cdk-cost-analyzer 0.1.38 → 0.1.39
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.cdk-cost-analyzer-cache/metadata.json +8 -8
- package/dist/action/136.index.js +164 -20
- package/dist/action/360.index.js +3 -3
- package/dist/action/443.index.js +118 -27
- package/dist/action/579.index.js +4 -1
- package/dist/action/605.index.js +1 -1
- package/dist/action/762.index.js +146 -21
- package/dist/action/869.index.js +1 -1
- package/dist/action/956.index.js +16 -937
- package/dist/action/998.index.js +1074 -1122
- package/dist/action/index.js +3 -3
- package/dist/releasetag.txt +1 -1
- package/package.json +2 -2
package/dist/action/956.index.js
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
exports.id = 956;
|
|
3
|
-
exports.ids = [956
|
|
3
|
+
exports.ids = [956];
|
|
4
4
|
exports.modules = {
|
|
5
5
|
|
|
6
6
|
/***/ 8079:
|
|
@@ -12,7 +12,7 @@ exports.fromTokenFile = void 0;
|
|
|
12
12
|
const client_1 = __webpack_require__(5152);
|
|
13
13
|
const property_provider_1 = __webpack_require__(1238);
|
|
14
14
|
const shared_ini_file_loader_1 = __webpack_require__(4964);
|
|
15
|
-
const
|
|
15
|
+
const node_fs_1 = __webpack_require__(3024);
|
|
16
16
|
const fromWebToken_1 = __webpack_require__(6834);
|
|
17
17
|
const ENV_TOKEN_FILE = "AWS_WEB_IDENTITY_TOKEN_FILE";
|
|
18
18
|
const ENV_ROLE_ARN = "AWS_ROLE_ARN";
|
|
@@ -30,7 +30,7 @@ const fromTokenFile = (init = {}) => async (awsIdentityProperties) => {
|
|
|
30
30
|
const credentials = await (0, fromWebToken_1.fromWebToken)({
|
|
31
31
|
...init,
|
|
32
32
|
webIdentityToken: shared_ini_file_loader_1.externalDataInterceptor?.getTokenRecord?.()[webIdentityTokenFile] ??
|
|
33
|
-
(0,
|
|
33
|
+
(0, node_fs_1.readFileSync)(webIdentityTokenFile, { encoding: "ascii" }),
|
|
34
34
|
roleArn,
|
|
35
35
|
roleSessionName,
|
|
36
36
|
})(awsIdentityProperties);
|
|
@@ -123,949 +123,28 @@ var fromWebToken = __webpack_require__(6834);
|
|
|
123
123
|
|
|
124
124
|
|
|
125
125
|
|
|
126
|
-
Object.
|
|
127
|
-
|
|
126
|
+
Object.prototype.hasOwnProperty.call(fromTokenFile, '__proto__') &&
|
|
127
|
+
!Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
|
|
128
|
+
Object.defineProperty(exports, '__proto__', {
|
|
128
129
|
enumerable: true,
|
|
129
|
-
|
|
130
|
+
value: fromTokenFile['__proto__']
|
|
130
131
|
});
|
|
132
|
+
|
|
133
|
+
Object.keys(fromTokenFile).forEach(function (k) {
|
|
134
|
+
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = fromTokenFile[k];
|
|
131
135
|
});
|
|
132
|
-
Object.
|
|
133
|
-
|
|
136
|
+
Object.prototype.hasOwnProperty.call(fromWebToken, '__proto__') &&
|
|
137
|
+
!Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
|
|
138
|
+
Object.defineProperty(exports, '__proto__', {
|
|
134
139
|
enumerable: true,
|
|
135
|
-
|
|
140
|
+
value: fromWebToken['__proto__']
|
|
136
141
|
});
|
|
137
|
-
});
|
|
138
|
-
|
|
139
|
-
|
|
140
|
-
/***/ }),
|
|
141
|
-
|
|
142
|
-
/***/ 3723:
|
|
143
|
-
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
144
|
-
|
|
145
|
-
|
|
146
|
-
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
147
|
-
exports.STSClient = exports.__Client = void 0;
|
|
148
|
-
const middleware_host_header_1 = __webpack_require__(2590);
|
|
149
|
-
const middleware_logger_1 = __webpack_require__(5242);
|
|
150
|
-
const middleware_recursion_detection_1 = __webpack_require__(1568);
|
|
151
|
-
const middleware_user_agent_1 = __webpack_require__(2959);
|
|
152
|
-
const config_resolver_1 = __webpack_require__(9316);
|
|
153
|
-
const core_1 = __webpack_require__(402);
|
|
154
|
-
const schema_1 = __webpack_require__(6890);
|
|
155
|
-
const middleware_content_length_1 = __webpack_require__(7212);
|
|
156
|
-
const middleware_endpoint_1 = __webpack_require__(99);
|
|
157
|
-
const middleware_retry_1 = __webpack_require__(9618);
|
|
158
|
-
const smithy_client_1 = __webpack_require__(1411);
|
|
159
|
-
Object.defineProperty(exports, "__Client", ({ enumerable: true, get: function () { return smithy_client_1.Client; } }));
|
|
160
|
-
const httpAuthSchemeProvider_1 = __webpack_require__(7851);
|
|
161
|
-
const EndpointParameters_1 = __webpack_require__(6811);
|
|
162
|
-
const runtimeConfig_1 = __webpack_require__(6578);
|
|
163
|
-
const runtimeExtensions_1 = __webpack_require__(7742);
|
|
164
|
-
class STSClient extends smithy_client_1.Client {
|
|
165
|
-
config;
|
|
166
|
-
constructor(...[configuration]) {
|
|
167
|
-
const _config_0 = (0, runtimeConfig_1.getRuntimeConfig)(configuration || {});
|
|
168
|
-
super(_config_0);
|
|
169
|
-
this.initConfig = _config_0;
|
|
170
|
-
const _config_1 = (0, EndpointParameters_1.resolveClientEndpointParameters)(_config_0);
|
|
171
|
-
const _config_2 = (0, middleware_user_agent_1.resolveUserAgentConfig)(_config_1);
|
|
172
|
-
const _config_3 = (0, middleware_retry_1.resolveRetryConfig)(_config_2);
|
|
173
|
-
const _config_4 = (0, config_resolver_1.resolveRegionConfig)(_config_3);
|
|
174
|
-
const _config_5 = (0, middleware_host_header_1.resolveHostHeaderConfig)(_config_4);
|
|
175
|
-
const _config_6 = (0, middleware_endpoint_1.resolveEndpointConfig)(_config_5);
|
|
176
|
-
const _config_7 = (0, httpAuthSchemeProvider_1.resolveHttpAuthSchemeConfig)(_config_6);
|
|
177
|
-
const _config_8 = (0, runtimeExtensions_1.resolveRuntimeExtensions)(_config_7, configuration?.extensions || []);
|
|
178
|
-
this.config = _config_8;
|
|
179
|
-
this.middlewareStack.use((0, schema_1.getSchemaSerdePlugin)(this.config));
|
|
180
|
-
this.middlewareStack.use((0, middleware_user_agent_1.getUserAgentPlugin)(this.config));
|
|
181
|
-
this.middlewareStack.use((0, middleware_retry_1.getRetryPlugin)(this.config));
|
|
182
|
-
this.middlewareStack.use((0, middleware_content_length_1.getContentLengthPlugin)(this.config));
|
|
183
|
-
this.middlewareStack.use((0, middleware_host_header_1.getHostHeaderPlugin)(this.config));
|
|
184
|
-
this.middlewareStack.use((0, middleware_logger_1.getLoggerPlugin)(this.config));
|
|
185
|
-
this.middlewareStack.use((0, middleware_recursion_detection_1.getRecursionDetectionPlugin)(this.config));
|
|
186
|
-
this.middlewareStack.use((0, core_1.getHttpAuthSchemeEndpointRuleSetPlugin)(this.config, {
|
|
187
|
-
httpAuthSchemeParametersProvider: httpAuthSchemeProvider_1.defaultSTSHttpAuthSchemeParametersProvider,
|
|
188
|
-
identityProviderConfigProvider: async (config) => new core_1.DefaultIdentityProviderConfig({
|
|
189
|
-
"aws.auth#sigv4": config.credentials,
|
|
190
|
-
}),
|
|
191
|
-
}));
|
|
192
|
-
this.middlewareStack.use((0, core_1.getHttpSigningPlugin)(this.config));
|
|
193
|
-
}
|
|
194
|
-
destroy() {
|
|
195
|
-
super.destroy();
|
|
196
|
-
}
|
|
197
|
-
}
|
|
198
|
-
exports.STSClient = STSClient;
|
|
199
|
-
|
|
200
|
-
|
|
201
|
-
/***/ }),
|
|
202
|
-
|
|
203
|
-
/***/ 4532:
|
|
204
|
-
/***/ ((__unused_webpack_module, exports) => {
|
|
205
|
-
|
|
206
|
-
|
|
207
|
-
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
208
|
-
exports.resolveHttpAuthRuntimeConfig = exports.getHttpAuthExtensionConfiguration = void 0;
|
|
209
|
-
const getHttpAuthExtensionConfiguration = (runtimeConfig) => {
|
|
210
|
-
const _httpAuthSchemes = runtimeConfig.httpAuthSchemes;
|
|
211
|
-
let _httpAuthSchemeProvider = runtimeConfig.httpAuthSchemeProvider;
|
|
212
|
-
let _credentials = runtimeConfig.credentials;
|
|
213
|
-
return {
|
|
214
|
-
setHttpAuthScheme(httpAuthScheme) {
|
|
215
|
-
const index = _httpAuthSchemes.findIndex((scheme) => scheme.schemeId === httpAuthScheme.schemeId);
|
|
216
|
-
if (index === -1) {
|
|
217
|
-
_httpAuthSchemes.push(httpAuthScheme);
|
|
218
|
-
}
|
|
219
|
-
else {
|
|
220
|
-
_httpAuthSchemes.splice(index, 1, httpAuthScheme);
|
|
221
|
-
}
|
|
222
|
-
},
|
|
223
|
-
httpAuthSchemes() {
|
|
224
|
-
return _httpAuthSchemes;
|
|
225
|
-
},
|
|
226
|
-
setHttpAuthSchemeProvider(httpAuthSchemeProvider) {
|
|
227
|
-
_httpAuthSchemeProvider = httpAuthSchemeProvider;
|
|
228
|
-
},
|
|
229
|
-
httpAuthSchemeProvider() {
|
|
230
|
-
return _httpAuthSchemeProvider;
|
|
231
|
-
},
|
|
232
|
-
setCredentials(credentials) {
|
|
233
|
-
_credentials = credentials;
|
|
234
|
-
},
|
|
235
|
-
credentials() {
|
|
236
|
-
return _credentials;
|
|
237
|
-
},
|
|
238
|
-
};
|
|
239
|
-
};
|
|
240
|
-
exports.getHttpAuthExtensionConfiguration = getHttpAuthExtensionConfiguration;
|
|
241
|
-
const resolveHttpAuthRuntimeConfig = (config) => {
|
|
242
|
-
return {
|
|
243
|
-
httpAuthSchemes: config.httpAuthSchemes(),
|
|
244
|
-
httpAuthSchemeProvider: config.httpAuthSchemeProvider(),
|
|
245
|
-
credentials: config.credentials(),
|
|
246
|
-
};
|
|
247
|
-
};
|
|
248
|
-
exports.resolveHttpAuthRuntimeConfig = resolveHttpAuthRuntimeConfig;
|
|
249
|
-
|
|
250
|
-
|
|
251
|
-
/***/ }),
|
|
252
|
-
|
|
253
|
-
/***/ 7851:
|
|
254
|
-
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
255
|
-
|
|
256
|
-
|
|
257
|
-
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
258
|
-
exports.resolveHttpAuthSchemeConfig = exports.resolveStsAuthConfig = exports.defaultSTSHttpAuthSchemeProvider = exports.defaultSTSHttpAuthSchemeParametersProvider = void 0;
|
|
259
|
-
const core_1 = __webpack_require__(8704);
|
|
260
|
-
const util_middleware_1 = __webpack_require__(6324);
|
|
261
|
-
const STSClient_1 = __webpack_require__(3723);
|
|
262
|
-
const defaultSTSHttpAuthSchemeParametersProvider = async (config, context, input) => {
|
|
263
|
-
return {
|
|
264
|
-
operation: (0, util_middleware_1.getSmithyContext)(context).operation,
|
|
265
|
-
region: (await (0, util_middleware_1.normalizeProvider)(config.region)()) ||
|
|
266
|
-
(() => {
|
|
267
|
-
throw new Error("expected `region` to be configured for `aws.auth#sigv4`");
|
|
268
|
-
})(),
|
|
269
|
-
};
|
|
270
|
-
};
|
|
271
|
-
exports.defaultSTSHttpAuthSchemeParametersProvider = defaultSTSHttpAuthSchemeParametersProvider;
|
|
272
|
-
function createAwsAuthSigv4HttpAuthOption(authParameters) {
|
|
273
|
-
return {
|
|
274
|
-
schemeId: "aws.auth#sigv4",
|
|
275
|
-
signingProperties: {
|
|
276
|
-
name: "sts",
|
|
277
|
-
region: authParameters.region,
|
|
278
|
-
},
|
|
279
|
-
propertiesExtractor: (config, context) => ({
|
|
280
|
-
signingProperties: {
|
|
281
|
-
config,
|
|
282
|
-
context,
|
|
283
|
-
},
|
|
284
|
-
}),
|
|
285
|
-
};
|
|
286
|
-
}
|
|
287
|
-
function createSmithyApiNoAuthHttpAuthOption(authParameters) {
|
|
288
|
-
return {
|
|
289
|
-
schemeId: "smithy.api#noAuth",
|
|
290
|
-
};
|
|
291
|
-
}
|
|
292
|
-
const defaultSTSHttpAuthSchemeProvider = (authParameters) => {
|
|
293
|
-
const options = [];
|
|
294
|
-
switch (authParameters.operation) {
|
|
295
|
-
case "AssumeRoleWithWebIdentity": {
|
|
296
|
-
options.push(createSmithyApiNoAuthHttpAuthOption(authParameters));
|
|
297
|
-
break;
|
|
298
|
-
}
|
|
299
|
-
default: {
|
|
300
|
-
options.push(createAwsAuthSigv4HttpAuthOption(authParameters));
|
|
301
|
-
}
|
|
302
|
-
}
|
|
303
|
-
return options;
|
|
304
|
-
};
|
|
305
|
-
exports.defaultSTSHttpAuthSchemeProvider = defaultSTSHttpAuthSchemeProvider;
|
|
306
|
-
const resolveStsAuthConfig = (input) => Object.assign(input, {
|
|
307
|
-
stsClientCtor: STSClient_1.STSClient,
|
|
308
|
-
});
|
|
309
|
-
exports.resolveStsAuthConfig = resolveStsAuthConfig;
|
|
310
|
-
const resolveHttpAuthSchemeConfig = (config) => {
|
|
311
|
-
const config_0 = (0, exports.resolveStsAuthConfig)(config);
|
|
312
|
-
const config_1 = (0, core_1.resolveAwsSdkSigV4Config)(config_0);
|
|
313
|
-
return Object.assign(config_1, {
|
|
314
|
-
authSchemePreference: (0, util_middleware_1.normalizeProvider)(config.authSchemePreference ?? []),
|
|
315
|
-
});
|
|
316
|
-
};
|
|
317
|
-
exports.resolveHttpAuthSchemeConfig = resolveHttpAuthSchemeConfig;
|
|
318
|
-
|
|
319
|
-
|
|
320
|
-
/***/ }),
|
|
321
|
-
|
|
322
|
-
/***/ 6811:
|
|
323
|
-
/***/ ((__unused_webpack_module, exports) => {
|
|
324
|
-
|
|
325
|
-
|
|
326
|
-
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
327
|
-
exports.commonParams = exports.resolveClientEndpointParameters = void 0;
|
|
328
|
-
const resolveClientEndpointParameters = (options) => {
|
|
329
|
-
return Object.assign(options, {
|
|
330
|
-
useDualstackEndpoint: options.useDualstackEndpoint ?? false,
|
|
331
|
-
useFipsEndpoint: options.useFipsEndpoint ?? false,
|
|
332
|
-
useGlobalEndpoint: options.useGlobalEndpoint ?? false,
|
|
333
|
-
defaultSigningName: "sts",
|
|
334
|
-
});
|
|
335
|
-
};
|
|
336
|
-
exports.resolveClientEndpointParameters = resolveClientEndpointParameters;
|
|
337
|
-
exports.commonParams = {
|
|
338
|
-
UseGlobalEndpoint: { type: "builtInParams", name: "useGlobalEndpoint" },
|
|
339
|
-
UseFIPS: { type: "builtInParams", name: "useFipsEndpoint" },
|
|
340
|
-
Endpoint: { type: "builtInParams", name: "endpoint" },
|
|
341
|
-
Region: { type: "builtInParams", name: "region" },
|
|
342
|
-
UseDualStack: { type: "builtInParams", name: "useDualstackEndpoint" },
|
|
343
|
-
};
|
|
344
|
-
|
|
345
|
-
|
|
346
|
-
/***/ }),
|
|
347
|
-
|
|
348
|
-
/***/ 9765:
|
|
349
|
-
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
350
|
-
|
|
351
|
-
|
|
352
|
-
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
353
|
-
exports.defaultEndpointResolver = void 0;
|
|
354
|
-
const util_endpoints_1 = __webpack_require__(3068);
|
|
355
|
-
const util_endpoints_2 = __webpack_require__(9674);
|
|
356
|
-
const ruleset_1 = __webpack_require__(1670);
|
|
357
|
-
const cache = new util_endpoints_2.EndpointCache({
|
|
358
|
-
size: 50,
|
|
359
|
-
params: ["Endpoint", "Region", "UseDualStack", "UseFIPS", "UseGlobalEndpoint"],
|
|
360
|
-
});
|
|
361
|
-
const defaultEndpointResolver = (endpointParams, context = {}) => {
|
|
362
|
-
return cache.get(endpointParams, () => (0, util_endpoints_2.resolveEndpoint)(ruleset_1.ruleSet, {
|
|
363
|
-
endpointParams: endpointParams,
|
|
364
|
-
logger: context.logger,
|
|
365
|
-
}));
|
|
366
|
-
};
|
|
367
|
-
exports.defaultEndpointResolver = defaultEndpointResolver;
|
|
368
|
-
util_endpoints_2.customEndpointFunctions.aws = util_endpoints_1.awsEndpointFunctions;
|
|
369
|
-
|
|
370
|
-
|
|
371
|
-
/***/ }),
|
|
372
|
-
|
|
373
|
-
/***/ 1670:
|
|
374
|
-
/***/ ((__unused_webpack_module, exports) => {
|
|
375
|
-
|
|
376
142
|
|
|
377
|
-
Object.
|
|
378
|
-
exports
|
|
379
|
-
const F = "required", G = "type", H = "fn", I = "argv", J = "ref";
|
|
380
|
-
const a = false, b = true, c = "booleanEquals", d = "stringEquals", e = "sigv4", f = "sts", g = "us-east-1", h = "endpoint", i = "https://sts.{Region}.{PartitionResult#dnsSuffix}", j = "tree", k = "error", l = "getAttr", m = { [F]: false, [G]: "string" }, n = { [F]: true, "default": false, [G]: "boolean" }, o = { [J]: "Endpoint" }, p = { [H]: "isSet", [I]: [{ [J]: "Region" }] }, q = { [J]: "Region" }, r = { [H]: "aws.partition", [I]: [q], "assign": "PartitionResult" }, s = { [J]: "UseFIPS" }, t = { [J]: "UseDualStack" }, u = { "url": "https://sts.amazonaws.com", "properties": { "authSchemes": [{ "name": e, "signingName": f, "signingRegion": g }] }, "headers": {} }, v = {}, w = { "conditions": [{ [H]: d, [I]: [q, "aws-global"] }], [h]: u, [G]: h }, x = { [H]: c, [I]: [s, true] }, y = { [H]: c, [I]: [t, true] }, z = { [H]: l, [I]: [{ [J]: "PartitionResult" }, "supportsFIPS"] }, A = { [J]: "PartitionResult" }, B = { [H]: c, [I]: [true, { [H]: l, [I]: [A, "supportsDualStack"] }] }, C = [{ [H]: "isSet", [I]: [o] }], D = [x], E = [y];
|
|
381
|
-
const _data = { version: "1.0", parameters: { Region: m, UseDualStack: n, UseFIPS: n, Endpoint: m, UseGlobalEndpoint: n }, rules: [{ conditions: [{ [H]: c, [I]: [{ [J]: "UseGlobalEndpoint" }, b] }, { [H]: "not", [I]: C }, p, r, { [H]: c, [I]: [s, a] }, { [H]: c, [I]: [t, a] }], rules: [{ conditions: [{ [H]: d, [I]: [q, "ap-northeast-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "ap-south-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "ap-southeast-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "ap-southeast-2"] }], endpoint: u, [G]: h }, w, { conditions: [{ [H]: d, [I]: [q, "ca-central-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "eu-central-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "eu-north-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "eu-west-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "eu-west-2"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "eu-west-3"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "sa-east-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, g] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "us-east-2"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "us-west-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "us-west-2"] }], endpoint: u, [G]: h }, { endpoint: { url: i, properties: { authSchemes: [{ name: e, signingName: f, signingRegion: "{Region}" }] }, headers: v }, [G]: h }], [G]: j }, { conditions: C, rules: [{ conditions: D, error: "Invalid Configuration: FIPS and custom endpoint are not supported", [G]: k }, { conditions: E, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", [G]: k }, { endpoint: { url: o, properties: v, headers: v }, [G]: h }], [G]: j }, { conditions: [p], rules: [{ conditions: [r], rules: [{ conditions: [x, y], rules: [{ conditions: [{ [H]: c, [I]: [b, z] }, B], rules: [{ endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: v, headers: v }, [G]: h }], [G]: j }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", [G]: k }], [G]: j }, { conditions: D, rules: [{ conditions: [{ [H]: c, [I]: [z, b] }], rules: [{ conditions: [{ [H]: d, [I]: [{ [H]: l, [I]: [A, "name"] }, "aws-us-gov"] }], endpoint: { url: "https://sts.{Region}.amazonaws.com", properties: v, headers: v }, [G]: h }, { endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dnsSuffix}", properties: v, headers: v }, [G]: h }], [G]: j }, { error: "FIPS is enabled but this partition does not support FIPS", [G]: k }], [G]: j }, { conditions: E, rules: [{ conditions: [B], rules: [{ endpoint: { url: "https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: v, headers: v }, [G]: h }], [G]: j }, { error: "DualStack is enabled but this partition does not support DualStack", [G]: k }], [G]: j }, w, { endpoint: { url: i, properties: v, headers: v }, [G]: h }], [G]: j }], [G]: j }, { error: "Invalid Configuration: Missing Region", [G]: k }] };
|
|
382
|
-
exports.ruleSet = _data;
|
|
383
|
-
|
|
384
|
-
|
|
385
|
-
/***/ }),
|
|
386
|
-
|
|
387
|
-
/***/ 1136:
|
|
388
|
-
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
389
|
-
|
|
390
|
-
|
|
391
|
-
|
|
392
|
-
var STSClient = __webpack_require__(3723);
|
|
393
|
-
var smithyClient = __webpack_require__(1411);
|
|
394
|
-
var middlewareEndpoint = __webpack_require__(99);
|
|
395
|
-
var EndpointParameters = __webpack_require__(6811);
|
|
396
|
-
var schemas_0 = __webpack_require__(1684);
|
|
397
|
-
var errors = __webpack_require__(1688);
|
|
398
|
-
var client = __webpack_require__(5152);
|
|
399
|
-
var regionConfigResolver = __webpack_require__(6463);
|
|
400
|
-
var STSServiceException = __webpack_require__(7171);
|
|
401
|
-
|
|
402
|
-
class AssumeRoleCommand extends smithyClient.Command
|
|
403
|
-
.classBuilder()
|
|
404
|
-
.ep(EndpointParameters.commonParams)
|
|
405
|
-
.m(function (Command, cs, config, o) {
|
|
406
|
-
return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
|
|
407
|
-
})
|
|
408
|
-
.s("AWSSecurityTokenServiceV20110615", "AssumeRole", {})
|
|
409
|
-
.n("STSClient", "AssumeRoleCommand")
|
|
410
|
-
.sc(schemas_0.AssumeRole$)
|
|
411
|
-
.build() {
|
|
412
|
-
}
|
|
413
|
-
|
|
414
|
-
class AssumeRoleWithWebIdentityCommand extends smithyClient.Command
|
|
415
|
-
.classBuilder()
|
|
416
|
-
.ep(EndpointParameters.commonParams)
|
|
417
|
-
.m(function (Command, cs, config, o) {
|
|
418
|
-
return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
|
|
419
|
-
})
|
|
420
|
-
.s("AWSSecurityTokenServiceV20110615", "AssumeRoleWithWebIdentity", {})
|
|
421
|
-
.n("STSClient", "AssumeRoleWithWebIdentityCommand")
|
|
422
|
-
.sc(schemas_0.AssumeRoleWithWebIdentity$)
|
|
423
|
-
.build() {
|
|
424
|
-
}
|
|
425
|
-
|
|
426
|
-
const commands = {
|
|
427
|
-
AssumeRoleCommand,
|
|
428
|
-
AssumeRoleWithWebIdentityCommand,
|
|
429
|
-
};
|
|
430
|
-
class STS extends STSClient.STSClient {
|
|
431
|
-
}
|
|
432
|
-
smithyClient.createAggregatedClient(commands, STS);
|
|
433
|
-
|
|
434
|
-
const getAccountIdFromAssumedRoleUser = (assumedRoleUser) => {
|
|
435
|
-
if (typeof assumedRoleUser?.Arn === "string") {
|
|
436
|
-
const arnComponents = assumedRoleUser.Arn.split(":");
|
|
437
|
-
if (arnComponents.length > 4 && arnComponents[4] !== "") {
|
|
438
|
-
return arnComponents[4];
|
|
439
|
-
}
|
|
440
|
-
}
|
|
441
|
-
return undefined;
|
|
442
|
-
};
|
|
443
|
-
const resolveRegion = async (_region, _parentRegion, credentialProviderLogger, loaderConfig = {}) => {
|
|
444
|
-
const region = typeof _region === "function" ? await _region() : _region;
|
|
445
|
-
const parentRegion = typeof _parentRegion === "function" ? await _parentRegion() : _parentRegion;
|
|
446
|
-
let stsDefaultRegion = "";
|
|
447
|
-
const resolvedRegion = region ?? parentRegion ?? (stsDefaultRegion = await regionConfigResolver.stsRegionDefaultResolver(loaderConfig)());
|
|
448
|
-
credentialProviderLogger?.debug?.("@aws-sdk/client-sts::resolveRegion", "accepting first of:", `${region} (credential provider clientConfig)`, `${parentRegion} (contextual client)`, `${stsDefaultRegion} (STS default: AWS_REGION, profile region, or us-east-1)`);
|
|
449
|
-
return resolvedRegion;
|
|
450
|
-
};
|
|
451
|
-
const getDefaultRoleAssumer$1 = (stsOptions, STSClient) => {
|
|
452
|
-
let stsClient;
|
|
453
|
-
let closureSourceCreds;
|
|
454
|
-
return async (sourceCreds, params) => {
|
|
455
|
-
closureSourceCreds = sourceCreds;
|
|
456
|
-
if (!stsClient) {
|
|
457
|
-
const { logger = stsOptions?.parentClientConfig?.logger, profile = stsOptions?.parentClientConfig?.profile, region, requestHandler = stsOptions?.parentClientConfig?.requestHandler, credentialProviderLogger, userAgentAppId = stsOptions?.parentClientConfig?.userAgentAppId, } = stsOptions;
|
|
458
|
-
const resolvedRegion = await resolveRegion(region, stsOptions?.parentClientConfig?.region, credentialProviderLogger, {
|
|
459
|
-
logger,
|
|
460
|
-
profile,
|
|
461
|
-
});
|
|
462
|
-
const isCompatibleRequestHandler = !isH2(requestHandler);
|
|
463
|
-
stsClient = new STSClient({
|
|
464
|
-
...stsOptions,
|
|
465
|
-
userAgentAppId,
|
|
466
|
-
profile,
|
|
467
|
-
credentialDefaultProvider: () => async () => closureSourceCreds,
|
|
468
|
-
region: resolvedRegion,
|
|
469
|
-
requestHandler: isCompatibleRequestHandler ? requestHandler : undefined,
|
|
470
|
-
logger: logger,
|
|
471
|
-
});
|
|
472
|
-
}
|
|
473
|
-
const { Credentials, AssumedRoleUser } = await stsClient.send(new AssumeRoleCommand(params));
|
|
474
|
-
if (!Credentials || !Credentials.AccessKeyId || !Credentials.SecretAccessKey) {
|
|
475
|
-
throw new Error(`Invalid response from STS.assumeRole call with role ${params.RoleArn}`);
|
|
476
|
-
}
|
|
477
|
-
const accountId = getAccountIdFromAssumedRoleUser(AssumedRoleUser);
|
|
478
|
-
const credentials = {
|
|
479
|
-
accessKeyId: Credentials.AccessKeyId,
|
|
480
|
-
secretAccessKey: Credentials.SecretAccessKey,
|
|
481
|
-
sessionToken: Credentials.SessionToken,
|
|
482
|
-
expiration: Credentials.Expiration,
|
|
483
|
-
...(Credentials.CredentialScope && { credentialScope: Credentials.CredentialScope }),
|
|
484
|
-
...(accountId && { accountId }),
|
|
485
|
-
};
|
|
486
|
-
client.setCredentialFeature(credentials, "CREDENTIALS_STS_ASSUME_ROLE", "i");
|
|
487
|
-
return credentials;
|
|
488
|
-
};
|
|
489
|
-
};
|
|
490
|
-
const getDefaultRoleAssumerWithWebIdentity$1 = (stsOptions, STSClient) => {
|
|
491
|
-
let stsClient;
|
|
492
|
-
return async (params) => {
|
|
493
|
-
if (!stsClient) {
|
|
494
|
-
const { logger = stsOptions?.parentClientConfig?.logger, profile = stsOptions?.parentClientConfig?.profile, region, requestHandler = stsOptions?.parentClientConfig?.requestHandler, credentialProviderLogger, userAgentAppId = stsOptions?.parentClientConfig?.userAgentAppId, } = stsOptions;
|
|
495
|
-
const resolvedRegion = await resolveRegion(region, stsOptions?.parentClientConfig?.region, credentialProviderLogger, {
|
|
496
|
-
logger,
|
|
497
|
-
profile,
|
|
498
|
-
});
|
|
499
|
-
const isCompatibleRequestHandler = !isH2(requestHandler);
|
|
500
|
-
stsClient = new STSClient({
|
|
501
|
-
...stsOptions,
|
|
502
|
-
userAgentAppId,
|
|
503
|
-
profile,
|
|
504
|
-
region: resolvedRegion,
|
|
505
|
-
requestHandler: isCompatibleRequestHandler ? requestHandler : undefined,
|
|
506
|
-
logger: logger,
|
|
507
|
-
});
|
|
508
|
-
}
|
|
509
|
-
const { Credentials, AssumedRoleUser } = await stsClient.send(new AssumeRoleWithWebIdentityCommand(params));
|
|
510
|
-
if (!Credentials || !Credentials.AccessKeyId || !Credentials.SecretAccessKey) {
|
|
511
|
-
throw new Error(`Invalid response from STS.assumeRoleWithWebIdentity call with role ${params.RoleArn}`);
|
|
512
|
-
}
|
|
513
|
-
const accountId = getAccountIdFromAssumedRoleUser(AssumedRoleUser);
|
|
514
|
-
const credentials = {
|
|
515
|
-
accessKeyId: Credentials.AccessKeyId,
|
|
516
|
-
secretAccessKey: Credentials.SecretAccessKey,
|
|
517
|
-
sessionToken: Credentials.SessionToken,
|
|
518
|
-
expiration: Credentials.Expiration,
|
|
519
|
-
...(Credentials.CredentialScope && { credentialScope: Credentials.CredentialScope }),
|
|
520
|
-
...(accountId && { accountId }),
|
|
521
|
-
};
|
|
522
|
-
if (accountId) {
|
|
523
|
-
client.setCredentialFeature(credentials, "RESOLVED_ACCOUNT_ID", "T");
|
|
524
|
-
}
|
|
525
|
-
client.setCredentialFeature(credentials, "CREDENTIALS_STS_ASSUME_ROLE_WEB_ID", "k");
|
|
526
|
-
return credentials;
|
|
527
|
-
};
|
|
528
|
-
};
|
|
529
|
-
const isH2 = (requestHandler) => {
|
|
530
|
-
return requestHandler?.metadata?.handlerProtocol === "h2";
|
|
531
|
-
};
|
|
532
|
-
|
|
533
|
-
const getCustomizableStsClientCtor = (baseCtor, customizations) => {
|
|
534
|
-
if (!customizations)
|
|
535
|
-
return baseCtor;
|
|
536
|
-
else
|
|
537
|
-
return class CustomizableSTSClient extends baseCtor {
|
|
538
|
-
constructor(config) {
|
|
539
|
-
super(config);
|
|
540
|
-
for (const customization of customizations) {
|
|
541
|
-
this.middlewareStack.use(customization);
|
|
542
|
-
}
|
|
543
|
-
}
|
|
544
|
-
};
|
|
545
|
-
};
|
|
546
|
-
const getDefaultRoleAssumer = (stsOptions = {}, stsPlugins) => getDefaultRoleAssumer$1(stsOptions, getCustomizableStsClientCtor(STSClient.STSClient, stsPlugins));
|
|
547
|
-
const getDefaultRoleAssumerWithWebIdentity = (stsOptions = {}, stsPlugins) => getDefaultRoleAssumerWithWebIdentity$1(stsOptions, getCustomizableStsClientCtor(STSClient.STSClient, stsPlugins));
|
|
548
|
-
const decorateDefaultCredentialProvider = (provider) => (input) => provider({
|
|
549
|
-
roleAssumer: getDefaultRoleAssumer(input),
|
|
550
|
-
roleAssumerWithWebIdentity: getDefaultRoleAssumerWithWebIdentity(input),
|
|
551
|
-
...input,
|
|
552
|
-
});
|
|
553
|
-
|
|
554
|
-
Object.defineProperty(exports, "$Command", ({
|
|
555
|
-
enumerable: true,
|
|
556
|
-
get: function () { return smithyClient.Command; }
|
|
557
|
-
}));
|
|
558
|
-
Object.defineProperty(exports, "STSServiceException", ({
|
|
559
|
-
enumerable: true,
|
|
560
|
-
get: function () { return STSServiceException.STSServiceException; }
|
|
561
|
-
}));
|
|
562
|
-
exports.AssumeRoleCommand = AssumeRoleCommand;
|
|
563
|
-
exports.AssumeRoleWithWebIdentityCommand = AssumeRoleWithWebIdentityCommand;
|
|
564
|
-
exports.STS = STS;
|
|
565
|
-
exports.decorateDefaultCredentialProvider = decorateDefaultCredentialProvider;
|
|
566
|
-
exports.getDefaultRoleAssumer = getDefaultRoleAssumer;
|
|
567
|
-
exports.getDefaultRoleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity;
|
|
568
|
-
Object.keys(STSClient).forEach(function (k) {
|
|
569
|
-
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) Object.defineProperty(exports, k, {
|
|
570
|
-
enumerable: true,
|
|
571
|
-
get: function () { return STSClient[k]; }
|
|
572
|
-
});
|
|
573
|
-
});
|
|
574
|
-
Object.keys(schemas_0).forEach(function (k) {
|
|
575
|
-
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) Object.defineProperty(exports, k, {
|
|
576
|
-
enumerable: true,
|
|
577
|
-
get: function () { return schemas_0[k]; }
|
|
578
|
-
});
|
|
579
|
-
});
|
|
580
|
-
Object.keys(errors).forEach(function (k) {
|
|
581
|
-
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) Object.defineProperty(exports, k, {
|
|
582
|
-
enumerable: true,
|
|
583
|
-
get: function () { return errors[k]; }
|
|
584
|
-
});
|
|
143
|
+
Object.keys(fromWebToken).forEach(function (k) {
|
|
144
|
+
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = fromWebToken[k];
|
|
585
145
|
});
|
|
586
146
|
|
|
587
147
|
|
|
588
|
-
/***/ }),
|
|
589
|
-
|
|
590
|
-
/***/ 7171:
|
|
591
|
-
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
592
|
-
|
|
593
|
-
|
|
594
|
-
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
595
|
-
exports.STSServiceException = exports.__ServiceException = void 0;
|
|
596
|
-
const smithy_client_1 = __webpack_require__(1411);
|
|
597
|
-
Object.defineProperty(exports, "__ServiceException", ({ enumerable: true, get: function () { return smithy_client_1.ServiceException; } }));
|
|
598
|
-
class STSServiceException extends smithy_client_1.ServiceException {
|
|
599
|
-
constructor(options) {
|
|
600
|
-
super(options);
|
|
601
|
-
Object.setPrototypeOf(this, STSServiceException.prototype);
|
|
602
|
-
}
|
|
603
|
-
}
|
|
604
|
-
exports.STSServiceException = STSServiceException;
|
|
605
|
-
|
|
606
|
-
|
|
607
|
-
/***/ }),
|
|
608
|
-
|
|
609
|
-
/***/ 1688:
|
|
610
|
-
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
611
|
-
|
|
612
|
-
|
|
613
|
-
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
614
|
-
exports.IDPCommunicationErrorException = exports.InvalidIdentityTokenException = exports.IDPRejectedClaimException = exports.RegionDisabledException = exports.PackedPolicyTooLargeException = exports.MalformedPolicyDocumentException = exports.ExpiredTokenException = void 0;
|
|
615
|
-
const STSServiceException_1 = __webpack_require__(7171);
|
|
616
|
-
class ExpiredTokenException extends STSServiceException_1.STSServiceException {
|
|
617
|
-
name = "ExpiredTokenException";
|
|
618
|
-
$fault = "client";
|
|
619
|
-
constructor(opts) {
|
|
620
|
-
super({
|
|
621
|
-
name: "ExpiredTokenException",
|
|
622
|
-
$fault: "client",
|
|
623
|
-
...opts,
|
|
624
|
-
});
|
|
625
|
-
Object.setPrototypeOf(this, ExpiredTokenException.prototype);
|
|
626
|
-
}
|
|
627
|
-
}
|
|
628
|
-
exports.ExpiredTokenException = ExpiredTokenException;
|
|
629
|
-
class MalformedPolicyDocumentException extends STSServiceException_1.STSServiceException {
|
|
630
|
-
name = "MalformedPolicyDocumentException";
|
|
631
|
-
$fault = "client";
|
|
632
|
-
constructor(opts) {
|
|
633
|
-
super({
|
|
634
|
-
name: "MalformedPolicyDocumentException",
|
|
635
|
-
$fault: "client",
|
|
636
|
-
...opts,
|
|
637
|
-
});
|
|
638
|
-
Object.setPrototypeOf(this, MalformedPolicyDocumentException.prototype);
|
|
639
|
-
}
|
|
640
|
-
}
|
|
641
|
-
exports.MalformedPolicyDocumentException = MalformedPolicyDocumentException;
|
|
642
|
-
class PackedPolicyTooLargeException extends STSServiceException_1.STSServiceException {
|
|
643
|
-
name = "PackedPolicyTooLargeException";
|
|
644
|
-
$fault = "client";
|
|
645
|
-
constructor(opts) {
|
|
646
|
-
super({
|
|
647
|
-
name: "PackedPolicyTooLargeException",
|
|
648
|
-
$fault: "client",
|
|
649
|
-
...opts,
|
|
650
|
-
});
|
|
651
|
-
Object.setPrototypeOf(this, PackedPolicyTooLargeException.prototype);
|
|
652
|
-
}
|
|
653
|
-
}
|
|
654
|
-
exports.PackedPolicyTooLargeException = PackedPolicyTooLargeException;
|
|
655
|
-
class RegionDisabledException extends STSServiceException_1.STSServiceException {
|
|
656
|
-
name = "RegionDisabledException";
|
|
657
|
-
$fault = "client";
|
|
658
|
-
constructor(opts) {
|
|
659
|
-
super({
|
|
660
|
-
name: "RegionDisabledException",
|
|
661
|
-
$fault: "client",
|
|
662
|
-
...opts,
|
|
663
|
-
});
|
|
664
|
-
Object.setPrototypeOf(this, RegionDisabledException.prototype);
|
|
665
|
-
}
|
|
666
|
-
}
|
|
667
|
-
exports.RegionDisabledException = RegionDisabledException;
|
|
668
|
-
class IDPRejectedClaimException extends STSServiceException_1.STSServiceException {
|
|
669
|
-
name = "IDPRejectedClaimException";
|
|
670
|
-
$fault = "client";
|
|
671
|
-
constructor(opts) {
|
|
672
|
-
super({
|
|
673
|
-
name: "IDPRejectedClaimException",
|
|
674
|
-
$fault: "client",
|
|
675
|
-
...opts,
|
|
676
|
-
});
|
|
677
|
-
Object.setPrototypeOf(this, IDPRejectedClaimException.prototype);
|
|
678
|
-
}
|
|
679
|
-
}
|
|
680
|
-
exports.IDPRejectedClaimException = IDPRejectedClaimException;
|
|
681
|
-
class InvalidIdentityTokenException extends STSServiceException_1.STSServiceException {
|
|
682
|
-
name = "InvalidIdentityTokenException";
|
|
683
|
-
$fault = "client";
|
|
684
|
-
constructor(opts) {
|
|
685
|
-
super({
|
|
686
|
-
name: "InvalidIdentityTokenException",
|
|
687
|
-
$fault: "client",
|
|
688
|
-
...opts,
|
|
689
|
-
});
|
|
690
|
-
Object.setPrototypeOf(this, InvalidIdentityTokenException.prototype);
|
|
691
|
-
}
|
|
692
|
-
}
|
|
693
|
-
exports.InvalidIdentityTokenException = InvalidIdentityTokenException;
|
|
694
|
-
class IDPCommunicationErrorException extends STSServiceException_1.STSServiceException {
|
|
695
|
-
name = "IDPCommunicationErrorException";
|
|
696
|
-
$fault = "client";
|
|
697
|
-
constructor(opts) {
|
|
698
|
-
super({
|
|
699
|
-
name: "IDPCommunicationErrorException",
|
|
700
|
-
$fault: "client",
|
|
701
|
-
...opts,
|
|
702
|
-
});
|
|
703
|
-
Object.setPrototypeOf(this, IDPCommunicationErrorException.prototype);
|
|
704
|
-
}
|
|
705
|
-
}
|
|
706
|
-
exports.IDPCommunicationErrorException = IDPCommunicationErrorException;
|
|
707
|
-
|
|
708
|
-
|
|
709
|
-
/***/ }),
|
|
710
|
-
|
|
711
|
-
/***/ 6578:
|
|
712
|
-
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
713
|
-
|
|
714
|
-
|
|
715
|
-
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
716
|
-
exports.getRuntimeConfig = void 0;
|
|
717
|
-
const tslib_1 = __webpack_require__(1860);
|
|
718
|
-
const package_json_1 = tslib_1.__importDefault(__webpack_require__(9955));
|
|
719
|
-
const core_1 = __webpack_require__(8704);
|
|
720
|
-
const util_user_agent_node_1 = __webpack_require__(1656);
|
|
721
|
-
const config_resolver_1 = __webpack_require__(9316);
|
|
722
|
-
const core_2 = __webpack_require__(402);
|
|
723
|
-
const hash_node_1 = __webpack_require__(5092);
|
|
724
|
-
const middleware_retry_1 = __webpack_require__(9618);
|
|
725
|
-
const node_config_provider_1 = __webpack_require__(5704);
|
|
726
|
-
const node_http_handler_1 = __webpack_require__(1279);
|
|
727
|
-
const smithy_client_1 = __webpack_require__(1411);
|
|
728
|
-
const util_body_length_node_1 = __webpack_require__(3638);
|
|
729
|
-
const util_defaults_mode_node_1 = __webpack_require__(5435);
|
|
730
|
-
const util_retry_1 = __webpack_require__(5518);
|
|
731
|
-
const runtimeConfig_shared_1 = __webpack_require__(4443);
|
|
732
|
-
const getRuntimeConfig = (config) => {
|
|
733
|
-
(0, smithy_client_1.emitWarningIfUnsupportedVersion)(process.version);
|
|
734
|
-
const defaultsMode = (0, util_defaults_mode_node_1.resolveDefaultsModeConfig)(config);
|
|
735
|
-
const defaultConfigProvider = () => defaultsMode().then(smithy_client_1.loadConfigsForDefaultMode);
|
|
736
|
-
const clientSharedValues = (0, runtimeConfig_shared_1.getRuntimeConfig)(config);
|
|
737
|
-
(0, core_1.emitWarningIfUnsupportedVersion)(process.version);
|
|
738
|
-
const loaderConfig = {
|
|
739
|
-
profile: config?.profile,
|
|
740
|
-
logger: clientSharedValues.logger,
|
|
741
|
-
};
|
|
742
|
-
return {
|
|
743
|
-
...clientSharedValues,
|
|
744
|
-
...config,
|
|
745
|
-
runtime: "node",
|
|
746
|
-
defaultsMode,
|
|
747
|
-
authSchemePreference: config?.authSchemePreference ?? (0, node_config_provider_1.loadConfig)(core_1.NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, loaderConfig),
|
|
748
|
-
bodyLengthChecker: config?.bodyLengthChecker ?? util_body_length_node_1.calculateBodyLength,
|
|
749
|
-
defaultUserAgentProvider: config?.defaultUserAgentProvider ??
|
|
750
|
-
(0, util_user_agent_node_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
|
|
751
|
-
httpAuthSchemes: config?.httpAuthSchemes ?? [
|
|
752
|
-
{
|
|
753
|
-
schemeId: "aws.auth#sigv4",
|
|
754
|
-
identityProvider: (ipc) => ipc.getIdentityProvider("aws.auth#sigv4") ||
|
|
755
|
-
(async (idProps) => await config.credentialDefaultProvider(idProps?.__config || {})()),
|
|
756
|
-
signer: new core_1.AwsSdkSigV4Signer(),
|
|
757
|
-
},
|
|
758
|
-
{
|
|
759
|
-
schemeId: "smithy.api#noAuth",
|
|
760
|
-
identityProvider: (ipc) => ipc.getIdentityProvider("smithy.api#noAuth") || (async () => ({})),
|
|
761
|
-
signer: new core_2.NoAuthSigner(),
|
|
762
|
-
},
|
|
763
|
-
],
|
|
764
|
-
maxAttempts: config?.maxAttempts ?? (0, node_config_provider_1.loadConfig)(middleware_retry_1.NODE_MAX_ATTEMPT_CONFIG_OPTIONS, config),
|
|
765
|
-
region: config?.region ??
|
|
766
|
-
(0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_REGION_CONFIG_OPTIONS, { ...config_resolver_1.NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
|
|
767
|
-
requestHandler: node_http_handler_1.NodeHttpHandler.create(config?.requestHandler ?? defaultConfigProvider),
|
|
768
|
-
retryMode: config?.retryMode ??
|
|
769
|
-
(0, node_config_provider_1.loadConfig)({
|
|
770
|
-
...middleware_retry_1.NODE_RETRY_MODE_CONFIG_OPTIONS,
|
|
771
|
-
default: async () => (await defaultConfigProvider()).retryMode || util_retry_1.DEFAULT_RETRY_MODE,
|
|
772
|
-
}, config),
|
|
773
|
-
sha256: config?.sha256 ?? hash_node_1.Hash.bind(null, "sha256"),
|
|
774
|
-
streamCollector: config?.streamCollector ?? node_http_handler_1.streamCollector,
|
|
775
|
-
useDualstackEndpoint: config?.useDualstackEndpoint ?? (0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS, loaderConfig),
|
|
776
|
-
useFipsEndpoint: config?.useFipsEndpoint ?? (0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS, loaderConfig),
|
|
777
|
-
userAgentAppId: config?.userAgentAppId ?? (0, node_config_provider_1.loadConfig)(util_user_agent_node_1.NODE_APP_ID_CONFIG_OPTIONS, loaderConfig),
|
|
778
|
-
};
|
|
779
|
-
};
|
|
780
|
-
exports.getRuntimeConfig = getRuntimeConfig;
|
|
781
|
-
|
|
782
|
-
|
|
783
|
-
/***/ }),
|
|
784
|
-
|
|
785
|
-
/***/ 4443:
|
|
786
|
-
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
787
|
-
|
|
788
|
-
|
|
789
|
-
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
790
|
-
exports.getRuntimeConfig = void 0;
|
|
791
|
-
const core_1 = __webpack_require__(8704);
|
|
792
|
-
const protocols_1 = __webpack_require__(7288);
|
|
793
|
-
const core_2 = __webpack_require__(402);
|
|
794
|
-
const smithy_client_1 = __webpack_require__(1411);
|
|
795
|
-
const url_parser_1 = __webpack_require__(4494);
|
|
796
|
-
const util_base64_1 = __webpack_require__(8385);
|
|
797
|
-
const util_utf8_1 = __webpack_require__(1577);
|
|
798
|
-
const httpAuthSchemeProvider_1 = __webpack_require__(7851);
|
|
799
|
-
const endpointResolver_1 = __webpack_require__(9765);
|
|
800
|
-
const schemas_0_1 = __webpack_require__(1684);
|
|
801
|
-
const getRuntimeConfig = (config) => {
|
|
802
|
-
return {
|
|
803
|
-
apiVersion: "2011-06-15",
|
|
804
|
-
base64Decoder: config?.base64Decoder ?? util_base64_1.fromBase64,
|
|
805
|
-
base64Encoder: config?.base64Encoder ?? util_base64_1.toBase64,
|
|
806
|
-
disableHostPrefix: config?.disableHostPrefix ?? false,
|
|
807
|
-
endpointProvider: config?.endpointProvider ?? endpointResolver_1.defaultEndpointResolver,
|
|
808
|
-
extensions: config?.extensions ?? [],
|
|
809
|
-
httpAuthSchemeProvider: config?.httpAuthSchemeProvider ?? httpAuthSchemeProvider_1.defaultSTSHttpAuthSchemeProvider,
|
|
810
|
-
httpAuthSchemes: config?.httpAuthSchemes ?? [
|
|
811
|
-
{
|
|
812
|
-
schemeId: "aws.auth#sigv4",
|
|
813
|
-
identityProvider: (ipc) => ipc.getIdentityProvider("aws.auth#sigv4"),
|
|
814
|
-
signer: new core_1.AwsSdkSigV4Signer(),
|
|
815
|
-
},
|
|
816
|
-
{
|
|
817
|
-
schemeId: "smithy.api#noAuth",
|
|
818
|
-
identityProvider: (ipc) => ipc.getIdentityProvider("smithy.api#noAuth") || (async () => ({})),
|
|
819
|
-
signer: new core_2.NoAuthSigner(),
|
|
820
|
-
},
|
|
821
|
-
],
|
|
822
|
-
logger: config?.logger ?? new smithy_client_1.NoOpLogger(),
|
|
823
|
-
protocol: config?.protocol ?? protocols_1.AwsQueryProtocol,
|
|
824
|
-
protocolSettings: config?.protocolSettings ?? {
|
|
825
|
-
defaultNamespace: "com.amazonaws.sts",
|
|
826
|
-
errorTypeRegistries: schemas_0_1.errorTypeRegistries,
|
|
827
|
-
xmlNamespace: "https://sts.amazonaws.com/doc/2011-06-15/",
|
|
828
|
-
version: "2011-06-15",
|
|
829
|
-
serviceTarget: "AWSSecurityTokenServiceV20110615",
|
|
830
|
-
},
|
|
831
|
-
serviceId: config?.serviceId ?? "STS",
|
|
832
|
-
urlParser: config?.urlParser ?? url_parser_1.parseUrl,
|
|
833
|
-
utf8Decoder: config?.utf8Decoder ?? util_utf8_1.fromUtf8,
|
|
834
|
-
utf8Encoder: config?.utf8Encoder ?? util_utf8_1.toUtf8,
|
|
835
|
-
};
|
|
836
|
-
};
|
|
837
|
-
exports.getRuntimeConfig = getRuntimeConfig;
|
|
838
|
-
|
|
839
|
-
|
|
840
|
-
/***/ }),
|
|
841
|
-
|
|
842
|
-
/***/ 7742:
|
|
843
|
-
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
844
|
-
|
|
845
|
-
|
|
846
|
-
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
847
|
-
exports.resolveRuntimeExtensions = void 0;
|
|
848
|
-
const region_config_resolver_1 = __webpack_require__(6463);
|
|
849
|
-
const protocol_http_1 = __webpack_require__(2356);
|
|
850
|
-
const smithy_client_1 = __webpack_require__(1411);
|
|
851
|
-
const httpAuthExtensionConfiguration_1 = __webpack_require__(4532);
|
|
852
|
-
const resolveRuntimeExtensions = (runtimeConfig, extensions) => {
|
|
853
|
-
const extensionConfiguration = Object.assign((0, region_config_resolver_1.getAwsRegionExtensionConfiguration)(runtimeConfig), (0, smithy_client_1.getDefaultExtensionConfiguration)(runtimeConfig), (0, protocol_http_1.getHttpHandlerExtensionConfiguration)(runtimeConfig), (0, httpAuthExtensionConfiguration_1.getHttpAuthExtensionConfiguration)(runtimeConfig));
|
|
854
|
-
extensions.forEach((extension) => extension.configure(extensionConfiguration));
|
|
855
|
-
return Object.assign(runtimeConfig, (0, region_config_resolver_1.resolveAwsRegionExtensionConfiguration)(extensionConfiguration), (0, smithy_client_1.resolveDefaultRuntimeConfig)(extensionConfiguration), (0, protocol_http_1.resolveHttpHandlerRuntimeConfig)(extensionConfiguration), (0, httpAuthExtensionConfiguration_1.resolveHttpAuthRuntimeConfig)(extensionConfiguration));
|
|
856
|
-
};
|
|
857
|
-
exports.resolveRuntimeExtensions = resolveRuntimeExtensions;
|
|
858
|
-
|
|
859
|
-
|
|
860
|
-
/***/ }),
|
|
861
|
-
|
|
862
|
-
/***/ 1684:
|
|
863
|
-
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
864
|
-
|
|
865
|
-
|
|
866
|
-
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
867
|
-
exports.AssumeRoleWithWebIdentity$ = exports.AssumeRole$ = exports.Tag$ = exports.ProvidedContext$ = exports.PolicyDescriptorType$ = exports.Credentials$ = exports.AssumeRoleWithWebIdentityResponse$ = exports.AssumeRoleWithWebIdentityRequest$ = exports.AssumeRoleResponse$ = exports.AssumeRoleRequest$ = exports.AssumedRoleUser$ = exports.errorTypeRegistries = exports.RegionDisabledException$ = exports.PackedPolicyTooLargeException$ = exports.MalformedPolicyDocumentException$ = exports.InvalidIdentityTokenException$ = exports.IDPRejectedClaimException$ = exports.IDPCommunicationErrorException$ = exports.ExpiredTokenException$ = exports.STSServiceException$ = void 0;
|
|
868
|
-
const _A = "Arn";
|
|
869
|
-
const _AKI = "AccessKeyId";
|
|
870
|
-
const _AR = "AssumeRole";
|
|
871
|
-
const _ARI = "AssumedRoleId";
|
|
872
|
-
const _ARR = "AssumeRoleRequest";
|
|
873
|
-
const _ARRs = "AssumeRoleResponse";
|
|
874
|
-
const _ARU = "AssumedRoleUser";
|
|
875
|
-
const _ARWWI = "AssumeRoleWithWebIdentity";
|
|
876
|
-
const _ARWWIR = "AssumeRoleWithWebIdentityRequest";
|
|
877
|
-
const _ARWWIRs = "AssumeRoleWithWebIdentityResponse";
|
|
878
|
-
const _Au = "Audience";
|
|
879
|
-
const _C = "Credentials";
|
|
880
|
-
const _CA = "ContextAssertion";
|
|
881
|
-
const _DS = "DurationSeconds";
|
|
882
|
-
const _E = "Expiration";
|
|
883
|
-
const _EI = "ExternalId";
|
|
884
|
-
const _ETE = "ExpiredTokenException";
|
|
885
|
-
const _IDPCEE = "IDPCommunicationErrorException";
|
|
886
|
-
const _IDPRCE = "IDPRejectedClaimException";
|
|
887
|
-
const _IITE = "InvalidIdentityTokenException";
|
|
888
|
-
const _K = "Key";
|
|
889
|
-
const _MPDE = "MalformedPolicyDocumentException";
|
|
890
|
-
const _P = "Policy";
|
|
891
|
-
const _PA = "PolicyArns";
|
|
892
|
-
const _PAr = "ProviderArn";
|
|
893
|
-
const _PC = "ProvidedContexts";
|
|
894
|
-
const _PCLT = "ProvidedContextsListType";
|
|
895
|
-
const _PCr = "ProvidedContext";
|
|
896
|
-
const _PDT = "PolicyDescriptorType";
|
|
897
|
-
const _PI = "ProviderId";
|
|
898
|
-
const _PPS = "PackedPolicySize";
|
|
899
|
-
const _PPTLE = "PackedPolicyTooLargeException";
|
|
900
|
-
const _Pr = "Provider";
|
|
901
|
-
const _RA = "RoleArn";
|
|
902
|
-
const _RDE = "RegionDisabledException";
|
|
903
|
-
const _RSN = "RoleSessionName";
|
|
904
|
-
const _SAK = "SecretAccessKey";
|
|
905
|
-
const _SFWIT = "SubjectFromWebIdentityToken";
|
|
906
|
-
const _SI = "SourceIdentity";
|
|
907
|
-
const _SN = "SerialNumber";
|
|
908
|
-
const _ST = "SessionToken";
|
|
909
|
-
const _T = "Tags";
|
|
910
|
-
const _TC = "TokenCode";
|
|
911
|
-
const _TTK = "TransitiveTagKeys";
|
|
912
|
-
const _Ta = "Tag";
|
|
913
|
-
const _V = "Value";
|
|
914
|
-
const _WIT = "WebIdentityToken";
|
|
915
|
-
const _a = "arn";
|
|
916
|
-
const _aKST = "accessKeySecretType";
|
|
917
|
-
const _aQE = "awsQueryError";
|
|
918
|
-
const _c = "client";
|
|
919
|
-
const _cTT = "clientTokenType";
|
|
920
|
-
const _e = "error";
|
|
921
|
-
const _hE = "httpError";
|
|
922
|
-
const _m = "message";
|
|
923
|
-
const _pDLT = "policyDescriptorListType";
|
|
924
|
-
const _s = "smithy.ts.sdk.synthetic.com.amazonaws.sts";
|
|
925
|
-
const _tLT = "tagListType";
|
|
926
|
-
const n0 = "com.amazonaws.sts";
|
|
927
|
-
const schema_1 = __webpack_require__(6890);
|
|
928
|
-
const errors_1 = __webpack_require__(1688);
|
|
929
|
-
const STSServiceException_1 = __webpack_require__(7171);
|
|
930
|
-
const _s_registry = schema_1.TypeRegistry.for(_s);
|
|
931
|
-
exports.STSServiceException$ = [-3, _s, "STSServiceException", 0, [], []];
|
|
932
|
-
_s_registry.registerError(exports.STSServiceException$, STSServiceException_1.STSServiceException);
|
|
933
|
-
const n0_registry = schema_1.TypeRegistry.for(n0);
|
|
934
|
-
exports.ExpiredTokenException$ = [
|
|
935
|
-
-3,
|
|
936
|
-
n0,
|
|
937
|
-
_ETE,
|
|
938
|
-
{ [_aQE]: [`ExpiredTokenException`, 400], [_e]: _c, [_hE]: 400 },
|
|
939
|
-
[_m],
|
|
940
|
-
[0],
|
|
941
|
-
];
|
|
942
|
-
n0_registry.registerError(exports.ExpiredTokenException$, errors_1.ExpiredTokenException);
|
|
943
|
-
exports.IDPCommunicationErrorException$ = [
|
|
944
|
-
-3,
|
|
945
|
-
n0,
|
|
946
|
-
_IDPCEE,
|
|
947
|
-
{ [_aQE]: [`IDPCommunicationError`, 400], [_e]: _c, [_hE]: 400 },
|
|
948
|
-
[_m],
|
|
949
|
-
[0],
|
|
950
|
-
];
|
|
951
|
-
n0_registry.registerError(exports.IDPCommunicationErrorException$, errors_1.IDPCommunicationErrorException);
|
|
952
|
-
exports.IDPRejectedClaimException$ = [
|
|
953
|
-
-3,
|
|
954
|
-
n0,
|
|
955
|
-
_IDPRCE,
|
|
956
|
-
{ [_aQE]: [`IDPRejectedClaim`, 403], [_e]: _c, [_hE]: 403 },
|
|
957
|
-
[_m],
|
|
958
|
-
[0],
|
|
959
|
-
];
|
|
960
|
-
n0_registry.registerError(exports.IDPRejectedClaimException$, errors_1.IDPRejectedClaimException);
|
|
961
|
-
exports.InvalidIdentityTokenException$ = [
|
|
962
|
-
-3,
|
|
963
|
-
n0,
|
|
964
|
-
_IITE,
|
|
965
|
-
{ [_aQE]: [`InvalidIdentityToken`, 400], [_e]: _c, [_hE]: 400 },
|
|
966
|
-
[_m],
|
|
967
|
-
[0],
|
|
968
|
-
];
|
|
969
|
-
n0_registry.registerError(exports.InvalidIdentityTokenException$, errors_1.InvalidIdentityTokenException);
|
|
970
|
-
exports.MalformedPolicyDocumentException$ = [
|
|
971
|
-
-3,
|
|
972
|
-
n0,
|
|
973
|
-
_MPDE,
|
|
974
|
-
{ [_aQE]: [`MalformedPolicyDocument`, 400], [_e]: _c, [_hE]: 400 },
|
|
975
|
-
[_m],
|
|
976
|
-
[0],
|
|
977
|
-
];
|
|
978
|
-
n0_registry.registerError(exports.MalformedPolicyDocumentException$, errors_1.MalformedPolicyDocumentException);
|
|
979
|
-
exports.PackedPolicyTooLargeException$ = [
|
|
980
|
-
-3,
|
|
981
|
-
n0,
|
|
982
|
-
_PPTLE,
|
|
983
|
-
{ [_aQE]: [`PackedPolicyTooLarge`, 400], [_e]: _c, [_hE]: 400 },
|
|
984
|
-
[_m],
|
|
985
|
-
[0],
|
|
986
|
-
];
|
|
987
|
-
n0_registry.registerError(exports.PackedPolicyTooLargeException$, errors_1.PackedPolicyTooLargeException);
|
|
988
|
-
exports.RegionDisabledException$ = [
|
|
989
|
-
-3,
|
|
990
|
-
n0,
|
|
991
|
-
_RDE,
|
|
992
|
-
{ [_aQE]: [`RegionDisabledException`, 403], [_e]: _c, [_hE]: 403 },
|
|
993
|
-
[_m],
|
|
994
|
-
[0],
|
|
995
|
-
];
|
|
996
|
-
n0_registry.registerError(exports.RegionDisabledException$, errors_1.RegionDisabledException);
|
|
997
|
-
exports.errorTypeRegistries = [_s_registry, n0_registry];
|
|
998
|
-
var accessKeySecretType = [0, n0, _aKST, 8, 0];
|
|
999
|
-
var clientTokenType = [0, n0, _cTT, 8, 0];
|
|
1000
|
-
exports.AssumedRoleUser$ = [3, n0, _ARU, 0, [_ARI, _A], [0, 0], 2];
|
|
1001
|
-
exports.AssumeRoleRequest$ = [
|
|
1002
|
-
3,
|
|
1003
|
-
n0,
|
|
1004
|
-
_ARR,
|
|
1005
|
-
0,
|
|
1006
|
-
[_RA, _RSN, _PA, _P, _DS, _T, _TTK, _EI, _SN, _TC, _SI, _PC],
|
|
1007
|
-
[0, 0, () => policyDescriptorListType, 0, 1, () => tagListType, 64 | 0, 0, 0, 0, 0, () => ProvidedContextsListType],
|
|
1008
|
-
2,
|
|
1009
|
-
];
|
|
1010
|
-
exports.AssumeRoleResponse$ = [
|
|
1011
|
-
3,
|
|
1012
|
-
n0,
|
|
1013
|
-
_ARRs,
|
|
1014
|
-
0,
|
|
1015
|
-
[_C, _ARU, _PPS, _SI],
|
|
1016
|
-
[[() => exports.Credentials$, 0], () => exports.AssumedRoleUser$, 1, 0],
|
|
1017
|
-
];
|
|
1018
|
-
exports.AssumeRoleWithWebIdentityRequest$ = [
|
|
1019
|
-
3,
|
|
1020
|
-
n0,
|
|
1021
|
-
_ARWWIR,
|
|
1022
|
-
0,
|
|
1023
|
-
[_RA, _RSN, _WIT, _PI, _PA, _P, _DS],
|
|
1024
|
-
[0, 0, [() => clientTokenType, 0], 0, () => policyDescriptorListType, 0, 1],
|
|
1025
|
-
3,
|
|
1026
|
-
];
|
|
1027
|
-
exports.AssumeRoleWithWebIdentityResponse$ = [
|
|
1028
|
-
3,
|
|
1029
|
-
n0,
|
|
1030
|
-
_ARWWIRs,
|
|
1031
|
-
0,
|
|
1032
|
-
[_C, _SFWIT, _ARU, _PPS, _Pr, _Au, _SI],
|
|
1033
|
-
[[() => exports.Credentials$, 0], 0, () => exports.AssumedRoleUser$, 1, 0, 0, 0],
|
|
1034
|
-
];
|
|
1035
|
-
exports.Credentials$ = [
|
|
1036
|
-
3,
|
|
1037
|
-
n0,
|
|
1038
|
-
_C,
|
|
1039
|
-
0,
|
|
1040
|
-
[_AKI, _SAK, _ST, _E],
|
|
1041
|
-
[0, [() => accessKeySecretType, 0], 0, 4],
|
|
1042
|
-
4,
|
|
1043
|
-
];
|
|
1044
|
-
exports.PolicyDescriptorType$ = [3, n0, _PDT, 0, [_a], [0]];
|
|
1045
|
-
exports.ProvidedContext$ = [3, n0, _PCr, 0, [_PAr, _CA], [0, 0]];
|
|
1046
|
-
exports.Tag$ = [3, n0, _Ta, 0, [_K, _V], [0, 0], 2];
|
|
1047
|
-
var policyDescriptorListType = [1, n0, _pDLT, 0, () => exports.PolicyDescriptorType$];
|
|
1048
|
-
var ProvidedContextsListType = [1, n0, _PCLT, 0, () => exports.ProvidedContext$];
|
|
1049
|
-
var tagKeyListType = (/* unused pure expression or super */ null && (64 | 0));
|
|
1050
|
-
var tagListType = [1, n0, _tLT, 0, () => exports.Tag$];
|
|
1051
|
-
exports.AssumeRole$ = [9, n0, _AR, 0, () => exports.AssumeRoleRequest$, () => exports.AssumeRoleResponse$];
|
|
1052
|
-
exports.AssumeRoleWithWebIdentity$ = [
|
|
1053
|
-
9,
|
|
1054
|
-
n0,
|
|
1055
|
-
_ARWWI,
|
|
1056
|
-
0,
|
|
1057
|
-
() => exports.AssumeRoleWithWebIdentityRequest$,
|
|
1058
|
-
() => exports.AssumeRoleWithWebIdentityResponse$,
|
|
1059
|
-
];
|
|
1060
|
-
|
|
1061
|
-
|
|
1062
|
-
/***/ }),
|
|
1063
|
-
|
|
1064
|
-
/***/ 9955:
|
|
1065
|
-
/***/ ((module) => {
|
|
1066
|
-
|
|
1067
|
-
module.exports = /*#__PURE__*/JSON.parse('{"name":"@aws-sdk/nested-clients","version":"3.990.0","description":"Nested clients for AWS SDK packages.","main":"./dist-cjs/index.js","module":"./dist-es/index.js","types":"./dist-types/index.d.ts","scripts":{"build":"yarn lint && concurrently \'yarn:build:types\' \'yarn:build:es\' && yarn build:cjs","build:cjs":"node ../../scripts/compilation/inline nested-clients","build:es":"tsc -p tsconfig.es.json","build:include:deps":"yarn g:turbo run build -F=\\"$npm_package_name\\"","build:types":"tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4","clean":"premove dist-cjs dist-es dist-types tsconfig.cjs.tsbuildinfo tsconfig.es.tsbuildinfo tsconfig.types.tsbuildinfo","lint":"node ../../scripts/validation/submodules-linter.js --pkg nested-clients","test":"yarn g:vitest run","test:watch":"yarn g:vitest watch"},"engines":{"node":">=20.0.0"},"sideEffects":false,"author":{"name":"AWS SDK for JavaScript Team","url":"https://aws.amazon.com/javascript/"},"license":"Apache-2.0","dependencies":{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"^3.973.10","@aws-sdk/middleware-host-header":"^3.972.3","@aws-sdk/middleware-logger":"^3.972.3","@aws-sdk/middleware-recursion-detection":"^3.972.3","@aws-sdk/middleware-user-agent":"^3.972.10","@aws-sdk/region-config-resolver":"^3.972.3","@aws-sdk/types":"^3.973.1","@aws-sdk/util-endpoints":"3.990.0","@aws-sdk/util-user-agent-browser":"^3.972.3","@aws-sdk/util-user-agent-node":"^3.972.8","@smithy/config-resolver":"^4.4.6","@smithy/core":"^3.23.0","@smithy/fetch-http-handler":"^5.3.9","@smithy/hash-node":"^4.2.8","@smithy/invalid-dependency":"^4.2.8","@smithy/middleware-content-length":"^4.2.8","@smithy/middleware-endpoint":"^4.4.14","@smithy/middleware-retry":"^4.4.31","@smithy/middleware-serde":"^4.2.9","@smithy/middleware-stack":"^4.2.8","@smithy/node-config-provider":"^4.3.8","@smithy/node-http-handler":"^4.4.10","@smithy/protocol-http":"^5.3.8","@smithy/smithy-client":"^4.11.3","@smithy/types":"^4.12.0","@smithy/url-parser":"^4.2.8","@smithy/util-base64":"^4.3.0","@smithy/util-body-length-browser":"^4.2.0","@smithy/util-body-length-node":"^4.2.1","@smithy/util-defaults-mode-browser":"^4.3.30","@smithy/util-defaults-mode-node":"^4.2.33","@smithy/util-endpoints":"^3.2.8","@smithy/util-middleware":"^4.2.8","@smithy/util-retry":"^4.2.8","@smithy/util-utf8":"^4.2.0","tslib":"^2.6.2"},"devDependencies":{"concurrently":"7.0.0","downlevel-dts":"0.10.1","premove":"4.0.0","typescript":"~5.8.3"},"typesVersions":{"<4.0":{"dist-types/*":["dist-types/ts3.4/*"]}},"files":["./signin.d.ts","./signin.js","./sso-oidc.d.ts","./sso-oidc.js","./sts.d.ts","./sts.js","dist-*/**"],"browser":{"./dist-es/submodules/signin/runtimeConfig":"./dist-es/submodules/signin/runtimeConfig.browser","./dist-es/submodules/sso-oidc/runtimeConfig":"./dist-es/submodules/sso-oidc/runtimeConfig.browser","./dist-es/submodules/sts/runtimeConfig":"./dist-es/submodules/sts/runtimeConfig.browser"},"react-native":{},"homepage":"https://github.com/aws/aws-sdk-js-v3/tree/main/packages/nested-clients","repository":{"type":"git","url":"https://github.com/aws/aws-sdk-js-v3.git","directory":"packages/nested-clients"},"exports":{"./package.json":"./package.json","./sso-oidc":{"types":"./dist-types/submodules/sso-oidc/index.d.ts","module":"./dist-es/submodules/sso-oidc/index.js","node":"./dist-cjs/submodules/sso-oidc/index.js","import":"./dist-es/submodules/sso-oidc/index.js","require":"./dist-cjs/submodules/sso-oidc/index.js"},"./sts":{"types":"./dist-types/submodules/sts/index.d.ts","module":"./dist-es/submodules/sts/index.js","node":"./dist-cjs/submodules/sts/index.js","import":"./dist-es/submodules/sts/index.js","require":"./dist-cjs/submodules/sts/index.js"},"./signin":{"types":"./dist-types/submodules/signin/index.d.ts","module":"./dist-es/submodules/signin/index.js","node":"./dist-cjs/submodules/signin/index.js","import":"./dist-es/submodules/signin/index.js","require":"./dist-cjs/submodules/signin/index.js"}}}');
|
|
1068
|
-
|
|
1069
148
|
/***/ })
|
|
1070
149
|
|
|
1071
150
|
};
|