@rharkor/caching-for-turbo 2.3.5 → 2.3.7
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +2 -0
- package/dist/cli/136.index.js +100 -108
- package/dist/cli/136.index.js.map +1 -1
- package/dist/cli/443.index.js +97 -155
- package/dist/cli/443.index.js.map +1 -1
- package/dist/cli/762.index.js +71 -162
- package/dist/cli/762.index.js.map +1 -1
- package/dist/cli/869.index.js +22 -24
- package/dist/cli/869.index.js.map +1 -1
- package/dist/cli/956.index.js +100 -108
- package/dist/cli/956.index.js.map +1 -1
- package/dist/cli/998.index.js +164 -246
- package/dist/cli/998.index.js.map +1 -1
- package/dist/cli/index.js +7282 -9710
- package/dist/cli/licenses.txt +201 -0
- package/package.json +2 -2
package/dist/cli/956.index.js
CHANGED
|
@@ -396,14 +396,14 @@ var schema = __webpack_require__(26890);
|
|
|
396
396
|
var client = __webpack_require__(5152);
|
|
397
397
|
var regionConfigResolver = __webpack_require__(36463);
|
|
398
398
|
|
|
399
|
-
|
|
399
|
+
class STSServiceException extends smithyClient.ServiceException {
|
|
400
400
|
constructor(options) {
|
|
401
401
|
super(options);
|
|
402
402
|
Object.setPrototypeOf(this, STSServiceException.prototype);
|
|
403
403
|
}
|
|
404
|
-
}
|
|
404
|
+
}
|
|
405
405
|
|
|
406
|
-
|
|
406
|
+
class ExpiredTokenException extends STSServiceException {
|
|
407
407
|
name = "ExpiredTokenException";
|
|
408
408
|
$fault = "client";
|
|
409
409
|
constructor(opts) {
|
|
@@ -414,8 +414,8 @@ let ExpiredTokenException$1 = class ExpiredTokenException extends STSServiceExce
|
|
|
414
414
|
});
|
|
415
415
|
Object.setPrototypeOf(this, ExpiredTokenException.prototype);
|
|
416
416
|
}
|
|
417
|
-
}
|
|
418
|
-
|
|
417
|
+
}
|
|
418
|
+
class MalformedPolicyDocumentException extends STSServiceException {
|
|
419
419
|
name = "MalformedPolicyDocumentException";
|
|
420
420
|
$fault = "client";
|
|
421
421
|
constructor(opts) {
|
|
@@ -426,8 +426,8 @@ let MalformedPolicyDocumentException$1 = class MalformedPolicyDocumentException
|
|
|
426
426
|
});
|
|
427
427
|
Object.setPrototypeOf(this, MalformedPolicyDocumentException.prototype);
|
|
428
428
|
}
|
|
429
|
-
}
|
|
430
|
-
|
|
429
|
+
}
|
|
430
|
+
class PackedPolicyTooLargeException extends STSServiceException {
|
|
431
431
|
name = "PackedPolicyTooLargeException";
|
|
432
432
|
$fault = "client";
|
|
433
433
|
constructor(opts) {
|
|
@@ -438,8 +438,8 @@ let PackedPolicyTooLargeException$1 = class PackedPolicyTooLargeException extend
|
|
|
438
438
|
});
|
|
439
439
|
Object.setPrototypeOf(this, PackedPolicyTooLargeException.prototype);
|
|
440
440
|
}
|
|
441
|
-
}
|
|
442
|
-
|
|
441
|
+
}
|
|
442
|
+
class RegionDisabledException extends STSServiceException {
|
|
443
443
|
name = "RegionDisabledException";
|
|
444
444
|
$fault = "client";
|
|
445
445
|
constructor(opts) {
|
|
@@ -450,8 +450,8 @@ let RegionDisabledException$1 = class RegionDisabledException extends STSService
|
|
|
450
450
|
});
|
|
451
451
|
Object.setPrototypeOf(this, RegionDisabledException.prototype);
|
|
452
452
|
}
|
|
453
|
-
}
|
|
454
|
-
|
|
453
|
+
}
|
|
454
|
+
class IDPRejectedClaimException extends STSServiceException {
|
|
455
455
|
name = "IDPRejectedClaimException";
|
|
456
456
|
$fault = "client";
|
|
457
457
|
constructor(opts) {
|
|
@@ -462,8 +462,8 @@ let IDPRejectedClaimException$1 = class IDPRejectedClaimException extends STSSer
|
|
|
462
462
|
});
|
|
463
463
|
Object.setPrototypeOf(this, IDPRejectedClaimException.prototype);
|
|
464
464
|
}
|
|
465
|
-
}
|
|
466
|
-
|
|
465
|
+
}
|
|
466
|
+
class InvalidIdentityTokenException extends STSServiceException {
|
|
467
467
|
name = "InvalidIdentityTokenException";
|
|
468
468
|
$fault = "client";
|
|
469
469
|
constructor(opts) {
|
|
@@ -474,8 +474,8 @@ let InvalidIdentityTokenException$1 = class InvalidIdentityTokenException extend
|
|
|
474
474
|
});
|
|
475
475
|
Object.setPrototypeOf(this, InvalidIdentityTokenException.prototype);
|
|
476
476
|
}
|
|
477
|
-
}
|
|
478
|
-
|
|
477
|
+
}
|
|
478
|
+
class IDPCommunicationErrorException extends STSServiceException {
|
|
479
479
|
name = "IDPCommunicationErrorException";
|
|
480
480
|
$fault = "client";
|
|
481
481
|
constructor(opts) {
|
|
@@ -486,7 +486,7 @@ let IDPCommunicationErrorException$1 = class IDPCommunicationErrorException exte
|
|
|
486
486
|
});
|
|
487
487
|
Object.setPrototypeOf(this, IDPCommunicationErrorException.prototype);
|
|
488
488
|
}
|
|
489
|
-
}
|
|
489
|
+
}
|
|
490
490
|
|
|
491
491
|
const _A = "Arn";
|
|
492
492
|
const _AKI = "AccessKeyId";
|
|
@@ -549,8 +549,8 @@ const _tLT = "tagListType";
|
|
|
549
549
|
const n0 = "com.amazonaws.sts";
|
|
550
550
|
var accessKeySecretType = [0, n0, _aKST, 8, 0];
|
|
551
551
|
var clientTokenType = [0, n0, _cTT, 8, 0];
|
|
552
|
-
var AssumedRoleUser = [3, n0, _ARU, 0, [_ARI, _A], [0, 0]];
|
|
553
|
-
var AssumeRoleRequest = [
|
|
552
|
+
var AssumedRoleUser$ = [3, n0, _ARU, 0, [_ARI, _A], [0, 0]];
|
|
553
|
+
var AssumeRoleRequest$ = [
|
|
554
554
|
3,
|
|
555
555
|
n0,
|
|
556
556
|
_ARR,
|
|
@@ -558,15 +558,15 @@ var AssumeRoleRequest = [
|
|
|
558
558
|
[_RA, _RSN, _PA, _P, _DS, _T, _TTK, _EI, _SN, _TC, _SI, _PC],
|
|
559
559
|
[0, 0, () => policyDescriptorListType, 0, 1, () => tagListType, 64 | 0, 0, 0, 0, 0, () => ProvidedContextsListType],
|
|
560
560
|
];
|
|
561
|
-
var AssumeRoleResponse = [
|
|
561
|
+
var AssumeRoleResponse$ = [
|
|
562
562
|
3,
|
|
563
563
|
n0,
|
|
564
564
|
_ARRs,
|
|
565
565
|
0,
|
|
566
566
|
[_C, _ARU, _PPS, _SI],
|
|
567
|
-
[[() => Credentials
|
|
567
|
+
[[() => Credentials$, 0], () => AssumedRoleUser$, 1, 0],
|
|
568
568
|
];
|
|
569
|
-
var AssumeRoleWithWebIdentityRequest = [
|
|
569
|
+
var AssumeRoleWithWebIdentityRequest$ = [
|
|
570
570
|
3,
|
|
571
571
|
n0,
|
|
572
572
|
_ARWWIR,
|
|
@@ -574,15 +574,15 @@ var AssumeRoleWithWebIdentityRequest = [
|
|
|
574
574
|
[_RA, _RSN, _WIT, _PI, _PA, _P, _DS],
|
|
575
575
|
[0, 0, [() => clientTokenType, 0], 0, () => policyDescriptorListType, 0, 1],
|
|
576
576
|
];
|
|
577
|
-
var AssumeRoleWithWebIdentityResponse = [
|
|
577
|
+
var AssumeRoleWithWebIdentityResponse$ = [
|
|
578
578
|
3,
|
|
579
579
|
n0,
|
|
580
580
|
_ARWWIRs,
|
|
581
581
|
0,
|
|
582
582
|
[_C, _SFWIT, _ARU, _PPS, _Pr, _Au, _SI],
|
|
583
|
-
[[() => Credentials
|
|
583
|
+
[[() => Credentials$, 0], 0, () => AssumedRoleUser$, 1, 0, 0, 0],
|
|
584
584
|
];
|
|
585
|
-
var Credentials = [
|
|
585
|
+
var Credentials$ = [
|
|
586
586
|
3,
|
|
587
587
|
n0,
|
|
588
588
|
_C,
|
|
@@ -590,113 +590,85 @@ var Credentials = [
|
|
|
590
590
|
[_AKI, _SAK, _ST, _E],
|
|
591
591
|
[0, [() => accessKeySecretType, 0], 0, 4],
|
|
592
592
|
];
|
|
593
|
-
var ExpiredTokenException = [
|
|
593
|
+
var ExpiredTokenException$ = [
|
|
594
594
|
-3,
|
|
595
595
|
n0,
|
|
596
596
|
_ETE,
|
|
597
|
-
{
|
|
598
|
-
[_e]: _c,
|
|
599
|
-
[_hE]: 400,
|
|
600
|
-
[_aQE]: [`ExpiredTokenException`, 400],
|
|
601
|
-
},
|
|
597
|
+
{ [_aQE]: [`ExpiredTokenException`, 400], [_e]: _c, [_hE]: 400 },
|
|
602
598
|
[_m],
|
|
603
599
|
[0],
|
|
604
600
|
];
|
|
605
|
-
schema.TypeRegistry.for(n0).registerError(ExpiredTokenException
|
|
606
|
-
var IDPCommunicationErrorException = [
|
|
601
|
+
schema.TypeRegistry.for(n0).registerError(ExpiredTokenException$, ExpiredTokenException);
|
|
602
|
+
var IDPCommunicationErrorException$ = [
|
|
607
603
|
-3,
|
|
608
604
|
n0,
|
|
609
605
|
_IDPCEE,
|
|
610
|
-
{
|
|
611
|
-
[_e]: _c,
|
|
612
|
-
[_hE]: 400,
|
|
613
|
-
[_aQE]: [`IDPCommunicationError`, 400],
|
|
614
|
-
},
|
|
606
|
+
{ [_aQE]: [`IDPCommunicationError`, 400], [_e]: _c, [_hE]: 400 },
|
|
615
607
|
[_m],
|
|
616
608
|
[0],
|
|
617
609
|
];
|
|
618
|
-
schema.TypeRegistry.for(n0).registerError(IDPCommunicationErrorException
|
|
619
|
-
var IDPRejectedClaimException = [
|
|
610
|
+
schema.TypeRegistry.for(n0).registerError(IDPCommunicationErrorException$, IDPCommunicationErrorException);
|
|
611
|
+
var IDPRejectedClaimException$ = [
|
|
620
612
|
-3,
|
|
621
613
|
n0,
|
|
622
614
|
_IDPRCE,
|
|
623
|
-
{
|
|
624
|
-
[_e]: _c,
|
|
625
|
-
[_hE]: 403,
|
|
626
|
-
[_aQE]: [`IDPRejectedClaim`, 403],
|
|
627
|
-
},
|
|
615
|
+
{ [_aQE]: [`IDPRejectedClaim`, 403], [_e]: _c, [_hE]: 403 },
|
|
628
616
|
[_m],
|
|
629
617
|
[0],
|
|
630
618
|
];
|
|
631
|
-
schema.TypeRegistry.for(n0).registerError(IDPRejectedClaimException
|
|
632
|
-
var InvalidIdentityTokenException = [
|
|
619
|
+
schema.TypeRegistry.for(n0).registerError(IDPRejectedClaimException$, IDPRejectedClaimException);
|
|
620
|
+
var InvalidIdentityTokenException$ = [
|
|
633
621
|
-3,
|
|
634
622
|
n0,
|
|
635
623
|
_IITE,
|
|
636
|
-
{
|
|
637
|
-
[_e]: _c,
|
|
638
|
-
[_hE]: 400,
|
|
639
|
-
[_aQE]: [`InvalidIdentityToken`, 400],
|
|
640
|
-
},
|
|
624
|
+
{ [_aQE]: [`InvalidIdentityToken`, 400], [_e]: _c, [_hE]: 400 },
|
|
641
625
|
[_m],
|
|
642
626
|
[0],
|
|
643
627
|
];
|
|
644
|
-
schema.TypeRegistry.for(n0).registerError(InvalidIdentityTokenException
|
|
645
|
-
var MalformedPolicyDocumentException = [
|
|
628
|
+
schema.TypeRegistry.for(n0).registerError(InvalidIdentityTokenException$, InvalidIdentityTokenException);
|
|
629
|
+
var MalformedPolicyDocumentException$ = [
|
|
646
630
|
-3,
|
|
647
631
|
n0,
|
|
648
632
|
_MPDE,
|
|
649
|
-
{
|
|
650
|
-
[_e]: _c,
|
|
651
|
-
[_hE]: 400,
|
|
652
|
-
[_aQE]: [`MalformedPolicyDocument`, 400],
|
|
653
|
-
},
|
|
633
|
+
{ [_aQE]: [`MalformedPolicyDocument`, 400], [_e]: _c, [_hE]: 400 },
|
|
654
634
|
[_m],
|
|
655
635
|
[0],
|
|
656
636
|
];
|
|
657
|
-
schema.TypeRegistry.for(n0).registerError(MalformedPolicyDocumentException
|
|
658
|
-
var PackedPolicyTooLargeException = [
|
|
637
|
+
schema.TypeRegistry.for(n0).registerError(MalformedPolicyDocumentException$, MalformedPolicyDocumentException);
|
|
638
|
+
var PackedPolicyTooLargeException$ = [
|
|
659
639
|
-3,
|
|
660
640
|
n0,
|
|
661
641
|
_PPTLE,
|
|
662
|
-
{
|
|
663
|
-
[_e]: _c,
|
|
664
|
-
[_hE]: 400,
|
|
665
|
-
[_aQE]: [`PackedPolicyTooLarge`, 400],
|
|
666
|
-
},
|
|
642
|
+
{ [_aQE]: [`PackedPolicyTooLarge`, 400], [_e]: _c, [_hE]: 400 },
|
|
667
643
|
[_m],
|
|
668
644
|
[0],
|
|
669
645
|
];
|
|
670
|
-
schema.TypeRegistry.for(n0).registerError(PackedPolicyTooLargeException
|
|
671
|
-
var PolicyDescriptorType = [3, n0, _PDT, 0, [_a], [0]];
|
|
672
|
-
var ProvidedContext = [3, n0, _PCr, 0, [_PAr, _CA], [0, 0]];
|
|
673
|
-
var RegionDisabledException = [
|
|
646
|
+
schema.TypeRegistry.for(n0).registerError(PackedPolicyTooLargeException$, PackedPolicyTooLargeException);
|
|
647
|
+
var PolicyDescriptorType$ = [3, n0, _PDT, 0, [_a], [0]];
|
|
648
|
+
var ProvidedContext$ = [3, n0, _PCr, 0, [_PAr, _CA], [0, 0]];
|
|
649
|
+
var RegionDisabledException$ = [
|
|
674
650
|
-3,
|
|
675
651
|
n0,
|
|
676
652
|
_RDE,
|
|
677
|
-
{
|
|
678
|
-
[_e]: _c,
|
|
679
|
-
[_hE]: 403,
|
|
680
|
-
[_aQE]: [`RegionDisabledException`, 403],
|
|
681
|
-
},
|
|
653
|
+
{ [_aQE]: [`RegionDisabledException`, 403], [_e]: _c, [_hE]: 403 },
|
|
682
654
|
[_m],
|
|
683
655
|
[0],
|
|
684
656
|
];
|
|
685
|
-
schema.TypeRegistry.for(n0).registerError(RegionDisabledException
|
|
686
|
-
var Tag = [3, n0, _Ta, 0, [_K, _V], [0, 0]];
|
|
687
|
-
var STSServiceException = [-3, _s, "STSServiceException", 0, [], []];
|
|
688
|
-
schema.TypeRegistry.for(_s).registerError(STSServiceException
|
|
689
|
-
var policyDescriptorListType = [1, n0, _pDLT, 0, () => PolicyDescriptorType];
|
|
690
|
-
var ProvidedContextsListType = [1, n0, _PCLT, 0, () => ProvidedContext];
|
|
691
|
-
var tagListType = [1, n0, _tLT, 0, () => Tag];
|
|
692
|
-
var AssumeRole = [9, n0, _AR, 0, () => AssumeRoleRequest
|
|
693
|
-
var AssumeRoleWithWebIdentity = [
|
|
657
|
+
schema.TypeRegistry.for(n0).registerError(RegionDisabledException$, RegionDisabledException);
|
|
658
|
+
var Tag$ = [3, n0, _Ta, 0, [_K, _V], [0, 0]];
|
|
659
|
+
var STSServiceException$ = [-3, _s, "STSServiceException", 0, [], []];
|
|
660
|
+
schema.TypeRegistry.for(_s).registerError(STSServiceException$, STSServiceException);
|
|
661
|
+
var policyDescriptorListType = [1, n0, _pDLT, 0, () => PolicyDescriptorType$];
|
|
662
|
+
var ProvidedContextsListType = [1, n0, _PCLT, 0, () => ProvidedContext$];
|
|
663
|
+
var tagListType = [1, n0, _tLT, 0, () => Tag$];
|
|
664
|
+
var AssumeRole$ = [9, n0, _AR, 0, () => AssumeRoleRequest$, () => AssumeRoleResponse$];
|
|
665
|
+
var AssumeRoleWithWebIdentity$ = [
|
|
694
666
|
9,
|
|
695
667
|
n0,
|
|
696
668
|
_ARWWI,
|
|
697
669
|
0,
|
|
698
|
-
() => AssumeRoleWithWebIdentityRequest
|
|
699
|
-
() => AssumeRoleWithWebIdentityResponse
|
|
670
|
+
() => AssumeRoleWithWebIdentityRequest$,
|
|
671
|
+
() => AssumeRoleWithWebIdentityResponse$,
|
|
700
672
|
];
|
|
701
673
|
|
|
702
674
|
class AssumeRoleCommand extends smithyClient.Command
|
|
@@ -707,7 +679,7 @@ class AssumeRoleCommand extends smithyClient.Command
|
|
|
707
679
|
})
|
|
708
680
|
.s("AWSSecurityTokenServiceV20110615", "AssumeRole", {})
|
|
709
681
|
.n("STSClient", "AssumeRoleCommand")
|
|
710
|
-
.sc(AssumeRole)
|
|
682
|
+
.sc(AssumeRole$)
|
|
711
683
|
.build() {
|
|
712
684
|
}
|
|
713
685
|
|
|
@@ -719,7 +691,7 @@ class AssumeRoleWithWebIdentityCommand extends smithyClient.Command
|
|
|
719
691
|
})
|
|
720
692
|
.s("AWSSecurityTokenServiceV20110615", "AssumeRoleWithWebIdentity", {})
|
|
721
693
|
.n("STSClient", "AssumeRoleWithWebIdentityCommand")
|
|
722
|
-
.sc(AssumeRoleWithWebIdentity)
|
|
694
|
+
.sc(AssumeRoleWithWebIdentity$)
|
|
723
695
|
.build() {
|
|
724
696
|
}
|
|
725
697
|
|
|
@@ -743,9 +715,10 @@ const getAccountIdFromAssumedRoleUser = (assumedRoleUser) => {
|
|
|
743
715
|
const resolveRegion = async (_region, _parentRegion, credentialProviderLogger, loaderConfig = {}) => {
|
|
744
716
|
const region = typeof _region === "function" ? await _region() : _region;
|
|
745
717
|
const parentRegion = typeof _parentRegion === "function" ? await _parentRegion() : _parentRegion;
|
|
746
|
-
|
|
718
|
+
let stsDefaultRegion = "";
|
|
719
|
+
const resolvedRegion = region ?? parentRegion ?? (stsDefaultRegion = await regionConfigResolver.stsRegionDefaultResolver(loaderConfig)());
|
|
747
720
|
credentialProviderLogger?.debug?.("@aws-sdk/client-sts::resolveRegion", "accepting first of:", `${region} (credential provider clientConfig)`, `${parentRegion} (contextual client)`, `${stsDefaultRegion} (STS default: AWS_REGION, profile region, or us-east-1)`);
|
|
748
|
-
return
|
|
721
|
+
return resolvedRegion;
|
|
749
722
|
};
|
|
750
723
|
const getDefaultRoleAssumer$1 = (stsOptions, STSClient) => {
|
|
751
724
|
let stsClient;
|
|
@@ -854,17 +827,36 @@ Object.defineProperty(exports, "$Command", ({
|
|
|
854
827
|
enumerable: true,
|
|
855
828
|
get: function () { return smithyClient.Command; }
|
|
856
829
|
}));
|
|
830
|
+
exports.AssumeRole$ = AssumeRole$;
|
|
857
831
|
exports.AssumeRoleCommand = AssumeRoleCommand;
|
|
832
|
+
exports.AssumeRoleRequest$ = AssumeRoleRequest$;
|
|
833
|
+
exports.AssumeRoleResponse$ = AssumeRoleResponse$;
|
|
834
|
+
exports.AssumeRoleWithWebIdentity$ = AssumeRoleWithWebIdentity$;
|
|
858
835
|
exports.AssumeRoleWithWebIdentityCommand = AssumeRoleWithWebIdentityCommand;
|
|
859
|
-
exports.
|
|
860
|
-
exports.
|
|
861
|
-
exports.
|
|
862
|
-
exports.
|
|
863
|
-
exports.
|
|
864
|
-
exports.
|
|
865
|
-
exports.
|
|
836
|
+
exports.AssumeRoleWithWebIdentityRequest$ = AssumeRoleWithWebIdentityRequest$;
|
|
837
|
+
exports.AssumeRoleWithWebIdentityResponse$ = AssumeRoleWithWebIdentityResponse$;
|
|
838
|
+
exports.AssumedRoleUser$ = AssumedRoleUser$;
|
|
839
|
+
exports.Credentials$ = Credentials$;
|
|
840
|
+
exports.ExpiredTokenException = ExpiredTokenException;
|
|
841
|
+
exports.ExpiredTokenException$ = ExpiredTokenException$;
|
|
842
|
+
exports.IDPCommunicationErrorException = IDPCommunicationErrorException;
|
|
843
|
+
exports.IDPCommunicationErrorException$ = IDPCommunicationErrorException$;
|
|
844
|
+
exports.IDPRejectedClaimException = IDPRejectedClaimException;
|
|
845
|
+
exports.IDPRejectedClaimException$ = IDPRejectedClaimException$;
|
|
846
|
+
exports.InvalidIdentityTokenException = InvalidIdentityTokenException;
|
|
847
|
+
exports.InvalidIdentityTokenException$ = InvalidIdentityTokenException$;
|
|
848
|
+
exports.MalformedPolicyDocumentException = MalformedPolicyDocumentException;
|
|
849
|
+
exports.MalformedPolicyDocumentException$ = MalformedPolicyDocumentException$;
|
|
850
|
+
exports.PackedPolicyTooLargeException = PackedPolicyTooLargeException;
|
|
851
|
+
exports.PackedPolicyTooLargeException$ = PackedPolicyTooLargeException$;
|
|
852
|
+
exports.PolicyDescriptorType$ = PolicyDescriptorType$;
|
|
853
|
+
exports.ProvidedContext$ = ProvidedContext$;
|
|
854
|
+
exports.RegionDisabledException = RegionDisabledException;
|
|
855
|
+
exports.RegionDisabledException$ = RegionDisabledException$;
|
|
866
856
|
exports.STS = STS;
|
|
867
|
-
exports.STSServiceException = STSServiceException
|
|
857
|
+
exports.STSServiceException = STSServiceException;
|
|
858
|
+
exports.STSServiceException$ = STSServiceException$;
|
|
859
|
+
exports.Tag$ = Tag$;
|
|
868
860
|
exports.decorateDefaultCredentialProvider = decorateDefaultCredentialProvider;
|
|
869
861
|
exports.getDefaultRoleAssumer = getDefaultRoleAssumer;
|
|
870
862
|
exports.getDefaultRoleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity;
|
|
@@ -894,14 +886,13 @@ const hash_node_1 = __webpack_require__(5092);
|
|
|
894
886
|
const middleware_retry_1 = __webpack_require__(19618);
|
|
895
887
|
const node_config_provider_1 = __webpack_require__(55704);
|
|
896
888
|
const node_http_handler_1 = __webpack_require__(61279);
|
|
889
|
+
const smithy_client_1 = __webpack_require__(61411);
|
|
897
890
|
const util_body_length_node_1 = __webpack_require__(13638);
|
|
891
|
+
const util_defaults_mode_node_1 = __webpack_require__(15435);
|
|
898
892
|
const util_retry_1 = __webpack_require__(15518);
|
|
899
893
|
const runtimeConfig_shared_1 = __webpack_require__(24443);
|
|
900
|
-
const smithy_client_1 = __webpack_require__(61411);
|
|
901
|
-
const util_defaults_mode_node_1 = __webpack_require__(15435);
|
|
902
|
-
const smithy_client_2 = __webpack_require__(61411);
|
|
903
894
|
const getRuntimeConfig = (config) => {
|
|
904
|
-
(0,
|
|
895
|
+
(0, smithy_client_1.emitWarningIfUnsupportedVersion)(process.version);
|
|
905
896
|
const defaultsMode = (0, util_defaults_mode_node_1.resolveDefaultsModeConfig)(config);
|
|
906
897
|
const defaultConfigProvider = () => defaultsMode().then(smithy_client_1.loadConfigsForDefaultMode);
|
|
907
898
|
const clientSharedValues = (0, runtimeConfig_shared_1.getRuntimeConfig)(config);
|
|
@@ -990,12 +981,13 @@ const getRuntimeConfig = (config) => {
|
|
|
990
981
|
},
|
|
991
982
|
],
|
|
992
983
|
logger: config?.logger ?? new smithy_client_1.NoOpLogger(),
|
|
993
|
-
protocol: config?.protocol ??
|
|
994
|
-
|
|
995
|
-
|
|
996
|
-
|
|
997
|
-
|
|
998
|
-
|
|
984
|
+
protocol: config?.protocol ?? protocols_1.AwsQueryProtocol,
|
|
985
|
+
protocolSettings: config?.protocolSettings ?? {
|
|
986
|
+
defaultNamespace: "com.amazonaws.sts",
|
|
987
|
+
xmlNamespace: "https://sts.amazonaws.com/doc/2011-06-15/",
|
|
988
|
+
version: "2011-06-15",
|
|
989
|
+
serviceTarget: "AWSSecurityTokenServiceV20110615",
|
|
990
|
+
},
|
|
999
991
|
serviceId: config?.serviceId ?? "STS",
|
|
1000
992
|
urlParser: config?.urlParser ?? url_parser_1.parseUrl,
|
|
1001
993
|
utf8Decoder: config?.utf8Decoder ?? util_utf8_1.fromUtf8,
|
|
@@ -1030,7 +1022,7 @@ exports.resolveRuntimeExtensions = resolveRuntimeExtensions;
|
|
|
1030
1022
|
/***/ 39955:
|
|
1031
1023
|
/***/ ((module) => {
|
|
1032
1024
|
|
|
1033
|
-
module.exports = /*#__PURE__*/JSON.parse('{"name":"@aws-sdk/nested-clients","version":"3.
|
|
1025
|
+
module.exports = /*#__PURE__*/JSON.parse('{"name":"@aws-sdk/nested-clients","version":"3.968.0","description":"Nested clients for AWS SDK packages.","main":"./dist-cjs/index.js","module":"./dist-es/index.js","types":"./dist-types/index.d.ts","scripts":{"build":"yarn lint && concurrently \'yarn:build:types\' \'yarn:build:es\' && yarn build:cjs","build:cjs":"node ../../scripts/compilation/inline nested-clients","build:es":"tsc -p tsconfig.es.json","build:include:deps":"yarn g:turbo run build -F=\\"$npm_package_name\\"","build:types":"tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4","clean":"rimraf ./dist-* && rimraf *.tsbuildinfo","lint":"node ../../scripts/validation/submodules-linter.js --pkg nested-clients","test":"yarn g:vitest run","test:watch":"yarn g:vitest watch"},"engines":{"node":">=20.0.0"},"sideEffects":false,"author":{"name":"AWS SDK for JavaScript Team","url":"https://aws.amazon.com/javascript/"},"license":"Apache-2.0","dependencies":{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"3.968.0","@aws-sdk/middleware-host-header":"3.968.0","@aws-sdk/middleware-logger":"3.968.0","@aws-sdk/middleware-recursion-detection":"3.968.0","@aws-sdk/middleware-user-agent":"3.968.0","@aws-sdk/region-config-resolver":"3.968.0","@aws-sdk/types":"3.968.0","@aws-sdk/util-endpoints":"3.968.0","@aws-sdk/util-user-agent-browser":"3.968.0","@aws-sdk/util-user-agent-node":"3.968.0","@smithy/config-resolver":"^4.4.5","@smithy/core":"^3.20.3","@smithy/fetch-http-handler":"^5.3.8","@smithy/hash-node":"^4.2.7","@smithy/invalid-dependency":"^4.2.7","@smithy/middleware-content-length":"^4.2.7","@smithy/middleware-endpoint":"^4.4.4","@smithy/middleware-retry":"^4.4.20","@smithy/middleware-serde":"^4.2.8","@smithy/middleware-stack":"^4.2.7","@smithy/node-config-provider":"^4.3.7","@smithy/node-http-handler":"^4.4.7","@smithy/protocol-http":"^5.3.7","@smithy/smithy-client":"^4.10.5","@smithy/types":"^4.11.0","@smithy/url-parser":"^4.2.7","@smithy/util-base64":"^4.3.0","@smithy/util-body-length-browser":"^4.2.0","@smithy/util-body-length-node":"^4.2.1","@smithy/util-defaults-mode-browser":"^4.3.19","@smithy/util-defaults-mode-node":"^4.2.22","@smithy/util-endpoints":"^3.2.7","@smithy/util-middleware":"^4.2.7","@smithy/util-retry":"^4.2.7","@smithy/util-utf8":"^4.2.0","tslib":"^2.6.2"},"devDependencies":{"concurrently":"7.0.0","downlevel-dts":"0.10.1","rimraf":"5.0.10","typescript":"~5.8.3"},"typesVersions":{"<4.0":{"dist-types/*":["dist-types/ts3.4/*"]}},"files":["./signin.d.ts","./signin.js","./sso-oidc.d.ts","./sso-oidc.js","./sts.d.ts","./sts.js","dist-*/**"],"browser":{"./dist-es/submodules/signin/runtimeConfig":"./dist-es/submodules/signin/runtimeConfig.browser","./dist-es/submodules/sso-oidc/runtimeConfig":"./dist-es/submodules/sso-oidc/runtimeConfig.browser","./dist-es/submodules/sts/runtimeConfig":"./dist-es/submodules/sts/runtimeConfig.browser"},"react-native":{},"homepage":"https://github.com/aws/aws-sdk-js-v3/tree/main/packages/nested-clients","repository":{"type":"git","url":"https://github.com/aws/aws-sdk-js-v3.git","directory":"packages/nested-clients"},"exports":{"./package.json":"./package.json","./sso-oidc":{"types":"./dist-types/submodules/sso-oidc/index.d.ts","module":"./dist-es/submodules/sso-oidc/index.js","node":"./dist-cjs/submodules/sso-oidc/index.js","import":"./dist-es/submodules/sso-oidc/index.js","require":"./dist-cjs/submodules/sso-oidc/index.js"},"./sts":{"types":"./dist-types/submodules/sts/index.d.ts","module":"./dist-es/submodules/sts/index.js","node":"./dist-cjs/submodules/sts/index.js","import":"./dist-es/submodules/sts/index.js","require":"./dist-cjs/submodules/sts/index.js"},"./signin":{"types":"./dist-types/submodules/signin/index.d.ts","module":"./dist-es/submodules/signin/index.js","node":"./dist-cjs/submodules/signin/index.js","import":"./dist-es/submodules/signin/index.js","require":"./dist-cjs/submodules/signin/index.js"}}}');
|
|
1034
1026
|
|
|
1035
1027
|
/***/ })
|
|
1036
1028
|
|