = (config) => {
|
|
|
29
29
|
},
|
|
30
30
|
],
|
|
31
31
|
logger: config?.logger ?? new NoOpLogger(),
|
|
32
|
-
protocol: config?.protocol ??
|
|
32
|
+
protocol: config?.protocol ?? AwsRestJsonProtocol,
|
|
33
|
+
protocolSettings: config?.protocolSettings ?? {
|
|
34
|
+
defaultNamespace: "com.amazonaws.signin",
|
|
35
|
+
version: "2023-01-01",
|
|
36
|
+
serviceTarget: "Signin",
|
|
37
|
+
},
|
|
33
38
|
serviceId: config?.serviceId ?? "Signin",
|
|
34
39
|
urlParser: config?.urlParser ?? parseUrl,
|
|
35
40
|
utf8Decoder: config?.utf8Decoder ?? fromUtf8,
|
|
@@ -34,12 +34,12 @@ const _tO = "tokenOutput";
|
|
|
34
34
|
const _tT = "tokenType";
|
|
35
35
|
const n0 = "com.amazonaws.signin";
|
|
36
36
|
import { TypeRegistry } from "@smithy/core/schema";
|
|
37
|
-
import { AccessDeniedException
|
|
38
|
-
import { SigninServiceException
|
|
39
|
-
|
|
40
|
-
export var AccessDeniedException = [-3, n0, _ADE, { [_e]: _c }, [_e, _m], [0, 0]];
|
|
41
|
-
TypeRegistry.for(n0).registerError(AccessDeniedException
|
|
42
|
-
export var AccessToken = [
|
|
37
|
+
import { AccessDeniedException, InternalServerException, TooManyRequestsError, ValidationException, } from "../models/errors";
|
|
38
|
+
import { SigninServiceException } from "../models/SigninServiceException";
|
|
39
|
+
var RefreshToken = [0, n0, _RT, 8, 0];
|
|
40
|
+
export var AccessDeniedException$ = [-3, n0, _ADE, { [_e]: _c }, [_e, _m], [0, 0]];
|
|
41
|
+
TypeRegistry.for(n0).registerError(AccessDeniedException$, AccessDeniedException);
|
|
42
|
+
export var AccessToken$ = [
|
|
43
43
|
3,
|
|
44
44
|
n0,
|
|
45
45
|
_AT,
|
|
@@ -51,15 +51,15 @@ export var AccessToken = [
|
|
|
51
51
|
[0, { [_jN]: _sT }],
|
|
52
52
|
],
|
|
53
53
|
];
|
|
54
|
-
export var CreateOAuth2TokenRequest = [
|
|
54
|
+
export var CreateOAuth2TokenRequest$ = [
|
|
55
55
|
3,
|
|
56
56
|
n0,
|
|
57
57
|
_COATR,
|
|
58
58
|
0,
|
|
59
59
|
[_tI],
|
|
60
|
-
[[() => CreateOAuth2TokenRequestBody
|
|
60
|
+
[[() => CreateOAuth2TokenRequestBody$, 16]],
|
|
61
61
|
];
|
|
62
|
-
export var CreateOAuth2TokenRequestBody = [
|
|
62
|
+
export var CreateOAuth2TokenRequestBody$ = [
|
|
63
63
|
3,
|
|
64
64
|
n0,
|
|
65
65
|
_COATRB,
|
|
@@ -74,41 +74,41 @@ export var CreateOAuth2TokenRequestBody = [
|
|
|
74
74
|
[() => RefreshToken, { [_jN]: _rT }],
|
|
75
75
|
],
|
|
76
76
|
];
|
|
77
|
-
export var CreateOAuth2TokenResponse = [
|
|
77
|
+
export var CreateOAuth2TokenResponse$ = [
|
|
78
78
|
3,
|
|
79
79
|
n0,
|
|
80
80
|
_COATRr,
|
|
81
81
|
0,
|
|
82
82
|
[_tO],
|
|
83
|
-
[[() => CreateOAuth2TokenResponseBody
|
|
83
|
+
[[() => CreateOAuth2TokenResponseBody$, 16]],
|
|
84
84
|
];
|
|
85
|
-
export var CreateOAuth2TokenResponseBody = [
|
|
85
|
+
export var CreateOAuth2TokenResponseBody$ = [
|
|
86
86
|
3,
|
|
87
87
|
n0,
|
|
88
88
|
_COATRBr,
|
|
89
89
|
0,
|
|
90
90
|
[_aT, _tT, _eI, _rT, _iT],
|
|
91
91
|
[
|
|
92
|
-
[() => AccessToken
|
|
92
|
+
[() => AccessToken$, { [_jN]: _aT }],
|
|
93
93
|
[0, { [_jN]: _tT }],
|
|
94
94
|
[1, { [_jN]: _eI }],
|
|
95
95
|
[() => RefreshToken, { [_jN]: _rT }],
|
|
96
96
|
[0, { [_jN]: _iT }],
|
|
97
97
|
],
|
|
98
98
|
];
|
|
99
|
-
export var InternalServerException = [-3, n0, _ISE, { [_e]: _s, [_hE]: 500 }, [_e, _m], [0, 0]];
|
|
100
|
-
TypeRegistry.for(n0).registerError(InternalServerException
|
|
101
|
-
export var TooManyRequestsError = [-3, n0, _TMRE, { [_e]: _c, [_hE]: 429 }, [_e, _m], [0, 0]];
|
|
102
|
-
TypeRegistry.for(n0).registerError(TooManyRequestsError
|
|
103
|
-
export var ValidationException = [-3, n0, _VE, { [_e]: _c, [_hE]: 400 }, [_e, _m], [0, 0]];
|
|
104
|
-
TypeRegistry.for(n0).registerError(ValidationException
|
|
105
|
-
export var SigninServiceException = [-3, _sm, "SigninServiceException", 0, [], []];
|
|
106
|
-
TypeRegistry.for(_sm).registerError(SigninServiceException
|
|
107
|
-
export var CreateOAuth2Token = [
|
|
99
|
+
export var InternalServerException$ = [-3, n0, _ISE, { [_e]: _s, [_hE]: 500 }, [_e, _m], [0, 0]];
|
|
100
|
+
TypeRegistry.for(n0).registerError(InternalServerException$, InternalServerException);
|
|
101
|
+
export var TooManyRequestsError$ = [-3, n0, _TMRE, { [_e]: _c, [_hE]: 429 }, [_e, _m], [0, 0]];
|
|
102
|
+
TypeRegistry.for(n0).registerError(TooManyRequestsError$, TooManyRequestsError);
|
|
103
|
+
export var ValidationException$ = [-3, n0, _VE, { [_e]: _c, [_hE]: 400 }, [_e, _m], [0, 0]];
|
|
104
|
+
TypeRegistry.for(n0).registerError(ValidationException$, ValidationException);
|
|
105
|
+
export var SigninServiceException$ = [-3, _sm, "SigninServiceException", 0, [], []];
|
|
106
|
+
TypeRegistry.for(_sm).registerError(SigninServiceException$, SigninServiceException);
|
|
107
|
+
export var CreateOAuth2Token$ = [
|
|
108
108
|
9,
|
|
109
109
|
n0,
|
|
110
110
|
_COAT,
|
|
111
111
|
{ [_h]: ["POST", "/v1/token", 200] },
|
|
112
|
-
() => CreateOAuth2TokenRequest
|
|
113
|
-
() => CreateOAuth2TokenResponse
|
|
112
|
+
() => CreateOAuth2TokenRequest$,
|
|
113
|
+
() => CreateOAuth2TokenResponse$,
|
|
114
114
|
];
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { getEndpointPlugin } from "@smithy/middleware-endpoint";
|
|
2
2
|
import { Command as $Command } from "@smithy/smithy-client";
|
|
3
3
|
import { commonParams } from "../endpoint/EndpointParameters";
|
|
4
|
-
import { CreateToken } from "../schemas/schemas_0";
|
|
4
|
+
import { CreateToken$ } from "../schemas/schemas_0";
|
|
5
5
|
export { $Command };
|
|
6
6
|
export class CreateTokenCommand extends $Command
|
|
7
7
|
.classBuilder()
|
|
@@ -11,6 +11,6 @@ export class CreateTokenCommand extends $Command
|
|
|
11
11
|
})
|
|
12
12
|
.s("AWSSSOOIDCService", "CreateToken", {})
|
|
13
13
|
.n("SSOOIDCClient", "CreateTokenCommand")
|
|
14
|
-
.sc(CreateToken)
|
|
14
|
+
.sc(CreateToken$)
|
|
15
15
|
.build() {
|
|
16
16
|
}
|
|
@@ -1,6 +1,7 @@
|
|
|
1
1
|
export * from "./SSOOIDCClient";
|
|
2
2
|
export * from "./SSOOIDC";
|
|
3
3
|
export * from "./commands";
|
|
4
|
+
export * from "./schemas/schemas_0";
|
|
4
5
|
export * from "./models/enums";
|
|
5
6
|
export * from "./models/errors";
|
|
6
7
|
export { SSOOIDCServiceException } from "./models/SSOOIDCServiceException";
|
|
@@ -29,7 +29,12 @@ export const getRuntimeConfig = (config) => {
|
|
|
29
29
|
},
|
|
30
30
|
],
|
|
31
31
|
logger: config?.logger ?? new NoOpLogger(),
|
|
32
|
-
protocol: config?.protocol ??
|
|
32
|
+
protocol: config?.protocol ?? AwsRestJsonProtocol,
|
|
33
|
+
protocolSettings: config?.protocolSettings ?? {
|
|
34
|
+
defaultNamespace: "com.amazonaws.ssooidc",
|
|
35
|
+
version: "2019-06-10",
|
|
36
|
+
serviceTarget: "AWSSSOOIDCService",
|
|
37
|
+
},
|
|
33
38
|
serviceId: config?.serviceId ?? "SSO OIDC",
|
|
34
39
|
urlParser: config?.urlParser ?? parseUrl,
|
|
35
40
|
utf8Decoder: config?.utf8Decoder ?? fromUtf8,
|
|
@@ -40,14 +40,14 @@ const _sm = "smithy.ts.sdk.synthetic.com.amazonaws.ssooidc";
|
|
|
40
40
|
const _tT = "tokenType";
|
|
41
41
|
const n0 = "com.amazonaws.ssooidc";
|
|
42
42
|
import { TypeRegistry } from "@smithy/core/schema";
|
|
43
|
-
import { AccessDeniedException
|
|
44
|
-
import { SSOOIDCServiceException
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
export var AccessDeniedException = [
|
|
43
|
+
import { AccessDeniedException, AuthorizationPendingException, ExpiredTokenException, InternalServerException, InvalidClientException, InvalidGrantException, InvalidRequestException, InvalidScopeException, SlowDownException, UnauthorizedClientException, UnsupportedGrantTypeException, } from "../models/errors";
|
|
44
|
+
import { SSOOIDCServiceException } from "../models/SSOOIDCServiceException";
|
|
45
|
+
var AccessToken = [0, n0, _AT, 8, 0];
|
|
46
|
+
var ClientSecret = [0, n0, _CS, 8, 0];
|
|
47
|
+
var CodeVerifier = [0, n0, _CV, 8, 0];
|
|
48
|
+
var IdToken = [0, n0, _IT, 8, 0];
|
|
49
|
+
var RefreshToken = [0, n0, _RT, 8, 0];
|
|
50
|
+
export var AccessDeniedException$ = [
|
|
51
51
|
-3,
|
|
52
52
|
n0,
|
|
53
53
|
_ADE,
|
|
@@ -55,8 +55,8 @@ export var AccessDeniedException = [
|
|
|
55
55
|
[_e, _r, _ed],
|
|
56
56
|
[0, 0, 0],
|
|
57
57
|
];
|
|
58
|
-
TypeRegistry.for(n0).registerError(AccessDeniedException
|
|
59
|
-
export var AuthorizationPendingException = [
|
|
58
|
+
TypeRegistry.for(n0).registerError(AccessDeniedException$, AccessDeniedException);
|
|
59
|
+
export var AuthorizationPendingException$ = [
|
|
60
60
|
-3,
|
|
61
61
|
n0,
|
|
62
62
|
_APE,
|
|
@@ -64,8 +64,8 @@ export var AuthorizationPendingException = [
|
|
|
64
64
|
[_e, _ed],
|
|
65
65
|
[0, 0],
|
|
66
66
|
];
|
|
67
|
-
TypeRegistry.for(n0).registerError(AuthorizationPendingException
|
|
68
|
-
export var CreateTokenRequest = [
|
|
67
|
+
TypeRegistry.for(n0).registerError(AuthorizationPendingException$, AuthorizationPendingException);
|
|
68
|
+
export var CreateTokenRequest$ = [
|
|
69
69
|
3,
|
|
70
70
|
n0,
|
|
71
71
|
_CTR,
|
|
@@ -73,7 +73,7 @@ export var CreateTokenRequest = [
|
|
|
73
73
|
[_cI, _cS, _gT, _dC, _co, _rT, _s, _rU, _cV],
|
|
74
74
|
[0, [() => ClientSecret, 0], 0, 0, 0, [() => RefreshToken, 0], 64 | 0, 0, [() => CodeVerifier, 0]],
|
|
75
75
|
];
|
|
76
|
-
export var CreateTokenResponse = [
|
|
76
|
+
export var CreateTokenResponse$ = [
|
|
77
77
|
3,
|
|
78
78
|
n0,
|
|
79
79
|
_CTRr,
|
|
@@ -81,15 +81,15 @@ export var CreateTokenResponse = [
|
|
|
81
81
|
[_aT, _tT, _eI, _rT, _iT],
|
|
82
82
|
[[() => AccessToken, 0], 0, 1, [() => RefreshToken, 0], [() => IdToken, 0]],
|
|
83
83
|
];
|
|
84
|
-
export var ExpiredTokenException = [-3, n0, _ETE, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
|
|
85
|
-
TypeRegistry.for(n0).registerError(ExpiredTokenException
|
|
86
|
-
export var InternalServerException = [-3, n0, _ISE, { [_e]: _se, [_hE]: 500 }, [_e, _ed], [0, 0]];
|
|
87
|
-
TypeRegistry.for(n0).registerError(InternalServerException
|
|
88
|
-
export var InvalidClientException = [-3, n0, _ICE, { [_e]: _c, [_hE]: 401 }, [_e, _ed], [0, 0]];
|
|
89
|
-
TypeRegistry.for(n0).registerError(InvalidClientException
|
|
90
|
-
export var InvalidGrantException = [-3, n0, _IGE, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
|
|
91
|
-
TypeRegistry.for(n0).registerError(InvalidGrantException
|
|
92
|
-
export var InvalidRequestException = [
|
|
84
|
+
export var ExpiredTokenException$ = [-3, n0, _ETE, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
|
|
85
|
+
TypeRegistry.for(n0).registerError(ExpiredTokenException$, ExpiredTokenException);
|
|
86
|
+
export var InternalServerException$ = [-3, n0, _ISE, { [_e]: _se, [_hE]: 500 }, [_e, _ed], [0, 0]];
|
|
87
|
+
TypeRegistry.for(n0).registerError(InternalServerException$, InternalServerException);
|
|
88
|
+
export var InvalidClientException$ = [-3, n0, _ICE, { [_e]: _c, [_hE]: 401 }, [_e, _ed], [0, 0]];
|
|
89
|
+
TypeRegistry.for(n0).registerError(InvalidClientException$, InvalidClientException);
|
|
90
|
+
export var InvalidGrantException$ = [-3, n0, _IGE, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
|
|
91
|
+
TypeRegistry.for(n0).registerError(InvalidGrantException$, InvalidGrantException);
|
|
92
|
+
export var InvalidRequestException$ = [
|
|
93
93
|
-3,
|
|
94
94
|
n0,
|
|
95
95
|
_IRE,
|
|
@@ -97,14 +97,21 @@ export var InvalidRequestException = [
|
|
|
97
97
|
[_e, _r, _ed],
|
|
98
98
|
[0, 0, 0],
|
|
99
99
|
];
|
|
100
|
-
TypeRegistry.for(n0).registerError(InvalidRequestException
|
|
101
|
-
export var InvalidScopeException = [-3, n0, _ISEn, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
|
|
102
|
-
TypeRegistry.for(n0).registerError(InvalidScopeException
|
|
103
|
-
export var SlowDownException = [-3, n0, _SDE, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
|
|
104
|
-
TypeRegistry.for(n0).registerError(SlowDownException
|
|
105
|
-
export var UnauthorizedClientException = [
|
|
106
|
-
|
|
107
|
-
|
|
100
|
+
TypeRegistry.for(n0).registerError(InvalidRequestException$, InvalidRequestException);
|
|
101
|
+
export var InvalidScopeException$ = [-3, n0, _ISEn, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
|
|
102
|
+
TypeRegistry.for(n0).registerError(InvalidScopeException$, InvalidScopeException);
|
|
103
|
+
export var SlowDownException$ = [-3, n0, _SDE, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
|
|
104
|
+
TypeRegistry.for(n0).registerError(SlowDownException$, SlowDownException);
|
|
105
|
+
export var UnauthorizedClientException$ = [
|
|
106
|
+
-3,
|
|
107
|
+
n0,
|
|
108
|
+
_UCE,
|
|
109
|
+
{ [_e]: _c, [_hE]: 400 },
|
|
110
|
+
[_e, _ed],
|
|
111
|
+
[0, 0],
|
|
112
|
+
];
|
|
113
|
+
TypeRegistry.for(n0).registerError(UnauthorizedClientException$, UnauthorizedClientException);
|
|
114
|
+
export var UnsupportedGrantTypeException$ = [
|
|
108
115
|
-3,
|
|
109
116
|
n0,
|
|
110
117
|
_UGTE,
|
|
@@ -112,15 +119,15 @@ export var UnsupportedGrantTypeException = [
|
|
|
112
119
|
[_e, _ed],
|
|
113
120
|
[0, 0],
|
|
114
121
|
];
|
|
115
|
-
TypeRegistry.for(n0).registerError(UnsupportedGrantTypeException
|
|
116
|
-
export var SSOOIDCServiceException = [-3, _sm, "SSOOIDCServiceException", 0, [], []];
|
|
117
|
-
TypeRegistry.for(_sm).registerError(SSOOIDCServiceException
|
|
118
|
-
|
|
119
|
-
export var CreateToken = [
|
|
122
|
+
TypeRegistry.for(n0).registerError(UnsupportedGrantTypeException$, UnsupportedGrantTypeException);
|
|
123
|
+
export var SSOOIDCServiceException$ = [-3, _sm, "SSOOIDCServiceException", 0, [], []];
|
|
124
|
+
TypeRegistry.for(_sm).registerError(SSOOIDCServiceException$, SSOOIDCServiceException);
|
|
125
|
+
var Scopes = 64 | 0;
|
|
126
|
+
export var CreateToken$ = [
|
|
120
127
|
9,
|
|
121
128
|
n0,
|
|
122
129
|
_CT,
|
|
123
130
|
{ [_h]: ["POST", "/token", 200] },
|
|
124
|
-
() => CreateTokenRequest
|
|
125
|
-
() => CreateTokenResponse
|
|
131
|
+
() => CreateTokenRequest$,
|
|
132
|
+
() => CreateTokenResponse$,
|
|
126
133
|
];
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { getEndpointPlugin } from "@smithy/middleware-endpoint";
|
|
2
2
|
import { Command as $Command } from "@smithy/smithy-client";
|
|
3
3
|
import { commonParams } from "../endpoint/EndpointParameters";
|
|
4
|
-
import { AssumeRole } from "../schemas/schemas_0";
|
|
4
|
+
import { AssumeRole$ } from "../schemas/schemas_0";
|
|
5
5
|
export { $Command };
|
|
6
6
|
export class AssumeRoleCommand extends $Command
|
|
7
7
|
.classBuilder()
|
|
@@ -11,6 +11,6 @@ export class AssumeRoleCommand extends $Command
|
|
|
11
11
|
})
|
|
12
12
|
.s("AWSSecurityTokenServiceV20110615", "AssumeRole", {})
|
|
13
13
|
.n("STSClient", "AssumeRoleCommand")
|
|
14
|
-
.sc(AssumeRole)
|
|
14
|
+
.sc(AssumeRole$)
|
|
15
15
|
.build() {
|
|
16
16
|
}
|