cdk-comprehend-s3olap 2.0.78 → 2.0.81

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (42) hide show
  1. package/.jsii +3 -3
  2. package/lib/cdk-comprehend-s3olap.js +2 -2
  3. package/lib/comprehend-lambdas.js +2 -2
  4. package/lib/iam-roles.js +4 -4
  5. package/node_modules/aws-sdk/CHANGELOG.md +13 -1
  6. package/node_modules/aws-sdk/README.md +1 -1
  7. package/node_modules/aws-sdk/apis/iotwireless-2020-11-22.min.json +123 -79
  8. package/node_modules/aws-sdk/apis/mediapackage-2017-10-12.min.json +7 -0
  9. package/node_modules/aws-sdk/apis/panorama-2019-07-24.min.json +47 -10
  10. package/node_modules/aws-sdk/apis/sso-oidc-2019-06-10.min.json +1 -2
  11. package/node_modules/aws-sdk/clients/elbv2.d.ts +1 -1
  12. package/node_modules/aws-sdk/clients/gamelift.d.ts +1 -1
  13. package/node_modules/aws-sdk/clients/iotwireless.d.ts +60 -11
  14. package/node_modules/aws-sdk/clients/mediapackage.d.ts +2 -0
  15. package/node_modules/aws-sdk/clients/panorama.d.ts +62 -0
  16. package/node_modules/aws-sdk/clients/rds.d.ts +5 -5
  17. package/node_modules/aws-sdk/clients/ssooidc.d.ts +12 -12
  18. package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +151 -31
  19. package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +157 -37
  20. package/node_modules/aws-sdk/dist/aws-sdk.js +230 -114
  21. package/node_modules/aws-sdk/dist/aws-sdk.min.js +11 -11
  22. package/node_modules/aws-sdk/lib/config-base.d.ts +14 -0
  23. package/node_modules/aws-sdk/lib/config.js +78 -1
  24. package/node_modules/aws-sdk/lib/core.js +1 -1
  25. package/node_modules/aws-sdk/lib/event_listeners.js +49 -30
  26. package/node_modules/aws-sdk/lib/node_loader.js +17 -1
  27. package/node_modules/aws-sdk/lib/service.js +2 -0
  28. package/node_modules/aws-sdk/lib/shared-ini/ini-loader.d.ts +1 -12
  29. package/node_modules/aws-sdk/lib/shared-ini/ini-loader.js +68 -30
  30. package/node_modules/aws-sdk/lib/signers/bearer.js +14 -0
  31. package/node_modules/aws-sdk/lib/signers/request_signer.js +2 -0
  32. package/node_modules/aws-sdk/lib/token/sso_token_provider.d.ts +12 -0
  33. package/node_modules/aws-sdk/lib/token/sso_token_provider.js +245 -0
  34. package/node_modules/aws-sdk/lib/token/static_token_provider.d.ts +8 -0
  35. package/node_modules/aws-sdk/lib/token/static_token_provider.js +27 -0
  36. package/node_modules/aws-sdk/lib/token/token_provider_chain.d.ts +24 -0
  37. package/node_modules/aws-sdk/lib/token/token_provider_chain.js +165 -0
  38. package/node_modules/aws-sdk/lib/token.d.ts +101 -0
  39. package/node_modules/aws-sdk/lib/token.js +219 -0
  40. package/node_modules/aws-sdk/package.json +1 -1
  41. package/node_modules/aws-sdk/scripts/region-checker/allowlist.js +4 -1
  42. package/package.json +6 -6
@@ -12,19 +12,19 @@ declare class SSOOIDC extends Service {
12
12
  constructor(options?: SSOOIDC.Types.ClientConfiguration)
13
13
  config: Config & SSOOIDC.Types.ClientConfiguration;
14
14
  /**
15
- * Creates and returns an access token for the authorized client. The access token issued will be used to fetch short-term credentials for the assigned roles in the Amazon Web Services account.
15
+ * Creates and returns an access token for the authorized client. The access token issued will be used to fetch short-term credentials for the assigned roles in the AWS account.
16
16
  */
17
17
  createToken(params: SSOOIDC.Types.CreateTokenRequest, callback?: (err: AWSError, data: SSOOIDC.Types.CreateTokenResponse) => void): Request<SSOOIDC.Types.CreateTokenResponse, AWSError>;
18
18
  /**
19
- * Creates and returns an access token for the authorized client. The access token issued will be used to fetch short-term credentials for the assigned roles in the Amazon Web Services account.
19
+ * Creates and returns an access token for the authorized client. The access token issued will be used to fetch short-term credentials for the assigned roles in the AWS account.
20
20
  */
21
21
  createToken(callback?: (err: AWSError, data: SSOOIDC.Types.CreateTokenResponse) => void): Request<SSOOIDC.Types.CreateTokenResponse, AWSError>;
22
22
  /**
23
- * Registers a client with Amazon Web Services SSO. This allows clients to initiate device authorization. The output should be persisted for reuse through many authentication requests.
23
+ * Registers a client with AWS SSO. This allows clients to initiate device authorization. The output should be persisted for reuse through many authentication requests.
24
24
  */
25
25
  registerClient(params: SSOOIDC.Types.RegisterClientRequest, callback?: (err: AWSError, data: SSOOIDC.Types.RegisterClientResponse) => void): Request<SSOOIDC.Types.RegisterClientResponse, AWSError>;
26
26
  /**
27
- * Registers a client with Amazon Web Services SSO. This allows clients to initiate device authorization. The output should be persisted for reuse through many authentication requests.
27
+ * Registers a client with AWS SSO. This allows clients to initiate device authorization. The output should be persisted for reuse through many authentication requests.
28
28
  */
29
29
  registerClient(callback?: (err: AWSError, data: SSOOIDC.Types.RegisterClientResponse) => void): Request<SSOOIDC.Types.RegisterClientResponse, AWSError>;
30
30
  /**
@@ -53,19 +53,19 @@ declare namespace SSOOIDC {
53
53
  */
54
54
  clientSecret: ClientSecret;
55
55
  /**
56
- * Supports grant types for the authorization code, refresh token, and device code request. For device code requests, specify the following value: urn:ietf:params:oauth:grant-type:device_code For information about how to obtain the device code, see the StartDeviceAuthorization topic.
56
+ * Supports grant types for authorization code, refresh token, and device code request.
57
57
  */
58
58
  grantType: GrantType;
59
59
  /**
60
60
  * Used only when calling this API for the device code grant type. This short-term code is used to identify this authentication attempt. This should come from an in-memory reference to the result of the StartDeviceAuthorization API.
61
61
  */
62
- deviceCode: DeviceCode;
62
+ deviceCode?: DeviceCode;
63
63
  /**
64
64
  * The authorization code received from the authorization service. This parameter is required to perform an authorization grant request to get access to a token.
65
65
  */
66
66
  code?: AuthCode;
67
67
  /**
68
- * Currently, refreshToken is not yet implemented and is not supported. For more information about the features and limitations of the current Amazon Web Services SSO OIDC implementation, see Considerations for Using this Guide in the Amazon Web Services SSO OIDC API Reference. The token used to obtain an access token in the event that the access token is invalid or expired.
68
+ * The token used to obtain an access token in the event that the access token is invalid or expired. This token is not issued by the service.
69
69
  */
70
70
  refreshToken?: RefreshToken;
71
71
  /**
@@ -79,7 +79,7 @@ declare namespace SSOOIDC {
79
79
  }
80
80
  export interface CreateTokenResponse {
81
81
  /**
82
- * An opaque token to access Amazon Web Services SSO resources assigned to a user.
82
+ * An opaque token to access AWS SSO resources assigned to a user.
83
83
  */
84
84
  accessToken?: AccessToken;
85
85
  /**
@@ -91,11 +91,11 @@ declare namespace SSOOIDC {
91
91
  */
92
92
  expiresIn?: ExpirationInSeconds;
93
93
  /**
94
- * Currently, refreshToken is not yet implemented and is not supported. For more information about the features and limitations of the current Amazon Web Services SSO OIDC implementation, see Considerations for Using this Guide in the Amazon Web Services SSO OIDC API Reference. A token that, if present, can be used to refresh a previously issued access token that might have expired.
94
+ * A token that, if present, can be used to refresh a previously issued access token that might have expired.
95
95
  */
96
96
  refreshToken?: RefreshToken;
97
97
  /**
98
- * Currently, idToken is not yet implemented and is not supported. For more information about the features and limitations of the current Amazon Web Services SSO OIDC implementation, see Considerations for Using this Guide in the Amazon Web Services SSO OIDC API Reference. The identifier of the user that associated with the access token, if present.
98
+ * The identifier of the user that associated with the access token, if present.
99
99
  */
100
100
  idToken?: IdToken;
101
101
  }
@@ -150,7 +150,7 @@ declare namespace SSOOIDC {
150
150
  export type Scopes = Scope[];
151
151
  export interface StartDeviceAuthorizationRequest {
152
152
  /**
153
- * The unique identifier string for the client that is registered with Amazon Web Services SSO. This value should come from the persisted result of the RegisterClient API operation.
153
+ * The unique identifier string for the client that is registered with AWS SSO. This value should come from the persisted result of the RegisterClient API operation.
154
154
  */
155
155
  clientId: ClientId;
156
156
  /**
@@ -158,7 +158,7 @@ declare namespace SSOOIDC {
158
158
  */
159
159
  clientSecret: ClientSecret;
160
160
  /**
161
- * The URL for the AWS access portal. For more information, see Using the AWS access portal in the Amazon Web Services SSO User Guide.
161
+ * The URL for the AWS SSO user portal. For more information, see Using the User Portal in the AWS Single Sign-On User Guide.
162
162
  */
163
163
  startUrl: URI;
164
164
  }
@@ -83,7 +83,7 @@ return /******/ (function(modules) { // webpackBootstrap
83
83
  /**
84
84
  * @constant
85
85
  */
86
- VERSION: '2.1202.0',
86
+ VERSION: '2.1204.0',
87
87
 
88
88
  /**
89
89
  * @api private
@@ -147,7 +147,7 @@ return /******/ (function(modules) { // webpackBootstrap
147
147
  __webpack_require__(76);
148
148
  __webpack_require__(77);
149
149
  __webpack_require__(78);
150
- __webpack_require__(86);
150
+ __webpack_require__(87);
151
151
 
152
152
  /**
153
153
  * @readonly
@@ -5217,6 +5217,8 @@ return /******/ (function(modules) { // webpackBootstrap
5217
5217
  version = this.config.signatureVersion;
5218
5218
  } else if (authtype === 'v4' || authtype === 'v4-unsigned-body') {
5219
5219
  version = 'v4';
5220
+ } else if (authtype === 'bearer') {
5221
+ version = 'bearer';
5220
5222
  } else {
5221
5223
  version = this.api.signatureVersion;
5222
5224
  }
@@ -6157,6 +6159,82 @@ return /******/ (function(modules) { // webpackBootstrap
6157
6159
  }
6158
6160
  },
6159
6161
 
6162
+ /**
6163
+ * Loads token from the configuration object. This is used internally
6164
+ * by the SDK to ensure that refreshable {Token} objects are properly
6165
+ * refreshed and loaded when sending a request. If you want to ensure that
6166
+ * your token is loaded prior to a request, you can use this method
6167
+ * directly to provide accurate token data stored in the object.
6168
+ *
6169
+ * @note If you configure the SDK with static token, the token data should
6170
+ * already be present in {token} attribute. This method is primarily necessary
6171
+ * to load token from asynchronous sources, or sources that can refresh
6172
+ * token periodically.
6173
+ * @example Getting your access token
6174
+ * AWS.config.getToken(function(err) {
6175
+ * if (err) console.log(err.stack); // token not loaded
6176
+ * else console.log("Token:", AWS.config.token.token);
6177
+ * })
6178
+ * @callback callback function(err)
6179
+ * Called when the {token} have been properly set on the configuration object.
6180
+ *
6181
+ * @param err [Error] if this is set, token was not successfully loaded and
6182
+ * this error provides information why.
6183
+ * @see token
6184
+ */
6185
+ getToken: function getToken(callback) {
6186
+ var self = this;
6187
+
6188
+ function finish(err) {
6189
+ callback(err, err ? null : self.token);
6190
+ }
6191
+
6192
+ function tokenError(msg, err) {
6193
+ return new AWS.util.error(err || new Error(), {
6194
+ code: 'TokenError',
6195
+ message: msg,
6196
+ name: 'TokenError'
6197
+ });
6198
+ }
6199
+
6200
+ function getAsyncToken() {
6201
+ self.token.get(function(err) {
6202
+ if (err) {
6203
+ var msg = 'Could not load token from ' +
6204
+ self.token.constructor.name;
6205
+ err = tokenError(msg, err);
6206
+ }
6207
+ finish(err);
6208
+ });
6209
+ }
6210
+
6211
+ function getStaticToken() {
6212
+ var err = null;
6213
+ if (!self.token.token) {
6214
+ err = tokenError('Missing token');
6215
+ }
6216
+ finish(err);
6217
+ }
6218
+
6219
+ if (self.token) {
6220
+ if (typeof self.token.get === 'function') {
6221
+ getAsyncToken();
6222
+ } else { // static token
6223
+ getStaticToken();
6224
+ }
6225
+ } else if (self.tokenProvider) {
6226
+ self.tokenProvider.resolve(function(err, token) {
6227
+ if (err) {
6228
+ err = tokenError('Could not load token from any providers', err);
6229
+ }
6230
+ self.token = token;
6231
+ finish(err);
6232
+ });
6233
+ } else {
6234
+ finish(tokenError('No token to load'));
6235
+ }
6236
+ },
6237
+
6160
6238
  /**
6161
6239
  * @!group Loading and Setting Configuration Options
6162
6240
  */
@@ -6290,7 +6368,8 @@ return /******/ (function(modules) { // webpackBootstrap
6290
6368
  hostPrefixEnabled: true,
6291
6369
  stsRegionalEndpoints: 'legacy',
6292
6370
  useFipsEndpoint: false,
6293
- useDualstackEndpoint: false
6371
+ useDualstackEndpoint: false,
6372
+ token: null
6294
6373
  },
6295
6374
 
6296
6375
  /**
@@ -7288,37 +7367,56 @@ return /******/ (function(modules) { // webpackBootstrap
7288
7367
  var authtype = operation ? operation.authtype : '';
7289
7368
  if (!service.api.signatureVersion && !authtype && !service.config.signatureVersion) return done(); // none
7290
7369
 
7291
- service.config.getCredentials(function (err, credentials) {
7292
- if (err) {
7293
- req.response.error = err;
7294
- return done();
7295
- }
7370
+ if (authtype === 'bearer' || service.config.signatureVersion === 'bearer') {
7371
+ service.config.getToken(function (err, token) {
7372
+ if (err) {
7373
+ req.response.error = err;
7374
+ return done();
7375
+ }
7296
7376
 
7297
- try {
7298
- var date = service.getSkewCorrectedDate();
7299
- var SignerClass = service.getSignerClass(req);
7300
- var signer = new SignerClass(req.httpRequest,
7301
- service.getSigningName(req),
7302
- {
7303
- signatureCache: service.config.signatureCache,
7304
- operation: operation,
7305
- signatureVersion: service.api.signatureVersion
7306
- });
7307
- signer.setServiceClientId(service._clientId);
7377
+ try {
7378
+ var SignerClass = service.getSignerClass(req);
7379
+ var signer = new SignerClass(req.httpRequest);
7380
+ signer.addAuthorization(token);
7381
+ } catch (e) {
7382
+ req.response.error = e;
7383
+ }
7384
+ done();
7385
+ });
7386
+ } else {
7387
+ service.config.getCredentials(function (err, credentials) {
7388
+ if (err) {
7389
+ req.response.error = err;
7390
+ return done();
7391
+ }
7308
7392
 
7309
- // clear old authorization headers
7310
- delete req.httpRequest.headers['Authorization'];
7311
- delete req.httpRequest.headers['Date'];
7312
- delete req.httpRequest.headers['X-Amz-Date'];
7393
+ try {
7394
+ var date = service.getSkewCorrectedDate();
7395
+ var SignerClass = service.getSignerClass(req);
7396
+ var signer = new SignerClass(req.httpRequest,
7397
+ service.getSigningName(req),
7398
+ {
7399
+ signatureCache: service.config.signatureCache,
7400
+ operation: operation,
7401
+ signatureVersion: service.api.signatureVersion
7402
+ });
7403
+ signer.setServiceClientId(service._clientId);
7404
+
7405
+ // clear old authorization headers
7406
+ delete req.httpRequest.headers['Authorization'];
7407
+ delete req.httpRequest.headers['Date'];
7408
+ delete req.httpRequest.headers['X-Amz-Date'];
7409
+
7410
+ // add new authorization
7411
+ signer.addAuthorization(credentials, date);
7412
+ req.signedAt = date;
7413
+ } catch (e) {
7414
+ req.response.error = e;
7415
+ }
7416
+ done();
7417
+ });
7313
7418
 
7314
- // add new authorization
7315
- signer.addAuthorization(credentials, date);
7316
- req.signedAt = date;
7317
- } catch (e) {
7318
- req.response.error = e;
7319
- }
7320
- done();
7321
- });
7419
+ }
7322
7420
  });
7323
7421
 
7324
7422
  add('VALIDATE_RESPONSE', 'validateResponse', function VALIDATE_RESPONSE(resp) {
@@ -13185,6 +13283,7 @@ return /******/ (function(modules) { // webpackBootstrap
13185
13283
  case 'v4': return AWS.Signers.V4;
13186
13284
  case 's3': return AWS.Signers.S3;
13187
13285
  case 'v3https': return AWS.Signers.V3Https;
13286
+ case 'bearer': return AWS.Signers.Bearer;
13188
13287
  }
13189
13288
  throw new Error('Unknown signing version ' + version);
13190
13289
  };
@@ -13195,6 +13294,7 @@ return /******/ (function(modules) { // webpackBootstrap
13195
13294
  __webpack_require__(82);
13196
13295
  __webpack_require__(84);
13197
13296
  __webpack_require__(85);
13297
+ __webpack_require__(86);
13198
13298
 
13199
13299
 
13200
13300
  /***/ }),
@@ -14004,6 +14104,26 @@ return /******/ (function(modules) { // webpackBootstrap
14004
14104
 
14005
14105
  var AWS = __webpack_require__(1);
14006
14106
 
14107
+ /**
14108
+ * @api private
14109
+ */
14110
+ AWS.Signers.Bearer = AWS.util.inherit(AWS.Signers.RequestSigner, {
14111
+ constructor: function Bearer(request) {
14112
+ AWS.Signers.RequestSigner.call(this, request);
14113
+ },
14114
+
14115
+ addAuthorization: function addAuthorization(token) {
14116
+ this.request.httpRequest.headers['Authorization'] = 'Bearer ' + token.token;
14117
+ }
14118
+ });
14119
+
14120
+
14121
+ /***/ }),
14122
+ /* 87 */
14123
+ /***/ (function(module, exports, __webpack_require__) {
14124
+
14125
+ var AWS = __webpack_require__(1);
14126
+
14007
14127
  /**
14008
14128
  * @api private
14009
14129
  */