@cdk8s/awscdk-resolver 0.0.53 → 0.0.55
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/lib/resolve.js +1 -1
- package/node_modules/@aws-sdk/client-cloudformation/dist-cjs/index.js +91 -90
- package/node_modules/@aws-sdk/client-cloudformation/dist-cjs/runtimeConfig.js +1 -2
- package/node_modules/@aws-sdk/client-cloudformation/dist-es/runtimeConfig.js +1 -2
- package/node_modules/@aws-sdk/client-cloudformation/dist-types/runtimeConfig.d.ts +1 -1
- package/node_modules/@aws-sdk/client-cloudformation/dist-types/ts3.4/runtimeConfig.d.ts +6 -2
- package/node_modules/@aws-sdk/client-cloudformation/package.json +13 -13
- package/node_modules/@aws-sdk/client-sso/dist-cjs/index.js +14 -13
- package/node_modules/@aws-sdk/client-sso/package.json +10 -10
- package/node_modules/@aws-sdk/client-sso-oidc/LICENSE +201 -0
- package/node_modules/@aws-sdk/client-sso-oidc/README.md +274 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/SSOOIDC.js +1 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/SSOOIDCClient.js +1 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/commands/CreateTokenCommand.js +1 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/commands/CreateTokenWithIAMCommand.js +1 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/commands/RegisterClientCommand.js +1 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/commands/StartDeviceAuthorizationCommand.js +1 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/commands/index.js +1 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/credentialDefaultProvider.js +29 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/endpoint/EndpointParameters.js +1 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/endpoint/endpointResolver.js +12 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/endpoint/ruleset.js +7 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/extensionConfiguration.js +1 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/index.js +1115 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/models/SSOOIDCServiceException.js +1 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/models/index.js +1 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/models/models_0.js +1 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/protocols/Aws_restJson1.js +1 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/runtimeConfig.browser.js +39 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/runtimeConfig.js +49 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/runtimeConfig.native.js +15 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/runtimeConfig.shared.js +24 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/runtimeExtensions.js +1 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/SSOOIDC.js +15 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/SSOOIDCClient.js +38 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/commands/CreateTokenCommand.js +25 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/commands/CreateTokenWithIAMCommand.js +27 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/commands/RegisterClientCommand.js +25 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/commands/StartDeviceAuthorizationCommand.js +25 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/commands/index.js +4 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/credentialDefaultProvider.js +3 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/endpoint/EndpointParameters.js +14 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/endpoint/endpointResolver.js +8 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/endpoint/ruleset.js +4 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/extensionConfiguration.js +1 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/index.js +6 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/models/SSOOIDCServiceException.js +8 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/models/index.js +1 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/models/models_0.js +217 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/protocols/Aws_restJson1.js +553 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/runtimeConfig.browser.js +34 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/runtimeConfig.js +44 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/runtimeConfig.native.js +11 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/runtimeConfig.shared.js +20 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/runtimeExtensions.js +18 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/SSOOIDC.d.ts +75 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/SSOOIDCClient.d.ts +210 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/commands/CreateTokenCommand.d.ts +161 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/commands/CreateTokenWithIAMCommand.d.ts +243 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/commands/RegisterClientCommand.d.ts +107 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/commands/StartDeviceAuthorizationCommand.d.ts +110 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/commands/index.d.ts +4 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/credentialDefaultProvider.d.ts +4 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/endpoint/EndpointParameters.d.ts +40 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/endpoint/endpointResolver.d.ts +5 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/endpoint/ruleset.d.ts +2 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/extensionConfiguration.d.ts +8 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/index.d.ts +51 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/models/SSOOIDCServiceException.d.ts +13 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/models/index.d.ts +1 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/models/models_0.d.ts +734 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/protocols/Aws_restJson1.d.ts +38 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/runtimeConfig.browser.d.ts +46 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/runtimeConfig.d.ts +46 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/runtimeConfig.native.d.ts +45 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/runtimeConfig.shared.d.ts +19 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/runtimeExtensions.d.ts +17 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/SSOOIDC.d.ts +73 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/SSOOIDCClient.d.ts +142 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/commands/CreateTokenCommand.d.ts +26 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/commands/CreateTokenWithIAMCommand.d.ts +30 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/commands/RegisterClientCommand.d.ts +29 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/commands/StartDeviceAuthorizationCommand.d.ts +30 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/commands/index.d.ts +4 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/credentialDefaultProvider.d.ts +1 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/endpoint/EndpointParameters.d.ts +51 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/endpoint/endpointResolver.d.ts +8 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/endpoint/ruleset.d.ts +2 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/extensionConfiguration.d.ts +7 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/index.d.ts +9 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/models/SSOOIDCServiceException.d.ts +8 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/models/index.d.ts +1 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/models/models_0.d.ts +201 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/protocols/Aws_restJson1.d.ts +53 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/runtimeConfig.browser.d.ts +97 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/runtimeConfig.d.ts +95 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/runtimeConfig.native.d.ts +88 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/runtimeConfig.shared.d.ts +19 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/runtimeExtensions.d.ts +11 -0
- package/node_modules/@aws-sdk/client-sso-oidc/package.json +103 -0
- package/node_modules/@aws-sdk/client-sts/dist-cjs/commands/AssumeRoleCommand.js +1 -29
- package/node_modules/@aws-sdk/client-sts/dist-cjs/commands/AssumeRoleWithWebIdentityCommand.js +1 -29
- package/node_modules/@aws-sdk/client-sts/dist-cjs/credentialDefaultProvider.js +29 -0
- package/node_modules/@aws-sdk/client-sts/dist-cjs/defaultStsRoleAssumers.js +1 -78
- package/node_modules/@aws-sdk/client-sts/dist-cjs/index.js +1423 -85
- package/node_modules/@aws-sdk/client-sts/dist-cjs/models/STSServiceException.js +1 -12
- package/node_modules/@aws-sdk/client-sts/dist-cjs/models/models_0.js +1 -149
- package/node_modules/@aws-sdk/client-sts/dist-cjs/protocols/Aws_query.js +1 -1084
- package/node_modules/@aws-sdk/client-sts/dist-cjs/runtimeConfig.js +3 -4
- package/node_modules/@aws-sdk/client-sts/dist-es/credentialDefaultProvider.js +3 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/runtimeConfig.js +3 -4
- package/node_modules/@aws-sdk/client-sts/dist-types/credentialDefaultProvider.d.ts +4 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/defaultRoleAssumers.d.ts +3 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/runtimeConfig.d.ts +8 -3
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/credentialDefaultProvider.d.ts +1 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/runtimeConfig.d.ts +26 -14
- package/node_modules/@aws-sdk/client-sts/package.json +14 -12
- package/node_modules/@aws-sdk/credential-provider-env/dist-cjs/index.js +5 -3
- package/node_modules/@aws-sdk/credential-provider-env/dist-es/fromEnv.js +2 -1
- package/node_modules/@aws-sdk/credential-provider-env/dist-types/fromEnv.d.ts +4 -1
- package/node_modules/@aws-sdk/credential-provider-env/dist-types/ts3.4/fromEnv.d.ts +5 -1
- package/node_modules/@aws-sdk/credential-provider-env/package.json +2 -2
- package/node_modules/@aws-sdk/credential-provider-ini/dist-cjs/index.js +69 -38
- package/node_modules/@aws-sdk/credential-provider-ini/dist-cjs/loadSts.js +1 -0
- package/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js +1 -0
- package/node_modules/@aws-sdk/credential-provider-ini/dist-es/loadSts.js +2 -0
- package/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js +4 -2
- package/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js +4 -6
- package/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js +2 -3
- package/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js +3 -3
- package/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js +8 -3
- package/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveStaticCredentials.js +9 -6
- package/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js +2 -3
- package/node_modules/@aws-sdk/credential-provider-ini/dist-types/fromIni.d.ts +8 -4
- package/node_modules/@aws-sdk/credential-provider-ini/dist-types/loadSts.d.ts +3 -0
- package/node_modules/@aws-sdk/credential-provider-ini/dist-types/resolveAssumeRoleCredentials.d.ts +2 -2
- package/node_modules/@aws-sdk/credential-provider-ini/dist-types/resolveCredentialSource.d.ts +2 -1
- package/node_modules/@aws-sdk/credential-provider-ini/dist-types/resolveProcessCredentials.d.ts +1 -2
- package/node_modules/@aws-sdk/credential-provider-ini/dist-types/resolveProfileData.d.ts +1 -1
- package/node_modules/@aws-sdk/credential-provider-ini/dist-types/resolveSsoCredentials.d.ts +5 -3
- package/node_modules/@aws-sdk/credential-provider-ini/dist-types/resolveStaticCredentials.d.ts +2 -1
- package/node_modules/@aws-sdk/credential-provider-ini/dist-types/ts3.4/fromIni.d.ts +8 -1
- package/node_modules/@aws-sdk/credential-provider-ini/dist-types/ts3.4/loadSts.d.ts +3 -0
- package/node_modules/@aws-sdk/credential-provider-ini/dist-types/ts3.4/resolveAssumeRoleCredentials.d.ts +2 -2
- package/node_modules/@aws-sdk/credential-provider-ini/dist-types/ts3.4/resolveCredentialSource.d.ts +4 -1
- package/node_modules/@aws-sdk/credential-provider-ini/dist-types/ts3.4/resolveProcessCredentials.d.ts +1 -2
- package/node_modules/@aws-sdk/credential-provider-ini/dist-types/ts3.4/resolveSsoCredentials.d.ts +2 -1
- package/node_modules/@aws-sdk/credential-provider-ini/dist-types/ts3.4/resolveStaticCredentials.d.ts +3 -1
- package/node_modules/@aws-sdk/credential-provider-ini/package.json +7 -6
- package/node_modules/@aws-sdk/credential-provider-node/dist-cjs/index.js +70 -19
- package/node_modules/@aws-sdk/credential-provider-node/dist-es/defaultProvider.js +35 -7
- package/node_modules/@aws-sdk/credential-provider-node/dist-es/remoteProvider.js +4 -2
- package/node_modules/@aws-sdk/credential-provider-node/dist-types/defaultProvider.d.ts +33 -18
- package/node_modules/@aws-sdk/credential-provider-node/dist-types/remoteProvider.d.ts +6 -3
- package/node_modules/@aws-sdk/credential-provider-node/dist-types/ts3.4/defaultProvider.d.ts +11 -2
- package/node_modules/@aws-sdk/credential-provider-node/dist-types/ts3.4/remoteProvider.d.ts +1 -1
- package/node_modules/@aws-sdk/credential-provider-node/package.json +7 -7
- package/node_modules/@aws-sdk/credential-provider-process/dist-cjs/index.js +2 -0
- package/node_modules/@aws-sdk/credential-provider-process/dist-es/fromProcess.js +1 -0
- package/node_modules/@aws-sdk/credential-provider-process/dist-types/fromProcess.d.ts +2 -1
- package/node_modules/@aws-sdk/credential-provider-process/dist-types/ts3.4/fromProcess.d.ts +4 -1
- package/node_modules/@aws-sdk/credential-provider-process/package.json +2 -2
- package/node_modules/@aws-sdk/credential-provider-sso/dist-cjs/index.js +28 -7
- package/node_modules/@aws-sdk/credential-provider-sso/dist-cjs/loadSso.js +1 -0
- package/node_modules/@aws-sdk/credential-provider-sso/dist-es/fromSSO.js +7 -1
- package/node_modules/@aws-sdk/credential-provider-sso/dist-es/loadSso.js +2 -0
- package/node_modules/@aws-sdk/credential-provider-sso/dist-es/resolveSSOCredentials.js +2 -3
- package/node_modules/@aws-sdk/credential-provider-sso/dist-types/fromSSO.d.ts +4 -2
- package/node_modules/@aws-sdk/credential-provider-sso/dist-types/loadSso.d.ts +3 -0
- package/node_modules/@aws-sdk/credential-provider-sso/dist-types/ts3.4/fromSSO.d.ts +6 -2
- package/node_modules/@aws-sdk/credential-provider-sso/dist-types/ts3.4/loadSso.d.ts +6 -0
- package/node_modules/@aws-sdk/credential-provider-sso/package.json +4 -4
- package/node_modules/@aws-sdk/credential-provider-web-identity/dist-cjs/fromTokenFile.js +5 -4
- package/node_modules/@aws-sdk/credential-provider-web-identity/dist-cjs/fromWebToken.js +7 -5
- package/node_modules/@aws-sdk/credential-provider-web-identity/dist-cjs/loadSts.js +5 -0
- package/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromTokenFile.js +1 -0
- package/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromWebToken.js +6 -5
- package/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/loadSts.js +2 -0
- package/node_modules/@aws-sdk/credential-provider-web-identity/dist-types/fromTokenFile.d.ts +4 -3
- package/node_modules/@aws-sdk/credential-provider-web-identity/dist-types/fromWebToken.d.ts +14 -4
- package/node_modules/@aws-sdk/credential-provider-web-identity/dist-types/loadSts.d.ts +3 -0
- package/node_modules/@aws-sdk/credential-provider-web-identity/dist-types/ts3.4/fromTokenFile.d.ts +7 -2
- package/node_modules/@aws-sdk/credential-provider-web-identity/dist-types/ts3.4/fromWebToken.d.ts +12 -6
- package/node_modules/@aws-sdk/credential-provider-web-identity/dist-types/ts3.4/loadSts.d.ts +3 -0
- package/node_modules/@aws-sdk/credential-provider-web-identity/package.json +3 -2
- package/node_modules/@aws-sdk/middleware-host-header/dist-cjs/index.js +2 -2
- package/node_modules/@aws-sdk/middleware-host-header/package.json +2 -2
- package/node_modules/@aws-sdk/middleware-logger/dist-cjs/index.js +2 -2
- package/node_modules/@aws-sdk/middleware-logger/package.json +2 -2
- package/node_modules/@aws-sdk/middleware-recursion-detection/dist-cjs/index.js +2 -2
- package/node_modules/@aws-sdk/middleware-recursion-detection/package.json +2 -2
- package/node_modules/@aws-sdk/middleware-signing/dist-cjs/index.js +3 -3
- package/node_modules/@aws-sdk/middleware-signing/package.json +2 -2
- package/node_modules/@aws-sdk/middleware-user-agent/dist-cjs/index.js +3 -3
- package/node_modules/@aws-sdk/middleware-user-agent/package.json +3 -3
- package/node_modules/@aws-sdk/region-config-resolver/dist-cjs/index.js +4 -4
- package/node_modules/@aws-sdk/region-config-resolver/package.json +2 -2
- package/node_modules/@aws-sdk/token-providers/dist-cjs/index.js +28 -25
- package/node_modules/@aws-sdk/token-providers/dist-cjs/loadSsoOidc.js +1 -0
- package/node_modules/@aws-sdk/token-providers/dist-es/fromSso.js +1 -0
- package/node_modules/@aws-sdk/token-providers/dist-es/fromStatic.js +2 -1
- package/node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js +3 -3
- package/node_modules/@aws-sdk/token-providers/dist-es/getSsoOidcClient.js +2 -2
- package/node_modules/@aws-sdk/token-providers/dist-es/index.js +0 -1
- package/node_modules/@aws-sdk/token-providers/dist-es/loadSsoOidc.js +2 -0
- package/node_modules/@aws-sdk/token-providers/dist-types/fromSso.d.ts +2 -2
- package/node_modules/@aws-sdk/token-providers/dist-types/fromStatic.d.ts +3 -3
- package/node_modules/@aws-sdk/token-providers/dist-types/getNewSsoOidcToken.d.ts +2 -1
- package/node_modules/@aws-sdk/token-providers/dist-types/getSsoOidcClient.d.ts +2 -1
- package/node_modules/@aws-sdk/token-providers/dist-types/index.d.ts +0 -1
- package/node_modules/@aws-sdk/token-providers/dist-types/loadSsoOidc.d.ts +2 -0
- package/node_modules/@aws-sdk/token-providers/dist-types/ts3.4/fromSso.d.ts +7 -2
- package/node_modules/@aws-sdk/token-providers/dist-types/ts3.4/fromStatic.d.ts +7 -2
- package/node_modules/@aws-sdk/token-providers/dist-types/ts3.4/getNewSsoOidcToken.d.ts +1 -1
- package/node_modules/@aws-sdk/token-providers/dist-types/ts3.4/getSsoOidcClient.d.ts +1 -1
- package/node_modules/@aws-sdk/token-providers/dist-types/ts3.4/index.d.ts +0 -1
- package/node_modules/@aws-sdk/token-providers/dist-types/ts3.4/loadSsoOidc.d.ts +2 -0
- package/node_modules/@aws-sdk/token-providers/package.json +6 -43
- package/node_modules/@aws-sdk/types/dist-cjs/index.js +3 -171
- package/node_modules/@aws-sdk/types/dist-types/credentials.d.ts +15 -0
- package/node_modules/@aws-sdk/types/dist-types/ts3.4/credentials.d.ts +4 -0
- package/node_modules/@aws-sdk/types/package.json +1 -1
- package/node_modules/@aws-sdk/util-endpoints/dist-cjs/index.js +4 -24
- package/node_modules/@aws-sdk/util-endpoints/package.json +2 -2
- package/node_modules/@aws-sdk/util-user-agent-browser/package.json +2 -2
- package/node_modules/@aws-sdk/util-user-agent-node/dist-cjs/index.js +1 -1
- package/node_modules/@aws-sdk/util-user-agent-node/package.json +2 -2
- package/package.json +5 -5
- package/node_modules/@aws-sdk/token-providers/dist-cjs/bundle/client-sso-oidc-browser.js +0 -1032
- package/node_modules/@aws-sdk/token-providers/dist-cjs/bundle/client-sso-oidc-node.js +0 -1038
- package/node_modules/@aws-sdk/token-providers/dist-es/bundle/client-sso-oidc-browser.js +0 -1010
- package/node_modules/@aws-sdk/token-providers/dist-es/bundle/client-sso-oidc-node.js +0 -1017
- package/node_modules/@aws-sdk/token-providers/dist-types/bundle/client-sso-oidc-browser.d.ts +0 -191
- package/node_modules/@aws-sdk/token-providers/dist-types/bundle/client-sso-oidc-node.d.ts +0 -191
- package/node_modules/@aws-sdk/token-providers/dist-types/ts3.4/bundle/client-sso-oidc-browser.d.ts +0 -235
- package/node_modules/@aws-sdk/token-providers/dist-types/ts3.4/bundle/client-sso-oidc-node.d.ts +0 -235
@@ -22,65 +22,1369 @@ var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: tru
|
|
22
22
|
// src/index.ts
|
23
23
|
var src_exports = {};
|
24
24
|
__export(src_exports, {
|
25
|
+
AssumeRoleCommand: () => AssumeRoleCommand,
|
26
|
+
AssumeRoleResponseFilterSensitiveLog: () => AssumeRoleResponseFilterSensitiveLog,
|
25
27
|
AssumeRoleWithSAMLCommand: () => AssumeRoleWithSAMLCommand,
|
26
|
-
|
28
|
+
AssumeRoleWithSAMLRequestFilterSensitiveLog: () => AssumeRoleWithSAMLRequestFilterSensitiveLog,
|
29
|
+
AssumeRoleWithSAMLResponseFilterSensitiveLog: () => AssumeRoleWithSAMLResponseFilterSensitiveLog,
|
30
|
+
AssumeRoleWithWebIdentityCommand: () => AssumeRoleWithWebIdentityCommand,
|
31
|
+
AssumeRoleWithWebIdentityRequestFilterSensitiveLog: () => AssumeRoleWithWebIdentityRequestFilterSensitiveLog,
|
32
|
+
AssumeRoleWithWebIdentityResponseFilterSensitiveLog: () => AssumeRoleWithWebIdentityResponseFilterSensitiveLog,
|
33
|
+
ClientInputEndpointParameters: () => import_EndpointParameters9.ClientInputEndpointParameters,
|
34
|
+
CredentialsFilterSensitiveLog: () => CredentialsFilterSensitiveLog,
|
27
35
|
DecodeAuthorizationMessageCommand: () => DecodeAuthorizationMessageCommand,
|
36
|
+
ExpiredTokenException: () => ExpiredTokenException,
|
28
37
|
GetAccessKeyInfoCommand: () => GetAccessKeyInfoCommand,
|
29
38
|
GetCallerIdentityCommand: () => GetCallerIdentityCommand,
|
30
39
|
GetFederationTokenCommand: () => GetFederationTokenCommand,
|
40
|
+
GetFederationTokenResponseFilterSensitiveLog: () => GetFederationTokenResponseFilterSensitiveLog,
|
31
41
|
GetSessionTokenCommand: () => GetSessionTokenCommand,
|
42
|
+
GetSessionTokenResponseFilterSensitiveLog: () => GetSessionTokenResponseFilterSensitiveLog,
|
43
|
+
IDPCommunicationErrorException: () => IDPCommunicationErrorException,
|
44
|
+
IDPRejectedClaimException: () => IDPRejectedClaimException,
|
45
|
+
InvalidAuthorizationMessageException: () => InvalidAuthorizationMessageException,
|
46
|
+
InvalidIdentityTokenException: () => InvalidIdentityTokenException,
|
47
|
+
MalformedPolicyDocumentException: () => MalformedPolicyDocumentException,
|
48
|
+
PackedPolicyTooLargeException: () => PackedPolicyTooLargeException,
|
49
|
+
RegionDisabledException: () => RegionDisabledException,
|
32
50
|
RuntimeExtension: () => import_runtimeExtensions.RuntimeExtension,
|
33
51
|
STS: () => STS,
|
34
|
-
STSServiceException: () =>
|
52
|
+
STSServiceException: () => STSServiceException,
|
35
53
|
decorateDefaultCredentialProvider: () => decorateDefaultCredentialProvider,
|
36
|
-
getDefaultRoleAssumer: () =>
|
37
|
-
getDefaultRoleAssumerWithWebIdentity: () =>
|
54
|
+
getDefaultRoleAssumer: () => getDefaultRoleAssumer2,
|
55
|
+
getDefaultRoleAssumerWithWebIdentity: () => getDefaultRoleAssumerWithWebIdentity2
|
38
56
|
});
|
39
57
|
module.exports = __toCommonJS(src_exports);
|
40
58
|
__reExport(src_exports, require("././STSClient"), module.exports);
|
41
59
|
|
42
60
|
// src/STS.ts
|
43
61
|
|
44
|
-
var import_AssumeRoleCommand = require("./commands/AssumeRoleCommand");
|
45
62
|
|
46
|
-
// src/commands/
|
63
|
+
// src/commands/AssumeRoleCommand.ts
|
47
64
|
var import_middleware_endpoint = require("@smithy/middleware-endpoint");
|
48
65
|
var import_middleware_serde = require("@smithy/middleware-serde");
|
49
|
-
|
66
|
+
|
50
67
|
var import_types = require("@smithy/types");
|
51
68
|
var import_EndpointParameters = require("./endpoint/EndpointParameters");
|
52
|
-
|
53
|
-
|
54
|
-
|
69
|
+
|
70
|
+
// src/models/models_0.ts
|
71
|
+
|
72
|
+
|
73
|
+
// src/models/STSServiceException.ts
|
74
|
+
var import_smithy_client = require("@smithy/smithy-client");
|
75
|
+
var _STSServiceException = class _STSServiceException extends import_smithy_client.ServiceException {
|
76
|
+
/**
|
77
|
+
* @internal
|
78
|
+
*/
|
79
|
+
constructor(options) {
|
80
|
+
super(options);
|
81
|
+
Object.setPrototypeOf(this, _STSServiceException.prototype);
|
82
|
+
}
|
83
|
+
};
|
84
|
+
__name(_STSServiceException, "STSServiceException");
|
85
|
+
var STSServiceException = _STSServiceException;
|
86
|
+
|
87
|
+
// src/models/models_0.ts
|
88
|
+
var _ExpiredTokenException = class _ExpiredTokenException extends STSServiceException {
|
89
|
+
/**
|
90
|
+
* @internal
|
91
|
+
*/
|
92
|
+
constructor(opts) {
|
93
|
+
super({
|
94
|
+
name: "ExpiredTokenException",
|
95
|
+
$fault: "client",
|
96
|
+
...opts
|
97
|
+
});
|
98
|
+
this.name = "ExpiredTokenException";
|
99
|
+
this.$fault = "client";
|
100
|
+
Object.setPrototypeOf(this, _ExpiredTokenException.prototype);
|
101
|
+
}
|
102
|
+
};
|
103
|
+
__name(_ExpiredTokenException, "ExpiredTokenException");
|
104
|
+
var ExpiredTokenException = _ExpiredTokenException;
|
105
|
+
var _MalformedPolicyDocumentException = class _MalformedPolicyDocumentException extends STSServiceException {
|
106
|
+
/**
|
107
|
+
* @internal
|
108
|
+
*/
|
109
|
+
constructor(opts) {
|
110
|
+
super({
|
111
|
+
name: "MalformedPolicyDocumentException",
|
112
|
+
$fault: "client",
|
113
|
+
...opts
|
114
|
+
});
|
115
|
+
this.name = "MalformedPolicyDocumentException";
|
116
|
+
this.$fault = "client";
|
117
|
+
Object.setPrototypeOf(this, _MalformedPolicyDocumentException.prototype);
|
118
|
+
}
|
119
|
+
};
|
120
|
+
__name(_MalformedPolicyDocumentException, "MalformedPolicyDocumentException");
|
121
|
+
var MalformedPolicyDocumentException = _MalformedPolicyDocumentException;
|
122
|
+
var _PackedPolicyTooLargeException = class _PackedPolicyTooLargeException extends STSServiceException {
|
123
|
+
/**
|
124
|
+
* @internal
|
125
|
+
*/
|
126
|
+
constructor(opts) {
|
127
|
+
super({
|
128
|
+
name: "PackedPolicyTooLargeException",
|
129
|
+
$fault: "client",
|
130
|
+
...opts
|
131
|
+
});
|
132
|
+
this.name = "PackedPolicyTooLargeException";
|
133
|
+
this.$fault = "client";
|
134
|
+
Object.setPrototypeOf(this, _PackedPolicyTooLargeException.prototype);
|
135
|
+
}
|
136
|
+
};
|
137
|
+
__name(_PackedPolicyTooLargeException, "PackedPolicyTooLargeException");
|
138
|
+
var PackedPolicyTooLargeException = _PackedPolicyTooLargeException;
|
139
|
+
var _RegionDisabledException = class _RegionDisabledException extends STSServiceException {
|
140
|
+
/**
|
141
|
+
* @internal
|
142
|
+
*/
|
143
|
+
constructor(opts) {
|
144
|
+
super({
|
145
|
+
name: "RegionDisabledException",
|
146
|
+
$fault: "client",
|
147
|
+
...opts
|
148
|
+
});
|
149
|
+
this.name = "RegionDisabledException";
|
150
|
+
this.$fault = "client";
|
151
|
+
Object.setPrototypeOf(this, _RegionDisabledException.prototype);
|
152
|
+
}
|
153
|
+
};
|
154
|
+
__name(_RegionDisabledException, "RegionDisabledException");
|
155
|
+
var RegionDisabledException = _RegionDisabledException;
|
156
|
+
var _IDPRejectedClaimException = class _IDPRejectedClaimException extends STSServiceException {
|
157
|
+
/**
|
158
|
+
* @internal
|
159
|
+
*/
|
160
|
+
constructor(opts) {
|
161
|
+
super({
|
162
|
+
name: "IDPRejectedClaimException",
|
163
|
+
$fault: "client",
|
164
|
+
...opts
|
165
|
+
});
|
166
|
+
this.name = "IDPRejectedClaimException";
|
167
|
+
this.$fault = "client";
|
168
|
+
Object.setPrototypeOf(this, _IDPRejectedClaimException.prototype);
|
169
|
+
}
|
170
|
+
};
|
171
|
+
__name(_IDPRejectedClaimException, "IDPRejectedClaimException");
|
172
|
+
var IDPRejectedClaimException = _IDPRejectedClaimException;
|
173
|
+
var _InvalidIdentityTokenException = class _InvalidIdentityTokenException extends STSServiceException {
|
174
|
+
/**
|
175
|
+
* @internal
|
176
|
+
*/
|
177
|
+
constructor(opts) {
|
178
|
+
super({
|
179
|
+
name: "InvalidIdentityTokenException",
|
180
|
+
$fault: "client",
|
181
|
+
...opts
|
182
|
+
});
|
183
|
+
this.name = "InvalidIdentityTokenException";
|
184
|
+
this.$fault = "client";
|
185
|
+
Object.setPrototypeOf(this, _InvalidIdentityTokenException.prototype);
|
186
|
+
}
|
187
|
+
};
|
188
|
+
__name(_InvalidIdentityTokenException, "InvalidIdentityTokenException");
|
189
|
+
var InvalidIdentityTokenException = _InvalidIdentityTokenException;
|
190
|
+
var _IDPCommunicationErrorException = class _IDPCommunicationErrorException extends STSServiceException {
|
191
|
+
/**
|
192
|
+
* @internal
|
193
|
+
*/
|
194
|
+
constructor(opts) {
|
195
|
+
super({
|
196
|
+
name: "IDPCommunicationErrorException",
|
197
|
+
$fault: "client",
|
198
|
+
...opts
|
199
|
+
});
|
200
|
+
this.name = "IDPCommunicationErrorException";
|
201
|
+
this.$fault = "client";
|
202
|
+
Object.setPrototypeOf(this, _IDPCommunicationErrorException.prototype);
|
203
|
+
}
|
204
|
+
};
|
205
|
+
__name(_IDPCommunicationErrorException, "IDPCommunicationErrorException");
|
206
|
+
var IDPCommunicationErrorException = _IDPCommunicationErrorException;
|
207
|
+
var _InvalidAuthorizationMessageException = class _InvalidAuthorizationMessageException extends STSServiceException {
|
208
|
+
/**
|
209
|
+
* @internal
|
210
|
+
*/
|
211
|
+
constructor(opts) {
|
212
|
+
super({
|
213
|
+
name: "InvalidAuthorizationMessageException",
|
214
|
+
$fault: "client",
|
215
|
+
...opts
|
216
|
+
});
|
217
|
+
this.name = "InvalidAuthorizationMessageException";
|
218
|
+
this.$fault = "client";
|
219
|
+
Object.setPrototypeOf(this, _InvalidAuthorizationMessageException.prototype);
|
220
|
+
}
|
221
|
+
};
|
222
|
+
__name(_InvalidAuthorizationMessageException, "InvalidAuthorizationMessageException");
|
223
|
+
var InvalidAuthorizationMessageException = _InvalidAuthorizationMessageException;
|
224
|
+
var CredentialsFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
225
|
+
...obj,
|
226
|
+
...obj.SecretAccessKey && { SecretAccessKey: import_smithy_client.SENSITIVE_STRING }
|
227
|
+
}), "CredentialsFilterSensitiveLog");
|
228
|
+
var AssumeRoleResponseFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
229
|
+
...obj,
|
230
|
+
...obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }
|
231
|
+
}), "AssumeRoleResponseFilterSensitiveLog");
|
232
|
+
var AssumeRoleWithSAMLRequestFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
233
|
+
...obj,
|
234
|
+
...obj.SAMLAssertion && { SAMLAssertion: import_smithy_client.SENSITIVE_STRING }
|
235
|
+
}), "AssumeRoleWithSAMLRequestFilterSensitiveLog");
|
236
|
+
var AssumeRoleWithSAMLResponseFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
237
|
+
...obj,
|
238
|
+
...obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }
|
239
|
+
}), "AssumeRoleWithSAMLResponseFilterSensitiveLog");
|
240
|
+
var AssumeRoleWithWebIdentityRequestFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
241
|
+
...obj,
|
242
|
+
...obj.WebIdentityToken && { WebIdentityToken: import_smithy_client.SENSITIVE_STRING }
|
243
|
+
}), "AssumeRoleWithWebIdentityRequestFilterSensitiveLog");
|
244
|
+
var AssumeRoleWithWebIdentityResponseFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
245
|
+
...obj,
|
246
|
+
...obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }
|
247
|
+
}), "AssumeRoleWithWebIdentityResponseFilterSensitiveLog");
|
248
|
+
var GetFederationTokenResponseFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
249
|
+
...obj,
|
250
|
+
...obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }
|
251
|
+
}), "GetFederationTokenResponseFilterSensitiveLog");
|
252
|
+
var GetSessionTokenResponseFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
253
|
+
...obj,
|
254
|
+
...obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }
|
255
|
+
}), "GetSessionTokenResponseFilterSensitiveLog");
|
256
|
+
|
257
|
+
// src/protocols/Aws_query.ts
|
258
|
+
var import_protocol_http = require("@smithy/protocol-http");
|
259
|
+
|
260
|
+
var import_fast_xml_parser = require("fast-xml-parser");
|
261
|
+
var se_AssumeRoleCommand = /* @__PURE__ */ __name(async (input, context) => {
|
262
|
+
const headers = SHARED_HEADERS;
|
263
|
+
let body;
|
264
|
+
body = buildFormUrlencodedString({
|
265
|
+
...se_AssumeRoleRequest(input, context),
|
266
|
+
[_A]: _AR,
|
267
|
+
[_V]: _
|
268
|
+
});
|
269
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
270
|
+
}, "se_AssumeRoleCommand");
|
271
|
+
var se_AssumeRoleWithSAMLCommand = /* @__PURE__ */ __name(async (input, context) => {
|
272
|
+
const headers = SHARED_HEADERS;
|
273
|
+
let body;
|
274
|
+
body = buildFormUrlencodedString({
|
275
|
+
...se_AssumeRoleWithSAMLRequest(input, context),
|
276
|
+
[_A]: _ARWSAML,
|
277
|
+
[_V]: _
|
278
|
+
});
|
279
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
280
|
+
}, "se_AssumeRoleWithSAMLCommand");
|
281
|
+
var se_AssumeRoleWithWebIdentityCommand = /* @__PURE__ */ __name(async (input, context) => {
|
282
|
+
const headers = SHARED_HEADERS;
|
283
|
+
let body;
|
284
|
+
body = buildFormUrlencodedString({
|
285
|
+
...se_AssumeRoleWithWebIdentityRequest(input, context),
|
286
|
+
[_A]: _ARWWI,
|
287
|
+
[_V]: _
|
288
|
+
});
|
289
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
290
|
+
}, "se_AssumeRoleWithWebIdentityCommand");
|
291
|
+
var se_DecodeAuthorizationMessageCommand = /* @__PURE__ */ __name(async (input, context) => {
|
292
|
+
const headers = SHARED_HEADERS;
|
293
|
+
let body;
|
294
|
+
body = buildFormUrlencodedString({
|
295
|
+
...se_DecodeAuthorizationMessageRequest(input, context),
|
296
|
+
[_A]: _DAM,
|
297
|
+
[_V]: _
|
298
|
+
});
|
299
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
300
|
+
}, "se_DecodeAuthorizationMessageCommand");
|
301
|
+
var se_GetAccessKeyInfoCommand = /* @__PURE__ */ __name(async (input, context) => {
|
302
|
+
const headers = SHARED_HEADERS;
|
303
|
+
let body;
|
304
|
+
body = buildFormUrlencodedString({
|
305
|
+
...se_GetAccessKeyInfoRequest(input, context),
|
306
|
+
[_A]: _GAKI,
|
307
|
+
[_V]: _
|
308
|
+
});
|
309
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
310
|
+
}, "se_GetAccessKeyInfoCommand");
|
311
|
+
var se_GetCallerIdentityCommand = /* @__PURE__ */ __name(async (input, context) => {
|
312
|
+
const headers = SHARED_HEADERS;
|
313
|
+
let body;
|
314
|
+
body = buildFormUrlencodedString({
|
315
|
+
...se_GetCallerIdentityRequest(input, context),
|
316
|
+
[_A]: _GCI,
|
317
|
+
[_V]: _
|
318
|
+
});
|
319
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
320
|
+
}, "se_GetCallerIdentityCommand");
|
321
|
+
var se_GetFederationTokenCommand = /* @__PURE__ */ __name(async (input, context) => {
|
322
|
+
const headers = SHARED_HEADERS;
|
323
|
+
let body;
|
324
|
+
body = buildFormUrlencodedString({
|
325
|
+
...se_GetFederationTokenRequest(input, context),
|
326
|
+
[_A]: _GFT,
|
327
|
+
[_V]: _
|
328
|
+
});
|
329
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
330
|
+
}, "se_GetFederationTokenCommand");
|
331
|
+
var se_GetSessionTokenCommand = /* @__PURE__ */ __name(async (input, context) => {
|
332
|
+
const headers = SHARED_HEADERS;
|
333
|
+
let body;
|
334
|
+
body = buildFormUrlencodedString({
|
335
|
+
...se_GetSessionTokenRequest(input, context),
|
336
|
+
[_A]: _GST,
|
337
|
+
[_V]: _
|
338
|
+
});
|
339
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
340
|
+
}, "se_GetSessionTokenCommand");
|
341
|
+
var de_AssumeRoleCommand = /* @__PURE__ */ __name(async (output, context) => {
|
342
|
+
if (output.statusCode >= 300) {
|
343
|
+
return de_AssumeRoleCommandError(output, context);
|
344
|
+
}
|
345
|
+
const data = await parseBody(output.body, context);
|
346
|
+
let contents = {};
|
347
|
+
contents = de_AssumeRoleResponse(data.AssumeRoleResult, context);
|
348
|
+
const response = {
|
349
|
+
$metadata: deserializeMetadata(output),
|
350
|
+
...contents
|
351
|
+
};
|
352
|
+
return response;
|
353
|
+
}, "de_AssumeRoleCommand");
|
354
|
+
var de_AssumeRoleCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
355
|
+
const parsedOutput = {
|
356
|
+
...output,
|
357
|
+
body: await parseErrorBody(output.body, context)
|
358
|
+
};
|
359
|
+
const errorCode = loadQueryErrorCode(output, parsedOutput.body);
|
360
|
+
switch (errorCode) {
|
361
|
+
case "ExpiredTokenException":
|
362
|
+
case "com.amazonaws.sts#ExpiredTokenException":
|
363
|
+
throw await de_ExpiredTokenExceptionRes(parsedOutput, context);
|
364
|
+
case "MalformedPolicyDocument":
|
365
|
+
case "com.amazonaws.sts#MalformedPolicyDocumentException":
|
366
|
+
throw await de_MalformedPolicyDocumentExceptionRes(parsedOutput, context);
|
367
|
+
case "PackedPolicyTooLarge":
|
368
|
+
case "com.amazonaws.sts#PackedPolicyTooLargeException":
|
369
|
+
throw await de_PackedPolicyTooLargeExceptionRes(parsedOutput, context);
|
370
|
+
case "RegionDisabledException":
|
371
|
+
case "com.amazonaws.sts#RegionDisabledException":
|
372
|
+
throw await de_RegionDisabledExceptionRes(parsedOutput, context);
|
373
|
+
default:
|
374
|
+
const parsedBody = parsedOutput.body;
|
375
|
+
return throwDefaultError({
|
376
|
+
output,
|
377
|
+
parsedBody: parsedBody.Error,
|
378
|
+
errorCode
|
379
|
+
});
|
380
|
+
}
|
381
|
+
}, "de_AssumeRoleCommandError");
|
382
|
+
var de_AssumeRoleWithSAMLCommand = /* @__PURE__ */ __name(async (output, context) => {
|
383
|
+
if (output.statusCode >= 300) {
|
384
|
+
return de_AssumeRoleWithSAMLCommandError(output, context);
|
385
|
+
}
|
386
|
+
const data = await parseBody(output.body, context);
|
387
|
+
let contents = {};
|
388
|
+
contents = de_AssumeRoleWithSAMLResponse(data.AssumeRoleWithSAMLResult, context);
|
389
|
+
const response = {
|
390
|
+
$metadata: deserializeMetadata(output),
|
391
|
+
...contents
|
392
|
+
};
|
393
|
+
return response;
|
394
|
+
}, "de_AssumeRoleWithSAMLCommand");
|
395
|
+
var de_AssumeRoleWithSAMLCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
396
|
+
const parsedOutput = {
|
397
|
+
...output,
|
398
|
+
body: await parseErrorBody(output.body, context)
|
399
|
+
};
|
400
|
+
const errorCode = loadQueryErrorCode(output, parsedOutput.body);
|
401
|
+
switch (errorCode) {
|
402
|
+
case "ExpiredTokenException":
|
403
|
+
case "com.amazonaws.sts#ExpiredTokenException":
|
404
|
+
throw await de_ExpiredTokenExceptionRes(parsedOutput, context);
|
405
|
+
case "IDPRejectedClaim":
|
406
|
+
case "com.amazonaws.sts#IDPRejectedClaimException":
|
407
|
+
throw await de_IDPRejectedClaimExceptionRes(parsedOutput, context);
|
408
|
+
case "InvalidIdentityToken":
|
409
|
+
case "com.amazonaws.sts#InvalidIdentityTokenException":
|
410
|
+
throw await de_InvalidIdentityTokenExceptionRes(parsedOutput, context);
|
411
|
+
case "MalformedPolicyDocument":
|
412
|
+
case "com.amazonaws.sts#MalformedPolicyDocumentException":
|
413
|
+
throw await de_MalformedPolicyDocumentExceptionRes(parsedOutput, context);
|
414
|
+
case "PackedPolicyTooLarge":
|
415
|
+
case "com.amazonaws.sts#PackedPolicyTooLargeException":
|
416
|
+
throw await de_PackedPolicyTooLargeExceptionRes(parsedOutput, context);
|
417
|
+
case "RegionDisabledException":
|
418
|
+
case "com.amazonaws.sts#RegionDisabledException":
|
419
|
+
throw await de_RegionDisabledExceptionRes(parsedOutput, context);
|
420
|
+
default:
|
421
|
+
const parsedBody = parsedOutput.body;
|
422
|
+
return throwDefaultError({
|
423
|
+
output,
|
424
|
+
parsedBody: parsedBody.Error,
|
425
|
+
errorCode
|
426
|
+
});
|
427
|
+
}
|
428
|
+
}, "de_AssumeRoleWithSAMLCommandError");
|
429
|
+
var de_AssumeRoleWithWebIdentityCommand = /* @__PURE__ */ __name(async (output, context) => {
|
430
|
+
if (output.statusCode >= 300) {
|
431
|
+
return de_AssumeRoleWithWebIdentityCommandError(output, context);
|
432
|
+
}
|
433
|
+
const data = await parseBody(output.body, context);
|
434
|
+
let contents = {};
|
435
|
+
contents = de_AssumeRoleWithWebIdentityResponse(data.AssumeRoleWithWebIdentityResult, context);
|
436
|
+
const response = {
|
437
|
+
$metadata: deserializeMetadata(output),
|
438
|
+
...contents
|
439
|
+
};
|
440
|
+
return response;
|
441
|
+
}, "de_AssumeRoleWithWebIdentityCommand");
|
442
|
+
var de_AssumeRoleWithWebIdentityCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
443
|
+
const parsedOutput = {
|
444
|
+
...output,
|
445
|
+
body: await parseErrorBody(output.body, context)
|
446
|
+
};
|
447
|
+
const errorCode = loadQueryErrorCode(output, parsedOutput.body);
|
448
|
+
switch (errorCode) {
|
449
|
+
case "ExpiredTokenException":
|
450
|
+
case "com.amazonaws.sts#ExpiredTokenException":
|
451
|
+
throw await de_ExpiredTokenExceptionRes(parsedOutput, context);
|
452
|
+
case "IDPCommunicationError":
|
453
|
+
case "com.amazonaws.sts#IDPCommunicationErrorException":
|
454
|
+
throw await de_IDPCommunicationErrorExceptionRes(parsedOutput, context);
|
455
|
+
case "IDPRejectedClaim":
|
456
|
+
case "com.amazonaws.sts#IDPRejectedClaimException":
|
457
|
+
throw await de_IDPRejectedClaimExceptionRes(parsedOutput, context);
|
458
|
+
case "InvalidIdentityToken":
|
459
|
+
case "com.amazonaws.sts#InvalidIdentityTokenException":
|
460
|
+
throw await de_InvalidIdentityTokenExceptionRes(parsedOutput, context);
|
461
|
+
case "MalformedPolicyDocument":
|
462
|
+
case "com.amazonaws.sts#MalformedPolicyDocumentException":
|
463
|
+
throw await de_MalformedPolicyDocumentExceptionRes(parsedOutput, context);
|
464
|
+
case "PackedPolicyTooLarge":
|
465
|
+
case "com.amazonaws.sts#PackedPolicyTooLargeException":
|
466
|
+
throw await de_PackedPolicyTooLargeExceptionRes(parsedOutput, context);
|
467
|
+
case "RegionDisabledException":
|
468
|
+
case "com.amazonaws.sts#RegionDisabledException":
|
469
|
+
throw await de_RegionDisabledExceptionRes(parsedOutput, context);
|
470
|
+
default:
|
471
|
+
const parsedBody = parsedOutput.body;
|
472
|
+
return throwDefaultError({
|
473
|
+
output,
|
474
|
+
parsedBody: parsedBody.Error,
|
475
|
+
errorCode
|
476
|
+
});
|
477
|
+
}
|
478
|
+
}, "de_AssumeRoleWithWebIdentityCommandError");
|
479
|
+
var de_DecodeAuthorizationMessageCommand = /* @__PURE__ */ __name(async (output, context) => {
|
480
|
+
if (output.statusCode >= 300) {
|
481
|
+
return de_DecodeAuthorizationMessageCommandError(output, context);
|
482
|
+
}
|
483
|
+
const data = await parseBody(output.body, context);
|
484
|
+
let contents = {};
|
485
|
+
contents = de_DecodeAuthorizationMessageResponse(data.DecodeAuthorizationMessageResult, context);
|
486
|
+
const response = {
|
487
|
+
$metadata: deserializeMetadata(output),
|
488
|
+
...contents
|
489
|
+
};
|
490
|
+
return response;
|
491
|
+
}, "de_DecodeAuthorizationMessageCommand");
|
492
|
+
var de_DecodeAuthorizationMessageCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
493
|
+
const parsedOutput = {
|
494
|
+
...output,
|
495
|
+
body: await parseErrorBody(output.body, context)
|
496
|
+
};
|
497
|
+
const errorCode = loadQueryErrorCode(output, parsedOutput.body);
|
498
|
+
switch (errorCode) {
|
499
|
+
case "InvalidAuthorizationMessageException":
|
500
|
+
case "com.amazonaws.sts#InvalidAuthorizationMessageException":
|
501
|
+
throw await de_InvalidAuthorizationMessageExceptionRes(parsedOutput, context);
|
502
|
+
default:
|
503
|
+
const parsedBody = parsedOutput.body;
|
504
|
+
return throwDefaultError({
|
505
|
+
output,
|
506
|
+
parsedBody: parsedBody.Error,
|
507
|
+
errorCode
|
508
|
+
});
|
509
|
+
}
|
510
|
+
}, "de_DecodeAuthorizationMessageCommandError");
|
511
|
+
var de_GetAccessKeyInfoCommand = /* @__PURE__ */ __name(async (output, context) => {
|
512
|
+
if (output.statusCode >= 300) {
|
513
|
+
return de_GetAccessKeyInfoCommandError(output, context);
|
514
|
+
}
|
515
|
+
const data = await parseBody(output.body, context);
|
516
|
+
let contents = {};
|
517
|
+
contents = de_GetAccessKeyInfoResponse(data.GetAccessKeyInfoResult, context);
|
518
|
+
const response = {
|
519
|
+
$metadata: deserializeMetadata(output),
|
520
|
+
...contents
|
521
|
+
};
|
522
|
+
return response;
|
523
|
+
}, "de_GetAccessKeyInfoCommand");
|
524
|
+
var de_GetAccessKeyInfoCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
525
|
+
const parsedOutput = {
|
526
|
+
...output,
|
527
|
+
body: await parseErrorBody(output.body, context)
|
528
|
+
};
|
529
|
+
const errorCode = loadQueryErrorCode(output, parsedOutput.body);
|
530
|
+
const parsedBody = parsedOutput.body;
|
531
|
+
return throwDefaultError({
|
532
|
+
output,
|
533
|
+
parsedBody: parsedBody.Error,
|
534
|
+
errorCode
|
535
|
+
});
|
536
|
+
}, "de_GetAccessKeyInfoCommandError");
|
537
|
+
var de_GetCallerIdentityCommand = /* @__PURE__ */ __name(async (output, context) => {
|
538
|
+
if (output.statusCode >= 300) {
|
539
|
+
return de_GetCallerIdentityCommandError(output, context);
|
540
|
+
}
|
541
|
+
const data = await parseBody(output.body, context);
|
542
|
+
let contents = {};
|
543
|
+
contents = de_GetCallerIdentityResponse(data.GetCallerIdentityResult, context);
|
544
|
+
const response = {
|
545
|
+
$metadata: deserializeMetadata(output),
|
546
|
+
...contents
|
547
|
+
};
|
548
|
+
return response;
|
549
|
+
}, "de_GetCallerIdentityCommand");
|
550
|
+
var de_GetCallerIdentityCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
551
|
+
const parsedOutput = {
|
552
|
+
...output,
|
553
|
+
body: await parseErrorBody(output.body, context)
|
554
|
+
};
|
555
|
+
const errorCode = loadQueryErrorCode(output, parsedOutput.body);
|
556
|
+
const parsedBody = parsedOutput.body;
|
557
|
+
return throwDefaultError({
|
558
|
+
output,
|
559
|
+
parsedBody: parsedBody.Error,
|
560
|
+
errorCode
|
561
|
+
});
|
562
|
+
}, "de_GetCallerIdentityCommandError");
|
563
|
+
var de_GetFederationTokenCommand = /* @__PURE__ */ __name(async (output, context) => {
|
564
|
+
if (output.statusCode >= 300) {
|
565
|
+
return de_GetFederationTokenCommandError(output, context);
|
566
|
+
}
|
567
|
+
const data = await parseBody(output.body, context);
|
568
|
+
let contents = {};
|
569
|
+
contents = de_GetFederationTokenResponse(data.GetFederationTokenResult, context);
|
570
|
+
const response = {
|
571
|
+
$metadata: deserializeMetadata(output),
|
572
|
+
...contents
|
573
|
+
};
|
574
|
+
return response;
|
575
|
+
}, "de_GetFederationTokenCommand");
|
576
|
+
var de_GetFederationTokenCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
577
|
+
const parsedOutput = {
|
578
|
+
...output,
|
579
|
+
body: await parseErrorBody(output.body, context)
|
580
|
+
};
|
581
|
+
const errorCode = loadQueryErrorCode(output, parsedOutput.body);
|
582
|
+
switch (errorCode) {
|
583
|
+
case "MalformedPolicyDocument":
|
584
|
+
case "com.amazonaws.sts#MalformedPolicyDocumentException":
|
585
|
+
throw await de_MalformedPolicyDocumentExceptionRes(parsedOutput, context);
|
586
|
+
case "PackedPolicyTooLarge":
|
587
|
+
case "com.amazonaws.sts#PackedPolicyTooLargeException":
|
588
|
+
throw await de_PackedPolicyTooLargeExceptionRes(parsedOutput, context);
|
589
|
+
case "RegionDisabledException":
|
590
|
+
case "com.amazonaws.sts#RegionDisabledException":
|
591
|
+
throw await de_RegionDisabledExceptionRes(parsedOutput, context);
|
592
|
+
default:
|
593
|
+
const parsedBody = parsedOutput.body;
|
594
|
+
return throwDefaultError({
|
595
|
+
output,
|
596
|
+
parsedBody: parsedBody.Error,
|
597
|
+
errorCode
|
598
|
+
});
|
599
|
+
}
|
600
|
+
}, "de_GetFederationTokenCommandError");
|
601
|
+
var de_GetSessionTokenCommand = /* @__PURE__ */ __name(async (output, context) => {
|
602
|
+
if (output.statusCode >= 300) {
|
603
|
+
return de_GetSessionTokenCommandError(output, context);
|
604
|
+
}
|
605
|
+
const data = await parseBody(output.body, context);
|
606
|
+
let contents = {};
|
607
|
+
contents = de_GetSessionTokenResponse(data.GetSessionTokenResult, context);
|
608
|
+
const response = {
|
609
|
+
$metadata: deserializeMetadata(output),
|
610
|
+
...contents
|
611
|
+
};
|
612
|
+
return response;
|
613
|
+
}, "de_GetSessionTokenCommand");
|
614
|
+
var de_GetSessionTokenCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
615
|
+
const parsedOutput = {
|
616
|
+
...output,
|
617
|
+
body: await parseErrorBody(output.body, context)
|
618
|
+
};
|
619
|
+
const errorCode = loadQueryErrorCode(output, parsedOutput.body);
|
620
|
+
switch (errorCode) {
|
621
|
+
case "RegionDisabledException":
|
622
|
+
case "com.amazonaws.sts#RegionDisabledException":
|
623
|
+
throw await de_RegionDisabledExceptionRes(parsedOutput, context);
|
624
|
+
default:
|
625
|
+
const parsedBody = parsedOutput.body;
|
626
|
+
return throwDefaultError({
|
627
|
+
output,
|
628
|
+
parsedBody: parsedBody.Error,
|
629
|
+
errorCode
|
630
|
+
});
|
631
|
+
}
|
632
|
+
}, "de_GetSessionTokenCommandError");
|
633
|
+
var de_ExpiredTokenExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
634
|
+
const body = parsedOutput.body;
|
635
|
+
const deserialized = de_ExpiredTokenException(body.Error, context);
|
636
|
+
const exception = new ExpiredTokenException({
|
637
|
+
$metadata: deserializeMetadata(parsedOutput),
|
638
|
+
...deserialized
|
639
|
+
});
|
640
|
+
return (0, import_smithy_client.decorateServiceException)(exception, body);
|
641
|
+
}, "de_ExpiredTokenExceptionRes");
|
642
|
+
var de_IDPCommunicationErrorExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
643
|
+
const body = parsedOutput.body;
|
644
|
+
const deserialized = de_IDPCommunicationErrorException(body.Error, context);
|
645
|
+
const exception = new IDPCommunicationErrorException({
|
646
|
+
$metadata: deserializeMetadata(parsedOutput),
|
647
|
+
...deserialized
|
648
|
+
});
|
649
|
+
return (0, import_smithy_client.decorateServiceException)(exception, body);
|
650
|
+
}, "de_IDPCommunicationErrorExceptionRes");
|
651
|
+
var de_IDPRejectedClaimExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
652
|
+
const body = parsedOutput.body;
|
653
|
+
const deserialized = de_IDPRejectedClaimException(body.Error, context);
|
654
|
+
const exception = new IDPRejectedClaimException({
|
655
|
+
$metadata: deserializeMetadata(parsedOutput),
|
656
|
+
...deserialized
|
657
|
+
});
|
658
|
+
return (0, import_smithy_client.decorateServiceException)(exception, body);
|
659
|
+
}, "de_IDPRejectedClaimExceptionRes");
|
660
|
+
var de_InvalidAuthorizationMessageExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
661
|
+
const body = parsedOutput.body;
|
662
|
+
const deserialized = de_InvalidAuthorizationMessageException(body.Error, context);
|
663
|
+
const exception = new InvalidAuthorizationMessageException({
|
664
|
+
$metadata: deserializeMetadata(parsedOutput),
|
665
|
+
...deserialized
|
666
|
+
});
|
667
|
+
return (0, import_smithy_client.decorateServiceException)(exception, body);
|
668
|
+
}, "de_InvalidAuthorizationMessageExceptionRes");
|
669
|
+
var de_InvalidIdentityTokenExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
670
|
+
const body = parsedOutput.body;
|
671
|
+
const deserialized = de_InvalidIdentityTokenException(body.Error, context);
|
672
|
+
const exception = new InvalidIdentityTokenException({
|
673
|
+
$metadata: deserializeMetadata(parsedOutput),
|
674
|
+
...deserialized
|
675
|
+
});
|
676
|
+
return (0, import_smithy_client.decorateServiceException)(exception, body);
|
677
|
+
}, "de_InvalidIdentityTokenExceptionRes");
|
678
|
+
var de_MalformedPolicyDocumentExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
679
|
+
const body = parsedOutput.body;
|
680
|
+
const deserialized = de_MalformedPolicyDocumentException(body.Error, context);
|
681
|
+
const exception = new MalformedPolicyDocumentException({
|
682
|
+
$metadata: deserializeMetadata(parsedOutput),
|
683
|
+
...deserialized
|
684
|
+
});
|
685
|
+
return (0, import_smithy_client.decorateServiceException)(exception, body);
|
686
|
+
}, "de_MalformedPolicyDocumentExceptionRes");
|
687
|
+
var de_PackedPolicyTooLargeExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
688
|
+
const body = parsedOutput.body;
|
689
|
+
const deserialized = de_PackedPolicyTooLargeException(body.Error, context);
|
690
|
+
const exception = new PackedPolicyTooLargeException({
|
691
|
+
$metadata: deserializeMetadata(parsedOutput),
|
692
|
+
...deserialized
|
693
|
+
});
|
694
|
+
return (0, import_smithy_client.decorateServiceException)(exception, body);
|
695
|
+
}, "de_PackedPolicyTooLargeExceptionRes");
|
696
|
+
var de_RegionDisabledExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
697
|
+
const body = parsedOutput.body;
|
698
|
+
const deserialized = de_RegionDisabledException(body.Error, context);
|
699
|
+
const exception = new RegionDisabledException({
|
700
|
+
$metadata: deserializeMetadata(parsedOutput),
|
701
|
+
...deserialized
|
702
|
+
});
|
703
|
+
return (0, import_smithy_client.decorateServiceException)(exception, body);
|
704
|
+
}, "de_RegionDisabledExceptionRes");
|
705
|
+
var se_AssumeRoleRequest = /* @__PURE__ */ __name((input, context) => {
|
706
|
+
var _a2, _b, _c, _d;
|
707
|
+
const entries = {};
|
708
|
+
if (input[_RA] != null) {
|
709
|
+
entries[_RA] = input[_RA];
|
710
|
+
}
|
711
|
+
if (input[_RSN] != null) {
|
712
|
+
entries[_RSN] = input[_RSN];
|
713
|
+
}
|
714
|
+
if (input[_PA] != null) {
|
715
|
+
const memberEntries = se_policyDescriptorListType(input[_PA], context);
|
716
|
+
if (((_a2 = input[_PA]) == null ? void 0 : _a2.length) === 0) {
|
717
|
+
entries.PolicyArns = [];
|
718
|
+
}
|
719
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
720
|
+
const loc = `PolicyArns.${key}`;
|
721
|
+
entries[loc] = value;
|
722
|
+
});
|
723
|
+
}
|
724
|
+
if (input[_P] != null) {
|
725
|
+
entries[_P] = input[_P];
|
726
|
+
}
|
727
|
+
if (input[_DS] != null) {
|
728
|
+
entries[_DS] = input[_DS];
|
729
|
+
}
|
730
|
+
if (input[_T] != null) {
|
731
|
+
const memberEntries = se_tagListType(input[_T], context);
|
732
|
+
if (((_b = input[_T]) == null ? void 0 : _b.length) === 0) {
|
733
|
+
entries.Tags = [];
|
734
|
+
}
|
735
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
736
|
+
const loc = `Tags.${key}`;
|
737
|
+
entries[loc] = value;
|
738
|
+
});
|
739
|
+
}
|
740
|
+
if (input[_TTK] != null) {
|
741
|
+
const memberEntries = se_tagKeyListType(input[_TTK], context);
|
742
|
+
if (((_c = input[_TTK]) == null ? void 0 : _c.length) === 0) {
|
743
|
+
entries.TransitiveTagKeys = [];
|
744
|
+
}
|
745
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
746
|
+
const loc = `TransitiveTagKeys.${key}`;
|
747
|
+
entries[loc] = value;
|
748
|
+
});
|
749
|
+
}
|
750
|
+
if (input[_EI] != null) {
|
751
|
+
entries[_EI] = input[_EI];
|
752
|
+
}
|
753
|
+
if (input[_SN] != null) {
|
754
|
+
entries[_SN] = input[_SN];
|
755
|
+
}
|
756
|
+
if (input[_TC] != null) {
|
757
|
+
entries[_TC] = input[_TC];
|
758
|
+
}
|
759
|
+
if (input[_SI] != null) {
|
760
|
+
entries[_SI] = input[_SI];
|
761
|
+
}
|
762
|
+
if (input[_PC] != null) {
|
763
|
+
const memberEntries = se_ProvidedContextsListType(input[_PC], context);
|
764
|
+
if (((_d = input[_PC]) == null ? void 0 : _d.length) === 0) {
|
765
|
+
entries.ProvidedContexts = [];
|
766
|
+
}
|
767
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
768
|
+
const loc = `ProvidedContexts.${key}`;
|
769
|
+
entries[loc] = value;
|
770
|
+
});
|
771
|
+
}
|
772
|
+
return entries;
|
773
|
+
}, "se_AssumeRoleRequest");
|
774
|
+
var se_AssumeRoleWithSAMLRequest = /* @__PURE__ */ __name((input, context) => {
|
775
|
+
var _a2;
|
776
|
+
const entries = {};
|
777
|
+
if (input[_RA] != null) {
|
778
|
+
entries[_RA] = input[_RA];
|
779
|
+
}
|
780
|
+
if (input[_PAr] != null) {
|
781
|
+
entries[_PAr] = input[_PAr];
|
782
|
+
}
|
783
|
+
if (input[_SAMLA] != null) {
|
784
|
+
entries[_SAMLA] = input[_SAMLA];
|
785
|
+
}
|
786
|
+
if (input[_PA] != null) {
|
787
|
+
const memberEntries = se_policyDescriptorListType(input[_PA], context);
|
788
|
+
if (((_a2 = input[_PA]) == null ? void 0 : _a2.length) === 0) {
|
789
|
+
entries.PolicyArns = [];
|
790
|
+
}
|
791
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
792
|
+
const loc = `PolicyArns.${key}`;
|
793
|
+
entries[loc] = value;
|
794
|
+
});
|
795
|
+
}
|
796
|
+
if (input[_P] != null) {
|
797
|
+
entries[_P] = input[_P];
|
798
|
+
}
|
799
|
+
if (input[_DS] != null) {
|
800
|
+
entries[_DS] = input[_DS];
|
801
|
+
}
|
802
|
+
return entries;
|
803
|
+
}, "se_AssumeRoleWithSAMLRequest");
|
804
|
+
var se_AssumeRoleWithWebIdentityRequest = /* @__PURE__ */ __name((input, context) => {
|
805
|
+
var _a2;
|
806
|
+
const entries = {};
|
807
|
+
if (input[_RA] != null) {
|
808
|
+
entries[_RA] = input[_RA];
|
809
|
+
}
|
810
|
+
if (input[_RSN] != null) {
|
811
|
+
entries[_RSN] = input[_RSN];
|
812
|
+
}
|
813
|
+
if (input[_WIT] != null) {
|
814
|
+
entries[_WIT] = input[_WIT];
|
815
|
+
}
|
816
|
+
if (input[_PI] != null) {
|
817
|
+
entries[_PI] = input[_PI];
|
818
|
+
}
|
819
|
+
if (input[_PA] != null) {
|
820
|
+
const memberEntries = se_policyDescriptorListType(input[_PA], context);
|
821
|
+
if (((_a2 = input[_PA]) == null ? void 0 : _a2.length) === 0) {
|
822
|
+
entries.PolicyArns = [];
|
823
|
+
}
|
824
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
825
|
+
const loc = `PolicyArns.${key}`;
|
826
|
+
entries[loc] = value;
|
827
|
+
});
|
828
|
+
}
|
829
|
+
if (input[_P] != null) {
|
830
|
+
entries[_P] = input[_P];
|
831
|
+
}
|
832
|
+
if (input[_DS] != null) {
|
833
|
+
entries[_DS] = input[_DS];
|
834
|
+
}
|
835
|
+
return entries;
|
836
|
+
}, "se_AssumeRoleWithWebIdentityRequest");
|
837
|
+
var se_DecodeAuthorizationMessageRequest = /* @__PURE__ */ __name((input, context) => {
|
838
|
+
const entries = {};
|
839
|
+
if (input[_EM] != null) {
|
840
|
+
entries[_EM] = input[_EM];
|
841
|
+
}
|
842
|
+
return entries;
|
843
|
+
}, "se_DecodeAuthorizationMessageRequest");
|
844
|
+
var se_GetAccessKeyInfoRequest = /* @__PURE__ */ __name((input, context) => {
|
845
|
+
const entries = {};
|
846
|
+
if (input[_AKI] != null) {
|
847
|
+
entries[_AKI] = input[_AKI];
|
848
|
+
}
|
849
|
+
return entries;
|
850
|
+
}, "se_GetAccessKeyInfoRequest");
|
851
|
+
var se_GetCallerIdentityRequest = /* @__PURE__ */ __name((input, context) => {
|
852
|
+
const entries = {};
|
853
|
+
return entries;
|
854
|
+
}, "se_GetCallerIdentityRequest");
|
855
|
+
var se_GetFederationTokenRequest = /* @__PURE__ */ __name((input, context) => {
|
856
|
+
var _a2, _b;
|
857
|
+
const entries = {};
|
858
|
+
if (input[_N] != null) {
|
859
|
+
entries[_N] = input[_N];
|
860
|
+
}
|
861
|
+
if (input[_P] != null) {
|
862
|
+
entries[_P] = input[_P];
|
863
|
+
}
|
864
|
+
if (input[_PA] != null) {
|
865
|
+
const memberEntries = se_policyDescriptorListType(input[_PA], context);
|
866
|
+
if (((_a2 = input[_PA]) == null ? void 0 : _a2.length) === 0) {
|
867
|
+
entries.PolicyArns = [];
|
868
|
+
}
|
869
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
870
|
+
const loc = `PolicyArns.${key}`;
|
871
|
+
entries[loc] = value;
|
872
|
+
});
|
873
|
+
}
|
874
|
+
if (input[_DS] != null) {
|
875
|
+
entries[_DS] = input[_DS];
|
876
|
+
}
|
877
|
+
if (input[_T] != null) {
|
878
|
+
const memberEntries = se_tagListType(input[_T], context);
|
879
|
+
if (((_b = input[_T]) == null ? void 0 : _b.length) === 0) {
|
880
|
+
entries.Tags = [];
|
881
|
+
}
|
882
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
883
|
+
const loc = `Tags.${key}`;
|
884
|
+
entries[loc] = value;
|
885
|
+
});
|
886
|
+
}
|
887
|
+
return entries;
|
888
|
+
}, "se_GetFederationTokenRequest");
|
889
|
+
var se_GetSessionTokenRequest = /* @__PURE__ */ __name((input, context) => {
|
890
|
+
const entries = {};
|
891
|
+
if (input[_DS] != null) {
|
892
|
+
entries[_DS] = input[_DS];
|
893
|
+
}
|
894
|
+
if (input[_SN] != null) {
|
895
|
+
entries[_SN] = input[_SN];
|
896
|
+
}
|
897
|
+
if (input[_TC] != null) {
|
898
|
+
entries[_TC] = input[_TC];
|
899
|
+
}
|
900
|
+
return entries;
|
901
|
+
}, "se_GetSessionTokenRequest");
|
902
|
+
var se_policyDescriptorListType = /* @__PURE__ */ __name((input, context) => {
|
903
|
+
const entries = {};
|
904
|
+
let counter = 1;
|
905
|
+
for (const entry of input) {
|
906
|
+
if (entry === null) {
|
907
|
+
continue;
|
908
|
+
}
|
909
|
+
const memberEntries = se_PolicyDescriptorType(entry, context);
|
910
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
911
|
+
entries[`member.${counter}.${key}`] = value;
|
912
|
+
});
|
913
|
+
counter++;
|
914
|
+
}
|
915
|
+
return entries;
|
916
|
+
}, "se_policyDescriptorListType");
|
917
|
+
var se_PolicyDescriptorType = /* @__PURE__ */ __name((input, context) => {
|
918
|
+
const entries = {};
|
919
|
+
if (input[_a] != null) {
|
920
|
+
entries[_a] = input[_a];
|
921
|
+
}
|
922
|
+
return entries;
|
923
|
+
}, "se_PolicyDescriptorType");
|
924
|
+
var se_ProvidedContext = /* @__PURE__ */ __name((input, context) => {
|
925
|
+
const entries = {};
|
926
|
+
if (input[_PAro] != null) {
|
927
|
+
entries[_PAro] = input[_PAro];
|
928
|
+
}
|
929
|
+
if (input[_CA] != null) {
|
930
|
+
entries[_CA] = input[_CA];
|
931
|
+
}
|
932
|
+
return entries;
|
933
|
+
}, "se_ProvidedContext");
|
934
|
+
var se_ProvidedContextsListType = /* @__PURE__ */ __name((input, context) => {
|
935
|
+
const entries = {};
|
936
|
+
let counter = 1;
|
937
|
+
for (const entry of input) {
|
938
|
+
if (entry === null) {
|
939
|
+
continue;
|
940
|
+
}
|
941
|
+
const memberEntries = se_ProvidedContext(entry, context);
|
942
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
943
|
+
entries[`member.${counter}.${key}`] = value;
|
944
|
+
});
|
945
|
+
counter++;
|
946
|
+
}
|
947
|
+
return entries;
|
948
|
+
}, "se_ProvidedContextsListType");
|
949
|
+
var se_Tag = /* @__PURE__ */ __name((input, context) => {
|
950
|
+
const entries = {};
|
951
|
+
if (input[_K] != null) {
|
952
|
+
entries[_K] = input[_K];
|
953
|
+
}
|
954
|
+
if (input[_Va] != null) {
|
955
|
+
entries[_Va] = input[_Va];
|
956
|
+
}
|
957
|
+
return entries;
|
958
|
+
}, "se_Tag");
|
959
|
+
var se_tagKeyListType = /* @__PURE__ */ __name((input, context) => {
|
960
|
+
const entries = {};
|
961
|
+
let counter = 1;
|
962
|
+
for (const entry of input) {
|
963
|
+
if (entry === null) {
|
964
|
+
continue;
|
965
|
+
}
|
966
|
+
entries[`member.${counter}`] = entry;
|
967
|
+
counter++;
|
968
|
+
}
|
969
|
+
return entries;
|
970
|
+
}, "se_tagKeyListType");
|
971
|
+
var se_tagListType = /* @__PURE__ */ __name((input, context) => {
|
972
|
+
const entries = {};
|
973
|
+
let counter = 1;
|
974
|
+
for (const entry of input) {
|
975
|
+
if (entry === null) {
|
976
|
+
continue;
|
977
|
+
}
|
978
|
+
const memberEntries = se_Tag(entry, context);
|
979
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
980
|
+
entries[`member.${counter}.${key}`] = value;
|
981
|
+
});
|
982
|
+
counter++;
|
983
|
+
}
|
984
|
+
return entries;
|
985
|
+
}, "se_tagListType");
|
986
|
+
var de_AssumedRoleUser = /* @__PURE__ */ __name((output, context) => {
|
987
|
+
const contents = {};
|
988
|
+
if (output[_ARI] != null) {
|
989
|
+
contents[_ARI] = (0, import_smithy_client.expectString)(output[_ARI]);
|
990
|
+
}
|
991
|
+
if (output[_Ar] != null) {
|
992
|
+
contents[_Ar] = (0, import_smithy_client.expectString)(output[_Ar]);
|
993
|
+
}
|
994
|
+
return contents;
|
995
|
+
}, "de_AssumedRoleUser");
|
996
|
+
var de_AssumeRoleResponse = /* @__PURE__ */ __name((output, context) => {
|
997
|
+
const contents = {};
|
998
|
+
if (output[_C] != null) {
|
999
|
+
contents[_C] = de_Credentials(output[_C], context);
|
1000
|
+
}
|
1001
|
+
if (output[_ARU] != null) {
|
1002
|
+
contents[_ARU] = de_AssumedRoleUser(output[_ARU], context);
|
1003
|
+
}
|
1004
|
+
if (output[_PPS] != null) {
|
1005
|
+
contents[_PPS] = (0, import_smithy_client.strictParseInt32)(output[_PPS]);
|
1006
|
+
}
|
1007
|
+
if (output[_SI] != null) {
|
1008
|
+
contents[_SI] = (0, import_smithy_client.expectString)(output[_SI]);
|
1009
|
+
}
|
1010
|
+
return contents;
|
1011
|
+
}, "de_AssumeRoleResponse");
|
1012
|
+
var de_AssumeRoleWithSAMLResponse = /* @__PURE__ */ __name((output, context) => {
|
1013
|
+
const contents = {};
|
1014
|
+
if (output[_C] != null) {
|
1015
|
+
contents[_C] = de_Credentials(output[_C], context);
|
1016
|
+
}
|
1017
|
+
if (output[_ARU] != null) {
|
1018
|
+
contents[_ARU] = de_AssumedRoleUser(output[_ARU], context);
|
1019
|
+
}
|
1020
|
+
if (output[_PPS] != null) {
|
1021
|
+
contents[_PPS] = (0, import_smithy_client.strictParseInt32)(output[_PPS]);
|
1022
|
+
}
|
1023
|
+
if (output[_S] != null) {
|
1024
|
+
contents[_S] = (0, import_smithy_client.expectString)(output[_S]);
|
1025
|
+
}
|
1026
|
+
if (output[_ST] != null) {
|
1027
|
+
contents[_ST] = (0, import_smithy_client.expectString)(output[_ST]);
|
1028
|
+
}
|
1029
|
+
if (output[_I] != null) {
|
1030
|
+
contents[_I] = (0, import_smithy_client.expectString)(output[_I]);
|
1031
|
+
}
|
1032
|
+
if (output[_Au] != null) {
|
1033
|
+
contents[_Au] = (0, import_smithy_client.expectString)(output[_Au]);
|
1034
|
+
}
|
1035
|
+
if (output[_NQ] != null) {
|
1036
|
+
contents[_NQ] = (0, import_smithy_client.expectString)(output[_NQ]);
|
1037
|
+
}
|
1038
|
+
if (output[_SI] != null) {
|
1039
|
+
contents[_SI] = (0, import_smithy_client.expectString)(output[_SI]);
|
1040
|
+
}
|
1041
|
+
return contents;
|
1042
|
+
}, "de_AssumeRoleWithSAMLResponse");
|
1043
|
+
var de_AssumeRoleWithWebIdentityResponse = /* @__PURE__ */ __name((output, context) => {
|
1044
|
+
const contents = {};
|
1045
|
+
if (output[_C] != null) {
|
1046
|
+
contents[_C] = de_Credentials(output[_C], context);
|
1047
|
+
}
|
1048
|
+
if (output[_SFWIT] != null) {
|
1049
|
+
contents[_SFWIT] = (0, import_smithy_client.expectString)(output[_SFWIT]);
|
1050
|
+
}
|
1051
|
+
if (output[_ARU] != null) {
|
1052
|
+
contents[_ARU] = de_AssumedRoleUser(output[_ARU], context);
|
1053
|
+
}
|
1054
|
+
if (output[_PPS] != null) {
|
1055
|
+
contents[_PPS] = (0, import_smithy_client.strictParseInt32)(output[_PPS]);
|
1056
|
+
}
|
1057
|
+
if (output[_Pr] != null) {
|
1058
|
+
contents[_Pr] = (0, import_smithy_client.expectString)(output[_Pr]);
|
1059
|
+
}
|
1060
|
+
if (output[_Au] != null) {
|
1061
|
+
contents[_Au] = (0, import_smithy_client.expectString)(output[_Au]);
|
1062
|
+
}
|
1063
|
+
if (output[_SI] != null) {
|
1064
|
+
contents[_SI] = (0, import_smithy_client.expectString)(output[_SI]);
|
1065
|
+
}
|
1066
|
+
return contents;
|
1067
|
+
}, "de_AssumeRoleWithWebIdentityResponse");
|
1068
|
+
var de_Credentials = /* @__PURE__ */ __name((output, context) => {
|
1069
|
+
const contents = {};
|
1070
|
+
if (output[_AKI] != null) {
|
1071
|
+
contents[_AKI] = (0, import_smithy_client.expectString)(output[_AKI]);
|
1072
|
+
}
|
1073
|
+
if (output[_SAK] != null) {
|
1074
|
+
contents[_SAK] = (0, import_smithy_client.expectString)(output[_SAK]);
|
1075
|
+
}
|
1076
|
+
if (output[_STe] != null) {
|
1077
|
+
contents[_STe] = (0, import_smithy_client.expectString)(output[_STe]);
|
1078
|
+
}
|
1079
|
+
if (output[_E] != null) {
|
1080
|
+
contents[_E] = (0, import_smithy_client.expectNonNull)((0, import_smithy_client.parseRfc3339DateTimeWithOffset)(output[_E]));
|
1081
|
+
}
|
1082
|
+
return contents;
|
1083
|
+
}, "de_Credentials");
|
1084
|
+
var de_DecodeAuthorizationMessageResponse = /* @__PURE__ */ __name((output, context) => {
|
1085
|
+
const contents = {};
|
1086
|
+
if (output[_DM] != null) {
|
1087
|
+
contents[_DM] = (0, import_smithy_client.expectString)(output[_DM]);
|
1088
|
+
}
|
1089
|
+
return contents;
|
1090
|
+
}, "de_DecodeAuthorizationMessageResponse");
|
1091
|
+
var de_ExpiredTokenException = /* @__PURE__ */ __name((output, context) => {
|
1092
|
+
const contents = {};
|
1093
|
+
if (output[_m] != null) {
|
1094
|
+
contents[_m] = (0, import_smithy_client.expectString)(output[_m]);
|
1095
|
+
}
|
1096
|
+
return contents;
|
1097
|
+
}, "de_ExpiredTokenException");
|
1098
|
+
var de_FederatedUser = /* @__PURE__ */ __name((output, context) => {
|
1099
|
+
const contents = {};
|
1100
|
+
if (output[_FUI] != null) {
|
1101
|
+
contents[_FUI] = (0, import_smithy_client.expectString)(output[_FUI]);
|
1102
|
+
}
|
1103
|
+
if (output[_Ar] != null) {
|
1104
|
+
contents[_Ar] = (0, import_smithy_client.expectString)(output[_Ar]);
|
1105
|
+
}
|
1106
|
+
return contents;
|
1107
|
+
}, "de_FederatedUser");
|
1108
|
+
var de_GetAccessKeyInfoResponse = /* @__PURE__ */ __name((output, context) => {
|
1109
|
+
const contents = {};
|
1110
|
+
if (output[_Ac] != null) {
|
1111
|
+
contents[_Ac] = (0, import_smithy_client.expectString)(output[_Ac]);
|
1112
|
+
}
|
1113
|
+
return contents;
|
1114
|
+
}, "de_GetAccessKeyInfoResponse");
|
1115
|
+
var de_GetCallerIdentityResponse = /* @__PURE__ */ __name((output, context) => {
|
1116
|
+
const contents = {};
|
1117
|
+
if (output[_UI] != null) {
|
1118
|
+
contents[_UI] = (0, import_smithy_client.expectString)(output[_UI]);
|
1119
|
+
}
|
1120
|
+
if (output[_Ac] != null) {
|
1121
|
+
contents[_Ac] = (0, import_smithy_client.expectString)(output[_Ac]);
|
1122
|
+
}
|
1123
|
+
if (output[_Ar] != null) {
|
1124
|
+
contents[_Ar] = (0, import_smithy_client.expectString)(output[_Ar]);
|
1125
|
+
}
|
1126
|
+
return contents;
|
1127
|
+
}, "de_GetCallerIdentityResponse");
|
1128
|
+
var de_GetFederationTokenResponse = /* @__PURE__ */ __name((output, context) => {
|
1129
|
+
const contents = {};
|
1130
|
+
if (output[_C] != null) {
|
1131
|
+
contents[_C] = de_Credentials(output[_C], context);
|
1132
|
+
}
|
1133
|
+
if (output[_FU] != null) {
|
1134
|
+
contents[_FU] = de_FederatedUser(output[_FU], context);
|
1135
|
+
}
|
1136
|
+
if (output[_PPS] != null) {
|
1137
|
+
contents[_PPS] = (0, import_smithy_client.strictParseInt32)(output[_PPS]);
|
1138
|
+
}
|
1139
|
+
return contents;
|
1140
|
+
}, "de_GetFederationTokenResponse");
|
1141
|
+
var de_GetSessionTokenResponse = /* @__PURE__ */ __name((output, context) => {
|
1142
|
+
const contents = {};
|
1143
|
+
if (output[_C] != null) {
|
1144
|
+
contents[_C] = de_Credentials(output[_C], context);
|
1145
|
+
}
|
1146
|
+
return contents;
|
1147
|
+
}, "de_GetSessionTokenResponse");
|
1148
|
+
var de_IDPCommunicationErrorException = /* @__PURE__ */ __name((output, context) => {
|
1149
|
+
const contents = {};
|
1150
|
+
if (output[_m] != null) {
|
1151
|
+
contents[_m] = (0, import_smithy_client.expectString)(output[_m]);
|
1152
|
+
}
|
1153
|
+
return contents;
|
1154
|
+
}, "de_IDPCommunicationErrorException");
|
1155
|
+
var de_IDPRejectedClaimException = /* @__PURE__ */ __name((output, context) => {
|
1156
|
+
const contents = {};
|
1157
|
+
if (output[_m] != null) {
|
1158
|
+
contents[_m] = (0, import_smithy_client.expectString)(output[_m]);
|
1159
|
+
}
|
1160
|
+
return contents;
|
1161
|
+
}, "de_IDPRejectedClaimException");
|
1162
|
+
var de_InvalidAuthorizationMessageException = /* @__PURE__ */ __name((output, context) => {
|
1163
|
+
const contents = {};
|
1164
|
+
if (output[_m] != null) {
|
1165
|
+
contents[_m] = (0, import_smithy_client.expectString)(output[_m]);
|
1166
|
+
}
|
1167
|
+
return contents;
|
1168
|
+
}, "de_InvalidAuthorizationMessageException");
|
1169
|
+
var de_InvalidIdentityTokenException = /* @__PURE__ */ __name((output, context) => {
|
1170
|
+
const contents = {};
|
1171
|
+
if (output[_m] != null) {
|
1172
|
+
contents[_m] = (0, import_smithy_client.expectString)(output[_m]);
|
1173
|
+
}
|
1174
|
+
return contents;
|
1175
|
+
}, "de_InvalidIdentityTokenException");
|
1176
|
+
var de_MalformedPolicyDocumentException = /* @__PURE__ */ __name((output, context) => {
|
1177
|
+
const contents = {};
|
1178
|
+
if (output[_m] != null) {
|
1179
|
+
contents[_m] = (0, import_smithy_client.expectString)(output[_m]);
|
1180
|
+
}
|
1181
|
+
return contents;
|
1182
|
+
}, "de_MalformedPolicyDocumentException");
|
1183
|
+
var de_PackedPolicyTooLargeException = /* @__PURE__ */ __name((output, context) => {
|
1184
|
+
const contents = {};
|
1185
|
+
if (output[_m] != null) {
|
1186
|
+
contents[_m] = (0, import_smithy_client.expectString)(output[_m]);
|
1187
|
+
}
|
1188
|
+
return contents;
|
1189
|
+
}, "de_PackedPolicyTooLargeException");
|
1190
|
+
var de_RegionDisabledException = /* @__PURE__ */ __name((output, context) => {
|
1191
|
+
const contents = {};
|
1192
|
+
if (output[_m] != null) {
|
1193
|
+
contents[_m] = (0, import_smithy_client.expectString)(output[_m]);
|
1194
|
+
}
|
1195
|
+
return contents;
|
1196
|
+
}, "de_RegionDisabledException");
|
1197
|
+
var deserializeMetadata = /* @__PURE__ */ __name((output) => ({
|
1198
|
+
httpStatusCode: output.statusCode,
|
1199
|
+
requestId: output.headers["x-amzn-requestid"] ?? output.headers["x-amzn-request-id"] ?? output.headers["x-amz-request-id"],
|
1200
|
+
extendedRequestId: output.headers["x-amz-id-2"],
|
1201
|
+
cfId: output.headers["x-amz-cf-id"]
|
1202
|
+
}), "deserializeMetadata");
|
1203
|
+
var collectBodyString = /* @__PURE__ */ __name((streamBody, context) => (0, import_smithy_client.collectBody)(streamBody, context).then((body) => context.utf8Encoder(body)), "collectBodyString");
|
1204
|
+
var throwDefaultError = (0, import_smithy_client.withBaseException)(STSServiceException);
|
1205
|
+
var buildHttpRpcRequest = /* @__PURE__ */ __name(async (context, headers, path, resolvedHostname, body) => {
|
1206
|
+
const { hostname, protocol = "https", port, path: basePath } = await context.endpoint();
|
1207
|
+
const contents = {
|
1208
|
+
protocol,
|
1209
|
+
hostname,
|
1210
|
+
port,
|
1211
|
+
method: "POST",
|
1212
|
+
path: basePath.endsWith("/") ? basePath.slice(0, -1) + path : basePath + path,
|
1213
|
+
headers
|
1214
|
+
};
|
1215
|
+
if (resolvedHostname !== void 0) {
|
1216
|
+
contents.hostname = resolvedHostname;
|
1217
|
+
}
|
1218
|
+
if (body !== void 0) {
|
1219
|
+
contents.body = body;
|
1220
|
+
}
|
1221
|
+
return new import_protocol_http.HttpRequest(contents);
|
1222
|
+
}, "buildHttpRpcRequest");
|
1223
|
+
var SHARED_HEADERS = {
|
1224
|
+
"content-type": "application/x-www-form-urlencoded"
|
1225
|
+
};
|
1226
|
+
var _ = "2011-06-15";
|
1227
|
+
var _A = "Action";
|
1228
|
+
var _AKI = "AccessKeyId";
|
1229
|
+
var _AR = "AssumeRole";
|
1230
|
+
var _ARI = "AssumedRoleId";
|
1231
|
+
var _ARU = "AssumedRoleUser";
|
1232
|
+
var _ARWSAML = "AssumeRoleWithSAML";
|
1233
|
+
var _ARWWI = "AssumeRoleWithWebIdentity";
|
1234
|
+
var _Ac = "Account";
|
1235
|
+
var _Ar = "Arn";
|
1236
|
+
var _Au = "Audience";
|
1237
|
+
var _C = "Credentials";
|
1238
|
+
var _CA = "ContextAssertion";
|
1239
|
+
var _DAM = "DecodeAuthorizationMessage";
|
1240
|
+
var _DM = "DecodedMessage";
|
1241
|
+
var _DS = "DurationSeconds";
|
1242
|
+
var _E = "Expiration";
|
1243
|
+
var _EI = "ExternalId";
|
1244
|
+
var _EM = "EncodedMessage";
|
1245
|
+
var _FU = "FederatedUser";
|
1246
|
+
var _FUI = "FederatedUserId";
|
1247
|
+
var _GAKI = "GetAccessKeyInfo";
|
1248
|
+
var _GCI = "GetCallerIdentity";
|
1249
|
+
var _GFT = "GetFederationToken";
|
1250
|
+
var _GST = "GetSessionToken";
|
1251
|
+
var _I = "Issuer";
|
1252
|
+
var _K = "Key";
|
1253
|
+
var _N = "Name";
|
1254
|
+
var _NQ = "NameQualifier";
|
1255
|
+
var _P = "Policy";
|
1256
|
+
var _PA = "PolicyArns";
|
1257
|
+
var _PAr = "PrincipalArn";
|
1258
|
+
var _PAro = "ProviderArn";
|
1259
|
+
var _PC = "ProvidedContexts";
|
1260
|
+
var _PI = "ProviderId";
|
1261
|
+
var _PPS = "PackedPolicySize";
|
1262
|
+
var _Pr = "Provider";
|
1263
|
+
var _RA = "RoleArn";
|
1264
|
+
var _RSN = "RoleSessionName";
|
1265
|
+
var _S = "Subject";
|
1266
|
+
var _SAK = "SecretAccessKey";
|
1267
|
+
var _SAMLA = "SAMLAssertion";
|
1268
|
+
var _SFWIT = "SubjectFromWebIdentityToken";
|
1269
|
+
var _SI = "SourceIdentity";
|
1270
|
+
var _SN = "SerialNumber";
|
1271
|
+
var _ST = "SubjectType";
|
1272
|
+
var _STe = "SessionToken";
|
1273
|
+
var _T = "Tags";
|
1274
|
+
var _TC = "TokenCode";
|
1275
|
+
var _TTK = "TransitiveTagKeys";
|
1276
|
+
var _UI = "UserId";
|
1277
|
+
var _V = "Version";
|
1278
|
+
var _Va = "Value";
|
1279
|
+
var _WIT = "WebIdentityToken";
|
1280
|
+
var _a = "arn";
|
1281
|
+
var _m = "message";
|
1282
|
+
var parseBody = /* @__PURE__ */ __name((streamBody, context) => collectBodyString(streamBody, context).then((encoded) => {
|
1283
|
+
if (encoded.length) {
|
1284
|
+
const parser = new import_fast_xml_parser.XMLParser({
|
1285
|
+
attributeNamePrefix: "",
|
1286
|
+
htmlEntities: true,
|
1287
|
+
ignoreAttributes: false,
|
1288
|
+
ignoreDeclaration: true,
|
1289
|
+
parseTagValue: false,
|
1290
|
+
trimValues: false,
|
1291
|
+
tagValueProcessor: (_2, val) => val.trim() === "" && val.includes("\n") ? "" : void 0
|
1292
|
+
});
|
1293
|
+
parser.addEntity("#xD", "\r");
|
1294
|
+
parser.addEntity("#10", "\n");
|
1295
|
+
const parsedObj = parser.parse(encoded);
|
1296
|
+
const textNodeName = "#text";
|
1297
|
+
const key = Object.keys(parsedObj)[0];
|
1298
|
+
const parsedObjToReturn = parsedObj[key];
|
1299
|
+
if (parsedObjToReturn[textNodeName]) {
|
1300
|
+
parsedObjToReturn[key] = parsedObjToReturn[textNodeName];
|
1301
|
+
delete parsedObjToReturn[textNodeName];
|
1302
|
+
}
|
1303
|
+
return (0, import_smithy_client.getValueFromTextNode)(parsedObjToReturn);
|
1304
|
+
}
|
1305
|
+
return {};
|
1306
|
+
}), "parseBody");
|
1307
|
+
var parseErrorBody = /* @__PURE__ */ __name(async (errorBody, context) => {
|
1308
|
+
const value = await parseBody(errorBody, context);
|
1309
|
+
if (value.Error) {
|
1310
|
+
value.Error.message = value.Error.message ?? value.Error.Message;
|
1311
|
+
}
|
1312
|
+
return value;
|
1313
|
+
}, "parseErrorBody");
|
1314
|
+
var buildFormUrlencodedString = /* @__PURE__ */ __name((formEntries) => Object.entries(formEntries).map(([key, value]) => (0, import_smithy_client.extendedEncodeURIComponent)(key) + "=" + (0, import_smithy_client.extendedEncodeURIComponent)(value)).join("&"), "buildFormUrlencodedString");
|
1315
|
+
var loadQueryErrorCode = /* @__PURE__ */ __name((output, data) => {
|
1316
|
+
var _a2;
|
1317
|
+
if (((_a2 = data.Error) == null ? void 0 : _a2.Code) !== void 0) {
|
1318
|
+
return data.Error.Code;
|
1319
|
+
}
|
1320
|
+
if (output.statusCode == 404) {
|
1321
|
+
return "NotFound";
|
1322
|
+
}
|
1323
|
+
}, "loadQueryErrorCode");
|
1324
|
+
|
1325
|
+
// src/commands/AssumeRoleCommand.ts
|
1326
|
+
var _AssumeRoleCommand = class _AssumeRoleCommand extends import_smithy_client.Command.classBuilder().ep({
|
55
1327
|
...import_EndpointParameters.commonParams
|
56
1328
|
}).m(function(Command, cs, config, o) {
|
57
1329
|
return [
|
58
1330
|
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
59
1331
|
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
60
1332
|
];
|
61
|
-
}).s("AWSSecurityTokenServiceV20110615", "
|
1333
|
+
}).s("AWSSecurityTokenServiceV20110615", "AssumeRole", {}).n("STSClient", "AssumeRoleCommand").f(void 0, AssumeRoleResponseFilterSensitiveLog).ser(se_AssumeRoleCommand).de(de_AssumeRoleCommand).build() {
|
1334
|
+
};
|
1335
|
+
__name(_AssumeRoleCommand, "AssumeRoleCommand");
|
1336
|
+
var AssumeRoleCommand = _AssumeRoleCommand;
|
1337
|
+
|
1338
|
+
// src/commands/AssumeRoleWithSAMLCommand.ts
|
1339
|
+
|
1340
|
+
|
1341
|
+
|
1342
|
+
|
1343
|
+
var import_EndpointParameters2 = require("./endpoint/EndpointParameters");
|
1344
|
+
var _AssumeRoleWithSAMLCommand = class _AssumeRoleWithSAMLCommand extends import_smithy_client.Command.classBuilder().ep({
|
1345
|
+
...import_EndpointParameters2.commonParams
|
1346
|
+
}).m(function(Command, cs, config, o) {
|
1347
|
+
return [
|
1348
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
1349
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
1350
|
+
];
|
1351
|
+
}).s("AWSSecurityTokenServiceV20110615", "AssumeRoleWithSAML", {}).n("STSClient", "AssumeRoleWithSAMLCommand").f(AssumeRoleWithSAMLRequestFilterSensitiveLog, AssumeRoleWithSAMLResponseFilterSensitiveLog).ser(se_AssumeRoleWithSAMLCommand).de(de_AssumeRoleWithSAMLCommand).build() {
|
62
1352
|
};
|
63
1353
|
__name(_AssumeRoleWithSAMLCommand, "AssumeRoleWithSAMLCommand");
|
64
1354
|
var AssumeRoleWithSAMLCommand = _AssumeRoleWithSAMLCommand;
|
65
1355
|
|
66
|
-
// src/
|
67
|
-
|
1356
|
+
// src/commands/AssumeRoleWithWebIdentityCommand.ts
|
1357
|
+
|
1358
|
+
|
1359
|
+
|
1360
|
+
|
1361
|
+
var import_EndpointParameters3 = require("./endpoint/EndpointParameters");
|
1362
|
+
var _AssumeRoleWithWebIdentityCommand = class _AssumeRoleWithWebIdentityCommand extends import_smithy_client.Command.classBuilder().ep({
|
1363
|
+
...import_EndpointParameters3.commonParams
|
1364
|
+
}).m(function(Command, cs, config, o) {
|
1365
|
+
return [
|
1366
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
1367
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
1368
|
+
];
|
1369
|
+
}).s("AWSSecurityTokenServiceV20110615", "AssumeRoleWithWebIdentity", {}).n("STSClient", "AssumeRoleWithWebIdentityCommand").f(AssumeRoleWithWebIdentityRequestFilterSensitiveLog, AssumeRoleWithWebIdentityResponseFilterSensitiveLog).ser(se_AssumeRoleWithWebIdentityCommand).de(de_AssumeRoleWithWebIdentityCommand).build() {
|
1370
|
+
};
|
1371
|
+
__name(_AssumeRoleWithWebIdentityCommand, "AssumeRoleWithWebIdentityCommand");
|
1372
|
+
var AssumeRoleWithWebIdentityCommand = _AssumeRoleWithWebIdentityCommand;
|
68
1373
|
|
69
1374
|
// src/commands/DecodeAuthorizationMessageCommand.ts
|
70
1375
|
|
71
1376
|
|
72
1377
|
|
73
1378
|
|
74
|
-
var
|
75
|
-
var import_Aws_query2 = require("./protocols/Aws_query");
|
1379
|
+
var import_EndpointParameters4 = require("./endpoint/EndpointParameters");
|
76
1380
|
var _DecodeAuthorizationMessageCommand = class _DecodeAuthorizationMessageCommand extends import_smithy_client.Command.classBuilder().ep({
|
77
|
-
...
|
1381
|
+
...import_EndpointParameters4.commonParams
|
78
1382
|
}).m(function(Command, cs, config, o) {
|
79
1383
|
return [
|
80
1384
|
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
81
1385
|
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
82
1386
|
];
|
83
|
-
}).s("AWSSecurityTokenServiceV20110615", "DecodeAuthorizationMessage", {}).n("STSClient", "DecodeAuthorizationMessageCommand").f(void 0, void 0).ser(
|
1387
|
+
}).s("AWSSecurityTokenServiceV20110615", "DecodeAuthorizationMessage", {}).n("STSClient", "DecodeAuthorizationMessageCommand").f(void 0, void 0).ser(se_DecodeAuthorizationMessageCommand).de(de_DecodeAuthorizationMessageCommand).build() {
|
84
1388
|
};
|
85
1389
|
__name(_DecodeAuthorizationMessageCommand, "DecodeAuthorizationMessageCommand");
|
86
1390
|
var DecodeAuthorizationMessageCommand = _DecodeAuthorizationMessageCommand;
|
@@ -90,16 +1394,15 @@ var DecodeAuthorizationMessageCommand = _DecodeAuthorizationMessageCommand;
|
|
90
1394
|
|
91
1395
|
|
92
1396
|
|
93
|
-
var
|
94
|
-
var import_Aws_query3 = require("./protocols/Aws_query");
|
1397
|
+
var import_EndpointParameters5 = require("./endpoint/EndpointParameters");
|
95
1398
|
var _GetAccessKeyInfoCommand = class _GetAccessKeyInfoCommand extends import_smithy_client.Command.classBuilder().ep({
|
96
|
-
...
|
1399
|
+
...import_EndpointParameters5.commonParams
|
97
1400
|
}).m(function(Command, cs, config, o) {
|
98
1401
|
return [
|
99
1402
|
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
100
1403
|
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
101
1404
|
];
|
102
|
-
}).s("AWSSecurityTokenServiceV20110615", "GetAccessKeyInfo", {}).n("STSClient", "GetAccessKeyInfoCommand").f(void 0, void 0).ser(
|
1405
|
+
}).s("AWSSecurityTokenServiceV20110615", "GetAccessKeyInfo", {}).n("STSClient", "GetAccessKeyInfoCommand").f(void 0, void 0).ser(se_GetAccessKeyInfoCommand).de(de_GetAccessKeyInfoCommand).build() {
|
103
1406
|
};
|
104
1407
|
__name(_GetAccessKeyInfoCommand, "GetAccessKeyInfoCommand");
|
105
1408
|
var GetAccessKeyInfoCommand = _GetAccessKeyInfoCommand;
|
@@ -109,16 +1412,15 @@ var GetAccessKeyInfoCommand = _GetAccessKeyInfoCommand;
|
|
109
1412
|
|
110
1413
|
|
111
1414
|
|
112
|
-
var
|
113
|
-
var import_Aws_query4 = require("./protocols/Aws_query");
|
1415
|
+
var import_EndpointParameters6 = require("./endpoint/EndpointParameters");
|
114
1416
|
var _GetCallerIdentityCommand = class _GetCallerIdentityCommand extends import_smithy_client.Command.classBuilder().ep({
|
115
|
-
...
|
1417
|
+
...import_EndpointParameters6.commonParams
|
116
1418
|
}).m(function(Command, cs, config, o) {
|
117
1419
|
return [
|
118
1420
|
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
119
1421
|
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
120
1422
|
];
|
121
|
-
}).s("AWSSecurityTokenServiceV20110615", "GetCallerIdentity", {}).n("STSClient", "GetCallerIdentityCommand").f(void 0, void 0).ser(
|
1423
|
+
}).s("AWSSecurityTokenServiceV20110615", "GetCallerIdentity", {}).n("STSClient", "GetCallerIdentityCommand").f(void 0, void 0).ser(se_GetCallerIdentityCommand).de(de_GetCallerIdentityCommand).build() {
|
122
1424
|
};
|
123
1425
|
__name(_GetCallerIdentityCommand, "GetCallerIdentityCommand");
|
124
1426
|
var GetCallerIdentityCommand = _GetCallerIdentityCommand;
|
@@ -128,17 +1430,15 @@ var GetCallerIdentityCommand = _GetCallerIdentityCommand;
|
|
128
1430
|
|
129
1431
|
|
130
1432
|
|
131
|
-
var
|
132
|
-
var import_models_02 = require("./models/models_0");
|
133
|
-
var import_Aws_query5 = require("./protocols/Aws_query");
|
1433
|
+
var import_EndpointParameters7 = require("./endpoint/EndpointParameters");
|
134
1434
|
var _GetFederationTokenCommand = class _GetFederationTokenCommand extends import_smithy_client.Command.classBuilder().ep({
|
135
|
-
...
|
1435
|
+
...import_EndpointParameters7.commonParams
|
136
1436
|
}).m(function(Command, cs, config, o) {
|
137
1437
|
return [
|
138
1438
|
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
139
1439
|
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
140
1440
|
];
|
141
|
-
}).s("AWSSecurityTokenServiceV20110615", "GetFederationToken", {}).n("STSClient", "GetFederationTokenCommand").f(void 0,
|
1441
|
+
}).s("AWSSecurityTokenServiceV20110615", "GetFederationToken", {}).n("STSClient", "GetFederationTokenCommand").f(void 0, GetFederationTokenResponseFilterSensitiveLog).ser(se_GetFederationTokenCommand).de(de_GetFederationTokenCommand).build() {
|
142
1442
|
};
|
143
1443
|
__name(_GetFederationTokenCommand, "GetFederationTokenCommand");
|
144
1444
|
var GetFederationTokenCommand = _GetFederationTokenCommand;
|
@@ -148,17 +1448,15 @@ var GetFederationTokenCommand = _GetFederationTokenCommand;
|
|
148
1448
|
|
149
1449
|
|
150
1450
|
|
151
|
-
var
|
152
|
-
var import_models_03 = require("./models/models_0");
|
153
|
-
var import_Aws_query6 = require("./protocols/Aws_query");
|
1451
|
+
var import_EndpointParameters8 = require("./endpoint/EndpointParameters");
|
154
1452
|
var _GetSessionTokenCommand = class _GetSessionTokenCommand extends import_smithy_client.Command.classBuilder().ep({
|
155
|
-
...
|
1453
|
+
...import_EndpointParameters8.commonParams
|
156
1454
|
}).m(function(Command, cs, config, o) {
|
157
1455
|
return [
|
158
1456
|
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
159
1457
|
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
160
1458
|
];
|
161
|
-
}).s("AWSSecurityTokenServiceV20110615", "GetSessionToken", {}).n("STSClient", "GetSessionTokenCommand").f(void 0,
|
1459
|
+
}).s("AWSSecurityTokenServiceV20110615", "GetSessionToken", {}).n("STSClient", "GetSessionTokenCommand").f(void 0, GetSessionTokenResponseFilterSensitiveLog).ser(se_GetSessionTokenCommand).de(de_GetSessionTokenCommand).build() {
|
162
1460
|
};
|
163
1461
|
__name(_GetSessionTokenCommand, "GetSessionTokenCommand");
|
164
1462
|
var GetSessionTokenCommand = _GetSessionTokenCommand;
|
@@ -166,9 +1464,9 @@ var GetSessionTokenCommand = _GetSessionTokenCommand;
|
|
166
1464
|
// src/STS.ts
|
167
1465
|
var import_STSClient = require("././STSClient");
|
168
1466
|
var commands = {
|
169
|
-
AssumeRoleCommand
|
1467
|
+
AssumeRoleCommand,
|
170
1468
|
AssumeRoleWithSAMLCommand,
|
171
|
-
AssumeRoleWithWebIdentityCommand
|
1469
|
+
AssumeRoleWithWebIdentityCommand,
|
172
1470
|
DecodeAuthorizationMessageCommand,
|
173
1471
|
GetAccessKeyInfoCommand,
|
174
1472
|
GetCallerIdentityCommand,
|
@@ -182,81 +1480,118 @@ var STS = _STS;
|
|
182
1480
|
(0, import_smithy_client.createAggregatedClient)(commands, STS);
|
183
1481
|
|
184
1482
|
// src/index.ts
|
185
|
-
var
|
1483
|
+
var import_EndpointParameters9 = require("./endpoint/EndpointParameters");
|
186
1484
|
var import_runtimeExtensions = require("././runtimeExtensions");
|
187
|
-
|
188
|
-
// src/commands/index.ts
|
189
|
-
var commands_exports = {};
|
190
|
-
__export(commands_exports, {
|
191
|
-
AssumeRoleWithSAMLCommand: () => AssumeRoleWithSAMLCommand,
|
192
|
-
DecodeAuthorizationMessageCommand: () => DecodeAuthorizationMessageCommand,
|
193
|
-
GetAccessKeyInfoCommand: () => GetAccessKeyInfoCommand,
|
194
|
-
GetCallerIdentityCommand: () => GetCallerIdentityCommand,
|
195
|
-
GetFederationTokenCommand: () => GetFederationTokenCommand,
|
196
|
-
GetSessionTokenCommand: () => GetSessionTokenCommand
|
197
|
-
});
|
198
|
-
__reExport(commands_exports, require("./commands/AssumeRoleCommand"));
|
199
|
-
__reExport(commands_exports, require("./commands/AssumeRoleWithWebIdentityCommand"));
|
200
|
-
|
201
|
-
// src/index.ts
|
202
|
-
__reExport(src_exports, commands_exports, module.exports);
|
203
|
-
|
204
|
-
// src/models/index.ts
|
205
|
-
var models_exports = {};
|
206
|
-
__reExport(models_exports, require("./models/models_0"));
|
207
|
-
|
208
|
-
// src/index.ts
|
209
|
-
__reExport(src_exports, models_exports, module.exports);
|
210
1485
|
var import_util_endpoints = require("@aws-sdk/util-endpoints");
|
211
1486
|
|
1487
|
+
// src/defaultStsRoleAssumers.ts
|
1488
|
+
var ASSUME_ROLE_DEFAULT_REGION = "us-east-1";
|
1489
|
+
var decorateDefaultRegion = /* @__PURE__ */ __name((region) => {
|
1490
|
+
if (typeof region !== "function") {
|
1491
|
+
return region === void 0 ? ASSUME_ROLE_DEFAULT_REGION : region;
|
1492
|
+
}
|
1493
|
+
return async () => {
|
1494
|
+
try {
|
1495
|
+
return await region();
|
1496
|
+
} catch (e) {
|
1497
|
+
return ASSUME_ROLE_DEFAULT_REGION;
|
1498
|
+
}
|
1499
|
+
};
|
1500
|
+
}, "decorateDefaultRegion");
|
1501
|
+
var getDefaultRoleAssumer = /* @__PURE__ */ __name((stsOptions, stsClientCtor) => {
|
1502
|
+
let stsClient;
|
1503
|
+
let closureSourceCreds;
|
1504
|
+
return async (sourceCreds, params) => {
|
1505
|
+
closureSourceCreds = sourceCreds;
|
1506
|
+
if (!stsClient) {
|
1507
|
+
const { logger, region, requestHandler } = stsOptions;
|
1508
|
+
stsClient = new stsClientCtor({
|
1509
|
+
logger,
|
1510
|
+
// A hack to make sts client uses the credential in current closure.
|
1511
|
+
credentialDefaultProvider: () => async () => closureSourceCreds,
|
1512
|
+
region: decorateDefaultRegion(region || stsOptions.region),
|
1513
|
+
...requestHandler ? { requestHandler } : {}
|
1514
|
+
});
|
1515
|
+
}
|
1516
|
+
const { Credentials: Credentials2 } = await stsClient.send(new AssumeRoleCommand(params));
|
1517
|
+
if (!Credentials2 || !Credentials2.AccessKeyId || !Credentials2.SecretAccessKey) {
|
1518
|
+
throw new Error(`Invalid response from STS.assumeRole call with role ${params.RoleArn}`);
|
1519
|
+
}
|
1520
|
+
return {
|
1521
|
+
accessKeyId: Credentials2.AccessKeyId,
|
1522
|
+
secretAccessKey: Credentials2.SecretAccessKey,
|
1523
|
+
sessionToken: Credentials2.SessionToken,
|
1524
|
+
expiration: Credentials2.Expiration,
|
1525
|
+
// TODO(credentialScope): access normally when shape is updated.
|
1526
|
+
credentialScope: Credentials2.CredentialScope
|
1527
|
+
};
|
1528
|
+
};
|
1529
|
+
}, "getDefaultRoleAssumer");
|
1530
|
+
var getDefaultRoleAssumerWithWebIdentity = /* @__PURE__ */ __name((stsOptions, stsClientCtor) => {
|
1531
|
+
let stsClient;
|
1532
|
+
return async (params) => {
|
1533
|
+
if (!stsClient) {
|
1534
|
+
const { logger, region, requestHandler } = stsOptions;
|
1535
|
+
stsClient = new stsClientCtor({
|
1536
|
+
logger,
|
1537
|
+
region: decorateDefaultRegion(region || stsOptions.region),
|
1538
|
+
...requestHandler ? { requestHandler } : {}
|
1539
|
+
});
|
1540
|
+
}
|
1541
|
+
const { Credentials: Credentials2 } = await stsClient.send(new AssumeRoleWithWebIdentityCommand(params));
|
1542
|
+
if (!Credentials2 || !Credentials2.AccessKeyId || !Credentials2.SecretAccessKey) {
|
1543
|
+
throw new Error(`Invalid response from STS.assumeRoleWithWebIdentity call with role ${params.RoleArn}`);
|
1544
|
+
}
|
1545
|
+
return {
|
1546
|
+
accessKeyId: Credentials2.AccessKeyId,
|
1547
|
+
secretAccessKey: Credentials2.SecretAccessKey,
|
1548
|
+
sessionToken: Credentials2.SessionToken,
|
1549
|
+
expiration: Credentials2.Expiration,
|
1550
|
+
// TODO(credentialScope): access normally when shape is updated.
|
1551
|
+
credentialScope: Credentials2.CredentialScope
|
1552
|
+
};
|
1553
|
+
};
|
1554
|
+
}, "getDefaultRoleAssumerWithWebIdentity");
|
1555
|
+
|
212
1556
|
// src/defaultRoleAssumers.ts
|
213
|
-
var import_defaultStsRoleAssumers = require("././defaultStsRoleAssumers");
|
214
1557
|
var import_STSClient2 = require("././STSClient");
|
215
1558
|
var getCustomizableStsClientCtor = /* @__PURE__ */ __name((baseCtor, customizations) => {
|
216
|
-
var
|
1559
|
+
var _a2;
|
217
1560
|
if (!customizations)
|
218
1561
|
return baseCtor;
|
219
1562
|
else
|
220
|
-
return
|
1563
|
+
return _a2 = class extends baseCtor {
|
221
1564
|
constructor(config) {
|
222
1565
|
super(config);
|
223
1566
|
for (const customization of customizations) {
|
224
1567
|
this.middlewareStack.use(customization);
|
225
1568
|
}
|
226
1569
|
}
|
227
|
-
}, __name(
|
1570
|
+
}, __name(_a2, "CustomizableSTSClient"), _a2;
|
228
1571
|
}, "getCustomizableStsClientCtor");
|
229
|
-
var
|
230
|
-
var
|
1572
|
+
var getDefaultRoleAssumer2 = /* @__PURE__ */ __name((stsOptions = {}, stsPlugins) => getDefaultRoleAssumer(stsOptions, getCustomizableStsClientCtor(import_STSClient2.STSClient, stsPlugins)), "getDefaultRoleAssumer");
|
1573
|
+
var getDefaultRoleAssumerWithWebIdentity2 = /* @__PURE__ */ __name((stsOptions = {}, stsPlugins) => getDefaultRoleAssumerWithWebIdentity(stsOptions, getCustomizableStsClientCtor(import_STSClient2.STSClient, stsPlugins)), "getDefaultRoleAssumerWithWebIdentity");
|
231
1574
|
var decorateDefaultCredentialProvider = /* @__PURE__ */ __name((provider) => (input) => provider({
|
232
|
-
roleAssumer:
|
233
|
-
roleAssumerWithWebIdentity:
|
1575
|
+
roleAssumer: getDefaultRoleAssumer2(input),
|
1576
|
+
roleAssumerWithWebIdentity: getDefaultRoleAssumerWithWebIdentity2(input),
|
234
1577
|
...input
|
235
1578
|
}), "decorateDefaultCredentialProvider");
|
236
|
-
|
237
|
-
// src/index.ts
|
238
|
-
var import_STSServiceException = require("./models/STSServiceException");
|
239
1579
|
// Annotate the CommonJS export names for ESM import in node:
|
240
1580
|
|
241
1581
|
0 && (module.exports = {
|
242
|
-
AssumeRoleWithSAMLCommand,
|
243
|
-
ClientInputEndpointParameters,
|
244
|
-
DecodeAuthorizationMessageCommand,
|
245
|
-
GetAccessKeyInfoCommand,
|
246
|
-
GetCallerIdentityCommand,
|
247
|
-
GetFederationTokenCommand,
|
248
|
-
GetSessionTokenCommand,
|
249
|
-
RuntimeExtension,
|
250
|
-
STS,
|
251
1582
|
STSServiceException,
|
252
|
-
decorateDefaultCredentialProvider,
|
253
|
-
getDefaultRoleAssumer,
|
254
|
-
getDefaultRoleAssumerWithWebIdentity,
|
255
1583
|
__Client,
|
256
1584
|
STSClient,
|
1585
|
+
STS,
|
257
1586
|
$Command,
|
258
1587
|
AssumeRoleCommand,
|
1588
|
+
AssumeRoleWithSAMLCommand,
|
259
1589
|
AssumeRoleWithWebIdentityCommand,
|
1590
|
+
DecodeAuthorizationMessageCommand,
|
1591
|
+
GetAccessKeyInfoCommand,
|
1592
|
+
GetCallerIdentityCommand,
|
1593
|
+
GetFederationTokenCommand,
|
1594
|
+
GetSessionTokenCommand,
|
260
1595
|
ExpiredTokenException,
|
261
1596
|
MalformedPolicyDocumentException,
|
262
1597
|
PackedPolicyTooLargeException,
|
@@ -272,6 +1607,9 @@ var import_STSServiceException = require("./models/STSServiceException");
|
|
272
1607
|
AssumeRoleWithWebIdentityRequestFilterSensitiveLog,
|
273
1608
|
AssumeRoleWithWebIdentityResponseFilterSensitiveLog,
|
274
1609
|
GetFederationTokenResponseFilterSensitiveLog,
|
275
|
-
GetSessionTokenResponseFilterSensitiveLog
|
1610
|
+
GetSessionTokenResponseFilterSensitiveLog,
|
1611
|
+
getDefaultRoleAssumer,
|
1612
|
+
getDefaultRoleAssumerWithWebIdentity,
|
1613
|
+
decorateDefaultCredentialProvider
|
276
1614
|
});
|
277
1615
|
|