@aws-sdk/token-providers 3.485.0 → 3.495.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,5 +1 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.REFRESH_MESSAGE = exports.EXPIRE_WINDOW_MS = void 0;
4
- exports.EXPIRE_WINDOW_MS = 5 * 60 * 1000;
5
- exports.REFRESH_MESSAGE = `To refresh this SSO session run 'aws sso login' with the corresponding profile.`;
1
+ module.exports = require("./index.js");
@@ -1,82 +1 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.fromSso = void 0;
4
- const property_provider_1 = require("@smithy/property-provider");
5
- const shared_ini_file_loader_1 = require("@smithy/shared-ini-file-loader");
6
- const constants_1 = require("./constants");
7
- const getNewSsoOidcToken_1 = require("./getNewSsoOidcToken");
8
- const validateTokenExpiry_1 = require("./validateTokenExpiry");
9
- const validateTokenKey_1 = require("./validateTokenKey");
10
- const writeSSOTokenToFile_1 = require("./writeSSOTokenToFile");
11
- const lastRefreshAttemptTime = new Date(0);
12
- const fromSso = (init = {}) => async () => {
13
- const profiles = await (0, shared_ini_file_loader_1.parseKnownFiles)(init);
14
- const profileName = (0, shared_ini_file_loader_1.getProfileName)(init);
15
- const profile = profiles[profileName];
16
- if (!profile) {
17
- throw new property_provider_1.TokenProviderError(`Profile '${profileName}' could not be found in shared credentials file.`, false);
18
- }
19
- else if (!profile["sso_session"]) {
20
- throw new property_provider_1.TokenProviderError(`Profile '${profileName}' is missing required property 'sso_session'.`);
21
- }
22
- const ssoSessionName = profile["sso_session"];
23
- const ssoSessions = await (0, shared_ini_file_loader_1.loadSsoSessionData)(init);
24
- const ssoSession = ssoSessions[ssoSessionName];
25
- if (!ssoSession) {
26
- throw new property_provider_1.TokenProviderError(`Sso session '${ssoSessionName}' could not be found in shared credentials file.`, false);
27
- }
28
- for (const ssoSessionRequiredKey of ["sso_start_url", "sso_region"]) {
29
- if (!ssoSession[ssoSessionRequiredKey]) {
30
- throw new property_provider_1.TokenProviderError(`Sso session '${ssoSessionName}' is missing required property '${ssoSessionRequiredKey}'.`, false);
31
- }
32
- }
33
- const ssoStartUrl = ssoSession["sso_start_url"];
34
- const ssoRegion = ssoSession["sso_region"];
35
- let ssoToken;
36
- try {
37
- ssoToken = await (0, shared_ini_file_loader_1.getSSOTokenFromFile)(ssoSessionName);
38
- }
39
- catch (e) {
40
- throw new property_provider_1.TokenProviderError(`The SSO session token associated with profile=${profileName} was not found or is invalid. ${constants_1.REFRESH_MESSAGE}`, false);
41
- }
42
- (0, validateTokenKey_1.validateTokenKey)("accessToken", ssoToken.accessToken);
43
- (0, validateTokenKey_1.validateTokenKey)("expiresAt", ssoToken.expiresAt);
44
- const { accessToken, expiresAt } = ssoToken;
45
- const existingToken = { token: accessToken, expiration: new Date(expiresAt) };
46
- if (existingToken.expiration.getTime() - Date.now() > constants_1.EXPIRE_WINDOW_MS) {
47
- return existingToken;
48
- }
49
- if (Date.now() - lastRefreshAttemptTime.getTime() < 30 * 1000) {
50
- (0, validateTokenExpiry_1.validateTokenExpiry)(existingToken);
51
- return existingToken;
52
- }
53
- (0, validateTokenKey_1.validateTokenKey)("clientId", ssoToken.clientId, true);
54
- (0, validateTokenKey_1.validateTokenKey)("clientSecret", ssoToken.clientSecret, true);
55
- (0, validateTokenKey_1.validateTokenKey)("refreshToken", ssoToken.refreshToken, true);
56
- try {
57
- lastRefreshAttemptTime.setTime(Date.now());
58
- const newSsoOidcToken = await (0, getNewSsoOidcToken_1.getNewSsoOidcToken)(ssoToken, ssoRegion);
59
- (0, validateTokenKey_1.validateTokenKey)("accessToken", newSsoOidcToken.accessToken);
60
- (0, validateTokenKey_1.validateTokenKey)("expiresIn", newSsoOidcToken.expiresIn);
61
- const newTokenExpiration = new Date(Date.now() + newSsoOidcToken.expiresIn * 1000);
62
- try {
63
- await (0, writeSSOTokenToFile_1.writeSSOTokenToFile)(ssoSessionName, {
64
- ...ssoToken,
65
- accessToken: newSsoOidcToken.accessToken,
66
- expiresAt: newTokenExpiration.toISOString(),
67
- refreshToken: newSsoOidcToken.refreshToken,
68
- });
69
- }
70
- catch (error) {
71
- }
72
- return {
73
- token: newSsoOidcToken.accessToken,
74
- expiration: newTokenExpiration,
75
- };
76
- }
77
- catch (error) {
78
- (0, validateTokenExpiry_1.validateTokenExpiry)(existingToken);
79
- return existingToken;
80
- }
81
- };
82
- exports.fromSso = fromSso;
1
+ module.exports = require("./index.js");
@@ -1,11 +1 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.fromStatic = void 0;
4
- const property_provider_1 = require("@smithy/property-provider");
5
- const fromStatic = ({ token }) => async () => {
6
- if (!token || !token.token) {
7
- throw new property_provider_1.TokenProviderError(`Please pass a valid token to fromStatic`, false);
8
- }
9
- return token;
10
- };
11
- exports.fromStatic = fromStatic;
1
+ module.exports = require("./index.js");
@@ -1,15 +1 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.getNewSsoOidcToken = void 0;
4
- const client_sso_oidc_node_1 = require("./bundle/client-sso-oidc-node");
5
- const getSsoOidcClient_1 = require("./getSsoOidcClient");
6
- const getNewSsoOidcToken = (ssoToken, ssoRegion) => {
7
- const ssoOidcClient = (0, getSsoOidcClient_1.getSsoOidcClient)(ssoRegion);
8
- return ssoOidcClient.send(new client_sso_oidc_node_1.CreateTokenCommand({
9
- clientId: ssoToken.clientId,
10
- clientSecret: ssoToken.clientSecret,
11
- refreshToken: ssoToken.refreshToken,
12
- grantType: "refresh_token",
13
- }));
14
- };
15
- exports.getNewSsoOidcToken = getNewSsoOidcToken;
1
+ module.exports = require("./index.js");
@@ -1,14 +1 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.getSsoOidcClient = void 0;
4
- const client_sso_oidc_node_1 = require("./bundle/client-sso-oidc-node");
5
- const ssoOidcClientsHash = {};
6
- const getSsoOidcClient = (ssoRegion) => {
7
- if (ssoOidcClientsHash[ssoRegion]) {
8
- return ssoOidcClientsHash[ssoRegion];
9
- }
10
- const ssoOidcClient = new client_sso_oidc_node_1.SSOOIDCClient({ region: ssoRegion });
11
- ssoOidcClientsHash[ssoRegion] = ssoOidcClient;
12
- return ssoOidcClient;
13
- };
14
- exports.getSsoOidcClient = getSsoOidcClient;
1
+ module.exports = require("./index.js");
package/dist-cjs/index.js CHANGED
@@ -1,7 +1,198 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- const tslib_1 = require("tslib");
4
- tslib_1.__exportStar(require("./bundle/client-sso-oidc-node"), exports);
5
- tslib_1.__exportStar(require("./fromSso"), exports);
6
- tslib_1.__exportStar(require("./fromStatic"), exports);
7
- tslib_1.__exportStar(require("./nodeProvider"), exports);
1
+ var __defProp = Object.defineProperty;
2
+ var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
3
+ var __getOwnPropNames = Object.getOwnPropertyNames;
4
+ var __hasOwnProp = Object.prototype.hasOwnProperty;
5
+ var __name = (target, value) => __defProp(target, "name", { value, configurable: true });
6
+ var __export = (target, all) => {
7
+ for (var name in all)
8
+ __defProp(target, name, { get: all[name], enumerable: true });
9
+ };
10
+ var __copyProps = (to, from, except, desc) => {
11
+ if (from && typeof from === "object" || typeof from === "function") {
12
+ for (let key of __getOwnPropNames(from))
13
+ if (!__hasOwnProp.call(to, key) && key !== except)
14
+ __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
15
+ }
16
+ return to;
17
+ };
18
+ var __reExport = (target, mod, secondTarget) => (__copyProps(target, mod, "default"), secondTarget && __copyProps(secondTarget, mod, "default"));
19
+ var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
20
+
21
+ // src/index.ts
22
+ var src_exports = {};
23
+ __export(src_exports, {
24
+ fromSso: () => fromSso,
25
+ fromStatic: () => fromStatic,
26
+ nodeProvider: () => nodeProvider
27
+ });
28
+ module.exports = __toCommonJS(src_exports);
29
+ __reExport(src_exports, require("./bundle/client-sso-oidc-node"), module.exports);
30
+
31
+ // src/fromSso.ts
32
+
33
+
34
+
35
+ // src/constants.ts
36
+ var EXPIRE_WINDOW_MS = 5 * 60 * 1e3;
37
+ var REFRESH_MESSAGE = `To refresh this SSO session run 'aws sso login' with the corresponding profile.`;
38
+
39
+ // src/getNewSsoOidcToken.ts
40
+ var import_client_sso_oidc_node2 = require("./bundle/client-sso-oidc-node");
41
+
42
+ // src/getSsoOidcClient.ts
43
+ var import_client_sso_oidc_node = require("./bundle/client-sso-oidc-node");
44
+ var ssoOidcClientsHash = {};
45
+ var getSsoOidcClient = /* @__PURE__ */ __name((ssoRegion) => {
46
+ if (ssoOidcClientsHash[ssoRegion]) {
47
+ return ssoOidcClientsHash[ssoRegion];
48
+ }
49
+ const ssoOidcClient = new import_client_sso_oidc_node.SSOOIDCClient({ region: ssoRegion });
50
+ ssoOidcClientsHash[ssoRegion] = ssoOidcClient;
51
+ return ssoOidcClient;
52
+ }, "getSsoOidcClient");
53
+
54
+ // src/getNewSsoOidcToken.ts
55
+ var getNewSsoOidcToken = /* @__PURE__ */ __name((ssoToken, ssoRegion) => {
56
+ const ssoOidcClient = getSsoOidcClient(ssoRegion);
57
+ return ssoOidcClient.send(
58
+ new import_client_sso_oidc_node2.CreateTokenCommand({
59
+ clientId: ssoToken.clientId,
60
+ clientSecret: ssoToken.clientSecret,
61
+ refreshToken: ssoToken.refreshToken,
62
+ grantType: "refresh_token"
63
+ })
64
+ );
65
+ }, "getNewSsoOidcToken");
66
+
67
+ // src/validateTokenExpiry.ts
68
+ var import_property_provider = require("@smithy/property-provider");
69
+ var validateTokenExpiry = /* @__PURE__ */ __name((token) => {
70
+ if (token.expiration && token.expiration.getTime() < Date.now()) {
71
+ throw new import_property_provider.TokenProviderError(`Token is expired. ${REFRESH_MESSAGE}`, false);
72
+ }
73
+ }, "validateTokenExpiry");
74
+
75
+ // src/validateTokenKey.ts
76
+
77
+ var validateTokenKey = /* @__PURE__ */ __name((key, value, forRefresh = false) => {
78
+ if (typeof value === "undefined") {
79
+ throw new import_property_provider.TokenProviderError(
80
+ `Value not present for '${key}' in SSO Token${forRefresh ? ". Cannot refresh" : ""}. ${REFRESH_MESSAGE}`,
81
+ false
82
+ );
83
+ }
84
+ }, "validateTokenKey");
85
+
86
+ // src/writeSSOTokenToFile.ts
87
+ var import_shared_ini_file_loader = require("@smithy/shared-ini-file-loader");
88
+ var import_fs = require("fs");
89
+ var { writeFile } = import_fs.promises;
90
+ var writeSSOTokenToFile = /* @__PURE__ */ __name((id, ssoToken) => {
91
+ const tokenFilepath = (0, import_shared_ini_file_loader.getSSOTokenFilepath)(id);
92
+ const tokenString = JSON.stringify(ssoToken, null, 2);
93
+ return writeFile(tokenFilepath, tokenString);
94
+ }, "writeSSOTokenToFile");
95
+
96
+ // src/fromSso.ts
97
+ var lastRefreshAttemptTime = /* @__PURE__ */ new Date(0);
98
+ var fromSso = /* @__PURE__ */ __name((init = {}) => async () => {
99
+ const profiles = await (0, import_shared_ini_file_loader.parseKnownFiles)(init);
100
+ const profileName = (0, import_shared_ini_file_loader.getProfileName)(init);
101
+ const profile = profiles[profileName];
102
+ if (!profile) {
103
+ throw new import_property_provider.TokenProviderError(`Profile '${profileName}' could not be found in shared credentials file.`, false);
104
+ } else if (!profile["sso_session"]) {
105
+ throw new import_property_provider.TokenProviderError(`Profile '${profileName}' is missing required property 'sso_session'.`);
106
+ }
107
+ const ssoSessionName = profile["sso_session"];
108
+ const ssoSessions = await (0, import_shared_ini_file_loader.loadSsoSessionData)(init);
109
+ const ssoSession = ssoSessions[ssoSessionName];
110
+ if (!ssoSession) {
111
+ throw new import_property_provider.TokenProviderError(
112
+ `Sso session '${ssoSessionName}' could not be found in shared credentials file.`,
113
+ false
114
+ );
115
+ }
116
+ for (const ssoSessionRequiredKey of ["sso_start_url", "sso_region"]) {
117
+ if (!ssoSession[ssoSessionRequiredKey]) {
118
+ throw new import_property_provider.TokenProviderError(
119
+ `Sso session '${ssoSessionName}' is missing required property '${ssoSessionRequiredKey}'.`,
120
+ false
121
+ );
122
+ }
123
+ }
124
+ const ssoStartUrl = ssoSession["sso_start_url"];
125
+ const ssoRegion = ssoSession["sso_region"];
126
+ let ssoToken;
127
+ try {
128
+ ssoToken = await (0, import_shared_ini_file_loader.getSSOTokenFromFile)(ssoSessionName);
129
+ } catch (e) {
130
+ throw new import_property_provider.TokenProviderError(
131
+ `The SSO session token associated with profile=${profileName} was not found or is invalid. ${REFRESH_MESSAGE}`,
132
+ false
133
+ );
134
+ }
135
+ validateTokenKey("accessToken", ssoToken.accessToken);
136
+ validateTokenKey("expiresAt", ssoToken.expiresAt);
137
+ const { accessToken, expiresAt } = ssoToken;
138
+ const existingToken = { token: accessToken, expiration: new Date(expiresAt) };
139
+ if (existingToken.expiration.getTime() - Date.now() > EXPIRE_WINDOW_MS) {
140
+ return existingToken;
141
+ }
142
+ if (Date.now() - lastRefreshAttemptTime.getTime() < 30 * 1e3) {
143
+ validateTokenExpiry(existingToken);
144
+ return existingToken;
145
+ }
146
+ validateTokenKey("clientId", ssoToken.clientId, true);
147
+ validateTokenKey("clientSecret", ssoToken.clientSecret, true);
148
+ validateTokenKey("refreshToken", ssoToken.refreshToken, true);
149
+ try {
150
+ lastRefreshAttemptTime.setTime(Date.now());
151
+ const newSsoOidcToken = await getNewSsoOidcToken(ssoToken, ssoRegion);
152
+ validateTokenKey("accessToken", newSsoOidcToken.accessToken);
153
+ validateTokenKey("expiresIn", newSsoOidcToken.expiresIn);
154
+ const newTokenExpiration = new Date(Date.now() + newSsoOidcToken.expiresIn * 1e3);
155
+ try {
156
+ await writeSSOTokenToFile(ssoSessionName, {
157
+ ...ssoToken,
158
+ accessToken: newSsoOidcToken.accessToken,
159
+ expiresAt: newTokenExpiration.toISOString(),
160
+ refreshToken: newSsoOidcToken.refreshToken
161
+ });
162
+ } catch (error) {
163
+ }
164
+ return {
165
+ token: newSsoOidcToken.accessToken,
166
+ expiration: newTokenExpiration
167
+ };
168
+ } catch (error) {
169
+ validateTokenExpiry(existingToken);
170
+ return existingToken;
171
+ }
172
+ }, "fromSso");
173
+
174
+ // src/fromStatic.ts
175
+
176
+ var fromStatic = /* @__PURE__ */ __name(({ token }) => async () => {
177
+ if (!token || !token.token) {
178
+ throw new import_property_provider.TokenProviderError(`Please pass a valid token to fromStatic`, false);
179
+ }
180
+ return token;
181
+ }, "fromStatic");
182
+
183
+ // src/nodeProvider.ts
184
+
185
+ var nodeProvider = /* @__PURE__ */ __name((init = {}) => (0, import_property_provider.memoize)(
186
+ (0, import_property_provider.chain)(fromSso(init), async () => {
187
+ throw new import_property_provider.TokenProviderError("Could not load token from any providers", false);
188
+ }),
189
+ (token) => token.expiration !== void 0 && token.expiration.getTime() - Date.now() < 3e5,
190
+ (token) => token.expiration !== void 0
191
+ ), "nodeProvider");
192
+ // Annotate the CommonJS export names for ESM import in node:
193
+ 0 && (module.exports = {
194
+ fromSso,
195
+ fromStatic,
196
+ nodeProvider,
197
+ ...require("./bundle/client-sso-oidc-node")
198
+ });
@@ -1,9 +1 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.nodeProvider = void 0;
4
- const property_provider_1 = require("@smithy/property-provider");
5
- const fromSso_1 = require("./fromSso");
6
- const nodeProvider = (init = {}) => (0, property_provider_1.memoize)((0, property_provider_1.chain)((0, fromSso_1.fromSso)(init), async () => {
7
- throw new property_provider_1.TokenProviderError("Could not load token from any providers", false);
8
- }), (token) => token.expiration !== undefined && token.expiration.getTime() - Date.now() < 300000, (token) => token.expiration !== undefined);
9
- exports.nodeProvider = nodeProvider;
1
+ module.exports = require("./index.js");
@@ -1,11 +1 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.validateTokenExpiry = void 0;
4
- const property_provider_1 = require("@smithy/property-provider");
5
- const constants_1 = require("./constants");
6
- const validateTokenExpiry = (token) => {
7
- if (token.expiration && token.expiration.getTime() < Date.now()) {
8
- throw new property_provider_1.TokenProviderError(`Token is expired. ${constants_1.REFRESH_MESSAGE}`, false);
9
- }
10
- };
11
- exports.validateTokenExpiry = validateTokenExpiry;
1
+ module.exports = require("./index.js");
@@ -1,11 +1 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.validateTokenKey = void 0;
4
- const property_provider_1 = require("@smithy/property-provider");
5
- const constants_1 = require("./constants");
6
- const validateTokenKey = (key, value, forRefresh = false) => {
7
- if (typeof value === "undefined") {
8
- throw new property_provider_1.TokenProviderError(`Value not present for '${key}' in SSO Token${forRefresh ? ". Cannot refresh" : ""}. ${constants_1.REFRESH_MESSAGE}`, false);
9
- }
10
- };
11
- exports.validateTokenKey = validateTokenKey;
1
+ module.exports = require("./index.js");
@@ -1,12 +1 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.writeSSOTokenToFile = void 0;
4
- const shared_ini_file_loader_1 = require("@smithy/shared-ini-file-loader");
5
- const fs_1 = require("fs");
6
- const { writeFile } = fs_1.promises;
7
- const writeSSOTokenToFile = (id, ssoToken) => {
8
- const tokenFilepath = (0, shared_ini_file_loader_1.getSSOTokenFilepath)(id);
9
- const tokenString = JSON.stringify(ssoToken, null, 2);
10
- return writeFile(tokenFilepath, tokenString);
11
- };
12
- exports.writeSSOTokenToFile = writeSSOTokenToFile;
1
+ module.exports = require("./index.js");
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@aws-sdk/token-providers",
3
- "version": "3.485.0",
3
+ "version": "3.495.0",
4
4
  "description": "A collection of token providers",
5
5
  "main": "./dist-cjs/index.js",
6
6
  "module": "./dist-es/index.js",
@@ -8,7 +8,7 @@
8
8
  "scripts": {
9
9
  "build:client-bundle": "node ./scripts/esbuild",
10
10
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
11
- "build:cjs": "tsc -p tsconfig.cjs.json",
11
+ "build:cjs": "node ../../scripts/compilation/inline token-providers",
12
12
  "build:es": "tsc -p tsconfig.es.json",
13
13
  "build:include:deps": "lerna run --scope $npm_package_name --include-dependencies build",
14
14
  "build:types": "tsc -p tsconfig.types.json && node ./scripts/nocheck",
@@ -29,40 +29,40 @@
29
29
  "dependencies": {
30
30
  "@aws-crypto/sha256-browser": "3.0.0",
31
31
  "@aws-crypto/sha256-js": "3.0.0",
32
- "@aws-sdk/middleware-host-header": "3.485.0",
33
- "@aws-sdk/middleware-logger": "3.485.0",
34
- "@aws-sdk/middleware-recursion-detection": "3.485.0",
35
- "@aws-sdk/middleware-user-agent": "3.485.0",
36
- "@aws-sdk/region-config-resolver": "3.485.0",
37
- "@aws-sdk/types": "3.485.0",
38
- "@aws-sdk/util-endpoints": "3.485.0",
39
- "@aws-sdk/util-user-agent-browser": "3.485.0",
40
- "@aws-sdk/util-user-agent-node": "3.485.0",
41
- "@smithy/config-resolver": "^2.0.23",
42
- "@smithy/fetch-http-handler": "^2.3.2",
43
- "@smithy/hash-node": "^2.0.18",
44
- "@smithy/invalid-dependency": "^2.0.16",
45
- "@smithy/middleware-content-length": "^2.0.18",
46
- "@smithy/middleware-endpoint": "^2.3.0",
47
- "@smithy/middleware-retry": "^2.0.26",
48
- "@smithy/middleware-serde": "^2.0.16",
49
- "@smithy/middleware-stack": "^2.0.10",
50
- "@smithy/node-config-provider": "^2.1.9",
51
- "@smithy/node-http-handler": "^2.2.2",
52
- "@smithy/property-provider": "^2.0.0",
53
- "@smithy/protocol-http": "^3.0.12",
54
- "@smithy/shared-ini-file-loader": "^2.0.6",
55
- "@smithy/smithy-client": "^2.2.1",
56
- "@smithy/types": "^2.8.0",
57
- "@smithy/url-parser": "^2.0.16",
58
- "@smithy/util-base64": "^2.0.1",
59
- "@smithy/util-body-length-browser": "^2.0.1",
60
- "@smithy/util-body-length-node": "^2.1.0",
61
- "@smithy/util-defaults-mode-browser": "^2.0.24",
62
- "@smithy/util-defaults-mode-node": "^2.0.32",
63
- "@smithy/util-endpoints": "^1.0.8",
64
- "@smithy/util-retry": "^2.0.9",
65
- "@smithy/util-utf8": "^2.0.2",
32
+ "@aws-sdk/middleware-host-header": "3.495.0",
33
+ "@aws-sdk/middleware-logger": "3.495.0",
34
+ "@aws-sdk/middleware-recursion-detection": "3.495.0",
35
+ "@aws-sdk/middleware-user-agent": "3.495.0",
36
+ "@aws-sdk/region-config-resolver": "3.495.0",
37
+ "@aws-sdk/types": "3.495.0",
38
+ "@aws-sdk/util-endpoints": "3.495.0",
39
+ "@aws-sdk/util-user-agent-browser": "3.495.0",
40
+ "@aws-sdk/util-user-agent-node": "3.495.0",
41
+ "@smithy/config-resolver": "^2.1.0",
42
+ "@smithy/fetch-http-handler": "^2.4.0",
43
+ "@smithy/hash-node": "^2.1.0",
44
+ "@smithy/invalid-dependency": "^2.1.0",
45
+ "@smithy/middleware-content-length": "^2.1.0",
46
+ "@smithy/middleware-endpoint": "^2.4.0",
47
+ "@smithy/middleware-retry": "^2.1.0",
48
+ "@smithy/middleware-serde": "^2.1.0",
49
+ "@smithy/middleware-stack": "^2.1.0",
50
+ "@smithy/node-config-provider": "^2.2.0",
51
+ "@smithy/node-http-handler": "^2.3.0",
52
+ "@smithy/property-provider": "^2.1.0",
53
+ "@smithy/protocol-http": "^3.1.0",
54
+ "@smithy/shared-ini-file-loader": "^2.3.0",
55
+ "@smithy/smithy-client": "^2.3.0",
56
+ "@smithy/types": "^2.9.0",
57
+ "@smithy/url-parser": "^2.1.0",
58
+ "@smithy/util-base64": "^2.1.0",
59
+ "@smithy/util-body-length-browser": "^2.1.0",
60
+ "@smithy/util-body-length-node": "^2.2.0",
61
+ "@smithy/util-defaults-mode-browser": "^2.1.0",
62
+ "@smithy/util-defaults-mode-node": "^2.1.0",
63
+ "@smithy/util-endpoints": "^1.1.0",
64
+ "@smithy/util-retry": "^2.1.0",
65
+ "@smithy/util-utf8": "^2.1.0",
66
66
  "tslib": "^2.5.0"
67
67
  },
68
68
  "devDependencies": {