@rharkor/caching-for-turbo 2.3.10 → 2.3.12
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cli/136.index.js +514 -328
- package/dist/cli/136.index.js.map +1 -1
- package/dist/cli/360.index.js +3 -3
- package/dist/cli/360.index.js.map +1 -1
- package/dist/cli/443.index.js +362 -227
- package/dist/cli/443.index.js.map +1 -1
- package/dist/cli/579.index.js +9 -1
- package/dist/cli/579.index.js.map +1 -1
- package/dist/cli/605.index.js +1 -1
- package/dist/cli/605.index.js.map +1 -1
- package/dist/cli/762.index.js +363 -187
- package/dist/cli/762.index.js.map +1 -1
- package/dist/cli/869.index.js +2 -2
- package/dist/cli/956.index.js +16 -896
- package/dist/cli/956.index.js.map +1 -1
- package/dist/cli/998.index.js +549 -865
- package/dist/cli/998.index.js.map +1 -1
- package/dist/cli/index.js +184357 -186911
- package/dist/cli/licenses.txt +0 -409
- package/dist/cli/worker.js +18 -13
- package/package.json +2 -2
package/dist/cli/136.index.js
CHANGED
|
@@ -119,7 +119,7 @@ exports.resolveHttpAuthRuntimeConfig = resolveHttpAuthRuntimeConfig;
|
|
|
119
119
|
|
|
120
120
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
121
121
|
exports.resolveHttpAuthSchemeConfig = exports.resolveStsAuthConfig = exports.defaultSTSHttpAuthSchemeProvider = exports.defaultSTSHttpAuthSchemeParametersProvider = void 0;
|
|
122
|
-
const
|
|
122
|
+
const httpAuthSchemes_1 = __webpack_require__(97523);
|
|
123
123
|
const util_middleware_1 = __webpack_require__(76324);
|
|
124
124
|
const STSClient_1 = __webpack_require__(63723);
|
|
125
125
|
const defaultSTSHttpAuthSchemeParametersProvider = async (config, context, input) => {
|
|
@@ -172,7 +172,7 @@ const resolveStsAuthConfig = (input) => Object.assign(input, {
|
|
|
172
172
|
exports.resolveStsAuthConfig = resolveStsAuthConfig;
|
|
173
173
|
const resolveHttpAuthSchemeConfig = (config) => {
|
|
174
174
|
const config_0 = (0, exports.resolveStsAuthConfig)(config);
|
|
175
|
-
const config_1 = (0,
|
|
175
|
+
const config_1 = (0, httpAuthSchemes_1.resolveAwsSdkSigV4Config)(config_0);
|
|
176
176
|
return Object.assign(config_1, {
|
|
177
177
|
authSchemePreference: (0, util_middleware_1.normalizeProvider)(config.authSchemePreference ?? []),
|
|
178
178
|
});
|
|
@@ -240,8 +240,146 @@ util_endpoints_2.customEndpointFunctions.aws = util_endpoints_1.awsEndpointFunct
|
|
|
240
240
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
241
241
|
exports.ruleSet = void 0;
|
|
242
242
|
const F = "required", G = "type", H = "fn", I = "argv", J = "ref";
|
|
243
|
-
const a = false, b = true, c = "booleanEquals", d = "stringEquals", e = "sigv4", f = "sts", g = "us-east-1", h = "endpoint", i = "https://sts.{Region}.{PartitionResult#dnsSuffix}", j = "tree", k = "error", l = "getAttr", m = { [F]: false, [G]: "string" }, n = { [F]: true,
|
|
244
|
-
|
|
243
|
+
const a = false, b = true, c = "booleanEquals", d = "stringEquals", e = "sigv4", f = "sts", g = "us-east-1", h = "endpoint", i = "https://sts.{Region}.{PartitionResult#dnsSuffix}", j = "tree", k = "error", l = "getAttr", m = { [F]: false, [G]: "string" }, n = { [F]: true, default: false, [G]: "boolean" }, o = { [J]: "Endpoint" }, p = { [H]: "isSet", [I]: [{ [J]: "Region" }] }, q = { [J]: "Region" }, r = { [H]: "aws.partition", [I]: [q], assign: "PartitionResult" }, s = { [J]: "UseFIPS" }, t = { [J]: "UseDualStack" }, u = {
|
|
244
|
+
url: "https://sts.amazonaws.com",
|
|
245
|
+
properties: { authSchemes: [{ name: e, signingName: f, signingRegion: g }] },
|
|
246
|
+
headers: {},
|
|
247
|
+
}, v = {}, w = { conditions: [{ [H]: d, [I]: [q, "aws-global"] }], [h]: u, [G]: h }, x = { [H]: c, [I]: [s, true] }, y = { [H]: c, [I]: [t, true] }, z = { [H]: l, [I]: [{ [J]: "PartitionResult" }, "supportsFIPS"] }, A = { [J]: "PartitionResult" }, B = { [H]: c, [I]: [true, { [H]: l, [I]: [A, "supportsDualStack"] }] }, C = [{ [H]: "isSet", [I]: [o] }], D = [x], E = [y];
|
|
248
|
+
const _data = {
|
|
249
|
+
version: "1.0",
|
|
250
|
+
parameters: { Region: m, UseDualStack: n, UseFIPS: n, Endpoint: m, UseGlobalEndpoint: n },
|
|
251
|
+
rules: [
|
|
252
|
+
{
|
|
253
|
+
conditions: [
|
|
254
|
+
{ [H]: c, [I]: [{ [J]: "UseGlobalEndpoint" }, b] },
|
|
255
|
+
{ [H]: "not", [I]: C },
|
|
256
|
+
p,
|
|
257
|
+
r,
|
|
258
|
+
{ [H]: c, [I]: [s, a] },
|
|
259
|
+
{ [H]: c, [I]: [t, a] },
|
|
260
|
+
],
|
|
261
|
+
rules: [
|
|
262
|
+
{ conditions: [{ [H]: d, [I]: [q, "ap-northeast-1"] }], endpoint: u, [G]: h },
|
|
263
|
+
{ conditions: [{ [H]: d, [I]: [q, "ap-south-1"] }], endpoint: u, [G]: h },
|
|
264
|
+
{ conditions: [{ [H]: d, [I]: [q, "ap-southeast-1"] }], endpoint: u, [G]: h },
|
|
265
|
+
{ conditions: [{ [H]: d, [I]: [q, "ap-southeast-2"] }], endpoint: u, [G]: h },
|
|
266
|
+
w,
|
|
267
|
+
{ conditions: [{ [H]: d, [I]: [q, "ca-central-1"] }], endpoint: u, [G]: h },
|
|
268
|
+
{ conditions: [{ [H]: d, [I]: [q, "eu-central-1"] }], endpoint: u, [G]: h },
|
|
269
|
+
{ conditions: [{ [H]: d, [I]: [q, "eu-north-1"] }], endpoint: u, [G]: h },
|
|
270
|
+
{ conditions: [{ [H]: d, [I]: [q, "eu-west-1"] }], endpoint: u, [G]: h },
|
|
271
|
+
{ conditions: [{ [H]: d, [I]: [q, "eu-west-2"] }], endpoint: u, [G]: h },
|
|
272
|
+
{ conditions: [{ [H]: d, [I]: [q, "eu-west-3"] }], endpoint: u, [G]: h },
|
|
273
|
+
{ conditions: [{ [H]: d, [I]: [q, "sa-east-1"] }], endpoint: u, [G]: h },
|
|
274
|
+
{ conditions: [{ [H]: d, [I]: [q, g] }], endpoint: u, [G]: h },
|
|
275
|
+
{ conditions: [{ [H]: d, [I]: [q, "us-east-2"] }], endpoint: u, [G]: h },
|
|
276
|
+
{ conditions: [{ [H]: d, [I]: [q, "us-west-1"] }], endpoint: u, [G]: h },
|
|
277
|
+
{ conditions: [{ [H]: d, [I]: [q, "us-west-2"] }], endpoint: u, [G]: h },
|
|
278
|
+
{
|
|
279
|
+
endpoint: {
|
|
280
|
+
url: i,
|
|
281
|
+
properties: { authSchemes: [{ name: e, signingName: f, signingRegion: "{Region}" }] },
|
|
282
|
+
headers: v,
|
|
283
|
+
},
|
|
284
|
+
[G]: h,
|
|
285
|
+
},
|
|
286
|
+
],
|
|
287
|
+
[G]: j,
|
|
288
|
+
},
|
|
289
|
+
{
|
|
290
|
+
conditions: C,
|
|
291
|
+
rules: [
|
|
292
|
+
{ conditions: D, error: "Invalid Configuration: FIPS and custom endpoint are not supported", [G]: k },
|
|
293
|
+
{ conditions: E, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", [G]: k },
|
|
294
|
+
{ endpoint: { url: o, properties: v, headers: v }, [G]: h },
|
|
295
|
+
],
|
|
296
|
+
[G]: j,
|
|
297
|
+
},
|
|
298
|
+
{
|
|
299
|
+
conditions: [p],
|
|
300
|
+
rules: [
|
|
301
|
+
{
|
|
302
|
+
conditions: [r],
|
|
303
|
+
rules: [
|
|
304
|
+
{
|
|
305
|
+
conditions: [x, y],
|
|
306
|
+
rules: [
|
|
307
|
+
{
|
|
308
|
+
conditions: [{ [H]: c, [I]: [b, z] }, B],
|
|
309
|
+
rules: [
|
|
310
|
+
{
|
|
311
|
+
endpoint: {
|
|
312
|
+
url: "https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",
|
|
313
|
+
properties: v,
|
|
314
|
+
headers: v,
|
|
315
|
+
},
|
|
316
|
+
[G]: h,
|
|
317
|
+
},
|
|
318
|
+
],
|
|
319
|
+
[G]: j,
|
|
320
|
+
},
|
|
321
|
+
{ error: "FIPS and DualStack are enabled, but this partition does not support one or both", [G]: k },
|
|
322
|
+
],
|
|
323
|
+
[G]: j,
|
|
324
|
+
},
|
|
325
|
+
{
|
|
326
|
+
conditions: D,
|
|
327
|
+
rules: [
|
|
328
|
+
{
|
|
329
|
+
conditions: [{ [H]: c, [I]: [z, b] }],
|
|
330
|
+
rules: [
|
|
331
|
+
{
|
|
332
|
+
conditions: [{ [H]: d, [I]: [{ [H]: l, [I]: [A, "name"] }, "aws-us-gov"] }],
|
|
333
|
+
endpoint: { url: "https://sts.{Region}.amazonaws.com", properties: v, headers: v },
|
|
334
|
+
[G]: h,
|
|
335
|
+
},
|
|
336
|
+
{
|
|
337
|
+
endpoint: {
|
|
338
|
+
url: "https://sts-fips.{Region}.{PartitionResult#dnsSuffix}",
|
|
339
|
+
properties: v,
|
|
340
|
+
headers: v,
|
|
341
|
+
},
|
|
342
|
+
[G]: h,
|
|
343
|
+
},
|
|
344
|
+
],
|
|
345
|
+
[G]: j,
|
|
346
|
+
},
|
|
347
|
+
{ error: "FIPS is enabled but this partition does not support FIPS", [G]: k },
|
|
348
|
+
],
|
|
349
|
+
[G]: j,
|
|
350
|
+
},
|
|
351
|
+
{
|
|
352
|
+
conditions: E,
|
|
353
|
+
rules: [
|
|
354
|
+
{
|
|
355
|
+
conditions: [B],
|
|
356
|
+
rules: [
|
|
357
|
+
{
|
|
358
|
+
endpoint: {
|
|
359
|
+
url: "https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}",
|
|
360
|
+
properties: v,
|
|
361
|
+
headers: v,
|
|
362
|
+
},
|
|
363
|
+
[G]: h,
|
|
364
|
+
},
|
|
365
|
+
],
|
|
366
|
+
[G]: j,
|
|
367
|
+
},
|
|
368
|
+
{ error: "DualStack is enabled but this partition does not support DualStack", [G]: k },
|
|
369
|
+
],
|
|
370
|
+
[G]: j,
|
|
371
|
+
},
|
|
372
|
+
w,
|
|
373
|
+
{ endpoint: { url: i, properties: v, headers: v }, [G]: h },
|
|
374
|
+
],
|
|
375
|
+
[G]: j,
|
|
376
|
+
},
|
|
377
|
+
],
|
|
378
|
+
[G]: j,
|
|
379
|
+
},
|
|
380
|
+
{ error: "Invalid Configuration: Missing Region", [G]: k },
|
|
381
|
+
],
|
|
382
|
+
};
|
|
245
383
|
exports.ruleSet = _data;
|
|
246
384
|
|
|
247
385
|
|
|
@@ -256,284 +394,11 @@ var STSClient = __webpack_require__(63723);
|
|
|
256
394
|
var smithyClient = __webpack_require__(61411);
|
|
257
395
|
var middlewareEndpoint = __webpack_require__(40099);
|
|
258
396
|
var EndpointParameters = __webpack_require__(76811);
|
|
259
|
-
var
|
|
397
|
+
var schemas_0 = __webpack_require__(1684);
|
|
398
|
+
var errors = __webpack_require__(41688);
|
|
260
399
|
var client = __webpack_require__(5152);
|
|
261
400
|
var regionConfigResolver = __webpack_require__(36463);
|
|
262
|
-
|
|
263
|
-
class STSServiceException extends smithyClient.ServiceException {
|
|
264
|
-
constructor(options) {
|
|
265
|
-
super(options);
|
|
266
|
-
Object.setPrototypeOf(this, STSServiceException.prototype);
|
|
267
|
-
}
|
|
268
|
-
}
|
|
269
|
-
|
|
270
|
-
class ExpiredTokenException extends STSServiceException {
|
|
271
|
-
name = "ExpiredTokenException";
|
|
272
|
-
$fault = "client";
|
|
273
|
-
constructor(opts) {
|
|
274
|
-
super({
|
|
275
|
-
name: "ExpiredTokenException",
|
|
276
|
-
$fault: "client",
|
|
277
|
-
...opts,
|
|
278
|
-
});
|
|
279
|
-
Object.setPrototypeOf(this, ExpiredTokenException.prototype);
|
|
280
|
-
}
|
|
281
|
-
}
|
|
282
|
-
class MalformedPolicyDocumentException extends STSServiceException {
|
|
283
|
-
name = "MalformedPolicyDocumentException";
|
|
284
|
-
$fault = "client";
|
|
285
|
-
constructor(opts) {
|
|
286
|
-
super({
|
|
287
|
-
name: "MalformedPolicyDocumentException",
|
|
288
|
-
$fault: "client",
|
|
289
|
-
...opts,
|
|
290
|
-
});
|
|
291
|
-
Object.setPrototypeOf(this, MalformedPolicyDocumentException.prototype);
|
|
292
|
-
}
|
|
293
|
-
}
|
|
294
|
-
class PackedPolicyTooLargeException extends STSServiceException {
|
|
295
|
-
name = "PackedPolicyTooLargeException";
|
|
296
|
-
$fault = "client";
|
|
297
|
-
constructor(opts) {
|
|
298
|
-
super({
|
|
299
|
-
name: "PackedPolicyTooLargeException",
|
|
300
|
-
$fault: "client",
|
|
301
|
-
...opts,
|
|
302
|
-
});
|
|
303
|
-
Object.setPrototypeOf(this, PackedPolicyTooLargeException.prototype);
|
|
304
|
-
}
|
|
305
|
-
}
|
|
306
|
-
class RegionDisabledException extends STSServiceException {
|
|
307
|
-
name = "RegionDisabledException";
|
|
308
|
-
$fault = "client";
|
|
309
|
-
constructor(opts) {
|
|
310
|
-
super({
|
|
311
|
-
name: "RegionDisabledException",
|
|
312
|
-
$fault: "client",
|
|
313
|
-
...opts,
|
|
314
|
-
});
|
|
315
|
-
Object.setPrototypeOf(this, RegionDisabledException.prototype);
|
|
316
|
-
}
|
|
317
|
-
}
|
|
318
|
-
class IDPRejectedClaimException extends STSServiceException {
|
|
319
|
-
name = "IDPRejectedClaimException";
|
|
320
|
-
$fault = "client";
|
|
321
|
-
constructor(opts) {
|
|
322
|
-
super({
|
|
323
|
-
name: "IDPRejectedClaimException",
|
|
324
|
-
$fault: "client",
|
|
325
|
-
...opts,
|
|
326
|
-
});
|
|
327
|
-
Object.setPrototypeOf(this, IDPRejectedClaimException.prototype);
|
|
328
|
-
}
|
|
329
|
-
}
|
|
330
|
-
class InvalidIdentityTokenException extends STSServiceException {
|
|
331
|
-
name = "InvalidIdentityTokenException";
|
|
332
|
-
$fault = "client";
|
|
333
|
-
constructor(opts) {
|
|
334
|
-
super({
|
|
335
|
-
name: "InvalidIdentityTokenException",
|
|
336
|
-
$fault: "client",
|
|
337
|
-
...opts,
|
|
338
|
-
});
|
|
339
|
-
Object.setPrototypeOf(this, InvalidIdentityTokenException.prototype);
|
|
340
|
-
}
|
|
341
|
-
}
|
|
342
|
-
class IDPCommunicationErrorException extends STSServiceException {
|
|
343
|
-
name = "IDPCommunicationErrorException";
|
|
344
|
-
$fault = "client";
|
|
345
|
-
constructor(opts) {
|
|
346
|
-
super({
|
|
347
|
-
name: "IDPCommunicationErrorException",
|
|
348
|
-
$fault: "client",
|
|
349
|
-
...opts,
|
|
350
|
-
});
|
|
351
|
-
Object.setPrototypeOf(this, IDPCommunicationErrorException.prototype);
|
|
352
|
-
}
|
|
353
|
-
}
|
|
354
|
-
|
|
355
|
-
const _A = "Arn";
|
|
356
|
-
const _AKI = "AccessKeyId";
|
|
357
|
-
const _AR = "AssumeRole";
|
|
358
|
-
const _ARI = "AssumedRoleId";
|
|
359
|
-
const _ARR = "AssumeRoleRequest";
|
|
360
|
-
const _ARRs = "AssumeRoleResponse";
|
|
361
|
-
const _ARU = "AssumedRoleUser";
|
|
362
|
-
const _ARWWI = "AssumeRoleWithWebIdentity";
|
|
363
|
-
const _ARWWIR = "AssumeRoleWithWebIdentityRequest";
|
|
364
|
-
const _ARWWIRs = "AssumeRoleWithWebIdentityResponse";
|
|
365
|
-
const _Au = "Audience";
|
|
366
|
-
const _C = "Credentials";
|
|
367
|
-
const _CA = "ContextAssertion";
|
|
368
|
-
const _DS = "DurationSeconds";
|
|
369
|
-
const _E = "Expiration";
|
|
370
|
-
const _EI = "ExternalId";
|
|
371
|
-
const _ETE = "ExpiredTokenException";
|
|
372
|
-
const _IDPCEE = "IDPCommunicationErrorException";
|
|
373
|
-
const _IDPRCE = "IDPRejectedClaimException";
|
|
374
|
-
const _IITE = "InvalidIdentityTokenException";
|
|
375
|
-
const _K = "Key";
|
|
376
|
-
const _MPDE = "MalformedPolicyDocumentException";
|
|
377
|
-
const _P = "Policy";
|
|
378
|
-
const _PA = "PolicyArns";
|
|
379
|
-
const _PAr = "ProviderArn";
|
|
380
|
-
const _PC = "ProvidedContexts";
|
|
381
|
-
const _PCLT = "ProvidedContextsListType";
|
|
382
|
-
const _PCr = "ProvidedContext";
|
|
383
|
-
const _PDT = "PolicyDescriptorType";
|
|
384
|
-
const _PI = "ProviderId";
|
|
385
|
-
const _PPS = "PackedPolicySize";
|
|
386
|
-
const _PPTLE = "PackedPolicyTooLargeException";
|
|
387
|
-
const _Pr = "Provider";
|
|
388
|
-
const _RA = "RoleArn";
|
|
389
|
-
const _RDE = "RegionDisabledException";
|
|
390
|
-
const _RSN = "RoleSessionName";
|
|
391
|
-
const _SAK = "SecretAccessKey";
|
|
392
|
-
const _SFWIT = "SubjectFromWebIdentityToken";
|
|
393
|
-
const _SI = "SourceIdentity";
|
|
394
|
-
const _SN = "SerialNumber";
|
|
395
|
-
const _ST = "SessionToken";
|
|
396
|
-
const _T = "Tags";
|
|
397
|
-
const _TC = "TokenCode";
|
|
398
|
-
const _TTK = "TransitiveTagKeys";
|
|
399
|
-
const _Ta = "Tag";
|
|
400
|
-
const _V = "Value";
|
|
401
|
-
const _WIT = "WebIdentityToken";
|
|
402
|
-
const _a = "arn";
|
|
403
|
-
const _aKST = "accessKeySecretType";
|
|
404
|
-
const _aQE = "awsQueryError";
|
|
405
|
-
const _c = "client";
|
|
406
|
-
const _cTT = "clientTokenType";
|
|
407
|
-
const _e = "error";
|
|
408
|
-
const _hE = "httpError";
|
|
409
|
-
const _m = "message";
|
|
410
|
-
const _pDLT = "policyDescriptorListType";
|
|
411
|
-
const _s = "smithy.ts.sdk.synthetic.com.amazonaws.sts";
|
|
412
|
-
const _tLT = "tagListType";
|
|
413
|
-
const n0 = "com.amazonaws.sts";
|
|
414
|
-
var accessKeySecretType = [0, n0, _aKST, 8, 0];
|
|
415
|
-
var clientTokenType = [0, n0, _cTT, 8, 0];
|
|
416
|
-
var AssumedRoleUser$ = [3, n0, _ARU, 0, [_ARI, _A], [0, 0]];
|
|
417
|
-
var AssumeRoleRequest$ = [
|
|
418
|
-
3,
|
|
419
|
-
n0,
|
|
420
|
-
_ARR,
|
|
421
|
-
0,
|
|
422
|
-
[_RA, _RSN, _PA, _P, _DS, _T, _TTK, _EI, _SN, _TC, _SI, _PC],
|
|
423
|
-
[0, 0, () => policyDescriptorListType, 0, 1, () => tagListType, 64 | 0, 0, 0, 0, 0, () => ProvidedContextsListType],
|
|
424
|
-
];
|
|
425
|
-
var AssumeRoleResponse$ = [
|
|
426
|
-
3,
|
|
427
|
-
n0,
|
|
428
|
-
_ARRs,
|
|
429
|
-
0,
|
|
430
|
-
[_C, _ARU, _PPS, _SI],
|
|
431
|
-
[[() => Credentials$, 0], () => AssumedRoleUser$, 1, 0],
|
|
432
|
-
];
|
|
433
|
-
var AssumeRoleWithWebIdentityRequest$ = [
|
|
434
|
-
3,
|
|
435
|
-
n0,
|
|
436
|
-
_ARWWIR,
|
|
437
|
-
0,
|
|
438
|
-
[_RA, _RSN, _WIT, _PI, _PA, _P, _DS],
|
|
439
|
-
[0, 0, [() => clientTokenType, 0], 0, () => policyDescriptorListType, 0, 1],
|
|
440
|
-
];
|
|
441
|
-
var AssumeRoleWithWebIdentityResponse$ = [
|
|
442
|
-
3,
|
|
443
|
-
n0,
|
|
444
|
-
_ARWWIRs,
|
|
445
|
-
0,
|
|
446
|
-
[_C, _SFWIT, _ARU, _PPS, _Pr, _Au, _SI],
|
|
447
|
-
[[() => Credentials$, 0], 0, () => AssumedRoleUser$, 1, 0, 0, 0],
|
|
448
|
-
];
|
|
449
|
-
var Credentials$ = [
|
|
450
|
-
3,
|
|
451
|
-
n0,
|
|
452
|
-
_C,
|
|
453
|
-
0,
|
|
454
|
-
[_AKI, _SAK, _ST, _E],
|
|
455
|
-
[0, [() => accessKeySecretType, 0], 0, 4],
|
|
456
|
-
];
|
|
457
|
-
var ExpiredTokenException$ = [
|
|
458
|
-
-3,
|
|
459
|
-
n0,
|
|
460
|
-
_ETE,
|
|
461
|
-
{ [_aQE]: [`ExpiredTokenException`, 400], [_e]: _c, [_hE]: 400 },
|
|
462
|
-
[_m],
|
|
463
|
-
[0],
|
|
464
|
-
];
|
|
465
|
-
schema.TypeRegistry.for(n0).registerError(ExpiredTokenException$, ExpiredTokenException);
|
|
466
|
-
var IDPCommunicationErrorException$ = [
|
|
467
|
-
-3,
|
|
468
|
-
n0,
|
|
469
|
-
_IDPCEE,
|
|
470
|
-
{ [_aQE]: [`IDPCommunicationError`, 400], [_e]: _c, [_hE]: 400 },
|
|
471
|
-
[_m],
|
|
472
|
-
[0],
|
|
473
|
-
];
|
|
474
|
-
schema.TypeRegistry.for(n0).registerError(IDPCommunicationErrorException$, IDPCommunicationErrorException);
|
|
475
|
-
var IDPRejectedClaimException$ = [
|
|
476
|
-
-3,
|
|
477
|
-
n0,
|
|
478
|
-
_IDPRCE,
|
|
479
|
-
{ [_aQE]: [`IDPRejectedClaim`, 403], [_e]: _c, [_hE]: 403 },
|
|
480
|
-
[_m],
|
|
481
|
-
[0],
|
|
482
|
-
];
|
|
483
|
-
schema.TypeRegistry.for(n0).registerError(IDPRejectedClaimException$, IDPRejectedClaimException);
|
|
484
|
-
var InvalidIdentityTokenException$ = [
|
|
485
|
-
-3,
|
|
486
|
-
n0,
|
|
487
|
-
_IITE,
|
|
488
|
-
{ [_aQE]: [`InvalidIdentityToken`, 400], [_e]: _c, [_hE]: 400 },
|
|
489
|
-
[_m],
|
|
490
|
-
[0],
|
|
491
|
-
];
|
|
492
|
-
schema.TypeRegistry.for(n0).registerError(InvalidIdentityTokenException$, InvalidIdentityTokenException);
|
|
493
|
-
var MalformedPolicyDocumentException$ = [
|
|
494
|
-
-3,
|
|
495
|
-
n0,
|
|
496
|
-
_MPDE,
|
|
497
|
-
{ [_aQE]: [`MalformedPolicyDocument`, 400], [_e]: _c, [_hE]: 400 },
|
|
498
|
-
[_m],
|
|
499
|
-
[0],
|
|
500
|
-
];
|
|
501
|
-
schema.TypeRegistry.for(n0).registerError(MalformedPolicyDocumentException$, MalformedPolicyDocumentException);
|
|
502
|
-
var PackedPolicyTooLargeException$ = [
|
|
503
|
-
-3,
|
|
504
|
-
n0,
|
|
505
|
-
_PPTLE,
|
|
506
|
-
{ [_aQE]: [`PackedPolicyTooLarge`, 400], [_e]: _c, [_hE]: 400 },
|
|
507
|
-
[_m],
|
|
508
|
-
[0],
|
|
509
|
-
];
|
|
510
|
-
schema.TypeRegistry.for(n0).registerError(PackedPolicyTooLargeException$, PackedPolicyTooLargeException);
|
|
511
|
-
var PolicyDescriptorType$ = [3, n0, _PDT, 0, [_a], [0]];
|
|
512
|
-
var ProvidedContext$ = [3, n0, _PCr, 0, [_PAr, _CA], [0, 0]];
|
|
513
|
-
var RegionDisabledException$ = [
|
|
514
|
-
-3,
|
|
515
|
-
n0,
|
|
516
|
-
_RDE,
|
|
517
|
-
{ [_aQE]: [`RegionDisabledException`, 403], [_e]: _c, [_hE]: 403 },
|
|
518
|
-
[_m],
|
|
519
|
-
[0],
|
|
520
|
-
];
|
|
521
|
-
schema.TypeRegistry.for(n0).registerError(RegionDisabledException$, RegionDisabledException);
|
|
522
|
-
var Tag$ = [3, n0, _Ta, 0, [_K, _V], [0, 0]];
|
|
523
|
-
var STSServiceException$ = [-3, _s, "STSServiceException", 0, [], []];
|
|
524
|
-
schema.TypeRegistry.for(_s).registerError(STSServiceException$, STSServiceException);
|
|
525
|
-
var policyDescriptorListType = [1, n0, _pDLT, 0, () => PolicyDescriptorType$];
|
|
526
|
-
var ProvidedContextsListType = [1, n0, _PCLT, 0, () => ProvidedContext$];
|
|
527
|
-
var tagListType = [1, n0, _tLT, 0, () => Tag$];
|
|
528
|
-
var AssumeRole$ = [9, n0, _AR, 0, () => AssumeRoleRequest$, () => AssumeRoleResponse$];
|
|
529
|
-
var AssumeRoleWithWebIdentity$ = [
|
|
530
|
-
9,
|
|
531
|
-
n0,
|
|
532
|
-
_ARWWI,
|
|
533
|
-
0,
|
|
534
|
-
() => AssumeRoleWithWebIdentityRequest$,
|
|
535
|
-
() => AssumeRoleWithWebIdentityResponse$,
|
|
536
|
-
];
|
|
401
|
+
var STSServiceException = __webpack_require__(17171);
|
|
537
402
|
|
|
538
403
|
class AssumeRoleCommand extends smithyClient.Command
|
|
539
404
|
.classBuilder()
|
|
@@ -543,7 +408,7 @@ class AssumeRoleCommand extends smithyClient.Command
|
|
|
543
408
|
})
|
|
544
409
|
.s("AWSSecurityTokenServiceV20110615", "AssumeRole", {})
|
|
545
410
|
.n("STSClient", "AssumeRoleCommand")
|
|
546
|
-
.sc(AssumeRole$)
|
|
411
|
+
.sc(schemas_0.AssumeRole$)
|
|
547
412
|
.build() {
|
|
548
413
|
}
|
|
549
414
|
|
|
@@ -555,7 +420,7 @@ class AssumeRoleWithWebIdentityCommand extends smithyClient.Command
|
|
|
555
420
|
})
|
|
556
421
|
.s("AWSSecurityTokenServiceV20110615", "AssumeRoleWithWebIdentity", {})
|
|
557
422
|
.n("STSClient", "AssumeRoleWithWebIdentityCommand")
|
|
558
|
-
.sc(AssumeRoleWithWebIdentity$)
|
|
423
|
+
.sc(schemas_0.AssumeRoleWithWebIdentity$)
|
|
559
424
|
.build() {
|
|
560
425
|
}
|
|
561
426
|
|
|
@@ -687,65 +552,182 @@ const decorateDefaultCredentialProvider = (provider) => (input) => provider({
|
|
|
687
552
|
...input,
|
|
688
553
|
});
|
|
689
554
|
|
|
690
|
-
|
|
691
|
-
|
|
692
|
-
get: function () { return smithyClient.Command; }
|
|
693
|
-
}));
|
|
694
|
-
exports.AssumeRole$ = AssumeRole$;
|
|
555
|
+
exports.$Command = smithyClient.Command;
|
|
556
|
+
exports.STSServiceException = STSServiceException.STSServiceException;
|
|
695
557
|
exports.AssumeRoleCommand = AssumeRoleCommand;
|
|
696
|
-
exports.AssumeRoleRequest$ = AssumeRoleRequest$;
|
|
697
|
-
exports.AssumeRoleResponse$ = AssumeRoleResponse$;
|
|
698
|
-
exports.AssumeRoleWithWebIdentity$ = AssumeRoleWithWebIdentity$;
|
|
699
558
|
exports.AssumeRoleWithWebIdentityCommand = AssumeRoleWithWebIdentityCommand;
|
|
700
|
-
exports.AssumeRoleWithWebIdentityRequest$ = AssumeRoleWithWebIdentityRequest$;
|
|
701
|
-
exports.AssumeRoleWithWebIdentityResponse$ = AssumeRoleWithWebIdentityResponse$;
|
|
702
|
-
exports.AssumedRoleUser$ = AssumedRoleUser$;
|
|
703
|
-
exports.Credentials$ = Credentials$;
|
|
704
|
-
exports.ExpiredTokenException = ExpiredTokenException;
|
|
705
|
-
exports.ExpiredTokenException$ = ExpiredTokenException$;
|
|
706
|
-
exports.IDPCommunicationErrorException = IDPCommunicationErrorException;
|
|
707
|
-
exports.IDPCommunicationErrorException$ = IDPCommunicationErrorException$;
|
|
708
|
-
exports.IDPRejectedClaimException = IDPRejectedClaimException;
|
|
709
|
-
exports.IDPRejectedClaimException$ = IDPRejectedClaimException$;
|
|
710
|
-
exports.InvalidIdentityTokenException = InvalidIdentityTokenException;
|
|
711
|
-
exports.InvalidIdentityTokenException$ = InvalidIdentityTokenException$;
|
|
712
|
-
exports.MalformedPolicyDocumentException = MalformedPolicyDocumentException;
|
|
713
|
-
exports.MalformedPolicyDocumentException$ = MalformedPolicyDocumentException$;
|
|
714
|
-
exports.PackedPolicyTooLargeException = PackedPolicyTooLargeException;
|
|
715
|
-
exports.PackedPolicyTooLargeException$ = PackedPolicyTooLargeException$;
|
|
716
|
-
exports.PolicyDescriptorType$ = PolicyDescriptorType$;
|
|
717
|
-
exports.ProvidedContext$ = ProvidedContext$;
|
|
718
|
-
exports.RegionDisabledException = RegionDisabledException;
|
|
719
|
-
exports.RegionDisabledException$ = RegionDisabledException$;
|
|
720
559
|
exports.STS = STS;
|
|
721
|
-
exports.STSServiceException = STSServiceException;
|
|
722
|
-
exports.STSServiceException$ = STSServiceException$;
|
|
723
|
-
exports.Tag$ = Tag$;
|
|
724
560
|
exports.decorateDefaultCredentialProvider = decorateDefaultCredentialProvider;
|
|
725
561
|
exports.getDefaultRoleAssumer = getDefaultRoleAssumer;
|
|
726
562
|
exports.getDefaultRoleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity;
|
|
563
|
+
Object.prototype.hasOwnProperty.call(STSClient, '__proto__') &&
|
|
564
|
+
!Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
|
|
565
|
+
Object.defineProperty(exports, '__proto__', {
|
|
566
|
+
enumerable: true,
|
|
567
|
+
value: STSClient['__proto__']
|
|
568
|
+
});
|
|
569
|
+
|
|
727
570
|
Object.keys(STSClient).forEach(function (k) {
|
|
728
|
-
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k))
|
|
571
|
+
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = STSClient[k];
|
|
572
|
+
});
|
|
573
|
+
Object.prototype.hasOwnProperty.call(schemas_0, '__proto__') &&
|
|
574
|
+
!Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
|
|
575
|
+
Object.defineProperty(exports, '__proto__', {
|
|
576
|
+
enumerable: true,
|
|
577
|
+
value: schemas_0['__proto__']
|
|
578
|
+
});
|
|
579
|
+
|
|
580
|
+
Object.keys(schemas_0).forEach(function (k) {
|
|
581
|
+
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = schemas_0[k];
|
|
582
|
+
});
|
|
583
|
+
Object.prototype.hasOwnProperty.call(errors, '__proto__') &&
|
|
584
|
+
!Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
|
|
585
|
+
Object.defineProperty(exports, '__proto__', {
|
|
729
586
|
enumerable: true,
|
|
730
|
-
|
|
587
|
+
value: errors['__proto__']
|
|
731
588
|
});
|
|
589
|
+
|
|
590
|
+
Object.keys(errors).forEach(function (k) {
|
|
591
|
+
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = errors[k];
|
|
732
592
|
});
|
|
733
593
|
|
|
734
594
|
|
|
735
595
|
/***/ }),
|
|
736
596
|
|
|
737
|
-
/***/
|
|
597
|
+
/***/ 17171:
|
|
738
598
|
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
739
599
|
|
|
740
600
|
|
|
741
601
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
742
|
-
exports.
|
|
602
|
+
exports.STSServiceException = exports.__ServiceException = void 0;
|
|
603
|
+
const smithy_client_1 = __webpack_require__(61411);
|
|
604
|
+
Object.defineProperty(exports, "__ServiceException", ({ enumerable: true, get: function () { return smithy_client_1.ServiceException; } }));
|
|
605
|
+
class STSServiceException extends smithy_client_1.ServiceException {
|
|
606
|
+
constructor(options) {
|
|
607
|
+
super(options);
|
|
608
|
+
Object.setPrototypeOf(this, STSServiceException.prototype);
|
|
609
|
+
}
|
|
610
|
+
}
|
|
611
|
+
exports.STSServiceException = STSServiceException;
|
|
612
|
+
|
|
613
|
+
|
|
614
|
+
/***/ }),
|
|
615
|
+
|
|
616
|
+
/***/ 41688:
|
|
617
|
+
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
618
|
+
|
|
619
|
+
|
|
620
|
+
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
621
|
+
exports.IDPCommunicationErrorException = exports.InvalidIdentityTokenException = exports.IDPRejectedClaimException = exports.RegionDisabledException = exports.PackedPolicyTooLargeException = exports.MalformedPolicyDocumentException = exports.ExpiredTokenException = void 0;
|
|
622
|
+
const STSServiceException_1 = __webpack_require__(17171);
|
|
623
|
+
class ExpiredTokenException extends STSServiceException_1.STSServiceException {
|
|
624
|
+
name = "ExpiredTokenException";
|
|
625
|
+
$fault = "client";
|
|
626
|
+
constructor(opts) {
|
|
627
|
+
super({
|
|
628
|
+
name: "ExpiredTokenException",
|
|
629
|
+
$fault: "client",
|
|
630
|
+
...opts,
|
|
631
|
+
});
|
|
632
|
+
Object.setPrototypeOf(this, ExpiredTokenException.prototype);
|
|
633
|
+
}
|
|
634
|
+
}
|
|
635
|
+
exports.ExpiredTokenException = ExpiredTokenException;
|
|
636
|
+
class MalformedPolicyDocumentException extends STSServiceException_1.STSServiceException {
|
|
637
|
+
name = "MalformedPolicyDocumentException";
|
|
638
|
+
$fault = "client";
|
|
639
|
+
constructor(opts) {
|
|
640
|
+
super({
|
|
641
|
+
name: "MalformedPolicyDocumentException",
|
|
642
|
+
$fault: "client",
|
|
643
|
+
...opts,
|
|
644
|
+
});
|
|
645
|
+
Object.setPrototypeOf(this, MalformedPolicyDocumentException.prototype);
|
|
646
|
+
}
|
|
647
|
+
}
|
|
648
|
+
exports.MalformedPolicyDocumentException = MalformedPolicyDocumentException;
|
|
649
|
+
class PackedPolicyTooLargeException extends STSServiceException_1.STSServiceException {
|
|
650
|
+
name = "PackedPolicyTooLargeException";
|
|
651
|
+
$fault = "client";
|
|
652
|
+
constructor(opts) {
|
|
653
|
+
super({
|
|
654
|
+
name: "PackedPolicyTooLargeException",
|
|
655
|
+
$fault: "client",
|
|
656
|
+
...opts,
|
|
657
|
+
});
|
|
658
|
+
Object.setPrototypeOf(this, PackedPolicyTooLargeException.prototype);
|
|
659
|
+
}
|
|
660
|
+
}
|
|
661
|
+
exports.PackedPolicyTooLargeException = PackedPolicyTooLargeException;
|
|
662
|
+
class RegionDisabledException extends STSServiceException_1.STSServiceException {
|
|
663
|
+
name = "RegionDisabledException";
|
|
664
|
+
$fault = "client";
|
|
665
|
+
constructor(opts) {
|
|
666
|
+
super({
|
|
667
|
+
name: "RegionDisabledException",
|
|
668
|
+
$fault: "client",
|
|
669
|
+
...opts,
|
|
670
|
+
});
|
|
671
|
+
Object.setPrototypeOf(this, RegionDisabledException.prototype);
|
|
672
|
+
}
|
|
673
|
+
}
|
|
674
|
+
exports.RegionDisabledException = RegionDisabledException;
|
|
675
|
+
class IDPRejectedClaimException extends STSServiceException_1.STSServiceException {
|
|
676
|
+
name = "IDPRejectedClaimException";
|
|
677
|
+
$fault = "client";
|
|
678
|
+
constructor(opts) {
|
|
679
|
+
super({
|
|
680
|
+
name: "IDPRejectedClaimException",
|
|
681
|
+
$fault: "client",
|
|
682
|
+
...opts,
|
|
683
|
+
});
|
|
684
|
+
Object.setPrototypeOf(this, IDPRejectedClaimException.prototype);
|
|
685
|
+
}
|
|
686
|
+
}
|
|
687
|
+
exports.IDPRejectedClaimException = IDPRejectedClaimException;
|
|
688
|
+
class InvalidIdentityTokenException extends STSServiceException_1.STSServiceException {
|
|
689
|
+
name = "InvalidIdentityTokenException";
|
|
690
|
+
$fault = "client";
|
|
691
|
+
constructor(opts) {
|
|
692
|
+
super({
|
|
693
|
+
name: "InvalidIdentityTokenException",
|
|
694
|
+
$fault: "client",
|
|
695
|
+
...opts,
|
|
696
|
+
});
|
|
697
|
+
Object.setPrototypeOf(this, InvalidIdentityTokenException.prototype);
|
|
698
|
+
}
|
|
699
|
+
}
|
|
700
|
+
exports.InvalidIdentityTokenException = InvalidIdentityTokenException;
|
|
701
|
+
class IDPCommunicationErrorException extends STSServiceException_1.STSServiceException {
|
|
702
|
+
name = "IDPCommunicationErrorException";
|
|
703
|
+
$fault = "client";
|
|
704
|
+
constructor(opts) {
|
|
705
|
+
super({
|
|
706
|
+
name: "IDPCommunicationErrorException",
|
|
707
|
+
$fault: "client",
|
|
708
|
+
...opts,
|
|
709
|
+
});
|
|
710
|
+
Object.setPrototypeOf(this, IDPCommunicationErrorException.prototype);
|
|
711
|
+
}
|
|
712
|
+
}
|
|
713
|
+
exports.IDPCommunicationErrorException = IDPCommunicationErrorException;
|
|
714
|
+
|
|
715
|
+
|
|
716
|
+
/***/ }),
|
|
717
|
+
|
|
718
|
+
/***/ 36578:
|
|
719
|
+
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
720
|
+
|
|
721
|
+
|
|
722
|
+
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
723
|
+
exports.getRuntimeConfig = void 0;
|
|
743
724
|
const tslib_1 = __webpack_require__(61860);
|
|
744
725
|
const package_json_1 = tslib_1.__importDefault(__webpack_require__(39955));
|
|
745
|
-
const
|
|
726
|
+
const client_1 = __webpack_require__(5152);
|
|
727
|
+
const httpAuthSchemes_1 = __webpack_require__(97523);
|
|
746
728
|
const util_user_agent_node_1 = __webpack_require__(51656);
|
|
747
729
|
const config_resolver_1 = __webpack_require__(39316);
|
|
748
|
-
const
|
|
730
|
+
const core_1 = __webpack_require__(90402);
|
|
749
731
|
const hash_node_1 = __webpack_require__(5092);
|
|
750
732
|
const middleware_retry_1 = __webpack_require__(19618);
|
|
751
733
|
const node_config_provider_1 = __webpack_require__(55704);
|
|
@@ -760,7 +742,7 @@ const getRuntimeConfig = (config) => {
|
|
|
760
742
|
const defaultsMode = (0, util_defaults_mode_node_1.resolveDefaultsModeConfig)(config);
|
|
761
743
|
const defaultConfigProvider = () => defaultsMode().then(smithy_client_1.loadConfigsForDefaultMode);
|
|
762
744
|
const clientSharedValues = (0, runtimeConfig_shared_1.getRuntimeConfig)(config);
|
|
763
|
-
(0,
|
|
745
|
+
(0, client_1.emitWarningIfUnsupportedVersion)(process.version);
|
|
764
746
|
const loaderConfig = {
|
|
765
747
|
profile: config?.profile,
|
|
766
748
|
logger: clientSharedValues.logger,
|
|
@@ -770,7 +752,7 @@ const getRuntimeConfig = (config) => {
|
|
|
770
752
|
...config,
|
|
771
753
|
runtime: "node",
|
|
772
754
|
defaultsMode,
|
|
773
|
-
authSchemePreference: config?.authSchemePreference ?? (0, node_config_provider_1.loadConfig)(
|
|
755
|
+
authSchemePreference: config?.authSchemePreference ?? (0, node_config_provider_1.loadConfig)(httpAuthSchemes_1.NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, loaderConfig),
|
|
774
756
|
bodyLengthChecker: config?.bodyLengthChecker ?? util_body_length_node_1.calculateBodyLength,
|
|
775
757
|
defaultUserAgentProvider: config?.defaultUserAgentProvider ??
|
|
776
758
|
(0, util_user_agent_node_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
|
|
@@ -779,12 +761,12 @@ const getRuntimeConfig = (config) => {
|
|
|
779
761
|
schemeId: "aws.auth#sigv4",
|
|
780
762
|
identityProvider: (ipc) => ipc.getIdentityProvider("aws.auth#sigv4") ||
|
|
781
763
|
(async (idProps) => await config.credentialDefaultProvider(idProps?.__config || {})()),
|
|
782
|
-
signer: new
|
|
764
|
+
signer: new httpAuthSchemes_1.AwsSdkSigV4Signer(),
|
|
783
765
|
},
|
|
784
766
|
{
|
|
785
767
|
schemeId: "smithy.api#noAuth",
|
|
786
768
|
identityProvider: (ipc) => ipc.getIdentityProvider("smithy.api#noAuth") || (async () => ({})),
|
|
787
|
-
signer: new
|
|
769
|
+
signer: new core_1.NoAuthSigner(),
|
|
788
770
|
},
|
|
789
771
|
],
|
|
790
772
|
maxAttempts: config?.maxAttempts ?? (0, node_config_provider_1.loadConfig)(middleware_retry_1.NODE_MAX_ATTEMPT_CONFIG_OPTIONS, config),
|
|
@@ -814,15 +796,16 @@ exports.getRuntimeConfig = getRuntimeConfig;
|
|
|
814
796
|
|
|
815
797
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
816
798
|
exports.getRuntimeConfig = void 0;
|
|
817
|
-
const
|
|
799
|
+
const httpAuthSchemes_1 = __webpack_require__(97523);
|
|
818
800
|
const protocols_1 = __webpack_require__(37288);
|
|
819
|
-
const
|
|
801
|
+
const core_1 = __webpack_require__(90402);
|
|
820
802
|
const smithy_client_1 = __webpack_require__(61411);
|
|
821
803
|
const url_parser_1 = __webpack_require__(14494);
|
|
822
804
|
const util_base64_1 = __webpack_require__(68385);
|
|
823
805
|
const util_utf8_1 = __webpack_require__(71577);
|
|
824
806
|
const httpAuthSchemeProvider_1 = __webpack_require__(27851);
|
|
825
807
|
const endpointResolver_1 = __webpack_require__(59765);
|
|
808
|
+
const schemas_0_1 = __webpack_require__(1684);
|
|
826
809
|
const getRuntimeConfig = (config) => {
|
|
827
810
|
return {
|
|
828
811
|
apiVersion: "2011-06-15",
|
|
@@ -836,18 +819,19 @@ const getRuntimeConfig = (config) => {
|
|
|
836
819
|
{
|
|
837
820
|
schemeId: "aws.auth#sigv4",
|
|
838
821
|
identityProvider: (ipc) => ipc.getIdentityProvider("aws.auth#sigv4"),
|
|
839
|
-
signer: new
|
|
822
|
+
signer: new httpAuthSchemes_1.AwsSdkSigV4Signer(),
|
|
840
823
|
},
|
|
841
824
|
{
|
|
842
825
|
schemeId: "smithy.api#noAuth",
|
|
843
826
|
identityProvider: (ipc) => ipc.getIdentityProvider("smithy.api#noAuth") || (async () => ({})),
|
|
844
|
-
signer: new
|
|
827
|
+
signer: new core_1.NoAuthSigner(),
|
|
845
828
|
},
|
|
846
829
|
],
|
|
847
830
|
logger: config?.logger ?? new smithy_client_1.NoOpLogger(),
|
|
848
831
|
protocol: config?.protocol ?? protocols_1.AwsQueryProtocol,
|
|
849
832
|
protocolSettings: config?.protocolSettings ?? {
|
|
850
833
|
defaultNamespace: "com.amazonaws.sts",
|
|
834
|
+
errorTypeRegistries: schemas_0_1.errorTypeRegistries,
|
|
851
835
|
xmlNamespace: "https://sts.amazonaws.com/doc/2011-06-15/",
|
|
852
836
|
version: "2011-06-15",
|
|
853
837
|
serviceTarget: "AWSSecurityTokenServiceV20110615",
|
|
@@ -881,12 +865,214 @@ const resolveRuntimeExtensions = (runtimeConfig, extensions) => {
|
|
|
881
865
|
exports.resolveRuntimeExtensions = resolveRuntimeExtensions;
|
|
882
866
|
|
|
883
867
|
|
|
868
|
+
/***/ }),
|
|
869
|
+
|
|
870
|
+
/***/ 1684:
|
|
871
|
+
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
872
|
+
|
|
873
|
+
|
|
874
|
+
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
875
|
+
exports.AssumeRoleWithWebIdentity$ = exports.AssumeRole$ = exports.Tag$ = exports.ProvidedContext$ = exports.PolicyDescriptorType$ = exports.Credentials$ = exports.AssumeRoleWithWebIdentityResponse$ = exports.AssumeRoleWithWebIdentityRequest$ = exports.AssumeRoleResponse$ = exports.AssumeRoleRequest$ = exports.AssumedRoleUser$ = exports.errorTypeRegistries = exports.RegionDisabledException$ = exports.PackedPolicyTooLargeException$ = exports.MalformedPolicyDocumentException$ = exports.InvalidIdentityTokenException$ = exports.IDPRejectedClaimException$ = exports.IDPCommunicationErrorException$ = exports.ExpiredTokenException$ = exports.STSServiceException$ = void 0;
|
|
876
|
+
const _A = "Arn";
|
|
877
|
+
const _AKI = "AccessKeyId";
|
|
878
|
+
const _AR = "AssumeRole";
|
|
879
|
+
const _ARI = "AssumedRoleId";
|
|
880
|
+
const _ARR = "AssumeRoleRequest";
|
|
881
|
+
const _ARRs = "AssumeRoleResponse";
|
|
882
|
+
const _ARU = "AssumedRoleUser";
|
|
883
|
+
const _ARWWI = "AssumeRoleWithWebIdentity";
|
|
884
|
+
const _ARWWIR = "AssumeRoleWithWebIdentityRequest";
|
|
885
|
+
const _ARWWIRs = "AssumeRoleWithWebIdentityResponse";
|
|
886
|
+
const _Au = "Audience";
|
|
887
|
+
const _C = "Credentials";
|
|
888
|
+
const _CA = "ContextAssertion";
|
|
889
|
+
const _DS = "DurationSeconds";
|
|
890
|
+
const _E = "Expiration";
|
|
891
|
+
const _EI = "ExternalId";
|
|
892
|
+
const _ETE = "ExpiredTokenException";
|
|
893
|
+
const _IDPCEE = "IDPCommunicationErrorException";
|
|
894
|
+
const _IDPRCE = "IDPRejectedClaimException";
|
|
895
|
+
const _IITE = "InvalidIdentityTokenException";
|
|
896
|
+
const _K = "Key";
|
|
897
|
+
const _MPDE = "MalformedPolicyDocumentException";
|
|
898
|
+
const _P = "Policy";
|
|
899
|
+
const _PA = "PolicyArns";
|
|
900
|
+
const _PAr = "ProviderArn";
|
|
901
|
+
const _PC = "ProvidedContexts";
|
|
902
|
+
const _PCLT = "ProvidedContextsListType";
|
|
903
|
+
const _PCr = "ProvidedContext";
|
|
904
|
+
const _PDT = "PolicyDescriptorType";
|
|
905
|
+
const _PI = "ProviderId";
|
|
906
|
+
const _PPS = "PackedPolicySize";
|
|
907
|
+
const _PPTLE = "PackedPolicyTooLargeException";
|
|
908
|
+
const _Pr = "Provider";
|
|
909
|
+
const _RA = "RoleArn";
|
|
910
|
+
const _RDE = "RegionDisabledException";
|
|
911
|
+
const _RSN = "RoleSessionName";
|
|
912
|
+
const _SAK = "SecretAccessKey";
|
|
913
|
+
const _SFWIT = "SubjectFromWebIdentityToken";
|
|
914
|
+
const _SI = "SourceIdentity";
|
|
915
|
+
const _SN = "SerialNumber";
|
|
916
|
+
const _ST = "SessionToken";
|
|
917
|
+
const _T = "Tags";
|
|
918
|
+
const _TC = "TokenCode";
|
|
919
|
+
const _TTK = "TransitiveTagKeys";
|
|
920
|
+
const _Ta = "Tag";
|
|
921
|
+
const _V = "Value";
|
|
922
|
+
const _WIT = "WebIdentityToken";
|
|
923
|
+
const _a = "arn";
|
|
924
|
+
const _aKST = "accessKeySecretType";
|
|
925
|
+
const _aQE = "awsQueryError";
|
|
926
|
+
const _c = "client";
|
|
927
|
+
const _cTT = "clientTokenType";
|
|
928
|
+
const _e = "error";
|
|
929
|
+
const _hE = "httpError";
|
|
930
|
+
const _m = "message";
|
|
931
|
+
const _pDLT = "policyDescriptorListType";
|
|
932
|
+
const _s = "smithy.ts.sdk.synthetic.com.amazonaws.sts";
|
|
933
|
+
const _tLT = "tagListType";
|
|
934
|
+
const n0 = "com.amazonaws.sts";
|
|
935
|
+
const schema_1 = __webpack_require__(26890);
|
|
936
|
+
const errors_1 = __webpack_require__(41688);
|
|
937
|
+
const STSServiceException_1 = __webpack_require__(17171);
|
|
938
|
+
const _s_registry = schema_1.TypeRegistry.for(_s);
|
|
939
|
+
exports.STSServiceException$ = [-3, _s, "STSServiceException", 0, [], []];
|
|
940
|
+
_s_registry.registerError(exports.STSServiceException$, STSServiceException_1.STSServiceException);
|
|
941
|
+
const n0_registry = schema_1.TypeRegistry.for(n0);
|
|
942
|
+
exports.ExpiredTokenException$ = [
|
|
943
|
+
-3,
|
|
944
|
+
n0,
|
|
945
|
+
_ETE,
|
|
946
|
+
{ [_aQE]: [`ExpiredTokenException`, 400], [_e]: _c, [_hE]: 400 },
|
|
947
|
+
[_m],
|
|
948
|
+
[0],
|
|
949
|
+
];
|
|
950
|
+
n0_registry.registerError(exports.ExpiredTokenException$, errors_1.ExpiredTokenException);
|
|
951
|
+
exports.IDPCommunicationErrorException$ = [
|
|
952
|
+
-3,
|
|
953
|
+
n0,
|
|
954
|
+
_IDPCEE,
|
|
955
|
+
{ [_aQE]: [`IDPCommunicationError`, 400], [_e]: _c, [_hE]: 400 },
|
|
956
|
+
[_m],
|
|
957
|
+
[0],
|
|
958
|
+
];
|
|
959
|
+
n0_registry.registerError(exports.IDPCommunicationErrorException$, errors_1.IDPCommunicationErrorException);
|
|
960
|
+
exports.IDPRejectedClaimException$ = [
|
|
961
|
+
-3,
|
|
962
|
+
n0,
|
|
963
|
+
_IDPRCE,
|
|
964
|
+
{ [_aQE]: [`IDPRejectedClaim`, 403], [_e]: _c, [_hE]: 403 },
|
|
965
|
+
[_m],
|
|
966
|
+
[0],
|
|
967
|
+
];
|
|
968
|
+
n0_registry.registerError(exports.IDPRejectedClaimException$, errors_1.IDPRejectedClaimException);
|
|
969
|
+
exports.InvalidIdentityTokenException$ = [
|
|
970
|
+
-3,
|
|
971
|
+
n0,
|
|
972
|
+
_IITE,
|
|
973
|
+
{ [_aQE]: [`InvalidIdentityToken`, 400], [_e]: _c, [_hE]: 400 },
|
|
974
|
+
[_m],
|
|
975
|
+
[0],
|
|
976
|
+
];
|
|
977
|
+
n0_registry.registerError(exports.InvalidIdentityTokenException$, errors_1.InvalidIdentityTokenException);
|
|
978
|
+
exports.MalformedPolicyDocumentException$ = [
|
|
979
|
+
-3,
|
|
980
|
+
n0,
|
|
981
|
+
_MPDE,
|
|
982
|
+
{ [_aQE]: [`MalformedPolicyDocument`, 400], [_e]: _c, [_hE]: 400 },
|
|
983
|
+
[_m],
|
|
984
|
+
[0],
|
|
985
|
+
];
|
|
986
|
+
n0_registry.registerError(exports.MalformedPolicyDocumentException$, errors_1.MalformedPolicyDocumentException);
|
|
987
|
+
exports.PackedPolicyTooLargeException$ = [
|
|
988
|
+
-3,
|
|
989
|
+
n0,
|
|
990
|
+
_PPTLE,
|
|
991
|
+
{ [_aQE]: [`PackedPolicyTooLarge`, 400], [_e]: _c, [_hE]: 400 },
|
|
992
|
+
[_m],
|
|
993
|
+
[0],
|
|
994
|
+
];
|
|
995
|
+
n0_registry.registerError(exports.PackedPolicyTooLargeException$, errors_1.PackedPolicyTooLargeException);
|
|
996
|
+
exports.RegionDisabledException$ = [
|
|
997
|
+
-3,
|
|
998
|
+
n0,
|
|
999
|
+
_RDE,
|
|
1000
|
+
{ [_aQE]: [`RegionDisabledException`, 403], [_e]: _c, [_hE]: 403 },
|
|
1001
|
+
[_m],
|
|
1002
|
+
[0],
|
|
1003
|
+
];
|
|
1004
|
+
n0_registry.registerError(exports.RegionDisabledException$, errors_1.RegionDisabledException);
|
|
1005
|
+
exports.errorTypeRegistries = [_s_registry, n0_registry];
|
|
1006
|
+
var accessKeySecretType = [0, n0, _aKST, 8, 0];
|
|
1007
|
+
var clientTokenType = [0, n0, _cTT, 8, 0];
|
|
1008
|
+
exports.AssumedRoleUser$ = [3, n0, _ARU, 0, [_ARI, _A], [0, 0], 2];
|
|
1009
|
+
exports.AssumeRoleRequest$ = [
|
|
1010
|
+
3,
|
|
1011
|
+
n0,
|
|
1012
|
+
_ARR,
|
|
1013
|
+
0,
|
|
1014
|
+
[_RA, _RSN, _PA, _P, _DS, _T, _TTK, _EI, _SN, _TC, _SI, _PC],
|
|
1015
|
+
[0, 0, () => policyDescriptorListType, 0, 1, () => tagListType, 64 | 0, 0, 0, 0, 0, () => ProvidedContextsListType],
|
|
1016
|
+
2,
|
|
1017
|
+
];
|
|
1018
|
+
exports.AssumeRoleResponse$ = [
|
|
1019
|
+
3,
|
|
1020
|
+
n0,
|
|
1021
|
+
_ARRs,
|
|
1022
|
+
0,
|
|
1023
|
+
[_C, _ARU, _PPS, _SI],
|
|
1024
|
+
[[() => exports.Credentials$, 0], () => exports.AssumedRoleUser$, 1, 0],
|
|
1025
|
+
];
|
|
1026
|
+
exports.AssumeRoleWithWebIdentityRequest$ = [
|
|
1027
|
+
3,
|
|
1028
|
+
n0,
|
|
1029
|
+
_ARWWIR,
|
|
1030
|
+
0,
|
|
1031
|
+
[_RA, _RSN, _WIT, _PI, _PA, _P, _DS],
|
|
1032
|
+
[0, 0, [() => clientTokenType, 0], 0, () => policyDescriptorListType, 0, 1],
|
|
1033
|
+
3,
|
|
1034
|
+
];
|
|
1035
|
+
exports.AssumeRoleWithWebIdentityResponse$ = [
|
|
1036
|
+
3,
|
|
1037
|
+
n0,
|
|
1038
|
+
_ARWWIRs,
|
|
1039
|
+
0,
|
|
1040
|
+
[_C, _SFWIT, _ARU, _PPS, _Pr, _Au, _SI],
|
|
1041
|
+
[[() => exports.Credentials$, 0], 0, () => exports.AssumedRoleUser$, 1, 0, 0, 0],
|
|
1042
|
+
];
|
|
1043
|
+
exports.Credentials$ = [
|
|
1044
|
+
3,
|
|
1045
|
+
n0,
|
|
1046
|
+
_C,
|
|
1047
|
+
0,
|
|
1048
|
+
[_AKI, _SAK, _ST, _E],
|
|
1049
|
+
[0, [() => accessKeySecretType, 0], 0, 4],
|
|
1050
|
+
4,
|
|
1051
|
+
];
|
|
1052
|
+
exports.PolicyDescriptorType$ = [3, n0, _PDT, 0, [_a], [0]];
|
|
1053
|
+
exports.ProvidedContext$ = [3, n0, _PCr, 0, [_PAr, _CA], [0, 0]];
|
|
1054
|
+
exports.Tag$ = [3, n0, _Ta, 0, [_K, _V], [0, 0], 2];
|
|
1055
|
+
var policyDescriptorListType = [1, n0, _pDLT, 0, () => exports.PolicyDescriptorType$];
|
|
1056
|
+
var ProvidedContextsListType = [1, n0, _PCLT, 0, () => exports.ProvidedContext$];
|
|
1057
|
+
var tagKeyListType = (/* unused pure expression or super */ null && (64 | 0));
|
|
1058
|
+
var tagListType = [1, n0, _tLT, 0, () => exports.Tag$];
|
|
1059
|
+
exports.AssumeRole$ = [9, n0, _AR, 0, () => exports.AssumeRoleRequest$, () => exports.AssumeRoleResponse$];
|
|
1060
|
+
exports.AssumeRoleWithWebIdentity$ = [
|
|
1061
|
+
9,
|
|
1062
|
+
n0,
|
|
1063
|
+
_ARWWI,
|
|
1064
|
+
0,
|
|
1065
|
+
() => exports.AssumeRoleWithWebIdentityRequest$,
|
|
1066
|
+
() => exports.AssumeRoleWithWebIdentityResponse$,
|
|
1067
|
+
];
|
|
1068
|
+
|
|
1069
|
+
|
|
884
1070
|
/***/ }),
|
|
885
1071
|
|
|
886
1072
|
/***/ 39955:
|
|
887
1073
|
/***/ ((module) => {
|
|
888
1074
|
|
|
889
|
-
module.exports = /*#__PURE__*/JSON.parse('{"name":"@aws-sdk/nested-clients","version":"3.
|
|
1075
|
+
module.exports = /*#__PURE__*/JSON.parse('{"name":"@aws-sdk/nested-clients","version":"3.996.19","description":"Nested clients for AWS SDK packages.","main":"./dist-cjs/index.js","module":"./dist-es/index.js","types":"./dist-types/index.d.ts","scripts":{"build":"yarn lint && concurrently \'yarn:build:types\' \'yarn:build:es\' && yarn build:cjs","build:cjs":"node ../../scripts/compilation/inline nested-clients","build:es":"tsc -p tsconfig.es.json","build:include:deps":"yarn g:turbo run build -F=\\"$npm_package_name\\"","build:types":"tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4","clean":"premove dist-cjs dist-es dist-types tsconfig.cjs.tsbuildinfo tsconfig.es.tsbuildinfo tsconfig.types.tsbuildinfo","lint":"node ../../scripts/validation/submodules-linter.js --pkg nested-clients","test":"yarn g:vitest run","test:watch":"yarn g:vitest watch"},"engines":{"node":">=20.0.0"},"sideEffects":false,"author":{"name":"AWS SDK for JavaScript Team","url":"https://aws.amazon.com/javascript/"},"license":"Apache-2.0","dependencies":{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"^3.973.27","@aws-sdk/middleware-host-header":"^3.972.9","@aws-sdk/middleware-logger":"^3.972.9","@aws-sdk/middleware-recursion-detection":"^3.972.10","@aws-sdk/middleware-user-agent":"^3.972.29","@aws-sdk/region-config-resolver":"^3.972.11","@aws-sdk/types":"^3.973.7","@aws-sdk/util-endpoints":"^3.996.6","@aws-sdk/util-user-agent-browser":"^3.972.9","@aws-sdk/util-user-agent-node":"^3.973.15","@smithy/config-resolver":"^4.4.14","@smithy/core":"^3.23.14","@smithy/fetch-http-handler":"^5.3.16","@smithy/hash-node":"^4.2.13","@smithy/invalid-dependency":"^4.2.13","@smithy/middleware-content-length":"^4.2.13","@smithy/middleware-endpoint":"^4.4.29","@smithy/middleware-retry":"^4.5.0","@smithy/middleware-serde":"^4.2.17","@smithy/middleware-stack":"^4.2.13","@smithy/node-config-provider":"^4.3.13","@smithy/node-http-handler":"^4.5.2","@smithy/protocol-http":"^5.3.13","@smithy/smithy-client":"^4.12.9","@smithy/types":"^4.14.0","@smithy/url-parser":"^4.2.13","@smithy/util-base64":"^4.3.2","@smithy/util-body-length-browser":"^4.2.2","@smithy/util-body-length-node":"^4.2.3","@smithy/util-defaults-mode-browser":"^4.3.45","@smithy/util-defaults-mode-node":"^4.2.49","@smithy/util-endpoints":"^3.3.4","@smithy/util-middleware":"^4.2.13","@smithy/util-retry":"^4.3.0","@smithy/util-utf8":"^4.2.2","tslib":"^2.6.2"},"devDependencies":{"concurrently":"7.0.0","downlevel-dts":"0.10.1","premove":"4.0.0","typescript":"~5.8.3"},"typesVersions":{"<4.5":{"dist-types/*":["dist-types/ts3.4/*"]}},"files":["./cognito-identity.d.ts","./cognito-identity.js","./signin.d.ts","./signin.js","./sso-oidc.d.ts","./sso-oidc.js","./sso.d.ts","./sso.js","./sts.d.ts","./sts.js","dist-*/**"],"browser":{"./dist-es/submodules/cognito-identity/runtimeConfig":"./dist-es/submodules/cognito-identity/runtimeConfig.browser","./dist-es/submodules/signin/runtimeConfig":"./dist-es/submodules/signin/runtimeConfig.browser","./dist-es/submodules/sso-oidc/runtimeConfig":"./dist-es/submodules/sso-oidc/runtimeConfig.browser","./dist-es/submodules/sso/runtimeConfig":"./dist-es/submodules/sso/runtimeConfig.browser","./dist-es/submodules/sts/runtimeConfig":"./dist-es/submodules/sts/runtimeConfig.browser"},"react-native":{},"homepage":"https://github.com/aws/aws-sdk-js-v3/tree/main/packages/nested-clients","repository":{"type":"git","url":"https://github.com/aws/aws-sdk-js-v3.git","directory":"packages/nested-clients"},"exports":{"./package.json":"./package.json","./sso-oidc":{"types":"./dist-types/submodules/sso-oidc/index.d.ts","module":"./dist-es/submodules/sso-oidc/index.js","node":"./dist-cjs/submodules/sso-oidc/index.js","import":"./dist-es/submodules/sso-oidc/index.js","require":"./dist-cjs/submodules/sso-oidc/index.js"},"./sts":{"types":"./dist-types/submodules/sts/index.d.ts","module":"./dist-es/submodules/sts/index.js","node":"./dist-cjs/submodules/sts/index.js","import":"./dist-es/submodules/sts/index.js","require":"./dist-cjs/submodules/sts/index.js"},"./signin":{"types":"./dist-types/submodules/signin/index.d.ts","module":"./dist-es/submodules/signin/index.js","node":"./dist-cjs/submodules/signin/index.js","import":"./dist-es/submodules/signin/index.js","require":"./dist-cjs/submodules/signin/index.js"},"./cognito-identity":{"types":"./dist-types/submodules/cognito-identity/index.d.ts","module":"./dist-es/submodules/cognito-identity/index.js","node":"./dist-cjs/submodules/cognito-identity/index.js","import":"./dist-es/submodules/cognito-identity/index.js","require":"./dist-cjs/submodules/cognito-identity/index.js"},"./sso":{"types":"./dist-types/submodules/sso/index.d.ts","module":"./dist-es/submodules/sso/index.js","node":"./dist-cjs/submodules/sso/index.js","import":"./dist-es/submodules/sso/index.js","require":"./dist-cjs/submodules/sso/index.js"}}}');
|
|
890
1076
|
|
|
891
1077
|
/***/ })
|
|
892
1078
|
|