@cdk8s/awscdk-resolver 0.0.198 → 0.0.200
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +4 -4
- package/lib/resolve.js +1 -1
- package/node_modules/@aws-sdk/client-cloudformation/package.json +36 -36
- package/node_modules/@aws-sdk/client-sso/package.json +32 -32
- package/node_modules/@aws-sdk/client-sso-oidc/package.json +34 -34
- package/node_modules/@aws-sdk/client-sts/README.md +8 -0
- package/node_modules/@aws-sdk/client-sts/dist-cjs/index.js +89 -12
- package/node_modules/@aws-sdk/client-sts/dist-es/STS.js +2 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/commands/AssumeRootCommand.js +23 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/commands/index.js +1 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/models/models_0.js +4 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/protocols/Aws_query.js +53 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/STS.d.ts +7 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/STSClient.d.ts +3 -2
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleCommand.d.ts +13 -13
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleWithSAMLCommand.d.ts +8 -8
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleWithWebIdentityCommand.d.ts +15 -30
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRootCommand.d.ts +129 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/DecodeAuthorizationMessageCommand.d.ts +2 -2
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/GetFederationTokenCommand.d.ts +8 -8
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/GetSessionTokenCommand.d.ts +6 -6
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/index.d.ts +1 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/models/models_0.d.ts +146 -32
- package/node_modules/@aws-sdk/client-sts/dist-types/protocols/Aws_query.d.ts +9 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/STS.d.ts +17 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/STSClient.d.ts +6 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/AssumeRootCommand.d.ts +47 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/index.d.ts +1 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/models/models_0.d.ts +12 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/protocols/Aws_query.d.ts +12 -0
- package/node_modules/@aws-sdk/client-sts/package.json +36 -36
- package/node_modules/@aws-sdk/core/package.json +14 -14
- package/node_modules/@aws-sdk/credential-provider-env/package.json +7 -7
- package/node_modules/@aws-sdk/credential-provider-http/package.json +12 -12
- package/node_modules/@aws-sdk/credential-provider-ini/package.json +15 -15
- package/node_modules/@aws-sdk/credential-provider-node/package.json +14 -14
- package/node_modules/@aws-sdk/credential-provider-process/package.json +8 -8
- package/node_modules/@aws-sdk/credential-provider-sso/package.json +10 -10
- package/node_modules/@aws-sdk/credential-provider-web-identity/package.json +8 -8
- package/node_modules/@aws-sdk/middleware-host-header/package.json +8 -8
- package/node_modules/@aws-sdk/middleware-logger/package.json +7 -7
- package/node_modules/@aws-sdk/middleware-recursion-detection/package.json +8 -8
- package/node_modules/@aws-sdk/middleware-user-agent/package.json +11 -11
- package/node_modules/@aws-sdk/region-config-resolver/package.json +7 -7
- package/node_modules/@aws-sdk/token-providers/package.json +8 -8
- package/node_modules/@aws-sdk/types/package.json +2 -2
- package/node_modules/@aws-sdk/util-endpoints/package.json +8 -8
- package/node_modules/@aws-sdk/util-locate-window/package.json +3 -3
- package/node_modules/@aws-sdk/util-user-agent-browser/package.json +5 -5
- package/node_modules/@aws-sdk/util-user-agent-node/package.json +7 -7
- package/node_modules/@smithy/abort-controller/package.json +4 -3
- package/node_modules/@smithy/config-resolver/package.json +7 -6
- package/node_modules/@smithy/core/dist-cjs/submodules/protocols/index.js +21 -20
- package/node_modules/@smithy/core/dist-es/submodules/protocols/requestBuilder.js +1 -1
- package/node_modules/@smithy/core/package.json +10 -9
- package/node_modules/@smithy/credential-provider-imds/package.json +7 -7
- package/node_modules/@smithy/fetch-http-handler/dist-cjs/create-request.js +1 -0
- package/node_modules/@smithy/fetch-http-handler/dist-cjs/index.js +10 -3
- package/node_modules/@smithy/fetch-http-handler/dist-es/create-request.js +3 -0
- package/node_modules/@smithy/fetch-http-handler/dist-es/fetch-http-handler.js +3 -2
- package/node_modules/@smithy/fetch-http-handler/dist-es/stream-collector.js +1 -1
- package/node_modules/@smithy/fetch-http-handler/dist-types/create-request.d.ts +6 -0
- package/node_modules/@smithy/fetch-http-handler/dist-types/fetch-http-handler.d.ts +6 -0
- package/node_modules/@smithy/fetch-http-handler/dist-types/ts3.4/create-request.d.ts +6 -0
- package/node_modules/@smithy/fetch-http-handler/dist-types/ts3.4/fetch-http-handler.d.ts +6 -0
- package/node_modules/@smithy/fetch-http-handler/package.json +9 -6
- package/node_modules/@smithy/hash-node/package.json +4 -3
- package/node_modules/@smithy/invalid-dependency/package.json +4 -3
- package/node_modules/@smithy/middleware-content-length/package.json +5 -4
- package/node_modules/@smithy/middleware-endpoint/package.json +11 -10
- package/node_modules/@smithy/middleware-retry/package.json +12 -10
- package/node_modules/@smithy/middleware-serde/package.json +6 -4
- package/node_modules/@smithy/middleware-stack/package.json +4 -3
- package/node_modules/@smithy/node-config-provider/package.json +6 -5
- package/node_modules/@smithy/node-http-handler/dist-cjs/index.js +20 -14
- package/node_modules/@smithy/node-http-handler/dist-cjs/timing.js +1 -0
- package/node_modules/@smithy/node-http-handler/dist-es/node-http-handler.js +5 -4
- package/node_modules/@smithy/node-http-handler/dist-es/node-http2-connection-manager.js +1 -1
- package/node_modules/@smithy/node-http-handler/dist-es/server.mock.js +9 -2
- package/node_modules/@smithy/node-http-handler/dist-es/set-connection-timeout.js +5 -4
- package/node_modules/@smithy/node-http-handler/dist-es/set-socket-keep-alive.js +2 -1
- package/node_modules/@smithy/node-http-handler/dist-es/set-socket-timeout.js +2 -1
- package/node_modules/@smithy/node-http-handler/dist-es/timing.js +4 -0
- package/node_modules/@smithy/node-http-handler/dist-es/write-request-body.js +4 -3
- package/node_modules/@smithy/node-http-handler/dist-types/timing.d.ts +8 -0
- package/node_modules/@smithy/node-http-handler/dist-types/ts3.4/timing.d.ts +8 -0
- package/node_modules/@smithy/node-http-handler/package.json +7 -6
- package/node_modules/@smithy/property-provider/package.json +4 -3
- package/node_modules/@smithy/protocol-http/package.json +4 -3
- package/node_modules/@smithy/querystring-builder/package.json +2 -2
- package/node_modules/@smithy/querystring-parser/package.json +4 -3
- package/node_modules/@smithy/service-error-classification/package.json +4 -3
- package/node_modules/@smithy/shared-ini-file-loader/package.json +4 -3
- package/node_modules/@smithy/signature-v4/package.json +6 -5
- package/node_modules/@smithy/smithy-client/package.json +9 -8
- package/node_modules/@smithy/types/dist-types/http.d.ts +1 -0
- package/node_modules/@smithy/types/dist-types/transform/no-undefined.d.ts +3 -2
- package/node_modules/@smithy/types/dist-types/ts3.4/http.d.ts +1 -0
- package/node_modules/@smithy/types/dist-types/ts3.4/transform/no-undefined.d.ts +3 -2
- package/node_modules/@smithy/types/package.json +1 -1
- package/node_modules/@smithy/url-parser/package.json +5 -4
- package/node_modules/@smithy/util-defaults-mode-browser/package.json +6 -5
- package/node_modules/@smithy/util-defaults-mode-node/package.json +9 -8
- package/node_modules/@smithy/util-endpoints/package.json +7 -5
- package/node_modules/@smithy/util-middleware/package.json +4 -3
- package/node_modules/@smithy/util-retry/dist-cjs/index.js +5 -1
- package/node_modules/@smithy/util-retry/dist-es/DefaultRateLimiter.js +2 -1
- package/node_modules/@smithy/util-retry/dist-types/DefaultRateLimiter.d.ts +4 -0
- package/node_modules/@smithy/util-retry/dist-types/ts3.4/DefaultRateLimiter.d.ts +4 -0
- package/node_modules/@smithy/util-retry/package.json +5 -4
- package/node_modules/@smithy/util-stream/dist-cjs/index.js +1 -0
- package/node_modules/@smithy/util-stream/dist-cjs/sdk-stream-mixin.js +1 -2
- package/node_modules/@smithy/util-stream/dist-cjs/splitStream.js +1 -1
- package/node_modules/@smithy/util-stream/dist-cjs/stream-type-check.js +6 -1
- package/node_modules/@smithy/util-stream/dist-es/sdk-stream-mixin.js +0 -1
- package/node_modules/@smithy/util-stream/dist-es/splitStream.js +2 -2
- package/node_modules/@smithy/util-stream/dist-es/stream-type-check.js +3 -0
- package/node_modules/@smithy/util-stream/dist-types/stream-type-check.d.ts +4 -0
- package/node_modules/@smithy/util-stream/dist-types/ts3.4/stream-type-check.d.ts +4 -0
- package/node_modules/@smithy/util-stream/package.json +10 -6
- package/node_modules/@smithy/util-waiter/package.json +5 -4
- package/package.json +4 -4
@@ -95,6 +95,11 @@ export interface AssumeRoleRequest {
|
|
95
95
|
* session name is also used in the ARN of the assumed role principal. This means that
|
96
96
|
* subsequent cross-account API requests that use the temporary security credentials will
|
97
97
|
* expose the role session name to the external account in their CloudTrail logs.</p>
|
98
|
+
* <p>For security purposes, administrators can view this field in <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html#cloudtrail-integration_signin-tempcreds">CloudTrail logs</a> to help identify who performed an action in Amazon Web Services. Your
|
99
|
+
* administrator might require that you specify your user name as the session name when you
|
100
|
+
* assume the role. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_rolesessionname">
|
101
|
+
* <code>sts:RoleSessionName</code>
|
102
|
+
* </a>.</p>
|
98
103
|
* <p>The regex used to validate this parameter is a string of characters
|
99
104
|
* consisting of upper- and lower-case alphanumeric characters with no spaces. You can
|
100
105
|
* also include underscores or any of the following characters: =,.@-</p>
|
@@ -148,6 +153,8 @@ export interface AssumeRoleRequest {
|
|
148
153
|
* <code>PackedPolicySize</code> response element indicates by percentage how close the
|
149
154
|
* policies and tags for your request are to the upper size limit.</p>
|
150
155
|
* </note>
|
156
|
+
* <p>For more information about role session permissions, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">Session
|
157
|
+
* policies</a>.</p>
|
151
158
|
* @public
|
152
159
|
*/
|
153
160
|
Policy?: string | undefined;
|
@@ -164,9 +171,7 @@ export interface AssumeRoleRequest {
|
|
164
171
|
* specify a parameter value of up to 43200 seconds (12 hours), depending on the maximum
|
165
172
|
* session duration setting for your role. However, if you assume a role using role chaining
|
166
173
|
* and provide a <code>DurationSeconds</code> parameter value greater than one hour, the
|
167
|
-
* operation fails. To learn how to view the maximum value for your role, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
168
|
-
* Maximum Session Duration Setting for a Role</a> in the
|
169
|
-
* <i>IAM User Guide</i>.</p>
|
174
|
+
* operation fails. To learn how to view the maximum value for your role, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_update-role-settings.html#id_roles_update-session-duration">Update the maximum session duration for a role</a>.</p>
|
170
175
|
* <p>By default, the value is set to <code>3600</code> seconds. </p>
|
171
176
|
* <note>
|
172
177
|
* <p>The <code>DurationSeconds</code> parameter is separate from the duration of a console
|
@@ -216,8 +221,8 @@ export interface AssumeRoleRequest {
|
|
216
221
|
* as transitive, the corresponding key and value passes to subsequent sessions in a role
|
217
222
|
* chain. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining">Chaining Roles
|
218
223
|
* with Session Tags</a> in the <i>IAM User Guide</i>.</p>
|
219
|
-
* <p>This parameter is optional.
|
220
|
-
*
|
224
|
+
* <p>This parameter is optional. The transitive status of a session tag does not impact its
|
225
|
+
* packed binary size.</p>
|
221
226
|
* <p>If you choose not to specify a transitive tag key, then no tags are passed from this
|
222
227
|
* session to any subsequent sessions.</p>
|
223
228
|
* @public
|
@@ -265,13 +270,15 @@ export interface AssumeRoleRequest {
|
|
265
270
|
TokenCode?: string | undefined;
|
266
271
|
/**
|
267
272
|
* <p>The source identity specified by the principal that is calling the
|
268
|
-
* <code>AssumeRole</code> operation.</p>
|
273
|
+
* <code>AssumeRole</code> operation. The source identity value persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#iam-term-role-chaining">chained role</a> sessions.</p>
|
269
274
|
* <p>You can require users to specify a source identity when they assume a role. You do this
|
270
|
-
* by using the <
|
271
|
-
*
|
272
|
-
*
|
273
|
-
*
|
274
|
-
*
|
275
|
+
* by using the <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-sourceidentity">
|
276
|
+
* <code>sts:SourceIdentity</code>
|
277
|
+
* </a> condition key in a role trust policy. You
|
278
|
+
* can use source identity information in CloudTrail logs to determine who took actions with a
|
279
|
+
* role. You can use the <code>aws:SourceIdentity</code> condition key to further control
|
280
|
+
* access to Amazon Web Services resources based on the value of source identity. For more information about
|
281
|
+
* using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control
|
275
282
|
* actions taken with assumed roles</a> in the
|
276
283
|
* <i>IAM User Guide</i>.</p>
|
277
284
|
* <p>The regex used to validate this parameter is a string of characters consisting of upper-
|
@@ -405,8 +412,8 @@ export declare class MalformedPolicyDocumentException extends __BaseException {
|
|
405
412
|
* tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in
|
406
413
|
* the <i>IAM User Guide</i>.</p>
|
407
414
|
* <p>You could receive this error even though you meet other defined session policy and
|
408
|
-
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
|
409
|
-
*
|
415
|
+
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
|
416
|
+
* Guide</i>.</p>
|
410
417
|
* @public
|
411
418
|
*/
|
412
419
|
export declare class PackedPolicyTooLargeException extends __BaseException {
|
@@ -419,10 +426,10 @@ export declare class PackedPolicyTooLargeException extends __BaseException {
|
|
419
426
|
}
|
420
427
|
/**
|
421
428
|
* <p>STS is not activated in the requested region for the account that is being asked to
|
422
|
-
* generate credentials. The account administrator must use the IAM console to activate
|
423
|
-
* in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
424
|
-
* Deactivating
|
425
|
-
*
|
429
|
+
* generate credentials. The account administrator must use the IAM console to activate
|
430
|
+
* STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
431
|
+
* Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
|
432
|
+
* Guide</i>.</p>
|
426
433
|
* @public
|
427
434
|
*/
|
428
435
|
export declare class RegionDisabledException extends __BaseException {
|
@@ -495,6 +502,8 @@ export interface AssumeRoleWithSAMLRequest {
|
|
495
502
|
* character to the end of the valid character list (\u0020 through \u00FF). It can also
|
496
503
|
* include the tab (\u0009), linefeed (\u000A), and carriage return (\u000D)
|
497
504
|
* characters.</p>
|
505
|
+
* <p>For more information about role session permissions, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">Session
|
506
|
+
* policies</a>.</p>
|
498
507
|
* <note>
|
499
508
|
* <p>An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs,
|
500
509
|
* and session tags into a packed binary format that has a separate limit. Your request can
|
@@ -612,14 +621,16 @@ export interface AssumeRoleWithSAMLResponse {
|
|
612
621
|
*/
|
613
622
|
NameQualifier?: string | undefined;
|
614
623
|
/**
|
615
|
-
* <p>The value in the <code>SourceIdentity</code> attribute in the SAML assertion.
|
624
|
+
* <p>The value in the <code>SourceIdentity</code> attribute in the SAML assertion. The source
|
625
|
+
* identity value persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#iam-term-role-chaining">chained role</a>
|
626
|
+
* sessions.</p>
|
616
627
|
* <p>You can require users to set a source identity value when they assume a role. You do
|
617
628
|
* this by using the <code>sts:SourceIdentity</code> condition key in a role trust policy.
|
618
629
|
* That way, actions that are taken with the role are associated with that user. After the
|
619
630
|
* source identity is set, the value cannot be changed. It is present in the request for all
|
620
|
-
* actions that are taken by the role and persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts
|
621
|
-
*
|
622
|
-
*
|
631
|
+
* actions that are taken by the role and persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#id_roles_terms-and-concepts">chained role</a>
|
632
|
+
* sessions. You can configure your SAML identity provider to use an attribute associated with
|
633
|
+
* your users, like user name or email, as the source identity when calling
|
623
634
|
* <code>AssumeRoleWithSAML</code>. You do this by adding an attribute to the SAML
|
624
635
|
* assertion. For more information about using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control
|
625
636
|
* actions taken with assumed roles</a> in the
|
@@ -665,6 +676,16 @@ export declare class InvalidIdentityTokenException extends __BaseException {
|
|
665
676
|
export interface AssumeRoleWithWebIdentityRequest {
|
666
677
|
/**
|
667
678
|
* <p>The Amazon Resource Name (ARN) of the role that the caller is assuming.</p>
|
679
|
+
* <note>
|
680
|
+
* <p>Additional considerations apply to Amazon Cognito identity pools that assume <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies-cross-account-resource-access.html">cross-account IAM roles</a>. The trust policies of these roles must accept the
|
681
|
+
* <code>cognito-identity.amazonaws.com</code> service principal and must contain the
|
682
|
+
* <code>cognito-identity.amazonaws.com:aud</code> condition key to restrict role
|
683
|
+
* assumption to users from your intended identity pools. A policy that trusts Amazon Cognito
|
684
|
+
* identity pools without this condition creates a risk that a user from an unintended
|
685
|
+
* identity pool can assume the role. For more information, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/iam-roles.html#trust-policies"> Trust policies for
|
686
|
+
* IAM roles in Basic (Classic) authentication </a> in the <i>Amazon Cognito
|
687
|
+
* Developer Guide</i>.</p>
|
688
|
+
* </note>
|
668
689
|
* @public
|
669
690
|
*/
|
670
691
|
RoleArn: string | undefined;
|
@@ -674,6 +695,11 @@ export interface AssumeRoleWithWebIdentityRequest {
|
|
674
695
|
* security credentials that your application will use are associated with that user. This
|
675
696
|
* session name is included as part of the ARN and assumed role ID in the
|
676
697
|
* <code>AssumedRoleUser</code> response element.</p>
|
698
|
+
* <p>For security purposes, administrators can view this field in <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html#cloudtrail-integration_signin-tempcreds">CloudTrail logs</a> to help identify who performed an action in Amazon Web Services. Your
|
699
|
+
* administrator might require that you specify your user name as the session name when you
|
700
|
+
* assume the role. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_rolesessionname">
|
701
|
+
* <code>sts:RoleSessionName</code>
|
702
|
+
* </a>.</p>
|
677
703
|
* <p>The regex used to validate this parameter is a string of characters
|
678
704
|
* consisting of upper- and lower-case alphanumeric characters with no spaces. You can
|
679
705
|
* also include underscores or any of the following characters: =,.@-</p>
|
@@ -684,7 +710,8 @@ export interface AssumeRoleWithWebIdentityRequest {
|
|
684
710
|
* <p>The OAuth 2.0 access token or OpenID Connect ID token that is provided by the identity
|
685
711
|
* provider. Your application must get this token by authenticating the user who is using your
|
686
712
|
* application with a web identity provider before the application makes an
|
687
|
-
* <code>AssumeRoleWithWebIdentity</code> call.
|
713
|
+
* <code>AssumeRoleWithWebIdentity</code> call. Timestamps in the token must be formatted
|
714
|
+
* as either an integer or a long integer. Only tokens with RSA algorithms (RS256) are
|
688
715
|
* supported.</p>
|
689
716
|
* @public
|
690
717
|
*/
|
@@ -739,6 +766,8 @@ export interface AssumeRoleWithWebIdentityRequest {
|
|
739
766
|
* character to the end of the valid character list (\u0020 through \u00FF). It can also
|
740
767
|
* include the tab (\u0009), linefeed (\u000A), and carriage return (\u000D)
|
741
768
|
* characters.</p>
|
769
|
+
* <p>For more information about role session permissions, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">Session
|
770
|
+
* policies</a>.</p>
|
742
771
|
* <note>
|
743
772
|
* <p>An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs,
|
744
773
|
* and session tags into a packed binary format that has a separate limit. Your request can
|
@@ -836,9 +865,9 @@ export interface AssumeRoleWithWebIdentityResponse {
|
|
836
865
|
* this by using the <code>sts:SourceIdentity</code> condition key in a role trust policy.
|
837
866
|
* That way, actions that are taken with the role are associated with that user. After the
|
838
867
|
* source identity is set, the value cannot be changed. It is present in the request for all
|
839
|
-
* actions that are taken by the role and persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts
|
840
|
-
*
|
841
|
-
*
|
868
|
+
* actions that are taken by the role and persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#id_roles_terms-and-concepts">chained role</a>
|
869
|
+
* sessions. You can configure your identity provider to use an attribute associated with your
|
870
|
+
* users, like user name or email, as the source identity when calling
|
842
871
|
* <code>AssumeRoleWithWebIdentity</code>. You do this by adding a claim to the JSON web
|
843
872
|
* token. To learn more about OIDC tokens and claims, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-using-tokens-with-identity-providers.html">Using Tokens with User Pools</a> in the <i>Amazon Cognito Developer Guide</i>.
|
844
873
|
* For more information about using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control
|
@@ -852,11 +881,11 @@ export interface AssumeRoleWithWebIdentityResponse {
|
|
852
881
|
SourceIdentity?: string | undefined;
|
853
882
|
}
|
854
883
|
/**
|
855
|
-
* <p>The request could not be fulfilled because the identity provider (IDP) that
|
856
|
-
*
|
857
|
-
*
|
858
|
-
*
|
859
|
-
*
|
884
|
+
* <p>The request could not be fulfilled because the identity provider (IDP) that was asked
|
885
|
+
* to verify the incoming identity token could not be reached. This is often a transient
|
886
|
+
* error caused by network conditions. Retry the request a limited number of times so that
|
887
|
+
* you don't exceed the request rate. If the error persists, the identity provider might be
|
888
|
+
* down or not responding.</p>
|
860
889
|
* @public
|
861
890
|
*/
|
862
891
|
export declare class IDPCommunicationErrorException extends __BaseException {
|
@@ -867,6 +896,87 @@ export declare class IDPCommunicationErrorException extends __BaseException {
|
|
867
896
|
*/
|
868
897
|
constructor(opts: __ExceptionOptionType<IDPCommunicationErrorException, __BaseException>);
|
869
898
|
}
|
899
|
+
/**
|
900
|
+
* @public
|
901
|
+
*/
|
902
|
+
export interface AssumeRootRequest {
|
903
|
+
/**
|
904
|
+
* <p>The member account principal ARN or account ID.</p>
|
905
|
+
* @public
|
906
|
+
*/
|
907
|
+
TargetPrincipal: string | undefined;
|
908
|
+
/**
|
909
|
+
* <p>The identity based policy that scopes the session to the privileged tasks that can be
|
910
|
+
* performed. You can use one of following Amazon Web Services managed policies to scope
|
911
|
+
* root session actions. You can add additional customer managed policies to further limit the
|
912
|
+
* permissions for the root session.</p>
|
913
|
+
* <ul>
|
914
|
+
* <li>
|
915
|
+
* <p>
|
916
|
+
* <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMAuditRootUserCredentials">IAMAuditRootUserCredentials</a>
|
917
|
+
* </p>
|
918
|
+
* </li>
|
919
|
+
* <li>
|
920
|
+
* <p>
|
921
|
+
* <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMCreateRootUserPassword">IAMCreateRootUserPassword</a>
|
922
|
+
* </p>
|
923
|
+
* </li>
|
924
|
+
* <li>
|
925
|
+
* <p>
|
926
|
+
* <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMDeleteRootUserCredentials">IAMDeleteRootUserCredentials</a>
|
927
|
+
* </p>
|
928
|
+
* </li>
|
929
|
+
* <li>
|
930
|
+
* <p>
|
931
|
+
* <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-S3UnlockBucketPolicy">S3UnlockBucketPolicy</a>
|
932
|
+
* </p>
|
933
|
+
* </li>
|
934
|
+
* <li>
|
935
|
+
* <p>
|
936
|
+
* <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-SQSUnlockQueuePolicy">SQSUnlockQueuePolicy</a>
|
937
|
+
* </p>
|
938
|
+
* </li>
|
939
|
+
* </ul>
|
940
|
+
* @public
|
941
|
+
*/
|
942
|
+
TaskPolicyArn: PolicyDescriptorType | undefined;
|
943
|
+
/**
|
944
|
+
* <p>The duration, in seconds, of the privileged session. The value can range from 0 seconds
|
945
|
+
* up to the maximum session duration of 900 seconds (15 minutes). If you specify a value
|
946
|
+
* higher than this setting, the operation fails.</p>
|
947
|
+
* <p>By default, the value is set to <code>900</code> seconds.</p>
|
948
|
+
* @public
|
949
|
+
*/
|
950
|
+
DurationSeconds?: number | undefined;
|
951
|
+
}
|
952
|
+
/**
|
953
|
+
* @public
|
954
|
+
*/
|
955
|
+
export interface AssumeRootResponse {
|
956
|
+
/**
|
957
|
+
* <p>The temporary security credentials, which include an access key ID, a secret access key,
|
958
|
+
* and a security token.</p>
|
959
|
+
* <note>
|
960
|
+
* <p>The size of the security token that STS API operations return is not fixed. We
|
961
|
+
* strongly recommend that you make no assumptions about the maximum size.</p>
|
962
|
+
* </note>
|
963
|
+
* @public
|
964
|
+
*/
|
965
|
+
Credentials?: Credentials | undefined;
|
966
|
+
/**
|
967
|
+
* <p>The source identity specified by the principal that is calling the
|
968
|
+
* <code>AssumeRoot</code> operation.</p>
|
969
|
+
* <p>You can use the <code>aws:SourceIdentity</code> condition key to control access based on
|
970
|
+
* the value of source identity. For more information about using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control
|
971
|
+
* actions taken with assumed roles</a> in the
|
972
|
+
* <i>IAM User Guide</i>.</p>
|
973
|
+
* <p>The regex used to validate this parameter is a string of characters consisting of upper-
|
974
|
+
* and lower-case alphanumeric characters with no spaces. You can also include underscores or
|
975
|
+
* any of the following characters: =,.@-</p>
|
976
|
+
* @public
|
977
|
+
*/
|
978
|
+
SourceIdentity?: string | undefined;
|
979
|
+
}
|
870
980
|
/**
|
871
981
|
* @public
|
872
982
|
*/
|
@@ -891,8 +1001,8 @@ export interface DecodeAuthorizationMessageResponse {
|
|
891
1001
|
}
|
892
1002
|
/**
|
893
1003
|
* <p>The error returned if the message passed to <code>DecodeAuthorizationMessage</code>
|
894
|
-
* was invalid. This can happen if the token contains invalid characters, such as
|
895
|
-
*
|
1004
|
+
* was invalid. This can happen if the token contains invalid characters, such as line
|
1005
|
+
* breaks, or if the message has expired.</p>
|
896
1006
|
* @public
|
897
1007
|
*/
|
898
1008
|
export declare class InvalidAuthorizationMessageException extends __BaseException {
|
@@ -1203,6 +1313,10 @@ export declare const AssumeRoleWithWebIdentityRequestFilterSensitiveLog: (obj: A
|
|
1203
1313
|
* @internal
|
1204
1314
|
*/
|
1205
1315
|
export declare const AssumeRoleWithWebIdentityResponseFilterSensitiveLog: (obj: AssumeRoleWithWebIdentityResponse) => any;
|
1316
|
+
/**
|
1317
|
+
* @internal
|
1318
|
+
*/
|
1319
|
+
export declare const AssumeRootResponseFilterSensitiveLog: (obj: AssumeRootResponse) => any;
|
1206
1320
|
/**
|
1207
1321
|
* @internal
|
1208
1322
|
*/
|
@@ -3,6 +3,7 @@ import { SerdeContext as __SerdeContext } from "@smithy/types";
|
|
3
3
|
import { AssumeRoleCommandInput, AssumeRoleCommandOutput } from "../commands/AssumeRoleCommand";
|
4
4
|
import { AssumeRoleWithSAMLCommandInput, AssumeRoleWithSAMLCommandOutput } from "../commands/AssumeRoleWithSAMLCommand";
|
5
5
|
import { AssumeRoleWithWebIdentityCommandInput, AssumeRoleWithWebIdentityCommandOutput } from "../commands/AssumeRoleWithWebIdentityCommand";
|
6
|
+
import { AssumeRootCommandInput, AssumeRootCommandOutput } from "../commands/AssumeRootCommand";
|
6
7
|
import { DecodeAuthorizationMessageCommandInput, DecodeAuthorizationMessageCommandOutput } from "../commands/DecodeAuthorizationMessageCommand";
|
7
8
|
import { GetAccessKeyInfoCommandInput, GetAccessKeyInfoCommandOutput } from "../commands/GetAccessKeyInfoCommand";
|
8
9
|
import { GetCallerIdentityCommandInput, GetCallerIdentityCommandOutput } from "../commands/GetCallerIdentityCommand";
|
@@ -20,6 +21,10 @@ export declare const se_AssumeRoleWithSAMLCommand: (input: AssumeRoleWithSAMLCom
|
|
20
21
|
* serializeAws_queryAssumeRoleWithWebIdentityCommand
|
21
22
|
*/
|
22
23
|
export declare const se_AssumeRoleWithWebIdentityCommand: (input: AssumeRoleWithWebIdentityCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
24
|
+
/**
|
25
|
+
* serializeAws_queryAssumeRootCommand
|
26
|
+
*/
|
27
|
+
export declare const se_AssumeRootCommand: (input: AssumeRootCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
23
28
|
/**
|
24
29
|
* serializeAws_queryDecodeAuthorizationMessageCommand
|
25
30
|
*/
|
@@ -52,6 +57,10 @@ export declare const de_AssumeRoleWithSAMLCommand: (output: __HttpResponse, cont
|
|
52
57
|
* deserializeAws_queryAssumeRoleWithWebIdentityCommand
|
53
58
|
*/
|
54
59
|
export declare const de_AssumeRoleWithWebIdentityCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<AssumeRoleWithWebIdentityCommandOutput>;
|
60
|
+
/**
|
61
|
+
* deserializeAws_queryAssumeRootCommand
|
62
|
+
*/
|
63
|
+
export declare const de_AssumeRootCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<AssumeRootCommandOutput>;
|
55
64
|
/**
|
56
65
|
* deserializeAws_queryDecodeAuthorizationMessageCommand
|
57
66
|
*/
|
@@ -11,6 +11,10 @@ import {
|
|
11
11
|
AssumeRoleWithWebIdentityCommandInput,
|
12
12
|
AssumeRoleWithWebIdentityCommandOutput,
|
13
13
|
} from "./commands/AssumeRoleWithWebIdentityCommand";
|
14
|
+
import {
|
15
|
+
AssumeRootCommandInput,
|
16
|
+
AssumeRootCommandOutput,
|
17
|
+
} from "./commands/AssumeRootCommand";
|
14
18
|
import {
|
15
19
|
DecodeAuthorizationMessageCommandInput,
|
16
20
|
DecodeAuthorizationMessageCommandOutput,
|
@@ -72,6 +76,19 @@ export interface STS {
|
|
72
76
|
options: __HttpHandlerOptions,
|
73
77
|
cb: (err: any, data?: AssumeRoleWithWebIdentityCommandOutput) => void
|
74
78
|
): void;
|
79
|
+
assumeRoot(
|
80
|
+
args: AssumeRootCommandInput,
|
81
|
+
options?: __HttpHandlerOptions
|
82
|
+
): Promise<AssumeRootCommandOutput>;
|
83
|
+
assumeRoot(
|
84
|
+
args: AssumeRootCommandInput,
|
85
|
+
cb: (err: any, data?: AssumeRootCommandOutput) => void
|
86
|
+
): void;
|
87
|
+
assumeRoot(
|
88
|
+
args: AssumeRootCommandInput,
|
89
|
+
options: __HttpHandlerOptions,
|
90
|
+
cb: (err: any, data?: AssumeRootCommandOutput) => void
|
91
|
+
): void;
|
75
92
|
decodeAuthorizationMessage(
|
76
93
|
args: DecodeAuthorizationMessageCommandInput,
|
77
94
|
options?: __HttpHandlerOptions
|
@@ -57,6 +57,10 @@ import {
|
|
57
57
|
AssumeRoleWithWebIdentityCommandInput,
|
58
58
|
AssumeRoleWithWebIdentityCommandOutput,
|
59
59
|
} from "./commands/AssumeRoleWithWebIdentityCommand";
|
60
|
+
import {
|
61
|
+
AssumeRootCommandInput,
|
62
|
+
AssumeRootCommandOutput,
|
63
|
+
} from "./commands/AssumeRootCommand";
|
60
64
|
import {
|
61
65
|
DecodeAuthorizationMessageCommandInput,
|
62
66
|
DecodeAuthorizationMessageCommandOutput,
|
@@ -88,6 +92,7 @@ export type ServiceInputTypes =
|
|
88
92
|
| AssumeRoleCommandInput
|
89
93
|
| AssumeRoleWithSAMLCommandInput
|
90
94
|
| AssumeRoleWithWebIdentityCommandInput
|
95
|
+
| AssumeRootCommandInput
|
91
96
|
| DecodeAuthorizationMessageCommandInput
|
92
97
|
| GetAccessKeyInfoCommandInput
|
93
98
|
| GetCallerIdentityCommandInput
|
@@ -97,6 +102,7 @@ export type ServiceOutputTypes =
|
|
97
102
|
| AssumeRoleCommandOutput
|
98
103
|
| AssumeRoleWithSAMLCommandOutput
|
99
104
|
| AssumeRoleWithWebIdentityCommandOutput
|
105
|
+
| AssumeRootCommandOutput
|
100
106
|
| DecodeAuthorizationMessageCommandOutput
|
101
107
|
| GetAccessKeyInfoCommandOutput
|
102
108
|
| GetCallerIdentityCommandOutput
|
@@ -0,0 +1,47 @@
|
|
1
|
+
import { Command as $Command } from "@smithy/smithy-client";
|
2
|
+
import { MetadataBearer as __MetadataBearer } from "@smithy/types";
|
3
|
+
import { AssumeRootRequest, AssumeRootResponse } from "../models/models_0";
|
4
|
+
import {
|
5
|
+
ServiceInputTypes,
|
6
|
+
ServiceOutputTypes,
|
7
|
+
STSClientResolvedConfig,
|
8
|
+
} from "../STSClient";
|
9
|
+
export { __MetadataBearer };
|
10
|
+
export { $Command };
|
11
|
+
export interface AssumeRootCommandInput extends AssumeRootRequest {}
|
12
|
+
export interface AssumeRootCommandOutput
|
13
|
+
extends AssumeRootResponse,
|
14
|
+
__MetadataBearer {}
|
15
|
+
declare const AssumeRootCommand_base: {
|
16
|
+
new (
|
17
|
+
input: AssumeRootCommandInput
|
18
|
+
): import("@smithy/smithy-client").CommandImpl<
|
19
|
+
AssumeRootCommandInput,
|
20
|
+
AssumeRootCommandOutput,
|
21
|
+
STSClientResolvedConfig,
|
22
|
+
ServiceInputTypes,
|
23
|
+
ServiceOutputTypes
|
24
|
+
>;
|
25
|
+
new (
|
26
|
+
__0_0: AssumeRootCommandInput
|
27
|
+
): import("@smithy/smithy-client").CommandImpl<
|
28
|
+
AssumeRootCommandInput,
|
29
|
+
AssumeRootCommandOutput,
|
30
|
+
STSClientResolvedConfig,
|
31
|
+
ServiceInputTypes,
|
32
|
+
ServiceOutputTypes
|
33
|
+
>;
|
34
|
+
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
35
|
+
};
|
36
|
+
export declare class AssumeRootCommand extends AssumeRootCommand_base {
|
37
|
+
protected static __types: {
|
38
|
+
api: {
|
39
|
+
input: AssumeRootRequest;
|
40
|
+
output: AssumeRootResponse;
|
41
|
+
};
|
42
|
+
sdk: {
|
43
|
+
input: AssumeRootCommandInput;
|
44
|
+
output: AssumeRootCommandOutput;
|
45
|
+
};
|
46
|
+
};
|
47
|
+
}
|
@@ -1,6 +1,7 @@
|
|
1
1
|
export * from "./AssumeRoleCommand";
|
2
2
|
export * from "./AssumeRoleWithSAMLCommand";
|
3
3
|
export * from "./AssumeRoleWithWebIdentityCommand";
|
4
|
+
export * from "./AssumeRootCommand";
|
4
5
|
export * from "./DecodeAuthorizationMessageCommand";
|
5
6
|
export * from "./GetAccessKeyInfoCommand";
|
6
7
|
export * from "./GetCallerIdentityCommand";
|
@@ -130,6 +130,15 @@ export declare class IDPCommunicationErrorException extends __BaseException {
|
|
130
130
|
opts: __ExceptionOptionType<IDPCommunicationErrorException, __BaseException>
|
131
131
|
);
|
132
132
|
}
|
133
|
+
export interface AssumeRootRequest {
|
134
|
+
TargetPrincipal: string | undefined;
|
135
|
+
TaskPolicyArn: PolicyDescriptorType | undefined;
|
136
|
+
DurationSeconds?: number | undefined;
|
137
|
+
}
|
138
|
+
export interface AssumeRootResponse {
|
139
|
+
Credentials?: Credentials | undefined;
|
140
|
+
SourceIdentity?: string | undefined;
|
141
|
+
}
|
133
142
|
export interface DecodeAuthorizationMessageRequest {
|
134
143
|
EncodedMessage: string | undefined;
|
135
144
|
}
|
@@ -198,6 +207,9 @@ export declare const AssumeRoleWithWebIdentityRequestFilterSensitiveLog: (
|
|
198
207
|
export declare const AssumeRoleWithWebIdentityResponseFilterSensitiveLog: (
|
199
208
|
obj: AssumeRoleWithWebIdentityResponse
|
200
209
|
) => any;
|
210
|
+
export declare const AssumeRootResponseFilterSensitiveLog: (
|
211
|
+
obj: AssumeRootResponse
|
212
|
+
) => any;
|
201
213
|
export declare const GetFederationTokenResponseFilterSensitiveLog: (
|
202
214
|
obj: GetFederationTokenResponse
|
203
215
|
) => any;
|
@@ -15,6 +15,10 @@ import {
|
|
15
15
|
AssumeRoleWithWebIdentityCommandInput,
|
16
16
|
AssumeRoleWithWebIdentityCommandOutput,
|
17
17
|
} from "../commands/AssumeRoleWithWebIdentityCommand";
|
18
|
+
import {
|
19
|
+
AssumeRootCommandInput,
|
20
|
+
AssumeRootCommandOutput,
|
21
|
+
} from "../commands/AssumeRootCommand";
|
18
22
|
import {
|
19
23
|
DecodeAuthorizationMessageCommandInput,
|
20
24
|
DecodeAuthorizationMessageCommandOutput,
|
@@ -47,6 +51,10 @@ export declare const se_AssumeRoleWithWebIdentityCommand: (
|
|
47
51
|
input: AssumeRoleWithWebIdentityCommandInput,
|
48
52
|
context: __SerdeContext
|
49
53
|
) => Promise<__HttpRequest>;
|
54
|
+
export declare const se_AssumeRootCommand: (
|
55
|
+
input: AssumeRootCommandInput,
|
56
|
+
context: __SerdeContext
|
57
|
+
) => Promise<__HttpRequest>;
|
50
58
|
export declare const se_DecodeAuthorizationMessageCommand: (
|
51
59
|
input: DecodeAuthorizationMessageCommandInput,
|
52
60
|
context: __SerdeContext
|
@@ -79,6 +87,10 @@ export declare const de_AssumeRoleWithWebIdentityCommand: (
|
|
79
87
|
output: __HttpResponse,
|
80
88
|
context: __SerdeContext
|
81
89
|
) => Promise<AssumeRoleWithWebIdentityCommandOutput>;
|
90
|
+
export declare const de_AssumeRootCommand: (
|
91
|
+
output: __HttpResponse,
|
92
|
+
context: __SerdeContext
|
93
|
+
) => Promise<AssumeRootCommandOutput>;
|
82
94
|
export declare const de_DecodeAuthorizationMessageCommand: (
|
83
95
|
output: __HttpResponse,
|
84
96
|
context: __SerdeContext
|
@@ -1,7 +1,7 @@
|
|
1
1
|
{
|
2
2
|
"name": "@aws-sdk/client-sts",
|
3
3
|
"description": "AWS SDK for JavaScript Sts Client for Node.js, Browser and React Native",
|
4
|
-
"version": "3.
|
4
|
+
"version": "3.693.0",
|
5
5
|
"scripts": {
|
6
6
|
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
|
7
7
|
"build:cjs": "node ../../scripts/compilation/inline client-sts",
|
@@ -12,8 +12,8 @@
|
|
12
12
|
"clean": "rimraf ./dist-* && rimraf *.tsbuildinfo",
|
13
13
|
"extract:docs": "api-extractor run --local",
|
14
14
|
"generate:client": "node ../../scripts/generate-clients/single-service --solo sts",
|
15
|
-
"test": "vitest run",
|
16
|
-
"test:watch": "vitest watch"
|
15
|
+
"test": "yarn g:vitest run",
|
16
|
+
"test:watch": "yarn g:vitest watch"
|
17
17
|
},
|
18
18
|
"main": "./dist-cjs/index.js",
|
19
19
|
"types": "./dist-types/index.d.ts",
|
@@ -22,42 +22,42 @@
|
|
22
22
|
"dependencies": {
|
23
23
|
"@aws-crypto/sha256-browser": "5.2.0",
|
24
24
|
"@aws-crypto/sha256-js": "5.2.0",
|
25
|
-
"@aws-sdk/client-sso-oidc": "3.
|
26
|
-
"@aws-sdk/core": "3.
|
27
|
-
"@aws-sdk/credential-provider-node": "3.
|
28
|
-
"@aws-sdk/middleware-host-header": "3.
|
29
|
-
"@aws-sdk/middleware-logger": "3.
|
30
|
-
"@aws-sdk/middleware-recursion-detection": "3.
|
31
|
-
"@aws-sdk/middleware-user-agent": "3.
|
32
|
-
"@aws-sdk/region-config-resolver": "3.
|
33
|
-
"@aws-sdk/types": "3.
|
34
|
-
"@aws-sdk/util-endpoints": "3.
|
35
|
-
"@aws-sdk/util-user-agent-browser": "3.
|
36
|
-
"@aws-sdk/util-user-agent-node": "3.
|
37
|
-
"@smithy/config-resolver": "^3.0.
|
38
|
-
"@smithy/core": "^2.5.
|
39
|
-
"@smithy/fetch-http-handler": "^4.
|
40
|
-
"@smithy/hash-node": "^3.0.
|
41
|
-
"@smithy/invalid-dependency": "^3.0.
|
42
|
-
"@smithy/middleware-content-length": "^3.0.
|
43
|
-
"@smithy/middleware-endpoint": "^3.2.
|
44
|
-
"@smithy/middleware-retry": "^3.0.
|
45
|
-
"@smithy/middleware-serde": "^3.0.
|
46
|
-
"@smithy/middleware-stack": "^3.0.
|
47
|
-
"@smithy/node-config-provider": "^3.1.
|
48
|
-
"@smithy/node-http-handler": "^3.
|
49
|
-
"@smithy/protocol-http": "^4.1.
|
50
|
-
"@smithy/smithy-client": "^3.4.
|
51
|
-
"@smithy/types": "^3.
|
52
|
-
"@smithy/url-parser": "^3.0.
|
25
|
+
"@aws-sdk/client-sso-oidc": "3.693.0",
|
26
|
+
"@aws-sdk/core": "3.693.0",
|
27
|
+
"@aws-sdk/credential-provider-node": "3.693.0",
|
28
|
+
"@aws-sdk/middleware-host-header": "3.693.0",
|
29
|
+
"@aws-sdk/middleware-logger": "3.693.0",
|
30
|
+
"@aws-sdk/middleware-recursion-detection": "3.693.0",
|
31
|
+
"@aws-sdk/middleware-user-agent": "3.693.0",
|
32
|
+
"@aws-sdk/region-config-resolver": "3.693.0",
|
33
|
+
"@aws-sdk/types": "3.692.0",
|
34
|
+
"@aws-sdk/util-endpoints": "3.693.0",
|
35
|
+
"@aws-sdk/util-user-agent-browser": "3.693.0",
|
36
|
+
"@aws-sdk/util-user-agent-node": "3.693.0",
|
37
|
+
"@smithy/config-resolver": "^3.0.11",
|
38
|
+
"@smithy/core": "^2.5.2",
|
39
|
+
"@smithy/fetch-http-handler": "^4.1.0",
|
40
|
+
"@smithy/hash-node": "^3.0.9",
|
41
|
+
"@smithy/invalid-dependency": "^3.0.9",
|
42
|
+
"@smithy/middleware-content-length": "^3.0.11",
|
43
|
+
"@smithy/middleware-endpoint": "^3.2.2",
|
44
|
+
"@smithy/middleware-retry": "^3.0.26",
|
45
|
+
"@smithy/middleware-serde": "^3.0.9",
|
46
|
+
"@smithy/middleware-stack": "^3.0.9",
|
47
|
+
"@smithy/node-config-provider": "^3.1.10",
|
48
|
+
"@smithy/node-http-handler": "^3.3.0",
|
49
|
+
"@smithy/protocol-http": "^4.1.6",
|
50
|
+
"@smithy/smithy-client": "^3.4.3",
|
51
|
+
"@smithy/types": "^3.7.0",
|
52
|
+
"@smithy/url-parser": "^3.0.9",
|
53
53
|
"@smithy/util-base64": "^3.0.0",
|
54
54
|
"@smithy/util-body-length-browser": "^3.0.0",
|
55
55
|
"@smithy/util-body-length-node": "^3.0.0",
|
56
|
-
"@smithy/util-defaults-mode-browser": "^3.0.
|
57
|
-
"@smithy/util-defaults-mode-node": "^3.0.
|
58
|
-
"@smithy/util-endpoints": "^2.1.
|
59
|
-
"@smithy/util-middleware": "^3.0.
|
60
|
-
"@smithy/util-retry": "^3.0.
|
56
|
+
"@smithy/util-defaults-mode-browser": "^3.0.26",
|
57
|
+
"@smithy/util-defaults-mode-node": "^3.0.26",
|
58
|
+
"@smithy/util-endpoints": "^2.1.5",
|
59
|
+
"@smithy/util-middleware": "^3.0.9",
|
60
|
+
"@smithy/util-retry": "^3.0.9",
|
61
61
|
"@smithy/util-utf8": "^3.0.0",
|
62
62
|
"tslib": "^2.6.2"
|
63
63
|
},
|