@rharkor/caching-for-turbo 2.3.11 → 2.3.12
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cli/136.index.js +512 -329
- package/dist/cli/136.index.js.map +1 -1
- package/dist/cli/360.index.js +3 -3
- package/dist/cli/360.index.js.map +1 -1
- package/dist/cli/443.index.js +362 -228
- package/dist/cli/443.index.js.map +1 -1
- package/dist/cli/579.index.js +9 -1
- package/dist/cli/579.index.js.map +1 -1
- package/dist/cli/605.index.js +1 -1
- package/dist/cli/605.index.js.map +1 -1
- package/dist/cli/762.index.js +363 -192
- package/dist/cli/762.index.js.map +1 -1
- package/dist/cli/869.index.js +2 -2
- package/dist/cli/956.index.js +16 -899
- package/dist/cli/956.index.js.map +1 -1
- package/dist/cli/998.index.js +549 -865
- package/dist/cli/998.index.js.map +1 -1
- package/dist/cli/index.js +184416 -187137
- package/dist/cli/licenses.txt +0 -409
- package/dist/cli/worker.js +18 -13
- package/package.json +2 -2
package/dist/cli/136.index.js
CHANGED
|
@@ -119,7 +119,7 @@ exports.resolveHttpAuthRuntimeConfig = resolveHttpAuthRuntimeConfig;
|
|
|
119
119
|
|
|
120
120
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
121
121
|
exports.resolveHttpAuthSchemeConfig = exports.resolveStsAuthConfig = exports.defaultSTSHttpAuthSchemeProvider = exports.defaultSTSHttpAuthSchemeParametersProvider = void 0;
|
|
122
|
-
const
|
|
122
|
+
const httpAuthSchemes_1 = __webpack_require__(97523);
|
|
123
123
|
const util_middleware_1 = __webpack_require__(76324);
|
|
124
124
|
const STSClient_1 = __webpack_require__(63723);
|
|
125
125
|
const defaultSTSHttpAuthSchemeParametersProvider = async (config, context, input) => {
|
|
@@ -172,7 +172,7 @@ const resolveStsAuthConfig = (input) => Object.assign(input, {
|
|
|
172
172
|
exports.resolveStsAuthConfig = resolveStsAuthConfig;
|
|
173
173
|
const resolveHttpAuthSchemeConfig = (config) => {
|
|
174
174
|
const config_0 = (0, exports.resolveStsAuthConfig)(config);
|
|
175
|
-
const config_1 = (0,
|
|
175
|
+
const config_1 = (0, httpAuthSchemes_1.resolveAwsSdkSigV4Config)(config_0);
|
|
176
176
|
return Object.assign(config_1, {
|
|
177
177
|
authSchemePreference: (0, util_middleware_1.normalizeProvider)(config.authSchemePreference ?? []),
|
|
178
178
|
});
|
|
@@ -240,8 +240,146 @@ util_endpoints_2.customEndpointFunctions.aws = util_endpoints_1.awsEndpointFunct
|
|
|
240
240
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
241
241
|
exports.ruleSet = void 0;
|
|
242
242
|
const F = "required", G = "type", H = "fn", I = "argv", J = "ref";
|
|
243
|
-
const a = false, b = true, c = "booleanEquals", d = "stringEquals", e = "sigv4", f = "sts", g = "us-east-1", h = "endpoint", i = "https://sts.{Region}.{PartitionResult#dnsSuffix}", j = "tree", k = "error", l = "getAttr", m = { [F]: false, [G]: "string" }, n = { [F]: true,
|
|
244
|
-
|
|
243
|
+
const a = false, b = true, c = "booleanEquals", d = "stringEquals", e = "sigv4", f = "sts", g = "us-east-1", h = "endpoint", i = "https://sts.{Region}.{PartitionResult#dnsSuffix}", j = "tree", k = "error", l = "getAttr", m = { [F]: false, [G]: "string" }, n = { [F]: true, default: false, [G]: "boolean" }, o = { [J]: "Endpoint" }, p = { [H]: "isSet", [I]: [{ [J]: "Region" }] }, q = { [J]: "Region" }, r = { [H]: "aws.partition", [I]: [q], assign: "PartitionResult" }, s = { [J]: "UseFIPS" }, t = { [J]: "UseDualStack" }, u = {
|
|
244
|
+
url: "https://sts.amazonaws.com",
|
|
245
|
+
properties: { authSchemes: [{ name: e, signingName: f, signingRegion: g }] },
|
|
246
|
+
headers: {},
|
|
247
|
+
}, v = {}, w = { conditions: [{ [H]: d, [I]: [q, "aws-global"] }], [h]: u, [G]: h }, x = { [H]: c, [I]: [s, true] }, y = { [H]: c, [I]: [t, true] }, z = { [H]: l, [I]: [{ [J]: "PartitionResult" }, "supportsFIPS"] }, A = { [J]: "PartitionResult" }, B = { [H]: c, [I]: [true, { [H]: l, [I]: [A, "supportsDualStack"] }] }, C = [{ [H]: "isSet", [I]: [o] }], D = [x], E = [y];
|
|
248
|
+
const _data = {
|
|
249
|
+
version: "1.0",
|
|
250
|
+
parameters: { Region: m, UseDualStack: n, UseFIPS: n, Endpoint: m, UseGlobalEndpoint: n },
|
|
251
|
+
rules: [
|
|
252
|
+
{
|
|
253
|
+
conditions: [
|
|
254
|
+
{ [H]: c, [I]: [{ [J]: "UseGlobalEndpoint" }, b] },
|
|
255
|
+
{ [H]: "not", [I]: C },
|
|
256
|
+
p,
|
|
257
|
+
r,
|
|
258
|
+
{ [H]: c, [I]: [s, a] },
|
|
259
|
+
{ [H]: c, [I]: [t, a] },
|
|
260
|
+
],
|
|
261
|
+
rules: [
|
|
262
|
+
{ conditions: [{ [H]: d, [I]: [q, "ap-northeast-1"] }], endpoint: u, [G]: h },
|
|
263
|
+
{ conditions: [{ [H]: d, [I]: [q, "ap-south-1"] }], endpoint: u, [G]: h },
|
|
264
|
+
{ conditions: [{ [H]: d, [I]: [q, "ap-southeast-1"] }], endpoint: u, [G]: h },
|
|
265
|
+
{ conditions: [{ [H]: d, [I]: [q, "ap-southeast-2"] }], endpoint: u, [G]: h },
|
|
266
|
+
w,
|
|
267
|
+
{ conditions: [{ [H]: d, [I]: [q, "ca-central-1"] }], endpoint: u, [G]: h },
|
|
268
|
+
{ conditions: [{ [H]: d, [I]: [q, "eu-central-1"] }], endpoint: u, [G]: h },
|
|
269
|
+
{ conditions: [{ [H]: d, [I]: [q, "eu-north-1"] }], endpoint: u, [G]: h },
|
|
270
|
+
{ conditions: [{ [H]: d, [I]: [q, "eu-west-1"] }], endpoint: u, [G]: h },
|
|
271
|
+
{ conditions: [{ [H]: d, [I]: [q, "eu-west-2"] }], endpoint: u, [G]: h },
|
|
272
|
+
{ conditions: [{ [H]: d, [I]: [q, "eu-west-3"] }], endpoint: u, [G]: h },
|
|
273
|
+
{ conditions: [{ [H]: d, [I]: [q, "sa-east-1"] }], endpoint: u, [G]: h },
|
|
274
|
+
{ conditions: [{ [H]: d, [I]: [q, g] }], endpoint: u, [G]: h },
|
|
275
|
+
{ conditions: [{ [H]: d, [I]: [q, "us-east-2"] }], endpoint: u, [G]: h },
|
|
276
|
+
{ conditions: [{ [H]: d, [I]: [q, "us-west-1"] }], endpoint: u, [G]: h },
|
|
277
|
+
{ conditions: [{ [H]: d, [I]: [q, "us-west-2"] }], endpoint: u, [G]: h },
|
|
278
|
+
{
|
|
279
|
+
endpoint: {
|
|
280
|
+
url: i,
|
|
281
|
+
properties: { authSchemes: [{ name: e, signingName: f, signingRegion: "{Region}" }] },
|
|
282
|
+
headers: v,
|
|
283
|
+
},
|
|
284
|
+
[G]: h,
|
|
285
|
+
},
|
|
286
|
+
],
|
|
287
|
+
[G]: j,
|
|
288
|
+
},
|
|
289
|
+
{
|
|
290
|
+
conditions: C,
|
|
291
|
+
rules: [
|
|
292
|
+
{ conditions: D, error: "Invalid Configuration: FIPS and custom endpoint are not supported", [G]: k },
|
|
293
|
+
{ conditions: E, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", [G]: k },
|
|
294
|
+
{ endpoint: { url: o, properties: v, headers: v }, [G]: h },
|
|
295
|
+
],
|
|
296
|
+
[G]: j,
|
|
297
|
+
},
|
|
298
|
+
{
|
|
299
|
+
conditions: [p],
|
|
300
|
+
rules: [
|
|
301
|
+
{
|
|
302
|
+
conditions: [r],
|
|
303
|
+
rules: [
|
|
304
|
+
{
|
|
305
|
+
conditions: [x, y],
|
|
306
|
+
rules: [
|
|
307
|
+
{
|
|
308
|
+
conditions: [{ [H]: c, [I]: [b, z] }, B],
|
|
309
|
+
rules: [
|
|
310
|
+
{
|
|
311
|
+
endpoint: {
|
|
312
|
+
url: "https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",
|
|
313
|
+
properties: v,
|
|
314
|
+
headers: v,
|
|
315
|
+
},
|
|
316
|
+
[G]: h,
|
|
317
|
+
},
|
|
318
|
+
],
|
|
319
|
+
[G]: j,
|
|
320
|
+
},
|
|
321
|
+
{ error: "FIPS and DualStack are enabled, but this partition does not support one or both", [G]: k },
|
|
322
|
+
],
|
|
323
|
+
[G]: j,
|
|
324
|
+
},
|
|
325
|
+
{
|
|
326
|
+
conditions: D,
|
|
327
|
+
rules: [
|
|
328
|
+
{
|
|
329
|
+
conditions: [{ [H]: c, [I]: [z, b] }],
|
|
330
|
+
rules: [
|
|
331
|
+
{
|
|
332
|
+
conditions: [{ [H]: d, [I]: [{ [H]: l, [I]: [A, "name"] }, "aws-us-gov"] }],
|
|
333
|
+
endpoint: { url: "https://sts.{Region}.amazonaws.com", properties: v, headers: v },
|
|
334
|
+
[G]: h,
|
|
335
|
+
},
|
|
336
|
+
{
|
|
337
|
+
endpoint: {
|
|
338
|
+
url: "https://sts-fips.{Region}.{PartitionResult#dnsSuffix}",
|
|
339
|
+
properties: v,
|
|
340
|
+
headers: v,
|
|
341
|
+
},
|
|
342
|
+
[G]: h,
|
|
343
|
+
},
|
|
344
|
+
],
|
|
345
|
+
[G]: j,
|
|
346
|
+
},
|
|
347
|
+
{ error: "FIPS is enabled but this partition does not support FIPS", [G]: k },
|
|
348
|
+
],
|
|
349
|
+
[G]: j,
|
|
350
|
+
},
|
|
351
|
+
{
|
|
352
|
+
conditions: E,
|
|
353
|
+
rules: [
|
|
354
|
+
{
|
|
355
|
+
conditions: [B],
|
|
356
|
+
rules: [
|
|
357
|
+
{
|
|
358
|
+
endpoint: {
|
|
359
|
+
url: "https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}",
|
|
360
|
+
properties: v,
|
|
361
|
+
headers: v,
|
|
362
|
+
},
|
|
363
|
+
[G]: h,
|
|
364
|
+
},
|
|
365
|
+
],
|
|
366
|
+
[G]: j,
|
|
367
|
+
},
|
|
368
|
+
{ error: "DualStack is enabled but this partition does not support DualStack", [G]: k },
|
|
369
|
+
],
|
|
370
|
+
[G]: j,
|
|
371
|
+
},
|
|
372
|
+
w,
|
|
373
|
+
{ endpoint: { url: i, properties: v, headers: v }, [G]: h },
|
|
374
|
+
],
|
|
375
|
+
[G]: j,
|
|
376
|
+
},
|
|
377
|
+
],
|
|
378
|
+
[G]: j,
|
|
379
|
+
},
|
|
380
|
+
{ error: "Invalid Configuration: Missing Region", [G]: k },
|
|
381
|
+
],
|
|
382
|
+
};
|
|
245
383
|
exports.ruleSet = _data;
|
|
246
384
|
|
|
247
385
|
|
|
@@ -256,287 +394,11 @@ var STSClient = __webpack_require__(63723);
|
|
|
256
394
|
var smithyClient = __webpack_require__(61411);
|
|
257
395
|
var middlewareEndpoint = __webpack_require__(40099);
|
|
258
396
|
var EndpointParameters = __webpack_require__(76811);
|
|
259
|
-
var
|
|
397
|
+
var schemas_0 = __webpack_require__(1684);
|
|
398
|
+
var errors = __webpack_require__(41688);
|
|
260
399
|
var client = __webpack_require__(5152);
|
|
261
400
|
var regionConfigResolver = __webpack_require__(36463);
|
|
262
|
-
|
|
263
|
-
class STSServiceException extends smithyClient.ServiceException {
|
|
264
|
-
constructor(options) {
|
|
265
|
-
super(options);
|
|
266
|
-
Object.setPrototypeOf(this, STSServiceException.prototype);
|
|
267
|
-
}
|
|
268
|
-
}
|
|
269
|
-
|
|
270
|
-
class ExpiredTokenException extends STSServiceException {
|
|
271
|
-
name = "ExpiredTokenException";
|
|
272
|
-
$fault = "client";
|
|
273
|
-
constructor(opts) {
|
|
274
|
-
super({
|
|
275
|
-
name: "ExpiredTokenException",
|
|
276
|
-
$fault: "client",
|
|
277
|
-
...opts,
|
|
278
|
-
});
|
|
279
|
-
Object.setPrototypeOf(this, ExpiredTokenException.prototype);
|
|
280
|
-
}
|
|
281
|
-
}
|
|
282
|
-
class MalformedPolicyDocumentException extends STSServiceException {
|
|
283
|
-
name = "MalformedPolicyDocumentException";
|
|
284
|
-
$fault = "client";
|
|
285
|
-
constructor(opts) {
|
|
286
|
-
super({
|
|
287
|
-
name: "MalformedPolicyDocumentException",
|
|
288
|
-
$fault: "client",
|
|
289
|
-
...opts,
|
|
290
|
-
});
|
|
291
|
-
Object.setPrototypeOf(this, MalformedPolicyDocumentException.prototype);
|
|
292
|
-
}
|
|
293
|
-
}
|
|
294
|
-
class PackedPolicyTooLargeException extends STSServiceException {
|
|
295
|
-
name = "PackedPolicyTooLargeException";
|
|
296
|
-
$fault = "client";
|
|
297
|
-
constructor(opts) {
|
|
298
|
-
super({
|
|
299
|
-
name: "PackedPolicyTooLargeException",
|
|
300
|
-
$fault: "client",
|
|
301
|
-
...opts,
|
|
302
|
-
});
|
|
303
|
-
Object.setPrototypeOf(this, PackedPolicyTooLargeException.prototype);
|
|
304
|
-
}
|
|
305
|
-
}
|
|
306
|
-
class RegionDisabledException extends STSServiceException {
|
|
307
|
-
name = "RegionDisabledException";
|
|
308
|
-
$fault = "client";
|
|
309
|
-
constructor(opts) {
|
|
310
|
-
super({
|
|
311
|
-
name: "RegionDisabledException",
|
|
312
|
-
$fault: "client",
|
|
313
|
-
...opts,
|
|
314
|
-
});
|
|
315
|
-
Object.setPrototypeOf(this, RegionDisabledException.prototype);
|
|
316
|
-
}
|
|
317
|
-
}
|
|
318
|
-
class IDPRejectedClaimException extends STSServiceException {
|
|
319
|
-
name = "IDPRejectedClaimException";
|
|
320
|
-
$fault = "client";
|
|
321
|
-
constructor(opts) {
|
|
322
|
-
super({
|
|
323
|
-
name: "IDPRejectedClaimException",
|
|
324
|
-
$fault: "client",
|
|
325
|
-
...opts,
|
|
326
|
-
});
|
|
327
|
-
Object.setPrototypeOf(this, IDPRejectedClaimException.prototype);
|
|
328
|
-
}
|
|
329
|
-
}
|
|
330
|
-
class InvalidIdentityTokenException extends STSServiceException {
|
|
331
|
-
name = "InvalidIdentityTokenException";
|
|
332
|
-
$fault = "client";
|
|
333
|
-
constructor(opts) {
|
|
334
|
-
super({
|
|
335
|
-
name: "InvalidIdentityTokenException",
|
|
336
|
-
$fault: "client",
|
|
337
|
-
...opts,
|
|
338
|
-
});
|
|
339
|
-
Object.setPrototypeOf(this, InvalidIdentityTokenException.prototype);
|
|
340
|
-
}
|
|
341
|
-
}
|
|
342
|
-
class IDPCommunicationErrorException extends STSServiceException {
|
|
343
|
-
name = "IDPCommunicationErrorException";
|
|
344
|
-
$fault = "client";
|
|
345
|
-
constructor(opts) {
|
|
346
|
-
super({
|
|
347
|
-
name: "IDPCommunicationErrorException",
|
|
348
|
-
$fault: "client",
|
|
349
|
-
...opts,
|
|
350
|
-
});
|
|
351
|
-
Object.setPrototypeOf(this, IDPCommunicationErrorException.prototype);
|
|
352
|
-
}
|
|
353
|
-
}
|
|
354
|
-
|
|
355
|
-
const _A = "Arn";
|
|
356
|
-
const _AKI = "AccessKeyId";
|
|
357
|
-
const _AR = "AssumeRole";
|
|
358
|
-
const _ARI = "AssumedRoleId";
|
|
359
|
-
const _ARR = "AssumeRoleRequest";
|
|
360
|
-
const _ARRs = "AssumeRoleResponse";
|
|
361
|
-
const _ARU = "AssumedRoleUser";
|
|
362
|
-
const _ARWWI = "AssumeRoleWithWebIdentity";
|
|
363
|
-
const _ARWWIR = "AssumeRoleWithWebIdentityRequest";
|
|
364
|
-
const _ARWWIRs = "AssumeRoleWithWebIdentityResponse";
|
|
365
|
-
const _Au = "Audience";
|
|
366
|
-
const _C = "Credentials";
|
|
367
|
-
const _CA = "ContextAssertion";
|
|
368
|
-
const _DS = "DurationSeconds";
|
|
369
|
-
const _E = "Expiration";
|
|
370
|
-
const _EI = "ExternalId";
|
|
371
|
-
const _ETE = "ExpiredTokenException";
|
|
372
|
-
const _IDPCEE = "IDPCommunicationErrorException";
|
|
373
|
-
const _IDPRCE = "IDPRejectedClaimException";
|
|
374
|
-
const _IITE = "InvalidIdentityTokenException";
|
|
375
|
-
const _K = "Key";
|
|
376
|
-
const _MPDE = "MalformedPolicyDocumentException";
|
|
377
|
-
const _P = "Policy";
|
|
378
|
-
const _PA = "PolicyArns";
|
|
379
|
-
const _PAr = "ProviderArn";
|
|
380
|
-
const _PC = "ProvidedContexts";
|
|
381
|
-
const _PCLT = "ProvidedContextsListType";
|
|
382
|
-
const _PCr = "ProvidedContext";
|
|
383
|
-
const _PDT = "PolicyDescriptorType";
|
|
384
|
-
const _PI = "ProviderId";
|
|
385
|
-
const _PPS = "PackedPolicySize";
|
|
386
|
-
const _PPTLE = "PackedPolicyTooLargeException";
|
|
387
|
-
const _Pr = "Provider";
|
|
388
|
-
const _RA = "RoleArn";
|
|
389
|
-
const _RDE = "RegionDisabledException";
|
|
390
|
-
const _RSN = "RoleSessionName";
|
|
391
|
-
const _SAK = "SecretAccessKey";
|
|
392
|
-
const _SFWIT = "SubjectFromWebIdentityToken";
|
|
393
|
-
const _SI = "SourceIdentity";
|
|
394
|
-
const _SN = "SerialNumber";
|
|
395
|
-
const _ST = "SessionToken";
|
|
396
|
-
const _T = "Tags";
|
|
397
|
-
const _TC = "TokenCode";
|
|
398
|
-
const _TTK = "TransitiveTagKeys";
|
|
399
|
-
const _Ta = "Tag";
|
|
400
|
-
const _V = "Value";
|
|
401
|
-
const _WIT = "WebIdentityToken";
|
|
402
|
-
const _a = "arn";
|
|
403
|
-
const _aKST = "accessKeySecretType";
|
|
404
|
-
const _aQE = "awsQueryError";
|
|
405
|
-
const _c = "client";
|
|
406
|
-
const _cTT = "clientTokenType";
|
|
407
|
-
const _e = "error";
|
|
408
|
-
const _hE = "httpError";
|
|
409
|
-
const _m = "message";
|
|
410
|
-
const _pDLT = "policyDescriptorListType";
|
|
411
|
-
const _s = "smithy.ts.sdk.synthetic.com.amazonaws.sts";
|
|
412
|
-
const _tLT = "tagListType";
|
|
413
|
-
const n0 = "com.amazonaws.sts";
|
|
414
|
-
var accessKeySecretType = [0, n0, _aKST, 8, 0];
|
|
415
|
-
var clientTokenType = [0, n0, _cTT, 8, 0];
|
|
416
|
-
var AssumedRoleUser$ = [3, n0, _ARU, 0, [_ARI, _A], [0, 0], 2];
|
|
417
|
-
var AssumeRoleRequest$ = [
|
|
418
|
-
3,
|
|
419
|
-
n0,
|
|
420
|
-
_ARR,
|
|
421
|
-
0,
|
|
422
|
-
[_RA, _RSN, _PA, _P, _DS, _T, _TTK, _EI, _SN, _TC, _SI, _PC],
|
|
423
|
-
[0, 0, () => policyDescriptorListType, 0, 1, () => tagListType, 64 | 0, 0, 0, 0, 0, () => ProvidedContextsListType],
|
|
424
|
-
2,
|
|
425
|
-
];
|
|
426
|
-
var AssumeRoleResponse$ = [
|
|
427
|
-
3,
|
|
428
|
-
n0,
|
|
429
|
-
_ARRs,
|
|
430
|
-
0,
|
|
431
|
-
[_C, _ARU, _PPS, _SI],
|
|
432
|
-
[[() => Credentials$, 0], () => AssumedRoleUser$, 1, 0],
|
|
433
|
-
];
|
|
434
|
-
var AssumeRoleWithWebIdentityRequest$ = [
|
|
435
|
-
3,
|
|
436
|
-
n0,
|
|
437
|
-
_ARWWIR,
|
|
438
|
-
0,
|
|
439
|
-
[_RA, _RSN, _WIT, _PI, _PA, _P, _DS],
|
|
440
|
-
[0, 0, [() => clientTokenType, 0], 0, () => policyDescriptorListType, 0, 1],
|
|
441
|
-
3,
|
|
442
|
-
];
|
|
443
|
-
var AssumeRoleWithWebIdentityResponse$ = [
|
|
444
|
-
3,
|
|
445
|
-
n0,
|
|
446
|
-
_ARWWIRs,
|
|
447
|
-
0,
|
|
448
|
-
[_C, _SFWIT, _ARU, _PPS, _Pr, _Au, _SI],
|
|
449
|
-
[[() => Credentials$, 0], 0, () => AssumedRoleUser$, 1, 0, 0, 0],
|
|
450
|
-
];
|
|
451
|
-
var Credentials$ = [
|
|
452
|
-
3,
|
|
453
|
-
n0,
|
|
454
|
-
_C,
|
|
455
|
-
0,
|
|
456
|
-
[_AKI, _SAK, _ST, _E],
|
|
457
|
-
[0, [() => accessKeySecretType, 0], 0, 4],
|
|
458
|
-
4,
|
|
459
|
-
];
|
|
460
|
-
var ExpiredTokenException$ = [
|
|
461
|
-
-3,
|
|
462
|
-
n0,
|
|
463
|
-
_ETE,
|
|
464
|
-
{ [_aQE]: [`ExpiredTokenException`, 400], [_e]: _c, [_hE]: 400 },
|
|
465
|
-
[_m],
|
|
466
|
-
[0],
|
|
467
|
-
];
|
|
468
|
-
schema.TypeRegistry.for(n0).registerError(ExpiredTokenException$, ExpiredTokenException);
|
|
469
|
-
var IDPCommunicationErrorException$ = [
|
|
470
|
-
-3,
|
|
471
|
-
n0,
|
|
472
|
-
_IDPCEE,
|
|
473
|
-
{ [_aQE]: [`IDPCommunicationError`, 400], [_e]: _c, [_hE]: 400 },
|
|
474
|
-
[_m],
|
|
475
|
-
[0],
|
|
476
|
-
];
|
|
477
|
-
schema.TypeRegistry.for(n0).registerError(IDPCommunicationErrorException$, IDPCommunicationErrorException);
|
|
478
|
-
var IDPRejectedClaimException$ = [
|
|
479
|
-
-3,
|
|
480
|
-
n0,
|
|
481
|
-
_IDPRCE,
|
|
482
|
-
{ [_aQE]: [`IDPRejectedClaim`, 403], [_e]: _c, [_hE]: 403 },
|
|
483
|
-
[_m],
|
|
484
|
-
[0],
|
|
485
|
-
];
|
|
486
|
-
schema.TypeRegistry.for(n0).registerError(IDPRejectedClaimException$, IDPRejectedClaimException);
|
|
487
|
-
var InvalidIdentityTokenException$ = [
|
|
488
|
-
-3,
|
|
489
|
-
n0,
|
|
490
|
-
_IITE,
|
|
491
|
-
{ [_aQE]: [`InvalidIdentityToken`, 400], [_e]: _c, [_hE]: 400 },
|
|
492
|
-
[_m],
|
|
493
|
-
[0],
|
|
494
|
-
];
|
|
495
|
-
schema.TypeRegistry.for(n0).registerError(InvalidIdentityTokenException$, InvalidIdentityTokenException);
|
|
496
|
-
var MalformedPolicyDocumentException$ = [
|
|
497
|
-
-3,
|
|
498
|
-
n0,
|
|
499
|
-
_MPDE,
|
|
500
|
-
{ [_aQE]: [`MalformedPolicyDocument`, 400], [_e]: _c, [_hE]: 400 },
|
|
501
|
-
[_m],
|
|
502
|
-
[0],
|
|
503
|
-
];
|
|
504
|
-
schema.TypeRegistry.for(n0).registerError(MalformedPolicyDocumentException$, MalformedPolicyDocumentException);
|
|
505
|
-
var PackedPolicyTooLargeException$ = [
|
|
506
|
-
-3,
|
|
507
|
-
n0,
|
|
508
|
-
_PPTLE,
|
|
509
|
-
{ [_aQE]: [`PackedPolicyTooLarge`, 400], [_e]: _c, [_hE]: 400 },
|
|
510
|
-
[_m],
|
|
511
|
-
[0],
|
|
512
|
-
];
|
|
513
|
-
schema.TypeRegistry.for(n0).registerError(PackedPolicyTooLargeException$, PackedPolicyTooLargeException);
|
|
514
|
-
var PolicyDescriptorType$ = [3, n0, _PDT, 0, [_a], [0]];
|
|
515
|
-
var ProvidedContext$ = [3, n0, _PCr, 0, [_PAr, _CA], [0, 0]];
|
|
516
|
-
var RegionDisabledException$ = [
|
|
517
|
-
-3,
|
|
518
|
-
n0,
|
|
519
|
-
_RDE,
|
|
520
|
-
{ [_aQE]: [`RegionDisabledException`, 403], [_e]: _c, [_hE]: 403 },
|
|
521
|
-
[_m],
|
|
522
|
-
[0],
|
|
523
|
-
];
|
|
524
|
-
schema.TypeRegistry.for(n0).registerError(RegionDisabledException$, RegionDisabledException);
|
|
525
|
-
var Tag$ = [3, n0, _Ta, 0, [_K, _V], [0, 0], 2];
|
|
526
|
-
var STSServiceException$ = [-3, _s, "STSServiceException", 0, [], []];
|
|
527
|
-
schema.TypeRegistry.for(_s).registerError(STSServiceException$, STSServiceException);
|
|
528
|
-
var policyDescriptorListType = [1, n0, _pDLT, 0, () => PolicyDescriptorType$];
|
|
529
|
-
var ProvidedContextsListType = [1, n0, _PCLT, 0, () => ProvidedContext$];
|
|
530
|
-
var tagListType = [1, n0, _tLT, 0, () => Tag$];
|
|
531
|
-
var AssumeRole$ = [9, n0, _AR, 0, () => AssumeRoleRequest$, () => AssumeRoleResponse$];
|
|
532
|
-
var AssumeRoleWithWebIdentity$ = [
|
|
533
|
-
9,
|
|
534
|
-
n0,
|
|
535
|
-
_ARWWI,
|
|
536
|
-
0,
|
|
537
|
-
() => AssumeRoleWithWebIdentityRequest$,
|
|
538
|
-
() => AssumeRoleWithWebIdentityResponse$,
|
|
539
|
-
];
|
|
401
|
+
var STSServiceException = __webpack_require__(17171);
|
|
540
402
|
|
|
541
403
|
class AssumeRoleCommand extends smithyClient.Command
|
|
542
404
|
.classBuilder()
|
|
@@ -546,7 +408,7 @@ class AssumeRoleCommand extends smithyClient.Command
|
|
|
546
408
|
})
|
|
547
409
|
.s("AWSSecurityTokenServiceV20110615", "AssumeRole", {})
|
|
548
410
|
.n("STSClient", "AssumeRoleCommand")
|
|
549
|
-
.sc(AssumeRole$)
|
|
411
|
+
.sc(schemas_0.AssumeRole$)
|
|
550
412
|
.build() {
|
|
551
413
|
}
|
|
552
414
|
|
|
@@ -558,7 +420,7 @@ class AssumeRoleWithWebIdentityCommand extends smithyClient.Command
|
|
|
558
420
|
})
|
|
559
421
|
.s("AWSSecurityTokenServiceV20110615", "AssumeRoleWithWebIdentity", {})
|
|
560
422
|
.n("STSClient", "AssumeRoleWithWebIdentityCommand")
|
|
561
|
-
.sc(AssumeRoleWithWebIdentity$)
|
|
423
|
+
.sc(schemas_0.AssumeRoleWithWebIdentity$)
|
|
562
424
|
.build() {
|
|
563
425
|
}
|
|
564
426
|
|
|
@@ -690,51 +552,167 @@ const decorateDefaultCredentialProvider = (provider) => (input) => provider({
|
|
|
690
552
|
...input,
|
|
691
553
|
});
|
|
692
554
|
|
|
693
|
-
|
|
694
|
-
|
|
695
|
-
get: function () { return smithyClient.Command; }
|
|
696
|
-
}));
|
|
697
|
-
exports.AssumeRole$ = AssumeRole$;
|
|
555
|
+
exports.$Command = smithyClient.Command;
|
|
556
|
+
exports.STSServiceException = STSServiceException.STSServiceException;
|
|
698
557
|
exports.AssumeRoleCommand = AssumeRoleCommand;
|
|
699
|
-
exports.AssumeRoleRequest$ = AssumeRoleRequest$;
|
|
700
|
-
exports.AssumeRoleResponse$ = AssumeRoleResponse$;
|
|
701
|
-
exports.AssumeRoleWithWebIdentity$ = AssumeRoleWithWebIdentity$;
|
|
702
558
|
exports.AssumeRoleWithWebIdentityCommand = AssumeRoleWithWebIdentityCommand;
|
|
703
|
-
exports.AssumeRoleWithWebIdentityRequest$ = AssumeRoleWithWebIdentityRequest$;
|
|
704
|
-
exports.AssumeRoleWithWebIdentityResponse$ = AssumeRoleWithWebIdentityResponse$;
|
|
705
|
-
exports.AssumedRoleUser$ = AssumedRoleUser$;
|
|
706
|
-
exports.Credentials$ = Credentials$;
|
|
707
|
-
exports.ExpiredTokenException = ExpiredTokenException;
|
|
708
|
-
exports.ExpiredTokenException$ = ExpiredTokenException$;
|
|
709
|
-
exports.IDPCommunicationErrorException = IDPCommunicationErrorException;
|
|
710
|
-
exports.IDPCommunicationErrorException$ = IDPCommunicationErrorException$;
|
|
711
|
-
exports.IDPRejectedClaimException = IDPRejectedClaimException;
|
|
712
|
-
exports.IDPRejectedClaimException$ = IDPRejectedClaimException$;
|
|
713
|
-
exports.InvalidIdentityTokenException = InvalidIdentityTokenException;
|
|
714
|
-
exports.InvalidIdentityTokenException$ = InvalidIdentityTokenException$;
|
|
715
|
-
exports.MalformedPolicyDocumentException = MalformedPolicyDocumentException;
|
|
716
|
-
exports.MalformedPolicyDocumentException$ = MalformedPolicyDocumentException$;
|
|
717
|
-
exports.PackedPolicyTooLargeException = PackedPolicyTooLargeException;
|
|
718
|
-
exports.PackedPolicyTooLargeException$ = PackedPolicyTooLargeException$;
|
|
719
|
-
exports.PolicyDescriptorType$ = PolicyDescriptorType$;
|
|
720
|
-
exports.ProvidedContext$ = ProvidedContext$;
|
|
721
|
-
exports.RegionDisabledException = RegionDisabledException;
|
|
722
|
-
exports.RegionDisabledException$ = RegionDisabledException$;
|
|
723
559
|
exports.STS = STS;
|
|
724
|
-
exports.STSServiceException = STSServiceException;
|
|
725
|
-
exports.STSServiceException$ = STSServiceException$;
|
|
726
|
-
exports.Tag$ = Tag$;
|
|
727
560
|
exports.decorateDefaultCredentialProvider = decorateDefaultCredentialProvider;
|
|
728
561
|
exports.getDefaultRoleAssumer = getDefaultRoleAssumer;
|
|
729
562
|
exports.getDefaultRoleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity;
|
|
563
|
+
Object.prototype.hasOwnProperty.call(STSClient, '__proto__') &&
|
|
564
|
+
!Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
|
|
565
|
+
Object.defineProperty(exports, '__proto__', {
|
|
566
|
+
enumerable: true,
|
|
567
|
+
value: STSClient['__proto__']
|
|
568
|
+
});
|
|
569
|
+
|
|
730
570
|
Object.keys(STSClient).forEach(function (k) {
|
|
731
|
-
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k))
|
|
571
|
+
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = STSClient[k];
|
|
572
|
+
});
|
|
573
|
+
Object.prototype.hasOwnProperty.call(schemas_0, '__proto__') &&
|
|
574
|
+
!Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
|
|
575
|
+
Object.defineProperty(exports, '__proto__', {
|
|
732
576
|
enumerable: true,
|
|
733
|
-
|
|
577
|
+
value: schemas_0['__proto__']
|
|
734
578
|
});
|
|
579
|
+
|
|
580
|
+
Object.keys(schemas_0).forEach(function (k) {
|
|
581
|
+
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = schemas_0[k];
|
|
582
|
+
});
|
|
583
|
+
Object.prototype.hasOwnProperty.call(errors, '__proto__') &&
|
|
584
|
+
!Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
|
|
585
|
+
Object.defineProperty(exports, '__proto__', {
|
|
586
|
+
enumerable: true,
|
|
587
|
+
value: errors['__proto__']
|
|
588
|
+
});
|
|
589
|
+
|
|
590
|
+
Object.keys(errors).forEach(function (k) {
|
|
591
|
+
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = errors[k];
|
|
735
592
|
});
|
|
736
593
|
|
|
737
594
|
|
|
595
|
+
/***/ }),
|
|
596
|
+
|
|
597
|
+
/***/ 17171:
|
|
598
|
+
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
599
|
+
|
|
600
|
+
|
|
601
|
+
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
602
|
+
exports.STSServiceException = exports.__ServiceException = void 0;
|
|
603
|
+
const smithy_client_1 = __webpack_require__(61411);
|
|
604
|
+
Object.defineProperty(exports, "__ServiceException", ({ enumerable: true, get: function () { return smithy_client_1.ServiceException; } }));
|
|
605
|
+
class STSServiceException extends smithy_client_1.ServiceException {
|
|
606
|
+
constructor(options) {
|
|
607
|
+
super(options);
|
|
608
|
+
Object.setPrototypeOf(this, STSServiceException.prototype);
|
|
609
|
+
}
|
|
610
|
+
}
|
|
611
|
+
exports.STSServiceException = STSServiceException;
|
|
612
|
+
|
|
613
|
+
|
|
614
|
+
/***/ }),
|
|
615
|
+
|
|
616
|
+
/***/ 41688:
|
|
617
|
+
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
618
|
+
|
|
619
|
+
|
|
620
|
+
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
621
|
+
exports.IDPCommunicationErrorException = exports.InvalidIdentityTokenException = exports.IDPRejectedClaimException = exports.RegionDisabledException = exports.PackedPolicyTooLargeException = exports.MalformedPolicyDocumentException = exports.ExpiredTokenException = void 0;
|
|
622
|
+
const STSServiceException_1 = __webpack_require__(17171);
|
|
623
|
+
class ExpiredTokenException extends STSServiceException_1.STSServiceException {
|
|
624
|
+
name = "ExpiredTokenException";
|
|
625
|
+
$fault = "client";
|
|
626
|
+
constructor(opts) {
|
|
627
|
+
super({
|
|
628
|
+
name: "ExpiredTokenException",
|
|
629
|
+
$fault: "client",
|
|
630
|
+
...opts,
|
|
631
|
+
});
|
|
632
|
+
Object.setPrototypeOf(this, ExpiredTokenException.prototype);
|
|
633
|
+
}
|
|
634
|
+
}
|
|
635
|
+
exports.ExpiredTokenException = ExpiredTokenException;
|
|
636
|
+
class MalformedPolicyDocumentException extends STSServiceException_1.STSServiceException {
|
|
637
|
+
name = "MalformedPolicyDocumentException";
|
|
638
|
+
$fault = "client";
|
|
639
|
+
constructor(opts) {
|
|
640
|
+
super({
|
|
641
|
+
name: "MalformedPolicyDocumentException",
|
|
642
|
+
$fault: "client",
|
|
643
|
+
...opts,
|
|
644
|
+
});
|
|
645
|
+
Object.setPrototypeOf(this, MalformedPolicyDocumentException.prototype);
|
|
646
|
+
}
|
|
647
|
+
}
|
|
648
|
+
exports.MalformedPolicyDocumentException = MalformedPolicyDocumentException;
|
|
649
|
+
class PackedPolicyTooLargeException extends STSServiceException_1.STSServiceException {
|
|
650
|
+
name = "PackedPolicyTooLargeException";
|
|
651
|
+
$fault = "client";
|
|
652
|
+
constructor(opts) {
|
|
653
|
+
super({
|
|
654
|
+
name: "PackedPolicyTooLargeException",
|
|
655
|
+
$fault: "client",
|
|
656
|
+
...opts,
|
|
657
|
+
});
|
|
658
|
+
Object.setPrototypeOf(this, PackedPolicyTooLargeException.prototype);
|
|
659
|
+
}
|
|
660
|
+
}
|
|
661
|
+
exports.PackedPolicyTooLargeException = PackedPolicyTooLargeException;
|
|
662
|
+
class RegionDisabledException extends STSServiceException_1.STSServiceException {
|
|
663
|
+
name = "RegionDisabledException";
|
|
664
|
+
$fault = "client";
|
|
665
|
+
constructor(opts) {
|
|
666
|
+
super({
|
|
667
|
+
name: "RegionDisabledException",
|
|
668
|
+
$fault: "client",
|
|
669
|
+
...opts,
|
|
670
|
+
});
|
|
671
|
+
Object.setPrototypeOf(this, RegionDisabledException.prototype);
|
|
672
|
+
}
|
|
673
|
+
}
|
|
674
|
+
exports.RegionDisabledException = RegionDisabledException;
|
|
675
|
+
class IDPRejectedClaimException extends STSServiceException_1.STSServiceException {
|
|
676
|
+
name = "IDPRejectedClaimException";
|
|
677
|
+
$fault = "client";
|
|
678
|
+
constructor(opts) {
|
|
679
|
+
super({
|
|
680
|
+
name: "IDPRejectedClaimException",
|
|
681
|
+
$fault: "client",
|
|
682
|
+
...opts,
|
|
683
|
+
});
|
|
684
|
+
Object.setPrototypeOf(this, IDPRejectedClaimException.prototype);
|
|
685
|
+
}
|
|
686
|
+
}
|
|
687
|
+
exports.IDPRejectedClaimException = IDPRejectedClaimException;
|
|
688
|
+
class InvalidIdentityTokenException extends STSServiceException_1.STSServiceException {
|
|
689
|
+
name = "InvalidIdentityTokenException";
|
|
690
|
+
$fault = "client";
|
|
691
|
+
constructor(opts) {
|
|
692
|
+
super({
|
|
693
|
+
name: "InvalidIdentityTokenException",
|
|
694
|
+
$fault: "client",
|
|
695
|
+
...opts,
|
|
696
|
+
});
|
|
697
|
+
Object.setPrototypeOf(this, InvalidIdentityTokenException.prototype);
|
|
698
|
+
}
|
|
699
|
+
}
|
|
700
|
+
exports.InvalidIdentityTokenException = InvalidIdentityTokenException;
|
|
701
|
+
class IDPCommunicationErrorException extends STSServiceException_1.STSServiceException {
|
|
702
|
+
name = "IDPCommunicationErrorException";
|
|
703
|
+
$fault = "client";
|
|
704
|
+
constructor(opts) {
|
|
705
|
+
super({
|
|
706
|
+
name: "IDPCommunicationErrorException",
|
|
707
|
+
$fault: "client",
|
|
708
|
+
...opts,
|
|
709
|
+
});
|
|
710
|
+
Object.setPrototypeOf(this, IDPCommunicationErrorException.prototype);
|
|
711
|
+
}
|
|
712
|
+
}
|
|
713
|
+
exports.IDPCommunicationErrorException = IDPCommunicationErrorException;
|
|
714
|
+
|
|
715
|
+
|
|
738
716
|
/***/ }),
|
|
739
717
|
|
|
740
718
|
/***/ 36578:
|
|
@@ -745,10 +723,11 @@ Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
|
745
723
|
exports.getRuntimeConfig = void 0;
|
|
746
724
|
const tslib_1 = __webpack_require__(61860);
|
|
747
725
|
const package_json_1 = tslib_1.__importDefault(__webpack_require__(39955));
|
|
748
|
-
const
|
|
726
|
+
const client_1 = __webpack_require__(5152);
|
|
727
|
+
const httpAuthSchemes_1 = __webpack_require__(97523);
|
|
749
728
|
const util_user_agent_node_1 = __webpack_require__(51656);
|
|
750
729
|
const config_resolver_1 = __webpack_require__(39316);
|
|
751
|
-
const
|
|
730
|
+
const core_1 = __webpack_require__(90402);
|
|
752
731
|
const hash_node_1 = __webpack_require__(5092);
|
|
753
732
|
const middleware_retry_1 = __webpack_require__(19618);
|
|
754
733
|
const node_config_provider_1 = __webpack_require__(55704);
|
|
@@ -763,7 +742,7 @@ const getRuntimeConfig = (config) => {
|
|
|
763
742
|
const defaultsMode = (0, util_defaults_mode_node_1.resolveDefaultsModeConfig)(config);
|
|
764
743
|
const defaultConfigProvider = () => defaultsMode().then(smithy_client_1.loadConfigsForDefaultMode);
|
|
765
744
|
const clientSharedValues = (0, runtimeConfig_shared_1.getRuntimeConfig)(config);
|
|
766
|
-
(0,
|
|
745
|
+
(0, client_1.emitWarningIfUnsupportedVersion)(process.version);
|
|
767
746
|
const loaderConfig = {
|
|
768
747
|
profile: config?.profile,
|
|
769
748
|
logger: clientSharedValues.logger,
|
|
@@ -773,7 +752,7 @@ const getRuntimeConfig = (config) => {
|
|
|
773
752
|
...config,
|
|
774
753
|
runtime: "node",
|
|
775
754
|
defaultsMode,
|
|
776
|
-
authSchemePreference: config?.authSchemePreference ?? (0, node_config_provider_1.loadConfig)(
|
|
755
|
+
authSchemePreference: config?.authSchemePreference ?? (0, node_config_provider_1.loadConfig)(httpAuthSchemes_1.NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, loaderConfig),
|
|
777
756
|
bodyLengthChecker: config?.bodyLengthChecker ?? util_body_length_node_1.calculateBodyLength,
|
|
778
757
|
defaultUserAgentProvider: config?.defaultUserAgentProvider ??
|
|
779
758
|
(0, util_user_agent_node_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
|
|
@@ -782,12 +761,12 @@ const getRuntimeConfig = (config) => {
|
|
|
782
761
|
schemeId: "aws.auth#sigv4",
|
|
783
762
|
identityProvider: (ipc) => ipc.getIdentityProvider("aws.auth#sigv4") ||
|
|
784
763
|
(async (idProps) => await config.credentialDefaultProvider(idProps?.__config || {})()),
|
|
785
|
-
signer: new
|
|
764
|
+
signer: new httpAuthSchemes_1.AwsSdkSigV4Signer(),
|
|
786
765
|
},
|
|
787
766
|
{
|
|
788
767
|
schemeId: "smithy.api#noAuth",
|
|
789
768
|
identityProvider: (ipc) => ipc.getIdentityProvider("smithy.api#noAuth") || (async () => ({})),
|
|
790
|
-
signer: new
|
|
769
|
+
signer: new core_1.NoAuthSigner(),
|
|
791
770
|
},
|
|
792
771
|
],
|
|
793
772
|
maxAttempts: config?.maxAttempts ?? (0, node_config_provider_1.loadConfig)(middleware_retry_1.NODE_MAX_ATTEMPT_CONFIG_OPTIONS, config),
|
|
@@ -817,15 +796,16 @@ exports.getRuntimeConfig = getRuntimeConfig;
|
|
|
817
796
|
|
|
818
797
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
819
798
|
exports.getRuntimeConfig = void 0;
|
|
820
|
-
const
|
|
799
|
+
const httpAuthSchemes_1 = __webpack_require__(97523);
|
|
821
800
|
const protocols_1 = __webpack_require__(37288);
|
|
822
|
-
const
|
|
801
|
+
const core_1 = __webpack_require__(90402);
|
|
823
802
|
const smithy_client_1 = __webpack_require__(61411);
|
|
824
803
|
const url_parser_1 = __webpack_require__(14494);
|
|
825
804
|
const util_base64_1 = __webpack_require__(68385);
|
|
826
805
|
const util_utf8_1 = __webpack_require__(71577);
|
|
827
806
|
const httpAuthSchemeProvider_1 = __webpack_require__(27851);
|
|
828
807
|
const endpointResolver_1 = __webpack_require__(59765);
|
|
808
|
+
const schemas_0_1 = __webpack_require__(1684);
|
|
829
809
|
const getRuntimeConfig = (config) => {
|
|
830
810
|
return {
|
|
831
811
|
apiVersion: "2011-06-15",
|
|
@@ -839,18 +819,19 @@ const getRuntimeConfig = (config) => {
|
|
|
839
819
|
{
|
|
840
820
|
schemeId: "aws.auth#sigv4",
|
|
841
821
|
identityProvider: (ipc) => ipc.getIdentityProvider("aws.auth#sigv4"),
|
|
842
|
-
signer: new
|
|
822
|
+
signer: new httpAuthSchemes_1.AwsSdkSigV4Signer(),
|
|
843
823
|
},
|
|
844
824
|
{
|
|
845
825
|
schemeId: "smithy.api#noAuth",
|
|
846
826
|
identityProvider: (ipc) => ipc.getIdentityProvider("smithy.api#noAuth") || (async () => ({})),
|
|
847
|
-
signer: new
|
|
827
|
+
signer: new core_1.NoAuthSigner(),
|
|
848
828
|
},
|
|
849
829
|
],
|
|
850
830
|
logger: config?.logger ?? new smithy_client_1.NoOpLogger(),
|
|
851
831
|
protocol: config?.protocol ?? protocols_1.AwsQueryProtocol,
|
|
852
832
|
protocolSettings: config?.protocolSettings ?? {
|
|
853
833
|
defaultNamespace: "com.amazonaws.sts",
|
|
834
|
+
errorTypeRegistries: schemas_0_1.errorTypeRegistries,
|
|
854
835
|
xmlNamespace: "https://sts.amazonaws.com/doc/2011-06-15/",
|
|
855
836
|
version: "2011-06-15",
|
|
856
837
|
serviceTarget: "AWSSecurityTokenServiceV20110615",
|
|
@@ -884,12 +865,214 @@ const resolveRuntimeExtensions = (runtimeConfig, extensions) => {
|
|
|
884
865
|
exports.resolveRuntimeExtensions = resolveRuntimeExtensions;
|
|
885
866
|
|
|
886
867
|
|
|
868
|
+
/***/ }),
|
|
869
|
+
|
|
870
|
+
/***/ 1684:
|
|
871
|
+
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
872
|
+
|
|
873
|
+
|
|
874
|
+
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
875
|
+
exports.AssumeRoleWithWebIdentity$ = exports.AssumeRole$ = exports.Tag$ = exports.ProvidedContext$ = exports.PolicyDescriptorType$ = exports.Credentials$ = exports.AssumeRoleWithWebIdentityResponse$ = exports.AssumeRoleWithWebIdentityRequest$ = exports.AssumeRoleResponse$ = exports.AssumeRoleRequest$ = exports.AssumedRoleUser$ = exports.errorTypeRegistries = exports.RegionDisabledException$ = exports.PackedPolicyTooLargeException$ = exports.MalformedPolicyDocumentException$ = exports.InvalidIdentityTokenException$ = exports.IDPRejectedClaimException$ = exports.IDPCommunicationErrorException$ = exports.ExpiredTokenException$ = exports.STSServiceException$ = void 0;
|
|
876
|
+
const _A = "Arn";
|
|
877
|
+
const _AKI = "AccessKeyId";
|
|
878
|
+
const _AR = "AssumeRole";
|
|
879
|
+
const _ARI = "AssumedRoleId";
|
|
880
|
+
const _ARR = "AssumeRoleRequest";
|
|
881
|
+
const _ARRs = "AssumeRoleResponse";
|
|
882
|
+
const _ARU = "AssumedRoleUser";
|
|
883
|
+
const _ARWWI = "AssumeRoleWithWebIdentity";
|
|
884
|
+
const _ARWWIR = "AssumeRoleWithWebIdentityRequest";
|
|
885
|
+
const _ARWWIRs = "AssumeRoleWithWebIdentityResponse";
|
|
886
|
+
const _Au = "Audience";
|
|
887
|
+
const _C = "Credentials";
|
|
888
|
+
const _CA = "ContextAssertion";
|
|
889
|
+
const _DS = "DurationSeconds";
|
|
890
|
+
const _E = "Expiration";
|
|
891
|
+
const _EI = "ExternalId";
|
|
892
|
+
const _ETE = "ExpiredTokenException";
|
|
893
|
+
const _IDPCEE = "IDPCommunicationErrorException";
|
|
894
|
+
const _IDPRCE = "IDPRejectedClaimException";
|
|
895
|
+
const _IITE = "InvalidIdentityTokenException";
|
|
896
|
+
const _K = "Key";
|
|
897
|
+
const _MPDE = "MalformedPolicyDocumentException";
|
|
898
|
+
const _P = "Policy";
|
|
899
|
+
const _PA = "PolicyArns";
|
|
900
|
+
const _PAr = "ProviderArn";
|
|
901
|
+
const _PC = "ProvidedContexts";
|
|
902
|
+
const _PCLT = "ProvidedContextsListType";
|
|
903
|
+
const _PCr = "ProvidedContext";
|
|
904
|
+
const _PDT = "PolicyDescriptorType";
|
|
905
|
+
const _PI = "ProviderId";
|
|
906
|
+
const _PPS = "PackedPolicySize";
|
|
907
|
+
const _PPTLE = "PackedPolicyTooLargeException";
|
|
908
|
+
const _Pr = "Provider";
|
|
909
|
+
const _RA = "RoleArn";
|
|
910
|
+
const _RDE = "RegionDisabledException";
|
|
911
|
+
const _RSN = "RoleSessionName";
|
|
912
|
+
const _SAK = "SecretAccessKey";
|
|
913
|
+
const _SFWIT = "SubjectFromWebIdentityToken";
|
|
914
|
+
const _SI = "SourceIdentity";
|
|
915
|
+
const _SN = "SerialNumber";
|
|
916
|
+
const _ST = "SessionToken";
|
|
917
|
+
const _T = "Tags";
|
|
918
|
+
const _TC = "TokenCode";
|
|
919
|
+
const _TTK = "TransitiveTagKeys";
|
|
920
|
+
const _Ta = "Tag";
|
|
921
|
+
const _V = "Value";
|
|
922
|
+
const _WIT = "WebIdentityToken";
|
|
923
|
+
const _a = "arn";
|
|
924
|
+
const _aKST = "accessKeySecretType";
|
|
925
|
+
const _aQE = "awsQueryError";
|
|
926
|
+
const _c = "client";
|
|
927
|
+
const _cTT = "clientTokenType";
|
|
928
|
+
const _e = "error";
|
|
929
|
+
const _hE = "httpError";
|
|
930
|
+
const _m = "message";
|
|
931
|
+
const _pDLT = "policyDescriptorListType";
|
|
932
|
+
const _s = "smithy.ts.sdk.synthetic.com.amazonaws.sts";
|
|
933
|
+
const _tLT = "tagListType";
|
|
934
|
+
const n0 = "com.amazonaws.sts";
|
|
935
|
+
const schema_1 = __webpack_require__(26890);
|
|
936
|
+
const errors_1 = __webpack_require__(41688);
|
|
937
|
+
const STSServiceException_1 = __webpack_require__(17171);
|
|
938
|
+
const _s_registry = schema_1.TypeRegistry.for(_s);
|
|
939
|
+
exports.STSServiceException$ = [-3, _s, "STSServiceException", 0, [], []];
|
|
940
|
+
_s_registry.registerError(exports.STSServiceException$, STSServiceException_1.STSServiceException);
|
|
941
|
+
const n0_registry = schema_1.TypeRegistry.for(n0);
|
|
942
|
+
exports.ExpiredTokenException$ = [
|
|
943
|
+
-3,
|
|
944
|
+
n0,
|
|
945
|
+
_ETE,
|
|
946
|
+
{ [_aQE]: [`ExpiredTokenException`, 400], [_e]: _c, [_hE]: 400 },
|
|
947
|
+
[_m],
|
|
948
|
+
[0],
|
|
949
|
+
];
|
|
950
|
+
n0_registry.registerError(exports.ExpiredTokenException$, errors_1.ExpiredTokenException);
|
|
951
|
+
exports.IDPCommunicationErrorException$ = [
|
|
952
|
+
-3,
|
|
953
|
+
n0,
|
|
954
|
+
_IDPCEE,
|
|
955
|
+
{ [_aQE]: [`IDPCommunicationError`, 400], [_e]: _c, [_hE]: 400 },
|
|
956
|
+
[_m],
|
|
957
|
+
[0],
|
|
958
|
+
];
|
|
959
|
+
n0_registry.registerError(exports.IDPCommunicationErrorException$, errors_1.IDPCommunicationErrorException);
|
|
960
|
+
exports.IDPRejectedClaimException$ = [
|
|
961
|
+
-3,
|
|
962
|
+
n0,
|
|
963
|
+
_IDPRCE,
|
|
964
|
+
{ [_aQE]: [`IDPRejectedClaim`, 403], [_e]: _c, [_hE]: 403 },
|
|
965
|
+
[_m],
|
|
966
|
+
[0],
|
|
967
|
+
];
|
|
968
|
+
n0_registry.registerError(exports.IDPRejectedClaimException$, errors_1.IDPRejectedClaimException);
|
|
969
|
+
exports.InvalidIdentityTokenException$ = [
|
|
970
|
+
-3,
|
|
971
|
+
n0,
|
|
972
|
+
_IITE,
|
|
973
|
+
{ [_aQE]: [`InvalidIdentityToken`, 400], [_e]: _c, [_hE]: 400 },
|
|
974
|
+
[_m],
|
|
975
|
+
[0],
|
|
976
|
+
];
|
|
977
|
+
n0_registry.registerError(exports.InvalidIdentityTokenException$, errors_1.InvalidIdentityTokenException);
|
|
978
|
+
exports.MalformedPolicyDocumentException$ = [
|
|
979
|
+
-3,
|
|
980
|
+
n0,
|
|
981
|
+
_MPDE,
|
|
982
|
+
{ [_aQE]: [`MalformedPolicyDocument`, 400], [_e]: _c, [_hE]: 400 },
|
|
983
|
+
[_m],
|
|
984
|
+
[0],
|
|
985
|
+
];
|
|
986
|
+
n0_registry.registerError(exports.MalformedPolicyDocumentException$, errors_1.MalformedPolicyDocumentException);
|
|
987
|
+
exports.PackedPolicyTooLargeException$ = [
|
|
988
|
+
-3,
|
|
989
|
+
n0,
|
|
990
|
+
_PPTLE,
|
|
991
|
+
{ [_aQE]: [`PackedPolicyTooLarge`, 400], [_e]: _c, [_hE]: 400 },
|
|
992
|
+
[_m],
|
|
993
|
+
[0],
|
|
994
|
+
];
|
|
995
|
+
n0_registry.registerError(exports.PackedPolicyTooLargeException$, errors_1.PackedPolicyTooLargeException);
|
|
996
|
+
exports.RegionDisabledException$ = [
|
|
997
|
+
-3,
|
|
998
|
+
n0,
|
|
999
|
+
_RDE,
|
|
1000
|
+
{ [_aQE]: [`RegionDisabledException`, 403], [_e]: _c, [_hE]: 403 },
|
|
1001
|
+
[_m],
|
|
1002
|
+
[0],
|
|
1003
|
+
];
|
|
1004
|
+
n0_registry.registerError(exports.RegionDisabledException$, errors_1.RegionDisabledException);
|
|
1005
|
+
exports.errorTypeRegistries = [_s_registry, n0_registry];
|
|
1006
|
+
var accessKeySecretType = [0, n0, _aKST, 8, 0];
|
|
1007
|
+
var clientTokenType = [0, n0, _cTT, 8, 0];
|
|
1008
|
+
exports.AssumedRoleUser$ = [3, n0, _ARU, 0, [_ARI, _A], [0, 0], 2];
|
|
1009
|
+
exports.AssumeRoleRequest$ = [
|
|
1010
|
+
3,
|
|
1011
|
+
n0,
|
|
1012
|
+
_ARR,
|
|
1013
|
+
0,
|
|
1014
|
+
[_RA, _RSN, _PA, _P, _DS, _T, _TTK, _EI, _SN, _TC, _SI, _PC],
|
|
1015
|
+
[0, 0, () => policyDescriptorListType, 0, 1, () => tagListType, 64 | 0, 0, 0, 0, 0, () => ProvidedContextsListType],
|
|
1016
|
+
2,
|
|
1017
|
+
];
|
|
1018
|
+
exports.AssumeRoleResponse$ = [
|
|
1019
|
+
3,
|
|
1020
|
+
n0,
|
|
1021
|
+
_ARRs,
|
|
1022
|
+
0,
|
|
1023
|
+
[_C, _ARU, _PPS, _SI],
|
|
1024
|
+
[[() => exports.Credentials$, 0], () => exports.AssumedRoleUser$, 1, 0],
|
|
1025
|
+
];
|
|
1026
|
+
exports.AssumeRoleWithWebIdentityRequest$ = [
|
|
1027
|
+
3,
|
|
1028
|
+
n0,
|
|
1029
|
+
_ARWWIR,
|
|
1030
|
+
0,
|
|
1031
|
+
[_RA, _RSN, _WIT, _PI, _PA, _P, _DS],
|
|
1032
|
+
[0, 0, [() => clientTokenType, 0], 0, () => policyDescriptorListType, 0, 1],
|
|
1033
|
+
3,
|
|
1034
|
+
];
|
|
1035
|
+
exports.AssumeRoleWithWebIdentityResponse$ = [
|
|
1036
|
+
3,
|
|
1037
|
+
n0,
|
|
1038
|
+
_ARWWIRs,
|
|
1039
|
+
0,
|
|
1040
|
+
[_C, _SFWIT, _ARU, _PPS, _Pr, _Au, _SI],
|
|
1041
|
+
[[() => exports.Credentials$, 0], 0, () => exports.AssumedRoleUser$, 1, 0, 0, 0],
|
|
1042
|
+
];
|
|
1043
|
+
exports.Credentials$ = [
|
|
1044
|
+
3,
|
|
1045
|
+
n0,
|
|
1046
|
+
_C,
|
|
1047
|
+
0,
|
|
1048
|
+
[_AKI, _SAK, _ST, _E],
|
|
1049
|
+
[0, [() => accessKeySecretType, 0], 0, 4],
|
|
1050
|
+
4,
|
|
1051
|
+
];
|
|
1052
|
+
exports.PolicyDescriptorType$ = [3, n0, _PDT, 0, [_a], [0]];
|
|
1053
|
+
exports.ProvidedContext$ = [3, n0, _PCr, 0, [_PAr, _CA], [0, 0]];
|
|
1054
|
+
exports.Tag$ = [3, n0, _Ta, 0, [_K, _V], [0, 0], 2];
|
|
1055
|
+
var policyDescriptorListType = [1, n0, _pDLT, 0, () => exports.PolicyDescriptorType$];
|
|
1056
|
+
var ProvidedContextsListType = [1, n0, _PCLT, 0, () => exports.ProvidedContext$];
|
|
1057
|
+
var tagKeyListType = (/* unused pure expression or super */ null && (64 | 0));
|
|
1058
|
+
var tagListType = [1, n0, _tLT, 0, () => exports.Tag$];
|
|
1059
|
+
exports.AssumeRole$ = [9, n0, _AR, 0, () => exports.AssumeRoleRequest$, () => exports.AssumeRoleResponse$];
|
|
1060
|
+
exports.AssumeRoleWithWebIdentity$ = [
|
|
1061
|
+
9,
|
|
1062
|
+
n0,
|
|
1063
|
+
_ARWWI,
|
|
1064
|
+
0,
|
|
1065
|
+
() => exports.AssumeRoleWithWebIdentityRequest$,
|
|
1066
|
+
() => exports.AssumeRoleWithWebIdentityResponse$,
|
|
1067
|
+
];
|
|
1068
|
+
|
|
1069
|
+
|
|
887
1070
|
/***/ }),
|
|
888
1071
|
|
|
889
1072
|
/***/ 39955:
|
|
890
1073
|
/***/ ((module) => {
|
|
891
1074
|
|
|
892
|
-
module.exports = /*#__PURE__*/JSON.parse('{"name":"@aws-sdk/nested-clients","version":"3.
|
|
1075
|
+
module.exports = /*#__PURE__*/JSON.parse('{"name":"@aws-sdk/nested-clients","version":"3.996.19","description":"Nested clients for AWS SDK packages.","main":"./dist-cjs/index.js","module":"./dist-es/index.js","types":"./dist-types/index.d.ts","scripts":{"build":"yarn lint && concurrently \'yarn:build:types\' \'yarn:build:es\' && yarn build:cjs","build:cjs":"node ../../scripts/compilation/inline nested-clients","build:es":"tsc -p tsconfig.es.json","build:include:deps":"yarn g:turbo run build -F=\\"$npm_package_name\\"","build:types":"tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4","clean":"premove dist-cjs dist-es dist-types tsconfig.cjs.tsbuildinfo tsconfig.es.tsbuildinfo tsconfig.types.tsbuildinfo","lint":"node ../../scripts/validation/submodules-linter.js --pkg nested-clients","test":"yarn g:vitest run","test:watch":"yarn g:vitest watch"},"engines":{"node":">=20.0.0"},"sideEffects":false,"author":{"name":"AWS SDK for JavaScript Team","url":"https://aws.amazon.com/javascript/"},"license":"Apache-2.0","dependencies":{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"^3.973.27","@aws-sdk/middleware-host-header":"^3.972.9","@aws-sdk/middleware-logger":"^3.972.9","@aws-sdk/middleware-recursion-detection":"^3.972.10","@aws-sdk/middleware-user-agent":"^3.972.29","@aws-sdk/region-config-resolver":"^3.972.11","@aws-sdk/types":"^3.973.7","@aws-sdk/util-endpoints":"^3.996.6","@aws-sdk/util-user-agent-browser":"^3.972.9","@aws-sdk/util-user-agent-node":"^3.973.15","@smithy/config-resolver":"^4.4.14","@smithy/core":"^3.23.14","@smithy/fetch-http-handler":"^5.3.16","@smithy/hash-node":"^4.2.13","@smithy/invalid-dependency":"^4.2.13","@smithy/middleware-content-length":"^4.2.13","@smithy/middleware-endpoint":"^4.4.29","@smithy/middleware-retry":"^4.5.0","@smithy/middleware-serde":"^4.2.17","@smithy/middleware-stack":"^4.2.13","@smithy/node-config-provider":"^4.3.13","@smithy/node-http-handler":"^4.5.2","@smithy/protocol-http":"^5.3.13","@smithy/smithy-client":"^4.12.9","@smithy/types":"^4.14.0","@smithy/url-parser":"^4.2.13","@smithy/util-base64":"^4.3.2","@smithy/util-body-length-browser":"^4.2.2","@smithy/util-body-length-node":"^4.2.3","@smithy/util-defaults-mode-browser":"^4.3.45","@smithy/util-defaults-mode-node":"^4.2.49","@smithy/util-endpoints":"^3.3.4","@smithy/util-middleware":"^4.2.13","@smithy/util-retry":"^4.3.0","@smithy/util-utf8":"^4.2.2","tslib":"^2.6.2"},"devDependencies":{"concurrently":"7.0.0","downlevel-dts":"0.10.1","premove":"4.0.0","typescript":"~5.8.3"},"typesVersions":{"<4.5":{"dist-types/*":["dist-types/ts3.4/*"]}},"files":["./cognito-identity.d.ts","./cognito-identity.js","./signin.d.ts","./signin.js","./sso-oidc.d.ts","./sso-oidc.js","./sso.d.ts","./sso.js","./sts.d.ts","./sts.js","dist-*/**"],"browser":{"./dist-es/submodules/cognito-identity/runtimeConfig":"./dist-es/submodules/cognito-identity/runtimeConfig.browser","./dist-es/submodules/signin/runtimeConfig":"./dist-es/submodules/signin/runtimeConfig.browser","./dist-es/submodules/sso-oidc/runtimeConfig":"./dist-es/submodules/sso-oidc/runtimeConfig.browser","./dist-es/submodules/sso/runtimeConfig":"./dist-es/submodules/sso/runtimeConfig.browser","./dist-es/submodules/sts/runtimeConfig":"./dist-es/submodules/sts/runtimeConfig.browser"},"react-native":{},"homepage":"https://github.com/aws/aws-sdk-js-v3/tree/main/packages/nested-clients","repository":{"type":"git","url":"https://github.com/aws/aws-sdk-js-v3.git","directory":"packages/nested-clients"},"exports":{"./package.json":"./package.json","./sso-oidc":{"types":"./dist-types/submodules/sso-oidc/index.d.ts","module":"./dist-es/submodules/sso-oidc/index.js","node":"./dist-cjs/submodules/sso-oidc/index.js","import":"./dist-es/submodules/sso-oidc/index.js","require":"./dist-cjs/submodules/sso-oidc/index.js"},"./sts":{"types":"./dist-types/submodules/sts/index.d.ts","module":"./dist-es/submodules/sts/index.js","node":"./dist-cjs/submodules/sts/index.js","import":"./dist-es/submodules/sts/index.js","require":"./dist-cjs/submodules/sts/index.js"},"./signin":{"types":"./dist-types/submodules/signin/index.d.ts","module":"./dist-es/submodules/signin/index.js","node":"./dist-cjs/submodules/signin/index.js","import":"./dist-es/submodules/signin/index.js","require":"./dist-cjs/submodules/signin/index.js"},"./cognito-identity":{"types":"./dist-types/submodules/cognito-identity/index.d.ts","module":"./dist-es/submodules/cognito-identity/index.js","node":"./dist-cjs/submodules/cognito-identity/index.js","import":"./dist-es/submodules/cognito-identity/index.js","require":"./dist-cjs/submodules/cognito-identity/index.js"},"./sso":{"types":"./dist-types/submodules/sso/index.d.ts","module":"./dist-es/submodules/sso/index.js","node":"./dist-cjs/submodules/sso/index.js","import":"./dist-es/submodules/sso/index.js","require":"./dist-cjs/submodules/sso/index.js"}}}');
|
|
893
1076
|
|
|
894
1077
|
/***/ })
|
|
895
1078
|
|