@rharkor/caching-for-turbo 2.3.11 → 2.3.12

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -119,7 +119,7 @@ exports.resolveHttpAuthRuntimeConfig = resolveHttpAuthRuntimeConfig;
119
119
 
120
120
  Object.defineProperty(exports, "__esModule", ({ value: true }));
121
121
  exports.resolveHttpAuthSchemeConfig = exports.resolveStsAuthConfig = exports.defaultSTSHttpAuthSchemeProvider = exports.defaultSTSHttpAuthSchemeParametersProvider = void 0;
122
- const core_1 = __webpack_require__(8704);
122
+ const httpAuthSchemes_1 = __webpack_require__(97523);
123
123
  const util_middleware_1 = __webpack_require__(76324);
124
124
  const STSClient_1 = __webpack_require__(63723);
125
125
  const defaultSTSHttpAuthSchemeParametersProvider = async (config, context, input) => {
@@ -172,7 +172,7 @@ const resolveStsAuthConfig = (input) => Object.assign(input, {
172
172
  exports.resolveStsAuthConfig = resolveStsAuthConfig;
173
173
  const resolveHttpAuthSchemeConfig = (config) => {
174
174
  const config_0 = (0, exports.resolveStsAuthConfig)(config);
175
- const config_1 = (0, core_1.resolveAwsSdkSigV4Config)(config_0);
175
+ const config_1 = (0, httpAuthSchemes_1.resolveAwsSdkSigV4Config)(config_0);
176
176
  return Object.assign(config_1, {
177
177
  authSchemePreference: (0, util_middleware_1.normalizeProvider)(config.authSchemePreference ?? []),
178
178
  });
@@ -240,8 +240,146 @@ util_endpoints_2.customEndpointFunctions.aws = util_endpoints_1.awsEndpointFunct
240
240
  Object.defineProperty(exports, "__esModule", ({ value: true }));
241
241
  exports.ruleSet = void 0;
242
242
  const F = "required", G = "type", H = "fn", I = "argv", J = "ref";
243
- const a = false, b = true, c = "booleanEquals", d = "stringEquals", e = "sigv4", f = "sts", g = "us-east-1", h = "endpoint", i = "https://sts.{Region}.{PartitionResult#dnsSuffix}", j = "tree", k = "error", l = "getAttr", m = { [F]: false, [G]: "string" }, n = { [F]: true, "default": false, [G]: "boolean" }, o = { [J]: "Endpoint" }, p = { [H]: "isSet", [I]: [{ [J]: "Region" }] }, q = { [J]: "Region" }, r = { [H]: "aws.partition", [I]: [q], "assign": "PartitionResult" }, s = { [J]: "UseFIPS" }, t = { [J]: "UseDualStack" }, u = { "url": "https://sts.amazonaws.com", "properties": { "authSchemes": [{ "name": e, "signingName": f, "signingRegion": g }] }, "headers": {} }, v = {}, w = { "conditions": [{ [H]: d, [I]: [q, "aws-global"] }], [h]: u, [G]: h }, x = { [H]: c, [I]: [s, true] }, y = { [H]: c, [I]: [t, true] }, z = { [H]: l, [I]: [{ [J]: "PartitionResult" }, "supportsFIPS"] }, A = { [J]: "PartitionResult" }, B = { [H]: c, [I]: [true, { [H]: l, [I]: [A, "supportsDualStack"] }] }, C = [{ [H]: "isSet", [I]: [o] }], D = [x], E = [y];
244
- const _data = { version: "1.0", parameters: { Region: m, UseDualStack: n, UseFIPS: n, Endpoint: m, UseGlobalEndpoint: n }, rules: [{ conditions: [{ [H]: c, [I]: [{ [J]: "UseGlobalEndpoint" }, b] }, { [H]: "not", [I]: C }, p, r, { [H]: c, [I]: [s, a] }, { [H]: c, [I]: [t, a] }], rules: [{ conditions: [{ [H]: d, [I]: [q, "ap-northeast-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "ap-south-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "ap-southeast-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "ap-southeast-2"] }], endpoint: u, [G]: h }, w, { conditions: [{ [H]: d, [I]: [q, "ca-central-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "eu-central-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "eu-north-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "eu-west-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "eu-west-2"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "eu-west-3"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "sa-east-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, g] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "us-east-2"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "us-west-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "us-west-2"] }], endpoint: u, [G]: h }, { endpoint: { url: i, properties: { authSchemes: [{ name: e, signingName: f, signingRegion: "{Region}" }] }, headers: v }, [G]: h }], [G]: j }, { conditions: C, rules: [{ conditions: D, error: "Invalid Configuration: FIPS and custom endpoint are not supported", [G]: k }, { conditions: E, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", [G]: k }, { endpoint: { url: o, properties: v, headers: v }, [G]: h }], [G]: j }, { conditions: [p], rules: [{ conditions: [r], rules: [{ conditions: [x, y], rules: [{ conditions: [{ [H]: c, [I]: [b, z] }, B], rules: [{ endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: v, headers: v }, [G]: h }], [G]: j }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", [G]: k }], [G]: j }, { conditions: D, rules: [{ conditions: [{ [H]: c, [I]: [z, b] }], rules: [{ conditions: [{ [H]: d, [I]: [{ [H]: l, [I]: [A, "name"] }, "aws-us-gov"] }], endpoint: { url: "https://sts.{Region}.amazonaws.com", properties: v, headers: v }, [G]: h }, { endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dnsSuffix}", properties: v, headers: v }, [G]: h }], [G]: j }, { error: "FIPS is enabled but this partition does not support FIPS", [G]: k }], [G]: j }, { conditions: E, rules: [{ conditions: [B], rules: [{ endpoint: { url: "https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: v, headers: v }, [G]: h }], [G]: j }, { error: "DualStack is enabled but this partition does not support DualStack", [G]: k }], [G]: j }, w, { endpoint: { url: i, properties: v, headers: v }, [G]: h }], [G]: j }], [G]: j }, { error: "Invalid Configuration: Missing Region", [G]: k }] };
243
+ const a = false, b = true, c = "booleanEquals", d = "stringEquals", e = "sigv4", f = "sts", g = "us-east-1", h = "endpoint", i = "https://sts.{Region}.{PartitionResult#dnsSuffix}", j = "tree", k = "error", l = "getAttr", m = { [F]: false, [G]: "string" }, n = { [F]: true, default: false, [G]: "boolean" }, o = { [J]: "Endpoint" }, p = { [H]: "isSet", [I]: [{ [J]: "Region" }] }, q = { [J]: "Region" }, r = { [H]: "aws.partition", [I]: [q], assign: "PartitionResult" }, s = { [J]: "UseFIPS" }, t = { [J]: "UseDualStack" }, u = {
244
+ url: "https://sts.amazonaws.com",
245
+ properties: { authSchemes: [{ name: e, signingName: f, signingRegion: g }] },
246
+ headers: {},
247
+ }, v = {}, w = { conditions: [{ [H]: d, [I]: [q, "aws-global"] }], [h]: u, [G]: h }, x = { [H]: c, [I]: [s, true] }, y = { [H]: c, [I]: [t, true] }, z = { [H]: l, [I]: [{ [J]: "PartitionResult" }, "supportsFIPS"] }, A = { [J]: "PartitionResult" }, B = { [H]: c, [I]: [true, { [H]: l, [I]: [A, "supportsDualStack"] }] }, C = [{ [H]: "isSet", [I]: [o] }], D = [x], E = [y];
248
+ const _data = {
249
+ version: "1.0",
250
+ parameters: { Region: m, UseDualStack: n, UseFIPS: n, Endpoint: m, UseGlobalEndpoint: n },
251
+ rules: [
252
+ {
253
+ conditions: [
254
+ { [H]: c, [I]: [{ [J]: "UseGlobalEndpoint" }, b] },
255
+ { [H]: "not", [I]: C },
256
+ p,
257
+ r,
258
+ { [H]: c, [I]: [s, a] },
259
+ { [H]: c, [I]: [t, a] },
260
+ ],
261
+ rules: [
262
+ { conditions: [{ [H]: d, [I]: [q, "ap-northeast-1"] }], endpoint: u, [G]: h },
263
+ { conditions: [{ [H]: d, [I]: [q, "ap-south-1"] }], endpoint: u, [G]: h },
264
+ { conditions: [{ [H]: d, [I]: [q, "ap-southeast-1"] }], endpoint: u, [G]: h },
265
+ { conditions: [{ [H]: d, [I]: [q, "ap-southeast-2"] }], endpoint: u, [G]: h },
266
+ w,
267
+ { conditions: [{ [H]: d, [I]: [q, "ca-central-1"] }], endpoint: u, [G]: h },
268
+ { conditions: [{ [H]: d, [I]: [q, "eu-central-1"] }], endpoint: u, [G]: h },
269
+ { conditions: [{ [H]: d, [I]: [q, "eu-north-1"] }], endpoint: u, [G]: h },
270
+ { conditions: [{ [H]: d, [I]: [q, "eu-west-1"] }], endpoint: u, [G]: h },
271
+ { conditions: [{ [H]: d, [I]: [q, "eu-west-2"] }], endpoint: u, [G]: h },
272
+ { conditions: [{ [H]: d, [I]: [q, "eu-west-3"] }], endpoint: u, [G]: h },
273
+ { conditions: [{ [H]: d, [I]: [q, "sa-east-1"] }], endpoint: u, [G]: h },
274
+ { conditions: [{ [H]: d, [I]: [q, g] }], endpoint: u, [G]: h },
275
+ { conditions: [{ [H]: d, [I]: [q, "us-east-2"] }], endpoint: u, [G]: h },
276
+ { conditions: [{ [H]: d, [I]: [q, "us-west-1"] }], endpoint: u, [G]: h },
277
+ { conditions: [{ [H]: d, [I]: [q, "us-west-2"] }], endpoint: u, [G]: h },
278
+ {
279
+ endpoint: {
280
+ url: i,
281
+ properties: { authSchemes: [{ name: e, signingName: f, signingRegion: "{Region}" }] },
282
+ headers: v,
283
+ },
284
+ [G]: h,
285
+ },
286
+ ],
287
+ [G]: j,
288
+ },
289
+ {
290
+ conditions: C,
291
+ rules: [
292
+ { conditions: D, error: "Invalid Configuration: FIPS and custom endpoint are not supported", [G]: k },
293
+ { conditions: E, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", [G]: k },
294
+ { endpoint: { url: o, properties: v, headers: v }, [G]: h },
295
+ ],
296
+ [G]: j,
297
+ },
298
+ {
299
+ conditions: [p],
300
+ rules: [
301
+ {
302
+ conditions: [r],
303
+ rules: [
304
+ {
305
+ conditions: [x, y],
306
+ rules: [
307
+ {
308
+ conditions: [{ [H]: c, [I]: [b, z] }, B],
309
+ rules: [
310
+ {
311
+ endpoint: {
312
+ url: "https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",
313
+ properties: v,
314
+ headers: v,
315
+ },
316
+ [G]: h,
317
+ },
318
+ ],
319
+ [G]: j,
320
+ },
321
+ { error: "FIPS and DualStack are enabled, but this partition does not support one or both", [G]: k },
322
+ ],
323
+ [G]: j,
324
+ },
325
+ {
326
+ conditions: D,
327
+ rules: [
328
+ {
329
+ conditions: [{ [H]: c, [I]: [z, b] }],
330
+ rules: [
331
+ {
332
+ conditions: [{ [H]: d, [I]: [{ [H]: l, [I]: [A, "name"] }, "aws-us-gov"] }],
333
+ endpoint: { url: "https://sts.{Region}.amazonaws.com", properties: v, headers: v },
334
+ [G]: h,
335
+ },
336
+ {
337
+ endpoint: {
338
+ url: "https://sts-fips.{Region}.{PartitionResult#dnsSuffix}",
339
+ properties: v,
340
+ headers: v,
341
+ },
342
+ [G]: h,
343
+ },
344
+ ],
345
+ [G]: j,
346
+ },
347
+ { error: "FIPS is enabled but this partition does not support FIPS", [G]: k },
348
+ ],
349
+ [G]: j,
350
+ },
351
+ {
352
+ conditions: E,
353
+ rules: [
354
+ {
355
+ conditions: [B],
356
+ rules: [
357
+ {
358
+ endpoint: {
359
+ url: "https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}",
360
+ properties: v,
361
+ headers: v,
362
+ },
363
+ [G]: h,
364
+ },
365
+ ],
366
+ [G]: j,
367
+ },
368
+ { error: "DualStack is enabled but this partition does not support DualStack", [G]: k },
369
+ ],
370
+ [G]: j,
371
+ },
372
+ w,
373
+ { endpoint: { url: i, properties: v, headers: v }, [G]: h },
374
+ ],
375
+ [G]: j,
376
+ },
377
+ ],
378
+ [G]: j,
379
+ },
380
+ { error: "Invalid Configuration: Missing Region", [G]: k },
381
+ ],
382
+ };
245
383
  exports.ruleSet = _data;
246
384
 
247
385
 
@@ -256,287 +394,11 @@ var STSClient = __webpack_require__(63723);
256
394
  var smithyClient = __webpack_require__(61411);
257
395
  var middlewareEndpoint = __webpack_require__(40099);
258
396
  var EndpointParameters = __webpack_require__(76811);
259
- var schema = __webpack_require__(26890);
397
+ var schemas_0 = __webpack_require__(1684);
398
+ var errors = __webpack_require__(41688);
260
399
  var client = __webpack_require__(5152);
261
400
  var regionConfigResolver = __webpack_require__(36463);
262
-
263
- class STSServiceException extends smithyClient.ServiceException {
264
- constructor(options) {
265
- super(options);
266
- Object.setPrototypeOf(this, STSServiceException.prototype);
267
- }
268
- }
269
-
270
- class ExpiredTokenException extends STSServiceException {
271
- name = "ExpiredTokenException";
272
- $fault = "client";
273
- constructor(opts) {
274
- super({
275
- name: "ExpiredTokenException",
276
- $fault: "client",
277
- ...opts,
278
- });
279
- Object.setPrototypeOf(this, ExpiredTokenException.prototype);
280
- }
281
- }
282
- class MalformedPolicyDocumentException extends STSServiceException {
283
- name = "MalformedPolicyDocumentException";
284
- $fault = "client";
285
- constructor(opts) {
286
- super({
287
- name: "MalformedPolicyDocumentException",
288
- $fault: "client",
289
- ...opts,
290
- });
291
- Object.setPrototypeOf(this, MalformedPolicyDocumentException.prototype);
292
- }
293
- }
294
- class PackedPolicyTooLargeException extends STSServiceException {
295
- name = "PackedPolicyTooLargeException";
296
- $fault = "client";
297
- constructor(opts) {
298
- super({
299
- name: "PackedPolicyTooLargeException",
300
- $fault: "client",
301
- ...opts,
302
- });
303
- Object.setPrototypeOf(this, PackedPolicyTooLargeException.prototype);
304
- }
305
- }
306
- class RegionDisabledException extends STSServiceException {
307
- name = "RegionDisabledException";
308
- $fault = "client";
309
- constructor(opts) {
310
- super({
311
- name: "RegionDisabledException",
312
- $fault: "client",
313
- ...opts,
314
- });
315
- Object.setPrototypeOf(this, RegionDisabledException.prototype);
316
- }
317
- }
318
- class IDPRejectedClaimException extends STSServiceException {
319
- name = "IDPRejectedClaimException";
320
- $fault = "client";
321
- constructor(opts) {
322
- super({
323
- name: "IDPRejectedClaimException",
324
- $fault: "client",
325
- ...opts,
326
- });
327
- Object.setPrototypeOf(this, IDPRejectedClaimException.prototype);
328
- }
329
- }
330
- class InvalidIdentityTokenException extends STSServiceException {
331
- name = "InvalidIdentityTokenException";
332
- $fault = "client";
333
- constructor(opts) {
334
- super({
335
- name: "InvalidIdentityTokenException",
336
- $fault: "client",
337
- ...opts,
338
- });
339
- Object.setPrototypeOf(this, InvalidIdentityTokenException.prototype);
340
- }
341
- }
342
- class IDPCommunicationErrorException extends STSServiceException {
343
- name = "IDPCommunicationErrorException";
344
- $fault = "client";
345
- constructor(opts) {
346
- super({
347
- name: "IDPCommunicationErrorException",
348
- $fault: "client",
349
- ...opts,
350
- });
351
- Object.setPrototypeOf(this, IDPCommunicationErrorException.prototype);
352
- }
353
- }
354
-
355
- const _A = "Arn";
356
- const _AKI = "AccessKeyId";
357
- const _AR = "AssumeRole";
358
- const _ARI = "AssumedRoleId";
359
- const _ARR = "AssumeRoleRequest";
360
- const _ARRs = "AssumeRoleResponse";
361
- const _ARU = "AssumedRoleUser";
362
- const _ARWWI = "AssumeRoleWithWebIdentity";
363
- const _ARWWIR = "AssumeRoleWithWebIdentityRequest";
364
- const _ARWWIRs = "AssumeRoleWithWebIdentityResponse";
365
- const _Au = "Audience";
366
- const _C = "Credentials";
367
- const _CA = "ContextAssertion";
368
- const _DS = "DurationSeconds";
369
- const _E = "Expiration";
370
- const _EI = "ExternalId";
371
- const _ETE = "ExpiredTokenException";
372
- const _IDPCEE = "IDPCommunicationErrorException";
373
- const _IDPRCE = "IDPRejectedClaimException";
374
- const _IITE = "InvalidIdentityTokenException";
375
- const _K = "Key";
376
- const _MPDE = "MalformedPolicyDocumentException";
377
- const _P = "Policy";
378
- const _PA = "PolicyArns";
379
- const _PAr = "ProviderArn";
380
- const _PC = "ProvidedContexts";
381
- const _PCLT = "ProvidedContextsListType";
382
- const _PCr = "ProvidedContext";
383
- const _PDT = "PolicyDescriptorType";
384
- const _PI = "ProviderId";
385
- const _PPS = "PackedPolicySize";
386
- const _PPTLE = "PackedPolicyTooLargeException";
387
- const _Pr = "Provider";
388
- const _RA = "RoleArn";
389
- const _RDE = "RegionDisabledException";
390
- const _RSN = "RoleSessionName";
391
- const _SAK = "SecretAccessKey";
392
- const _SFWIT = "SubjectFromWebIdentityToken";
393
- const _SI = "SourceIdentity";
394
- const _SN = "SerialNumber";
395
- const _ST = "SessionToken";
396
- const _T = "Tags";
397
- const _TC = "TokenCode";
398
- const _TTK = "TransitiveTagKeys";
399
- const _Ta = "Tag";
400
- const _V = "Value";
401
- const _WIT = "WebIdentityToken";
402
- const _a = "arn";
403
- const _aKST = "accessKeySecretType";
404
- const _aQE = "awsQueryError";
405
- const _c = "client";
406
- const _cTT = "clientTokenType";
407
- const _e = "error";
408
- const _hE = "httpError";
409
- const _m = "message";
410
- const _pDLT = "policyDescriptorListType";
411
- const _s = "smithy.ts.sdk.synthetic.com.amazonaws.sts";
412
- const _tLT = "tagListType";
413
- const n0 = "com.amazonaws.sts";
414
- var accessKeySecretType = [0, n0, _aKST, 8, 0];
415
- var clientTokenType = [0, n0, _cTT, 8, 0];
416
- var AssumedRoleUser$ = [3, n0, _ARU, 0, [_ARI, _A], [0, 0], 2];
417
- var AssumeRoleRequest$ = [
418
- 3,
419
- n0,
420
- _ARR,
421
- 0,
422
- [_RA, _RSN, _PA, _P, _DS, _T, _TTK, _EI, _SN, _TC, _SI, _PC],
423
- [0, 0, () => policyDescriptorListType, 0, 1, () => tagListType, 64 | 0, 0, 0, 0, 0, () => ProvidedContextsListType],
424
- 2,
425
- ];
426
- var AssumeRoleResponse$ = [
427
- 3,
428
- n0,
429
- _ARRs,
430
- 0,
431
- [_C, _ARU, _PPS, _SI],
432
- [[() => Credentials$, 0], () => AssumedRoleUser$, 1, 0],
433
- ];
434
- var AssumeRoleWithWebIdentityRequest$ = [
435
- 3,
436
- n0,
437
- _ARWWIR,
438
- 0,
439
- [_RA, _RSN, _WIT, _PI, _PA, _P, _DS],
440
- [0, 0, [() => clientTokenType, 0], 0, () => policyDescriptorListType, 0, 1],
441
- 3,
442
- ];
443
- var AssumeRoleWithWebIdentityResponse$ = [
444
- 3,
445
- n0,
446
- _ARWWIRs,
447
- 0,
448
- [_C, _SFWIT, _ARU, _PPS, _Pr, _Au, _SI],
449
- [[() => Credentials$, 0], 0, () => AssumedRoleUser$, 1, 0, 0, 0],
450
- ];
451
- var Credentials$ = [
452
- 3,
453
- n0,
454
- _C,
455
- 0,
456
- [_AKI, _SAK, _ST, _E],
457
- [0, [() => accessKeySecretType, 0], 0, 4],
458
- 4,
459
- ];
460
- var ExpiredTokenException$ = [
461
- -3,
462
- n0,
463
- _ETE,
464
- { [_aQE]: [`ExpiredTokenException`, 400], [_e]: _c, [_hE]: 400 },
465
- [_m],
466
- [0],
467
- ];
468
- schema.TypeRegistry.for(n0).registerError(ExpiredTokenException$, ExpiredTokenException);
469
- var IDPCommunicationErrorException$ = [
470
- -3,
471
- n0,
472
- _IDPCEE,
473
- { [_aQE]: [`IDPCommunicationError`, 400], [_e]: _c, [_hE]: 400 },
474
- [_m],
475
- [0],
476
- ];
477
- schema.TypeRegistry.for(n0).registerError(IDPCommunicationErrorException$, IDPCommunicationErrorException);
478
- var IDPRejectedClaimException$ = [
479
- -3,
480
- n0,
481
- _IDPRCE,
482
- { [_aQE]: [`IDPRejectedClaim`, 403], [_e]: _c, [_hE]: 403 },
483
- [_m],
484
- [0],
485
- ];
486
- schema.TypeRegistry.for(n0).registerError(IDPRejectedClaimException$, IDPRejectedClaimException);
487
- var InvalidIdentityTokenException$ = [
488
- -3,
489
- n0,
490
- _IITE,
491
- { [_aQE]: [`InvalidIdentityToken`, 400], [_e]: _c, [_hE]: 400 },
492
- [_m],
493
- [0],
494
- ];
495
- schema.TypeRegistry.for(n0).registerError(InvalidIdentityTokenException$, InvalidIdentityTokenException);
496
- var MalformedPolicyDocumentException$ = [
497
- -3,
498
- n0,
499
- _MPDE,
500
- { [_aQE]: [`MalformedPolicyDocument`, 400], [_e]: _c, [_hE]: 400 },
501
- [_m],
502
- [0],
503
- ];
504
- schema.TypeRegistry.for(n0).registerError(MalformedPolicyDocumentException$, MalformedPolicyDocumentException);
505
- var PackedPolicyTooLargeException$ = [
506
- -3,
507
- n0,
508
- _PPTLE,
509
- { [_aQE]: [`PackedPolicyTooLarge`, 400], [_e]: _c, [_hE]: 400 },
510
- [_m],
511
- [0],
512
- ];
513
- schema.TypeRegistry.for(n0).registerError(PackedPolicyTooLargeException$, PackedPolicyTooLargeException);
514
- var PolicyDescriptorType$ = [3, n0, _PDT, 0, [_a], [0]];
515
- var ProvidedContext$ = [3, n0, _PCr, 0, [_PAr, _CA], [0, 0]];
516
- var RegionDisabledException$ = [
517
- -3,
518
- n0,
519
- _RDE,
520
- { [_aQE]: [`RegionDisabledException`, 403], [_e]: _c, [_hE]: 403 },
521
- [_m],
522
- [0],
523
- ];
524
- schema.TypeRegistry.for(n0).registerError(RegionDisabledException$, RegionDisabledException);
525
- var Tag$ = [3, n0, _Ta, 0, [_K, _V], [0, 0], 2];
526
- var STSServiceException$ = [-3, _s, "STSServiceException", 0, [], []];
527
- schema.TypeRegistry.for(_s).registerError(STSServiceException$, STSServiceException);
528
- var policyDescriptorListType = [1, n0, _pDLT, 0, () => PolicyDescriptorType$];
529
- var ProvidedContextsListType = [1, n0, _PCLT, 0, () => ProvidedContext$];
530
- var tagListType = [1, n0, _tLT, 0, () => Tag$];
531
- var AssumeRole$ = [9, n0, _AR, 0, () => AssumeRoleRequest$, () => AssumeRoleResponse$];
532
- var AssumeRoleWithWebIdentity$ = [
533
- 9,
534
- n0,
535
- _ARWWI,
536
- 0,
537
- () => AssumeRoleWithWebIdentityRequest$,
538
- () => AssumeRoleWithWebIdentityResponse$,
539
- ];
401
+ var STSServiceException = __webpack_require__(17171);
540
402
 
541
403
  class AssumeRoleCommand extends smithyClient.Command
542
404
  .classBuilder()
@@ -546,7 +408,7 @@ class AssumeRoleCommand extends smithyClient.Command
546
408
  })
547
409
  .s("AWSSecurityTokenServiceV20110615", "AssumeRole", {})
548
410
  .n("STSClient", "AssumeRoleCommand")
549
- .sc(AssumeRole$)
411
+ .sc(schemas_0.AssumeRole$)
550
412
  .build() {
551
413
  }
552
414
 
@@ -558,7 +420,7 @@ class AssumeRoleWithWebIdentityCommand extends smithyClient.Command
558
420
  })
559
421
  .s("AWSSecurityTokenServiceV20110615", "AssumeRoleWithWebIdentity", {})
560
422
  .n("STSClient", "AssumeRoleWithWebIdentityCommand")
561
- .sc(AssumeRoleWithWebIdentity$)
423
+ .sc(schemas_0.AssumeRoleWithWebIdentity$)
562
424
  .build() {
563
425
  }
564
426
 
@@ -690,51 +552,167 @@ const decorateDefaultCredentialProvider = (provider) => (input) => provider({
690
552
  ...input,
691
553
  });
692
554
 
693
- Object.defineProperty(exports, "$Command", ({
694
- enumerable: true,
695
- get: function () { return smithyClient.Command; }
696
- }));
697
- exports.AssumeRole$ = AssumeRole$;
555
+ exports.$Command = smithyClient.Command;
556
+ exports.STSServiceException = STSServiceException.STSServiceException;
698
557
  exports.AssumeRoleCommand = AssumeRoleCommand;
699
- exports.AssumeRoleRequest$ = AssumeRoleRequest$;
700
- exports.AssumeRoleResponse$ = AssumeRoleResponse$;
701
- exports.AssumeRoleWithWebIdentity$ = AssumeRoleWithWebIdentity$;
702
558
  exports.AssumeRoleWithWebIdentityCommand = AssumeRoleWithWebIdentityCommand;
703
- exports.AssumeRoleWithWebIdentityRequest$ = AssumeRoleWithWebIdentityRequest$;
704
- exports.AssumeRoleWithWebIdentityResponse$ = AssumeRoleWithWebIdentityResponse$;
705
- exports.AssumedRoleUser$ = AssumedRoleUser$;
706
- exports.Credentials$ = Credentials$;
707
- exports.ExpiredTokenException = ExpiredTokenException;
708
- exports.ExpiredTokenException$ = ExpiredTokenException$;
709
- exports.IDPCommunicationErrorException = IDPCommunicationErrorException;
710
- exports.IDPCommunicationErrorException$ = IDPCommunicationErrorException$;
711
- exports.IDPRejectedClaimException = IDPRejectedClaimException;
712
- exports.IDPRejectedClaimException$ = IDPRejectedClaimException$;
713
- exports.InvalidIdentityTokenException = InvalidIdentityTokenException;
714
- exports.InvalidIdentityTokenException$ = InvalidIdentityTokenException$;
715
- exports.MalformedPolicyDocumentException = MalformedPolicyDocumentException;
716
- exports.MalformedPolicyDocumentException$ = MalformedPolicyDocumentException$;
717
- exports.PackedPolicyTooLargeException = PackedPolicyTooLargeException;
718
- exports.PackedPolicyTooLargeException$ = PackedPolicyTooLargeException$;
719
- exports.PolicyDescriptorType$ = PolicyDescriptorType$;
720
- exports.ProvidedContext$ = ProvidedContext$;
721
- exports.RegionDisabledException = RegionDisabledException;
722
- exports.RegionDisabledException$ = RegionDisabledException$;
723
559
  exports.STS = STS;
724
- exports.STSServiceException = STSServiceException;
725
- exports.STSServiceException$ = STSServiceException$;
726
- exports.Tag$ = Tag$;
727
560
  exports.decorateDefaultCredentialProvider = decorateDefaultCredentialProvider;
728
561
  exports.getDefaultRoleAssumer = getDefaultRoleAssumer;
729
562
  exports.getDefaultRoleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity;
563
+ Object.prototype.hasOwnProperty.call(STSClient, '__proto__') &&
564
+ !Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
565
+ Object.defineProperty(exports, '__proto__', {
566
+ enumerable: true,
567
+ value: STSClient['__proto__']
568
+ });
569
+
730
570
  Object.keys(STSClient).forEach(function (k) {
731
- if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) Object.defineProperty(exports, k, {
571
+ if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = STSClient[k];
572
+ });
573
+ Object.prototype.hasOwnProperty.call(schemas_0, '__proto__') &&
574
+ !Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
575
+ Object.defineProperty(exports, '__proto__', {
732
576
  enumerable: true,
733
- get: function () { return STSClient[k]; }
577
+ value: schemas_0['__proto__']
734
578
  });
579
+
580
+ Object.keys(schemas_0).forEach(function (k) {
581
+ if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = schemas_0[k];
582
+ });
583
+ Object.prototype.hasOwnProperty.call(errors, '__proto__') &&
584
+ !Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
585
+ Object.defineProperty(exports, '__proto__', {
586
+ enumerable: true,
587
+ value: errors['__proto__']
588
+ });
589
+
590
+ Object.keys(errors).forEach(function (k) {
591
+ if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = errors[k];
735
592
  });
736
593
 
737
594
 
595
+ /***/ }),
596
+
597
+ /***/ 17171:
598
+ /***/ ((__unused_webpack_module, exports, __webpack_require__) => {
599
+
600
+
601
+ Object.defineProperty(exports, "__esModule", ({ value: true }));
602
+ exports.STSServiceException = exports.__ServiceException = void 0;
603
+ const smithy_client_1 = __webpack_require__(61411);
604
+ Object.defineProperty(exports, "__ServiceException", ({ enumerable: true, get: function () { return smithy_client_1.ServiceException; } }));
605
+ class STSServiceException extends smithy_client_1.ServiceException {
606
+ constructor(options) {
607
+ super(options);
608
+ Object.setPrototypeOf(this, STSServiceException.prototype);
609
+ }
610
+ }
611
+ exports.STSServiceException = STSServiceException;
612
+
613
+
614
+ /***/ }),
615
+
616
+ /***/ 41688:
617
+ /***/ ((__unused_webpack_module, exports, __webpack_require__) => {
618
+
619
+
620
+ Object.defineProperty(exports, "__esModule", ({ value: true }));
621
+ exports.IDPCommunicationErrorException = exports.InvalidIdentityTokenException = exports.IDPRejectedClaimException = exports.RegionDisabledException = exports.PackedPolicyTooLargeException = exports.MalformedPolicyDocumentException = exports.ExpiredTokenException = void 0;
622
+ const STSServiceException_1 = __webpack_require__(17171);
623
+ class ExpiredTokenException extends STSServiceException_1.STSServiceException {
624
+ name = "ExpiredTokenException";
625
+ $fault = "client";
626
+ constructor(opts) {
627
+ super({
628
+ name: "ExpiredTokenException",
629
+ $fault: "client",
630
+ ...opts,
631
+ });
632
+ Object.setPrototypeOf(this, ExpiredTokenException.prototype);
633
+ }
634
+ }
635
+ exports.ExpiredTokenException = ExpiredTokenException;
636
+ class MalformedPolicyDocumentException extends STSServiceException_1.STSServiceException {
637
+ name = "MalformedPolicyDocumentException";
638
+ $fault = "client";
639
+ constructor(opts) {
640
+ super({
641
+ name: "MalformedPolicyDocumentException",
642
+ $fault: "client",
643
+ ...opts,
644
+ });
645
+ Object.setPrototypeOf(this, MalformedPolicyDocumentException.prototype);
646
+ }
647
+ }
648
+ exports.MalformedPolicyDocumentException = MalformedPolicyDocumentException;
649
+ class PackedPolicyTooLargeException extends STSServiceException_1.STSServiceException {
650
+ name = "PackedPolicyTooLargeException";
651
+ $fault = "client";
652
+ constructor(opts) {
653
+ super({
654
+ name: "PackedPolicyTooLargeException",
655
+ $fault: "client",
656
+ ...opts,
657
+ });
658
+ Object.setPrototypeOf(this, PackedPolicyTooLargeException.prototype);
659
+ }
660
+ }
661
+ exports.PackedPolicyTooLargeException = PackedPolicyTooLargeException;
662
+ class RegionDisabledException extends STSServiceException_1.STSServiceException {
663
+ name = "RegionDisabledException";
664
+ $fault = "client";
665
+ constructor(opts) {
666
+ super({
667
+ name: "RegionDisabledException",
668
+ $fault: "client",
669
+ ...opts,
670
+ });
671
+ Object.setPrototypeOf(this, RegionDisabledException.prototype);
672
+ }
673
+ }
674
+ exports.RegionDisabledException = RegionDisabledException;
675
+ class IDPRejectedClaimException extends STSServiceException_1.STSServiceException {
676
+ name = "IDPRejectedClaimException";
677
+ $fault = "client";
678
+ constructor(opts) {
679
+ super({
680
+ name: "IDPRejectedClaimException",
681
+ $fault: "client",
682
+ ...opts,
683
+ });
684
+ Object.setPrototypeOf(this, IDPRejectedClaimException.prototype);
685
+ }
686
+ }
687
+ exports.IDPRejectedClaimException = IDPRejectedClaimException;
688
+ class InvalidIdentityTokenException extends STSServiceException_1.STSServiceException {
689
+ name = "InvalidIdentityTokenException";
690
+ $fault = "client";
691
+ constructor(opts) {
692
+ super({
693
+ name: "InvalidIdentityTokenException",
694
+ $fault: "client",
695
+ ...opts,
696
+ });
697
+ Object.setPrototypeOf(this, InvalidIdentityTokenException.prototype);
698
+ }
699
+ }
700
+ exports.InvalidIdentityTokenException = InvalidIdentityTokenException;
701
+ class IDPCommunicationErrorException extends STSServiceException_1.STSServiceException {
702
+ name = "IDPCommunicationErrorException";
703
+ $fault = "client";
704
+ constructor(opts) {
705
+ super({
706
+ name: "IDPCommunicationErrorException",
707
+ $fault: "client",
708
+ ...opts,
709
+ });
710
+ Object.setPrototypeOf(this, IDPCommunicationErrorException.prototype);
711
+ }
712
+ }
713
+ exports.IDPCommunicationErrorException = IDPCommunicationErrorException;
714
+
715
+
738
716
  /***/ }),
739
717
 
740
718
  /***/ 36578:
@@ -745,10 +723,11 @@ Object.defineProperty(exports, "__esModule", ({ value: true }));
745
723
  exports.getRuntimeConfig = void 0;
746
724
  const tslib_1 = __webpack_require__(61860);
747
725
  const package_json_1 = tslib_1.__importDefault(__webpack_require__(39955));
748
- const core_1 = __webpack_require__(8704);
726
+ const client_1 = __webpack_require__(5152);
727
+ const httpAuthSchemes_1 = __webpack_require__(97523);
749
728
  const util_user_agent_node_1 = __webpack_require__(51656);
750
729
  const config_resolver_1 = __webpack_require__(39316);
751
- const core_2 = __webpack_require__(90402);
730
+ const core_1 = __webpack_require__(90402);
752
731
  const hash_node_1 = __webpack_require__(5092);
753
732
  const middleware_retry_1 = __webpack_require__(19618);
754
733
  const node_config_provider_1 = __webpack_require__(55704);
@@ -763,7 +742,7 @@ const getRuntimeConfig = (config) => {
763
742
  const defaultsMode = (0, util_defaults_mode_node_1.resolveDefaultsModeConfig)(config);
764
743
  const defaultConfigProvider = () => defaultsMode().then(smithy_client_1.loadConfigsForDefaultMode);
765
744
  const clientSharedValues = (0, runtimeConfig_shared_1.getRuntimeConfig)(config);
766
- (0, core_1.emitWarningIfUnsupportedVersion)(process.version);
745
+ (0, client_1.emitWarningIfUnsupportedVersion)(process.version);
767
746
  const loaderConfig = {
768
747
  profile: config?.profile,
769
748
  logger: clientSharedValues.logger,
@@ -773,7 +752,7 @@ const getRuntimeConfig = (config) => {
773
752
  ...config,
774
753
  runtime: "node",
775
754
  defaultsMode,
776
- authSchemePreference: config?.authSchemePreference ?? (0, node_config_provider_1.loadConfig)(core_1.NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, loaderConfig),
755
+ authSchemePreference: config?.authSchemePreference ?? (0, node_config_provider_1.loadConfig)(httpAuthSchemes_1.NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, loaderConfig),
777
756
  bodyLengthChecker: config?.bodyLengthChecker ?? util_body_length_node_1.calculateBodyLength,
778
757
  defaultUserAgentProvider: config?.defaultUserAgentProvider ??
779
758
  (0, util_user_agent_node_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
@@ -782,12 +761,12 @@ const getRuntimeConfig = (config) => {
782
761
  schemeId: "aws.auth#sigv4",
783
762
  identityProvider: (ipc) => ipc.getIdentityProvider("aws.auth#sigv4") ||
784
763
  (async (idProps) => await config.credentialDefaultProvider(idProps?.__config || {})()),
785
- signer: new core_1.AwsSdkSigV4Signer(),
764
+ signer: new httpAuthSchemes_1.AwsSdkSigV4Signer(),
786
765
  },
787
766
  {
788
767
  schemeId: "smithy.api#noAuth",
789
768
  identityProvider: (ipc) => ipc.getIdentityProvider("smithy.api#noAuth") || (async () => ({})),
790
- signer: new core_2.NoAuthSigner(),
769
+ signer: new core_1.NoAuthSigner(),
791
770
  },
792
771
  ],
793
772
  maxAttempts: config?.maxAttempts ?? (0, node_config_provider_1.loadConfig)(middleware_retry_1.NODE_MAX_ATTEMPT_CONFIG_OPTIONS, config),
@@ -817,15 +796,16 @@ exports.getRuntimeConfig = getRuntimeConfig;
817
796
 
818
797
  Object.defineProperty(exports, "__esModule", ({ value: true }));
819
798
  exports.getRuntimeConfig = void 0;
820
- const core_1 = __webpack_require__(8704);
799
+ const httpAuthSchemes_1 = __webpack_require__(97523);
821
800
  const protocols_1 = __webpack_require__(37288);
822
- const core_2 = __webpack_require__(90402);
801
+ const core_1 = __webpack_require__(90402);
823
802
  const smithy_client_1 = __webpack_require__(61411);
824
803
  const url_parser_1 = __webpack_require__(14494);
825
804
  const util_base64_1 = __webpack_require__(68385);
826
805
  const util_utf8_1 = __webpack_require__(71577);
827
806
  const httpAuthSchemeProvider_1 = __webpack_require__(27851);
828
807
  const endpointResolver_1 = __webpack_require__(59765);
808
+ const schemas_0_1 = __webpack_require__(1684);
829
809
  const getRuntimeConfig = (config) => {
830
810
  return {
831
811
  apiVersion: "2011-06-15",
@@ -839,18 +819,19 @@ const getRuntimeConfig = (config) => {
839
819
  {
840
820
  schemeId: "aws.auth#sigv4",
841
821
  identityProvider: (ipc) => ipc.getIdentityProvider("aws.auth#sigv4"),
842
- signer: new core_1.AwsSdkSigV4Signer(),
822
+ signer: new httpAuthSchemes_1.AwsSdkSigV4Signer(),
843
823
  },
844
824
  {
845
825
  schemeId: "smithy.api#noAuth",
846
826
  identityProvider: (ipc) => ipc.getIdentityProvider("smithy.api#noAuth") || (async () => ({})),
847
- signer: new core_2.NoAuthSigner(),
827
+ signer: new core_1.NoAuthSigner(),
848
828
  },
849
829
  ],
850
830
  logger: config?.logger ?? new smithy_client_1.NoOpLogger(),
851
831
  protocol: config?.protocol ?? protocols_1.AwsQueryProtocol,
852
832
  protocolSettings: config?.protocolSettings ?? {
853
833
  defaultNamespace: "com.amazonaws.sts",
834
+ errorTypeRegistries: schemas_0_1.errorTypeRegistries,
854
835
  xmlNamespace: "https://sts.amazonaws.com/doc/2011-06-15/",
855
836
  version: "2011-06-15",
856
837
  serviceTarget: "AWSSecurityTokenServiceV20110615",
@@ -884,12 +865,214 @@ const resolveRuntimeExtensions = (runtimeConfig, extensions) => {
884
865
  exports.resolveRuntimeExtensions = resolveRuntimeExtensions;
885
866
 
886
867
 
868
+ /***/ }),
869
+
870
+ /***/ 1684:
871
+ /***/ ((__unused_webpack_module, exports, __webpack_require__) => {
872
+
873
+
874
+ Object.defineProperty(exports, "__esModule", ({ value: true }));
875
+ exports.AssumeRoleWithWebIdentity$ = exports.AssumeRole$ = exports.Tag$ = exports.ProvidedContext$ = exports.PolicyDescriptorType$ = exports.Credentials$ = exports.AssumeRoleWithWebIdentityResponse$ = exports.AssumeRoleWithWebIdentityRequest$ = exports.AssumeRoleResponse$ = exports.AssumeRoleRequest$ = exports.AssumedRoleUser$ = exports.errorTypeRegistries = exports.RegionDisabledException$ = exports.PackedPolicyTooLargeException$ = exports.MalformedPolicyDocumentException$ = exports.InvalidIdentityTokenException$ = exports.IDPRejectedClaimException$ = exports.IDPCommunicationErrorException$ = exports.ExpiredTokenException$ = exports.STSServiceException$ = void 0;
876
+ const _A = "Arn";
877
+ const _AKI = "AccessKeyId";
878
+ const _AR = "AssumeRole";
879
+ const _ARI = "AssumedRoleId";
880
+ const _ARR = "AssumeRoleRequest";
881
+ const _ARRs = "AssumeRoleResponse";
882
+ const _ARU = "AssumedRoleUser";
883
+ const _ARWWI = "AssumeRoleWithWebIdentity";
884
+ const _ARWWIR = "AssumeRoleWithWebIdentityRequest";
885
+ const _ARWWIRs = "AssumeRoleWithWebIdentityResponse";
886
+ const _Au = "Audience";
887
+ const _C = "Credentials";
888
+ const _CA = "ContextAssertion";
889
+ const _DS = "DurationSeconds";
890
+ const _E = "Expiration";
891
+ const _EI = "ExternalId";
892
+ const _ETE = "ExpiredTokenException";
893
+ const _IDPCEE = "IDPCommunicationErrorException";
894
+ const _IDPRCE = "IDPRejectedClaimException";
895
+ const _IITE = "InvalidIdentityTokenException";
896
+ const _K = "Key";
897
+ const _MPDE = "MalformedPolicyDocumentException";
898
+ const _P = "Policy";
899
+ const _PA = "PolicyArns";
900
+ const _PAr = "ProviderArn";
901
+ const _PC = "ProvidedContexts";
902
+ const _PCLT = "ProvidedContextsListType";
903
+ const _PCr = "ProvidedContext";
904
+ const _PDT = "PolicyDescriptorType";
905
+ const _PI = "ProviderId";
906
+ const _PPS = "PackedPolicySize";
907
+ const _PPTLE = "PackedPolicyTooLargeException";
908
+ const _Pr = "Provider";
909
+ const _RA = "RoleArn";
910
+ const _RDE = "RegionDisabledException";
911
+ const _RSN = "RoleSessionName";
912
+ const _SAK = "SecretAccessKey";
913
+ const _SFWIT = "SubjectFromWebIdentityToken";
914
+ const _SI = "SourceIdentity";
915
+ const _SN = "SerialNumber";
916
+ const _ST = "SessionToken";
917
+ const _T = "Tags";
918
+ const _TC = "TokenCode";
919
+ const _TTK = "TransitiveTagKeys";
920
+ const _Ta = "Tag";
921
+ const _V = "Value";
922
+ const _WIT = "WebIdentityToken";
923
+ const _a = "arn";
924
+ const _aKST = "accessKeySecretType";
925
+ const _aQE = "awsQueryError";
926
+ const _c = "client";
927
+ const _cTT = "clientTokenType";
928
+ const _e = "error";
929
+ const _hE = "httpError";
930
+ const _m = "message";
931
+ const _pDLT = "policyDescriptorListType";
932
+ const _s = "smithy.ts.sdk.synthetic.com.amazonaws.sts";
933
+ const _tLT = "tagListType";
934
+ const n0 = "com.amazonaws.sts";
935
+ const schema_1 = __webpack_require__(26890);
936
+ const errors_1 = __webpack_require__(41688);
937
+ const STSServiceException_1 = __webpack_require__(17171);
938
+ const _s_registry = schema_1.TypeRegistry.for(_s);
939
+ exports.STSServiceException$ = [-3, _s, "STSServiceException", 0, [], []];
940
+ _s_registry.registerError(exports.STSServiceException$, STSServiceException_1.STSServiceException);
941
+ const n0_registry = schema_1.TypeRegistry.for(n0);
942
+ exports.ExpiredTokenException$ = [
943
+ -3,
944
+ n0,
945
+ _ETE,
946
+ { [_aQE]: [`ExpiredTokenException`, 400], [_e]: _c, [_hE]: 400 },
947
+ [_m],
948
+ [0],
949
+ ];
950
+ n0_registry.registerError(exports.ExpiredTokenException$, errors_1.ExpiredTokenException);
951
+ exports.IDPCommunicationErrorException$ = [
952
+ -3,
953
+ n0,
954
+ _IDPCEE,
955
+ { [_aQE]: [`IDPCommunicationError`, 400], [_e]: _c, [_hE]: 400 },
956
+ [_m],
957
+ [0],
958
+ ];
959
+ n0_registry.registerError(exports.IDPCommunicationErrorException$, errors_1.IDPCommunicationErrorException);
960
+ exports.IDPRejectedClaimException$ = [
961
+ -3,
962
+ n0,
963
+ _IDPRCE,
964
+ { [_aQE]: [`IDPRejectedClaim`, 403], [_e]: _c, [_hE]: 403 },
965
+ [_m],
966
+ [0],
967
+ ];
968
+ n0_registry.registerError(exports.IDPRejectedClaimException$, errors_1.IDPRejectedClaimException);
969
+ exports.InvalidIdentityTokenException$ = [
970
+ -3,
971
+ n0,
972
+ _IITE,
973
+ { [_aQE]: [`InvalidIdentityToken`, 400], [_e]: _c, [_hE]: 400 },
974
+ [_m],
975
+ [0],
976
+ ];
977
+ n0_registry.registerError(exports.InvalidIdentityTokenException$, errors_1.InvalidIdentityTokenException);
978
+ exports.MalformedPolicyDocumentException$ = [
979
+ -3,
980
+ n0,
981
+ _MPDE,
982
+ { [_aQE]: [`MalformedPolicyDocument`, 400], [_e]: _c, [_hE]: 400 },
983
+ [_m],
984
+ [0],
985
+ ];
986
+ n0_registry.registerError(exports.MalformedPolicyDocumentException$, errors_1.MalformedPolicyDocumentException);
987
+ exports.PackedPolicyTooLargeException$ = [
988
+ -3,
989
+ n0,
990
+ _PPTLE,
991
+ { [_aQE]: [`PackedPolicyTooLarge`, 400], [_e]: _c, [_hE]: 400 },
992
+ [_m],
993
+ [0],
994
+ ];
995
+ n0_registry.registerError(exports.PackedPolicyTooLargeException$, errors_1.PackedPolicyTooLargeException);
996
+ exports.RegionDisabledException$ = [
997
+ -3,
998
+ n0,
999
+ _RDE,
1000
+ { [_aQE]: [`RegionDisabledException`, 403], [_e]: _c, [_hE]: 403 },
1001
+ [_m],
1002
+ [0],
1003
+ ];
1004
+ n0_registry.registerError(exports.RegionDisabledException$, errors_1.RegionDisabledException);
1005
+ exports.errorTypeRegistries = [_s_registry, n0_registry];
1006
+ var accessKeySecretType = [0, n0, _aKST, 8, 0];
1007
+ var clientTokenType = [0, n0, _cTT, 8, 0];
1008
+ exports.AssumedRoleUser$ = [3, n0, _ARU, 0, [_ARI, _A], [0, 0], 2];
1009
+ exports.AssumeRoleRequest$ = [
1010
+ 3,
1011
+ n0,
1012
+ _ARR,
1013
+ 0,
1014
+ [_RA, _RSN, _PA, _P, _DS, _T, _TTK, _EI, _SN, _TC, _SI, _PC],
1015
+ [0, 0, () => policyDescriptorListType, 0, 1, () => tagListType, 64 | 0, 0, 0, 0, 0, () => ProvidedContextsListType],
1016
+ 2,
1017
+ ];
1018
+ exports.AssumeRoleResponse$ = [
1019
+ 3,
1020
+ n0,
1021
+ _ARRs,
1022
+ 0,
1023
+ [_C, _ARU, _PPS, _SI],
1024
+ [[() => exports.Credentials$, 0], () => exports.AssumedRoleUser$, 1, 0],
1025
+ ];
1026
+ exports.AssumeRoleWithWebIdentityRequest$ = [
1027
+ 3,
1028
+ n0,
1029
+ _ARWWIR,
1030
+ 0,
1031
+ [_RA, _RSN, _WIT, _PI, _PA, _P, _DS],
1032
+ [0, 0, [() => clientTokenType, 0], 0, () => policyDescriptorListType, 0, 1],
1033
+ 3,
1034
+ ];
1035
+ exports.AssumeRoleWithWebIdentityResponse$ = [
1036
+ 3,
1037
+ n0,
1038
+ _ARWWIRs,
1039
+ 0,
1040
+ [_C, _SFWIT, _ARU, _PPS, _Pr, _Au, _SI],
1041
+ [[() => exports.Credentials$, 0], 0, () => exports.AssumedRoleUser$, 1, 0, 0, 0],
1042
+ ];
1043
+ exports.Credentials$ = [
1044
+ 3,
1045
+ n0,
1046
+ _C,
1047
+ 0,
1048
+ [_AKI, _SAK, _ST, _E],
1049
+ [0, [() => accessKeySecretType, 0], 0, 4],
1050
+ 4,
1051
+ ];
1052
+ exports.PolicyDescriptorType$ = [3, n0, _PDT, 0, [_a], [0]];
1053
+ exports.ProvidedContext$ = [3, n0, _PCr, 0, [_PAr, _CA], [0, 0]];
1054
+ exports.Tag$ = [3, n0, _Ta, 0, [_K, _V], [0, 0], 2];
1055
+ var policyDescriptorListType = [1, n0, _pDLT, 0, () => exports.PolicyDescriptorType$];
1056
+ var ProvidedContextsListType = [1, n0, _PCLT, 0, () => exports.ProvidedContext$];
1057
+ var tagKeyListType = (/* unused pure expression or super */ null && (64 | 0));
1058
+ var tagListType = [1, n0, _tLT, 0, () => exports.Tag$];
1059
+ exports.AssumeRole$ = [9, n0, _AR, 0, () => exports.AssumeRoleRequest$, () => exports.AssumeRoleResponse$];
1060
+ exports.AssumeRoleWithWebIdentity$ = [
1061
+ 9,
1062
+ n0,
1063
+ _ARWWI,
1064
+ 0,
1065
+ () => exports.AssumeRoleWithWebIdentityRequest$,
1066
+ () => exports.AssumeRoleWithWebIdentityResponse$,
1067
+ ];
1068
+
1069
+
887
1070
  /***/ }),
888
1071
 
889
1072
  /***/ 39955:
890
1073
  /***/ ((module) => {
891
1074
 
892
- module.exports = /*#__PURE__*/JSON.parse('{"name":"@aws-sdk/nested-clients","version":"3.971.0","description":"Nested clients for AWS SDK packages.","main":"./dist-cjs/index.js","module":"./dist-es/index.js","types":"./dist-types/index.d.ts","scripts":{"build":"yarn lint && concurrently \'yarn:build:types\' \'yarn:build:es\' && yarn build:cjs","build:cjs":"node ../../scripts/compilation/inline nested-clients","build:es":"tsc -p tsconfig.es.json","build:include:deps":"yarn g:turbo run build -F=\\"$npm_package_name\\"","build:types":"tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4","clean":"rimraf ./dist-* && rimraf *.tsbuildinfo","lint":"node ../../scripts/validation/submodules-linter.js --pkg nested-clients","test":"yarn g:vitest run","test:watch":"yarn g:vitest watch"},"engines":{"node":">=20.0.0"},"sideEffects":false,"author":{"name":"AWS SDK for JavaScript Team","url":"https://aws.amazon.com/javascript/"},"license":"Apache-2.0","dependencies":{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"3.970.0","@aws-sdk/middleware-host-header":"3.969.0","@aws-sdk/middleware-logger":"3.969.0","@aws-sdk/middleware-recursion-detection":"3.969.0","@aws-sdk/middleware-user-agent":"3.970.0","@aws-sdk/region-config-resolver":"3.969.0","@aws-sdk/types":"3.969.0","@aws-sdk/util-endpoints":"3.970.0","@aws-sdk/util-user-agent-browser":"3.969.0","@aws-sdk/util-user-agent-node":"3.971.0","@smithy/config-resolver":"^4.4.6","@smithy/core":"^3.20.6","@smithy/fetch-http-handler":"^5.3.9","@smithy/hash-node":"^4.2.8","@smithy/invalid-dependency":"^4.2.8","@smithy/middleware-content-length":"^4.2.8","@smithy/middleware-endpoint":"^4.4.7","@smithy/middleware-retry":"^4.4.23","@smithy/middleware-serde":"^4.2.9","@smithy/middleware-stack":"^4.2.8","@smithy/node-config-provider":"^4.3.8","@smithy/node-http-handler":"^4.4.8","@smithy/protocol-http":"^5.3.8","@smithy/smithy-client":"^4.10.8","@smithy/types":"^4.12.0","@smithy/url-parser":"^4.2.8","@smithy/util-base64":"^4.3.0","@smithy/util-body-length-browser":"^4.2.0","@smithy/util-body-length-node":"^4.2.1","@smithy/util-defaults-mode-browser":"^4.3.22","@smithy/util-defaults-mode-node":"^4.2.25","@smithy/util-endpoints":"^3.2.8","@smithy/util-middleware":"^4.2.8","@smithy/util-retry":"^4.2.8","@smithy/util-utf8":"^4.2.0","tslib":"^2.6.2"},"devDependencies":{"concurrently":"7.0.0","downlevel-dts":"0.10.1","rimraf":"5.0.10","typescript":"~5.8.3"},"typesVersions":{"<4.0":{"dist-types/*":["dist-types/ts3.4/*"]}},"files":["./signin.d.ts","./signin.js","./sso-oidc.d.ts","./sso-oidc.js","./sts.d.ts","./sts.js","dist-*/**"],"browser":{"./dist-es/submodules/signin/runtimeConfig":"./dist-es/submodules/signin/runtimeConfig.browser","./dist-es/submodules/sso-oidc/runtimeConfig":"./dist-es/submodules/sso-oidc/runtimeConfig.browser","./dist-es/submodules/sts/runtimeConfig":"./dist-es/submodules/sts/runtimeConfig.browser"},"react-native":{},"homepage":"https://github.com/aws/aws-sdk-js-v3/tree/main/packages/nested-clients","repository":{"type":"git","url":"https://github.com/aws/aws-sdk-js-v3.git","directory":"packages/nested-clients"},"exports":{"./package.json":"./package.json","./sso-oidc":{"types":"./dist-types/submodules/sso-oidc/index.d.ts","module":"./dist-es/submodules/sso-oidc/index.js","node":"./dist-cjs/submodules/sso-oidc/index.js","import":"./dist-es/submodules/sso-oidc/index.js","require":"./dist-cjs/submodules/sso-oidc/index.js"},"./sts":{"types":"./dist-types/submodules/sts/index.d.ts","module":"./dist-es/submodules/sts/index.js","node":"./dist-cjs/submodules/sts/index.js","import":"./dist-es/submodules/sts/index.js","require":"./dist-cjs/submodules/sts/index.js"},"./signin":{"types":"./dist-types/submodules/signin/index.d.ts","module":"./dist-es/submodules/signin/index.js","node":"./dist-cjs/submodules/signin/index.js","import":"./dist-es/submodules/signin/index.js","require":"./dist-cjs/submodules/signin/index.js"}}}');
1075
+ module.exports = /*#__PURE__*/JSON.parse('{"name":"@aws-sdk/nested-clients","version":"3.996.19","description":"Nested clients for AWS SDK packages.","main":"./dist-cjs/index.js","module":"./dist-es/index.js","types":"./dist-types/index.d.ts","scripts":{"build":"yarn lint && concurrently \'yarn:build:types\' \'yarn:build:es\' && yarn build:cjs","build:cjs":"node ../../scripts/compilation/inline nested-clients","build:es":"tsc -p tsconfig.es.json","build:include:deps":"yarn g:turbo run build -F=\\"$npm_package_name\\"","build:types":"tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4","clean":"premove dist-cjs dist-es dist-types tsconfig.cjs.tsbuildinfo tsconfig.es.tsbuildinfo tsconfig.types.tsbuildinfo","lint":"node ../../scripts/validation/submodules-linter.js --pkg nested-clients","test":"yarn g:vitest run","test:watch":"yarn g:vitest watch"},"engines":{"node":">=20.0.0"},"sideEffects":false,"author":{"name":"AWS SDK for JavaScript Team","url":"https://aws.amazon.com/javascript/"},"license":"Apache-2.0","dependencies":{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"^3.973.27","@aws-sdk/middleware-host-header":"^3.972.9","@aws-sdk/middleware-logger":"^3.972.9","@aws-sdk/middleware-recursion-detection":"^3.972.10","@aws-sdk/middleware-user-agent":"^3.972.29","@aws-sdk/region-config-resolver":"^3.972.11","@aws-sdk/types":"^3.973.7","@aws-sdk/util-endpoints":"^3.996.6","@aws-sdk/util-user-agent-browser":"^3.972.9","@aws-sdk/util-user-agent-node":"^3.973.15","@smithy/config-resolver":"^4.4.14","@smithy/core":"^3.23.14","@smithy/fetch-http-handler":"^5.3.16","@smithy/hash-node":"^4.2.13","@smithy/invalid-dependency":"^4.2.13","@smithy/middleware-content-length":"^4.2.13","@smithy/middleware-endpoint":"^4.4.29","@smithy/middleware-retry":"^4.5.0","@smithy/middleware-serde":"^4.2.17","@smithy/middleware-stack":"^4.2.13","@smithy/node-config-provider":"^4.3.13","@smithy/node-http-handler":"^4.5.2","@smithy/protocol-http":"^5.3.13","@smithy/smithy-client":"^4.12.9","@smithy/types":"^4.14.0","@smithy/url-parser":"^4.2.13","@smithy/util-base64":"^4.3.2","@smithy/util-body-length-browser":"^4.2.2","@smithy/util-body-length-node":"^4.2.3","@smithy/util-defaults-mode-browser":"^4.3.45","@smithy/util-defaults-mode-node":"^4.2.49","@smithy/util-endpoints":"^3.3.4","@smithy/util-middleware":"^4.2.13","@smithy/util-retry":"^4.3.0","@smithy/util-utf8":"^4.2.2","tslib":"^2.6.2"},"devDependencies":{"concurrently":"7.0.0","downlevel-dts":"0.10.1","premove":"4.0.0","typescript":"~5.8.3"},"typesVersions":{"<4.5":{"dist-types/*":["dist-types/ts3.4/*"]}},"files":["./cognito-identity.d.ts","./cognito-identity.js","./signin.d.ts","./signin.js","./sso-oidc.d.ts","./sso-oidc.js","./sso.d.ts","./sso.js","./sts.d.ts","./sts.js","dist-*/**"],"browser":{"./dist-es/submodules/cognito-identity/runtimeConfig":"./dist-es/submodules/cognito-identity/runtimeConfig.browser","./dist-es/submodules/signin/runtimeConfig":"./dist-es/submodules/signin/runtimeConfig.browser","./dist-es/submodules/sso-oidc/runtimeConfig":"./dist-es/submodules/sso-oidc/runtimeConfig.browser","./dist-es/submodules/sso/runtimeConfig":"./dist-es/submodules/sso/runtimeConfig.browser","./dist-es/submodules/sts/runtimeConfig":"./dist-es/submodules/sts/runtimeConfig.browser"},"react-native":{},"homepage":"https://github.com/aws/aws-sdk-js-v3/tree/main/packages/nested-clients","repository":{"type":"git","url":"https://github.com/aws/aws-sdk-js-v3.git","directory":"packages/nested-clients"},"exports":{"./package.json":"./package.json","./sso-oidc":{"types":"./dist-types/submodules/sso-oidc/index.d.ts","module":"./dist-es/submodules/sso-oidc/index.js","node":"./dist-cjs/submodules/sso-oidc/index.js","import":"./dist-es/submodules/sso-oidc/index.js","require":"./dist-cjs/submodules/sso-oidc/index.js"},"./sts":{"types":"./dist-types/submodules/sts/index.d.ts","module":"./dist-es/submodules/sts/index.js","node":"./dist-cjs/submodules/sts/index.js","import":"./dist-es/submodules/sts/index.js","require":"./dist-cjs/submodules/sts/index.js"},"./signin":{"types":"./dist-types/submodules/signin/index.d.ts","module":"./dist-es/submodules/signin/index.js","node":"./dist-cjs/submodules/signin/index.js","import":"./dist-es/submodules/signin/index.js","require":"./dist-cjs/submodules/signin/index.js"},"./cognito-identity":{"types":"./dist-types/submodules/cognito-identity/index.d.ts","module":"./dist-es/submodules/cognito-identity/index.js","node":"./dist-cjs/submodules/cognito-identity/index.js","import":"./dist-es/submodules/cognito-identity/index.js","require":"./dist-cjs/submodules/cognito-identity/index.js"},"./sso":{"types":"./dist-types/submodules/sso/index.d.ts","module":"./dist-es/submodules/sso/index.js","node":"./dist-cjs/submodules/sso/index.js","import":"./dist-es/submodules/sso/index.js","require":"./dist-cjs/submodules/sso/index.js"}}}');
893
1076
 
894
1077
  /***/ })
895
1078