@cdk8s/awscdk-resolver 0.0.199 → 0.0.200

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (122) hide show
  1. package/.jsii +3 -3
  2. package/lib/resolve.js +1 -1
  3. package/node_modules/@aws-sdk/client-cloudformation/package.json +36 -36
  4. package/node_modules/@aws-sdk/client-sso/package.json +32 -32
  5. package/node_modules/@aws-sdk/client-sso-oidc/package.json +34 -34
  6. package/node_modules/@aws-sdk/client-sts/README.md +8 -0
  7. package/node_modules/@aws-sdk/client-sts/dist-cjs/index.js +89 -12
  8. package/node_modules/@aws-sdk/client-sts/dist-es/STS.js +2 -0
  9. package/node_modules/@aws-sdk/client-sts/dist-es/commands/AssumeRootCommand.js +23 -0
  10. package/node_modules/@aws-sdk/client-sts/dist-es/commands/index.js +1 -0
  11. package/node_modules/@aws-sdk/client-sts/dist-es/models/models_0.js +4 -0
  12. package/node_modules/@aws-sdk/client-sts/dist-es/protocols/Aws_query.js +53 -0
  13. package/node_modules/@aws-sdk/client-sts/dist-types/STS.d.ts +7 -0
  14. package/node_modules/@aws-sdk/client-sts/dist-types/STSClient.d.ts +3 -2
  15. package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleCommand.d.ts +13 -13
  16. package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleWithSAMLCommand.d.ts +8 -8
  17. package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleWithWebIdentityCommand.d.ts +15 -30
  18. package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRootCommand.d.ts +129 -0
  19. package/node_modules/@aws-sdk/client-sts/dist-types/commands/DecodeAuthorizationMessageCommand.d.ts +2 -2
  20. package/node_modules/@aws-sdk/client-sts/dist-types/commands/GetFederationTokenCommand.d.ts +8 -8
  21. package/node_modules/@aws-sdk/client-sts/dist-types/commands/GetSessionTokenCommand.d.ts +6 -6
  22. package/node_modules/@aws-sdk/client-sts/dist-types/commands/index.d.ts +1 -0
  23. package/node_modules/@aws-sdk/client-sts/dist-types/models/models_0.d.ts +146 -32
  24. package/node_modules/@aws-sdk/client-sts/dist-types/protocols/Aws_query.d.ts +9 -0
  25. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/STS.d.ts +17 -0
  26. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/STSClient.d.ts +6 -0
  27. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/AssumeRootCommand.d.ts +47 -0
  28. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/index.d.ts +1 -0
  29. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/models/models_0.d.ts +12 -0
  30. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/protocols/Aws_query.d.ts +12 -0
  31. package/node_modules/@aws-sdk/client-sts/package.json +36 -36
  32. package/node_modules/@aws-sdk/core/package.json +14 -14
  33. package/node_modules/@aws-sdk/credential-provider-env/package.json +7 -7
  34. package/node_modules/@aws-sdk/credential-provider-http/package.json +12 -12
  35. package/node_modules/@aws-sdk/credential-provider-ini/package.json +15 -15
  36. package/node_modules/@aws-sdk/credential-provider-node/package.json +14 -14
  37. package/node_modules/@aws-sdk/credential-provider-process/package.json +8 -8
  38. package/node_modules/@aws-sdk/credential-provider-sso/package.json +10 -10
  39. package/node_modules/@aws-sdk/credential-provider-web-identity/package.json +8 -8
  40. package/node_modules/@aws-sdk/middleware-host-header/package.json +8 -8
  41. package/node_modules/@aws-sdk/middleware-logger/package.json +7 -7
  42. package/node_modules/@aws-sdk/middleware-recursion-detection/package.json +8 -8
  43. package/node_modules/@aws-sdk/middleware-user-agent/package.json +11 -11
  44. package/node_modules/@aws-sdk/region-config-resolver/package.json +7 -7
  45. package/node_modules/@aws-sdk/token-providers/package.json +8 -8
  46. package/node_modules/@aws-sdk/types/package.json +2 -2
  47. package/node_modules/@aws-sdk/util-endpoints/package.json +8 -8
  48. package/node_modules/@aws-sdk/util-locate-window/package.json +3 -3
  49. package/node_modules/@aws-sdk/util-user-agent-browser/package.json +5 -5
  50. package/node_modules/@aws-sdk/util-user-agent-node/package.json +7 -7
  51. package/node_modules/@smithy/abort-controller/package.json +4 -3
  52. package/node_modules/@smithy/config-resolver/package.json +7 -6
  53. package/node_modules/@smithy/core/dist-cjs/submodules/protocols/index.js +21 -20
  54. package/node_modules/@smithy/core/dist-es/submodules/protocols/requestBuilder.js +1 -1
  55. package/node_modules/@smithy/core/package.json +10 -9
  56. package/node_modules/@smithy/credential-provider-imds/package.json +7 -7
  57. package/node_modules/@smithy/fetch-http-handler/dist-cjs/create-request.js +1 -0
  58. package/node_modules/@smithy/fetch-http-handler/dist-cjs/index.js +10 -3
  59. package/node_modules/@smithy/fetch-http-handler/dist-es/create-request.js +3 -0
  60. package/node_modules/@smithy/fetch-http-handler/dist-es/fetch-http-handler.js +3 -2
  61. package/node_modules/@smithy/fetch-http-handler/dist-es/stream-collector.js +1 -1
  62. package/node_modules/@smithy/fetch-http-handler/dist-types/create-request.d.ts +6 -0
  63. package/node_modules/@smithy/fetch-http-handler/dist-types/fetch-http-handler.d.ts +6 -0
  64. package/node_modules/@smithy/fetch-http-handler/dist-types/ts3.4/create-request.d.ts +6 -0
  65. package/node_modules/@smithy/fetch-http-handler/dist-types/ts3.4/fetch-http-handler.d.ts +6 -0
  66. package/node_modules/@smithy/fetch-http-handler/package.json +9 -6
  67. package/node_modules/@smithy/hash-node/package.json +4 -3
  68. package/node_modules/@smithy/invalid-dependency/package.json +4 -3
  69. package/node_modules/@smithy/middleware-content-length/package.json +5 -4
  70. package/node_modules/@smithy/middleware-endpoint/package.json +11 -10
  71. package/node_modules/@smithy/middleware-retry/package.json +12 -10
  72. package/node_modules/@smithy/middleware-serde/package.json +6 -4
  73. package/node_modules/@smithy/middleware-stack/package.json +4 -3
  74. package/node_modules/@smithy/node-config-provider/package.json +6 -5
  75. package/node_modules/@smithy/node-http-handler/dist-cjs/index.js +20 -14
  76. package/node_modules/@smithy/node-http-handler/dist-cjs/timing.js +1 -0
  77. package/node_modules/@smithy/node-http-handler/dist-es/node-http-handler.js +5 -4
  78. package/node_modules/@smithy/node-http-handler/dist-es/node-http2-connection-manager.js +1 -1
  79. package/node_modules/@smithy/node-http-handler/dist-es/server.mock.js +9 -2
  80. package/node_modules/@smithy/node-http-handler/dist-es/set-connection-timeout.js +5 -4
  81. package/node_modules/@smithy/node-http-handler/dist-es/set-socket-keep-alive.js +2 -1
  82. package/node_modules/@smithy/node-http-handler/dist-es/set-socket-timeout.js +2 -1
  83. package/node_modules/@smithy/node-http-handler/dist-es/timing.js +4 -0
  84. package/node_modules/@smithy/node-http-handler/dist-es/write-request-body.js +4 -3
  85. package/node_modules/@smithy/node-http-handler/dist-types/timing.d.ts +8 -0
  86. package/node_modules/@smithy/node-http-handler/dist-types/ts3.4/timing.d.ts +8 -0
  87. package/node_modules/@smithy/node-http-handler/package.json +7 -6
  88. package/node_modules/@smithy/property-provider/package.json +4 -3
  89. package/node_modules/@smithy/protocol-http/package.json +4 -3
  90. package/node_modules/@smithy/querystring-builder/package.json +2 -2
  91. package/node_modules/@smithy/querystring-parser/package.json +4 -3
  92. package/node_modules/@smithy/service-error-classification/package.json +4 -3
  93. package/node_modules/@smithy/shared-ini-file-loader/package.json +4 -3
  94. package/node_modules/@smithy/signature-v4/package.json +6 -5
  95. package/node_modules/@smithy/smithy-client/package.json +9 -8
  96. package/node_modules/@smithy/types/dist-types/http.d.ts +1 -0
  97. package/node_modules/@smithy/types/dist-types/transform/no-undefined.d.ts +3 -2
  98. package/node_modules/@smithy/types/dist-types/ts3.4/http.d.ts +1 -0
  99. package/node_modules/@smithy/types/dist-types/ts3.4/transform/no-undefined.d.ts +3 -2
  100. package/node_modules/@smithy/types/package.json +1 -1
  101. package/node_modules/@smithy/url-parser/package.json +5 -4
  102. package/node_modules/@smithy/util-defaults-mode-browser/package.json +6 -5
  103. package/node_modules/@smithy/util-defaults-mode-node/package.json +9 -8
  104. package/node_modules/@smithy/util-endpoints/package.json +7 -5
  105. package/node_modules/@smithy/util-middleware/package.json +4 -3
  106. package/node_modules/@smithy/util-retry/dist-cjs/index.js +5 -1
  107. package/node_modules/@smithy/util-retry/dist-es/DefaultRateLimiter.js +2 -1
  108. package/node_modules/@smithy/util-retry/dist-types/DefaultRateLimiter.d.ts +4 -0
  109. package/node_modules/@smithy/util-retry/dist-types/ts3.4/DefaultRateLimiter.d.ts +4 -0
  110. package/node_modules/@smithy/util-retry/package.json +5 -4
  111. package/node_modules/@smithy/util-stream/dist-cjs/index.js +1 -0
  112. package/node_modules/@smithy/util-stream/dist-cjs/sdk-stream-mixin.js +1 -2
  113. package/node_modules/@smithy/util-stream/dist-cjs/splitStream.js +1 -1
  114. package/node_modules/@smithy/util-stream/dist-cjs/stream-type-check.js +6 -1
  115. package/node_modules/@smithy/util-stream/dist-es/sdk-stream-mixin.js +0 -1
  116. package/node_modules/@smithy/util-stream/dist-es/splitStream.js +2 -2
  117. package/node_modules/@smithy/util-stream/dist-es/stream-type-check.js +3 -0
  118. package/node_modules/@smithy/util-stream/dist-types/stream-type-check.d.ts +4 -0
  119. package/node_modules/@smithy/util-stream/dist-types/ts3.4/stream-type-check.d.ts +4 -0
  120. package/node_modules/@smithy/util-stream/package.json +10 -6
  121. package/node_modules/@smithy/util-waiter/package.json +5 -4
  122. package/package.json +2 -2
@@ -95,6 +95,11 @@ export interface AssumeRoleRequest {
95
95
  * session name is also used in the ARN of the assumed role principal. This means that
96
96
  * subsequent cross-account API requests that use the temporary security credentials will
97
97
  * expose the role session name to the external account in their CloudTrail logs.</p>
98
+ * <p>For security purposes, administrators can view this field in <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html#cloudtrail-integration_signin-tempcreds">CloudTrail logs</a> to help identify who performed an action in Amazon Web Services. Your
99
+ * administrator might require that you specify your user name as the session name when you
100
+ * assume the role. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_rolesessionname">
101
+ * <code>sts:RoleSessionName</code>
102
+ * </a>.</p>
98
103
  * <p>The regex used to validate this parameter is a string of characters
99
104
  * consisting of upper- and lower-case alphanumeric characters with no spaces. You can
100
105
  * also include underscores or any of the following characters: =,.@-</p>
@@ -148,6 +153,8 @@ export interface AssumeRoleRequest {
148
153
  * <code>PackedPolicySize</code> response element indicates by percentage how close the
149
154
  * policies and tags for your request are to the upper size limit.</p>
150
155
  * </note>
156
+ * <p>For more information about role session permissions, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">Session
157
+ * policies</a>.</p>
151
158
  * @public
152
159
  */
153
160
  Policy?: string | undefined;
@@ -164,9 +171,7 @@ export interface AssumeRoleRequest {
164
171
  * specify a parameter value of up to 43200 seconds (12 hours), depending on the maximum
165
172
  * session duration setting for your role. However, if you assume a role using role chaining
166
173
  * and provide a <code>DurationSeconds</code> parameter value greater than one hour, the
167
- * operation fails. To learn how to view the maximum value for your role, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session">View the
168
- * Maximum Session Duration Setting for a Role</a> in the
169
- * <i>IAM User Guide</i>.</p>
174
+ * operation fails. To learn how to view the maximum value for your role, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_update-role-settings.html#id_roles_update-session-duration">Update the maximum session duration for a role</a>.</p>
170
175
  * <p>By default, the value is set to <code>3600</code> seconds. </p>
171
176
  * <note>
172
177
  * <p>The <code>DurationSeconds</code> parameter is separate from the duration of a console
@@ -216,8 +221,8 @@ export interface AssumeRoleRequest {
216
221
  * as transitive, the corresponding key and value passes to subsequent sessions in a role
217
222
  * chain. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining">Chaining Roles
218
223
  * with Session Tags</a> in the <i>IAM User Guide</i>.</p>
219
- * <p>This parameter is optional. When you set session tags as transitive, the session policy
220
- * and session tags packed binary limit is not affected.</p>
224
+ * <p>This parameter is optional. The transitive status of a session tag does not impact its
225
+ * packed binary size.</p>
221
226
  * <p>If you choose not to specify a transitive tag key, then no tags are passed from this
222
227
  * session to any subsequent sessions.</p>
223
228
  * @public
@@ -265,13 +270,15 @@ export interface AssumeRoleRequest {
265
270
  TokenCode?: string | undefined;
266
271
  /**
267
272
  * <p>The source identity specified by the principal that is calling the
268
- * <code>AssumeRole</code> operation.</p>
273
+ * <code>AssumeRole</code> operation. The source identity value persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#iam-term-role-chaining">chained role</a> sessions.</p>
269
274
  * <p>You can require users to specify a source identity when they assume a role. You do this
270
- * by using the <code>sts:SourceIdentity</code> condition key in a role trust policy. You can
271
- * use source identity information in CloudTrail logs to determine who took actions with a role.
272
- * You can use the <code>aws:SourceIdentity</code> condition key to further control access to
273
- * Amazon Web Services resources based on the value of source identity. For more information about using
274
- * source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control
275
+ * by using the <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-sourceidentity">
276
+ * <code>sts:SourceIdentity</code>
277
+ * </a> condition key in a role trust policy. You
278
+ * can use source identity information in CloudTrail logs to determine who took actions with a
279
+ * role. You can use the <code>aws:SourceIdentity</code> condition key to further control
280
+ * access to Amazon Web Services resources based on the value of source identity. For more information about
281
+ * using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control
275
282
  * actions taken with assumed roles</a> in the
276
283
  * <i>IAM User Guide</i>.</p>
277
284
  * <p>The regex used to validate this parameter is a string of characters consisting of upper-
@@ -405,8 +412,8 @@ export declare class MalformedPolicyDocumentException extends __BaseException {
405
412
  * tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in
406
413
  * the <i>IAM User Guide</i>.</p>
407
414
  * <p>You could receive this error even though you meet other defined session policy and
408
- * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
409
- * Character Limits</a> in the <i>IAM User Guide</i>.</p>
415
+ * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
416
+ * Guide</i>.</p>
410
417
  * @public
411
418
  */
412
419
  export declare class PackedPolicyTooLargeException extends __BaseException {
@@ -419,10 +426,10 @@ export declare class PackedPolicyTooLargeException extends __BaseException {
419
426
  }
420
427
  /**
421
428
  * <p>STS is not activated in the requested region for the account that is being asked to
422
- * generate credentials. The account administrator must use the IAM console to activate STS
423
- * in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
424
- * Deactivating Amazon Web Services STS in an Amazon Web Services Region</a> in the <i>IAM User
425
- * Guide</i>.</p>
429
+ * generate credentials. The account administrator must use the IAM console to activate
430
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
431
+ * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
432
+ * Guide</i>.</p>
426
433
  * @public
427
434
  */
428
435
  export declare class RegionDisabledException extends __BaseException {
@@ -495,6 +502,8 @@ export interface AssumeRoleWithSAMLRequest {
495
502
  * character to the end of the valid character list (\u0020 through \u00FF). It can also
496
503
  * include the tab (\u0009), linefeed (\u000A), and carriage return (\u000D)
497
504
  * characters.</p>
505
+ * <p>For more information about role session permissions, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">Session
506
+ * policies</a>.</p>
498
507
  * <note>
499
508
  * <p>An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs,
500
509
  * and session tags into a packed binary format that has a separate limit. Your request can
@@ -612,14 +621,16 @@ export interface AssumeRoleWithSAMLResponse {
612
621
  */
613
622
  NameQualifier?: string | undefined;
614
623
  /**
615
- * <p>The value in the <code>SourceIdentity</code> attribute in the SAML assertion. </p>
624
+ * <p>The value in the <code>SourceIdentity</code> attribute in the SAML assertion. The source
625
+ * identity value persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#iam-term-role-chaining">chained role</a>
626
+ * sessions.</p>
616
627
  * <p>You can require users to set a source identity value when they assume a role. You do
617
628
  * this by using the <code>sts:SourceIdentity</code> condition key in a role trust policy.
618
629
  * That way, actions that are taken with the role are associated with that user. After the
619
630
  * source identity is set, the value cannot be changed. It is present in the request for all
620
- * actions that are taken by the role and persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts#iam-term-role-chaining">chained
621
- * role</a> sessions. You can configure your SAML identity provider to use an attribute
622
- * associated with your users, like user name or email, as the source identity when calling
631
+ * actions that are taken by the role and persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#id_roles_terms-and-concepts">chained role</a>
632
+ * sessions. You can configure your SAML identity provider to use an attribute associated with
633
+ * your users, like user name or email, as the source identity when calling
623
634
  * <code>AssumeRoleWithSAML</code>. You do this by adding an attribute to the SAML
624
635
  * assertion. For more information about using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control
625
636
  * actions taken with assumed roles</a> in the
@@ -665,6 +676,16 @@ export declare class InvalidIdentityTokenException extends __BaseException {
665
676
  export interface AssumeRoleWithWebIdentityRequest {
666
677
  /**
667
678
  * <p>The Amazon Resource Name (ARN) of the role that the caller is assuming.</p>
679
+ * <note>
680
+ * <p>Additional considerations apply to Amazon Cognito identity pools that assume <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies-cross-account-resource-access.html">cross-account IAM roles</a>. The trust policies of these roles must accept the
681
+ * <code>cognito-identity.amazonaws.com</code> service principal and must contain the
682
+ * <code>cognito-identity.amazonaws.com:aud</code> condition key to restrict role
683
+ * assumption to users from your intended identity pools. A policy that trusts Amazon Cognito
684
+ * identity pools without this condition creates a risk that a user from an unintended
685
+ * identity pool can assume the role. For more information, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/iam-roles.html#trust-policies"> Trust policies for
686
+ * IAM roles in Basic (Classic) authentication </a> in the <i>Amazon Cognito
687
+ * Developer Guide</i>.</p>
688
+ * </note>
668
689
  * @public
669
690
  */
670
691
  RoleArn: string | undefined;
@@ -674,6 +695,11 @@ export interface AssumeRoleWithWebIdentityRequest {
674
695
  * security credentials that your application will use are associated with that user. This
675
696
  * session name is included as part of the ARN and assumed role ID in the
676
697
  * <code>AssumedRoleUser</code> response element.</p>
698
+ * <p>For security purposes, administrators can view this field in <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html#cloudtrail-integration_signin-tempcreds">CloudTrail logs</a> to help identify who performed an action in Amazon Web Services. Your
699
+ * administrator might require that you specify your user name as the session name when you
700
+ * assume the role. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_rolesessionname">
701
+ * <code>sts:RoleSessionName</code>
702
+ * </a>.</p>
677
703
  * <p>The regex used to validate this parameter is a string of characters
678
704
  * consisting of upper- and lower-case alphanumeric characters with no spaces. You can
679
705
  * also include underscores or any of the following characters: =,.@-</p>
@@ -684,7 +710,8 @@ export interface AssumeRoleWithWebIdentityRequest {
684
710
  * <p>The OAuth 2.0 access token or OpenID Connect ID token that is provided by the identity
685
711
  * provider. Your application must get this token by authenticating the user who is using your
686
712
  * application with a web identity provider before the application makes an
687
- * <code>AssumeRoleWithWebIdentity</code> call. Only tokens with RSA algorithms (RS256) are
713
+ * <code>AssumeRoleWithWebIdentity</code> call. Timestamps in the token must be formatted
714
+ * as either an integer or a long integer. Only tokens with RSA algorithms (RS256) are
688
715
  * supported.</p>
689
716
  * @public
690
717
  */
@@ -739,6 +766,8 @@ export interface AssumeRoleWithWebIdentityRequest {
739
766
  * character to the end of the valid character list (\u0020 through \u00FF). It can also
740
767
  * include the tab (\u0009), linefeed (\u000A), and carriage return (\u000D)
741
768
  * characters.</p>
769
+ * <p>For more information about role session permissions, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">Session
770
+ * policies</a>.</p>
742
771
  * <note>
743
772
  * <p>An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs,
744
773
  * and session tags into a packed binary format that has a separate limit. Your request can
@@ -836,9 +865,9 @@ export interface AssumeRoleWithWebIdentityResponse {
836
865
  * this by using the <code>sts:SourceIdentity</code> condition key in a role trust policy.
837
866
  * That way, actions that are taken with the role are associated with that user. After the
838
867
  * source identity is set, the value cannot be changed. It is present in the request for all
839
- * actions that are taken by the role and persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts#iam-term-role-chaining">chained
840
- * role</a> sessions. You can configure your identity provider to use an attribute
841
- * associated with your users, like user name or email, as the source identity when calling
868
+ * actions that are taken by the role and persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#id_roles_terms-and-concepts">chained role</a>
869
+ * sessions. You can configure your identity provider to use an attribute associated with your
870
+ * users, like user name or email, as the source identity when calling
842
871
  * <code>AssumeRoleWithWebIdentity</code>. You do this by adding a claim to the JSON web
843
872
  * token. To learn more about OIDC tokens and claims, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-using-tokens-with-identity-providers.html">Using Tokens with User Pools</a> in the <i>Amazon Cognito Developer Guide</i>.
844
873
  * For more information about using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control
@@ -852,11 +881,11 @@ export interface AssumeRoleWithWebIdentityResponse {
852
881
  SourceIdentity?: string | undefined;
853
882
  }
854
883
  /**
855
- * <p>The request could not be fulfilled because the identity provider (IDP) that
856
- * was asked to verify the incoming identity token could not be reached. This is often a
857
- * transient error caused by network conditions. Retry the request a limited number of
858
- * times so that you don't exceed the request rate. If the error persists, the
859
- * identity provider might be down or not responding.</p>
884
+ * <p>The request could not be fulfilled because the identity provider (IDP) that was asked
885
+ * to verify the incoming identity token could not be reached. This is often a transient
886
+ * error caused by network conditions. Retry the request a limited number of times so that
887
+ * you don't exceed the request rate. If the error persists, the identity provider might be
888
+ * down or not responding.</p>
860
889
  * @public
861
890
  */
862
891
  export declare class IDPCommunicationErrorException extends __BaseException {
@@ -867,6 +896,87 @@ export declare class IDPCommunicationErrorException extends __BaseException {
867
896
  */
868
897
  constructor(opts: __ExceptionOptionType<IDPCommunicationErrorException, __BaseException>);
869
898
  }
899
+ /**
900
+ * @public
901
+ */
902
+ export interface AssumeRootRequest {
903
+ /**
904
+ * <p>The member account principal ARN or account ID.</p>
905
+ * @public
906
+ */
907
+ TargetPrincipal: string | undefined;
908
+ /**
909
+ * <p>The identity based policy that scopes the session to the privileged tasks that can be
910
+ * performed. You can use one of following Amazon Web Services managed policies to scope
911
+ * root session actions. You can add additional customer managed policies to further limit the
912
+ * permissions for the root session.</p>
913
+ * <ul>
914
+ * <li>
915
+ * <p>
916
+ * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMAuditRootUserCredentials">IAMAuditRootUserCredentials</a>
917
+ * </p>
918
+ * </li>
919
+ * <li>
920
+ * <p>
921
+ * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMCreateRootUserPassword">IAMCreateRootUserPassword</a>
922
+ * </p>
923
+ * </li>
924
+ * <li>
925
+ * <p>
926
+ * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMDeleteRootUserCredentials">IAMDeleteRootUserCredentials</a>
927
+ * </p>
928
+ * </li>
929
+ * <li>
930
+ * <p>
931
+ * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-S3UnlockBucketPolicy">S3UnlockBucketPolicy</a>
932
+ * </p>
933
+ * </li>
934
+ * <li>
935
+ * <p>
936
+ * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-SQSUnlockQueuePolicy">SQSUnlockQueuePolicy</a>
937
+ * </p>
938
+ * </li>
939
+ * </ul>
940
+ * @public
941
+ */
942
+ TaskPolicyArn: PolicyDescriptorType | undefined;
943
+ /**
944
+ * <p>The duration, in seconds, of the privileged session. The value can range from 0 seconds
945
+ * up to the maximum session duration of 900 seconds (15 minutes). If you specify a value
946
+ * higher than this setting, the operation fails.</p>
947
+ * <p>By default, the value is set to <code>900</code> seconds.</p>
948
+ * @public
949
+ */
950
+ DurationSeconds?: number | undefined;
951
+ }
952
+ /**
953
+ * @public
954
+ */
955
+ export interface AssumeRootResponse {
956
+ /**
957
+ * <p>The temporary security credentials, which include an access key ID, a secret access key,
958
+ * and a security token.</p>
959
+ * <note>
960
+ * <p>The size of the security token that STS API operations return is not fixed. We
961
+ * strongly recommend that you make no assumptions about the maximum size.</p>
962
+ * </note>
963
+ * @public
964
+ */
965
+ Credentials?: Credentials | undefined;
966
+ /**
967
+ * <p>The source identity specified by the principal that is calling the
968
+ * <code>AssumeRoot</code> operation.</p>
969
+ * <p>You can use the <code>aws:SourceIdentity</code> condition key to control access based on
970
+ * the value of source identity. For more information about using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control
971
+ * actions taken with assumed roles</a> in the
972
+ * <i>IAM User Guide</i>.</p>
973
+ * <p>The regex used to validate this parameter is a string of characters consisting of upper-
974
+ * and lower-case alphanumeric characters with no spaces. You can also include underscores or
975
+ * any of the following characters: =,.@-</p>
976
+ * @public
977
+ */
978
+ SourceIdentity?: string | undefined;
979
+ }
870
980
  /**
871
981
  * @public
872
982
  */
@@ -891,8 +1001,8 @@ export interface DecodeAuthorizationMessageResponse {
891
1001
  }
892
1002
  /**
893
1003
  * <p>The error returned if the message passed to <code>DecodeAuthorizationMessage</code>
894
- * was invalid. This can happen if the token contains invalid characters, such as
895
- * linebreaks. </p>
1004
+ * was invalid. This can happen if the token contains invalid characters, such as line
1005
+ * breaks, or if the message has expired.</p>
896
1006
  * @public
897
1007
  */
898
1008
  export declare class InvalidAuthorizationMessageException extends __BaseException {
@@ -1203,6 +1313,10 @@ export declare const AssumeRoleWithWebIdentityRequestFilterSensitiveLog: (obj: A
1203
1313
  * @internal
1204
1314
  */
1205
1315
  export declare const AssumeRoleWithWebIdentityResponseFilterSensitiveLog: (obj: AssumeRoleWithWebIdentityResponse) => any;
1316
+ /**
1317
+ * @internal
1318
+ */
1319
+ export declare const AssumeRootResponseFilterSensitiveLog: (obj: AssumeRootResponse) => any;
1206
1320
  /**
1207
1321
  * @internal
1208
1322
  */
@@ -3,6 +3,7 @@ import { SerdeContext as __SerdeContext } from "@smithy/types";
3
3
  import { AssumeRoleCommandInput, AssumeRoleCommandOutput } from "../commands/AssumeRoleCommand";
4
4
  import { AssumeRoleWithSAMLCommandInput, AssumeRoleWithSAMLCommandOutput } from "../commands/AssumeRoleWithSAMLCommand";
5
5
  import { AssumeRoleWithWebIdentityCommandInput, AssumeRoleWithWebIdentityCommandOutput } from "../commands/AssumeRoleWithWebIdentityCommand";
6
+ import { AssumeRootCommandInput, AssumeRootCommandOutput } from "../commands/AssumeRootCommand";
6
7
  import { DecodeAuthorizationMessageCommandInput, DecodeAuthorizationMessageCommandOutput } from "../commands/DecodeAuthorizationMessageCommand";
7
8
  import { GetAccessKeyInfoCommandInput, GetAccessKeyInfoCommandOutput } from "../commands/GetAccessKeyInfoCommand";
8
9
  import { GetCallerIdentityCommandInput, GetCallerIdentityCommandOutput } from "../commands/GetCallerIdentityCommand";
@@ -20,6 +21,10 @@ export declare const se_AssumeRoleWithSAMLCommand: (input: AssumeRoleWithSAMLCom
20
21
  * serializeAws_queryAssumeRoleWithWebIdentityCommand
21
22
  */
22
23
  export declare const se_AssumeRoleWithWebIdentityCommand: (input: AssumeRoleWithWebIdentityCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
24
+ /**
25
+ * serializeAws_queryAssumeRootCommand
26
+ */
27
+ export declare const se_AssumeRootCommand: (input: AssumeRootCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
23
28
  /**
24
29
  * serializeAws_queryDecodeAuthorizationMessageCommand
25
30
  */
@@ -52,6 +57,10 @@ export declare const de_AssumeRoleWithSAMLCommand: (output: __HttpResponse, cont
52
57
  * deserializeAws_queryAssumeRoleWithWebIdentityCommand
53
58
  */
54
59
  export declare const de_AssumeRoleWithWebIdentityCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<AssumeRoleWithWebIdentityCommandOutput>;
60
+ /**
61
+ * deserializeAws_queryAssumeRootCommand
62
+ */
63
+ export declare const de_AssumeRootCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<AssumeRootCommandOutput>;
55
64
  /**
56
65
  * deserializeAws_queryDecodeAuthorizationMessageCommand
57
66
  */
@@ -11,6 +11,10 @@ import {
11
11
  AssumeRoleWithWebIdentityCommandInput,
12
12
  AssumeRoleWithWebIdentityCommandOutput,
13
13
  } from "./commands/AssumeRoleWithWebIdentityCommand";
14
+ import {
15
+ AssumeRootCommandInput,
16
+ AssumeRootCommandOutput,
17
+ } from "./commands/AssumeRootCommand";
14
18
  import {
15
19
  DecodeAuthorizationMessageCommandInput,
16
20
  DecodeAuthorizationMessageCommandOutput,
@@ -72,6 +76,19 @@ export interface STS {
72
76
  options: __HttpHandlerOptions,
73
77
  cb: (err: any, data?: AssumeRoleWithWebIdentityCommandOutput) => void
74
78
  ): void;
79
+ assumeRoot(
80
+ args: AssumeRootCommandInput,
81
+ options?: __HttpHandlerOptions
82
+ ): Promise<AssumeRootCommandOutput>;
83
+ assumeRoot(
84
+ args: AssumeRootCommandInput,
85
+ cb: (err: any, data?: AssumeRootCommandOutput) => void
86
+ ): void;
87
+ assumeRoot(
88
+ args: AssumeRootCommandInput,
89
+ options: __HttpHandlerOptions,
90
+ cb: (err: any, data?: AssumeRootCommandOutput) => void
91
+ ): void;
75
92
  decodeAuthorizationMessage(
76
93
  args: DecodeAuthorizationMessageCommandInput,
77
94
  options?: __HttpHandlerOptions
@@ -57,6 +57,10 @@ import {
57
57
  AssumeRoleWithWebIdentityCommandInput,
58
58
  AssumeRoleWithWebIdentityCommandOutput,
59
59
  } from "./commands/AssumeRoleWithWebIdentityCommand";
60
+ import {
61
+ AssumeRootCommandInput,
62
+ AssumeRootCommandOutput,
63
+ } from "./commands/AssumeRootCommand";
60
64
  import {
61
65
  DecodeAuthorizationMessageCommandInput,
62
66
  DecodeAuthorizationMessageCommandOutput,
@@ -88,6 +92,7 @@ export type ServiceInputTypes =
88
92
  | AssumeRoleCommandInput
89
93
  | AssumeRoleWithSAMLCommandInput
90
94
  | AssumeRoleWithWebIdentityCommandInput
95
+ | AssumeRootCommandInput
91
96
  | DecodeAuthorizationMessageCommandInput
92
97
  | GetAccessKeyInfoCommandInput
93
98
  | GetCallerIdentityCommandInput
@@ -97,6 +102,7 @@ export type ServiceOutputTypes =
97
102
  | AssumeRoleCommandOutput
98
103
  | AssumeRoleWithSAMLCommandOutput
99
104
  | AssumeRoleWithWebIdentityCommandOutput
105
+ | AssumeRootCommandOutput
100
106
  | DecodeAuthorizationMessageCommandOutput
101
107
  | GetAccessKeyInfoCommandOutput
102
108
  | GetCallerIdentityCommandOutput
@@ -0,0 +1,47 @@
1
+ import { Command as $Command } from "@smithy/smithy-client";
2
+ import { MetadataBearer as __MetadataBearer } from "@smithy/types";
3
+ import { AssumeRootRequest, AssumeRootResponse } from "../models/models_0";
4
+ import {
5
+ ServiceInputTypes,
6
+ ServiceOutputTypes,
7
+ STSClientResolvedConfig,
8
+ } from "../STSClient";
9
+ export { __MetadataBearer };
10
+ export { $Command };
11
+ export interface AssumeRootCommandInput extends AssumeRootRequest {}
12
+ export interface AssumeRootCommandOutput
13
+ extends AssumeRootResponse,
14
+ __MetadataBearer {}
15
+ declare const AssumeRootCommand_base: {
16
+ new (
17
+ input: AssumeRootCommandInput
18
+ ): import("@smithy/smithy-client").CommandImpl<
19
+ AssumeRootCommandInput,
20
+ AssumeRootCommandOutput,
21
+ STSClientResolvedConfig,
22
+ ServiceInputTypes,
23
+ ServiceOutputTypes
24
+ >;
25
+ new (
26
+ __0_0: AssumeRootCommandInput
27
+ ): import("@smithy/smithy-client").CommandImpl<
28
+ AssumeRootCommandInput,
29
+ AssumeRootCommandOutput,
30
+ STSClientResolvedConfig,
31
+ ServiceInputTypes,
32
+ ServiceOutputTypes
33
+ >;
34
+ getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
35
+ };
36
+ export declare class AssumeRootCommand extends AssumeRootCommand_base {
37
+ protected static __types: {
38
+ api: {
39
+ input: AssumeRootRequest;
40
+ output: AssumeRootResponse;
41
+ };
42
+ sdk: {
43
+ input: AssumeRootCommandInput;
44
+ output: AssumeRootCommandOutput;
45
+ };
46
+ };
47
+ }
@@ -1,6 +1,7 @@
1
1
  export * from "./AssumeRoleCommand";
2
2
  export * from "./AssumeRoleWithSAMLCommand";
3
3
  export * from "./AssumeRoleWithWebIdentityCommand";
4
+ export * from "./AssumeRootCommand";
4
5
  export * from "./DecodeAuthorizationMessageCommand";
5
6
  export * from "./GetAccessKeyInfoCommand";
6
7
  export * from "./GetCallerIdentityCommand";
@@ -130,6 +130,15 @@ export declare class IDPCommunicationErrorException extends __BaseException {
130
130
  opts: __ExceptionOptionType<IDPCommunicationErrorException, __BaseException>
131
131
  );
132
132
  }
133
+ export interface AssumeRootRequest {
134
+ TargetPrincipal: string | undefined;
135
+ TaskPolicyArn: PolicyDescriptorType | undefined;
136
+ DurationSeconds?: number | undefined;
137
+ }
138
+ export interface AssumeRootResponse {
139
+ Credentials?: Credentials | undefined;
140
+ SourceIdentity?: string | undefined;
141
+ }
133
142
  export interface DecodeAuthorizationMessageRequest {
134
143
  EncodedMessage: string | undefined;
135
144
  }
@@ -198,6 +207,9 @@ export declare const AssumeRoleWithWebIdentityRequestFilterSensitiveLog: (
198
207
  export declare const AssumeRoleWithWebIdentityResponseFilterSensitiveLog: (
199
208
  obj: AssumeRoleWithWebIdentityResponse
200
209
  ) => any;
210
+ export declare const AssumeRootResponseFilterSensitiveLog: (
211
+ obj: AssumeRootResponse
212
+ ) => any;
201
213
  export declare const GetFederationTokenResponseFilterSensitiveLog: (
202
214
  obj: GetFederationTokenResponse
203
215
  ) => any;
@@ -15,6 +15,10 @@ import {
15
15
  AssumeRoleWithWebIdentityCommandInput,
16
16
  AssumeRoleWithWebIdentityCommandOutput,
17
17
  } from "../commands/AssumeRoleWithWebIdentityCommand";
18
+ import {
19
+ AssumeRootCommandInput,
20
+ AssumeRootCommandOutput,
21
+ } from "../commands/AssumeRootCommand";
18
22
  import {
19
23
  DecodeAuthorizationMessageCommandInput,
20
24
  DecodeAuthorizationMessageCommandOutput,
@@ -47,6 +51,10 @@ export declare const se_AssumeRoleWithWebIdentityCommand: (
47
51
  input: AssumeRoleWithWebIdentityCommandInput,
48
52
  context: __SerdeContext
49
53
  ) => Promise<__HttpRequest>;
54
+ export declare const se_AssumeRootCommand: (
55
+ input: AssumeRootCommandInput,
56
+ context: __SerdeContext
57
+ ) => Promise<__HttpRequest>;
50
58
  export declare const se_DecodeAuthorizationMessageCommand: (
51
59
  input: DecodeAuthorizationMessageCommandInput,
52
60
  context: __SerdeContext
@@ -79,6 +87,10 @@ export declare const de_AssumeRoleWithWebIdentityCommand: (
79
87
  output: __HttpResponse,
80
88
  context: __SerdeContext
81
89
  ) => Promise<AssumeRoleWithWebIdentityCommandOutput>;
90
+ export declare const de_AssumeRootCommand: (
91
+ output: __HttpResponse,
92
+ context: __SerdeContext
93
+ ) => Promise<AssumeRootCommandOutput>;
82
94
  export declare const de_DecodeAuthorizationMessageCommand: (
83
95
  output: __HttpResponse,
84
96
  context: __SerdeContext
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-sts",
3
3
  "description": "AWS SDK for JavaScript Sts Client for Node.js, Browser and React Native",
4
- "version": "3.691.0",
4
+ "version": "3.693.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "node ../../scripts/compilation/inline client-sts",
@@ -12,8 +12,8 @@
12
12
  "clean": "rimraf ./dist-* && rimraf *.tsbuildinfo",
13
13
  "extract:docs": "api-extractor run --local",
14
14
  "generate:client": "node ../../scripts/generate-clients/single-service --solo sts",
15
- "test": "vitest run",
16
- "test:watch": "vitest watch"
15
+ "test": "yarn g:vitest run",
16
+ "test:watch": "yarn g:vitest watch"
17
17
  },
18
18
  "main": "./dist-cjs/index.js",
19
19
  "types": "./dist-types/index.d.ts",
@@ -22,42 +22,42 @@
22
22
  "dependencies": {
23
23
  "@aws-crypto/sha256-browser": "5.2.0",
24
24
  "@aws-crypto/sha256-js": "5.2.0",
25
- "@aws-sdk/client-sso-oidc": "3.691.0",
26
- "@aws-sdk/core": "3.691.0",
27
- "@aws-sdk/credential-provider-node": "3.691.0",
28
- "@aws-sdk/middleware-host-header": "3.686.0",
29
- "@aws-sdk/middleware-logger": "3.686.0",
30
- "@aws-sdk/middleware-recursion-detection": "3.686.0",
31
- "@aws-sdk/middleware-user-agent": "3.691.0",
32
- "@aws-sdk/region-config-resolver": "3.686.0",
33
- "@aws-sdk/types": "3.686.0",
34
- "@aws-sdk/util-endpoints": "3.686.0",
35
- "@aws-sdk/util-user-agent-browser": "3.686.0",
36
- "@aws-sdk/util-user-agent-node": "3.691.0",
37
- "@smithy/config-resolver": "^3.0.10",
38
- "@smithy/core": "^2.5.1",
39
- "@smithy/fetch-http-handler": "^4.0.0",
40
- "@smithy/hash-node": "^3.0.8",
41
- "@smithy/invalid-dependency": "^3.0.8",
42
- "@smithy/middleware-content-length": "^3.0.10",
43
- "@smithy/middleware-endpoint": "^3.2.1",
44
- "@smithy/middleware-retry": "^3.0.25",
45
- "@smithy/middleware-serde": "^3.0.8",
46
- "@smithy/middleware-stack": "^3.0.8",
47
- "@smithy/node-config-provider": "^3.1.9",
48
- "@smithy/node-http-handler": "^3.2.5",
49
- "@smithy/protocol-http": "^4.1.5",
50
- "@smithy/smithy-client": "^3.4.2",
51
- "@smithy/types": "^3.6.0",
52
- "@smithy/url-parser": "^3.0.8",
25
+ "@aws-sdk/client-sso-oidc": "3.693.0",
26
+ "@aws-sdk/core": "3.693.0",
27
+ "@aws-sdk/credential-provider-node": "3.693.0",
28
+ "@aws-sdk/middleware-host-header": "3.693.0",
29
+ "@aws-sdk/middleware-logger": "3.693.0",
30
+ "@aws-sdk/middleware-recursion-detection": "3.693.0",
31
+ "@aws-sdk/middleware-user-agent": "3.693.0",
32
+ "@aws-sdk/region-config-resolver": "3.693.0",
33
+ "@aws-sdk/types": "3.692.0",
34
+ "@aws-sdk/util-endpoints": "3.693.0",
35
+ "@aws-sdk/util-user-agent-browser": "3.693.0",
36
+ "@aws-sdk/util-user-agent-node": "3.693.0",
37
+ "@smithy/config-resolver": "^3.0.11",
38
+ "@smithy/core": "^2.5.2",
39
+ "@smithy/fetch-http-handler": "^4.1.0",
40
+ "@smithy/hash-node": "^3.0.9",
41
+ "@smithy/invalid-dependency": "^3.0.9",
42
+ "@smithy/middleware-content-length": "^3.0.11",
43
+ "@smithy/middleware-endpoint": "^3.2.2",
44
+ "@smithy/middleware-retry": "^3.0.26",
45
+ "@smithy/middleware-serde": "^3.0.9",
46
+ "@smithy/middleware-stack": "^3.0.9",
47
+ "@smithy/node-config-provider": "^3.1.10",
48
+ "@smithy/node-http-handler": "^3.3.0",
49
+ "@smithy/protocol-http": "^4.1.6",
50
+ "@smithy/smithy-client": "^3.4.3",
51
+ "@smithy/types": "^3.7.0",
52
+ "@smithy/url-parser": "^3.0.9",
53
53
  "@smithy/util-base64": "^3.0.0",
54
54
  "@smithy/util-body-length-browser": "^3.0.0",
55
55
  "@smithy/util-body-length-node": "^3.0.0",
56
- "@smithy/util-defaults-mode-browser": "^3.0.25",
57
- "@smithy/util-defaults-mode-node": "^3.0.25",
58
- "@smithy/util-endpoints": "^2.1.4",
59
- "@smithy/util-middleware": "^3.0.8",
60
- "@smithy/util-retry": "^3.0.8",
56
+ "@smithy/util-defaults-mode-browser": "^3.0.26",
57
+ "@smithy/util-defaults-mode-node": "^3.0.26",
58
+ "@smithy/util-endpoints": "^2.1.5",
59
+ "@smithy/util-middleware": "^3.0.9",
60
+ "@smithy/util-retry": "^3.0.9",
61
61
  "@smithy/util-utf8": "^3.0.0",
62
62
  "tslib": "^2.6.2"
63
63
  },