cdk-comprehend-s3olap 2.0.78 → 2.0.81
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/lib/cdk-comprehend-s3olap.js +2 -2
- package/lib/comprehend-lambdas.js +2 -2
- package/lib/iam-roles.js +4 -4
- package/node_modules/aws-sdk/CHANGELOG.md +13 -1
- package/node_modules/aws-sdk/README.md +1 -1
- package/node_modules/aws-sdk/apis/iotwireless-2020-11-22.min.json +123 -79
- package/node_modules/aws-sdk/apis/mediapackage-2017-10-12.min.json +7 -0
- package/node_modules/aws-sdk/apis/panorama-2019-07-24.min.json +47 -10
- package/node_modules/aws-sdk/apis/sso-oidc-2019-06-10.min.json +1 -2
- package/node_modules/aws-sdk/clients/elbv2.d.ts +1 -1
- package/node_modules/aws-sdk/clients/gamelift.d.ts +1 -1
- package/node_modules/aws-sdk/clients/iotwireless.d.ts +60 -11
- package/node_modules/aws-sdk/clients/mediapackage.d.ts +2 -0
- package/node_modules/aws-sdk/clients/panorama.d.ts +62 -0
- package/node_modules/aws-sdk/clients/rds.d.ts +5 -5
- package/node_modules/aws-sdk/clients/ssooidc.d.ts +12 -12
- package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +151 -31
- package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +157 -37
- package/node_modules/aws-sdk/dist/aws-sdk.js +230 -114
- package/node_modules/aws-sdk/dist/aws-sdk.min.js +11 -11
- package/node_modules/aws-sdk/lib/config-base.d.ts +14 -0
- package/node_modules/aws-sdk/lib/config.js +78 -1
- package/node_modules/aws-sdk/lib/core.js +1 -1
- package/node_modules/aws-sdk/lib/event_listeners.js +49 -30
- package/node_modules/aws-sdk/lib/node_loader.js +17 -1
- package/node_modules/aws-sdk/lib/service.js +2 -0
- package/node_modules/aws-sdk/lib/shared-ini/ini-loader.d.ts +1 -12
- package/node_modules/aws-sdk/lib/shared-ini/ini-loader.js +68 -30
- package/node_modules/aws-sdk/lib/signers/bearer.js +14 -0
- package/node_modules/aws-sdk/lib/signers/request_signer.js +2 -0
- package/node_modules/aws-sdk/lib/token/sso_token_provider.d.ts +12 -0
- package/node_modules/aws-sdk/lib/token/sso_token_provider.js +245 -0
- package/node_modules/aws-sdk/lib/token/static_token_provider.d.ts +8 -0
- package/node_modules/aws-sdk/lib/token/static_token_provider.js +27 -0
- package/node_modules/aws-sdk/lib/token/token_provider_chain.d.ts +24 -0
- package/node_modules/aws-sdk/lib/token/token_provider_chain.js +165 -0
- package/node_modules/aws-sdk/lib/token.d.ts +101 -0
- package/node_modules/aws-sdk/lib/token.js +219 -0
- package/node_modules/aws-sdk/package.json +1 -1
- package/node_modules/aws-sdk/scripts/region-checker/allowlist.js +4 -1
- package/package.json +6 -6
@@ -12,19 +12,19 @@ declare class SSOOIDC extends Service {
|
|
12
12
|
constructor(options?: SSOOIDC.Types.ClientConfiguration)
|
13
13
|
config: Config & SSOOIDC.Types.ClientConfiguration;
|
14
14
|
/**
|
15
|
-
* Creates and returns an access token for the authorized client. The access token issued will be used to fetch short-term credentials for the assigned roles in the
|
15
|
+
* Creates and returns an access token for the authorized client. The access token issued will be used to fetch short-term credentials for the assigned roles in the AWS account.
|
16
16
|
*/
|
17
17
|
createToken(params: SSOOIDC.Types.CreateTokenRequest, callback?: (err: AWSError, data: SSOOIDC.Types.CreateTokenResponse) => void): Request<SSOOIDC.Types.CreateTokenResponse, AWSError>;
|
18
18
|
/**
|
19
|
-
* Creates and returns an access token for the authorized client. The access token issued will be used to fetch short-term credentials for the assigned roles in the
|
19
|
+
* Creates and returns an access token for the authorized client. The access token issued will be used to fetch short-term credentials for the assigned roles in the AWS account.
|
20
20
|
*/
|
21
21
|
createToken(callback?: (err: AWSError, data: SSOOIDC.Types.CreateTokenResponse) => void): Request<SSOOIDC.Types.CreateTokenResponse, AWSError>;
|
22
22
|
/**
|
23
|
-
* Registers a client with
|
23
|
+
* Registers a client with AWS SSO. This allows clients to initiate device authorization. The output should be persisted for reuse through many authentication requests.
|
24
24
|
*/
|
25
25
|
registerClient(params: SSOOIDC.Types.RegisterClientRequest, callback?: (err: AWSError, data: SSOOIDC.Types.RegisterClientResponse) => void): Request<SSOOIDC.Types.RegisterClientResponse, AWSError>;
|
26
26
|
/**
|
27
|
-
* Registers a client with
|
27
|
+
* Registers a client with AWS SSO. This allows clients to initiate device authorization. The output should be persisted for reuse through many authentication requests.
|
28
28
|
*/
|
29
29
|
registerClient(callback?: (err: AWSError, data: SSOOIDC.Types.RegisterClientResponse) => void): Request<SSOOIDC.Types.RegisterClientResponse, AWSError>;
|
30
30
|
/**
|
@@ -53,19 +53,19 @@ declare namespace SSOOIDC {
|
|
53
53
|
*/
|
54
54
|
clientSecret: ClientSecret;
|
55
55
|
/**
|
56
|
-
* Supports grant types for
|
56
|
+
* Supports grant types for authorization code, refresh token, and device code request.
|
57
57
|
*/
|
58
58
|
grantType: GrantType;
|
59
59
|
/**
|
60
60
|
* Used only when calling this API for the device code grant type. This short-term code is used to identify this authentication attempt. This should come from an in-memory reference to the result of the StartDeviceAuthorization API.
|
61
61
|
*/
|
62
|
-
deviceCode
|
62
|
+
deviceCode?: DeviceCode;
|
63
63
|
/**
|
64
64
|
* The authorization code received from the authorization service. This parameter is required to perform an authorization grant request to get access to a token.
|
65
65
|
*/
|
66
66
|
code?: AuthCode;
|
67
67
|
/**
|
68
|
-
*
|
68
|
+
* The token used to obtain an access token in the event that the access token is invalid or expired. This token is not issued by the service.
|
69
69
|
*/
|
70
70
|
refreshToken?: RefreshToken;
|
71
71
|
/**
|
@@ -79,7 +79,7 @@ declare namespace SSOOIDC {
|
|
79
79
|
}
|
80
80
|
export interface CreateTokenResponse {
|
81
81
|
/**
|
82
|
-
* An opaque token to access
|
82
|
+
* An opaque token to access AWS SSO resources assigned to a user.
|
83
83
|
*/
|
84
84
|
accessToken?: AccessToken;
|
85
85
|
/**
|
@@ -91,11 +91,11 @@ declare namespace SSOOIDC {
|
|
91
91
|
*/
|
92
92
|
expiresIn?: ExpirationInSeconds;
|
93
93
|
/**
|
94
|
-
*
|
94
|
+
* A token that, if present, can be used to refresh a previously issued access token that might have expired.
|
95
95
|
*/
|
96
96
|
refreshToken?: RefreshToken;
|
97
97
|
/**
|
98
|
-
*
|
98
|
+
* The identifier of the user that associated with the access token, if present.
|
99
99
|
*/
|
100
100
|
idToken?: IdToken;
|
101
101
|
}
|
@@ -150,7 +150,7 @@ declare namespace SSOOIDC {
|
|
150
150
|
export type Scopes = Scope[];
|
151
151
|
export interface StartDeviceAuthorizationRequest {
|
152
152
|
/**
|
153
|
-
* The unique identifier string for the client that is registered with
|
153
|
+
* The unique identifier string for the client that is registered with AWS SSO. This value should come from the persisted result of the RegisterClient API operation.
|
154
154
|
*/
|
155
155
|
clientId: ClientId;
|
156
156
|
/**
|
@@ -158,7 +158,7 @@ declare namespace SSOOIDC {
|
|
158
158
|
*/
|
159
159
|
clientSecret: ClientSecret;
|
160
160
|
/**
|
161
|
-
* The URL for the AWS
|
161
|
+
* The URL for the AWS SSO user portal. For more information, see Using the User Portal in the AWS Single Sign-On User Guide.
|
162
162
|
*/
|
163
163
|
startUrl: URI;
|
164
164
|
}
|
@@ -83,7 +83,7 @@ return /******/ (function(modules) { // webpackBootstrap
|
|
83
83
|
/**
|
84
84
|
* @constant
|
85
85
|
*/
|
86
|
-
VERSION: '2.
|
86
|
+
VERSION: '2.1204.0',
|
87
87
|
|
88
88
|
/**
|
89
89
|
* @api private
|
@@ -147,7 +147,7 @@ return /******/ (function(modules) { // webpackBootstrap
|
|
147
147
|
__webpack_require__(76);
|
148
148
|
__webpack_require__(77);
|
149
149
|
__webpack_require__(78);
|
150
|
-
__webpack_require__(
|
150
|
+
__webpack_require__(87);
|
151
151
|
|
152
152
|
/**
|
153
153
|
* @readonly
|
@@ -5217,6 +5217,8 @@ return /******/ (function(modules) { // webpackBootstrap
|
|
5217
5217
|
version = this.config.signatureVersion;
|
5218
5218
|
} else if (authtype === 'v4' || authtype === 'v4-unsigned-body') {
|
5219
5219
|
version = 'v4';
|
5220
|
+
} else if (authtype === 'bearer') {
|
5221
|
+
version = 'bearer';
|
5220
5222
|
} else {
|
5221
5223
|
version = this.api.signatureVersion;
|
5222
5224
|
}
|
@@ -6157,6 +6159,82 @@ return /******/ (function(modules) { // webpackBootstrap
|
|
6157
6159
|
}
|
6158
6160
|
},
|
6159
6161
|
|
6162
|
+
/**
|
6163
|
+
* Loads token from the configuration object. This is used internally
|
6164
|
+
* by the SDK to ensure that refreshable {Token} objects are properly
|
6165
|
+
* refreshed and loaded when sending a request. If you want to ensure that
|
6166
|
+
* your token is loaded prior to a request, you can use this method
|
6167
|
+
* directly to provide accurate token data stored in the object.
|
6168
|
+
*
|
6169
|
+
* @note If you configure the SDK with static token, the token data should
|
6170
|
+
* already be present in {token} attribute. This method is primarily necessary
|
6171
|
+
* to load token from asynchronous sources, or sources that can refresh
|
6172
|
+
* token periodically.
|
6173
|
+
* @example Getting your access token
|
6174
|
+
* AWS.config.getToken(function(err) {
|
6175
|
+
* if (err) console.log(err.stack); // token not loaded
|
6176
|
+
* else console.log("Token:", AWS.config.token.token);
|
6177
|
+
* })
|
6178
|
+
* @callback callback function(err)
|
6179
|
+
* Called when the {token} have been properly set on the configuration object.
|
6180
|
+
*
|
6181
|
+
* @param err [Error] if this is set, token was not successfully loaded and
|
6182
|
+
* this error provides information why.
|
6183
|
+
* @see token
|
6184
|
+
*/
|
6185
|
+
getToken: function getToken(callback) {
|
6186
|
+
var self = this;
|
6187
|
+
|
6188
|
+
function finish(err) {
|
6189
|
+
callback(err, err ? null : self.token);
|
6190
|
+
}
|
6191
|
+
|
6192
|
+
function tokenError(msg, err) {
|
6193
|
+
return new AWS.util.error(err || new Error(), {
|
6194
|
+
code: 'TokenError',
|
6195
|
+
message: msg,
|
6196
|
+
name: 'TokenError'
|
6197
|
+
});
|
6198
|
+
}
|
6199
|
+
|
6200
|
+
function getAsyncToken() {
|
6201
|
+
self.token.get(function(err) {
|
6202
|
+
if (err) {
|
6203
|
+
var msg = 'Could not load token from ' +
|
6204
|
+
self.token.constructor.name;
|
6205
|
+
err = tokenError(msg, err);
|
6206
|
+
}
|
6207
|
+
finish(err);
|
6208
|
+
});
|
6209
|
+
}
|
6210
|
+
|
6211
|
+
function getStaticToken() {
|
6212
|
+
var err = null;
|
6213
|
+
if (!self.token.token) {
|
6214
|
+
err = tokenError('Missing token');
|
6215
|
+
}
|
6216
|
+
finish(err);
|
6217
|
+
}
|
6218
|
+
|
6219
|
+
if (self.token) {
|
6220
|
+
if (typeof self.token.get === 'function') {
|
6221
|
+
getAsyncToken();
|
6222
|
+
} else { // static token
|
6223
|
+
getStaticToken();
|
6224
|
+
}
|
6225
|
+
} else if (self.tokenProvider) {
|
6226
|
+
self.tokenProvider.resolve(function(err, token) {
|
6227
|
+
if (err) {
|
6228
|
+
err = tokenError('Could not load token from any providers', err);
|
6229
|
+
}
|
6230
|
+
self.token = token;
|
6231
|
+
finish(err);
|
6232
|
+
});
|
6233
|
+
} else {
|
6234
|
+
finish(tokenError('No token to load'));
|
6235
|
+
}
|
6236
|
+
},
|
6237
|
+
|
6160
6238
|
/**
|
6161
6239
|
* @!group Loading and Setting Configuration Options
|
6162
6240
|
*/
|
@@ -6290,7 +6368,8 @@ return /******/ (function(modules) { // webpackBootstrap
|
|
6290
6368
|
hostPrefixEnabled: true,
|
6291
6369
|
stsRegionalEndpoints: 'legacy',
|
6292
6370
|
useFipsEndpoint: false,
|
6293
|
-
useDualstackEndpoint: false
|
6371
|
+
useDualstackEndpoint: false,
|
6372
|
+
token: null
|
6294
6373
|
},
|
6295
6374
|
|
6296
6375
|
/**
|
@@ -7288,37 +7367,56 @@ return /******/ (function(modules) { // webpackBootstrap
|
|
7288
7367
|
var authtype = operation ? operation.authtype : '';
|
7289
7368
|
if (!service.api.signatureVersion && !authtype && !service.config.signatureVersion) return done(); // none
|
7290
7369
|
|
7291
|
-
service.config.
|
7292
|
-
|
7293
|
-
|
7294
|
-
|
7295
|
-
|
7370
|
+
if (authtype === 'bearer' || service.config.signatureVersion === 'bearer') {
|
7371
|
+
service.config.getToken(function (err, token) {
|
7372
|
+
if (err) {
|
7373
|
+
req.response.error = err;
|
7374
|
+
return done();
|
7375
|
+
}
|
7296
7376
|
|
7297
|
-
|
7298
|
-
|
7299
|
-
|
7300
|
-
|
7301
|
-
|
7302
|
-
|
7303
|
-
|
7304
|
-
|
7305
|
-
|
7306
|
-
|
7307
|
-
|
7377
|
+
try {
|
7378
|
+
var SignerClass = service.getSignerClass(req);
|
7379
|
+
var signer = new SignerClass(req.httpRequest);
|
7380
|
+
signer.addAuthorization(token);
|
7381
|
+
} catch (e) {
|
7382
|
+
req.response.error = e;
|
7383
|
+
}
|
7384
|
+
done();
|
7385
|
+
});
|
7386
|
+
} else {
|
7387
|
+
service.config.getCredentials(function (err, credentials) {
|
7388
|
+
if (err) {
|
7389
|
+
req.response.error = err;
|
7390
|
+
return done();
|
7391
|
+
}
|
7308
7392
|
|
7309
|
-
|
7310
|
-
|
7311
|
-
|
7312
|
-
|
7393
|
+
try {
|
7394
|
+
var date = service.getSkewCorrectedDate();
|
7395
|
+
var SignerClass = service.getSignerClass(req);
|
7396
|
+
var signer = new SignerClass(req.httpRequest,
|
7397
|
+
service.getSigningName(req),
|
7398
|
+
{
|
7399
|
+
signatureCache: service.config.signatureCache,
|
7400
|
+
operation: operation,
|
7401
|
+
signatureVersion: service.api.signatureVersion
|
7402
|
+
});
|
7403
|
+
signer.setServiceClientId(service._clientId);
|
7404
|
+
|
7405
|
+
// clear old authorization headers
|
7406
|
+
delete req.httpRequest.headers['Authorization'];
|
7407
|
+
delete req.httpRequest.headers['Date'];
|
7408
|
+
delete req.httpRequest.headers['X-Amz-Date'];
|
7409
|
+
|
7410
|
+
// add new authorization
|
7411
|
+
signer.addAuthorization(credentials, date);
|
7412
|
+
req.signedAt = date;
|
7413
|
+
} catch (e) {
|
7414
|
+
req.response.error = e;
|
7415
|
+
}
|
7416
|
+
done();
|
7417
|
+
});
|
7313
7418
|
|
7314
|
-
|
7315
|
-
signer.addAuthorization(credentials, date);
|
7316
|
-
req.signedAt = date;
|
7317
|
-
} catch (e) {
|
7318
|
-
req.response.error = e;
|
7319
|
-
}
|
7320
|
-
done();
|
7321
|
-
});
|
7419
|
+
}
|
7322
7420
|
});
|
7323
7421
|
|
7324
7422
|
add('VALIDATE_RESPONSE', 'validateResponse', function VALIDATE_RESPONSE(resp) {
|
@@ -13185,6 +13283,7 @@ return /******/ (function(modules) { // webpackBootstrap
|
|
13185
13283
|
case 'v4': return AWS.Signers.V4;
|
13186
13284
|
case 's3': return AWS.Signers.S3;
|
13187
13285
|
case 'v3https': return AWS.Signers.V3Https;
|
13286
|
+
case 'bearer': return AWS.Signers.Bearer;
|
13188
13287
|
}
|
13189
13288
|
throw new Error('Unknown signing version ' + version);
|
13190
13289
|
};
|
@@ -13195,6 +13294,7 @@ return /******/ (function(modules) { // webpackBootstrap
|
|
13195
13294
|
__webpack_require__(82);
|
13196
13295
|
__webpack_require__(84);
|
13197
13296
|
__webpack_require__(85);
|
13297
|
+
__webpack_require__(86);
|
13198
13298
|
|
13199
13299
|
|
13200
13300
|
/***/ }),
|
@@ -14004,6 +14104,26 @@ return /******/ (function(modules) { // webpackBootstrap
|
|
14004
14104
|
|
14005
14105
|
var AWS = __webpack_require__(1);
|
14006
14106
|
|
14107
|
+
/**
|
14108
|
+
* @api private
|
14109
|
+
*/
|
14110
|
+
AWS.Signers.Bearer = AWS.util.inherit(AWS.Signers.RequestSigner, {
|
14111
|
+
constructor: function Bearer(request) {
|
14112
|
+
AWS.Signers.RequestSigner.call(this, request);
|
14113
|
+
},
|
14114
|
+
|
14115
|
+
addAuthorization: function addAuthorization(token) {
|
14116
|
+
this.request.httpRequest.headers['Authorization'] = 'Bearer ' + token.token;
|
14117
|
+
}
|
14118
|
+
});
|
14119
|
+
|
14120
|
+
|
14121
|
+
/***/ }),
|
14122
|
+
/* 87 */
|
14123
|
+
/***/ (function(module, exports, __webpack_require__) {
|
14124
|
+
|
14125
|
+
var AWS = __webpack_require__(1);
|
14126
|
+
|
14007
14127
|
/**
|
14008
14128
|
* @api private
|
14009
14129
|
*/
|