@aws-sdk/nested-clients 3.952.0 → 3.954.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (62) hide show
  1. package/dist-cjs/submodules/signin/index.js +48 -37
  2. package/dist-cjs/submodules/signin/runtimeConfig.shared.js +6 -1
  3. package/dist-cjs/submodules/sso-oidc/index.js +88 -66
  4. package/dist-cjs/submodules/sso-oidc/runtimeConfig.shared.js +6 -1
  5. package/dist-cjs/submodules/sts/index.js +79 -60
  6. package/dist-cjs/submodules/sts/runtimeConfig.shared.js +7 -6
  7. package/dist-es/submodules/signin/commands/CreateOAuth2TokenCommand.js +2 -2
  8. package/dist-es/submodules/signin/index.js +1 -0
  9. package/dist-es/submodules/signin/runtimeConfig.shared.js +6 -1
  10. package/dist-es/submodules/signin/schemas/schemas_0.js +24 -24
  11. package/dist-es/submodules/sso-oidc/commands/CreateTokenCommand.js +2 -2
  12. package/dist-es/submodules/sso-oidc/index.js +1 -0
  13. package/dist-es/submodules/sso-oidc/runtimeConfig.shared.js +6 -1
  14. package/dist-es/submodules/sso-oidc/schemas/schemas_0.js +44 -37
  15. package/dist-es/submodules/sts/commands/AssumeRoleCommand.js +2 -2
  16. package/dist-es/submodules/sts/commands/AssumeRoleWithWebIdentityCommand.js +2 -2
  17. package/dist-es/submodules/sts/index.js +1 -0
  18. package/dist-es/submodules/sts/runtimeConfig.shared.js +7 -6
  19. package/dist-es/submodules/sts/schemas/schemas_0.js +39 -39
  20. package/dist-types/submodules/signin/SigninClient.d.ts +1 -10
  21. package/dist-types/submodules/signin/index.d.ts +1 -0
  22. package/dist-types/submodules/signin/runtimeConfig.browser.d.ts +6 -2
  23. package/dist-types/submodules/signin/runtimeConfig.d.ts +6 -2
  24. package/dist-types/submodules/signin/runtimeConfig.native.d.ts +6 -2
  25. package/dist-types/submodules/signin/runtimeConfig.shared.d.ts +6 -1
  26. package/dist-types/submodules/signin/schemas/schemas_0.d.ts +12 -13
  27. package/dist-types/submodules/sso-oidc/SSOOIDCClient.d.ts +1 -10
  28. package/dist-types/submodules/sso-oidc/index.d.ts +1 -0
  29. package/dist-types/submodules/sso-oidc/runtimeConfig.browser.d.ts +6 -2
  30. package/dist-types/submodules/sso-oidc/runtimeConfig.d.ts +6 -2
  31. package/dist-types/submodules/sso-oidc/runtimeConfig.native.d.ts +6 -2
  32. package/dist-types/submodules/sso-oidc/runtimeConfig.shared.d.ts +6 -1
  33. package/dist-types/submodules/sso-oidc/schemas/schemas_0.d.ts +16 -22
  34. package/dist-types/submodules/sts/STSClient.d.ts +1 -10
  35. package/dist-types/submodules/sts/index.d.ts +1 -0
  36. package/dist-types/submodules/sts/runtimeConfig.browser.d.ts +6 -2
  37. package/dist-types/submodules/sts/runtimeConfig.d.ts +6 -2
  38. package/dist-types/submodules/sts/runtimeConfig.native.d.ts +6 -2
  39. package/dist-types/submodules/sts/runtimeConfig.shared.d.ts +6 -1
  40. package/dist-types/submodules/sts/schemas/schemas_0.d.ts +20 -26
  41. package/dist-types/ts3.4/submodules/signin/SigninClient.d.ts +0 -4
  42. package/dist-types/ts3.4/submodules/signin/index.d.ts +1 -0
  43. package/dist-types/ts3.4/submodules/signin/runtimeConfig.browser.d.ts +9 -5
  44. package/dist-types/ts3.4/submodules/signin/runtimeConfig.d.ts +9 -5
  45. package/dist-types/ts3.4/submodules/signin/runtimeConfig.native.d.ts +9 -5
  46. package/dist-types/ts3.4/submodules/signin/runtimeConfig.shared.d.ts +9 -4
  47. package/dist-types/ts3.4/submodules/signin/schemas/schemas_0.d.ts +11 -13
  48. package/dist-types/ts3.4/submodules/sso-oidc/SSOOIDCClient.d.ts +0 -4
  49. package/dist-types/ts3.4/submodules/sso-oidc/index.d.ts +1 -0
  50. package/dist-types/ts3.4/submodules/sso-oidc/runtimeConfig.browser.d.ts +9 -5
  51. package/dist-types/ts3.4/submodules/sso-oidc/runtimeConfig.d.ts +9 -5
  52. package/dist-types/ts3.4/submodules/sso-oidc/runtimeConfig.native.d.ts +9 -5
  53. package/dist-types/ts3.4/submodules/sso-oidc/runtimeConfig.shared.d.ts +9 -4
  54. package/dist-types/ts3.4/submodules/sso-oidc/schemas/schemas_0.d.ts +15 -22
  55. package/dist-types/ts3.4/submodules/sts/STSClient.d.ts +0 -4
  56. package/dist-types/ts3.4/submodules/sts/index.d.ts +1 -0
  57. package/dist-types/ts3.4/submodules/sts/runtimeConfig.browser.d.ts +9 -5
  58. package/dist-types/ts3.4/submodules/sts/runtimeConfig.d.ts +9 -5
  59. package/dist-types/ts3.4/submodules/sts/runtimeConfig.native.d.ts +9 -5
  60. package/dist-types/ts3.4/submodules/sts/runtimeConfig.shared.d.ts +9 -4
  61. package/dist-types/ts3.4/submodules/sts/schemas/schemas_0.d.ts +19 -27
  62. package/package.json +32 -32
@@ -8,14 +8,14 @@ var schema = require('@smithy/core/schema');
8
8
  var client = require('@aws-sdk/core/client');
9
9
  var regionConfigResolver = require('@aws-sdk/region-config-resolver');
10
10
 
11
- let STSServiceException$1 = class STSServiceException extends smithyClient.ServiceException {
11
+ class STSServiceException extends smithyClient.ServiceException {
12
12
  constructor(options) {
13
13
  super(options);
14
14
  Object.setPrototypeOf(this, STSServiceException.prototype);
15
15
  }
16
- };
16
+ }
17
17
 
18
- let ExpiredTokenException$1 = class ExpiredTokenException extends STSServiceException$1 {
18
+ class ExpiredTokenException extends STSServiceException {
19
19
  name = "ExpiredTokenException";
20
20
  $fault = "client";
21
21
  constructor(opts) {
@@ -26,8 +26,8 @@ let ExpiredTokenException$1 = class ExpiredTokenException extends STSServiceExce
26
26
  });
27
27
  Object.setPrototypeOf(this, ExpiredTokenException.prototype);
28
28
  }
29
- };
30
- let MalformedPolicyDocumentException$1 = class MalformedPolicyDocumentException extends STSServiceException$1 {
29
+ }
30
+ class MalformedPolicyDocumentException extends STSServiceException {
31
31
  name = "MalformedPolicyDocumentException";
32
32
  $fault = "client";
33
33
  constructor(opts) {
@@ -38,8 +38,8 @@ let MalformedPolicyDocumentException$1 = class MalformedPolicyDocumentException
38
38
  });
39
39
  Object.setPrototypeOf(this, MalformedPolicyDocumentException.prototype);
40
40
  }
41
- };
42
- let PackedPolicyTooLargeException$1 = class PackedPolicyTooLargeException extends STSServiceException$1 {
41
+ }
42
+ class PackedPolicyTooLargeException extends STSServiceException {
43
43
  name = "PackedPolicyTooLargeException";
44
44
  $fault = "client";
45
45
  constructor(opts) {
@@ -50,8 +50,8 @@ let PackedPolicyTooLargeException$1 = class PackedPolicyTooLargeException extend
50
50
  });
51
51
  Object.setPrototypeOf(this, PackedPolicyTooLargeException.prototype);
52
52
  }
53
- };
54
- let RegionDisabledException$1 = class RegionDisabledException extends STSServiceException$1 {
53
+ }
54
+ class RegionDisabledException extends STSServiceException {
55
55
  name = "RegionDisabledException";
56
56
  $fault = "client";
57
57
  constructor(opts) {
@@ -62,8 +62,8 @@ let RegionDisabledException$1 = class RegionDisabledException extends STSService
62
62
  });
63
63
  Object.setPrototypeOf(this, RegionDisabledException.prototype);
64
64
  }
65
- };
66
- let IDPRejectedClaimException$1 = class IDPRejectedClaimException extends STSServiceException$1 {
65
+ }
66
+ class IDPRejectedClaimException extends STSServiceException {
67
67
  name = "IDPRejectedClaimException";
68
68
  $fault = "client";
69
69
  constructor(opts) {
@@ -74,8 +74,8 @@ let IDPRejectedClaimException$1 = class IDPRejectedClaimException extends STSSer
74
74
  });
75
75
  Object.setPrototypeOf(this, IDPRejectedClaimException.prototype);
76
76
  }
77
- };
78
- let InvalidIdentityTokenException$1 = class InvalidIdentityTokenException extends STSServiceException$1 {
77
+ }
78
+ class InvalidIdentityTokenException extends STSServiceException {
79
79
  name = "InvalidIdentityTokenException";
80
80
  $fault = "client";
81
81
  constructor(opts) {
@@ -86,8 +86,8 @@ let InvalidIdentityTokenException$1 = class InvalidIdentityTokenException extend
86
86
  });
87
87
  Object.setPrototypeOf(this, InvalidIdentityTokenException.prototype);
88
88
  }
89
- };
90
- let IDPCommunicationErrorException$1 = class IDPCommunicationErrorException extends STSServiceException$1 {
89
+ }
90
+ class IDPCommunicationErrorException extends STSServiceException {
91
91
  name = "IDPCommunicationErrorException";
92
92
  $fault = "client";
93
93
  constructor(opts) {
@@ -98,7 +98,7 @@ let IDPCommunicationErrorException$1 = class IDPCommunicationErrorException exte
98
98
  });
99
99
  Object.setPrototypeOf(this, IDPCommunicationErrorException.prototype);
100
100
  }
101
- };
101
+ }
102
102
 
103
103
  const _A = "Arn";
104
104
  const _AKI = "AccessKeyId";
@@ -161,8 +161,8 @@ const _tLT = "tagListType";
161
161
  const n0 = "com.amazonaws.sts";
162
162
  var accessKeySecretType = [0, n0, _aKST, 8, 0];
163
163
  var clientTokenType = [0, n0, _cTT, 8, 0];
164
- var AssumedRoleUser = [3, n0, _ARU, 0, [_ARI, _A], [0, 0]];
165
- var AssumeRoleRequest = [
164
+ var AssumedRoleUser$ = [3, n0, _ARU, 0, [_ARI, _A], [0, 0]];
165
+ var AssumeRoleRequest$ = [
166
166
  3,
167
167
  n0,
168
168
  _ARR,
@@ -170,15 +170,15 @@ var AssumeRoleRequest = [
170
170
  [_RA, _RSN, _PA, _P, _DS, _T, _TTK, _EI, _SN, _TC, _SI, _PC],
171
171
  [0, 0, () => policyDescriptorListType, 0, 1, () => tagListType, 64 | 0, 0, 0, 0, 0, () => ProvidedContextsListType],
172
172
  ];
173
- var AssumeRoleResponse = [
173
+ var AssumeRoleResponse$ = [
174
174
  3,
175
175
  n0,
176
176
  _ARRs,
177
177
  0,
178
178
  [_C, _ARU, _PPS, _SI],
179
- [[() => Credentials, 0], () => AssumedRoleUser, 1, 0],
179
+ [[() => Credentials$, 0], () => AssumedRoleUser$, 1, 0],
180
180
  ];
181
- var AssumeRoleWithWebIdentityRequest = [
181
+ var AssumeRoleWithWebIdentityRequest$ = [
182
182
  3,
183
183
  n0,
184
184
  _ARWWIR,
@@ -186,15 +186,15 @@ var AssumeRoleWithWebIdentityRequest = [
186
186
  [_RA, _RSN, _WIT, _PI, _PA, _P, _DS],
187
187
  [0, 0, [() => clientTokenType, 0], 0, () => policyDescriptorListType, 0, 1],
188
188
  ];
189
- var AssumeRoleWithWebIdentityResponse = [
189
+ var AssumeRoleWithWebIdentityResponse$ = [
190
190
  3,
191
191
  n0,
192
192
  _ARWWIRs,
193
193
  0,
194
194
  [_C, _SFWIT, _ARU, _PPS, _Pr, _Au, _SI],
195
- [[() => Credentials, 0], 0, () => AssumedRoleUser, 1, 0, 0, 0],
195
+ [[() => Credentials$, 0], 0, () => AssumedRoleUser$, 1, 0, 0, 0],
196
196
  ];
197
- var Credentials = [
197
+ var Credentials$ = [
198
198
  3,
199
199
  n0,
200
200
  _C,
@@ -202,7 +202,7 @@ var Credentials = [
202
202
  [_AKI, _SAK, _ST, _E],
203
203
  [0, [() => accessKeySecretType, 0], 0, 4],
204
204
  ];
205
- var ExpiredTokenException = [
205
+ var ExpiredTokenException$ = [
206
206
  -3,
207
207
  n0,
208
208
  _ETE,
@@ -210,8 +210,8 @@ var ExpiredTokenException = [
210
210
  [_m],
211
211
  [0],
212
212
  ];
213
- schema.TypeRegistry.for(n0).registerError(ExpiredTokenException, ExpiredTokenException$1);
214
- var IDPCommunicationErrorException = [
213
+ schema.TypeRegistry.for(n0).registerError(ExpiredTokenException$, ExpiredTokenException);
214
+ var IDPCommunicationErrorException$ = [
215
215
  -3,
216
216
  n0,
217
217
  _IDPCEE,
@@ -219,8 +219,8 @@ var IDPCommunicationErrorException = [
219
219
  [_m],
220
220
  [0],
221
221
  ];
222
- schema.TypeRegistry.for(n0).registerError(IDPCommunicationErrorException, IDPCommunicationErrorException$1);
223
- var IDPRejectedClaimException = [
222
+ schema.TypeRegistry.for(n0).registerError(IDPCommunicationErrorException$, IDPCommunicationErrorException);
223
+ var IDPRejectedClaimException$ = [
224
224
  -3,
225
225
  n0,
226
226
  _IDPRCE,
@@ -228,8 +228,8 @@ var IDPRejectedClaimException = [
228
228
  [_m],
229
229
  [0],
230
230
  ];
231
- schema.TypeRegistry.for(n0).registerError(IDPRejectedClaimException, IDPRejectedClaimException$1);
232
- var InvalidIdentityTokenException = [
231
+ schema.TypeRegistry.for(n0).registerError(IDPRejectedClaimException$, IDPRejectedClaimException);
232
+ var InvalidIdentityTokenException$ = [
233
233
  -3,
234
234
  n0,
235
235
  _IITE,
@@ -237,8 +237,8 @@ var InvalidIdentityTokenException = [
237
237
  [_m],
238
238
  [0],
239
239
  ];
240
- schema.TypeRegistry.for(n0).registerError(InvalidIdentityTokenException, InvalidIdentityTokenException$1);
241
- var MalformedPolicyDocumentException = [
240
+ schema.TypeRegistry.for(n0).registerError(InvalidIdentityTokenException$, InvalidIdentityTokenException);
241
+ var MalformedPolicyDocumentException$ = [
242
242
  -3,
243
243
  n0,
244
244
  _MPDE,
@@ -246,8 +246,8 @@ var MalformedPolicyDocumentException = [
246
246
  [_m],
247
247
  [0],
248
248
  ];
249
- schema.TypeRegistry.for(n0).registerError(MalformedPolicyDocumentException, MalformedPolicyDocumentException$1);
250
- var PackedPolicyTooLargeException = [
249
+ schema.TypeRegistry.for(n0).registerError(MalformedPolicyDocumentException$, MalformedPolicyDocumentException);
250
+ var PackedPolicyTooLargeException$ = [
251
251
  -3,
252
252
  n0,
253
253
  _PPTLE,
@@ -255,10 +255,10 @@ var PackedPolicyTooLargeException = [
255
255
  [_m],
256
256
  [0],
257
257
  ];
258
- schema.TypeRegistry.for(n0).registerError(PackedPolicyTooLargeException, PackedPolicyTooLargeException$1);
259
- var PolicyDescriptorType = [3, n0, _PDT, 0, [_a], [0]];
260
- var ProvidedContext = [3, n0, _PCr, 0, [_PAr, _CA], [0, 0]];
261
- var RegionDisabledException = [
258
+ schema.TypeRegistry.for(n0).registerError(PackedPolicyTooLargeException$, PackedPolicyTooLargeException);
259
+ var PolicyDescriptorType$ = [3, n0, _PDT, 0, [_a], [0]];
260
+ var ProvidedContext$ = [3, n0, _PCr, 0, [_PAr, _CA], [0, 0]];
261
+ var RegionDisabledException$ = [
262
262
  -3,
263
263
  n0,
264
264
  _RDE,
@@ -266,21 +266,21 @@ var RegionDisabledException = [
266
266
  [_m],
267
267
  [0],
268
268
  ];
269
- schema.TypeRegistry.for(n0).registerError(RegionDisabledException, RegionDisabledException$1);
270
- var Tag = [3, n0, _Ta, 0, [_K, _V], [0, 0]];
271
- var STSServiceException = [-3, _s, "STSServiceException", 0, [], []];
272
- schema.TypeRegistry.for(_s).registerError(STSServiceException, STSServiceException$1);
273
- var policyDescriptorListType = [1, n0, _pDLT, 0, () => PolicyDescriptorType];
274
- var ProvidedContextsListType = [1, n0, _PCLT, 0, () => ProvidedContext];
275
- var tagListType = [1, n0, _tLT, 0, () => Tag];
276
- var AssumeRole = [9, n0, _AR, 0, () => AssumeRoleRequest, () => AssumeRoleResponse];
277
- var AssumeRoleWithWebIdentity = [
269
+ schema.TypeRegistry.for(n0).registerError(RegionDisabledException$, RegionDisabledException);
270
+ var Tag$ = [3, n0, _Ta, 0, [_K, _V], [0, 0]];
271
+ var STSServiceException$ = [-3, _s, "STSServiceException", 0, [], []];
272
+ schema.TypeRegistry.for(_s).registerError(STSServiceException$, STSServiceException);
273
+ var policyDescriptorListType = [1, n0, _pDLT, 0, () => PolicyDescriptorType$];
274
+ var ProvidedContextsListType = [1, n0, _PCLT, 0, () => ProvidedContext$];
275
+ var tagListType = [1, n0, _tLT, 0, () => Tag$];
276
+ var AssumeRole$ = [9, n0, _AR, 0, () => AssumeRoleRequest$, () => AssumeRoleResponse$];
277
+ var AssumeRoleWithWebIdentity$ = [
278
278
  9,
279
279
  n0,
280
280
  _ARWWI,
281
281
  0,
282
- () => AssumeRoleWithWebIdentityRequest,
283
- () => AssumeRoleWithWebIdentityResponse,
282
+ () => AssumeRoleWithWebIdentityRequest$,
283
+ () => AssumeRoleWithWebIdentityResponse$,
284
284
  ];
285
285
 
286
286
  class AssumeRoleCommand extends smithyClient.Command
@@ -291,7 +291,7 @@ class AssumeRoleCommand extends smithyClient.Command
291
291
  })
292
292
  .s("AWSSecurityTokenServiceV20110615", "AssumeRole", {})
293
293
  .n("STSClient", "AssumeRoleCommand")
294
- .sc(AssumeRole)
294
+ .sc(AssumeRole$)
295
295
  .build() {
296
296
  }
297
297
 
@@ -303,7 +303,7 @@ class AssumeRoleWithWebIdentityCommand extends smithyClient.Command
303
303
  })
304
304
  .s("AWSSecurityTokenServiceV20110615", "AssumeRoleWithWebIdentity", {})
305
305
  .n("STSClient", "AssumeRoleWithWebIdentityCommand")
306
- .sc(AssumeRoleWithWebIdentity)
306
+ .sc(AssumeRoleWithWebIdentity$)
307
307
  .build() {
308
308
  }
309
309
 
@@ -439,17 +439,36 @@ Object.defineProperty(exports, "$Command", {
439
439
  enumerable: true,
440
440
  get: function () { return smithyClient.Command; }
441
441
  });
442
+ exports.AssumeRole$ = AssumeRole$;
442
443
  exports.AssumeRoleCommand = AssumeRoleCommand;
444
+ exports.AssumeRoleRequest$ = AssumeRoleRequest$;
445
+ exports.AssumeRoleResponse$ = AssumeRoleResponse$;
446
+ exports.AssumeRoleWithWebIdentity$ = AssumeRoleWithWebIdentity$;
443
447
  exports.AssumeRoleWithWebIdentityCommand = AssumeRoleWithWebIdentityCommand;
444
- exports.ExpiredTokenException = ExpiredTokenException$1;
445
- exports.IDPCommunicationErrorException = IDPCommunicationErrorException$1;
446
- exports.IDPRejectedClaimException = IDPRejectedClaimException$1;
447
- exports.InvalidIdentityTokenException = InvalidIdentityTokenException$1;
448
- exports.MalformedPolicyDocumentException = MalformedPolicyDocumentException$1;
449
- exports.PackedPolicyTooLargeException = PackedPolicyTooLargeException$1;
450
- exports.RegionDisabledException = RegionDisabledException$1;
448
+ exports.AssumeRoleWithWebIdentityRequest$ = AssumeRoleWithWebIdentityRequest$;
449
+ exports.AssumeRoleWithWebIdentityResponse$ = AssumeRoleWithWebIdentityResponse$;
450
+ exports.AssumedRoleUser$ = AssumedRoleUser$;
451
+ exports.Credentials$ = Credentials$;
452
+ exports.ExpiredTokenException = ExpiredTokenException;
453
+ exports.ExpiredTokenException$ = ExpiredTokenException$;
454
+ exports.IDPCommunicationErrorException = IDPCommunicationErrorException;
455
+ exports.IDPCommunicationErrorException$ = IDPCommunicationErrorException$;
456
+ exports.IDPRejectedClaimException = IDPRejectedClaimException;
457
+ exports.IDPRejectedClaimException$ = IDPRejectedClaimException$;
458
+ exports.InvalidIdentityTokenException = InvalidIdentityTokenException;
459
+ exports.InvalidIdentityTokenException$ = InvalidIdentityTokenException$;
460
+ exports.MalformedPolicyDocumentException = MalformedPolicyDocumentException;
461
+ exports.MalformedPolicyDocumentException$ = MalformedPolicyDocumentException$;
462
+ exports.PackedPolicyTooLargeException = PackedPolicyTooLargeException;
463
+ exports.PackedPolicyTooLargeException$ = PackedPolicyTooLargeException$;
464
+ exports.PolicyDescriptorType$ = PolicyDescriptorType$;
465
+ exports.ProvidedContext$ = ProvidedContext$;
466
+ exports.RegionDisabledException = RegionDisabledException;
467
+ exports.RegionDisabledException$ = RegionDisabledException$;
451
468
  exports.STS = STS;
452
- exports.STSServiceException = STSServiceException$1;
469
+ exports.STSServiceException = STSServiceException;
470
+ exports.STSServiceException$ = STSServiceException$;
471
+ exports.Tag$ = Tag$;
453
472
  exports.decorateDefaultCredentialProvider = decorateDefaultCredentialProvider;
454
473
  exports.getDefaultRoleAssumer = getDefaultRoleAssumer;
455
474
  exports.getDefaultRoleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity;
@@ -32,12 +32,13 @@ const getRuntimeConfig = (config) => {
32
32
  },
33
33
  ],
34
34
  logger: config?.logger ?? new smithy_client_1.NoOpLogger(),
35
- protocol: config?.protocol ??
36
- new protocols_1.AwsQueryProtocol({
37
- defaultNamespace: "com.amazonaws.sts",
38
- xmlNamespace: "https://sts.amazonaws.com/doc/2011-06-15/",
39
- version: "2011-06-15",
40
- }),
35
+ protocol: config?.protocol ?? protocols_1.AwsQueryProtocol,
36
+ protocolSettings: config?.protocolSettings ?? {
37
+ defaultNamespace: "com.amazonaws.sts",
38
+ xmlNamespace: "https://sts.amazonaws.com/doc/2011-06-15/",
39
+ version: "2011-06-15",
40
+ serviceTarget: "AWSSecurityTokenServiceV20110615",
41
+ },
41
42
  serviceId: config?.serviceId ?? "STS",
42
43
  urlParser: config?.urlParser ?? url_parser_1.parseUrl,
43
44
  utf8Decoder: config?.utf8Decoder ?? util_utf8_1.fromUtf8,
@@ -1,7 +1,7 @@
1
1
  import { getEndpointPlugin } from "@smithy/middleware-endpoint";
2
2
  import { Command as $Command } from "@smithy/smithy-client";
3
3
  import { commonParams } from "../endpoint/EndpointParameters";
4
- import { CreateOAuth2Token } from "../schemas/schemas_0";
4
+ import { CreateOAuth2Token$ } from "../schemas/schemas_0";
5
5
  export { $Command };
6
6
  export class CreateOAuth2TokenCommand extends $Command
7
7
  .classBuilder()
@@ -11,6 +11,6 @@ export class CreateOAuth2TokenCommand extends $Command
11
11
  })
12
12
  .s("Signin", "CreateOAuth2Token", {})
13
13
  .n("SigninClient", "CreateOAuth2TokenCommand")
14
- .sc(CreateOAuth2Token)
14
+ .sc(CreateOAuth2Token$)
15
15
  .build() {
16
16
  }
@@ -1,6 +1,7 @@
1
1
  export * from "./SigninClient";
2
2
  export * from "./Signin";
3
3
  export * from "./commands";
4
+ export * from "./schemas/schemas_0";
4
5
  export * from "./models/enums";
5
6
  export * from "./models/errors";
6
7
  export { SigninServiceException } from "./models/SigninServiceException";
@@ -29,7 +29,12 @@ export const getRuntimeConfig = (config) => {
29
29
  },
30
30
  ],
31
31
  logger: config?.logger ?? new NoOpLogger(),
32
- protocol: config?.protocol ?? new AwsRestJsonProtocol({ defaultNamespace: "com.amazonaws.signin" }),
32
+ protocol: config?.protocol ?? AwsRestJsonProtocol,
33
+ protocolSettings: config?.protocolSettings ?? {
34
+ defaultNamespace: "com.amazonaws.signin",
35
+ version: "2023-01-01",
36
+ serviceTarget: "Signin",
37
+ },
33
38
  serviceId: config?.serviceId ?? "Signin",
34
39
  urlParser: config?.urlParser ?? parseUrl,
35
40
  utf8Decoder: config?.utf8Decoder ?? fromUtf8,
@@ -34,12 +34,12 @@ const _tO = "tokenOutput";
34
34
  const _tT = "tokenType";
35
35
  const n0 = "com.amazonaws.signin";
36
36
  import { TypeRegistry } from "@smithy/core/schema";
37
- import { AccessDeniedException as __AccessDeniedException, InternalServerException as __InternalServerException, TooManyRequestsError as __TooManyRequestsError, ValidationException as __ValidationException, } from "../models/errors";
38
- import { SigninServiceException as __SigninServiceException } from "../models/SigninServiceException";
39
- export var RefreshToken = [0, n0, _RT, 8, 0];
40
- export var AccessDeniedException = [-3, n0, _ADE, { [_e]: _c }, [_e, _m], [0, 0]];
41
- TypeRegistry.for(n0).registerError(AccessDeniedException, __AccessDeniedException);
42
- export var AccessToken = [
37
+ import { AccessDeniedException, InternalServerException, TooManyRequestsError, ValidationException, } from "../models/errors";
38
+ import { SigninServiceException } from "../models/SigninServiceException";
39
+ var RefreshToken = [0, n0, _RT, 8, 0];
40
+ export var AccessDeniedException$ = [-3, n0, _ADE, { [_e]: _c }, [_e, _m], [0, 0]];
41
+ TypeRegistry.for(n0).registerError(AccessDeniedException$, AccessDeniedException);
42
+ export var AccessToken$ = [
43
43
  3,
44
44
  n0,
45
45
  _AT,
@@ -51,15 +51,15 @@ export var AccessToken = [
51
51
  [0, { [_jN]: _sT }],
52
52
  ],
53
53
  ];
54
- export var CreateOAuth2TokenRequest = [
54
+ export var CreateOAuth2TokenRequest$ = [
55
55
  3,
56
56
  n0,
57
57
  _COATR,
58
58
  0,
59
59
  [_tI],
60
- [[() => CreateOAuth2TokenRequestBody, 16]],
60
+ [[() => CreateOAuth2TokenRequestBody$, 16]],
61
61
  ];
62
- export var CreateOAuth2TokenRequestBody = [
62
+ export var CreateOAuth2TokenRequestBody$ = [
63
63
  3,
64
64
  n0,
65
65
  _COATRB,
@@ -74,41 +74,41 @@ export var CreateOAuth2TokenRequestBody = [
74
74
  [() => RefreshToken, { [_jN]: _rT }],
75
75
  ],
76
76
  ];
77
- export var CreateOAuth2TokenResponse = [
77
+ export var CreateOAuth2TokenResponse$ = [
78
78
  3,
79
79
  n0,
80
80
  _COATRr,
81
81
  0,
82
82
  [_tO],
83
- [[() => CreateOAuth2TokenResponseBody, 16]],
83
+ [[() => CreateOAuth2TokenResponseBody$, 16]],
84
84
  ];
85
- export var CreateOAuth2TokenResponseBody = [
85
+ export var CreateOAuth2TokenResponseBody$ = [
86
86
  3,
87
87
  n0,
88
88
  _COATRBr,
89
89
  0,
90
90
  [_aT, _tT, _eI, _rT, _iT],
91
91
  [
92
- [() => AccessToken, { [_jN]: _aT }],
92
+ [() => AccessToken$, { [_jN]: _aT }],
93
93
  [0, { [_jN]: _tT }],
94
94
  [1, { [_jN]: _eI }],
95
95
  [() => RefreshToken, { [_jN]: _rT }],
96
96
  [0, { [_jN]: _iT }],
97
97
  ],
98
98
  ];
99
- export var InternalServerException = [-3, n0, _ISE, { [_e]: _s, [_hE]: 500 }, [_e, _m], [0, 0]];
100
- TypeRegistry.for(n0).registerError(InternalServerException, __InternalServerException);
101
- export var TooManyRequestsError = [-3, n0, _TMRE, { [_e]: _c, [_hE]: 429 }, [_e, _m], [0, 0]];
102
- TypeRegistry.for(n0).registerError(TooManyRequestsError, __TooManyRequestsError);
103
- export var ValidationException = [-3, n0, _VE, { [_e]: _c, [_hE]: 400 }, [_e, _m], [0, 0]];
104
- TypeRegistry.for(n0).registerError(ValidationException, __ValidationException);
105
- export var SigninServiceException = [-3, _sm, "SigninServiceException", 0, [], []];
106
- TypeRegistry.for(_sm).registerError(SigninServiceException, __SigninServiceException);
107
- export var CreateOAuth2Token = [
99
+ export var InternalServerException$ = [-3, n0, _ISE, { [_e]: _s, [_hE]: 500 }, [_e, _m], [0, 0]];
100
+ TypeRegistry.for(n0).registerError(InternalServerException$, InternalServerException);
101
+ export var TooManyRequestsError$ = [-3, n0, _TMRE, { [_e]: _c, [_hE]: 429 }, [_e, _m], [0, 0]];
102
+ TypeRegistry.for(n0).registerError(TooManyRequestsError$, TooManyRequestsError);
103
+ export var ValidationException$ = [-3, n0, _VE, { [_e]: _c, [_hE]: 400 }, [_e, _m], [0, 0]];
104
+ TypeRegistry.for(n0).registerError(ValidationException$, ValidationException);
105
+ export var SigninServiceException$ = [-3, _sm, "SigninServiceException", 0, [], []];
106
+ TypeRegistry.for(_sm).registerError(SigninServiceException$, SigninServiceException);
107
+ export var CreateOAuth2Token$ = [
108
108
  9,
109
109
  n0,
110
110
  _COAT,
111
111
  { [_h]: ["POST", "/v1/token", 200] },
112
- () => CreateOAuth2TokenRequest,
113
- () => CreateOAuth2TokenResponse,
112
+ () => CreateOAuth2TokenRequest$,
113
+ () => CreateOAuth2TokenResponse$,
114
114
  ];
@@ -1,7 +1,7 @@
1
1
  import { getEndpointPlugin } from "@smithy/middleware-endpoint";
2
2
  import { Command as $Command } from "@smithy/smithy-client";
3
3
  import { commonParams } from "../endpoint/EndpointParameters";
4
- import { CreateToken } from "../schemas/schemas_0";
4
+ import { CreateToken$ } from "../schemas/schemas_0";
5
5
  export { $Command };
6
6
  export class CreateTokenCommand extends $Command
7
7
  .classBuilder()
@@ -11,6 +11,6 @@ export class CreateTokenCommand extends $Command
11
11
  })
12
12
  .s("AWSSSOOIDCService", "CreateToken", {})
13
13
  .n("SSOOIDCClient", "CreateTokenCommand")
14
- .sc(CreateToken)
14
+ .sc(CreateToken$)
15
15
  .build() {
16
16
  }
@@ -1,6 +1,7 @@
1
1
  export * from "./SSOOIDCClient";
2
2
  export * from "./SSOOIDC";
3
3
  export * from "./commands";
4
+ export * from "./schemas/schemas_0";
4
5
  export * from "./models/enums";
5
6
  export * from "./models/errors";
6
7
  export { SSOOIDCServiceException } from "./models/SSOOIDCServiceException";
@@ -29,7 +29,12 @@ export const getRuntimeConfig = (config) => {
29
29
  },
30
30
  ],
31
31
  logger: config?.logger ?? new NoOpLogger(),
32
- protocol: config?.protocol ?? new AwsRestJsonProtocol({ defaultNamespace: "com.amazonaws.ssooidc" }),
32
+ protocol: config?.protocol ?? AwsRestJsonProtocol,
33
+ protocolSettings: config?.protocolSettings ?? {
34
+ defaultNamespace: "com.amazonaws.ssooidc",
35
+ version: "2019-06-10",
36
+ serviceTarget: "AWSSSOOIDCService",
37
+ },
33
38
  serviceId: config?.serviceId ?? "SSO OIDC",
34
39
  urlParser: config?.urlParser ?? parseUrl,
35
40
  utf8Decoder: config?.utf8Decoder ?? fromUtf8,
@@ -40,14 +40,14 @@ const _sm = "smithy.ts.sdk.synthetic.com.amazonaws.ssooidc";
40
40
  const _tT = "tokenType";
41
41
  const n0 = "com.amazonaws.ssooidc";
42
42
  import { TypeRegistry } from "@smithy/core/schema";
43
- import { AccessDeniedException as __AccessDeniedException, AuthorizationPendingException as __AuthorizationPendingException, ExpiredTokenException as __ExpiredTokenException, InternalServerException as __InternalServerException, InvalidClientException as __InvalidClientException, InvalidGrantException as __InvalidGrantException, InvalidRequestException as __InvalidRequestException, InvalidScopeException as __InvalidScopeException, SlowDownException as __SlowDownException, UnauthorizedClientException as __UnauthorizedClientException, UnsupportedGrantTypeException as __UnsupportedGrantTypeException, } from "../models/errors";
44
- import { SSOOIDCServiceException as __SSOOIDCServiceException } from "../models/SSOOIDCServiceException";
45
- export var AccessToken = [0, n0, _AT, 8, 0];
46
- export var ClientSecret = [0, n0, _CS, 8, 0];
47
- export var CodeVerifier = [0, n0, _CV, 8, 0];
48
- export var IdToken = [0, n0, _IT, 8, 0];
49
- export var RefreshToken = [0, n0, _RT, 8, 0];
50
- export var AccessDeniedException = [
43
+ import { AccessDeniedException, AuthorizationPendingException, ExpiredTokenException, InternalServerException, InvalidClientException, InvalidGrantException, InvalidRequestException, InvalidScopeException, SlowDownException, UnauthorizedClientException, UnsupportedGrantTypeException, } from "../models/errors";
44
+ import { SSOOIDCServiceException } from "../models/SSOOIDCServiceException";
45
+ var AccessToken = [0, n0, _AT, 8, 0];
46
+ var ClientSecret = [0, n0, _CS, 8, 0];
47
+ var CodeVerifier = [0, n0, _CV, 8, 0];
48
+ var IdToken = [0, n0, _IT, 8, 0];
49
+ var RefreshToken = [0, n0, _RT, 8, 0];
50
+ export var AccessDeniedException$ = [
51
51
  -3,
52
52
  n0,
53
53
  _ADE,
@@ -55,8 +55,8 @@ export var AccessDeniedException = [
55
55
  [_e, _r, _ed],
56
56
  [0, 0, 0],
57
57
  ];
58
- TypeRegistry.for(n0).registerError(AccessDeniedException, __AccessDeniedException);
59
- export var AuthorizationPendingException = [
58
+ TypeRegistry.for(n0).registerError(AccessDeniedException$, AccessDeniedException);
59
+ export var AuthorizationPendingException$ = [
60
60
  -3,
61
61
  n0,
62
62
  _APE,
@@ -64,8 +64,8 @@ export var AuthorizationPendingException = [
64
64
  [_e, _ed],
65
65
  [0, 0],
66
66
  ];
67
- TypeRegistry.for(n0).registerError(AuthorizationPendingException, __AuthorizationPendingException);
68
- export var CreateTokenRequest = [
67
+ TypeRegistry.for(n0).registerError(AuthorizationPendingException$, AuthorizationPendingException);
68
+ export var CreateTokenRequest$ = [
69
69
  3,
70
70
  n0,
71
71
  _CTR,
@@ -73,7 +73,7 @@ export var CreateTokenRequest = [
73
73
  [_cI, _cS, _gT, _dC, _co, _rT, _s, _rU, _cV],
74
74
  [0, [() => ClientSecret, 0], 0, 0, 0, [() => RefreshToken, 0], 64 | 0, 0, [() => CodeVerifier, 0]],
75
75
  ];
76
- export var CreateTokenResponse = [
76
+ export var CreateTokenResponse$ = [
77
77
  3,
78
78
  n0,
79
79
  _CTRr,
@@ -81,15 +81,15 @@ export var CreateTokenResponse = [
81
81
  [_aT, _tT, _eI, _rT, _iT],
82
82
  [[() => AccessToken, 0], 0, 1, [() => RefreshToken, 0], [() => IdToken, 0]],
83
83
  ];
84
- export var ExpiredTokenException = [-3, n0, _ETE, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
85
- TypeRegistry.for(n0).registerError(ExpiredTokenException, __ExpiredTokenException);
86
- export var InternalServerException = [-3, n0, _ISE, { [_e]: _se, [_hE]: 500 }, [_e, _ed], [0, 0]];
87
- TypeRegistry.for(n0).registerError(InternalServerException, __InternalServerException);
88
- export var InvalidClientException = [-3, n0, _ICE, { [_e]: _c, [_hE]: 401 }, [_e, _ed], [0, 0]];
89
- TypeRegistry.for(n0).registerError(InvalidClientException, __InvalidClientException);
90
- export var InvalidGrantException = [-3, n0, _IGE, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
91
- TypeRegistry.for(n0).registerError(InvalidGrantException, __InvalidGrantException);
92
- export var InvalidRequestException = [
84
+ export var ExpiredTokenException$ = [-3, n0, _ETE, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
85
+ TypeRegistry.for(n0).registerError(ExpiredTokenException$, ExpiredTokenException);
86
+ export var InternalServerException$ = [-3, n0, _ISE, { [_e]: _se, [_hE]: 500 }, [_e, _ed], [0, 0]];
87
+ TypeRegistry.for(n0).registerError(InternalServerException$, InternalServerException);
88
+ export var InvalidClientException$ = [-3, n0, _ICE, { [_e]: _c, [_hE]: 401 }, [_e, _ed], [0, 0]];
89
+ TypeRegistry.for(n0).registerError(InvalidClientException$, InvalidClientException);
90
+ export var InvalidGrantException$ = [-3, n0, _IGE, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
91
+ TypeRegistry.for(n0).registerError(InvalidGrantException$, InvalidGrantException);
92
+ export var InvalidRequestException$ = [
93
93
  -3,
94
94
  n0,
95
95
  _IRE,
@@ -97,14 +97,21 @@ export var InvalidRequestException = [
97
97
  [_e, _r, _ed],
98
98
  [0, 0, 0],
99
99
  ];
100
- TypeRegistry.for(n0).registerError(InvalidRequestException, __InvalidRequestException);
101
- export var InvalidScopeException = [-3, n0, _ISEn, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
102
- TypeRegistry.for(n0).registerError(InvalidScopeException, __InvalidScopeException);
103
- export var SlowDownException = [-3, n0, _SDE, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
104
- TypeRegistry.for(n0).registerError(SlowDownException, __SlowDownException);
105
- export var UnauthorizedClientException = [-3, n0, _UCE, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
106
- TypeRegistry.for(n0).registerError(UnauthorizedClientException, __UnauthorizedClientException);
107
- export var UnsupportedGrantTypeException = [
100
+ TypeRegistry.for(n0).registerError(InvalidRequestException$, InvalidRequestException);
101
+ export var InvalidScopeException$ = [-3, n0, _ISEn, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
102
+ TypeRegistry.for(n0).registerError(InvalidScopeException$, InvalidScopeException);
103
+ export var SlowDownException$ = [-3, n0, _SDE, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
104
+ TypeRegistry.for(n0).registerError(SlowDownException$, SlowDownException);
105
+ export var UnauthorizedClientException$ = [
106
+ -3,
107
+ n0,
108
+ _UCE,
109
+ { [_e]: _c, [_hE]: 400 },
110
+ [_e, _ed],
111
+ [0, 0],
112
+ ];
113
+ TypeRegistry.for(n0).registerError(UnauthorizedClientException$, UnauthorizedClientException);
114
+ export var UnsupportedGrantTypeException$ = [
108
115
  -3,
109
116
  n0,
110
117
  _UGTE,
@@ -112,15 +119,15 @@ export var UnsupportedGrantTypeException = [
112
119
  [_e, _ed],
113
120
  [0, 0],
114
121
  ];
115
- TypeRegistry.for(n0).registerError(UnsupportedGrantTypeException, __UnsupportedGrantTypeException);
116
- export var SSOOIDCServiceException = [-3, _sm, "SSOOIDCServiceException", 0, [], []];
117
- TypeRegistry.for(_sm).registerError(SSOOIDCServiceException, __SSOOIDCServiceException);
118
- export var Scopes = 64 | 0;
119
- export var CreateToken = [
122
+ TypeRegistry.for(n0).registerError(UnsupportedGrantTypeException$, UnsupportedGrantTypeException);
123
+ export var SSOOIDCServiceException$ = [-3, _sm, "SSOOIDCServiceException", 0, [], []];
124
+ TypeRegistry.for(_sm).registerError(SSOOIDCServiceException$, SSOOIDCServiceException);
125
+ var Scopes = 64 | 0;
126
+ export var CreateToken$ = [
120
127
  9,
121
128
  n0,
122
129
  _CT,
123
130
  { [_h]: ["POST", "/token", 200] },
124
- () => CreateTokenRequest,
125
- () => CreateTokenResponse,
131
+ () => CreateTokenRequest$,
132
+ () => CreateTokenResponse$,
126
133
  ];
@@ -1,7 +1,7 @@
1
1
  import { getEndpointPlugin } from "@smithy/middleware-endpoint";
2
2
  import { Command as $Command } from "@smithy/smithy-client";
3
3
  import { commonParams } from "../endpoint/EndpointParameters";
4
- import { AssumeRole } from "../schemas/schemas_0";
4
+ import { AssumeRole$ } from "../schemas/schemas_0";
5
5
  export { $Command };
6
6
  export class AssumeRoleCommand extends $Command
7
7
  .classBuilder()
@@ -11,6 +11,6 @@ export class AssumeRoleCommand extends $Command
11
11
  })
12
12
  .s("AWSSecurityTokenServiceV20110615", "AssumeRole", {})
13
13
  .n("STSClient", "AssumeRoleCommand")
14
- .sc(AssumeRole)
14
+ .sc(AssumeRole$)
15
15
  .build() {
16
16
  }