@cdk8s/awscdk-resolver 0.0.94 → 0.0.96
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/lib/resolve.js +1 -1
- package/node_modules/@aws-sdk/client-cloudformation/package.json +7 -5
- package/node_modules/@aws-sdk/client-sso/package.json +4 -4
- package/node_modules/@aws-sdk/client-sso-oidc/LICENSE +201 -0
- package/node_modules/@aws-sdk/client-sso-oidc/README.md +274 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/auth/httpAuthSchemeProvider.js +64 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/endpoint/endpointResolver.js +14 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/endpoint/ruleset.js +7 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/index.js +1024 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/runtimeConfig.browser.js +39 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/runtimeConfig.js +49 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/runtimeConfig.native.js +15 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-cjs/runtimeConfig.shared.js +40 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/SSOOIDC.js +15 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/SSOOIDCClient.js +52 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/auth/httpAuthExtensionConfiguration.js +38 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/auth/httpAuthSchemeProvider.js +58 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/commands/CreateTokenCommand.js +25 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/commands/CreateTokenWithIAMCommand.js +25 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/commands/RegisterClientCommand.js +25 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/commands/StartDeviceAuthorizationCommand.js +25 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/commands/index.js +4 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/endpoint/EndpointParameters.js +14 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/endpoint/endpointResolver.js +10 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/endpoint/ruleset.js +4 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/extensionConfiguration.js +1 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/index.js +5 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/models/SSOOIDCServiceException.js +8 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/models/index.js +1 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/models/models_0.js +217 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/protocols/Aws_restJson1.js +409 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/runtimeConfig.browser.js +34 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/runtimeConfig.js +44 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/runtimeConfig.native.js +11 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/runtimeConfig.shared.js +36 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-es/runtimeExtensions.js +21 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/SSOOIDC.d.ts +75 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/SSOOIDCClient.d.ts +212 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/auth/httpAuthExtensionConfiguration.d.ts +29 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/auth/httpAuthSchemeProvider.d.ts +61 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/commands/CreateTokenCommand.d.ts +162 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/commands/CreateTokenWithIAMCommand.d.ts +244 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/commands/RegisterClientCommand.d.ts +108 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/commands/StartDeviceAuthorizationCommand.d.ts +111 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/commands/index.d.ts +4 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/endpoint/EndpointParameters.d.ts +40 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/endpoint/endpointResolver.d.ts +5 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/endpoint/ruleset.d.ts +2 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/extensionConfiguration.d.ts +9 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/index.d.ts +50 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/models/SSOOIDCServiceException.d.ts +13 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/models/index.d.ts +1 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/models/models_0.d.ts +734 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/protocols/Aws_restJson1.d.ts +38 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/runtimeConfig.browser.d.ts +53 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/runtimeConfig.d.ts +53 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/runtimeConfig.native.d.ts +52 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/runtimeConfig.shared.d.ts +32 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/runtimeExtensions.d.ts +17 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/SSOOIDC.d.ts +73 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/SSOOIDCClient.d.ts +144 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/auth/httpAuthExtensionConfiguration.d.ts +32 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/auth/httpAuthSchemeProvider.d.ts +44 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/commands/CreateTokenCommand.d.ts +35 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/commands/CreateTokenWithIAMCommand.d.ts +39 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/commands/RegisterClientCommand.d.ts +38 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/commands/StartDeviceAuthorizationCommand.d.ts +39 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/commands/index.d.ts +4 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/endpoint/EndpointParameters.d.ts +51 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/endpoint/endpointResolver.d.ts +8 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/endpoint/ruleset.d.ts +2 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/extensionConfiguration.d.ts +9 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/index.d.ts +8 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/models/SSOOIDCServiceException.d.ts +8 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/models/index.d.ts +1 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/models/models_0.d.ts +201 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/protocols/Aws_restJson1.d.ts +53 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/runtimeConfig.browser.d.ts +110 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/runtimeConfig.d.ts +114 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/runtimeConfig.native.d.ts +104 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/runtimeConfig.shared.d.ts +49 -0
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/runtimeExtensions.d.ts +11 -0
- package/node_modules/@aws-sdk/client-sso-oidc/package.json +100 -0
- package/node_modules/@aws-sdk/client-sts/LICENSE +201 -0
- package/node_modules/@aws-sdk/client-sts/README.md +273 -0
- package/node_modules/@aws-sdk/client-sts/dist-cjs/STSClient.js +56 -0
- package/node_modules/@aws-sdk/client-sts/dist-cjs/auth/httpAuthExtensionConfiguration.js +43 -0
- package/node_modules/@aws-sdk/client-sts/dist-cjs/auth/httpAuthSchemeProvider.js +67 -0
- package/node_modules/@aws-sdk/client-sts/dist-cjs/endpoint/EndpointParameters.js +20 -0
- package/node_modules/@aws-sdk/client-sts/dist-cjs/endpoint/endpointResolver.js +14 -0
- package/node_modules/@aws-sdk/client-sts/dist-cjs/endpoint/ruleset.js +7 -0
- package/node_modules/@aws-sdk/client-sts/dist-cjs/index.js +1457 -0
- package/node_modules/@aws-sdk/client-sts/dist-cjs/runtimeConfig.browser.js +39 -0
- package/node_modules/@aws-sdk/client-sts/dist-cjs/runtimeConfig.js +63 -0
- package/node_modules/@aws-sdk/client-sts/dist-cjs/runtimeConfig.native.js +15 -0
- package/node_modules/@aws-sdk/client-sts/dist-cjs/runtimeConfig.shared.js +40 -0
- package/node_modules/@aws-sdk/client-sts/dist-cjs/runtimeExtensions.js +25 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/STS.js +23 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/STSClient.js +52 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/auth/httpAuthExtensionConfiguration.js +38 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/auth/httpAuthSchemeProvider.js +60 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/commands/AssumeRoleCommand.js +25 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/commands/AssumeRoleWithSAMLCommand.js +25 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/commands/AssumeRoleWithWebIdentityCommand.js +25 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/commands/DecodeAuthorizationMessageCommand.js +24 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/commands/GetAccessKeyInfoCommand.js +24 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/commands/GetCallerIdentityCommand.js +24 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/commands/GetFederationTokenCommand.js +25 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/commands/GetSessionTokenCommand.js +25 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/commands/index.js +8 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/defaultRoleAssumers.js +22 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/defaultStsRoleAssumers.js +67 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/endpoint/EndpointParameters.js +16 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/endpoint/endpointResolver.js +10 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/endpoint/ruleset.js +4 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/extensionConfiguration.js +1 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/index.js +6 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/models/STSServiceException.js +8 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/models/index.js +1 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/models/models_0.js +130 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/protocols/Aws_query.js +885 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/runtimeConfig.browser.js +34 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/runtimeConfig.js +58 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/runtimeConfig.native.js +11 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/runtimeConfig.shared.js +36 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/runtimeExtensions.js +21 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/STS.d.ts +71 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/STSClient.d.ts +182 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/auth/httpAuthExtensionConfiguration.d.ts +29 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/auth/httpAuthSchemeProvider.d.ts +71 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleCommand.d.ts +257 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleWithSAMLCommand.d.ts +282 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleWithWebIdentityCommand.d.ts +291 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/DecodeAuthorizationMessageCommand.d.ts +115 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/GetAccessKeyInfoCommand.d.ts +75 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/GetCallerIdentityCommand.d.ts +116 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/GetFederationTokenCommand.d.ts +230 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/GetSessionTokenCommand.d.ts +154 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/index.d.ts +8 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/defaultRoleAssumers.d.ts +23 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/defaultStsRoleAssumers.d.ts +43 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/endpoint/EndpointParameters.d.ts +46 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/endpoint/endpointResolver.d.ts +5 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/endpoint/ruleset.d.ts +2 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/extensionConfiguration.d.ts +9 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/index.d.ts +17 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/models/STSServiceException.d.ts +13 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/models/index.d.ts +1 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/models/models_0.d.ts +1213 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/protocols/Aws_query.d.ts +74 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/runtimeConfig.browser.d.ts +54 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/runtimeConfig.d.ts +52 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/runtimeConfig.native.d.ts +53 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/runtimeConfig.shared.d.ts +32 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/runtimeExtensions.d.ts +17 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/STS.d.ts +143 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/STSClient.d.ts +165 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/auth/httpAuthExtensionConfiguration.d.ts +32 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/auth/httpAuthSchemeProvider.d.ts +54 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/AssumeRoleCommand.d.ts +35 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/AssumeRoleWithSAMLCommand.d.ts +39 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/AssumeRoleWithWebIdentityCommand.d.ts +39 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/DecodeAuthorizationMessageCommand.d.ts +39 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/GetAccessKeyInfoCommand.d.ts +38 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/GetCallerIdentityCommand.d.ts +39 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/GetFederationTokenCommand.d.ts +39 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/GetSessionTokenCommand.d.ts +38 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/index.d.ts +8 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/defaultRoleAssumers.d.ts +19 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/defaultStsRoleAssumers.d.ts +33 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/endpoint/EndpointParameters.d.ts +57 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/endpoint/endpointResolver.d.ts +8 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/endpoint/ruleset.d.ts +2 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/extensionConfiguration.d.ts +9 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/index.d.ts +9 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/models/STSServiceException.d.ts +8 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/models/index.d.ts +1 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/models/models_0.d.ts +206 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/protocols/Aws_query.d.ts +101 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/runtimeConfig.browser.d.ts +116 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/runtimeConfig.d.ts +109 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/runtimeConfig.native.d.ts +110 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/runtimeConfig.shared.d.ts +51 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/runtimeExtensions.d.ts +11 -0
- package/node_modules/@aws-sdk/client-sts/package.json +102 -0
- package/node_modules/@aws-sdk/credential-provider-env/package.json +2 -2
- package/node_modules/@aws-sdk/credential-provider-http/package.json +2 -2
- package/node_modules/@aws-sdk/credential-provider-ini/package.json +7 -7
- package/node_modules/@aws-sdk/credential-provider-node/package.json +8 -8
- package/node_modules/@aws-sdk/credential-provider-process/package.json +2 -2
- package/node_modules/@aws-sdk/credential-provider-sso/package.json +4 -4
- package/node_modules/@aws-sdk/credential-provider-web-identity/package.json +3 -3
- package/node_modules/@aws-sdk/middleware-logger/package.json +2 -2
- package/node_modules/@aws-sdk/token-providers/package.json +3 -3
- package/node_modules/@aws-sdk/util-locate-window/package.json +2 -2
- package/node_modules/@aws-sdk/util-user-agent-node/package.json +2 -2
- package/package.json +3 -3
@@ -0,0 +1,1457 @@
|
|
1
|
+
"use strict";
|
2
|
+
var __defProp = Object.defineProperty;
|
3
|
+
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
|
4
|
+
var __getOwnPropNames = Object.getOwnPropertyNames;
|
5
|
+
var __hasOwnProp = Object.prototype.hasOwnProperty;
|
6
|
+
var __name = (target, value) => __defProp(target, "name", { value, configurable: true });
|
7
|
+
var __export = (target, all) => {
|
8
|
+
for (var name in all)
|
9
|
+
__defProp(target, name, { get: all[name], enumerable: true });
|
10
|
+
};
|
11
|
+
var __copyProps = (to, from, except, desc) => {
|
12
|
+
if (from && typeof from === "object" || typeof from === "function") {
|
13
|
+
for (let key of __getOwnPropNames(from))
|
14
|
+
if (!__hasOwnProp.call(to, key) && key !== except)
|
15
|
+
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
|
16
|
+
}
|
17
|
+
return to;
|
18
|
+
};
|
19
|
+
var __reExport = (target, mod, secondTarget) => (__copyProps(target, mod, "default"), secondTarget && __copyProps(secondTarget, mod, "default"));
|
20
|
+
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
21
|
+
|
22
|
+
// src/index.ts
|
23
|
+
var src_exports = {};
|
24
|
+
__export(src_exports, {
|
25
|
+
AssumeRoleCommand: () => AssumeRoleCommand,
|
26
|
+
AssumeRoleResponseFilterSensitiveLog: () => AssumeRoleResponseFilterSensitiveLog,
|
27
|
+
AssumeRoleWithSAMLCommand: () => AssumeRoleWithSAMLCommand,
|
28
|
+
AssumeRoleWithSAMLRequestFilterSensitiveLog: () => AssumeRoleWithSAMLRequestFilterSensitiveLog,
|
29
|
+
AssumeRoleWithSAMLResponseFilterSensitiveLog: () => AssumeRoleWithSAMLResponseFilterSensitiveLog,
|
30
|
+
AssumeRoleWithWebIdentityCommand: () => AssumeRoleWithWebIdentityCommand,
|
31
|
+
AssumeRoleWithWebIdentityRequestFilterSensitiveLog: () => AssumeRoleWithWebIdentityRequestFilterSensitiveLog,
|
32
|
+
AssumeRoleWithWebIdentityResponseFilterSensitiveLog: () => AssumeRoleWithWebIdentityResponseFilterSensitiveLog,
|
33
|
+
ClientInputEndpointParameters: () => import_EndpointParameters9.ClientInputEndpointParameters,
|
34
|
+
CredentialsFilterSensitiveLog: () => CredentialsFilterSensitiveLog,
|
35
|
+
DecodeAuthorizationMessageCommand: () => DecodeAuthorizationMessageCommand,
|
36
|
+
ExpiredTokenException: () => ExpiredTokenException,
|
37
|
+
GetAccessKeyInfoCommand: () => GetAccessKeyInfoCommand,
|
38
|
+
GetCallerIdentityCommand: () => GetCallerIdentityCommand,
|
39
|
+
GetFederationTokenCommand: () => GetFederationTokenCommand,
|
40
|
+
GetFederationTokenResponseFilterSensitiveLog: () => GetFederationTokenResponseFilterSensitiveLog,
|
41
|
+
GetSessionTokenCommand: () => GetSessionTokenCommand,
|
42
|
+
GetSessionTokenResponseFilterSensitiveLog: () => GetSessionTokenResponseFilterSensitiveLog,
|
43
|
+
IDPCommunicationErrorException: () => IDPCommunicationErrorException,
|
44
|
+
IDPRejectedClaimException: () => IDPRejectedClaimException,
|
45
|
+
InvalidAuthorizationMessageException: () => InvalidAuthorizationMessageException,
|
46
|
+
InvalidIdentityTokenException: () => InvalidIdentityTokenException,
|
47
|
+
MalformedPolicyDocumentException: () => MalformedPolicyDocumentException,
|
48
|
+
PackedPolicyTooLargeException: () => PackedPolicyTooLargeException,
|
49
|
+
RegionDisabledException: () => RegionDisabledException,
|
50
|
+
RuntimeExtension: () => import_runtimeExtensions.RuntimeExtension,
|
51
|
+
STS: () => STS,
|
52
|
+
STSServiceException: () => STSServiceException,
|
53
|
+
decorateDefaultCredentialProvider: () => decorateDefaultCredentialProvider,
|
54
|
+
getDefaultRoleAssumer: () => getDefaultRoleAssumer2,
|
55
|
+
getDefaultRoleAssumerWithWebIdentity: () => getDefaultRoleAssumerWithWebIdentity2
|
56
|
+
});
|
57
|
+
module.exports = __toCommonJS(src_exports);
|
58
|
+
__reExport(src_exports, require("././STSClient"), module.exports);
|
59
|
+
|
60
|
+
// src/STS.ts
|
61
|
+
|
62
|
+
|
63
|
+
// src/commands/AssumeRoleCommand.ts
|
64
|
+
var import_middleware_endpoint = require("@smithy/middleware-endpoint");
|
65
|
+
var import_middleware_serde = require("@smithy/middleware-serde");
|
66
|
+
|
67
|
+
var import_types = require("@smithy/types");
|
68
|
+
var import_EndpointParameters = require("./endpoint/EndpointParameters");
|
69
|
+
|
70
|
+
// src/models/models_0.ts
|
71
|
+
|
72
|
+
|
73
|
+
// src/models/STSServiceException.ts
|
74
|
+
var import_smithy_client = require("@smithy/smithy-client");
|
75
|
+
var _STSServiceException = class _STSServiceException extends import_smithy_client.ServiceException {
|
76
|
+
/**
|
77
|
+
* @internal
|
78
|
+
*/
|
79
|
+
constructor(options) {
|
80
|
+
super(options);
|
81
|
+
Object.setPrototypeOf(this, _STSServiceException.prototype);
|
82
|
+
}
|
83
|
+
};
|
84
|
+
__name(_STSServiceException, "STSServiceException");
|
85
|
+
var STSServiceException = _STSServiceException;
|
86
|
+
|
87
|
+
// src/models/models_0.ts
|
88
|
+
var _ExpiredTokenException = class _ExpiredTokenException extends STSServiceException {
|
89
|
+
/**
|
90
|
+
* @internal
|
91
|
+
*/
|
92
|
+
constructor(opts) {
|
93
|
+
super({
|
94
|
+
name: "ExpiredTokenException",
|
95
|
+
$fault: "client",
|
96
|
+
...opts
|
97
|
+
});
|
98
|
+
this.name = "ExpiredTokenException";
|
99
|
+
this.$fault = "client";
|
100
|
+
Object.setPrototypeOf(this, _ExpiredTokenException.prototype);
|
101
|
+
}
|
102
|
+
};
|
103
|
+
__name(_ExpiredTokenException, "ExpiredTokenException");
|
104
|
+
var ExpiredTokenException = _ExpiredTokenException;
|
105
|
+
var _MalformedPolicyDocumentException = class _MalformedPolicyDocumentException extends STSServiceException {
|
106
|
+
/**
|
107
|
+
* @internal
|
108
|
+
*/
|
109
|
+
constructor(opts) {
|
110
|
+
super({
|
111
|
+
name: "MalformedPolicyDocumentException",
|
112
|
+
$fault: "client",
|
113
|
+
...opts
|
114
|
+
});
|
115
|
+
this.name = "MalformedPolicyDocumentException";
|
116
|
+
this.$fault = "client";
|
117
|
+
Object.setPrototypeOf(this, _MalformedPolicyDocumentException.prototype);
|
118
|
+
}
|
119
|
+
};
|
120
|
+
__name(_MalformedPolicyDocumentException, "MalformedPolicyDocumentException");
|
121
|
+
var MalformedPolicyDocumentException = _MalformedPolicyDocumentException;
|
122
|
+
var _PackedPolicyTooLargeException = class _PackedPolicyTooLargeException extends STSServiceException {
|
123
|
+
/**
|
124
|
+
* @internal
|
125
|
+
*/
|
126
|
+
constructor(opts) {
|
127
|
+
super({
|
128
|
+
name: "PackedPolicyTooLargeException",
|
129
|
+
$fault: "client",
|
130
|
+
...opts
|
131
|
+
});
|
132
|
+
this.name = "PackedPolicyTooLargeException";
|
133
|
+
this.$fault = "client";
|
134
|
+
Object.setPrototypeOf(this, _PackedPolicyTooLargeException.prototype);
|
135
|
+
}
|
136
|
+
};
|
137
|
+
__name(_PackedPolicyTooLargeException, "PackedPolicyTooLargeException");
|
138
|
+
var PackedPolicyTooLargeException = _PackedPolicyTooLargeException;
|
139
|
+
var _RegionDisabledException = class _RegionDisabledException extends STSServiceException {
|
140
|
+
/**
|
141
|
+
* @internal
|
142
|
+
*/
|
143
|
+
constructor(opts) {
|
144
|
+
super({
|
145
|
+
name: "RegionDisabledException",
|
146
|
+
$fault: "client",
|
147
|
+
...opts
|
148
|
+
});
|
149
|
+
this.name = "RegionDisabledException";
|
150
|
+
this.$fault = "client";
|
151
|
+
Object.setPrototypeOf(this, _RegionDisabledException.prototype);
|
152
|
+
}
|
153
|
+
};
|
154
|
+
__name(_RegionDisabledException, "RegionDisabledException");
|
155
|
+
var RegionDisabledException = _RegionDisabledException;
|
156
|
+
var _IDPRejectedClaimException = class _IDPRejectedClaimException extends STSServiceException {
|
157
|
+
/**
|
158
|
+
* @internal
|
159
|
+
*/
|
160
|
+
constructor(opts) {
|
161
|
+
super({
|
162
|
+
name: "IDPRejectedClaimException",
|
163
|
+
$fault: "client",
|
164
|
+
...opts
|
165
|
+
});
|
166
|
+
this.name = "IDPRejectedClaimException";
|
167
|
+
this.$fault = "client";
|
168
|
+
Object.setPrototypeOf(this, _IDPRejectedClaimException.prototype);
|
169
|
+
}
|
170
|
+
};
|
171
|
+
__name(_IDPRejectedClaimException, "IDPRejectedClaimException");
|
172
|
+
var IDPRejectedClaimException = _IDPRejectedClaimException;
|
173
|
+
var _InvalidIdentityTokenException = class _InvalidIdentityTokenException extends STSServiceException {
|
174
|
+
/**
|
175
|
+
* @internal
|
176
|
+
*/
|
177
|
+
constructor(opts) {
|
178
|
+
super({
|
179
|
+
name: "InvalidIdentityTokenException",
|
180
|
+
$fault: "client",
|
181
|
+
...opts
|
182
|
+
});
|
183
|
+
this.name = "InvalidIdentityTokenException";
|
184
|
+
this.$fault = "client";
|
185
|
+
Object.setPrototypeOf(this, _InvalidIdentityTokenException.prototype);
|
186
|
+
}
|
187
|
+
};
|
188
|
+
__name(_InvalidIdentityTokenException, "InvalidIdentityTokenException");
|
189
|
+
var InvalidIdentityTokenException = _InvalidIdentityTokenException;
|
190
|
+
var _IDPCommunicationErrorException = class _IDPCommunicationErrorException extends STSServiceException {
|
191
|
+
/**
|
192
|
+
* @internal
|
193
|
+
*/
|
194
|
+
constructor(opts) {
|
195
|
+
super({
|
196
|
+
name: "IDPCommunicationErrorException",
|
197
|
+
$fault: "client",
|
198
|
+
...opts
|
199
|
+
});
|
200
|
+
this.name = "IDPCommunicationErrorException";
|
201
|
+
this.$fault = "client";
|
202
|
+
Object.setPrototypeOf(this, _IDPCommunicationErrorException.prototype);
|
203
|
+
}
|
204
|
+
};
|
205
|
+
__name(_IDPCommunicationErrorException, "IDPCommunicationErrorException");
|
206
|
+
var IDPCommunicationErrorException = _IDPCommunicationErrorException;
|
207
|
+
var _InvalidAuthorizationMessageException = class _InvalidAuthorizationMessageException extends STSServiceException {
|
208
|
+
/**
|
209
|
+
* @internal
|
210
|
+
*/
|
211
|
+
constructor(opts) {
|
212
|
+
super({
|
213
|
+
name: "InvalidAuthorizationMessageException",
|
214
|
+
$fault: "client",
|
215
|
+
...opts
|
216
|
+
});
|
217
|
+
this.name = "InvalidAuthorizationMessageException";
|
218
|
+
this.$fault = "client";
|
219
|
+
Object.setPrototypeOf(this, _InvalidAuthorizationMessageException.prototype);
|
220
|
+
}
|
221
|
+
};
|
222
|
+
__name(_InvalidAuthorizationMessageException, "InvalidAuthorizationMessageException");
|
223
|
+
var InvalidAuthorizationMessageException = _InvalidAuthorizationMessageException;
|
224
|
+
var CredentialsFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
225
|
+
...obj,
|
226
|
+
...obj.SecretAccessKey && { SecretAccessKey: import_smithy_client.SENSITIVE_STRING }
|
227
|
+
}), "CredentialsFilterSensitiveLog");
|
228
|
+
var AssumeRoleResponseFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
229
|
+
...obj,
|
230
|
+
...obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }
|
231
|
+
}), "AssumeRoleResponseFilterSensitiveLog");
|
232
|
+
var AssumeRoleWithSAMLRequestFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
233
|
+
...obj,
|
234
|
+
...obj.SAMLAssertion && { SAMLAssertion: import_smithy_client.SENSITIVE_STRING }
|
235
|
+
}), "AssumeRoleWithSAMLRequestFilterSensitiveLog");
|
236
|
+
var AssumeRoleWithSAMLResponseFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
237
|
+
...obj,
|
238
|
+
...obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }
|
239
|
+
}), "AssumeRoleWithSAMLResponseFilterSensitiveLog");
|
240
|
+
var AssumeRoleWithWebIdentityRequestFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
241
|
+
...obj,
|
242
|
+
...obj.WebIdentityToken && { WebIdentityToken: import_smithy_client.SENSITIVE_STRING }
|
243
|
+
}), "AssumeRoleWithWebIdentityRequestFilterSensitiveLog");
|
244
|
+
var AssumeRoleWithWebIdentityResponseFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
245
|
+
...obj,
|
246
|
+
...obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }
|
247
|
+
}), "AssumeRoleWithWebIdentityResponseFilterSensitiveLog");
|
248
|
+
var GetFederationTokenResponseFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
249
|
+
...obj,
|
250
|
+
...obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }
|
251
|
+
}), "GetFederationTokenResponseFilterSensitiveLog");
|
252
|
+
var GetSessionTokenResponseFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
253
|
+
...obj,
|
254
|
+
...obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }
|
255
|
+
}), "GetSessionTokenResponseFilterSensitiveLog");
|
256
|
+
|
257
|
+
// src/protocols/Aws_query.ts
|
258
|
+
var import_core = require("@aws-sdk/core");
|
259
|
+
var import_protocol_http = require("@smithy/protocol-http");
|
260
|
+
|
261
|
+
var se_AssumeRoleCommand = /* @__PURE__ */ __name(async (input, context) => {
|
262
|
+
const headers = SHARED_HEADERS;
|
263
|
+
let body;
|
264
|
+
body = buildFormUrlencodedString({
|
265
|
+
...se_AssumeRoleRequest(input, context),
|
266
|
+
[_A]: _AR,
|
267
|
+
[_V]: _
|
268
|
+
});
|
269
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
270
|
+
}, "se_AssumeRoleCommand");
|
271
|
+
var se_AssumeRoleWithSAMLCommand = /* @__PURE__ */ __name(async (input, context) => {
|
272
|
+
const headers = SHARED_HEADERS;
|
273
|
+
let body;
|
274
|
+
body = buildFormUrlencodedString({
|
275
|
+
...se_AssumeRoleWithSAMLRequest(input, context),
|
276
|
+
[_A]: _ARWSAML,
|
277
|
+
[_V]: _
|
278
|
+
});
|
279
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
280
|
+
}, "se_AssumeRoleWithSAMLCommand");
|
281
|
+
var se_AssumeRoleWithWebIdentityCommand = /* @__PURE__ */ __name(async (input, context) => {
|
282
|
+
const headers = SHARED_HEADERS;
|
283
|
+
let body;
|
284
|
+
body = buildFormUrlencodedString({
|
285
|
+
...se_AssumeRoleWithWebIdentityRequest(input, context),
|
286
|
+
[_A]: _ARWWI,
|
287
|
+
[_V]: _
|
288
|
+
});
|
289
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
290
|
+
}, "se_AssumeRoleWithWebIdentityCommand");
|
291
|
+
var se_DecodeAuthorizationMessageCommand = /* @__PURE__ */ __name(async (input, context) => {
|
292
|
+
const headers = SHARED_HEADERS;
|
293
|
+
let body;
|
294
|
+
body = buildFormUrlencodedString({
|
295
|
+
...se_DecodeAuthorizationMessageRequest(input, context),
|
296
|
+
[_A]: _DAM,
|
297
|
+
[_V]: _
|
298
|
+
});
|
299
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
300
|
+
}, "se_DecodeAuthorizationMessageCommand");
|
301
|
+
var se_GetAccessKeyInfoCommand = /* @__PURE__ */ __name(async (input, context) => {
|
302
|
+
const headers = SHARED_HEADERS;
|
303
|
+
let body;
|
304
|
+
body = buildFormUrlencodedString({
|
305
|
+
...se_GetAccessKeyInfoRequest(input, context),
|
306
|
+
[_A]: _GAKI,
|
307
|
+
[_V]: _
|
308
|
+
});
|
309
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
310
|
+
}, "se_GetAccessKeyInfoCommand");
|
311
|
+
var se_GetCallerIdentityCommand = /* @__PURE__ */ __name(async (input, context) => {
|
312
|
+
const headers = SHARED_HEADERS;
|
313
|
+
let body;
|
314
|
+
body = buildFormUrlencodedString({
|
315
|
+
...se_GetCallerIdentityRequest(input, context),
|
316
|
+
[_A]: _GCI,
|
317
|
+
[_V]: _
|
318
|
+
});
|
319
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
320
|
+
}, "se_GetCallerIdentityCommand");
|
321
|
+
var se_GetFederationTokenCommand = /* @__PURE__ */ __name(async (input, context) => {
|
322
|
+
const headers = SHARED_HEADERS;
|
323
|
+
let body;
|
324
|
+
body = buildFormUrlencodedString({
|
325
|
+
...se_GetFederationTokenRequest(input, context),
|
326
|
+
[_A]: _GFT,
|
327
|
+
[_V]: _
|
328
|
+
});
|
329
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
330
|
+
}, "se_GetFederationTokenCommand");
|
331
|
+
var se_GetSessionTokenCommand = /* @__PURE__ */ __name(async (input, context) => {
|
332
|
+
const headers = SHARED_HEADERS;
|
333
|
+
let body;
|
334
|
+
body = buildFormUrlencodedString({
|
335
|
+
...se_GetSessionTokenRequest(input, context),
|
336
|
+
[_A]: _GST,
|
337
|
+
[_V]: _
|
338
|
+
});
|
339
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
340
|
+
}, "se_GetSessionTokenCommand");
|
341
|
+
var de_AssumeRoleCommand = /* @__PURE__ */ __name(async (output, context) => {
|
342
|
+
if (output.statusCode >= 300) {
|
343
|
+
return de_CommandError(output, context);
|
344
|
+
}
|
345
|
+
const data = await (0, import_core.parseXmlBody)(output.body, context);
|
346
|
+
let contents = {};
|
347
|
+
contents = de_AssumeRoleResponse(data.AssumeRoleResult, context);
|
348
|
+
const response = {
|
349
|
+
$metadata: deserializeMetadata(output),
|
350
|
+
...contents
|
351
|
+
};
|
352
|
+
return response;
|
353
|
+
}, "de_AssumeRoleCommand");
|
354
|
+
var de_AssumeRoleWithSAMLCommand = /* @__PURE__ */ __name(async (output, context) => {
|
355
|
+
if (output.statusCode >= 300) {
|
356
|
+
return de_CommandError(output, context);
|
357
|
+
}
|
358
|
+
const data = await (0, import_core.parseXmlBody)(output.body, context);
|
359
|
+
let contents = {};
|
360
|
+
contents = de_AssumeRoleWithSAMLResponse(data.AssumeRoleWithSAMLResult, context);
|
361
|
+
const response = {
|
362
|
+
$metadata: deserializeMetadata(output),
|
363
|
+
...contents
|
364
|
+
};
|
365
|
+
return response;
|
366
|
+
}, "de_AssumeRoleWithSAMLCommand");
|
367
|
+
var de_AssumeRoleWithWebIdentityCommand = /* @__PURE__ */ __name(async (output, context) => {
|
368
|
+
if (output.statusCode >= 300) {
|
369
|
+
return de_CommandError(output, context);
|
370
|
+
}
|
371
|
+
const data = await (0, import_core.parseXmlBody)(output.body, context);
|
372
|
+
let contents = {};
|
373
|
+
contents = de_AssumeRoleWithWebIdentityResponse(data.AssumeRoleWithWebIdentityResult, context);
|
374
|
+
const response = {
|
375
|
+
$metadata: deserializeMetadata(output),
|
376
|
+
...contents
|
377
|
+
};
|
378
|
+
return response;
|
379
|
+
}, "de_AssumeRoleWithWebIdentityCommand");
|
380
|
+
var de_DecodeAuthorizationMessageCommand = /* @__PURE__ */ __name(async (output, context) => {
|
381
|
+
if (output.statusCode >= 300) {
|
382
|
+
return de_CommandError(output, context);
|
383
|
+
}
|
384
|
+
const data = await (0, import_core.parseXmlBody)(output.body, context);
|
385
|
+
let contents = {};
|
386
|
+
contents = de_DecodeAuthorizationMessageResponse(data.DecodeAuthorizationMessageResult, context);
|
387
|
+
const response = {
|
388
|
+
$metadata: deserializeMetadata(output),
|
389
|
+
...contents
|
390
|
+
};
|
391
|
+
return response;
|
392
|
+
}, "de_DecodeAuthorizationMessageCommand");
|
393
|
+
var de_GetAccessKeyInfoCommand = /* @__PURE__ */ __name(async (output, context) => {
|
394
|
+
if (output.statusCode >= 300) {
|
395
|
+
return de_CommandError(output, context);
|
396
|
+
}
|
397
|
+
const data = await (0, import_core.parseXmlBody)(output.body, context);
|
398
|
+
let contents = {};
|
399
|
+
contents = de_GetAccessKeyInfoResponse(data.GetAccessKeyInfoResult, context);
|
400
|
+
const response = {
|
401
|
+
$metadata: deserializeMetadata(output),
|
402
|
+
...contents
|
403
|
+
};
|
404
|
+
return response;
|
405
|
+
}, "de_GetAccessKeyInfoCommand");
|
406
|
+
var de_GetCallerIdentityCommand = /* @__PURE__ */ __name(async (output, context) => {
|
407
|
+
if (output.statusCode >= 300) {
|
408
|
+
return de_CommandError(output, context);
|
409
|
+
}
|
410
|
+
const data = await (0, import_core.parseXmlBody)(output.body, context);
|
411
|
+
let contents = {};
|
412
|
+
contents = de_GetCallerIdentityResponse(data.GetCallerIdentityResult, context);
|
413
|
+
const response = {
|
414
|
+
$metadata: deserializeMetadata(output),
|
415
|
+
...contents
|
416
|
+
};
|
417
|
+
return response;
|
418
|
+
}, "de_GetCallerIdentityCommand");
|
419
|
+
var de_GetFederationTokenCommand = /* @__PURE__ */ __name(async (output, context) => {
|
420
|
+
if (output.statusCode >= 300) {
|
421
|
+
return de_CommandError(output, context);
|
422
|
+
}
|
423
|
+
const data = await (0, import_core.parseXmlBody)(output.body, context);
|
424
|
+
let contents = {};
|
425
|
+
contents = de_GetFederationTokenResponse(data.GetFederationTokenResult, context);
|
426
|
+
const response = {
|
427
|
+
$metadata: deserializeMetadata(output),
|
428
|
+
...contents
|
429
|
+
};
|
430
|
+
return response;
|
431
|
+
}, "de_GetFederationTokenCommand");
|
432
|
+
var de_GetSessionTokenCommand = /* @__PURE__ */ __name(async (output, context) => {
|
433
|
+
if (output.statusCode >= 300) {
|
434
|
+
return de_CommandError(output, context);
|
435
|
+
}
|
436
|
+
const data = await (0, import_core.parseXmlBody)(output.body, context);
|
437
|
+
let contents = {};
|
438
|
+
contents = de_GetSessionTokenResponse(data.GetSessionTokenResult, context);
|
439
|
+
const response = {
|
440
|
+
$metadata: deserializeMetadata(output),
|
441
|
+
...contents
|
442
|
+
};
|
443
|
+
return response;
|
444
|
+
}, "de_GetSessionTokenCommand");
|
445
|
+
var de_CommandError = /* @__PURE__ */ __name(async (output, context) => {
|
446
|
+
const parsedOutput = {
|
447
|
+
...output,
|
448
|
+
body: await (0, import_core.parseXmlErrorBody)(output.body, context)
|
449
|
+
};
|
450
|
+
const errorCode = loadQueryErrorCode(output, parsedOutput.body);
|
451
|
+
switch (errorCode) {
|
452
|
+
case "ExpiredTokenException":
|
453
|
+
case "com.amazonaws.sts#ExpiredTokenException":
|
454
|
+
throw await de_ExpiredTokenExceptionRes(parsedOutput, context);
|
455
|
+
case "MalformedPolicyDocument":
|
456
|
+
case "com.amazonaws.sts#MalformedPolicyDocumentException":
|
457
|
+
throw await de_MalformedPolicyDocumentExceptionRes(parsedOutput, context);
|
458
|
+
case "PackedPolicyTooLarge":
|
459
|
+
case "com.amazonaws.sts#PackedPolicyTooLargeException":
|
460
|
+
throw await de_PackedPolicyTooLargeExceptionRes(parsedOutput, context);
|
461
|
+
case "RegionDisabledException":
|
462
|
+
case "com.amazonaws.sts#RegionDisabledException":
|
463
|
+
throw await de_RegionDisabledExceptionRes(parsedOutput, context);
|
464
|
+
case "IDPRejectedClaim":
|
465
|
+
case "com.amazonaws.sts#IDPRejectedClaimException":
|
466
|
+
throw await de_IDPRejectedClaimExceptionRes(parsedOutput, context);
|
467
|
+
case "InvalidIdentityToken":
|
468
|
+
case "com.amazonaws.sts#InvalidIdentityTokenException":
|
469
|
+
throw await de_InvalidIdentityTokenExceptionRes(parsedOutput, context);
|
470
|
+
case "IDPCommunicationError":
|
471
|
+
case "com.amazonaws.sts#IDPCommunicationErrorException":
|
472
|
+
throw await de_IDPCommunicationErrorExceptionRes(parsedOutput, context);
|
473
|
+
case "InvalidAuthorizationMessageException":
|
474
|
+
case "com.amazonaws.sts#InvalidAuthorizationMessageException":
|
475
|
+
throw await de_InvalidAuthorizationMessageExceptionRes(parsedOutput, context);
|
476
|
+
default:
|
477
|
+
const parsedBody = parsedOutput.body;
|
478
|
+
return throwDefaultError({
|
479
|
+
output,
|
480
|
+
parsedBody: parsedBody.Error,
|
481
|
+
errorCode
|
482
|
+
});
|
483
|
+
}
|
484
|
+
}, "de_CommandError");
|
485
|
+
var de_ExpiredTokenExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
486
|
+
const body = parsedOutput.body;
|
487
|
+
const deserialized = de_ExpiredTokenException(body.Error, context);
|
488
|
+
const exception = new ExpiredTokenException({
|
489
|
+
$metadata: deserializeMetadata(parsedOutput),
|
490
|
+
...deserialized
|
491
|
+
});
|
492
|
+
return (0, import_smithy_client.decorateServiceException)(exception, body);
|
493
|
+
}, "de_ExpiredTokenExceptionRes");
|
494
|
+
var de_IDPCommunicationErrorExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
495
|
+
const body = parsedOutput.body;
|
496
|
+
const deserialized = de_IDPCommunicationErrorException(body.Error, context);
|
497
|
+
const exception = new IDPCommunicationErrorException({
|
498
|
+
$metadata: deserializeMetadata(parsedOutput),
|
499
|
+
...deserialized
|
500
|
+
});
|
501
|
+
return (0, import_smithy_client.decorateServiceException)(exception, body);
|
502
|
+
}, "de_IDPCommunicationErrorExceptionRes");
|
503
|
+
var de_IDPRejectedClaimExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
504
|
+
const body = parsedOutput.body;
|
505
|
+
const deserialized = de_IDPRejectedClaimException(body.Error, context);
|
506
|
+
const exception = new IDPRejectedClaimException({
|
507
|
+
$metadata: deserializeMetadata(parsedOutput),
|
508
|
+
...deserialized
|
509
|
+
});
|
510
|
+
return (0, import_smithy_client.decorateServiceException)(exception, body);
|
511
|
+
}, "de_IDPRejectedClaimExceptionRes");
|
512
|
+
var de_InvalidAuthorizationMessageExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
513
|
+
const body = parsedOutput.body;
|
514
|
+
const deserialized = de_InvalidAuthorizationMessageException(body.Error, context);
|
515
|
+
const exception = new InvalidAuthorizationMessageException({
|
516
|
+
$metadata: deserializeMetadata(parsedOutput),
|
517
|
+
...deserialized
|
518
|
+
});
|
519
|
+
return (0, import_smithy_client.decorateServiceException)(exception, body);
|
520
|
+
}, "de_InvalidAuthorizationMessageExceptionRes");
|
521
|
+
var de_InvalidIdentityTokenExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
522
|
+
const body = parsedOutput.body;
|
523
|
+
const deserialized = de_InvalidIdentityTokenException(body.Error, context);
|
524
|
+
const exception = new InvalidIdentityTokenException({
|
525
|
+
$metadata: deserializeMetadata(parsedOutput),
|
526
|
+
...deserialized
|
527
|
+
});
|
528
|
+
return (0, import_smithy_client.decorateServiceException)(exception, body);
|
529
|
+
}, "de_InvalidIdentityTokenExceptionRes");
|
530
|
+
var de_MalformedPolicyDocumentExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
531
|
+
const body = parsedOutput.body;
|
532
|
+
const deserialized = de_MalformedPolicyDocumentException(body.Error, context);
|
533
|
+
const exception = new MalformedPolicyDocumentException({
|
534
|
+
$metadata: deserializeMetadata(parsedOutput),
|
535
|
+
...deserialized
|
536
|
+
});
|
537
|
+
return (0, import_smithy_client.decorateServiceException)(exception, body);
|
538
|
+
}, "de_MalformedPolicyDocumentExceptionRes");
|
539
|
+
var de_PackedPolicyTooLargeExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
540
|
+
const body = parsedOutput.body;
|
541
|
+
const deserialized = de_PackedPolicyTooLargeException(body.Error, context);
|
542
|
+
const exception = new PackedPolicyTooLargeException({
|
543
|
+
$metadata: deserializeMetadata(parsedOutput),
|
544
|
+
...deserialized
|
545
|
+
});
|
546
|
+
return (0, import_smithy_client.decorateServiceException)(exception, body);
|
547
|
+
}, "de_PackedPolicyTooLargeExceptionRes");
|
548
|
+
var de_RegionDisabledExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
549
|
+
const body = parsedOutput.body;
|
550
|
+
const deserialized = de_RegionDisabledException(body.Error, context);
|
551
|
+
const exception = new RegionDisabledException({
|
552
|
+
$metadata: deserializeMetadata(parsedOutput),
|
553
|
+
...deserialized
|
554
|
+
});
|
555
|
+
return (0, import_smithy_client.decorateServiceException)(exception, body);
|
556
|
+
}, "de_RegionDisabledExceptionRes");
|
557
|
+
var se_AssumeRoleRequest = /* @__PURE__ */ __name((input, context) => {
|
558
|
+
var _a2, _b, _c, _d;
|
559
|
+
const entries = {};
|
560
|
+
if (input[_RA] != null) {
|
561
|
+
entries[_RA] = input[_RA];
|
562
|
+
}
|
563
|
+
if (input[_RSN] != null) {
|
564
|
+
entries[_RSN] = input[_RSN];
|
565
|
+
}
|
566
|
+
if (input[_PA] != null) {
|
567
|
+
const memberEntries = se_policyDescriptorListType(input[_PA], context);
|
568
|
+
if (((_a2 = input[_PA]) == null ? void 0 : _a2.length) === 0) {
|
569
|
+
entries.PolicyArns = [];
|
570
|
+
}
|
571
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
572
|
+
const loc = `PolicyArns.${key}`;
|
573
|
+
entries[loc] = value;
|
574
|
+
});
|
575
|
+
}
|
576
|
+
if (input[_P] != null) {
|
577
|
+
entries[_P] = input[_P];
|
578
|
+
}
|
579
|
+
if (input[_DS] != null) {
|
580
|
+
entries[_DS] = input[_DS];
|
581
|
+
}
|
582
|
+
if (input[_T] != null) {
|
583
|
+
const memberEntries = se_tagListType(input[_T], context);
|
584
|
+
if (((_b = input[_T]) == null ? void 0 : _b.length) === 0) {
|
585
|
+
entries.Tags = [];
|
586
|
+
}
|
587
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
588
|
+
const loc = `Tags.${key}`;
|
589
|
+
entries[loc] = value;
|
590
|
+
});
|
591
|
+
}
|
592
|
+
if (input[_TTK] != null) {
|
593
|
+
const memberEntries = se_tagKeyListType(input[_TTK], context);
|
594
|
+
if (((_c = input[_TTK]) == null ? void 0 : _c.length) === 0) {
|
595
|
+
entries.TransitiveTagKeys = [];
|
596
|
+
}
|
597
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
598
|
+
const loc = `TransitiveTagKeys.${key}`;
|
599
|
+
entries[loc] = value;
|
600
|
+
});
|
601
|
+
}
|
602
|
+
if (input[_EI] != null) {
|
603
|
+
entries[_EI] = input[_EI];
|
604
|
+
}
|
605
|
+
if (input[_SN] != null) {
|
606
|
+
entries[_SN] = input[_SN];
|
607
|
+
}
|
608
|
+
if (input[_TC] != null) {
|
609
|
+
entries[_TC] = input[_TC];
|
610
|
+
}
|
611
|
+
if (input[_SI] != null) {
|
612
|
+
entries[_SI] = input[_SI];
|
613
|
+
}
|
614
|
+
if (input[_PC] != null) {
|
615
|
+
const memberEntries = se_ProvidedContextsListType(input[_PC], context);
|
616
|
+
if (((_d = input[_PC]) == null ? void 0 : _d.length) === 0) {
|
617
|
+
entries.ProvidedContexts = [];
|
618
|
+
}
|
619
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
620
|
+
const loc = `ProvidedContexts.${key}`;
|
621
|
+
entries[loc] = value;
|
622
|
+
});
|
623
|
+
}
|
624
|
+
return entries;
|
625
|
+
}, "se_AssumeRoleRequest");
|
626
|
+
var se_AssumeRoleWithSAMLRequest = /* @__PURE__ */ __name((input, context) => {
|
627
|
+
var _a2;
|
628
|
+
const entries = {};
|
629
|
+
if (input[_RA] != null) {
|
630
|
+
entries[_RA] = input[_RA];
|
631
|
+
}
|
632
|
+
if (input[_PAr] != null) {
|
633
|
+
entries[_PAr] = input[_PAr];
|
634
|
+
}
|
635
|
+
if (input[_SAMLA] != null) {
|
636
|
+
entries[_SAMLA] = input[_SAMLA];
|
637
|
+
}
|
638
|
+
if (input[_PA] != null) {
|
639
|
+
const memberEntries = se_policyDescriptorListType(input[_PA], context);
|
640
|
+
if (((_a2 = input[_PA]) == null ? void 0 : _a2.length) === 0) {
|
641
|
+
entries.PolicyArns = [];
|
642
|
+
}
|
643
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
644
|
+
const loc = `PolicyArns.${key}`;
|
645
|
+
entries[loc] = value;
|
646
|
+
});
|
647
|
+
}
|
648
|
+
if (input[_P] != null) {
|
649
|
+
entries[_P] = input[_P];
|
650
|
+
}
|
651
|
+
if (input[_DS] != null) {
|
652
|
+
entries[_DS] = input[_DS];
|
653
|
+
}
|
654
|
+
return entries;
|
655
|
+
}, "se_AssumeRoleWithSAMLRequest");
|
656
|
+
var se_AssumeRoleWithWebIdentityRequest = /* @__PURE__ */ __name((input, context) => {
|
657
|
+
var _a2;
|
658
|
+
const entries = {};
|
659
|
+
if (input[_RA] != null) {
|
660
|
+
entries[_RA] = input[_RA];
|
661
|
+
}
|
662
|
+
if (input[_RSN] != null) {
|
663
|
+
entries[_RSN] = input[_RSN];
|
664
|
+
}
|
665
|
+
if (input[_WIT] != null) {
|
666
|
+
entries[_WIT] = input[_WIT];
|
667
|
+
}
|
668
|
+
if (input[_PI] != null) {
|
669
|
+
entries[_PI] = input[_PI];
|
670
|
+
}
|
671
|
+
if (input[_PA] != null) {
|
672
|
+
const memberEntries = se_policyDescriptorListType(input[_PA], context);
|
673
|
+
if (((_a2 = input[_PA]) == null ? void 0 : _a2.length) === 0) {
|
674
|
+
entries.PolicyArns = [];
|
675
|
+
}
|
676
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
677
|
+
const loc = `PolicyArns.${key}`;
|
678
|
+
entries[loc] = value;
|
679
|
+
});
|
680
|
+
}
|
681
|
+
if (input[_P] != null) {
|
682
|
+
entries[_P] = input[_P];
|
683
|
+
}
|
684
|
+
if (input[_DS] != null) {
|
685
|
+
entries[_DS] = input[_DS];
|
686
|
+
}
|
687
|
+
return entries;
|
688
|
+
}, "se_AssumeRoleWithWebIdentityRequest");
|
689
|
+
var se_DecodeAuthorizationMessageRequest = /* @__PURE__ */ __name((input, context) => {
|
690
|
+
const entries = {};
|
691
|
+
if (input[_EM] != null) {
|
692
|
+
entries[_EM] = input[_EM];
|
693
|
+
}
|
694
|
+
return entries;
|
695
|
+
}, "se_DecodeAuthorizationMessageRequest");
|
696
|
+
var se_GetAccessKeyInfoRequest = /* @__PURE__ */ __name((input, context) => {
|
697
|
+
const entries = {};
|
698
|
+
if (input[_AKI] != null) {
|
699
|
+
entries[_AKI] = input[_AKI];
|
700
|
+
}
|
701
|
+
return entries;
|
702
|
+
}, "se_GetAccessKeyInfoRequest");
|
703
|
+
var se_GetCallerIdentityRequest = /* @__PURE__ */ __name((input, context) => {
|
704
|
+
const entries = {};
|
705
|
+
return entries;
|
706
|
+
}, "se_GetCallerIdentityRequest");
|
707
|
+
var se_GetFederationTokenRequest = /* @__PURE__ */ __name((input, context) => {
|
708
|
+
var _a2, _b;
|
709
|
+
const entries = {};
|
710
|
+
if (input[_N] != null) {
|
711
|
+
entries[_N] = input[_N];
|
712
|
+
}
|
713
|
+
if (input[_P] != null) {
|
714
|
+
entries[_P] = input[_P];
|
715
|
+
}
|
716
|
+
if (input[_PA] != null) {
|
717
|
+
const memberEntries = se_policyDescriptorListType(input[_PA], context);
|
718
|
+
if (((_a2 = input[_PA]) == null ? void 0 : _a2.length) === 0) {
|
719
|
+
entries.PolicyArns = [];
|
720
|
+
}
|
721
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
722
|
+
const loc = `PolicyArns.${key}`;
|
723
|
+
entries[loc] = value;
|
724
|
+
});
|
725
|
+
}
|
726
|
+
if (input[_DS] != null) {
|
727
|
+
entries[_DS] = input[_DS];
|
728
|
+
}
|
729
|
+
if (input[_T] != null) {
|
730
|
+
const memberEntries = se_tagListType(input[_T], context);
|
731
|
+
if (((_b = input[_T]) == null ? void 0 : _b.length) === 0) {
|
732
|
+
entries.Tags = [];
|
733
|
+
}
|
734
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
735
|
+
const loc = `Tags.${key}`;
|
736
|
+
entries[loc] = value;
|
737
|
+
});
|
738
|
+
}
|
739
|
+
return entries;
|
740
|
+
}, "se_GetFederationTokenRequest");
|
741
|
+
var se_GetSessionTokenRequest = /* @__PURE__ */ __name((input, context) => {
|
742
|
+
const entries = {};
|
743
|
+
if (input[_DS] != null) {
|
744
|
+
entries[_DS] = input[_DS];
|
745
|
+
}
|
746
|
+
if (input[_SN] != null) {
|
747
|
+
entries[_SN] = input[_SN];
|
748
|
+
}
|
749
|
+
if (input[_TC] != null) {
|
750
|
+
entries[_TC] = input[_TC];
|
751
|
+
}
|
752
|
+
return entries;
|
753
|
+
}, "se_GetSessionTokenRequest");
|
754
|
+
var se_policyDescriptorListType = /* @__PURE__ */ __name((input, context) => {
|
755
|
+
const entries = {};
|
756
|
+
let counter = 1;
|
757
|
+
for (const entry of input) {
|
758
|
+
if (entry === null) {
|
759
|
+
continue;
|
760
|
+
}
|
761
|
+
const memberEntries = se_PolicyDescriptorType(entry, context);
|
762
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
763
|
+
entries[`member.${counter}.${key}`] = value;
|
764
|
+
});
|
765
|
+
counter++;
|
766
|
+
}
|
767
|
+
return entries;
|
768
|
+
}, "se_policyDescriptorListType");
|
769
|
+
var se_PolicyDescriptorType = /* @__PURE__ */ __name((input, context) => {
|
770
|
+
const entries = {};
|
771
|
+
if (input[_a] != null) {
|
772
|
+
entries[_a] = input[_a];
|
773
|
+
}
|
774
|
+
return entries;
|
775
|
+
}, "se_PolicyDescriptorType");
|
776
|
+
var se_ProvidedContext = /* @__PURE__ */ __name((input, context) => {
|
777
|
+
const entries = {};
|
778
|
+
if (input[_PAro] != null) {
|
779
|
+
entries[_PAro] = input[_PAro];
|
780
|
+
}
|
781
|
+
if (input[_CA] != null) {
|
782
|
+
entries[_CA] = input[_CA];
|
783
|
+
}
|
784
|
+
return entries;
|
785
|
+
}, "se_ProvidedContext");
|
786
|
+
var se_ProvidedContextsListType = /* @__PURE__ */ __name((input, context) => {
|
787
|
+
const entries = {};
|
788
|
+
let counter = 1;
|
789
|
+
for (const entry of input) {
|
790
|
+
if (entry === null) {
|
791
|
+
continue;
|
792
|
+
}
|
793
|
+
const memberEntries = se_ProvidedContext(entry, context);
|
794
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
795
|
+
entries[`member.${counter}.${key}`] = value;
|
796
|
+
});
|
797
|
+
counter++;
|
798
|
+
}
|
799
|
+
return entries;
|
800
|
+
}, "se_ProvidedContextsListType");
|
801
|
+
var se_Tag = /* @__PURE__ */ __name((input, context) => {
|
802
|
+
const entries = {};
|
803
|
+
if (input[_K] != null) {
|
804
|
+
entries[_K] = input[_K];
|
805
|
+
}
|
806
|
+
if (input[_Va] != null) {
|
807
|
+
entries[_Va] = input[_Va];
|
808
|
+
}
|
809
|
+
return entries;
|
810
|
+
}, "se_Tag");
|
811
|
+
var se_tagKeyListType = /* @__PURE__ */ __name((input, context) => {
|
812
|
+
const entries = {};
|
813
|
+
let counter = 1;
|
814
|
+
for (const entry of input) {
|
815
|
+
if (entry === null) {
|
816
|
+
continue;
|
817
|
+
}
|
818
|
+
entries[`member.${counter}`] = entry;
|
819
|
+
counter++;
|
820
|
+
}
|
821
|
+
return entries;
|
822
|
+
}, "se_tagKeyListType");
|
823
|
+
var se_tagListType = /* @__PURE__ */ __name((input, context) => {
|
824
|
+
const entries = {};
|
825
|
+
let counter = 1;
|
826
|
+
for (const entry of input) {
|
827
|
+
if (entry === null) {
|
828
|
+
continue;
|
829
|
+
}
|
830
|
+
const memberEntries = se_Tag(entry, context);
|
831
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
832
|
+
entries[`member.${counter}.${key}`] = value;
|
833
|
+
});
|
834
|
+
counter++;
|
835
|
+
}
|
836
|
+
return entries;
|
837
|
+
}, "se_tagListType");
|
838
|
+
var de_AssumedRoleUser = /* @__PURE__ */ __name((output, context) => {
|
839
|
+
const contents = {};
|
840
|
+
if (output[_ARI] != null) {
|
841
|
+
contents[_ARI] = (0, import_smithy_client.expectString)(output[_ARI]);
|
842
|
+
}
|
843
|
+
if (output[_Ar] != null) {
|
844
|
+
contents[_Ar] = (0, import_smithy_client.expectString)(output[_Ar]);
|
845
|
+
}
|
846
|
+
return contents;
|
847
|
+
}, "de_AssumedRoleUser");
|
848
|
+
var de_AssumeRoleResponse = /* @__PURE__ */ __name((output, context) => {
|
849
|
+
const contents = {};
|
850
|
+
if (output[_C] != null) {
|
851
|
+
contents[_C] = de_Credentials(output[_C], context);
|
852
|
+
}
|
853
|
+
if (output[_ARU] != null) {
|
854
|
+
contents[_ARU] = de_AssumedRoleUser(output[_ARU], context);
|
855
|
+
}
|
856
|
+
if (output[_PPS] != null) {
|
857
|
+
contents[_PPS] = (0, import_smithy_client.strictParseInt32)(output[_PPS]);
|
858
|
+
}
|
859
|
+
if (output[_SI] != null) {
|
860
|
+
contents[_SI] = (0, import_smithy_client.expectString)(output[_SI]);
|
861
|
+
}
|
862
|
+
return contents;
|
863
|
+
}, "de_AssumeRoleResponse");
|
864
|
+
var de_AssumeRoleWithSAMLResponse = /* @__PURE__ */ __name((output, context) => {
|
865
|
+
const contents = {};
|
866
|
+
if (output[_C] != null) {
|
867
|
+
contents[_C] = de_Credentials(output[_C], context);
|
868
|
+
}
|
869
|
+
if (output[_ARU] != null) {
|
870
|
+
contents[_ARU] = de_AssumedRoleUser(output[_ARU], context);
|
871
|
+
}
|
872
|
+
if (output[_PPS] != null) {
|
873
|
+
contents[_PPS] = (0, import_smithy_client.strictParseInt32)(output[_PPS]);
|
874
|
+
}
|
875
|
+
if (output[_S] != null) {
|
876
|
+
contents[_S] = (0, import_smithy_client.expectString)(output[_S]);
|
877
|
+
}
|
878
|
+
if (output[_ST] != null) {
|
879
|
+
contents[_ST] = (0, import_smithy_client.expectString)(output[_ST]);
|
880
|
+
}
|
881
|
+
if (output[_I] != null) {
|
882
|
+
contents[_I] = (0, import_smithy_client.expectString)(output[_I]);
|
883
|
+
}
|
884
|
+
if (output[_Au] != null) {
|
885
|
+
contents[_Au] = (0, import_smithy_client.expectString)(output[_Au]);
|
886
|
+
}
|
887
|
+
if (output[_NQ] != null) {
|
888
|
+
contents[_NQ] = (0, import_smithy_client.expectString)(output[_NQ]);
|
889
|
+
}
|
890
|
+
if (output[_SI] != null) {
|
891
|
+
contents[_SI] = (0, import_smithy_client.expectString)(output[_SI]);
|
892
|
+
}
|
893
|
+
return contents;
|
894
|
+
}, "de_AssumeRoleWithSAMLResponse");
|
895
|
+
var de_AssumeRoleWithWebIdentityResponse = /* @__PURE__ */ __name((output, context) => {
|
896
|
+
const contents = {};
|
897
|
+
if (output[_C] != null) {
|
898
|
+
contents[_C] = de_Credentials(output[_C], context);
|
899
|
+
}
|
900
|
+
if (output[_SFWIT] != null) {
|
901
|
+
contents[_SFWIT] = (0, import_smithy_client.expectString)(output[_SFWIT]);
|
902
|
+
}
|
903
|
+
if (output[_ARU] != null) {
|
904
|
+
contents[_ARU] = de_AssumedRoleUser(output[_ARU], context);
|
905
|
+
}
|
906
|
+
if (output[_PPS] != null) {
|
907
|
+
contents[_PPS] = (0, import_smithy_client.strictParseInt32)(output[_PPS]);
|
908
|
+
}
|
909
|
+
if (output[_Pr] != null) {
|
910
|
+
contents[_Pr] = (0, import_smithy_client.expectString)(output[_Pr]);
|
911
|
+
}
|
912
|
+
if (output[_Au] != null) {
|
913
|
+
contents[_Au] = (0, import_smithy_client.expectString)(output[_Au]);
|
914
|
+
}
|
915
|
+
if (output[_SI] != null) {
|
916
|
+
contents[_SI] = (0, import_smithy_client.expectString)(output[_SI]);
|
917
|
+
}
|
918
|
+
return contents;
|
919
|
+
}, "de_AssumeRoleWithWebIdentityResponse");
|
920
|
+
var de_Credentials = /* @__PURE__ */ __name((output, context) => {
|
921
|
+
const contents = {};
|
922
|
+
if (output[_AKI] != null) {
|
923
|
+
contents[_AKI] = (0, import_smithy_client.expectString)(output[_AKI]);
|
924
|
+
}
|
925
|
+
if (output[_SAK] != null) {
|
926
|
+
contents[_SAK] = (0, import_smithy_client.expectString)(output[_SAK]);
|
927
|
+
}
|
928
|
+
if (output[_STe] != null) {
|
929
|
+
contents[_STe] = (0, import_smithy_client.expectString)(output[_STe]);
|
930
|
+
}
|
931
|
+
if (output[_E] != null) {
|
932
|
+
contents[_E] = (0, import_smithy_client.expectNonNull)((0, import_smithy_client.parseRfc3339DateTimeWithOffset)(output[_E]));
|
933
|
+
}
|
934
|
+
return contents;
|
935
|
+
}, "de_Credentials");
|
936
|
+
var de_DecodeAuthorizationMessageResponse = /* @__PURE__ */ __name((output, context) => {
|
937
|
+
const contents = {};
|
938
|
+
if (output[_DM] != null) {
|
939
|
+
contents[_DM] = (0, import_smithy_client.expectString)(output[_DM]);
|
940
|
+
}
|
941
|
+
return contents;
|
942
|
+
}, "de_DecodeAuthorizationMessageResponse");
|
943
|
+
var de_ExpiredTokenException = /* @__PURE__ */ __name((output, context) => {
|
944
|
+
const contents = {};
|
945
|
+
if (output[_m] != null) {
|
946
|
+
contents[_m] = (0, import_smithy_client.expectString)(output[_m]);
|
947
|
+
}
|
948
|
+
return contents;
|
949
|
+
}, "de_ExpiredTokenException");
|
950
|
+
var de_FederatedUser = /* @__PURE__ */ __name((output, context) => {
|
951
|
+
const contents = {};
|
952
|
+
if (output[_FUI] != null) {
|
953
|
+
contents[_FUI] = (0, import_smithy_client.expectString)(output[_FUI]);
|
954
|
+
}
|
955
|
+
if (output[_Ar] != null) {
|
956
|
+
contents[_Ar] = (0, import_smithy_client.expectString)(output[_Ar]);
|
957
|
+
}
|
958
|
+
return contents;
|
959
|
+
}, "de_FederatedUser");
|
960
|
+
var de_GetAccessKeyInfoResponse = /* @__PURE__ */ __name((output, context) => {
|
961
|
+
const contents = {};
|
962
|
+
if (output[_Ac] != null) {
|
963
|
+
contents[_Ac] = (0, import_smithy_client.expectString)(output[_Ac]);
|
964
|
+
}
|
965
|
+
return contents;
|
966
|
+
}, "de_GetAccessKeyInfoResponse");
|
967
|
+
var de_GetCallerIdentityResponse = /* @__PURE__ */ __name((output, context) => {
|
968
|
+
const contents = {};
|
969
|
+
if (output[_UI] != null) {
|
970
|
+
contents[_UI] = (0, import_smithy_client.expectString)(output[_UI]);
|
971
|
+
}
|
972
|
+
if (output[_Ac] != null) {
|
973
|
+
contents[_Ac] = (0, import_smithy_client.expectString)(output[_Ac]);
|
974
|
+
}
|
975
|
+
if (output[_Ar] != null) {
|
976
|
+
contents[_Ar] = (0, import_smithy_client.expectString)(output[_Ar]);
|
977
|
+
}
|
978
|
+
return contents;
|
979
|
+
}, "de_GetCallerIdentityResponse");
|
980
|
+
var de_GetFederationTokenResponse = /* @__PURE__ */ __name((output, context) => {
|
981
|
+
const contents = {};
|
982
|
+
if (output[_C] != null) {
|
983
|
+
contents[_C] = de_Credentials(output[_C], context);
|
984
|
+
}
|
985
|
+
if (output[_FU] != null) {
|
986
|
+
contents[_FU] = de_FederatedUser(output[_FU], context);
|
987
|
+
}
|
988
|
+
if (output[_PPS] != null) {
|
989
|
+
contents[_PPS] = (0, import_smithy_client.strictParseInt32)(output[_PPS]);
|
990
|
+
}
|
991
|
+
return contents;
|
992
|
+
}, "de_GetFederationTokenResponse");
|
993
|
+
var de_GetSessionTokenResponse = /* @__PURE__ */ __name((output, context) => {
|
994
|
+
const contents = {};
|
995
|
+
if (output[_C] != null) {
|
996
|
+
contents[_C] = de_Credentials(output[_C], context);
|
997
|
+
}
|
998
|
+
return contents;
|
999
|
+
}, "de_GetSessionTokenResponse");
|
1000
|
+
var de_IDPCommunicationErrorException = /* @__PURE__ */ __name((output, context) => {
|
1001
|
+
const contents = {};
|
1002
|
+
if (output[_m] != null) {
|
1003
|
+
contents[_m] = (0, import_smithy_client.expectString)(output[_m]);
|
1004
|
+
}
|
1005
|
+
return contents;
|
1006
|
+
}, "de_IDPCommunicationErrorException");
|
1007
|
+
var de_IDPRejectedClaimException = /* @__PURE__ */ __name((output, context) => {
|
1008
|
+
const contents = {};
|
1009
|
+
if (output[_m] != null) {
|
1010
|
+
contents[_m] = (0, import_smithy_client.expectString)(output[_m]);
|
1011
|
+
}
|
1012
|
+
return contents;
|
1013
|
+
}, "de_IDPRejectedClaimException");
|
1014
|
+
var de_InvalidAuthorizationMessageException = /* @__PURE__ */ __name((output, context) => {
|
1015
|
+
const contents = {};
|
1016
|
+
if (output[_m] != null) {
|
1017
|
+
contents[_m] = (0, import_smithy_client.expectString)(output[_m]);
|
1018
|
+
}
|
1019
|
+
return contents;
|
1020
|
+
}, "de_InvalidAuthorizationMessageException");
|
1021
|
+
var de_InvalidIdentityTokenException = /* @__PURE__ */ __name((output, context) => {
|
1022
|
+
const contents = {};
|
1023
|
+
if (output[_m] != null) {
|
1024
|
+
contents[_m] = (0, import_smithy_client.expectString)(output[_m]);
|
1025
|
+
}
|
1026
|
+
return contents;
|
1027
|
+
}, "de_InvalidIdentityTokenException");
|
1028
|
+
var de_MalformedPolicyDocumentException = /* @__PURE__ */ __name((output, context) => {
|
1029
|
+
const contents = {};
|
1030
|
+
if (output[_m] != null) {
|
1031
|
+
contents[_m] = (0, import_smithy_client.expectString)(output[_m]);
|
1032
|
+
}
|
1033
|
+
return contents;
|
1034
|
+
}, "de_MalformedPolicyDocumentException");
|
1035
|
+
var de_PackedPolicyTooLargeException = /* @__PURE__ */ __name((output, context) => {
|
1036
|
+
const contents = {};
|
1037
|
+
if (output[_m] != null) {
|
1038
|
+
contents[_m] = (0, import_smithy_client.expectString)(output[_m]);
|
1039
|
+
}
|
1040
|
+
return contents;
|
1041
|
+
}, "de_PackedPolicyTooLargeException");
|
1042
|
+
var de_RegionDisabledException = /* @__PURE__ */ __name((output, context) => {
|
1043
|
+
const contents = {};
|
1044
|
+
if (output[_m] != null) {
|
1045
|
+
contents[_m] = (0, import_smithy_client.expectString)(output[_m]);
|
1046
|
+
}
|
1047
|
+
return contents;
|
1048
|
+
}, "de_RegionDisabledException");
|
1049
|
+
var deserializeMetadata = /* @__PURE__ */ __name((output) => ({
|
1050
|
+
httpStatusCode: output.statusCode,
|
1051
|
+
requestId: output.headers["x-amzn-requestid"] ?? output.headers["x-amzn-request-id"] ?? output.headers["x-amz-request-id"],
|
1052
|
+
extendedRequestId: output.headers["x-amz-id-2"],
|
1053
|
+
cfId: output.headers["x-amz-cf-id"]
|
1054
|
+
}), "deserializeMetadata");
|
1055
|
+
var throwDefaultError = (0, import_smithy_client.withBaseException)(STSServiceException);
|
1056
|
+
var buildHttpRpcRequest = /* @__PURE__ */ __name(async (context, headers, path, resolvedHostname, body) => {
|
1057
|
+
const { hostname, protocol = "https", port, path: basePath } = await context.endpoint();
|
1058
|
+
const contents = {
|
1059
|
+
protocol,
|
1060
|
+
hostname,
|
1061
|
+
port,
|
1062
|
+
method: "POST",
|
1063
|
+
path: basePath.endsWith("/") ? basePath.slice(0, -1) + path : basePath + path,
|
1064
|
+
headers
|
1065
|
+
};
|
1066
|
+
if (resolvedHostname !== void 0) {
|
1067
|
+
contents.hostname = resolvedHostname;
|
1068
|
+
}
|
1069
|
+
if (body !== void 0) {
|
1070
|
+
contents.body = body;
|
1071
|
+
}
|
1072
|
+
return new import_protocol_http.HttpRequest(contents);
|
1073
|
+
}, "buildHttpRpcRequest");
|
1074
|
+
var SHARED_HEADERS = {
|
1075
|
+
"content-type": "application/x-www-form-urlencoded"
|
1076
|
+
};
|
1077
|
+
var _ = "2011-06-15";
|
1078
|
+
var _A = "Action";
|
1079
|
+
var _AKI = "AccessKeyId";
|
1080
|
+
var _AR = "AssumeRole";
|
1081
|
+
var _ARI = "AssumedRoleId";
|
1082
|
+
var _ARU = "AssumedRoleUser";
|
1083
|
+
var _ARWSAML = "AssumeRoleWithSAML";
|
1084
|
+
var _ARWWI = "AssumeRoleWithWebIdentity";
|
1085
|
+
var _Ac = "Account";
|
1086
|
+
var _Ar = "Arn";
|
1087
|
+
var _Au = "Audience";
|
1088
|
+
var _C = "Credentials";
|
1089
|
+
var _CA = "ContextAssertion";
|
1090
|
+
var _DAM = "DecodeAuthorizationMessage";
|
1091
|
+
var _DM = "DecodedMessage";
|
1092
|
+
var _DS = "DurationSeconds";
|
1093
|
+
var _E = "Expiration";
|
1094
|
+
var _EI = "ExternalId";
|
1095
|
+
var _EM = "EncodedMessage";
|
1096
|
+
var _FU = "FederatedUser";
|
1097
|
+
var _FUI = "FederatedUserId";
|
1098
|
+
var _GAKI = "GetAccessKeyInfo";
|
1099
|
+
var _GCI = "GetCallerIdentity";
|
1100
|
+
var _GFT = "GetFederationToken";
|
1101
|
+
var _GST = "GetSessionToken";
|
1102
|
+
var _I = "Issuer";
|
1103
|
+
var _K = "Key";
|
1104
|
+
var _N = "Name";
|
1105
|
+
var _NQ = "NameQualifier";
|
1106
|
+
var _P = "Policy";
|
1107
|
+
var _PA = "PolicyArns";
|
1108
|
+
var _PAr = "PrincipalArn";
|
1109
|
+
var _PAro = "ProviderArn";
|
1110
|
+
var _PC = "ProvidedContexts";
|
1111
|
+
var _PI = "ProviderId";
|
1112
|
+
var _PPS = "PackedPolicySize";
|
1113
|
+
var _Pr = "Provider";
|
1114
|
+
var _RA = "RoleArn";
|
1115
|
+
var _RSN = "RoleSessionName";
|
1116
|
+
var _S = "Subject";
|
1117
|
+
var _SAK = "SecretAccessKey";
|
1118
|
+
var _SAMLA = "SAMLAssertion";
|
1119
|
+
var _SFWIT = "SubjectFromWebIdentityToken";
|
1120
|
+
var _SI = "SourceIdentity";
|
1121
|
+
var _SN = "SerialNumber";
|
1122
|
+
var _ST = "SubjectType";
|
1123
|
+
var _STe = "SessionToken";
|
1124
|
+
var _T = "Tags";
|
1125
|
+
var _TC = "TokenCode";
|
1126
|
+
var _TTK = "TransitiveTagKeys";
|
1127
|
+
var _UI = "UserId";
|
1128
|
+
var _V = "Version";
|
1129
|
+
var _Va = "Value";
|
1130
|
+
var _WIT = "WebIdentityToken";
|
1131
|
+
var _a = "arn";
|
1132
|
+
var _m = "message";
|
1133
|
+
var buildFormUrlencodedString = /* @__PURE__ */ __name((formEntries) => Object.entries(formEntries).map(([key, value]) => (0, import_smithy_client.extendedEncodeURIComponent)(key) + "=" + (0, import_smithy_client.extendedEncodeURIComponent)(value)).join("&"), "buildFormUrlencodedString");
|
1134
|
+
var loadQueryErrorCode = /* @__PURE__ */ __name((output, data) => {
|
1135
|
+
var _a2;
|
1136
|
+
if (((_a2 = data.Error) == null ? void 0 : _a2.Code) !== void 0) {
|
1137
|
+
return data.Error.Code;
|
1138
|
+
}
|
1139
|
+
if (output.statusCode == 404) {
|
1140
|
+
return "NotFound";
|
1141
|
+
}
|
1142
|
+
}, "loadQueryErrorCode");
|
1143
|
+
|
1144
|
+
// src/commands/AssumeRoleCommand.ts
|
1145
|
+
var _AssumeRoleCommand = class _AssumeRoleCommand extends import_smithy_client.Command.classBuilder().ep({
|
1146
|
+
...import_EndpointParameters.commonParams
|
1147
|
+
}).m(function(Command, cs, config, o) {
|
1148
|
+
return [
|
1149
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
1150
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
1151
|
+
];
|
1152
|
+
}).s("AWSSecurityTokenServiceV20110615", "AssumeRole", {}).n("STSClient", "AssumeRoleCommand").f(void 0, AssumeRoleResponseFilterSensitiveLog).ser(se_AssumeRoleCommand).de(de_AssumeRoleCommand).build() {
|
1153
|
+
};
|
1154
|
+
__name(_AssumeRoleCommand, "AssumeRoleCommand");
|
1155
|
+
var AssumeRoleCommand = _AssumeRoleCommand;
|
1156
|
+
|
1157
|
+
// src/commands/AssumeRoleWithSAMLCommand.ts
|
1158
|
+
|
1159
|
+
|
1160
|
+
|
1161
|
+
|
1162
|
+
var import_EndpointParameters2 = require("./endpoint/EndpointParameters");
|
1163
|
+
var _AssumeRoleWithSAMLCommand = class _AssumeRoleWithSAMLCommand extends import_smithy_client.Command.classBuilder().ep({
|
1164
|
+
...import_EndpointParameters2.commonParams
|
1165
|
+
}).m(function(Command, cs, config, o) {
|
1166
|
+
return [
|
1167
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
1168
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
1169
|
+
];
|
1170
|
+
}).s("AWSSecurityTokenServiceV20110615", "AssumeRoleWithSAML", {}).n("STSClient", "AssumeRoleWithSAMLCommand").f(AssumeRoleWithSAMLRequestFilterSensitiveLog, AssumeRoleWithSAMLResponseFilterSensitiveLog).ser(se_AssumeRoleWithSAMLCommand).de(de_AssumeRoleWithSAMLCommand).build() {
|
1171
|
+
};
|
1172
|
+
__name(_AssumeRoleWithSAMLCommand, "AssumeRoleWithSAMLCommand");
|
1173
|
+
var AssumeRoleWithSAMLCommand = _AssumeRoleWithSAMLCommand;
|
1174
|
+
|
1175
|
+
// src/commands/AssumeRoleWithWebIdentityCommand.ts
|
1176
|
+
|
1177
|
+
|
1178
|
+
|
1179
|
+
|
1180
|
+
var import_EndpointParameters3 = require("./endpoint/EndpointParameters");
|
1181
|
+
var _AssumeRoleWithWebIdentityCommand = class _AssumeRoleWithWebIdentityCommand extends import_smithy_client.Command.classBuilder().ep({
|
1182
|
+
...import_EndpointParameters3.commonParams
|
1183
|
+
}).m(function(Command, cs, config, o) {
|
1184
|
+
return [
|
1185
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
1186
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
1187
|
+
];
|
1188
|
+
}).s("AWSSecurityTokenServiceV20110615", "AssumeRoleWithWebIdentity", {}).n("STSClient", "AssumeRoleWithWebIdentityCommand").f(AssumeRoleWithWebIdentityRequestFilterSensitiveLog, AssumeRoleWithWebIdentityResponseFilterSensitiveLog).ser(se_AssumeRoleWithWebIdentityCommand).de(de_AssumeRoleWithWebIdentityCommand).build() {
|
1189
|
+
};
|
1190
|
+
__name(_AssumeRoleWithWebIdentityCommand, "AssumeRoleWithWebIdentityCommand");
|
1191
|
+
var AssumeRoleWithWebIdentityCommand = _AssumeRoleWithWebIdentityCommand;
|
1192
|
+
|
1193
|
+
// src/commands/DecodeAuthorizationMessageCommand.ts
|
1194
|
+
|
1195
|
+
|
1196
|
+
|
1197
|
+
|
1198
|
+
var import_EndpointParameters4 = require("./endpoint/EndpointParameters");
|
1199
|
+
var _DecodeAuthorizationMessageCommand = class _DecodeAuthorizationMessageCommand extends import_smithy_client.Command.classBuilder().ep({
|
1200
|
+
...import_EndpointParameters4.commonParams
|
1201
|
+
}).m(function(Command, cs, config, o) {
|
1202
|
+
return [
|
1203
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
1204
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
1205
|
+
];
|
1206
|
+
}).s("AWSSecurityTokenServiceV20110615", "DecodeAuthorizationMessage", {}).n("STSClient", "DecodeAuthorizationMessageCommand").f(void 0, void 0).ser(se_DecodeAuthorizationMessageCommand).de(de_DecodeAuthorizationMessageCommand).build() {
|
1207
|
+
};
|
1208
|
+
__name(_DecodeAuthorizationMessageCommand, "DecodeAuthorizationMessageCommand");
|
1209
|
+
var DecodeAuthorizationMessageCommand = _DecodeAuthorizationMessageCommand;
|
1210
|
+
|
1211
|
+
// src/commands/GetAccessKeyInfoCommand.ts
|
1212
|
+
|
1213
|
+
|
1214
|
+
|
1215
|
+
|
1216
|
+
var import_EndpointParameters5 = require("./endpoint/EndpointParameters");
|
1217
|
+
var _GetAccessKeyInfoCommand = class _GetAccessKeyInfoCommand extends import_smithy_client.Command.classBuilder().ep({
|
1218
|
+
...import_EndpointParameters5.commonParams
|
1219
|
+
}).m(function(Command, cs, config, o) {
|
1220
|
+
return [
|
1221
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
1222
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
1223
|
+
];
|
1224
|
+
}).s("AWSSecurityTokenServiceV20110615", "GetAccessKeyInfo", {}).n("STSClient", "GetAccessKeyInfoCommand").f(void 0, void 0).ser(se_GetAccessKeyInfoCommand).de(de_GetAccessKeyInfoCommand).build() {
|
1225
|
+
};
|
1226
|
+
__name(_GetAccessKeyInfoCommand, "GetAccessKeyInfoCommand");
|
1227
|
+
var GetAccessKeyInfoCommand = _GetAccessKeyInfoCommand;
|
1228
|
+
|
1229
|
+
// src/commands/GetCallerIdentityCommand.ts
|
1230
|
+
|
1231
|
+
|
1232
|
+
|
1233
|
+
|
1234
|
+
var import_EndpointParameters6 = require("./endpoint/EndpointParameters");
|
1235
|
+
var _GetCallerIdentityCommand = class _GetCallerIdentityCommand extends import_smithy_client.Command.classBuilder().ep({
|
1236
|
+
...import_EndpointParameters6.commonParams
|
1237
|
+
}).m(function(Command, cs, config, o) {
|
1238
|
+
return [
|
1239
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
1240
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
1241
|
+
];
|
1242
|
+
}).s("AWSSecurityTokenServiceV20110615", "GetCallerIdentity", {}).n("STSClient", "GetCallerIdentityCommand").f(void 0, void 0).ser(se_GetCallerIdentityCommand).de(de_GetCallerIdentityCommand).build() {
|
1243
|
+
};
|
1244
|
+
__name(_GetCallerIdentityCommand, "GetCallerIdentityCommand");
|
1245
|
+
var GetCallerIdentityCommand = _GetCallerIdentityCommand;
|
1246
|
+
|
1247
|
+
// src/commands/GetFederationTokenCommand.ts
|
1248
|
+
|
1249
|
+
|
1250
|
+
|
1251
|
+
|
1252
|
+
var import_EndpointParameters7 = require("./endpoint/EndpointParameters");
|
1253
|
+
var _GetFederationTokenCommand = class _GetFederationTokenCommand extends import_smithy_client.Command.classBuilder().ep({
|
1254
|
+
...import_EndpointParameters7.commonParams
|
1255
|
+
}).m(function(Command, cs, config, o) {
|
1256
|
+
return [
|
1257
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
1258
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
1259
|
+
];
|
1260
|
+
}).s("AWSSecurityTokenServiceV20110615", "GetFederationToken", {}).n("STSClient", "GetFederationTokenCommand").f(void 0, GetFederationTokenResponseFilterSensitiveLog).ser(se_GetFederationTokenCommand).de(de_GetFederationTokenCommand).build() {
|
1261
|
+
};
|
1262
|
+
__name(_GetFederationTokenCommand, "GetFederationTokenCommand");
|
1263
|
+
var GetFederationTokenCommand = _GetFederationTokenCommand;
|
1264
|
+
|
1265
|
+
// src/commands/GetSessionTokenCommand.ts
|
1266
|
+
|
1267
|
+
|
1268
|
+
|
1269
|
+
|
1270
|
+
var import_EndpointParameters8 = require("./endpoint/EndpointParameters");
|
1271
|
+
var _GetSessionTokenCommand = class _GetSessionTokenCommand extends import_smithy_client.Command.classBuilder().ep({
|
1272
|
+
...import_EndpointParameters8.commonParams
|
1273
|
+
}).m(function(Command, cs, config, o) {
|
1274
|
+
return [
|
1275
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
1276
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
1277
|
+
];
|
1278
|
+
}).s("AWSSecurityTokenServiceV20110615", "GetSessionToken", {}).n("STSClient", "GetSessionTokenCommand").f(void 0, GetSessionTokenResponseFilterSensitiveLog).ser(se_GetSessionTokenCommand).de(de_GetSessionTokenCommand).build() {
|
1279
|
+
};
|
1280
|
+
__name(_GetSessionTokenCommand, "GetSessionTokenCommand");
|
1281
|
+
var GetSessionTokenCommand = _GetSessionTokenCommand;
|
1282
|
+
|
1283
|
+
// src/STS.ts
|
1284
|
+
var import_STSClient = require("././STSClient");
|
1285
|
+
var commands = {
|
1286
|
+
AssumeRoleCommand,
|
1287
|
+
AssumeRoleWithSAMLCommand,
|
1288
|
+
AssumeRoleWithWebIdentityCommand,
|
1289
|
+
DecodeAuthorizationMessageCommand,
|
1290
|
+
GetAccessKeyInfoCommand,
|
1291
|
+
GetCallerIdentityCommand,
|
1292
|
+
GetFederationTokenCommand,
|
1293
|
+
GetSessionTokenCommand
|
1294
|
+
};
|
1295
|
+
var _STS = class _STS extends import_STSClient.STSClient {
|
1296
|
+
};
|
1297
|
+
__name(_STS, "STS");
|
1298
|
+
var STS = _STS;
|
1299
|
+
(0, import_smithy_client.createAggregatedClient)(commands, STS);
|
1300
|
+
|
1301
|
+
// src/index.ts
|
1302
|
+
var import_EndpointParameters9 = require("./endpoint/EndpointParameters");
|
1303
|
+
var import_runtimeExtensions = require("././runtimeExtensions");
|
1304
|
+
|
1305
|
+
// src/defaultStsRoleAssumers.ts
|
1306
|
+
var ASSUME_ROLE_DEFAULT_REGION = "us-east-1";
|
1307
|
+
var resolveRegion = /* @__PURE__ */ __name(async (_region, _parentRegion, credentialProviderLogger) => {
|
1308
|
+
var _a2;
|
1309
|
+
const region = typeof _region === "function" ? await _region() : _region;
|
1310
|
+
const parentRegion = typeof _parentRegion === "function" ? await _parentRegion() : _parentRegion;
|
1311
|
+
(_a2 = credentialProviderLogger == null ? void 0 : credentialProviderLogger.debug) == null ? void 0 : _a2.call(
|
1312
|
+
credentialProviderLogger,
|
1313
|
+
"@aws-sdk/client-sts::resolveRegion",
|
1314
|
+
"accepting first of:",
|
1315
|
+
`${region} (provider)`,
|
1316
|
+
`${parentRegion} (parent client)`,
|
1317
|
+
`${ASSUME_ROLE_DEFAULT_REGION} (STS default)`
|
1318
|
+
);
|
1319
|
+
return region ?? parentRegion ?? ASSUME_ROLE_DEFAULT_REGION;
|
1320
|
+
}, "resolveRegion");
|
1321
|
+
var getDefaultRoleAssumer = /* @__PURE__ */ __name((stsOptions, stsClientCtor) => {
|
1322
|
+
let stsClient;
|
1323
|
+
let closureSourceCreds;
|
1324
|
+
return async (sourceCreds, params) => {
|
1325
|
+
var _a2, _b, _c;
|
1326
|
+
closureSourceCreds = sourceCreds;
|
1327
|
+
if (!stsClient) {
|
1328
|
+
const {
|
1329
|
+
logger = (_a2 = stsOptions == null ? void 0 : stsOptions.parentClientConfig) == null ? void 0 : _a2.logger,
|
1330
|
+
region,
|
1331
|
+
requestHandler = (_b = stsOptions == null ? void 0 : stsOptions.parentClientConfig) == null ? void 0 : _b.requestHandler,
|
1332
|
+
credentialProviderLogger
|
1333
|
+
} = stsOptions;
|
1334
|
+
const resolvedRegion = await resolveRegion(
|
1335
|
+
region,
|
1336
|
+
(_c = stsOptions == null ? void 0 : stsOptions.parentClientConfig) == null ? void 0 : _c.region,
|
1337
|
+
credentialProviderLogger
|
1338
|
+
);
|
1339
|
+
stsClient = new stsClientCtor({
|
1340
|
+
// A hack to make sts client uses the credential in current closure.
|
1341
|
+
credentialDefaultProvider: () => async () => closureSourceCreds,
|
1342
|
+
region: resolvedRegion,
|
1343
|
+
requestHandler,
|
1344
|
+
logger
|
1345
|
+
});
|
1346
|
+
}
|
1347
|
+
const { Credentials: Credentials2 } = await stsClient.send(new AssumeRoleCommand(params));
|
1348
|
+
if (!Credentials2 || !Credentials2.AccessKeyId || !Credentials2.SecretAccessKey) {
|
1349
|
+
throw new Error(`Invalid response from STS.assumeRole call with role ${params.RoleArn}`);
|
1350
|
+
}
|
1351
|
+
return {
|
1352
|
+
accessKeyId: Credentials2.AccessKeyId,
|
1353
|
+
secretAccessKey: Credentials2.SecretAccessKey,
|
1354
|
+
sessionToken: Credentials2.SessionToken,
|
1355
|
+
expiration: Credentials2.Expiration,
|
1356
|
+
// TODO(credentialScope): access normally when shape is updated.
|
1357
|
+
credentialScope: Credentials2.CredentialScope
|
1358
|
+
};
|
1359
|
+
};
|
1360
|
+
}, "getDefaultRoleAssumer");
|
1361
|
+
var getDefaultRoleAssumerWithWebIdentity = /* @__PURE__ */ __name((stsOptions, stsClientCtor) => {
|
1362
|
+
let stsClient;
|
1363
|
+
return async (params) => {
|
1364
|
+
var _a2, _b, _c;
|
1365
|
+
if (!stsClient) {
|
1366
|
+
const {
|
1367
|
+
logger = (_a2 = stsOptions == null ? void 0 : stsOptions.parentClientConfig) == null ? void 0 : _a2.logger,
|
1368
|
+
region,
|
1369
|
+
requestHandler = (_b = stsOptions == null ? void 0 : stsOptions.parentClientConfig) == null ? void 0 : _b.requestHandler,
|
1370
|
+
credentialProviderLogger
|
1371
|
+
} = stsOptions;
|
1372
|
+
const resolvedRegion = await resolveRegion(
|
1373
|
+
region,
|
1374
|
+
(_c = stsOptions == null ? void 0 : stsOptions.parentClientConfig) == null ? void 0 : _c.region,
|
1375
|
+
credentialProviderLogger
|
1376
|
+
);
|
1377
|
+
stsClient = new stsClientCtor({
|
1378
|
+
region: resolvedRegion,
|
1379
|
+
requestHandler,
|
1380
|
+
logger
|
1381
|
+
});
|
1382
|
+
}
|
1383
|
+
const { Credentials: Credentials2 } = await stsClient.send(new AssumeRoleWithWebIdentityCommand(params));
|
1384
|
+
if (!Credentials2 || !Credentials2.AccessKeyId || !Credentials2.SecretAccessKey) {
|
1385
|
+
throw new Error(`Invalid response from STS.assumeRoleWithWebIdentity call with role ${params.RoleArn}`);
|
1386
|
+
}
|
1387
|
+
return {
|
1388
|
+
accessKeyId: Credentials2.AccessKeyId,
|
1389
|
+
secretAccessKey: Credentials2.SecretAccessKey,
|
1390
|
+
sessionToken: Credentials2.SessionToken,
|
1391
|
+
expiration: Credentials2.Expiration,
|
1392
|
+
// TODO(credentialScope): access normally when shape is updated.
|
1393
|
+
credentialScope: Credentials2.CredentialScope
|
1394
|
+
};
|
1395
|
+
};
|
1396
|
+
}, "getDefaultRoleAssumerWithWebIdentity");
|
1397
|
+
|
1398
|
+
// src/defaultRoleAssumers.ts
|
1399
|
+
var import_STSClient2 = require("././STSClient");
|
1400
|
+
var getCustomizableStsClientCtor = /* @__PURE__ */ __name((baseCtor, customizations) => {
|
1401
|
+
var _a2;
|
1402
|
+
if (!customizations)
|
1403
|
+
return baseCtor;
|
1404
|
+
else
|
1405
|
+
return _a2 = class extends baseCtor {
|
1406
|
+
constructor(config) {
|
1407
|
+
super(config);
|
1408
|
+
for (const customization of customizations) {
|
1409
|
+
this.middlewareStack.use(customization);
|
1410
|
+
}
|
1411
|
+
}
|
1412
|
+
}, __name(_a2, "CustomizableSTSClient"), _a2;
|
1413
|
+
}, "getCustomizableStsClientCtor");
|
1414
|
+
var getDefaultRoleAssumer2 = /* @__PURE__ */ __name((stsOptions = {}, stsPlugins) => getDefaultRoleAssumer(stsOptions, getCustomizableStsClientCtor(import_STSClient2.STSClient, stsPlugins)), "getDefaultRoleAssumer");
|
1415
|
+
var getDefaultRoleAssumerWithWebIdentity2 = /* @__PURE__ */ __name((stsOptions = {}, stsPlugins) => getDefaultRoleAssumerWithWebIdentity(stsOptions, getCustomizableStsClientCtor(import_STSClient2.STSClient, stsPlugins)), "getDefaultRoleAssumerWithWebIdentity");
|
1416
|
+
var decorateDefaultCredentialProvider = /* @__PURE__ */ __name((provider) => (input) => provider({
|
1417
|
+
roleAssumer: getDefaultRoleAssumer2(input),
|
1418
|
+
roleAssumerWithWebIdentity: getDefaultRoleAssumerWithWebIdentity2(input),
|
1419
|
+
...input
|
1420
|
+
}), "decorateDefaultCredentialProvider");
|
1421
|
+
// Annotate the CommonJS export names for ESM import in node:
|
1422
|
+
|
1423
|
+
0 && (module.exports = {
|
1424
|
+
STSServiceException,
|
1425
|
+
__Client,
|
1426
|
+
STSClient,
|
1427
|
+
STS,
|
1428
|
+
$Command,
|
1429
|
+
AssumeRoleCommand,
|
1430
|
+
AssumeRoleWithSAMLCommand,
|
1431
|
+
AssumeRoleWithWebIdentityCommand,
|
1432
|
+
DecodeAuthorizationMessageCommand,
|
1433
|
+
GetAccessKeyInfoCommand,
|
1434
|
+
GetCallerIdentityCommand,
|
1435
|
+
GetFederationTokenCommand,
|
1436
|
+
GetSessionTokenCommand,
|
1437
|
+
ExpiredTokenException,
|
1438
|
+
MalformedPolicyDocumentException,
|
1439
|
+
PackedPolicyTooLargeException,
|
1440
|
+
RegionDisabledException,
|
1441
|
+
IDPRejectedClaimException,
|
1442
|
+
InvalidIdentityTokenException,
|
1443
|
+
IDPCommunicationErrorException,
|
1444
|
+
InvalidAuthorizationMessageException,
|
1445
|
+
CredentialsFilterSensitiveLog,
|
1446
|
+
AssumeRoleResponseFilterSensitiveLog,
|
1447
|
+
AssumeRoleWithSAMLRequestFilterSensitiveLog,
|
1448
|
+
AssumeRoleWithSAMLResponseFilterSensitiveLog,
|
1449
|
+
AssumeRoleWithWebIdentityRequestFilterSensitiveLog,
|
1450
|
+
AssumeRoleWithWebIdentityResponseFilterSensitiveLog,
|
1451
|
+
GetFederationTokenResponseFilterSensitiveLog,
|
1452
|
+
GetSessionTokenResponseFilterSensitiveLog,
|
1453
|
+
getDefaultRoleAssumer,
|
1454
|
+
getDefaultRoleAssumerWithWebIdentity,
|
1455
|
+
decorateDefaultCredentialProvider
|
1456
|
+
});
|
1457
|
+
|