mirror of
https://gitea.com/docker/login-action.git
synced 2026-03-04 02:09:41 +00:00
Merge pull request #920 from docker/dependabot/npm_and_yarn/aws-sdk-dependencies-6d5e1793b5
build(deps): bump the aws-sdk-dependencies group with 2 updates
This commit is contained in:
commit
cad8984310
818
dist/136.index.js
generated
vendored
818
dist/136.index.js
generated
vendored
@ -240,8 +240,146 @@ util_endpoints_2.customEndpointFunctions.aws = util_endpoints_1.awsEndpointFunct
|
|||||||
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
||||||
exports.ruleSet = void 0;
|
exports.ruleSet = void 0;
|
||||||
const F = "required", G = "type", H = "fn", I = "argv", J = "ref";
|
const F = "required", G = "type", H = "fn", I = "argv", J = "ref";
|
||||||
const a = false, b = true, c = "booleanEquals", d = "stringEquals", e = "sigv4", f = "sts", g = "us-east-1", h = "endpoint", i = "https://sts.{Region}.{PartitionResult#dnsSuffix}", j = "tree", k = "error", l = "getAttr", m = { [F]: false, [G]: "string" }, n = { [F]: true, "default": false, [G]: "boolean" }, o = { [J]: "Endpoint" }, p = { [H]: "isSet", [I]: [{ [J]: "Region" }] }, q = { [J]: "Region" }, r = { [H]: "aws.partition", [I]: [q], "assign": "PartitionResult" }, s = { [J]: "UseFIPS" }, t = { [J]: "UseDualStack" }, u = { "url": "https://sts.amazonaws.com", "properties": { "authSchemes": [{ "name": e, "signingName": f, "signingRegion": g }] }, "headers": {} }, v = {}, w = { "conditions": [{ [H]: d, [I]: [q, "aws-global"] }], [h]: u, [G]: h }, x = { [H]: c, [I]: [s, true] }, y = { [H]: c, [I]: [t, true] }, z = { [H]: l, [I]: [{ [J]: "PartitionResult" }, "supportsFIPS"] }, A = { [J]: "PartitionResult" }, B = { [H]: c, [I]: [true, { [H]: l, [I]: [A, "supportsDualStack"] }] }, C = [{ [H]: "isSet", [I]: [o] }], D = [x], E = [y];
|
const a = false, b = true, c = "booleanEquals", d = "stringEquals", e = "sigv4", f = "sts", g = "us-east-1", h = "endpoint", i = "https://sts.{Region}.{PartitionResult#dnsSuffix}", j = "tree", k = "error", l = "getAttr", m = { [F]: false, [G]: "string" }, n = { [F]: true, default: false, [G]: "boolean" }, o = { [J]: "Endpoint" }, p = { [H]: "isSet", [I]: [{ [J]: "Region" }] }, q = { [J]: "Region" }, r = { [H]: "aws.partition", [I]: [q], assign: "PartitionResult" }, s = { [J]: "UseFIPS" }, t = { [J]: "UseDualStack" }, u = {
|
||||||
const _data = { version: "1.0", parameters: { Region: m, UseDualStack: n, UseFIPS: n, Endpoint: m, UseGlobalEndpoint: n }, rules: [{ conditions: [{ [H]: c, [I]: [{ [J]: "UseGlobalEndpoint" }, b] }, { [H]: "not", [I]: C }, p, r, { [H]: c, [I]: [s, a] }, { [H]: c, [I]: [t, a] }], rules: [{ conditions: [{ [H]: d, [I]: [q, "ap-northeast-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "ap-south-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "ap-southeast-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "ap-southeast-2"] }], endpoint: u, [G]: h }, w, { conditions: [{ [H]: d, [I]: [q, "ca-central-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "eu-central-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "eu-north-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "eu-west-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "eu-west-2"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "eu-west-3"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "sa-east-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, g] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "us-east-2"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "us-west-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "us-west-2"] }], endpoint: u, [G]: h }, { endpoint: { url: i, properties: { authSchemes: [{ name: e, signingName: f, signingRegion: "{Region}" }] }, headers: v }, [G]: h }], [G]: j }, { conditions: C, rules: [{ conditions: D, error: "Invalid Configuration: FIPS and custom endpoint are not supported", [G]: k }, { conditions: E, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", [G]: k }, { endpoint: { url: o, properties: v, headers: v }, [G]: h }], [G]: j }, { conditions: [p], rules: [{ conditions: [r], rules: [{ conditions: [x, y], rules: [{ conditions: [{ [H]: c, [I]: [b, z] }, B], rules: [{ endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: v, headers: v }, [G]: h }], [G]: j }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", [G]: k }], [G]: j }, { conditions: D, rules: [{ conditions: [{ [H]: c, [I]: [z, b] }], rules: [{ conditions: [{ [H]: d, [I]: [{ [H]: l, [I]: [A, "name"] }, "aws-us-gov"] }], endpoint: { url: "https://sts.{Region}.amazonaws.com", properties: v, headers: v }, [G]: h }, { endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dnsSuffix}", properties: v, headers: v }, [G]: h }], [G]: j }, { error: "FIPS is enabled but this partition does not support FIPS", [G]: k }], [G]: j }, { conditions: E, rules: [{ conditions: [B], rules: [{ endpoint: { url: "https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: v, headers: v }, [G]: h }], [G]: j }, { error: "DualStack is enabled but this partition does not support DualStack", [G]: k }], [G]: j }, w, { endpoint: { url: i, properties: v, headers: v }, [G]: h }], [G]: j }], [G]: j }, { error: "Invalid Configuration: Missing Region", [G]: k }] };
|
url: "https://sts.amazonaws.com",
|
||||||
|
properties: { authSchemes: [{ name: e, signingName: f, signingRegion: g }] },
|
||||||
|
headers: {},
|
||||||
|
}, v = {}, w = { conditions: [{ [H]: d, [I]: [q, "aws-global"] }], [h]: u, [G]: h }, x = { [H]: c, [I]: [s, true] }, y = { [H]: c, [I]: [t, true] }, z = { [H]: l, [I]: [{ [J]: "PartitionResult" }, "supportsFIPS"] }, A = { [J]: "PartitionResult" }, B = { [H]: c, [I]: [true, { [H]: l, [I]: [A, "supportsDualStack"] }] }, C = [{ [H]: "isSet", [I]: [o] }], D = [x], E = [y];
|
||||||
|
const _data = {
|
||||||
|
version: "1.0",
|
||||||
|
parameters: { Region: m, UseDualStack: n, UseFIPS: n, Endpoint: m, UseGlobalEndpoint: n },
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
conditions: [
|
||||||
|
{ [H]: c, [I]: [{ [J]: "UseGlobalEndpoint" }, b] },
|
||||||
|
{ [H]: "not", [I]: C },
|
||||||
|
p,
|
||||||
|
r,
|
||||||
|
{ [H]: c, [I]: [s, a] },
|
||||||
|
{ [H]: c, [I]: [t, a] },
|
||||||
|
],
|
||||||
|
rules: [
|
||||||
|
{ conditions: [{ [H]: d, [I]: [q, "ap-northeast-1"] }], endpoint: u, [G]: h },
|
||||||
|
{ conditions: [{ [H]: d, [I]: [q, "ap-south-1"] }], endpoint: u, [G]: h },
|
||||||
|
{ conditions: [{ [H]: d, [I]: [q, "ap-southeast-1"] }], endpoint: u, [G]: h },
|
||||||
|
{ conditions: [{ [H]: d, [I]: [q, "ap-southeast-2"] }], endpoint: u, [G]: h },
|
||||||
|
w,
|
||||||
|
{ conditions: [{ [H]: d, [I]: [q, "ca-central-1"] }], endpoint: u, [G]: h },
|
||||||
|
{ conditions: [{ [H]: d, [I]: [q, "eu-central-1"] }], endpoint: u, [G]: h },
|
||||||
|
{ conditions: [{ [H]: d, [I]: [q, "eu-north-1"] }], endpoint: u, [G]: h },
|
||||||
|
{ conditions: [{ [H]: d, [I]: [q, "eu-west-1"] }], endpoint: u, [G]: h },
|
||||||
|
{ conditions: [{ [H]: d, [I]: [q, "eu-west-2"] }], endpoint: u, [G]: h },
|
||||||
|
{ conditions: [{ [H]: d, [I]: [q, "eu-west-3"] }], endpoint: u, [G]: h },
|
||||||
|
{ conditions: [{ [H]: d, [I]: [q, "sa-east-1"] }], endpoint: u, [G]: h },
|
||||||
|
{ conditions: [{ [H]: d, [I]: [q, g] }], endpoint: u, [G]: h },
|
||||||
|
{ conditions: [{ [H]: d, [I]: [q, "us-east-2"] }], endpoint: u, [G]: h },
|
||||||
|
{ conditions: [{ [H]: d, [I]: [q, "us-west-1"] }], endpoint: u, [G]: h },
|
||||||
|
{ conditions: [{ [H]: d, [I]: [q, "us-west-2"] }], endpoint: u, [G]: h },
|
||||||
|
{
|
||||||
|
endpoint: {
|
||||||
|
url: i,
|
||||||
|
properties: { authSchemes: [{ name: e, signingName: f, signingRegion: "{Region}" }] },
|
||||||
|
headers: v,
|
||||||
|
},
|
||||||
|
[G]: h,
|
||||||
|
},
|
||||||
|
],
|
||||||
|
[G]: j,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
conditions: C,
|
||||||
|
rules: [
|
||||||
|
{ conditions: D, error: "Invalid Configuration: FIPS and custom endpoint are not supported", [G]: k },
|
||||||
|
{ conditions: E, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", [G]: k },
|
||||||
|
{ endpoint: { url: o, properties: v, headers: v }, [G]: h },
|
||||||
|
],
|
||||||
|
[G]: j,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
conditions: [p],
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
conditions: [r],
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
conditions: [x, y],
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
conditions: [{ [H]: c, [I]: [b, z] }, B],
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
endpoint: {
|
||||||
|
url: "https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",
|
||||||
|
properties: v,
|
||||||
|
headers: v,
|
||||||
|
},
|
||||||
|
[G]: h,
|
||||||
|
},
|
||||||
|
],
|
||||||
|
[G]: j,
|
||||||
|
},
|
||||||
|
{ error: "FIPS and DualStack are enabled, but this partition does not support one or both", [G]: k },
|
||||||
|
],
|
||||||
|
[G]: j,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
conditions: D,
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
conditions: [{ [H]: c, [I]: [z, b] }],
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
conditions: [{ [H]: d, [I]: [{ [H]: l, [I]: [A, "name"] }, "aws-us-gov"] }],
|
||||||
|
endpoint: { url: "https://sts.{Region}.amazonaws.com", properties: v, headers: v },
|
||||||
|
[G]: h,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
endpoint: {
|
||||||
|
url: "https://sts-fips.{Region}.{PartitionResult#dnsSuffix}",
|
||||||
|
properties: v,
|
||||||
|
headers: v,
|
||||||
|
},
|
||||||
|
[G]: h,
|
||||||
|
},
|
||||||
|
],
|
||||||
|
[G]: j,
|
||||||
|
},
|
||||||
|
{ error: "FIPS is enabled but this partition does not support FIPS", [G]: k },
|
||||||
|
],
|
||||||
|
[G]: j,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
conditions: E,
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
conditions: [B],
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
endpoint: {
|
||||||
|
url: "https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}",
|
||||||
|
properties: v,
|
||||||
|
headers: v,
|
||||||
|
},
|
||||||
|
[G]: h,
|
||||||
|
},
|
||||||
|
],
|
||||||
|
[G]: j,
|
||||||
|
},
|
||||||
|
{ error: "DualStack is enabled but this partition does not support DualStack", [G]: k },
|
||||||
|
],
|
||||||
|
[G]: j,
|
||||||
|
},
|
||||||
|
w,
|
||||||
|
{ endpoint: { url: i, properties: v, headers: v }, [G]: h },
|
||||||
|
],
|
||||||
|
[G]: j,
|
||||||
|
},
|
||||||
|
],
|
||||||
|
[G]: j,
|
||||||
|
},
|
||||||
|
{ error: "Invalid Configuration: Missing Region", [G]: k },
|
||||||
|
],
|
||||||
|
};
|
||||||
exports.ruleSet = _data;
|
exports.ruleSet = _data;
|
||||||
|
|
||||||
|
|
||||||
@ -256,287 +394,11 @@ var STSClient = __webpack_require__(3723);
|
|||||||
var smithyClient = __webpack_require__(1411);
|
var smithyClient = __webpack_require__(1411);
|
||||||
var middlewareEndpoint = __webpack_require__(99);
|
var middlewareEndpoint = __webpack_require__(99);
|
||||||
var EndpointParameters = __webpack_require__(6811);
|
var EndpointParameters = __webpack_require__(6811);
|
||||||
var schema = __webpack_require__(6890);
|
var schemas_0 = __webpack_require__(1684);
|
||||||
|
var errors = __webpack_require__(1688);
|
||||||
var client = __webpack_require__(5152);
|
var client = __webpack_require__(5152);
|
||||||
var regionConfigResolver = __webpack_require__(6463);
|
var regionConfigResolver = __webpack_require__(6463);
|
||||||
|
var STSServiceException = __webpack_require__(7171);
|
||||||
class STSServiceException extends smithyClient.ServiceException {
|
|
||||||
constructor(options) {
|
|
||||||
super(options);
|
|
||||||
Object.setPrototypeOf(this, STSServiceException.prototype);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
class ExpiredTokenException extends STSServiceException {
|
|
||||||
name = "ExpiredTokenException";
|
|
||||||
$fault = "client";
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "ExpiredTokenException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, ExpiredTokenException.prototype);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
class MalformedPolicyDocumentException extends STSServiceException {
|
|
||||||
name = "MalformedPolicyDocumentException";
|
|
||||||
$fault = "client";
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "MalformedPolicyDocumentException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, MalformedPolicyDocumentException.prototype);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
class PackedPolicyTooLargeException extends STSServiceException {
|
|
||||||
name = "PackedPolicyTooLargeException";
|
|
||||||
$fault = "client";
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "PackedPolicyTooLargeException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, PackedPolicyTooLargeException.prototype);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
class RegionDisabledException extends STSServiceException {
|
|
||||||
name = "RegionDisabledException";
|
|
||||||
$fault = "client";
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "RegionDisabledException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, RegionDisabledException.prototype);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
class IDPRejectedClaimException extends STSServiceException {
|
|
||||||
name = "IDPRejectedClaimException";
|
|
||||||
$fault = "client";
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "IDPRejectedClaimException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, IDPRejectedClaimException.prototype);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
class InvalidIdentityTokenException extends STSServiceException {
|
|
||||||
name = "InvalidIdentityTokenException";
|
|
||||||
$fault = "client";
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "InvalidIdentityTokenException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, InvalidIdentityTokenException.prototype);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
class IDPCommunicationErrorException extends STSServiceException {
|
|
||||||
name = "IDPCommunicationErrorException";
|
|
||||||
$fault = "client";
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "IDPCommunicationErrorException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, IDPCommunicationErrorException.prototype);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
const _A = "Arn";
|
|
||||||
const _AKI = "AccessKeyId";
|
|
||||||
const _AR = "AssumeRole";
|
|
||||||
const _ARI = "AssumedRoleId";
|
|
||||||
const _ARR = "AssumeRoleRequest";
|
|
||||||
const _ARRs = "AssumeRoleResponse";
|
|
||||||
const _ARU = "AssumedRoleUser";
|
|
||||||
const _ARWWI = "AssumeRoleWithWebIdentity";
|
|
||||||
const _ARWWIR = "AssumeRoleWithWebIdentityRequest";
|
|
||||||
const _ARWWIRs = "AssumeRoleWithWebIdentityResponse";
|
|
||||||
const _Au = "Audience";
|
|
||||||
const _C = "Credentials";
|
|
||||||
const _CA = "ContextAssertion";
|
|
||||||
const _DS = "DurationSeconds";
|
|
||||||
const _E = "Expiration";
|
|
||||||
const _EI = "ExternalId";
|
|
||||||
const _ETE = "ExpiredTokenException";
|
|
||||||
const _IDPCEE = "IDPCommunicationErrorException";
|
|
||||||
const _IDPRCE = "IDPRejectedClaimException";
|
|
||||||
const _IITE = "InvalidIdentityTokenException";
|
|
||||||
const _K = "Key";
|
|
||||||
const _MPDE = "MalformedPolicyDocumentException";
|
|
||||||
const _P = "Policy";
|
|
||||||
const _PA = "PolicyArns";
|
|
||||||
const _PAr = "ProviderArn";
|
|
||||||
const _PC = "ProvidedContexts";
|
|
||||||
const _PCLT = "ProvidedContextsListType";
|
|
||||||
const _PCr = "ProvidedContext";
|
|
||||||
const _PDT = "PolicyDescriptorType";
|
|
||||||
const _PI = "ProviderId";
|
|
||||||
const _PPS = "PackedPolicySize";
|
|
||||||
const _PPTLE = "PackedPolicyTooLargeException";
|
|
||||||
const _Pr = "Provider";
|
|
||||||
const _RA = "RoleArn";
|
|
||||||
const _RDE = "RegionDisabledException";
|
|
||||||
const _RSN = "RoleSessionName";
|
|
||||||
const _SAK = "SecretAccessKey";
|
|
||||||
const _SFWIT = "SubjectFromWebIdentityToken";
|
|
||||||
const _SI = "SourceIdentity";
|
|
||||||
const _SN = "SerialNumber";
|
|
||||||
const _ST = "SessionToken";
|
|
||||||
const _T = "Tags";
|
|
||||||
const _TC = "TokenCode";
|
|
||||||
const _TTK = "TransitiveTagKeys";
|
|
||||||
const _Ta = "Tag";
|
|
||||||
const _V = "Value";
|
|
||||||
const _WIT = "WebIdentityToken";
|
|
||||||
const _a = "arn";
|
|
||||||
const _aKST = "accessKeySecretType";
|
|
||||||
const _aQE = "awsQueryError";
|
|
||||||
const _c = "client";
|
|
||||||
const _cTT = "clientTokenType";
|
|
||||||
const _e = "error";
|
|
||||||
const _hE = "httpError";
|
|
||||||
const _m = "message";
|
|
||||||
const _pDLT = "policyDescriptorListType";
|
|
||||||
const _s = "smithy.ts.sdk.synthetic.com.amazonaws.sts";
|
|
||||||
const _tLT = "tagListType";
|
|
||||||
const n0 = "com.amazonaws.sts";
|
|
||||||
var accessKeySecretType = [0, n0, _aKST, 8, 0];
|
|
||||||
var clientTokenType = [0, n0, _cTT, 8, 0];
|
|
||||||
var AssumedRoleUser$ = [3, n0, _ARU, 0, [_ARI, _A], [0, 0], 2];
|
|
||||||
var AssumeRoleRequest$ = [
|
|
||||||
3,
|
|
||||||
n0,
|
|
||||||
_ARR,
|
|
||||||
0,
|
|
||||||
[_RA, _RSN, _PA, _P, _DS, _T, _TTK, _EI, _SN, _TC, _SI, _PC],
|
|
||||||
[0, 0, () => policyDescriptorListType, 0, 1, () => tagListType, 64 | 0, 0, 0, 0, 0, () => ProvidedContextsListType],
|
|
||||||
2,
|
|
||||||
];
|
|
||||||
var AssumeRoleResponse$ = [
|
|
||||||
3,
|
|
||||||
n0,
|
|
||||||
_ARRs,
|
|
||||||
0,
|
|
||||||
[_C, _ARU, _PPS, _SI],
|
|
||||||
[[() => Credentials$, 0], () => AssumedRoleUser$, 1, 0],
|
|
||||||
];
|
|
||||||
var AssumeRoleWithWebIdentityRequest$ = [
|
|
||||||
3,
|
|
||||||
n0,
|
|
||||||
_ARWWIR,
|
|
||||||
0,
|
|
||||||
[_RA, _RSN, _WIT, _PI, _PA, _P, _DS],
|
|
||||||
[0, 0, [() => clientTokenType, 0], 0, () => policyDescriptorListType, 0, 1],
|
|
||||||
3,
|
|
||||||
];
|
|
||||||
var AssumeRoleWithWebIdentityResponse$ = [
|
|
||||||
3,
|
|
||||||
n0,
|
|
||||||
_ARWWIRs,
|
|
||||||
0,
|
|
||||||
[_C, _SFWIT, _ARU, _PPS, _Pr, _Au, _SI],
|
|
||||||
[[() => Credentials$, 0], 0, () => AssumedRoleUser$, 1, 0, 0, 0],
|
|
||||||
];
|
|
||||||
var Credentials$ = [
|
|
||||||
3,
|
|
||||||
n0,
|
|
||||||
_C,
|
|
||||||
0,
|
|
||||||
[_AKI, _SAK, _ST, _E],
|
|
||||||
[0, [() => accessKeySecretType, 0], 0, 4],
|
|
||||||
4,
|
|
||||||
];
|
|
||||||
var ExpiredTokenException$ = [
|
|
||||||
-3,
|
|
||||||
n0,
|
|
||||||
_ETE,
|
|
||||||
{ [_aQE]: [`ExpiredTokenException`, 400], [_e]: _c, [_hE]: 400 },
|
|
||||||
[_m],
|
|
||||||
[0],
|
|
||||||
];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(ExpiredTokenException$, ExpiredTokenException);
|
|
||||||
var IDPCommunicationErrorException$ = [
|
|
||||||
-3,
|
|
||||||
n0,
|
|
||||||
_IDPCEE,
|
|
||||||
{ [_aQE]: [`IDPCommunicationError`, 400], [_e]: _c, [_hE]: 400 },
|
|
||||||
[_m],
|
|
||||||
[0],
|
|
||||||
];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(IDPCommunicationErrorException$, IDPCommunicationErrorException);
|
|
||||||
var IDPRejectedClaimException$ = [
|
|
||||||
-3,
|
|
||||||
n0,
|
|
||||||
_IDPRCE,
|
|
||||||
{ [_aQE]: [`IDPRejectedClaim`, 403], [_e]: _c, [_hE]: 403 },
|
|
||||||
[_m],
|
|
||||||
[0],
|
|
||||||
];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(IDPRejectedClaimException$, IDPRejectedClaimException);
|
|
||||||
var InvalidIdentityTokenException$ = [
|
|
||||||
-3,
|
|
||||||
n0,
|
|
||||||
_IITE,
|
|
||||||
{ [_aQE]: [`InvalidIdentityToken`, 400], [_e]: _c, [_hE]: 400 },
|
|
||||||
[_m],
|
|
||||||
[0],
|
|
||||||
];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(InvalidIdentityTokenException$, InvalidIdentityTokenException);
|
|
||||||
var MalformedPolicyDocumentException$ = [
|
|
||||||
-3,
|
|
||||||
n0,
|
|
||||||
_MPDE,
|
|
||||||
{ [_aQE]: [`MalformedPolicyDocument`, 400], [_e]: _c, [_hE]: 400 },
|
|
||||||
[_m],
|
|
||||||
[0],
|
|
||||||
];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(MalformedPolicyDocumentException$, MalformedPolicyDocumentException);
|
|
||||||
var PackedPolicyTooLargeException$ = [
|
|
||||||
-3,
|
|
||||||
n0,
|
|
||||||
_PPTLE,
|
|
||||||
{ [_aQE]: [`PackedPolicyTooLarge`, 400], [_e]: _c, [_hE]: 400 },
|
|
||||||
[_m],
|
|
||||||
[0],
|
|
||||||
];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(PackedPolicyTooLargeException$, PackedPolicyTooLargeException);
|
|
||||||
var PolicyDescriptorType$ = [3, n0, _PDT, 0, [_a], [0]];
|
|
||||||
var ProvidedContext$ = [3, n0, _PCr, 0, [_PAr, _CA], [0, 0]];
|
|
||||||
var RegionDisabledException$ = [
|
|
||||||
-3,
|
|
||||||
n0,
|
|
||||||
_RDE,
|
|
||||||
{ [_aQE]: [`RegionDisabledException`, 403], [_e]: _c, [_hE]: 403 },
|
|
||||||
[_m],
|
|
||||||
[0],
|
|
||||||
];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(RegionDisabledException$, RegionDisabledException);
|
|
||||||
var Tag$ = [3, n0, _Ta, 0, [_K, _V], [0, 0], 2];
|
|
||||||
var STSServiceException$ = [-3, _s, "STSServiceException", 0, [], []];
|
|
||||||
schema.TypeRegistry.for(_s).registerError(STSServiceException$, STSServiceException);
|
|
||||||
var policyDescriptorListType = [1, n0, _pDLT, 0, () => PolicyDescriptorType$];
|
|
||||||
var ProvidedContextsListType = [1, n0, _PCLT, 0, () => ProvidedContext$];
|
|
||||||
var tagListType = [1, n0, _tLT, 0, () => Tag$];
|
|
||||||
var AssumeRole$ = [9, n0, _AR, 0, () => AssumeRoleRequest$, () => AssumeRoleResponse$];
|
|
||||||
var AssumeRoleWithWebIdentity$ = [
|
|
||||||
9,
|
|
||||||
n0,
|
|
||||||
_ARWWI,
|
|
||||||
0,
|
|
||||||
() => AssumeRoleWithWebIdentityRequest$,
|
|
||||||
() => AssumeRoleWithWebIdentityResponse$,
|
|
||||||
];
|
|
||||||
|
|
||||||
class AssumeRoleCommand extends smithyClient.Command
|
class AssumeRoleCommand extends smithyClient.Command
|
||||||
.classBuilder()
|
.classBuilder()
|
||||||
@ -546,7 +408,7 @@ class AssumeRoleCommand extends smithyClient.Command
|
|||||||
})
|
})
|
||||||
.s("AWSSecurityTokenServiceV20110615", "AssumeRole", {})
|
.s("AWSSecurityTokenServiceV20110615", "AssumeRole", {})
|
||||||
.n("STSClient", "AssumeRoleCommand")
|
.n("STSClient", "AssumeRoleCommand")
|
||||||
.sc(AssumeRole$)
|
.sc(schemas_0.AssumeRole$)
|
||||||
.build() {
|
.build() {
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -558,7 +420,7 @@ class AssumeRoleWithWebIdentityCommand extends smithyClient.Command
|
|||||||
})
|
})
|
||||||
.s("AWSSecurityTokenServiceV20110615", "AssumeRoleWithWebIdentity", {})
|
.s("AWSSecurityTokenServiceV20110615", "AssumeRoleWithWebIdentity", {})
|
||||||
.n("STSClient", "AssumeRoleWithWebIdentityCommand")
|
.n("STSClient", "AssumeRoleWithWebIdentityCommand")
|
||||||
.sc(AssumeRoleWithWebIdentity$)
|
.sc(schemas_0.AssumeRoleWithWebIdentity$)
|
||||||
.build() {
|
.build() {
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -690,49 +552,165 @@ const decorateDefaultCredentialProvider = (provider) => (input) => provider({
|
|||||||
...input,
|
...input,
|
||||||
});
|
});
|
||||||
|
|
||||||
Object.defineProperty(exports, "$Command", ({
|
exports.$Command = smithyClient.Command;
|
||||||
enumerable: true,
|
exports.STSServiceException = STSServiceException.STSServiceException;
|
||||||
get: function () { return smithyClient.Command; }
|
|
||||||
}));
|
|
||||||
exports.AssumeRole$ = AssumeRole$;
|
|
||||||
exports.AssumeRoleCommand = AssumeRoleCommand;
|
exports.AssumeRoleCommand = AssumeRoleCommand;
|
||||||
exports.AssumeRoleRequest$ = AssumeRoleRequest$;
|
|
||||||
exports.AssumeRoleResponse$ = AssumeRoleResponse$;
|
|
||||||
exports.AssumeRoleWithWebIdentity$ = AssumeRoleWithWebIdentity$;
|
|
||||||
exports.AssumeRoleWithWebIdentityCommand = AssumeRoleWithWebIdentityCommand;
|
exports.AssumeRoleWithWebIdentityCommand = AssumeRoleWithWebIdentityCommand;
|
||||||
exports.AssumeRoleWithWebIdentityRequest$ = AssumeRoleWithWebIdentityRequest$;
|
|
||||||
exports.AssumeRoleWithWebIdentityResponse$ = AssumeRoleWithWebIdentityResponse$;
|
|
||||||
exports.AssumedRoleUser$ = AssumedRoleUser$;
|
|
||||||
exports.Credentials$ = Credentials$;
|
|
||||||
exports.ExpiredTokenException = ExpiredTokenException;
|
|
||||||
exports.ExpiredTokenException$ = ExpiredTokenException$;
|
|
||||||
exports.IDPCommunicationErrorException = IDPCommunicationErrorException;
|
|
||||||
exports.IDPCommunicationErrorException$ = IDPCommunicationErrorException$;
|
|
||||||
exports.IDPRejectedClaimException = IDPRejectedClaimException;
|
|
||||||
exports.IDPRejectedClaimException$ = IDPRejectedClaimException$;
|
|
||||||
exports.InvalidIdentityTokenException = InvalidIdentityTokenException;
|
|
||||||
exports.InvalidIdentityTokenException$ = InvalidIdentityTokenException$;
|
|
||||||
exports.MalformedPolicyDocumentException = MalformedPolicyDocumentException;
|
|
||||||
exports.MalformedPolicyDocumentException$ = MalformedPolicyDocumentException$;
|
|
||||||
exports.PackedPolicyTooLargeException = PackedPolicyTooLargeException;
|
|
||||||
exports.PackedPolicyTooLargeException$ = PackedPolicyTooLargeException$;
|
|
||||||
exports.PolicyDescriptorType$ = PolicyDescriptorType$;
|
|
||||||
exports.ProvidedContext$ = ProvidedContext$;
|
|
||||||
exports.RegionDisabledException = RegionDisabledException;
|
|
||||||
exports.RegionDisabledException$ = RegionDisabledException$;
|
|
||||||
exports.STS = STS;
|
exports.STS = STS;
|
||||||
exports.STSServiceException = STSServiceException;
|
|
||||||
exports.STSServiceException$ = STSServiceException$;
|
|
||||||
exports.Tag$ = Tag$;
|
|
||||||
exports.decorateDefaultCredentialProvider = decorateDefaultCredentialProvider;
|
exports.decorateDefaultCredentialProvider = decorateDefaultCredentialProvider;
|
||||||
exports.getDefaultRoleAssumer = getDefaultRoleAssumer;
|
exports.getDefaultRoleAssumer = getDefaultRoleAssumer;
|
||||||
exports.getDefaultRoleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity;
|
exports.getDefaultRoleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity;
|
||||||
Object.keys(STSClient).forEach(function (k) {
|
Object.prototype.hasOwnProperty.call(STSClient, '__proto__') &&
|
||||||
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) Object.defineProperty(exports, k, {
|
!Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
|
||||||
|
Object.defineProperty(exports, '__proto__', {
|
||||||
enumerable: true,
|
enumerable: true,
|
||||||
get: function () { return STSClient[k]; }
|
value: STSClient['__proto__']
|
||||||
});
|
});
|
||||||
|
|
||||||
|
Object.keys(STSClient).forEach(function (k) {
|
||||||
|
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = STSClient[k];
|
||||||
});
|
});
|
||||||
|
Object.prototype.hasOwnProperty.call(schemas_0, '__proto__') &&
|
||||||
|
!Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
|
||||||
|
Object.defineProperty(exports, '__proto__', {
|
||||||
|
enumerable: true,
|
||||||
|
value: schemas_0['__proto__']
|
||||||
|
});
|
||||||
|
|
||||||
|
Object.keys(schemas_0).forEach(function (k) {
|
||||||
|
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = schemas_0[k];
|
||||||
|
});
|
||||||
|
Object.prototype.hasOwnProperty.call(errors, '__proto__') &&
|
||||||
|
!Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
|
||||||
|
Object.defineProperty(exports, '__proto__', {
|
||||||
|
enumerable: true,
|
||||||
|
value: errors['__proto__']
|
||||||
|
});
|
||||||
|
|
||||||
|
Object.keys(errors).forEach(function (k) {
|
||||||
|
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = errors[k];
|
||||||
|
});
|
||||||
|
|
||||||
|
|
||||||
|
/***/ }),
|
||||||
|
|
||||||
|
/***/ 7171:
|
||||||
|
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
||||||
|
|
||||||
|
|
||||||
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
||||||
|
exports.STSServiceException = exports.__ServiceException = void 0;
|
||||||
|
const smithy_client_1 = __webpack_require__(1411);
|
||||||
|
Object.defineProperty(exports, "__ServiceException", ({ enumerable: true, get: function () { return smithy_client_1.ServiceException; } }));
|
||||||
|
class STSServiceException extends smithy_client_1.ServiceException {
|
||||||
|
constructor(options) {
|
||||||
|
super(options);
|
||||||
|
Object.setPrototypeOf(this, STSServiceException.prototype);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
exports.STSServiceException = STSServiceException;
|
||||||
|
|
||||||
|
|
||||||
|
/***/ }),
|
||||||
|
|
||||||
|
/***/ 1688:
|
||||||
|
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
||||||
|
|
||||||
|
|
||||||
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
||||||
|
exports.IDPCommunicationErrorException = exports.InvalidIdentityTokenException = exports.IDPRejectedClaimException = exports.RegionDisabledException = exports.PackedPolicyTooLargeException = exports.MalformedPolicyDocumentException = exports.ExpiredTokenException = void 0;
|
||||||
|
const STSServiceException_1 = __webpack_require__(7171);
|
||||||
|
class ExpiredTokenException extends STSServiceException_1.STSServiceException {
|
||||||
|
name = "ExpiredTokenException";
|
||||||
|
$fault = "client";
|
||||||
|
constructor(opts) {
|
||||||
|
super({
|
||||||
|
name: "ExpiredTokenException",
|
||||||
|
$fault: "client",
|
||||||
|
...opts,
|
||||||
|
});
|
||||||
|
Object.setPrototypeOf(this, ExpiredTokenException.prototype);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
exports.ExpiredTokenException = ExpiredTokenException;
|
||||||
|
class MalformedPolicyDocumentException extends STSServiceException_1.STSServiceException {
|
||||||
|
name = "MalformedPolicyDocumentException";
|
||||||
|
$fault = "client";
|
||||||
|
constructor(opts) {
|
||||||
|
super({
|
||||||
|
name: "MalformedPolicyDocumentException",
|
||||||
|
$fault: "client",
|
||||||
|
...opts,
|
||||||
|
});
|
||||||
|
Object.setPrototypeOf(this, MalformedPolicyDocumentException.prototype);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
exports.MalformedPolicyDocumentException = MalformedPolicyDocumentException;
|
||||||
|
class PackedPolicyTooLargeException extends STSServiceException_1.STSServiceException {
|
||||||
|
name = "PackedPolicyTooLargeException";
|
||||||
|
$fault = "client";
|
||||||
|
constructor(opts) {
|
||||||
|
super({
|
||||||
|
name: "PackedPolicyTooLargeException",
|
||||||
|
$fault: "client",
|
||||||
|
...opts,
|
||||||
|
});
|
||||||
|
Object.setPrototypeOf(this, PackedPolicyTooLargeException.prototype);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
exports.PackedPolicyTooLargeException = PackedPolicyTooLargeException;
|
||||||
|
class RegionDisabledException extends STSServiceException_1.STSServiceException {
|
||||||
|
name = "RegionDisabledException";
|
||||||
|
$fault = "client";
|
||||||
|
constructor(opts) {
|
||||||
|
super({
|
||||||
|
name: "RegionDisabledException",
|
||||||
|
$fault: "client",
|
||||||
|
...opts,
|
||||||
|
});
|
||||||
|
Object.setPrototypeOf(this, RegionDisabledException.prototype);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
exports.RegionDisabledException = RegionDisabledException;
|
||||||
|
class IDPRejectedClaimException extends STSServiceException_1.STSServiceException {
|
||||||
|
name = "IDPRejectedClaimException";
|
||||||
|
$fault = "client";
|
||||||
|
constructor(opts) {
|
||||||
|
super({
|
||||||
|
name: "IDPRejectedClaimException",
|
||||||
|
$fault: "client",
|
||||||
|
...opts,
|
||||||
|
});
|
||||||
|
Object.setPrototypeOf(this, IDPRejectedClaimException.prototype);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
exports.IDPRejectedClaimException = IDPRejectedClaimException;
|
||||||
|
class InvalidIdentityTokenException extends STSServiceException_1.STSServiceException {
|
||||||
|
name = "InvalidIdentityTokenException";
|
||||||
|
$fault = "client";
|
||||||
|
constructor(opts) {
|
||||||
|
super({
|
||||||
|
name: "InvalidIdentityTokenException",
|
||||||
|
$fault: "client",
|
||||||
|
...opts,
|
||||||
|
});
|
||||||
|
Object.setPrototypeOf(this, InvalidIdentityTokenException.prototype);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
exports.InvalidIdentityTokenException = InvalidIdentityTokenException;
|
||||||
|
class IDPCommunicationErrorException extends STSServiceException_1.STSServiceException {
|
||||||
|
name = "IDPCommunicationErrorException";
|
||||||
|
$fault = "client";
|
||||||
|
constructor(opts) {
|
||||||
|
super({
|
||||||
|
name: "IDPCommunicationErrorException",
|
||||||
|
$fault: "client",
|
||||||
|
...opts,
|
||||||
|
});
|
||||||
|
Object.setPrototypeOf(this, IDPCommunicationErrorException.prototype);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
exports.IDPCommunicationErrorException = IDPCommunicationErrorException;
|
||||||
|
|
||||||
|
|
||||||
/***/ }),
|
/***/ }),
|
||||||
@ -826,6 +804,7 @@ const util_base64_1 = __webpack_require__(8385);
|
|||||||
const util_utf8_1 = __webpack_require__(1577);
|
const util_utf8_1 = __webpack_require__(1577);
|
||||||
const httpAuthSchemeProvider_1 = __webpack_require__(7851);
|
const httpAuthSchemeProvider_1 = __webpack_require__(7851);
|
||||||
const endpointResolver_1 = __webpack_require__(9765);
|
const endpointResolver_1 = __webpack_require__(9765);
|
||||||
|
const schemas_0_1 = __webpack_require__(1684);
|
||||||
const getRuntimeConfig = (config) => {
|
const getRuntimeConfig = (config) => {
|
||||||
return {
|
return {
|
||||||
apiVersion: "2011-06-15",
|
apiVersion: "2011-06-15",
|
||||||
@ -851,6 +830,7 @@ const getRuntimeConfig = (config) => {
|
|||||||
protocol: config?.protocol ?? protocols_1.AwsQueryProtocol,
|
protocol: config?.protocol ?? protocols_1.AwsQueryProtocol,
|
||||||
protocolSettings: config?.protocolSettings ?? {
|
protocolSettings: config?.protocolSettings ?? {
|
||||||
defaultNamespace: "com.amazonaws.sts",
|
defaultNamespace: "com.amazonaws.sts",
|
||||||
|
errorTypeRegistries: schemas_0_1.errorTypeRegistries,
|
||||||
xmlNamespace: "https://sts.amazonaws.com/doc/2011-06-15/",
|
xmlNamespace: "https://sts.amazonaws.com/doc/2011-06-15/",
|
||||||
version: "2011-06-15",
|
version: "2011-06-15",
|
||||||
serviceTarget: "AWSSecurityTokenServiceV20110615",
|
serviceTarget: "AWSSecurityTokenServiceV20110615",
|
||||||
@ -884,12 +864,214 @@ const resolveRuntimeExtensions = (runtimeConfig, extensions) => {
|
|||||||
exports.resolveRuntimeExtensions = resolveRuntimeExtensions;
|
exports.resolveRuntimeExtensions = resolveRuntimeExtensions;
|
||||||
|
|
||||||
|
|
||||||
|
/***/ }),
|
||||||
|
|
||||||
|
/***/ 1684:
|
||||||
|
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
||||||
|
|
||||||
|
|
||||||
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
||||||
|
exports.AssumeRoleWithWebIdentity$ = exports.AssumeRole$ = exports.Tag$ = exports.ProvidedContext$ = exports.PolicyDescriptorType$ = exports.Credentials$ = exports.AssumeRoleWithWebIdentityResponse$ = exports.AssumeRoleWithWebIdentityRequest$ = exports.AssumeRoleResponse$ = exports.AssumeRoleRequest$ = exports.AssumedRoleUser$ = exports.errorTypeRegistries = exports.RegionDisabledException$ = exports.PackedPolicyTooLargeException$ = exports.MalformedPolicyDocumentException$ = exports.InvalidIdentityTokenException$ = exports.IDPRejectedClaimException$ = exports.IDPCommunicationErrorException$ = exports.ExpiredTokenException$ = exports.STSServiceException$ = void 0;
|
||||||
|
const _A = "Arn";
|
||||||
|
const _AKI = "AccessKeyId";
|
||||||
|
const _AR = "AssumeRole";
|
||||||
|
const _ARI = "AssumedRoleId";
|
||||||
|
const _ARR = "AssumeRoleRequest";
|
||||||
|
const _ARRs = "AssumeRoleResponse";
|
||||||
|
const _ARU = "AssumedRoleUser";
|
||||||
|
const _ARWWI = "AssumeRoleWithWebIdentity";
|
||||||
|
const _ARWWIR = "AssumeRoleWithWebIdentityRequest";
|
||||||
|
const _ARWWIRs = "AssumeRoleWithWebIdentityResponse";
|
||||||
|
const _Au = "Audience";
|
||||||
|
const _C = "Credentials";
|
||||||
|
const _CA = "ContextAssertion";
|
||||||
|
const _DS = "DurationSeconds";
|
||||||
|
const _E = "Expiration";
|
||||||
|
const _EI = "ExternalId";
|
||||||
|
const _ETE = "ExpiredTokenException";
|
||||||
|
const _IDPCEE = "IDPCommunicationErrorException";
|
||||||
|
const _IDPRCE = "IDPRejectedClaimException";
|
||||||
|
const _IITE = "InvalidIdentityTokenException";
|
||||||
|
const _K = "Key";
|
||||||
|
const _MPDE = "MalformedPolicyDocumentException";
|
||||||
|
const _P = "Policy";
|
||||||
|
const _PA = "PolicyArns";
|
||||||
|
const _PAr = "ProviderArn";
|
||||||
|
const _PC = "ProvidedContexts";
|
||||||
|
const _PCLT = "ProvidedContextsListType";
|
||||||
|
const _PCr = "ProvidedContext";
|
||||||
|
const _PDT = "PolicyDescriptorType";
|
||||||
|
const _PI = "ProviderId";
|
||||||
|
const _PPS = "PackedPolicySize";
|
||||||
|
const _PPTLE = "PackedPolicyTooLargeException";
|
||||||
|
const _Pr = "Provider";
|
||||||
|
const _RA = "RoleArn";
|
||||||
|
const _RDE = "RegionDisabledException";
|
||||||
|
const _RSN = "RoleSessionName";
|
||||||
|
const _SAK = "SecretAccessKey";
|
||||||
|
const _SFWIT = "SubjectFromWebIdentityToken";
|
||||||
|
const _SI = "SourceIdentity";
|
||||||
|
const _SN = "SerialNumber";
|
||||||
|
const _ST = "SessionToken";
|
||||||
|
const _T = "Tags";
|
||||||
|
const _TC = "TokenCode";
|
||||||
|
const _TTK = "TransitiveTagKeys";
|
||||||
|
const _Ta = "Tag";
|
||||||
|
const _V = "Value";
|
||||||
|
const _WIT = "WebIdentityToken";
|
||||||
|
const _a = "arn";
|
||||||
|
const _aKST = "accessKeySecretType";
|
||||||
|
const _aQE = "awsQueryError";
|
||||||
|
const _c = "client";
|
||||||
|
const _cTT = "clientTokenType";
|
||||||
|
const _e = "error";
|
||||||
|
const _hE = "httpError";
|
||||||
|
const _m = "message";
|
||||||
|
const _pDLT = "policyDescriptorListType";
|
||||||
|
const _s = "smithy.ts.sdk.synthetic.com.amazonaws.sts";
|
||||||
|
const _tLT = "tagListType";
|
||||||
|
const n0 = "com.amazonaws.sts";
|
||||||
|
const schema_1 = __webpack_require__(6890);
|
||||||
|
const errors_1 = __webpack_require__(1688);
|
||||||
|
const STSServiceException_1 = __webpack_require__(7171);
|
||||||
|
const _s_registry = schema_1.TypeRegistry.for(_s);
|
||||||
|
exports.STSServiceException$ = [-3, _s, "STSServiceException", 0, [], []];
|
||||||
|
_s_registry.registerError(exports.STSServiceException$, STSServiceException_1.STSServiceException);
|
||||||
|
const n0_registry = schema_1.TypeRegistry.for(n0);
|
||||||
|
exports.ExpiredTokenException$ = [
|
||||||
|
-3,
|
||||||
|
n0,
|
||||||
|
_ETE,
|
||||||
|
{ [_aQE]: [`ExpiredTokenException`, 400], [_e]: _c, [_hE]: 400 },
|
||||||
|
[_m],
|
||||||
|
[0],
|
||||||
|
];
|
||||||
|
n0_registry.registerError(exports.ExpiredTokenException$, errors_1.ExpiredTokenException);
|
||||||
|
exports.IDPCommunicationErrorException$ = [
|
||||||
|
-3,
|
||||||
|
n0,
|
||||||
|
_IDPCEE,
|
||||||
|
{ [_aQE]: [`IDPCommunicationError`, 400], [_e]: _c, [_hE]: 400 },
|
||||||
|
[_m],
|
||||||
|
[0],
|
||||||
|
];
|
||||||
|
n0_registry.registerError(exports.IDPCommunicationErrorException$, errors_1.IDPCommunicationErrorException);
|
||||||
|
exports.IDPRejectedClaimException$ = [
|
||||||
|
-3,
|
||||||
|
n0,
|
||||||
|
_IDPRCE,
|
||||||
|
{ [_aQE]: [`IDPRejectedClaim`, 403], [_e]: _c, [_hE]: 403 },
|
||||||
|
[_m],
|
||||||
|
[0],
|
||||||
|
];
|
||||||
|
n0_registry.registerError(exports.IDPRejectedClaimException$, errors_1.IDPRejectedClaimException);
|
||||||
|
exports.InvalidIdentityTokenException$ = [
|
||||||
|
-3,
|
||||||
|
n0,
|
||||||
|
_IITE,
|
||||||
|
{ [_aQE]: [`InvalidIdentityToken`, 400], [_e]: _c, [_hE]: 400 },
|
||||||
|
[_m],
|
||||||
|
[0],
|
||||||
|
];
|
||||||
|
n0_registry.registerError(exports.InvalidIdentityTokenException$, errors_1.InvalidIdentityTokenException);
|
||||||
|
exports.MalformedPolicyDocumentException$ = [
|
||||||
|
-3,
|
||||||
|
n0,
|
||||||
|
_MPDE,
|
||||||
|
{ [_aQE]: [`MalformedPolicyDocument`, 400], [_e]: _c, [_hE]: 400 },
|
||||||
|
[_m],
|
||||||
|
[0],
|
||||||
|
];
|
||||||
|
n0_registry.registerError(exports.MalformedPolicyDocumentException$, errors_1.MalformedPolicyDocumentException);
|
||||||
|
exports.PackedPolicyTooLargeException$ = [
|
||||||
|
-3,
|
||||||
|
n0,
|
||||||
|
_PPTLE,
|
||||||
|
{ [_aQE]: [`PackedPolicyTooLarge`, 400], [_e]: _c, [_hE]: 400 },
|
||||||
|
[_m],
|
||||||
|
[0],
|
||||||
|
];
|
||||||
|
n0_registry.registerError(exports.PackedPolicyTooLargeException$, errors_1.PackedPolicyTooLargeException);
|
||||||
|
exports.RegionDisabledException$ = [
|
||||||
|
-3,
|
||||||
|
n0,
|
||||||
|
_RDE,
|
||||||
|
{ [_aQE]: [`RegionDisabledException`, 403], [_e]: _c, [_hE]: 403 },
|
||||||
|
[_m],
|
||||||
|
[0],
|
||||||
|
];
|
||||||
|
n0_registry.registerError(exports.RegionDisabledException$, errors_1.RegionDisabledException);
|
||||||
|
exports.errorTypeRegistries = [_s_registry, n0_registry];
|
||||||
|
var accessKeySecretType = [0, n0, _aKST, 8, 0];
|
||||||
|
var clientTokenType = [0, n0, _cTT, 8, 0];
|
||||||
|
exports.AssumedRoleUser$ = [3, n0, _ARU, 0, [_ARI, _A], [0, 0], 2];
|
||||||
|
exports.AssumeRoleRequest$ = [
|
||||||
|
3,
|
||||||
|
n0,
|
||||||
|
_ARR,
|
||||||
|
0,
|
||||||
|
[_RA, _RSN, _PA, _P, _DS, _T, _TTK, _EI, _SN, _TC, _SI, _PC],
|
||||||
|
[0, 0, () => policyDescriptorListType, 0, 1, () => tagListType, 64 | 0, 0, 0, 0, 0, () => ProvidedContextsListType],
|
||||||
|
2,
|
||||||
|
];
|
||||||
|
exports.AssumeRoleResponse$ = [
|
||||||
|
3,
|
||||||
|
n0,
|
||||||
|
_ARRs,
|
||||||
|
0,
|
||||||
|
[_C, _ARU, _PPS, _SI],
|
||||||
|
[[() => exports.Credentials$, 0], () => exports.AssumedRoleUser$, 1, 0],
|
||||||
|
];
|
||||||
|
exports.AssumeRoleWithWebIdentityRequest$ = [
|
||||||
|
3,
|
||||||
|
n0,
|
||||||
|
_ARWWIR,
|
||||||
|
0,
|
||||||
|
[_RA, _RSN, _WIT, _PI, _PA, _P, _DS],
|
||||||
|
[0, 0, [() => clientTokenType, 0], 0, () => policyDescriptorListType, 0, 1],
|
||||||
|
3,
|
||||||
|
];
|
||||||
|
exports.AssumeRoleWithWebIdentityResponse$ = [
|
||||||
|
3,
|
||||||
|
n0,
|
||||||
|
_ARWWIRs,
|
||||||
|
0,
|
||||||
|
[_C, _SFWIT, _ARU, _PPS, _Pr, _Au, _SI],
|
||||||
|
[[() => exports.Credentials$, 0], 0, () => exports.AssumedRoleUser$, 1, 0, 0, 0],
|
||||||
|
];
|
||||||
|
exports.Credentials$ = [
|
||||||
|
3,
|
||||||
|
n0,
|
||||||
|
_C,
|
||||||
|
0,
|
||||||
|
[_AKI, _SAK, _ST, _E],
|
||||||
|
[0, [() => accessKeySecretType, 0], 0, 4],
|
||||||
|
4,
|
||||||
|
];
|
||||||
|
exports.PolicyDescriptorType$ = [3, n0, _PDT, 0, [_a], [0]];
|
||||||
|
exports.ProvidedContext$ = [3, n0, _PCr, 0, [_PAr, _CA], [0, 0]];
|
||||||
|
exports.Tag$ = [3, n0, _Ta, 0, [_K, _V], [0, 0], 2];
|
||||||
|
var policyDescriptorListType = [1, n0, _pDLT, 0, () => exports.PolicyDescriptorType$];
|
||||||
|
var ProvidedContextsListType = [1, n0, _PCLT, 0, () => exports.ProvidedContext$];
|
||||||
|
var tagKeyListType = (/* unused pure expression or super */ null && (64 | 0));
|
||||||
|
var tagListType = [1, n0, _tLT, 0, () => exports.Tag$];
|
||||||
|
exports.AssumeRole$ = [9, n0, _AR, 0, () => exports.AssumeRoleRequest$, () => exports.AssumeRoleResponse$];
|
||||||
|
exports.AssumeRoleWithWebIdentity$ = [
|
||||||
|
9,
|
||||||
|
n0,
|
||||||
|
_ARWWI,
|
||||||
|
0,
|
||||||
|
() => exports.AssumeRoleWithWebIdentityRequest$,
|
||||||
|
() => exports.AssumeRoleWithWebIdentityResponse$,
|
||||||
|
];
|
||||||
|
|
||||||
|
|
||||||
/***/ }),
|
/***/ }),
|
||||||
|
|
||||||
/***/ 9955:
|
/***/ 9955:
|
||||||
/***/ ((module) => {
|
/***/ ((module) => {
|
||||||
|
|
||||||
module.exports = /*#__PURE__*/JSON.parse('{"name":"@aws-sdk/nested-clients","version":"3.975.0","description":"Nested clients for AWS SDK packages.","main":"./dist-cjs/index.js","module":"./dist-es/index.js","types":"./dist-types/index.d.ts","scripts":{"build":"yarn lint && concurrently \'yarn:build:types\' \'yarn:build:es\' && yarn build:cjs","build:cjs":"node ../../scripts/compilation/inline nested-clients","build:es":"tsc -p tsconfig.es.json","build:include:deps":"yarn g:turbo run build -F=\\"$npm_package_name\\"","build:types":"tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4","clean":"premove dist-cjs dist-es dist-types tsconfig.cjs.tsbuildinfo tsconfig.es.tsbuildinfo tsconfig.types.tsbuildinfo","lint":"node ../../scripts/validation/submodules-linter.js --pkg nested-clients","test":"yarn g:vitest run","test:watch":"yarn g:vitest watch"},"engines":{"node":">=20.0.0"},"sideEffects":false,"author":{"name":"AWS SDK for JavaScript Team","url":"https://aws.amazon.com/javascript/"},"license":"Apache-2.0","dependencies":{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"^3.973.1","@aws-sdk/middleware-host-header":"^3.972.1","@aws-sdk/middleware-logger":"^3.972.1","@aws-sdk/middleware-recursion-detection":"^3.972.1","@aws-sdk/middleware-user-agent":"^3.972.2","@aws-sdk/region-config-resolver":"^3.972.1","@aws-sdk/types":"^3.973.0","@aws-sdk/util-endpoints":"3.972.0","@aws-sdk/util-user-agent-browser":"^3.972.1","@aws-sdk/util-user-agent-node":"^3.972.1","@smithy/config-resolver":"^4.4.6","@smithy/core":"^3.21.1","@smithy/fetch-http-handler":"^5.3.9","@smithy/hash-node":"^4.2.8","@smithy/invalid-dependency":"^4.2.8","@smithy/middleware-content-length":"^4.2.8","@smithy/middleware-endpoint":"^4.4.11","@smithy/middleware-retry":"^4.4.27","@smithy/middleware-serde":"^4.2.9","@smithy/middleware-stack":"^4.2.8","@smithy/node-config-provider":"^4.3.8","@smithy/node-http-handler":"^4.4.8","@smithy/protocol-http":"^5.3.8","@smithy/smithy-client":"^4.10.12","@smithy/types":"^4.12.0","@smithy/url-parser":"^4.2.8","@smithy/util-base64":"^4.3.0","@smithy/util-body-length-browser":"^4.2.0","@smithy/util-body-length-node":"^4.2.1","@smithy/util-defaults-mode-browser":"^4.3.26","@smithy/util-defaults-mode-node":"^4.2.29","@smithy/util-endpoints":"^3.2.8","@smithy/util-middleware":"^4.2.8","@smithy/util-retry":"^4.2.8","@smithy/util-utf8":"^4.2.0","tslib":"^2.6.2"},"devDependencies":{"concurrently":"7.0.0","downlevel-dts":"0.10.1","premove":"4.0.0","typescript":"~5.8.3"},"typesVersions":{"<4.0":{"dist-types/*":["dist-types/ts3.4/*"]}},"files":["./signin.d.ts","./signin.js","./sso-oidc.d.ts","./sso-oidc.js","./sts.d.ts","./sts.js","dist-*/**"],"browser":{"./dist-es/submodules/signin/runtimeConfig":"./dist-es/submodules/signin/runtimeConfig.browser","./dist-es/submodules/sso-oidc/runtimeConfig":"./dist-es/submodules/sso-oidc/runtimeConfig.browser","./dist-es/submodules/sts/runtimeConfig":"./dist-es/submodules/sts/runtimeConfig.browser"},"react-native":{},"homepage":"https://github.com/aws/aws-sdk-js-v3/tree/main/packages/nested-clients","repository":{"type":"git","url":"https://github.com/aws/aws-sdk-js-v3.git","directory":"packages/nested-clients"},"exports":{"./package.json":"./package.json","./sso-oidc":{"types":"./dist-types/submodules/sso-oidc/index.d.ts","module":"./dist-es/submodules/sso-oidc/index.js","node":"./dist-cjs/submodules/sso-oidc/index.js","import":"./dist-es/submodules/sso-oidc/index.js","require":"./dist-cjs/submodules/sso-oidc/index.js"},"./sts":{"types":"./dist-types/submodules/sts/index.d.ts","module":"./dist-es/submodules/sts/index.js","node":"./dist-cjs/submodules/sts/index.js","import":"./dist-es/submodules/sts/index.js","require":"./dist-cjs/submodules/sts/index.js"},"./signin":{"types":"./dist-types/submodules/signin/index.d.ts","module":"./dist-es/submodules/signin/index.js","node":"./dist-cjs/submodules/signin/index.js","import":"./dist-es/submodules/signin/index.js","require":"./dist-cjs/submodules/signin/index.js"}}}');
|
module.exports = /*#__PURE__*/JSON.parse('{"name":"@aws-sdk/nested-clients","version":"3.996.3","description":"Nested clients for AWS SDK packages.","main":"./dist-cjs/index.js","module":"./dist-es/index.js","types":"./dist-types/index.d.ts","scripts":{"build":"yarn lint && concurrently \'yarn:build:types\' \'yarn:build:es\' && yarn build:cjs","build:cjs":"node ../../scripts/compilation/inline nested-clients","build:es":"tsc -p tsconfig.es.json","build:include:deps":"yarn g:turbo run build -F=\\"$npm_package_name\\"","build:types":"tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4","clean":"premove dist-cjs dist-es dist-types tsconfig.cjs.tsbuildinfo tsconfig.es.tsbuildinfo tsconfig.types.tsbuildinfo","lint":"node ../../scripts/validation/submodules-linter.js --pkg nested-clients","test":"yarn g:vitest run","test:watch":"yarn g:vitest watch"},"engines":{"node":">=20.0.0"},"sideEffects":false,"author":{"name":"AWS SDK for JavaScript Team","url":"https://aws.amazon.com/javascript/"},"license":"Apache-2.0","dependencies":{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"^3.973.15","@aws-sdk/middleware-host-header":"^3.972.6","@aws-sdk/middleware-logger":"^3.972.6","@aws-sdk/middleware-recursion-detection":"^3.972.6","@aws-sdk/middleware-user-agent":"^3.972.15","@aws-sdk/region-config-resolver":"^3.972.6","@aws-sdk/types":"^3.973.4","@aws-sdk/util-endpoints":"^3.996.3","@aws-sdk/util-user-agent-browser":"^3.972.6","@aws-sdk/util-user-agent-node":"^3.973.0","@smithy/config-resolver":"^4.4.9","@smithy/core":"^3.23.6","@smithy/fetch-http-handler":"^5.3.11","@smithy/hash-node":"^4.2.10","@smithy/invalid-dependency":"^4.2.10","@smithy/middleware-content-length":"^4.2.10","@smithy/middleware-endpoint":"^4.4.20","@smithy/middleware-retry":"^4.4.37","@smithy/middleware-serde":"^4.2.11","@smithy/middleware-stack":"^4.2.10","@smithy/node-config-provider":"^4.3.10","@smithy/node-http-handler":"^4.4.12","@smithy/protocol-http":"^5.3.10","@smithy/smithy-client":"^4.12.0","@smithy/types":"^4.13.0","@smithy/url-parser":"^4.2.10","@smithy/util-base64":"^4.3.1","@smithy/util-body-length-browser":"^4.2.1","@smithy/util-body-length-node":"^4.2.2","@smithy/util-defaults-mode-browser":"^4.3.36","@smithy/util-defaults-mode-node":"^4.2.39","@smithy/util-endpoints":"^3.3.1","@smithy/util-middleware":"^4.2.10","@smithy/util-retry":"^4.2.10","@smithy/util-utf8":"^4.2.1","tslib":"^2.6.2"},"devDependencies":{"concurrently":"7.0.0","downlevel-dts":"0.10.1","premove":"4.0.0","typescript":"~5.8.3"},"typesVersions":{"<4.0":{"dist-types/*":["dist-types/ts3.4/*"]}},"files":["./cognito-identity.d.ts","./cognito-identity.js","./signin.d.ts","./signin.js","./sso-oidc.d.ts","./sso-oidc.js","./sso.d.ts","./sso.js","./sts.d.ts","./sts.js","dist-*/**"],"browser":{"./dist-es/submodules/signin/runtimeConfig":"./dist-es/submodules/signin/runtimeConfig.browser","./dist-es/submodules/sso-oidc/runtimeConfig":"./dist-es/submodules/sso-oidc/runtimeConfig.browser","./dist-es/submodules/sts/runtimeConfig":"./dist-es/submodules/sts/runtimeConfig.browser"},"react-native":{},"homepage":"https://github.com/aws/aws-sdk-js-v3/tree/main/packages/nested-clients","repository":{"type":"git","url":"https://github.com/aws/aws-sdk-js-v3.git","directory":"packages/nested-clients"},"exports":{"./package.json":"./package.json","./sso-oidc":{"types":"./dist-types/submodules/sso-oidc/index.d.ts","module":"./dist-es/submodules/sso-oidc/index.js","node":"./dist-cjs/submodules/sso-oidc/index.js","import":"./dist-es/submodules/sso-oidc/index.js","require":"./dist-cjs/submodules/sso-oidc/index.js"},"./sts":{"types":"./dist-types/submodules/sts/index.d.ts","module":"./dist-es/submodules/sts/index.js","node":"./dist-cjs/submodules/sts/index.js","import":"./dist-es/submodules/sts/index.js","require":"./dist-cjs/submodules/sts/index.js"},"./signin":{"types":"./dist-types/submodules/signin/index.d.ts","module":"./dist-es/submodules/signin/index.js","node":"./dist-cjs/submodules/signin/index.js","import":"./dist-es/submodules/signin/index.js","require":"./dist-cjs/submodules/signin/index.js"},"./cognito-identity":{"types":"./dist-types/submodules/cognito-identity/index.d.ts","module":"./dist-es/submodules/cognito-identity/index.js","node":"./dist-cjs/submodules/cognito-identity/index.js","import":"./dist-es/submodules/cognito-identity/index.js","require":"./dist-cjs/submodules/cognito-identity/index.js"},"./sso":{"types":"./dist-types/submodules/sso/index.d.ts","module":"./dist-es/submodules/sso/index.js","node":"./dist-cjs/submodules/sso/index.js","import":"./dist-es/submodules/sso/index.js","require":"./dist-cjs/submodules/sso/index.js"}}}');
|
||||||
|
|
||||||
/***/ })
|
/***/ })
|
||||||
|
|
||||||
|
|||||||
2
dist/136.index.js.map
generated
vendored
2
dist/136.index.js.map
generated
vendored
File diff suppressed because one or more lines are too long
6
dist/360.index.js
generated
vendored
6
dist/360.index.js
generated
vendored
@ -9,8 +9,8 @@ export const modules = {
|
|||||||
|
|
||||||
var sharedIniFileLoader = __webpack_require__(4964);
|
var sharedIniFileLoader = __webpack_require__(4964);
|
||||||
var propertyProvider = __webpack_require__(8857);
|
var propertyProvider = __webpack_require__(8857);
|
||||||
var child_process = __webpack_require__(5317);
|
var node_child_process = __webpack_require__(1421);
|
||||||
var util = __webpack_require__(9023);
|
var node_util = __webpack_require__(7975);
|
||||||
var client = __webpack_require__(5152);
|
var client = __webpack_require__(5152);
|
||||||
|
|
||||||
const getValidatedProcessCredentials = (profileName, data, profiles) => {
|
const getValidatedProcessCredentials = (profileName, data, profiles) => {
|
||||||
@ -48,7 +48,7 @@ const resolveProcessCredentials = async (profileName, profiles, logger) => {
|
|||||||
if (profiles[profileName]) {
|
if (profiles[profileName]) {
|
||||||
const credentialProcess = profile["credential_process"];
|
const credentialProcess = profile["credential_process"];
|
||||||
if (credentialProcess !== undefined) {
|
if (credentialProcess !== undefined) {
|
||||||
const execPromise = util.promisify(sharedIniFileLoader.externalDataInterceptor?.getTokenRecord?.().exec ?? child_process.exec);
|
const execPromise = node_util.promisify(sharedIniFileLoader.externalDataInterceptor?.getTokenRecord?.().exec ?? node_child_process.exec);
|
||||||
try {
|
try {
|
||||||
const { stdout } = await execPromise(credentialProcess);
|
const { stdout } = await execPromise(credentialProcess);
|
||||||
let data;
|
let data;
|
||||||
|
|||||||
2
dist/360.index.js.map
generated
vendored
2
dist/360.index.js.map
generated
vendored
@ -1 +1 @@
|
|||||||
{"version":3,"file":"360.index.js","mappings":";;;;;;;AAAA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA","sources":[".././node_modules/@aws-sdk/credential-provider-process/dist-cjs/index.js"],"sourcesContent":["'use strict';\n\nvar sharedIniFileLoader = require('@smithy/shared-ini-file-loader');\nvar propertyProvider = require('@smithy/property-provider');\nvar child_process = require('child_process');\nvar util = require('util');\nvar client = require('@aws-sdk/core/client');\n\nconst getValidatedProcessCredentials = (profileName, data, profiles) => {\n if (data.Version !== 1) {\n throw Error(`Profile ${profileName} credential_process did not return Version 1.`);\n }\n if (data.AccessKeyId === undefined || data.SecretAccessKey === undefined) {\n throw Error(`Profile ${profileName} credential_process returned invalid credentials.`);\n }\n if (data.Expiration) {\n const currentTime = new Date();\n const expireTime = new Date(data.Expiration);\n if (expireTime < currentTime) {\n throw Error(`Profile ${profileName} credential_process returned expired credentials.`);\n }\n }\n let accountId = data.AccountId;\n if (!accountId && profiles?.[profileName]?.aws_account_id) {\n accountId = profiles[profileName].aws_account_id;\n }\n const credentials = {\n accessKeyId: data.AccessKeyId,\n secretAccessKey: data.SecretAccessKey,\n ...(data.SessionToken && { sessionToken: data.SessionToken }),\n ...(data.Expiration && { expiration: new Date(data.Expiration) }),\n ...(data.CredentialScope && { credentialScope: data.CredentialScope }),\n ...(accountId && { accountId }),\n };\n client.setCredentialFeature(credentials, \"CREDENTIALS_PROCESS\", \"w\");\n return credentials;\n};\n\nconst resolveProcessCredentials = async (profileName, profiles, logger) => {\n const profile = profiles[profileName];\n if (profiles[profileName]) {\n const credentialProcess = profile[\"credential_process\"];\n if (credentialProcess !== undefined) {\n const execPromise = util.promisify(sharedIniFileLoader.externalDataInterceptor?.getTokenRecord?.().exec ?? child_process.exec);\n try {\n const { stdout } = await execPromise(credentialProcess);\n let data;\n try {\n data = JSON.parse(stdout.trim());\n }\n catch {\n throw Error(`Profile ${profileName} credential_process returned invalid JSON.`);\n }\n return getValidatedProcessCredentials(profileName, data, profiles);\n }\n catch (error) {\n throw new propertyProvider.CredentialsProviderError(error.message, { logger });\n }\n }\n else {\n throw new propertyProvider.CredentialsProviderError(`Profile ${profileName} did not contain credential_process.`, { logger });\n }\n }\n else {\n throw new propertyProvider.CredentialsProviderError(`Profile ${profileName} could not be found in shared credentials file.`, {\n logger,\n });\n }\n};\n\nconst fromProcess = (init = {}) => async ({ callerClientConfig } = {}) => {\n init.logger?.debug(\"@aws-sdk/credential-provider-process - fromProcess\");\n const profiles = await sharedIniFileLoader.parseKnownFiles(init);\n return resolveProcessCredentials(sharedIniFileLoader.getProfileName({\n profile: init.profile ?? callerClientConfig?.profile,\n }), profiles, init.logger);\n};\n\nexports.fromProcess = fromProcess;\n"],"names":[],"sourceRoot":""}
|
{"version":3,"file":"360.index.js","mappings":";;;;;;;AAAA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA","sources":[".././node_modules/@aws-sdk/credential-provider-process/dist-cjs/index.js"],"sourcesContent":["'use strict';\n\nvar sharedIniFileLoader = require('@smithy/shared-ini-file-loader');\nvar propertyProvider = require('@smithy/property-provider');\nvar node_child_process = require('node:child_process');\nvar node_util = require('node:util');\nvar client = require('@aws-sdk/core/client');\n\nconst getValidatedProcessCredentials = (profileName, data, profiles) => {\n if (data.Version !== 1) {\n throw Error(`Profile ${profileName} credential_process did not return Version 1.`);\n }\n if (data.AccessKeyId === undefined || data.SecretAccessKey === undefined) {\n throw Error(`Profile ${profileName} credential_process returned invalid credentials.`);\n }\n if (data.Expiration) {\n const currentTime = new Date();\n const expireTime = new Date(data.Expiration);\n if (expireTime < currentTime) {\n throw Error(`Profile ${profileName} credential_process returned expired credentials.`);\n }\n }\n let accountId = data.AccountId;\n if (!accountId && profiles?.[profileName]?.aws_account_id) {\n accountId = profiles[profileName].aws_account_id;\n }\n const credentials = {\n accessKeyId: data.AccessKeyId,\n secretAccessKey: data.SecretAccessKey,\n ...(data.SessionToken && { sessionToken: data.SessionToken }),\n ...(data.Expiration && { expiration: new Date(data.Expiration) }),\n ...(data.CredentialScope && { credentialScope: data.CredentialScope }),\n ...(accountId && { accountId }),\n };\n client.setCredentialFeature(credentials, \"CREDENTIALS_PROCESS\", \"w\");\n return credentials;\n};\n\nconst resolveProcessCredentials = async (profileName, profiles, logger) => {\n const profile = profiles[profileName];\n if (profiles[profileName]) {\n const credentialProcess = profile[\"credential_process\"];\n if (credentialProcess !== undefined) {\n const execPromise = node_util.promisify(sharedIniFileLoader.externalDataInterceptor?.getTokenRecord?.().exec ?? node_child_process.exec);\n try {\n const { stdout } = await execPromise(credentialProcess);\n let data;\n try {\n data = JSON.parse(stdout.trim());\n }\n catch {\n throw Error(`Profile ${profileName} credential_process returned invalid JSON.`);\n }\n return getValidatedProcessCredentials(profileName, data, profiles);\n }\n catch (error) {\n throw new propertyProvider.CredentialsProviderError(error.message, { logger });\n }\n }\n else {\n throw new propertyProvider.CredentialsProviderError(`Profile ${profileName} did not contain credential_process.`, { logger });\n }\n }\n else {\n throw new propertyProvider.CredentialsProviderError(`Profile ${profileName} could not be found in shared credentials file.`, {\n logger,\n });\n }\n};\n\nconst fromProcess = (init = {}) => async ({ callerClientConfig } = {}) => {\n init.logger?.debug(\"@aws-sdk/credential-provider-process - fromProcess\");\n const profiles = await sharedIniFileLoader.parseKnownFiles(init);\n return resolveProcessCredentials(sharedIniFileLoader.getProfileName({\n profile: init.profile ?? callerClientConfig?.profile,\n }), profiles, init.logger);\n};\n\nexports.fromProcess = fromProcess;\n"],"names":[],"sourceRoot":""}
|
||||||
861
dist/443.index.js
generated
vendored
861
dist/443.index.js
generated
vendored
@ -97,8 +97,107 @@ util_endpoints_2.customEndpointFunctions.aws = util_endpoints_1.awsEndpointFunct
|
|||||||
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
||||||
exports.ruleSet = void 0;
|
exports.ruleSet = void 0;
|
||||||
const u = "required", v = "fn", w = "argv", x = "ref";
|
const u = "required", v = "fn", w = "argv", x = "ref";
|
||||||
const a = true, b = "isSet", c = "booleanEquals", d = "error", e = "endpoint", f = "tree", g = "PartitionResult", h = "getAttr", i = { [u]: false, "type": "string" }, j = { [u]: true, "default": false, "type": "boolean" }, k = { [x]: "Endpoint" }, l = { [v]: c, [w]: [{ [x]: "UseFIPS" }, true] }, m = { [v]: c, [w]: [{ [x]: "UseDualStack" }, true] }, n = {}, o = { [v]: h, [w]: [{ [x]: g }, "supportsFIPS"] }, p = { [x]: g }, q = { [v]: c, [w]: [true, { [v]: h, [w]: [p, "supportsDualStack"] }] }, r = [l], s = [m], t = [{ [x]: "Region" }];
|
const a = true, b = "isSet", c = "booleanEquals", d = "error", e = "endpoint", f = "tree", g = "PartitionResult", h = "getAttr", i = { [u]: false, type: "string" }, j = { [u]: true, default: false, type: "boolean" }, k = { [x]: "Endpoint" }, l = { [v]: c, [w]: [{ [x]: "UseFIPS" }, true] }, m = { [v]: c, [w]: [{ [x]: "UseDualStack" }, true] }, n = {}, o = { [v]: h, [w]: [{ [x]: g }, "supportsFIPS"] }, p = { [x]: g }, q = { [v]: c, [w]: [true, { [v]: h, [w]: [p, "supportsDualStack"] }] }, r = [l], s = [m], t = [{ [x]: "Region" }];
|
||||||
const _data = { version: "1.0", parameters: { Region: i, UseDualStack: j, UseFIPS: j, Endpoint: i }, rules: [{ conditions: [{ [v]: b, [w]: [k] }], rules: [{ conditions: r, error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: d }, { conditions: s, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", type: d }, { endpoint: { url: k, properties: n, headers: n }, type: e }], type: f }, { conditions: [{ [v]: b, [w]: t }], rules: [{ conditions: [{ [v]: "aws.partition", [w]: t, assign: g }], rules: [{ conditions: [l, m], rules: [{ conditions: [{ [v]: c, [w]: [a, o] }, q], rules: [{ endpoint: { url: "https://oidc-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: n, headers: n }, type: e }], type: f }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", type: d }], type: f }, { conditions: r, rules: [{ conditions: [{ [v]: c, [w]: [o, a] }], rules: [{ conditions: [{ [v]: "stringEquals", [w]: [{ [v]: h, [w]: [p, "name"] }, "aws-us-gov"] }], endpoint: { url: "https://oidc.{Region}.amazonaws.com", properties: n, headers: n }, type: e }, { endpoint: { url: "https://oidc-fips.{Region}.{PartitionResult#dnsSuffix}", properties: n, headers: n }, type: e }], type: f }, { error: "FIPS is enabled but this partition does not support FIPS", type: d }], type: f }, { conditions: s, rules: [{ conditions: [q], rules: [{ endpoint: { url: "https://oidc.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: n, headers: n }, type: e }], type: f }, { error: "DualStack is enabled but this partition does not support DualStack", type: d }], type: f }, { endpoint: { url: "https://oidc.{Region}.{PartitionResult#dnsSuffix}", properties: n, headers: n }, type: e }], type: f }], type: f }, { error: "Invalid Configuration: Missing Region", type: d }] };
|
const _data = {
|
||||||
|
version: "1.0",
|
||||||
|
parameters: { Region: i, UseDualStack: j, UseFIPS: j, Endpoint: i },
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
conditions: [{ [v]: b, [w]: [k] }],
|
||||||
|
rules: [
|
||||||
|
{ conditions: r, error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: d },
|
||||||
|
{ conditions: s, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", type: d },
|
||||||
|
{ endpoint: { url: k, properties: n, headers: n }, type: e },
|
||||||
|
],
|
||||||
|
type: f,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
conditions: [{ [v]: b, [w]: t }],
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
conditions: [{ [v]: "aws.partition", [w]: t, assign: g }],
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
conditions: [l, m],
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
conditions: [{ [v]: c, [w]: [a, o] }, q],
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
endpoint: {
|
||||||
|
url: "https://oidc-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",
|
||||||
|
properties: n,
|
||||||
|
headers: n,
|
||||||
|
},
|
||||||
|
type: e,
|
||||||
|
},
|
||||||
|
],
|
||||||
|
type: f,
|
||||||
|
},
|
||||||
|
{ error: "FIPS and DualStack are enabled, but this partition does not support one or both", type: d },
|
||||||
|
],
|
||||||
|
type: f,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
conditions: r,
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
conditions: [{ [v]: c, [w]: [o, a] }],
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
conditions: [{ [v]: "stringEquals", [w]: [{ [v]: h, [w]: [p, "name"] }, "aws-us-gov"] }],
|
||||||
|
endpoint: { url: "https://oidc.{Region}.amazonaws.com", properties: n, headers: n },
|
||||||
|
type: e,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
endpoint: {
|
||||||
|
url: "https://oidc-fips.{Region}.{PartitionResult#dnsSuffix}",
|
||||||
|
properties: n,
|
||||||
|
headers: n,
|
||||||
|
},
|
||||||
|
type: e,
|
||||||
|
},
|
||||||
|
],
|
||||||
|
type: f,
|
||||||
|
},
|
||||||
|
{ error: "FIPS is enabled but this partition does not support FIPS", type: d },
|
||||||
|
],
|
||||||
|
type: f,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
conditions: s,
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
conditions: [q],
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
endpoint: {
|
||||||
|
url: "https://oidc.{Region}.{PartitionResult#dualStackDnsSuffix}",
|
||||||
|
properties: n,
|
||||||
|
headers: n,
|
||||||
|
},
|
||||||
|
type: e,
|
||||||
|
},
|
||||||
|
],
|
||||||
|
type: f,
|
||||||
|
},
|
||||||
|
{ error: "DualStack is enabled but this partition does not support DualStack", type: d },
|
||||||
|
],
|
||||||
|
type: f,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
endpoint: { url: "https://oidc.{Region}.{PartitionResult#dnsSuffix}", properties: n, headers: n },
|
||||||
|
type: e,
|
||||||
|
},
|
||||||
|
],
|
||||||
|
type: f,
|
||||||
|
},
|
||||||
|
],
|
||||||
|
type: f,
|
||||||
|
},
|
||||||
|
{ error: "Invalid Configuration: Missing Region", type: d },
|
||||||
|
],
|
||||||
|
};
|
||||||
exports.ruleSet = _data;
|
exports.ruleSet = _data;
|
||||||
|
|
||||||
|
|
||||||
@ -107,7 +206,6 @@ exports.ruleSet = _data;
|
|||||||
/***/ 9443:
|
/***/ 9443:
|
||||||
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
||||||
|
|
||||||
var __webpack_unused_export__;
|
|
||||||
|
|
||||||
|
|
||||||
var middlewareHostHeader = __webpack_require__(2590);
|
var middlewareHostHeader = __webpack_require__(2590);
|
||||||
@ -125,6 +223,9 @@ var httpAuthSchemeProvider = __webpack_require__(8396);
|
|||||||
var runtimeConfig = __webpack_require__(6901);
|
var runtimeConfig = __webpack_require__(6901);
|
||||||
var regionConfigResolver = __webpack_require__(6463);
|
var regionConfigResolver = __webpack_require__(6463);
|
||||||
var protocolHttp = __webpack_require__(2356);
|
var protocolHttp = __webpack_require__(2356);
|
||||||
|
var schemas_0 = __webpack_require__(7143);
|
||||||
|
var errors = __webpack_require__(5843);
|
||||||
|
var SSOOIDCServiceException = __webpack_require__(3952);
|
||||||
|
|
||||||
const resolveClientEndpointParameters = (options) => {
|
const resolveClientEndpointParameters = (options) => {
|
||||||
return Object.assign(options, {
|
return Object.assign(options, {
|
||||||
@ -220,325 +321,6 @@ class SSOOIDCClient extends smithyClient.Client {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
class SSOOIDCServiceException extends smithyClient.ServiceException {
|
|
||||||
constructor(options) {
|
|
||||||
super(options);
|
|
||||||
Object.setPrototypeOf(this, SSOOIDCServiceException.prototype);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
class AccessDeniedException extends SSOOIDCServiceException {
|
|
||||||
name = "AccessDeniedException";
|
|
||||||
$fault = "client";
|
|
||||||
error;
|
|
||||||
reason;
|
|
||||||
error_description;
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "AccessDeniedException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, AccessDeniedException.prototype);
|
|
||||||
this.error = opts.error;
|
|
||||||
this.reason = opts.reason;
|
|
||||||
this.error_description = opts.error_description;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
class AuthorizationPendingException extends SSOOIDCServiceException {
|
|
||||||
name = "AuthorizationPendingException";
|
|
||||||
$fault = "client";
|
|
||||||
error;
|
|
||||||
error_description;
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "AuthorizationPendingException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, AuthorizationPendingException.prototype);
|
|
||||||
this.error = opts.error;
|
|
||||||
this.error_description = opts.error_description;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
class ExpiredTokenException extends SSOOIDCServiceException {
|
|
||||||
name = "ExpiredTokenException";
|
|
||||||
$fault = "client";
|
|
||||||
error;
|
|
||||||
error_description;
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "ExpiredTokenException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, ExpiredTokenException.prototype);
|
|
||||||
this.error = opts.error;
|
|
||||||
this.error_description = opts.error_description;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
class InternalServerException extends SSOOIDCServiceException {
|
|
||||||
name = "InternalServerException";
|
|
||||||
$fault = "server";
|
|
||||||
error;
|
|
||||||
error_description;
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "InternalServerException",
|
|
||||||
$fault: "server",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, InternalServerException.prototype);
|
|
||||||
this.error = opts.error;
|
|
||||||
this.error_description = opts.error_description;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
class InvalidClientException extends SSOOIDCServiceException {
|
|
||||||
name = "InvalidClientException";
|
|
||||||
$fault = "client";
|
|
||||||
error;
|
|
||||||
error_description;
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "InvalidClientException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, InvalidClientException.prototype);
|
|
||||||
this.error = opts.error;
|
|
||||||
this.error_description = opts.error_description;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
class InvalidGrantException extends SSOOIDCServiceException {
|
|
||||||
name = "InvalidGrantException";
|
|
||||||
$fault = "client";
|
|
||||||
error;
|
|
||||||
error_description;
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "InvalidGrantException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, InvalidGrantException.prototype);
|
|
||||||
this.error = opts.error;
|
|
||||||
this.error_description = opts.error_description;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
class InvalidRequestException extends SSOOIDCServiceException {
|
|
||||||
name = "InvalidRequestException";
|
|
||||||
$fault = "client";
|
|
||||||
error;
|
|
||||||
reason;
|
|
||||||
error_description;
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "InvalidRequestException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, InvalidRequestException.prototype);
|
|
||||||
this.error = opts.error;
|
|
||||||
this.reason = opts.reason;
|
|
||||||
this.error_description = opts.error_description;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
class InvalidScopeException extends SSOOIDCServiceException {
|
|
||||||
name = "InvalidScopeException";
|
|
||||||
$fault = "client";
|
|
||||||
error;
|
|
||||||
error_description;
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "InvalidScopeException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, InvalidScopeException.prototype);
|
|
||||||
this.error = opts.error;
|
|
||||||
this.error_description = opts.error_description;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
class SlowDownException extends SSOOIDCServiceException {
|
|
||||||
name = "SlowDownException";
|
|
||||||
$fault = "client";
|
|
||||||
error;
|
|
||||||
error_description;
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "SlowDownException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, SlowDownException.prototype);
|
|
||||||
this.error = opts.error;
|
|
||||||
this.error_description = opts.error_description;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
class UnauthorizedClientException extends SSOOIDCServiceException {
|
|
||||||
name = "UnauthorizedClientException";
|
|
||||||
$fault = "client";
|
|
||||||
error;
|
|
||||||
error_description;
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "UnauthorizedClientException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, UnauthorizedClientException.prototype);
|
|
||||||
this.error = opts.error;
|
|
||||||
this.error_description = opts.error_description;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
class UnsupportedGrantTypeException extends SSOOIDCServiceException {
|
|
||||||
name = "UnsupportedGrantTypeException";
|
|
||||||
$fault = "client";
|
|
||||||
error;
|
|
||||||
error_description;
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "UnsupportedGrantTypeException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, UnsupportedGrantTypeException.prototype);
|
|
||||||
this.error = opts.error;
|
|
||||||
this.error_description = opts.error_description;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
const _ADE = "AccessDeniedException";
|
|
||||||
const _APE = "AuthorizationPendingException";
|
|
||||||
const _AT = "AccessToken";
|
|
||||||
const _CS = "ClientSecret";
|
|
||||||
const _CT = "CreateToken";
|
|
||||||
const _CTR = "CreateTokenRequest";
|
|
||||||
const _CTRr = "CreateTokenResponse";
|
|
||||||
const _CV = "CodeVerifier";
|
|
||||||
const _ETE = "ExpiredTokenException";
|
|
||||||
const _ICE = "InvalidClientException";
|
|
||||||
const _IGE = "InvalidGrantException";
|
|
||||||
const _IRE = "InvalidRequestException";
|
|
||||||
const _ISE = "InternalServerException";
|
|
||||||
const _ISEn = "InvalidScopeException";
|
|
||||||
const _IT = "IdToken";
|
|
||||||
const _RT = "RefreshToken";
|
|
||||||
const _SDE = "SlowDownException";
|
|
||||||
const _UCE = "UnauthorizedClientException";
|
|
||||||
const _UGTE = "UnsupportedGrantTypeException";
|
|
||||||
const _aT = "accessToken";
|
|
||||||
const _c = "client";
|
|
||||||
const _cI = "clientId";
|
|
||||||
const _cS = "clientSecret";
|
|
||||||
const _cV = "codeVerifier";
|
|
||||||
const _co = "code";
|
|
||||||
const _dC = "deviceCode";
|
|
||||||
const _e = "error";
|
|
||||||
const _eI = "expiresIn";
|
|
||||||
const _ed = "error_description";
|
|
||||||
const _gT = "grantType";
|
|
||||||
const _h = "http";
|
|
||||||
const _hE = "httpError";
|
|
||||||
const _iT = "idToken";
|
|
||||||
const _r = "reason";
|
|
||||||
const _rT = "refreshToken";
|
|
||||||
const _rU = "redirectUri";
|
|
||||||
const _s = "scope";
|
|
||||||
const _se = "server";
|
|
||||||
const _sm = "smithy.ts.sdk.synthetic.com.amazonaws.ssooidc";
|
|
||||||
const _tT = "tokenType";
|
|
||||||
const n0 = "com.amazonaws.ssooidc";
|
|
||||||
var AccessToken = [0, n0, _AT, 8, 0];
|
|
||||||
var ClientSecret = [0, n0, _CS, 8, 0];
|
|
||||||
var CodeVerifier = [0, n0, _CV, 8, 0];
|
|
||||||
var IdToken = [0, n0, _IT, 8, 0];
|
|
||||||
var RefreshToken = [0, n0, _RT, 8, 0];
|
|
||||||
var AccessDeniedException$ = [
|
|
||||||
-3,
|
|
||||||
n0,
|
|
||||||
_ADE,
|
|
||||||
{ [_e]: _c, [_hE]: 400 },
|
|
||||||
[_e, _r, _ed],
|
|
||||||
[0, 0, 0],
|
|
||||||
];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(AccessDeniedException$, AccessDeniedException);
|
|
||||||
var AuthorizationPendingException$ = [
|
|
||||||
-3,
|
|
||||||
n0,
|
|
||||||
_APE,
|
|
||||||
{ [_e]: _c, [_hE]: 400 },
|
|
||||||
[_e, _ed],
|
|
||||||
[0, 0],
|
|
||||||
];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(AuthorizationPendingException$, AuthorizationPendingException);
|
|
||||||
var CreateTokenRequest$ = [
|
|
||||||
3,
|
|
||||||
n0,
|
|
||||||
_CTR,
|
|
||||||
0,
|
|
||||||
[_cI, _cS, _gT, _dC, _co, _rT, _s, _rU, _cV],
|
|
||||||
[0, [() => ClientSecret, 0], 0, 0, 0, [() => RefreshToken, 0], 64 | 0, 0, [() => CodeVerifier, 0]],
|
|
||||||
3,
|
|
||||||
];
|
|
||||||
var CreateTokenResponse$ = [
|
|
||||||
3,
|
|
||||||
n0,
|
|
||||||
_CTRr,
|
|
||||||
0,
|
|
||||||
[_aT, _tT, _eI, _rT, _iT],
|
|
||||||
[[() => AccessToken, 0], 0, 1, [() => RefreshToken, 0], [() => IdToken, 0]],
|
|
||||||
];
|
|
||||||
var ExpiredTokenException$ = [-3, n0, _ETE, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(ExpiredTokenException$, ExpiredTokenException);
|
|
||||||
var InternalServerException$ = [-3, n0, _ISE, { [_e]: _se, [_hE]: 500 }, [_e, _ed], [0, 0]];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(InternalServerException$, InternalServerException);
|
|
||||||
var InvalidClientException$ = [-3, n0, _ICE, { [_e]: _c, [_hE]: 401 }, [_e, _ed], [0, 0]];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(InvalidClientException$, InvalidClientException);
|
|
||||||
var InvalidGrantException$ = [-3, n0, _IGE, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(InvalidGrantException$, InvalidGrantException);
|
|
||||||
var InvalidRequestException$ = [
|
|
||||||
-3,
|
|
||||||
n0,
|
|
||||||
_IRE,
|
|
||||||
{ [_e]: _c, [_hE]: 400 },
|
|
||||||
[_e, _r, _ed],
|
|
||||||
[0, 0, 0],
|
|
||||||
];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(InvalidRequestException$, InvalidRequestException);
|
|
||||||
var InvalidScopeException$ = [-3, n0, _ISEn, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(InvalidScopeException$, InvalidScopeException);
|
|
||||||
var SlowDownException$ = [-3, n0, _SDE, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(SlowDownException$, SlowDownException);
|
|
||||||
var UnauthorizedClientException$ = [
|
|
||||||
-3,
|
|
||||||
n0,
|
|
||||||
_UCE,
|
|
||||||
{ [_e]: _c, [_hE]: 400 },
|
|
||||||
[_e, _ed],
|
|
||||||
[0, 0],
|
|
||||||
];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(UnauthorizedClientException$, UnauthorizedClientException);
|
|
||||||
var UnsupportedGrantTypeException$ = [
|
|
||||||
-3,
|
|
||||||
n0,
|
|
||||||
_UGTE,
|
|
||||||
{ [_e]: _c, [_hE]: 400 },
|
|
||||||
[_e, _ed],
|
|
||||||
[0, 0],
|
|
||||||
];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(UnsupportedGrantTypeException$, UnsupportedGrantTypeException);
|
|
||||||
var SSOOIDCServiceException$ = [-3, _sm, "SSOOIDCServiceException", 0, [], []];
|
|
||||||
schema.TypeRegistry.for(_sm).registerError(SSOOIDCServiceException$, SSOOIDCServiceException);
|
|
||||||
var CreateToken$ = [
|
|
||||||
9,
|
|
||||||
n0,
|
|
||||||
_CT,
|
|
||||||
{ [_h]: ["POST", "/token", 200] },
|
|
||||||
() => CreateTokenRequest$,
|
|
||||||
() => CreateTokenResponse$,
|
|
||||||
];
|
|
||||||
|
|
||||||
class CreateTokenCommand extends smithyClient.Command
|
class CreateTokenCommand extends smithyClient.Command
|
||||||
.classBuilder()
|
.classBuilder()
|
||||||
.ep(commonParams)
|
.ep(commonParams)
|
||||||
@ -547,7 +329,7 @@ class CreateTokenCommand extends smithyClient.Command
|
|||||||
})
|
})
|
||||||
.s("AWSSSOOIDCService", "CreateToken", {})
|
.s("AWSSSOOIDCService", "CreateToken", {})
|
||||||
.n("SSOOIDCClient", "CreateTokenCommand")
|
.n("SSOOIDCClient", "CreateTokenCommand")
|
||||||
.sc(CreateToken$)
|
.sc(schemas_0.CreateToken$)
|
||||||
.build() {
|
.build() {
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -568,46 +350,255 @@ const InvalidRequestExceptionReason = {
|
|||||||
KMS_KEY_NOT_FOUND: "KMS_NotFoundException",
|
KMS_KEY_NOT_FOUND: "KMS_NotFoundException",
|
||||||
};
|
};
|
||||||
|
|
||||||
__webpack_unused_export__ = ({
|
exports.$Command = smithyClient.Command;
|
||||||
enumerable: true,
|
exports.__Client = smithyClient.Client;
|
||||||
get: function () { return smithyClient.Command; }
|
exports.SSOOIDCServiceException = SSOOIDCServiceException.SSOOIDCServiceException;
|
||||||
});
|
exports.AccessDeniedExceptionReason = AccessDeniedExceptionReason;
|
||||||
__webpack_unused_export__ = ({
|
|
||||||
enumerable: true,
|
|
||||||
get: function () { return smithyClient.Client; }
|
|
||||||
});
|
|
||||||
__webpack_unused_export__ = AccessDeniedException;
|
|
||||||
__webpack_unused_export__ = AccessDeniedException$;
|
|
||||||
__webpack_unused_export__ = AccessDeniedExceptionReason;
|
|
||||||
__webpack_unused_export__ = AuthorizationPendingException;
|
|
||||||
__webpack_unused_export__ = AuthorizationPendingException$;
|
|
||||||
__webpack_unused_export__ = CreateToken$;
|
|
||||||
exports.CreateTokenCommand = CreateTokenCommand;
|
exports.CreateTokenCommand = CreateTokenCommand;
|
||||||
__webpack_unused_export__ = CreateTokenRequest$;
|
exports.InvalidRequestExceptionReason = InvalidRequestExceptionReason;
|
||||||
__webpack_unused_export__ = CreateTokenResponse$;
|
exports.SSOOIDC = SSOOIDC;
|
||||||
__webpack_unused_export__ = ExpiredTokenException;
|
|
||||||
__webpack_unused_export__ = ExpiredTokenException$;
|
|
||||||
__webpack_unused_export__ = InternalServerException;
|
|
||||||
__webpack_unused_export__ = InternalServerException$;
|
|
||||||
__webpack_unused_export__ = InvalidClientException;
|
|
||||||
__webpack_unused_export__ = InvalidClientException$;
|
|
||||||
__webpack_unused_export__ = InvalidGrantException;
|
|
||||||
__webpack_unused_export__ = InvalidGrantException$;
|
|
||||||
__webpack_unused_export__ = InvalidRequestException;
|
|
||||||
__webpack_unused_export__ = InvalidRequestException$;
|
|
||||||
__webpack_unused_export__ = InvalidRequestExceptionReason;
|
|
||||||
__webpack_unused_export__ = InvalidScopeException;
|
|
||||||
__webpack_unused_export__ = InvalidScopeException$;
|
|
||||||
__webpack_unused_export__ = SSOOIDC;
|
|
||||||
exports.SSOOIDCClient = SSOOIDCClient;
|
exports.SSOOIDCClient = SSOOIDCClient;
|
||||||
__webpack_unused_export__ = SSOOIDCServiceException;
|
Object.prototype.hasOwnProperty.call(schemas_0, '__proto__') &&
|
||||||
__webpack_unused_export__ = SSOOIDCServiceException$;
|
!Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
|
||||||
__webpack_unused_export__ = SlowDownException;
|
Object.defineProperty(exports, '__proto__', {
|
||||||
__webpack_unused_export__ = SlowDownException$;
|
enumerable: true,
|
||||||
__webpack_unused_export__ = UnauthorizedClientException;
|
value: schemas_0['__proto__']
|
||||||
__webpack_unused_export__ = UnauthorizedClientException$;
|
});
|
||||||
__webpack_unused_export__ = UnsupportedGrantTypeException;
|
|
||||||
__webpack_unused_export__ = UnsupportedGrantTypeException$;
|
Object.keys(schemas_0).forEach(function (k) {
|
||||||
|
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = schemas_0[k];
|
||||||
|
});
|
||||||
|
Object.prototype.hasOwnProperty.call(errors, '__proto__') &&
|
||||||
|
!Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
|
||||||
|
Object.defineProperty(exports, '__proto__', {
|
||||||
|
enumerable: true,
|
||||||
|
value: errors['__proto__']
|
||||||
|
});
|
||||||
|
|
||||||
|
Object.keys(errors).forEach(function (k) {
|
||||||
|
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = errors[k];
|
||||||
|
});
|
||||||
|
|
||||||
|
|
||||||
|
/***/ }),
|
||||||
|
|
||||||
|
/***/ 3952:
|
||||||
|
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
||||||
|
|
||||||
|
|
||||||
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
||||||
|
exports.SSOOIDCServiceException = exports.__ServiceException = void 0;
|
||||||
|
const smithy_client_1 = __webpack_require__(1411);
|
||||||
|
Object.defineProperty(exports, "__ServiceException", ({ enumerable: true, get: function () { return smithy_client_1.ServiceException; } }));
|
||||||
|
class SSOOIDCServiceException extends smithy_client_1.ServiceException {
|
||||||
|
constructor(options) {
|
||||||
|
super(options);
|
||||||
|
Object.setPrototypeOf(this, SSOOIDCServiceException.prototype);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
exports.SSOOIDCServiceException = SSOOIDCServiceException;
|
||||||
|
|
||||||
|
|
||||||
|
/***/ }),
|
||||||
|
|
||||||
|
/***/ 5843:
|
||||||
|
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
||||||
|
|
||||||
|
|
||||||
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
||||||
|
exports.UnsupportedGrantTypeException = exports.UnauthorizedClientException = exports.SlowDownException = exports.InvalidScopeException = exports.InvalidRequestException = exports.InvalidGrantException = exports.InvalidClientException = exports.InternalServerException = exports.ExpiredTokenException = exports.AuthorizationPendingException = exports.AccessDeniedException = void 0;
|
||||||
|
const SSOOIDCServiceException_1 = __webpack_require__(3952);
|
||||||
|
class AccessDeniedException extends SSOOIDCServiceException_1.SSOOIDCServiceException {
|
||||||
|
name = "AccessDeniedException";
|
||||||
|
$fault = "client";
|
||||||
|
error;
|
||||||
|
reason;
|
||||||
|
error_description;
|
||||||
|
constructor(opts) {
|
||||||
|
super({
|
||||||
|
name: "AccessDeniedException",
|
||||||
|
$fault: "client",
|
||||||
|
...opts,
|
||||||
|
});
|
||||||
|
Object.setPrototypeOf(this, AccessDeniedException.prototype);
|
||||||
|
this.error = opts.error;
|
||||||
|
this.reason = opts.reason;
|
||||||
|
this.error_description = opts.error_description;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
exports.AccessDeniedException = AccessDeniedException;
|
||||||
|
class AuthorizationPendingException extends SSOOIDCServiceException_1.SSOOIDCServiceException {
|
||||||
|
name = "AuthorizationPendingException";
|
||||||
|
$fault = "client";
|
||||||
|
error;
|
||||||
|
error_description;
|
||||||
|
constructor(opts) {
|
||||||
|
super({
|
||||||
|
name: "AuthorizationPendingException",
|
||||||
|
$fault: "client",
|
||||||
|
...opts,
|
||||||
|
});
|
||||||
|
Object.setPrototypeOf(this, AuthorizationPendingException.prototype);
|
||||||
|
this.error = opts.error;
|
||||||
|
this.error_description = opts.error_description;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
exports.AuthorizationPendingException = AuthorizationPendingException;
|
||||||
|
class ExpiredTokenException extends SSOOIDCServiceException_1.SSOOIDCServiceException {
|
||||||
|
name = "ExpiredTokenException";
|
||||||
|
$fault = "client";
|
||||||
|
error;
|
||||||
|
error_description;
|
||||||
|
constructor(opts) {
|
||||||
|
super({
|
||||||
|
name: "ExpiredTokenException",
|
||||||
|
$fault: "client",
|
||||||
|
...opts,
|
||||||
|
});
|
||||||
|
Object.setPrototypeOf(this, ExpiredTokenException.prototype);
|
||||||
|
this.error = opts.error;
|
||||||
|
this.error_description = opts.error_description;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
exports.ExpiredTokenException = ExpiredTokenException;
|
||||||
|
class InternalServerException extends SSOOIDCServiceException_1.SSOOIDCServiceException {
|
||||||
|
name = "InternalServerException";
|
||||||
|
$fault = "server";
|
||||||
|
error;
|
||||||
|
error_description;
|
||||||
|
constructor(opts) {
|
||||||
|
super({
|
||||||
|
name: "InternalServerException",
|
||||||
|
$fault: "server",
|
||||||
|
...opts,
|
||||||
|
});
|
||||||
|
Object.setPrototypeOf(this, InternalServerException.prototype);
|
||||||
|
this.error = opts.error;
|
||||||
|
this.error_description = opts.error_description;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
exports.InternalServerException = InternalServerException;
|
||||||
|
class InvalidClientException extends SSOOIDCServiceException_1.SSOOIDCServiceException {
|
||||||
|
name = "InvalidClientException";
|
||||||
|
$fault = "client";
|
||||||
|
error;
|
||||||
|
error_description;
|
||||||
|
constructor(opts) {
|
||||||
|
super({
|
||||||
|
name: "InvalidClientException",
|
||||||
|
$fault: "client",
|
||||||
|
...opts,
|
||||||
|
});
|
||||||
|
Object.setPrototypeOf(this, InvalidClientException.prototype);
|
||||||
|
this.error = opts.error;
|
||||||
|
this.error_description = opts.error_description;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
exports.InvalidClientException = InvalidClientException;
|
||||||
|
class InvalidGrantException extends SSOOIDCServiceException_1.SSOOIDCServiceException {
|
||||||
|
name = "InvalidGrantException";
|
||||||
|
$fault = "client";
|
||||||
|
error;
|
||||||
|
error_description;
|
||||||
|
constructor(opts) {
|
||||||
|
super({
|
||||||
|
name: "InvalidGrantException",
|
||||||
|
$fault: "client",
|
||||||
|
...opts,
|
||||||
|
});
|
||||||
|
Object.setPrototypeOf(this, InvalidGrantException.prototype);
|
||||||
|
this.error = opts.error;
|
||||||
|
this.error_description = opts.error_description;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
exports.InvalidGrantException = InvalidGrantException;
|
||||||
|
class InvalidRequestException extends SSOOIDCServiceException_1.SSOOIDCServiceException {
|
||||||
|
name = "InvalidRequestException";
|
||||||
|
$fault = "client";
|
||||||
|
error;
|
||||||
|
reason;
|
||||||
|
error_description;
|
||||||
|
constructor(opts) {
|
||||||
|
super({
|
||||||
|
name: "InvalidRequestException",
|
||||||
|
$fault: "client",
|
||||||
|
...opts,
|
||||||
|
});
|
||||||
|
Object.setPrototypeOf(this, InvalidRequestException.prototype);
|
||||||
|
this.error = opts.error;
|
||||||
|
this.reason = opts.reason;
|
||||||
|
this.error_description = opts.error_description;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
exports.InvalidRequestException = InvalidRequestException;
|
||||||
|
class InvalidScopeException extends SSOOIDCServiceException_1.SSOOIDCServiceException {
|
||||||
|
name = "InvalidScopeException";
|
||||||
|
$fault = "client";
|
||||||
|
error;
|
||||||
|
error_description;
|
||||||
|
constructor(opts) {
|
||||||
|
super({
|
||||||
|
name: "InvalidScopeException",
|
||||||
|
$fault: "client",
|
||||||
|
...opts,
|
||||||
|
});
|
||||||
|
Object.setPrototypeOf(this, InvalidScopeException.prototype);
|
||||||
|
this.error = opts.error;
|
||||||
|
this.error_description = opts.error_description;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
exports.InvalidScopeException = InvalidScopeException;
|
||||||
|
class SlowDownException extends SSOOIDCServiceException_1.SSOOIDCServiceException {
|
||||||
|
name = "SlowDownException";
|
||||||
|
$fault = "client";
|
||||||
|
error;
|
||||||
|
error_description;
|
||||||
|
constructor(opts) {
|
||||||
|
super({
|
||||||
|
name: "SlowDownException",
|
||||||
|
$fault: "client",
|
||||||
|
...opts,
|
||||||
|
});
|
||||||
|
Object.setPrototypeOf(this, SlowDownException.prototype);
|
||||||
|
this.error = opts.error;
|
||||||
|
this.error_description = opts.error_description;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
exports.SlowDownException = SlowDownException;
|
||||||
|
class UnauthorizedClientException extends SSOOIDCServiceException_1.SSOOIDCServiceException {
|
||||||
|
name = "UnauthorizedClientException";
|
||||||
|
$fault = "client";
|
||||||
|
error;
|
||||||
|
error_description;
|
||||||
|
constructor(opts) {
|
||||||
|
super({
|
||||||
|
name: "UnauthorizedClientException",
|
||||||
|
$fault: "client",
|
||||||
|
...opts,
|
||||||
|
});
|
||||||
|
Object.setPrototypeOf(this, UnauthorizedClientException.prototype);
|
||||||
|
this.error = opts.error;
|
||||||
|
this.error_description = opts.error_description;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
exports.UnauthorizedClientException = UnauthorizedClientException;
|
||||||
|
class UnsupportedGrantTypeException extends SSOOIDCServiceException_1.SSOOIDCServiceException {
|
||||||
|
name = "UnsupportedGrantTypeException";
|
||||||
|
$fault = "client";
|
||||||
|
error;
|
||||||
|
error_description;
|
||||||
|
constructor(opts) {
|
||||||
|
super({
|
||||||
|
name: "UnsupportedGrantTypeException",
|
||||||
|
$fault: "client",
|
||||||
|
...opts,
|
||||||
|
});
|
||||||
|
Object.setPrototypeOf(this, UnsupportedGrantTypeException.prototype);
|
||||||
|
this.error = opts.error;
|
||||||
|
this.error_description = opts.error_description;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
exports.UnsupportedGrantTypeException = UnsupportedGrantTypeException;
|
||||||
|
|
||||||
|
|
||||||
/***/ }),
|
/***/ }),
|
||||||
@ -687,6 +678,7 @@ const util_base64_1 = __webpack_require__(8385);
|
|||||||
const util_utf8_1 = __webpack_require__(1577);
|
const util_utf8_1 = __webpack_require__(1577);
|
||||||
const httpAuthSchemeProvider_1 = __webpack_require__(8396);
|
const httpAuthSchemeProvider_1 = __webpack_require__(8396);
|
||||||
const endpointResolver_1 = __webpack_require__(546);
|
const endpointResolver_1 = __webpack_require__(546);
|
||||||
|
const schemas_0_1 = __webpack_require__(7143);
|
||||||
const getRuntimeConfig = (config) => {
|
const getRuntimeConfig = (config) => {
|
||||||
return {
|
return {
|
||||||
apiVersion: "2019-06-10",
|
apiVersion: "2019-06-10",
|
||||||
@ -712,6 +704,7 @@ const getRuntimeConfig = (config) => {
|
|||||||
protocol: config?.protocol ?? protocols_1.AwsRestJsonProtocol,
|
protocol: config?.protocol ?? protocols_1.AwsRestJsonProtocol,
|
||||||
protocolSettings: config?.protocolSettings ?? {
|
protocolSettings: config?.protocolSettings ?? {
|
||||||
defaultNamespace: "com.amazonaws.ssooidc",
|
defaultNamespace: "com.amazonaws.ssooidc",
|
||||||
|
errorTypeRegistries: schemas_0_1.errorTypeRegistries,
|
||||||
version: "2019-06-10",
|
version: "2019-06-10",
|
||||||
serviceTarget: "AWSSSOOIDCService",
|
serviceTarget: "AWSSSOOIDCService",
|
||||||
},
|
},
|
||||||
@ -726,10 +719,150 @@ exports.getRuntimeConfig = getRuntimeConfig;
|
|||||||
|
|
||||||
/***/ }),
|
/***/ }),
|
||||||
|
|
||||||
/***/ 9955:
|
/***/ 7143:
|
||||||
/***/ ((module) => {
|
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
||||||
|
|
||||||
|
|
||||||
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
||||||
|
exports.CreateToken$ = exports.CreateTokenResponse$ = exports.CreateTokenRequest$ = exports.errorTypeRegistries = exports.UnsupportedGrantTypeException$ = exports.UnauthorizedClientException$ = exports.SlowDownException$ = exports.InvalidScopeException$ = exports.InvalidRequestException$ = exports.InvalidGrantException$ = exports.InvalidClientException$ = exports.InternalServerException$ = exports.ExpiredTokenException$ = exports.AuthorizationPendingException$ = exports.AccessDeniedException$ = exports.SSOOIDCServiceException$ = void 0;
|
||||||
|
const _ADE = "AccessDeniedException";
|
||||||
|
const _APE = "AuthorizationPendingException";
|
||||||
|
const _AT = "AccessToken";
|
||||||
|
const _CS = "ClientSecret";
|
||||||
|
const _CT = "CreateToken";
|
||||||
|
const _CTR = "CreateTokenRequest";
|
||||||
|
const _CTRr = "CreateTokenResponse";
|
||||||
|
const _CV = "CodeVerifier";
|
||||||
|
const _ETE = "ExpiredTokenException";
|
||||||
|
const _ICE = "InvalidClientException";
|
||||||
|
const _IGE = "InvalidGrantException";
|
||||||
|
const _IRE = "InvalidRequestException";
|
||||||
|
const _ISE = "InternalServerException";
|
||||||
|
const _ISEn = "InvalidScopeException";
|
||||||
|
const _IT = "IdToken";
|
||||||
|
const _RT = "RefreshToken";
|
||||||
|
const _SDE = "SlowDownException";
|
||||||
|
const _UCE = "UnauthorizedClientException";
|
||||||
|
const _UGTE = "UnsupportedGrantTypeException";
|
||||||
|
const _aT = "accessToken";
|
||||||
|
const _c = "client";
|
||||||
|
const _cI = "clientId";
|
||||||
|
const _cS = "clientSecret";
|
||||||
|
const _cV = "codeVerifier";
|
||||||
|
const _co = "code";
|
||||||
|
const _dC = "deviceCode";
|
||||||
|
const _e = "error";
|
||||||
|
const _eI = "expiresIn";
|
||||||
|
const _ed = "error_description";
|
||||||
|
const _gT = "grantType";
|
||||||
|
const _h = "http";
|
||||||
|
const _hE = "httpError";
|
||||||
|
const _iT = "idToken";
|
||||||
|
const _r = "reason";
|
||||||
|
const _rT = "refreshToken";
|
||||||
|
const _rU = "redirectUri";
|
||||||
|
const _s = "smithy.ts.sdk.synthetic.com.amazonaws.ssooidc";
|
||||||
|
const _sc = "scope";
|
||||||
|
const _se = "server";
|
||||||
|
const _tT = "tokenType";
|
||||||
|
const n0 = "com.amazonaws.ssooidc";
|
||||||
|
const schema_1 = __webpack_require__(6890);
|
||||||
|
const errors_1 = __webpack_require__(5843);
|
||||||
|
const SSOOIDCServiceException_1 = __webpack_require__(3952);
|
||||||
|
const _s_registry = schema_1.TypeRegistry.for(_s);
|
||||||
|
exports.SSOOIDCServiceException$ = [-3, _s, "SSOOIDCServiceException", 0, [], []];
|
||||||
|
_s_registry.registerError(exports.SSOOIDCServiceException$, SSOOIDCServiceException_1.SSOOIDCServiceException);
|
||||||
|
const n0_registry = schema_1.TypeRegistry.for(n0);
|
||||||
|
exports.AccessDeniedException$ = [
|
||||||
|
-3,
|
||||||
|
n0,
|
||||||
|
_ADE,
|
||||||
|
{ [_e]: _c, [_hE]: 400 },
|
||||||
|
[_e, _r, _ed],
|
||||||
|
[0, 0, 0],
|
||||||
|
];
|
||||||
|
n0_registry.registerError(exports.AccessDeniedException$, errors_1.AccessDeniedException);
|
||||||
|
exports.AuthorizationPendingException$ = [
|
||||||
|
-3,
|
||||||
|
n0,
|
||||||
|
_APE,
|
||||||
|
{ [_e]: _c, [_hE]: 400 },
|
||||||
|
[_e, _ed],
|
||||||
|
[0, 0],
|
||||||
|
];
|
||||||
|
n0_registry.registerError(exports.AuthorizationPendingException$, errors_1.AuthorizationPendingException);
|
||||||
|
exports.ExpiredTokenException$ = [-3, n0, _ETE, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
|
||||||
|
n0_registry.registerError(exports.ExpiredTokenException$, errors_1.ExpiredTokenException);
|
||||||
|
exports.InternalServerException$ = [-3, n0, _ISE, { [_e]: _se, [_hE]: 500 }, [_e, _ed], [0, 0]];
|
||||||
|
n0_registry.registerError(exports.InternalServerException$, errors_1.InternalServerException);
|
||||||
|
exports.InvalidClientException$ = [-3, n0, _ICE, { [_e]: _c, [_hE]: 401 }, [_e, _ed], [0, 0]];
|
||||||
|
n0_registry.registerError(exports.InvalidClientException$, errors_1.InvalidClientException);
|
||||||
|
exports.InvalidGrantException$ = [-3, n0, _IGE, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
|
||||||
|
n0_registry.registerError(exports.InvalidGrantException$, errors_1.InvalidGrantException);
|
||||||
|
exports.InvalidRequestException$ = [
|
||||||
|
-3,
|
||||||
|
n0,
|
||||||
|
_IRE,
|
||||||
|
{ [_e]: _c, [_hE]: 400 },
|
||||||
|
[_e, _r, _ed],
|
||||||
|
[0, 0, 0],
|
||||||
|
];
|
||||||
|
n0_registry.registerError(exports.InvalidRequestException$, errors_1.InvalidRequestException);
|
||||||
|
exports.InvalidScopeException$ = [-3, n0, _ISEn, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
|
||||||
|
n0_registry.registerError(exports.InvalidScopeException$, errors_1.InvalidScopeException);
|
||||||
|
exports.SlowDownException$ = [-3, n0, _SDE, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
|
||||||
|
n0_registry.registerError(exports.SlowDownException$, errors_1.SlowDownException);
|
||||||
|
exports.UnauthorizedClientException$ = [
|
||||||
|
-3,
|
||||||
|
n0,
|
||||||
|
_UCE,
|
||||||
|
{ [_e]: _c, [_hE]: 400 },
|
||||||
|
[_e, _ed],
|
||||||
|
[0, 0],
|
||||||
|
];
|
||||||
|
n0_registry.registerError(exports.UnauthorizedClientException$, errors_1.UnauthorizedClientException);
|
||||||
|
exports.UnsupportedGrantTypeException$ = [
|
||||||
|
-3,
|
||||||
|
n0,
|
||||||
|
_UGTE,
|
||||||
|
{ [_e]: _c, [_hE]: 400 },
|
||||||
|
[_e, _ed],
|
||||||
|
[0, 0],
|
||||||
|
];
|
||||||
|
n0_registry.registerError(exports.UnsupportedGrantTypeException$, errors_1.UnsupportedGrantTypeException);
|
||||||
|
exports.errorTypeRegistries = [_s_registry, n0_registry];
|
||||||
|
var AccessToken = [0, n0, _AT, 8, 0];
|
||||||
|
var ClientSecret = [0, n0, _CS, 8, 0];
|
||||||
|
var CodeVerifier = [0, n0, _CV, 8, 0];
|
||||||
|
var IdToken = [0, n0, _IT, 8, 0];
|
||||||
|
var RefreshToken = [0, n0, _RT, 8, 0];
|
||||||
|
exports.CreateTokenRequest$ = [
|
||||||
|
3,
|
||||||
|
n0,
|
||||||
|
_CTR,
|
||||||
|
0,
|
||||||
|
[_cI, _cS, _gT, _dC, _co, _rT, _sc, _rU, _cV],
|
||||||
|
[0, [() => ClientSecret, 0], 0, 0, 0, [() => RefreshToken, 0], 64 | 0, 0, [() => CodeVerifier, 0]],
|
||||||
|
3,
|
||||||
|
];
|
||||||
|
exports.CreateTokenResponse$ = [
|
||||||
|
3,
|
||||||
|
n0,
|
||||||
|
_CTRr,
|
||||||
|
0,
|
||||||
|
[_aT, _tT, _eI, _rT, _iT],
|
||||||
|
[[() => AccessToken, 0], 0, 1, [() => RefreshToken, 0], [() => IdToken, 0]],
|
||||||
|
];
|
||||||
|
var Scopes = (/* unused pure expression or super */ null && (64 | 0));
|
||||||
|
exports.CreateToken$ = [
|
||||||
|
9,
|
||||||
|
n0,
|
||||||
|
_CT,
|
||||||
|
{ [_h]: ["POST", "/token", 200] },
|
||||||
|
() => exports.CreateTokenRequest$,
|
||||||
|
() => exports.CreateTokenResponse$,
|
||||||
|
];
|
||||||
|
|
||||||
module.exports = /*#__PURE__*/JSON.parse('{"name":"@aws-sdk/nested-clients","version":"3.975.0","description":"Nested clients for AWS SDK packages.","main":"./dist-cjs/index.js","module":"./dist-es/index.js","types":"./dist-types/index.d.ts","scripts":{"build":"yarn lint && concurrently \'yarn:build:types\' \'yarn:build:es\' && yarn build:cjs","build:cjs":"node ../../scripts/compilation/inline nested-clients","build:es":"tsc -p tsconfig.es.json","build:include:deps":"yarn g:turbo run build -F=\\"$npm_package_name\\"","build:types":"tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4","clean":"premove dist-cjs dist-es dist-types tsconfig.cjs.tsbuildinfo tsconfig.es.tsbuildinfo tsconfig.types.tsbuildinfo","lint":"node ../../scripts/validation/submodules-linter.js --pkg nested-clients","test":"yarn g:vitest run","test:watch":"yarn g:vitest watch"},"engines":{"node":">=20.0.0"},"sideEffects":false,"author":{"name":"AWS SDK for JavaScript Team","url":"https://aws.amazon.com/javascript/"},"license":"Apache-2.0","dependencies":{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"^3.973.1","@aws-sdk/middleware-host-header":"^3.972.1","@aws-sdk/middleware-logger":"^3.972.1","@aws-sdk/middleware-recursion-detection":"^3.972.1","@aws-sdk/middleware-user-agent":"^3.972.2","@aws-sdk/region-config-resolver":"^3.972.1","@aws-sdk/types":"^3.973.0","@aws-sdk/util-endpoints":"3.972.0","@aws-sdk/util-user-agent-browser":"^3.972.1","@aws-sdk/util-user-agent-node":"^3.972.1","@smithy/config-resolver":"^4.4.6","@smithy/core":"^3.21.1","@smithy/fetch-http-handler":"^5.3.9","@smithy/hash-node":"^4.2.8","@smithy/invalid-dependency":"^4.2.8","@smithy/middleware-content-length":"^4.2.8","@smithy/middleware-endpoint":"^4.4.11","@smithy/middleware-retry":"^4.4.27","@smithy/middleware-serde":"^4.2.9","@smithy/middleware-stack":"^4.2.8","@smithy/node-config-provider":"^4.3.8","@smithy/node-http-handler":"^4.4.8","@smithy/protocol-http":"^5.3.8","@smithy/smithy-client":"^4.10.12","@smithy/types":"^4.12.0","@smithy/url-parser":"^4.2.8","@smithy/util-base64":"^4.3.0","@smithy/util-body-length-browser":"^4.2.0","@smithy/util-body-length-node":"^4.2.1","@smithy/util-defaults-mode-browser":"^4.3.26","@smithy/util-defaults-mode-node":"^4.2.29","@smithy/util-endpoints":"^3.2.8","@smithy/util-middleware":"^4.2.8","@smithy/util-retry":"^4.2.8","@smithy/util-utf8":"^4.2.0","tslib":"^2.6.2"},"devDependencies":{"concurrently":"7.0.0","downlevel-dts":"0.10.1","premove":"4.0.0","typescript":"~5.8.3"},"typesVersions":{"<4.0":{"dist-types/*":["dist-types/ts3.4/*"]}},"files":["./signin.d.ts","./signin.js","./sso-oidc.d.ts","./sso-oidc.js","./sts.d.ts","./sts.js","dist-*/**"],"browser":{"./dist-es/submodules/signin/runtimeConfig":"./dist-es/submodules/signin/runtimeConfig.browser","./dist-es/submodules/sso-oidc/runtimeConfig":"./dist-es/submodules/sso-oidc/runtimeConfig.browser","./dist-es/submodules/sts/runtimeConfig":"./dist-es/submodules/sts/runtimeConfig.browser"},"react-native":{},"homepage":"https://github.com/aws/aws-sdk-js-v3/tree/main/packages/nested-clients","repository":{"type":"git","url":"https://github.com/aws/aws-sdk-js-v3.git","directory":"packages/nested-clients"},"exports":{"./package.json":"./package.json","./sso-oidc":{"types":"./dist-types/submodules/sso-oidc/index.d.ts","module":"./dist-es/submodules/sso-oidc/index.js","node":"./dist-cjs/submodules/sso-oidc/index.js","import":"./dist-es/submodules/sso-oidc/index.js","require":"./dist-cjs/submodules/sso-oidc/index.js"},"./sts":{"types":"./dist-types/submodules/sts/index.d.ts","module":"./dist-es/submodules/sts/index.js","node":"./dist-cjs/submodules/sts/index.js","import":"./dist-es/submodules/sts/index.js","require":"./dist-cjs/submodules/sts/index.js"},"./signin":{"types":"./dist-types/submodules/signin/index.d.ts","module":"./dist-es/submodules/signin/index.js","node":"./dist-cjs/submodules/signin/index.js","import":"./dist-es/submodules/signin/index.js","require":"./dist-cjs/submodules/signin/index.js"}}}');
|
|
||||||
|
|
||||||
/***/ })
|
/***/ })
|
||||||
|
|
||||||
|
|||||||
2
dist/443.index.js.map
generated
vendored
2
dist/443.index.js.map
generated
vendored
File diff suppressed because one or more lines are too long
3
dist/579.index.js
generated
vendored
3
dist/579.index.js
generated
vendored
@ -243,6 +243,9 @@ class EventStreamSerde {
|
|||||||
serializer.write(eventSchema, event[unionMember]);
|
serializer.write(eventSchema, event[unionMember]);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
else if (eventSchema.isUnitSchema()) {
|
||||||
|
serializer.write(eventSchema, {});
|
||||||
|
}
|
||||||
else {
|
else {
|
||||||
throw new Error("@smithy/core/event-streams - non-struct member not supported in event stream union.");
|
throw new Error("@smithy/core/event-streams - non-struct member not supported in event stream union.");
|
||||||
}
|
}
|
||||||
|
|||||||
2
dist/579.index.js.map
generated
vendored
2
dist/579.index.js.map
generated
vendored
File diff suppressed because one or more lines are too long
2
dist/605.index.js
generated
vendored
2
dist/605.index.js
generated
vendored
@ -65,7 +65,7 @@ const tslib_1 = __webpack_require__(1860);
|
|||||||
const client_1 = __webpack_require__(5152);
|
const client_1 = __webpack_require__(5152);
|
||||||
const node_http_handler_1 = __webpack_require__(1279);
|
const node_http_handler_1 = __webpack_require__(1279);
|
||||||
const property_provider_1 = __webpack_require__(8857);
|
const property_provider_1 = __webpack_require__(8857);
|
||||||
const promises_1 = tslib_1.__importDefault(__webpack_require__(1943));
|
const promises_1 = tslib_1.__importDefault(__webpack_require__(1455));
|
||||||
const checkUrl_1 = __webpack_require__(1509);
|
const checkUrl_1 = __webpack_require__(1509);
|
||||||
const requestHelpers_1 = __webpack_require__(6533);
|
const requestHelpers_1 = __webpack_require__(6533);
|
||||||
const retry_wrapper_1 = __webpack_require__(1122);
|
const retry_wrapper_1 = __webpack_require__(1122);
|
||||||
|
|||||||
2
dist/605.index.js.map
generated
vendored
2
dist/605.index.js.map
generated
vendored
File diff suppressed because one or more lines are too long
594
dist/762.index.js
generated
vendored
594
dist/762.index.js
generated
vendored
@ -97,8 +97,134 @@ util_endpoints_2.customEndpointFunctions.aws = util_endpoints_1.awsEndpointFunct
|
|||||||
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
||||||
exports.ruleSet = void 0;
|
exports.ruleSet = void 0;
|
||||||
const u = "required", v = "fn", w = "argv", x = "ref";
|
const u = "required", v = "fn", w = "argv", x = "ref";
|
||||||
const a = true, b = "isSet", c = "booleanEquals", d = "error", e = "endpoint", f = "tree", g = "PartitionResult", h = "stringEquals", i = { [u]: true, "default": false, "type": "boolean" }, j = { [u]: false, "type": "string" }, k = { [x]: "Endpoint" }, l = { [v]: c, [w]: [{ [x]: "UseFIPS" }, true] }, m = { [v]: c, [w]: [{ [x]: "UseDualStack" }, true] }, n = {}, o = { [v]: "getAttr", [w]: [{ [x]: g }, "name"] }, p = { [v]: c, [w]: [{ [x]: "UseFIPS" }, false] }, q = { [v]: c, [w]: [{ [x]: "UseDualStack" }, false] }, r = { [v]: "getAttr", [w]: [{ [x]: g }, "supportsFIPS"] }, s = { [v]: c, [w]: [true, { [v]: "getAttr", [w]: [{ [x]: g }, "supportsDualStack"] }] }, t = [{ [x]: "Region" }];
|
const a = true, b = "isSet", c = "booleanEquals", d = "error", e = "endpoint", f = "tree", g = "PartitionResult", h = "stringEquals", i = { [u]: true, default: false, type: "boolean" }, j = { [u]: false, type: "string" }, k = { [x]: "Endpoint" }, l = { [v]: c, [w]: [{ [x]: "UseFIPS" }, true] }, m = { [v]: c, [w]: [{ [x]: "UseDualStack" }, true] }, n = {}, o = { [v]: "getAttr", [w]: [{ [x]: g }, "name"] }, p = { [v]: c, [w]: [{ [x]: "UseFIPS" }, false] }, q = { [v]: c, [w]: [{ [x]: "UseDualStack" }, false] }, r = { [v]: "getAttr", [w]: [{ [x]: g }, "supportsFIPS"] }, s = { [v]: c, [w]: [true, { [v]: "getAttr", [w]: [{ [x]: g }, "supportsDualStack"] }] }, t = [{ [x]: "Region" }];
|
||||||
const _data = { version: "1.0", parameters: { UseDualStack: i, UseFIPS: i, Endpoint: j, Region: j }, rules: [{ conditions: [{ [v]: b, [w]: [k] }], rules: [{ conditions: [l], error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: d }, { rules: [{ conditions: [m], error: "Invalid Configuration: Dualstack and custom endpoint are not supported", type: d }, { endpoint: { url: k, properties: n, headers: n }, type: e }], type: f }], type: f }, { rules: [{ conditions: [{ [v]: b, [w]: t }], rules: [{ conditions: [{ [v]: "aws.partition", [w]: t, assign: g }], rules: [{ conditions: [{ [v]: h, [w]: [o, "aws"] }, p, q], endpoint: { url: "https://{Region}.signin.aws.amazon.com", properties: n, headers: n }, type: e }, { conditions: [{ [v]: h, [w]: [o, "aws-cn"] }, p, q], endpoint: { url: "https://{Region}.signin.amazonaws.cn", properties: n, headers: n }, type: e }, { conditions: [{ [v]: h, [w]: [o, "aws-us-gov"] }, p, q], endpoint: { url: "https://{Region}.signin.amazonaws-us-gov.com", properties: n, headers: n }, type: e }, { conditions: [l, m], rules: [{ conditions: [{ [v]: c, [w]: [a, r] }, s], rules: [{ endpoint: { url: "https://signin-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: n, headers: n }, type: e }], type: f }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", type: d }], type: f }, { conditions: [l, q], rules: [{ conditions: [{ [v]: c, [w]: [r, a] }], rules: [{ endpoint: { url: "https://signin-fips.{Region}.{PartitionResult#dnsSuffix}", properties: n, headers: n }, type: e }], type: f }, { error: "FIPS is enabled but this partition does not support FIPS", type: d }], type: f }, { conditions: [p, m], rules: [{ conditions: [s], rules: [{ endpoint: { url: "https://signin.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: n, headers: n }, type: e }], type: f }, { error: "DualStack is enabled but this partition does not support DualStack", type: d }], type: f }, { endpoint: { url: "https://signin.{Region}.{PartitionResult#dnsSuffix}", properties: n, headers: n }, type: e }], type: f }], type: f }, { error: "Invalid Configuration: Missing Region", type: d }], type: f }] };
|
const _data = {
|
||||||
|
version: "1.0",
|
||||||
|
parameters: { UseDualStack: i, UseFIPS: i, Endpoint: j, Region: j },
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
conditions: [{ [v]: b, [w]: [k] }],
|
||||||
|
rules: [
|
||||||
|
{ conditions: [l], error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: d },
|
||||||
|
{
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
conditions: [m],
|
||||||
|
error: "Invalid Configuration: Dualstack and custom endpoint are not supported",
|
||||||
|
type: d,
|
||||||
|
},
|
||||||
|
{ endpoint: { url: k, properties: n, headers: n }, type: e },
|
||||||
|
],
|
||||||
|
type: f,
|
||||||
|
},
|
||||||
|
],
|
||||||
|
type: f,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
conditions: [{ [v]: b, [w]: t }],
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
conditions: [{ [v]: "aws.partition", [w]: t, assign: g }],
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
conditions: [{ [v]: h, [w]: [o, "aws"] }, p, q],
|
||||||
|
endpoint: { url: "https://{Region}.signin.aws.amazon.com", properties: n, headers: n },
|
||||||
|
type: e,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
conditions: [{ [v]: h, [w]: [o, "aws-cn"] }, p, q],
|
||||||
|
endpoint: { url: "https://{Region}.signin.amazonaws.cn", properties: n, headers: n },
|
||||||
|
type: e,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
conditions: [{ [v]: h, [w]: [o, "aws-us-gov"] }, p, q],
|
||||||
|
endpoint: { url: "https://{Region}.signin.amazonaws-us-gov.com", properties: n, headers: n },
|
||||||
|
type: e,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
conditions: [l, m],
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
conditions: [{ [v]: c, [w]: [a, r] }, s],
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
endpoint: {
|
||||||
|
url: "https://signin-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",
|
||||||
|
properties: n,
|
||||||
|
headers: n,
|
||||||
|
},
|
||||||
|
type: e,
|
||||||
|
},
|
||||||
|
],
|
||||||
|
type: f,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
error: "FIPS and DualStack are enabled, but this partition does not support one or both",
|
||||||
|
type: d,
|
||||||
|
},
|
||||||
|
],
|
||||||
|
type: f,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
conditions: [l, q],
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
conditions: [{ [v]: c, [w]: [r, a] }],
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
endpoint: {
|
||||||
|
url: "https://signin-fips.{Region}.{PartitionResult#dnsSuffix}",
|
||||||
|
properties: n,
|
||||||
|
headers: n,
|
||||||
|
},
|
||||||
|
type: e,
|
||||||
|
},
|
||||||
|
],
|
||||||
|
type: f,
|
||||||
|
},
|
||||||
|
{ error: "FIPS is enabled but this partition does not support FIPS", type: d },
|
||||||
|
],
|
||||||
|
type: f,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
conditions: [p, m],
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
conditions: [s],
|
||||||
|
rules: [
|
||||||
|
{
|
||||||
|
endpoint: {
|
||||||
|
url: "https://signin.{Region}.{PartitionResult#dualStackDnsSuffix}",
|
||||||
|
properties: n,
|
||||||
|
headers: n,
|
||||||
|
},
|
||||||
|
type: e,
|
||||||
|
},
|
||||||
|
],
|
||||||
|
type: f,
|
||||||
|
},
|
||||||
|
{ error: "DualStack is enabled but this partition does not support DualStack", type: d },
|
||||||
|
],
|
||||||
|
type: f,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
endpoint: { url: "https://signin.{Region}.{PartitionResult#dnsSuffix}", properties: n, headers: n },
|
||||||
|
type: e,
|
||||||
|
},
|
||||||
|
],
|
||||||
|
type: f,
|
||||||
|
},
|
||||||
|
],
|
||||||
|
type: f,
|
||||||
|
},
|
||||||
|
{ error: "Invalid Configuration: Missing Region", type: d },
|
||||||
|
],
|
||||||
|
type: f,
|
||||||
|
},
|
||||||
|
],
|
||||||
|
};
|
||||||
exports.ruleSet = _data;
|
exports.ruleSet = _data;
|
||||||
|
|
||||||
|
|
||||||
@ -107,7 +233,6 @@ exports.ruleSet = _data;
|
|||||||
/***/ 9762:
|
/***/ 9762:
|
||||||
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
||||||
|
|
||||||
var __webpack_unused_export__;
|
|
||||||
|
|
||||||
|
|
||||||
var middlewareHostHeader = __webpack_require__(2590);
|
var middlewareHostHeader = __webpack_require__(2590);
|
||||||
@ -125,6 +250,9 @@ var httpAuthSchemeProvider = __webpack_require__(7709);
|
|||||||
var runtimeConfig = __webpack_require__(2836);
|
var runtimeConfig = __webpack_require__(2836);
|
||||||
var regionConfigResolver = __webpack_require__(6463);
|
var regionConfigResolver = __webpack_require__(6463);
|
||||||
var protocolHttp = __webpack_require__(2356);
|
var protocolHttp = __webpack_require__(2356);
|
||||||
|
var schemas_0 = __webpack_require__(890);
|
||||||
|
var errors = __webpack_require__(7214);
|
||||||
|
var SigninServiceException = __webpack_require__(2831);
|
||||||
|
|
||||||
const resolveClientEndpointParameters = (options) => {
|
const resolveClientEndpointParameters = (options) => {
|
||||||
return Object.assign(options, {
|
return Object.assign(options, {
|
||||||
@ -220,187 +348,6 @@ class SigninClient extends smithyClient.Client {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
class SigninServiceException extends smithyClient.ServiceException {
|
|
||||||
constructor(options) {
|
|
||||||
super(options);
|
|
||||||
Object.setPrototypeOf(this, SigninServiceException.prototype);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
class AccessDeniedException extends SigninServiceException {
|
|
||||||
name = "AccessDeniedException";
|
|
||||||
$fault = "client";
|
|
||||||
error;
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "AccessDeniedException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, AccessDeniedException.prototype);
|
|
||||||
this.error = opts.error;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
class InternalServerException extends SigninServiceException {
|
|
||||||
name = "InternalServerException";
|
|
||||||
$fault = "server";
|
|
||||||
error;
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "InternalServerException",
|
|
||||||
$fault: "server",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, InternalServerException.prototype);
|
|
||||||
this.error = opts.error;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
class TooManyRequestsError extends SigninServiceException {
|
|
||||||
name = "TooManyRequestsError";
|
|
||||||
$fault = "client";
|
|
||||||
error;
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "TooManyRequestsError",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, TooManyRequestsError.prototype);
|
|
||||||
this.error = opts.error;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
class ValidationException extends SigninServiceException {
|
|
||||||
name = "ValidationException";
|
|
||||||
$fault = "client";
|
|
||||||
error;
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "ValidationException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, ValidationException.prototype);
|
|
||||||
this.error = opts.error;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
const _ADE = "AccessDeniedException";
|
|
||||||
const _AT = "AccessToken";
|
|
||||||
const _COAT = "CreateOAuth2Token";
|
|
||||||
const _COATR = "CreateOAuth2TokenRequest";
|
|
||||||
const _COATRB = "CreateOAuth2TokenRequestBody";
|
|
||||||
const _COATRBr = "CreateOAuth2TokenResponseBody";
|
|
||||||
const _COATRr = "CreateOAuth2TokenResponse";
|
|
||||||
const _ISE = "InternalServerException";
|
|
||||||
const _RT = "RefreshToken";
|
|
||||||
const _TMRE = "TooManyRequestsError";
|
|
||||||
const _VE = "ValidationException";
|
|
||||||
const _aKI = "accessKeyId";
|
|
||||||
const _aT = "accessToken";
|
|
||||||
const _c = "client";
|
|
||||||
const _cI = "clientId";
|
|
||||||
const _cV = "codeVerifier";
|
|
||||||
const _co = "code";
|
|
||||||
const _e = "error";
|
|
||||||
const _eI = "expiresIn";
|
|
||||||
const _gT = "grantType";
|
|
||||||
const _h = "http";
|
|
||||||
const _hE = "httpError";
|
|
||||||
const _iT = "idToken";
|
|
||||||
const _jN = "jsonName";
|
|
||||||
const _m = "message";
|
|
||||||
const _rT = "refreshToken";
|
|
||||||
const _rU = "redirectUri";
|
|
||||||
const _s = "server";
|
|
||||||
const _sAK = "secretAccessKey";
|
|
||||||
const _sT = "sessionToken";
|
|
||||||
const _sm = "smithy.ts.sdk.synthetic.com.amazonaws.signin";
|
|
||||||
const _tI = "tokenInput";
|
|
||||||
const _tO = "tokenOutput";
|
|
||||||
const _tT = "tokenType";
|
|
||||||
const n0 = "com.amazonaws.signin";
|
|
||||||
var RefreshToken = [0, n0, _RT, 8, 0];
|
|
||||||
var AccessDeniedException$ = [-3, n0, _ADE, { [_e]: _c }, [_e, _m], [0, 0], 2];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(AccessDeniedException$, AccessDeniedException);
|
|
||||||
var AccessToken$ = [
|
|
||||||
3,
|
|
||||||
n0,
|
|
||||||
_AT,
|
|
||||||
8,
|
|
||||||
[_aKI, _sAK, _sT],
|
|
||||||
[
|
|
||||||
[0, { [_jN]: _aKI }],
|
|
||||||
[0, { [_jN]: _sAK }],
|
|
||||||
[0, { [_jN]: _sT }],
|
|
||||||
],
|
|
||||||
3,
|
|
||||||
];
|
|
||||||
var CreateOAuth2TokenRequest$ = [
|
|
||||||
3,
|
|
||||||
n0,
|
|
||||||
_COATR,
|
|
||||||
0,
|
|
||||||
[_tI],
|
|
||||||
[[() => CreateOAuth2TokenRequestBody$, 16]],
|
|
||||||
1,
|
|
||||||
];
|
|
||||||
var CreateOAuth2TokenRequestBody$ = [
|
|
||||||
3,
|
|
||||||
n0,
|
|
||||||
_COATRB,
|
|
||||||
0,
|
|
||||||
[_cI, _gT, _co, _rU, _cV, _rT],
|
|
||||||
[
|
|
||||||
[0, { [_jN]: _cI }],
|
|
||||||
[0, { [_jN]: _gT }],
|
|
||||||
0,
|
|
||||||
[0, { [_jN]: _rU }],
|
|
||||||
[0, { [_jN]: _cV }],
|
|
||||||
[() => RefreshToken, { [_jN]: _rT }],
|
|
||||||
],
|
|
||||||
2,
|
|
||||||
];
|
|
||||||
var CreateOAuth2TokenResponse$ = [
|
|
||||||
3,
|
|
||||||
n0,
|
|
||||||
_COATRr,
|
|
||||||
0,
|
|
||||||
[_tO],
|
|
||||||
[[() => CreateOAuth2TokenResponseBody$, 16]],
|
|
||||||
1,
|
|
||||||
];
|
|
||||||
var CreateOAuth2TokenResponseBody$ = [
|
|
||||||
3,
|
|
||||||
n0,
|
|
||||||
_COATRBr,
|
|
||||||
0,
|
|
||||||
[_aT, _tT, _eI, _rT, _iT],
|
|
||||||
[
|
|
||||||
[() => AccessToken$, { [_jN]: _aT }],
|
|
||||||
[0, { [_jN]: _tT }],
|
|
||||||
[1, { [_jN]: _eI }],
|
|
||||||
[() => RefreshToken, { [_jN]: _rT }],
|
|
||||||
[0, { [_jN]: _iT }],
|
|
||||||
],
|
|
||||||
4,
|
|
||||||
];
|
|
||||||
var InternalServerException$ = [-3, n0, _ISE, { [_e]: _s, [_hE]: 500 }, [_e, _m], [0, 0], 2];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(InternalServerException$, InternalServerException);
|
|
||||||
var TooManyRequestsError$ = [-3, n0, _TMRE, { [_e]: _c, [_hE]: 429 }, [_e, _m], [0, 0], 2];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(TooManyRequestsError$, TooManyRequestsError);
|
|
||||||
var ValidationException$ = [-3, n0, _VE, { [_e]: _c, [_hE]: 400 }, [_e, _m], [0, 0], 2];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(ValidationException$, ValidationException);
|
|
||||||
var SigninServiceException$ = [-3, _sm, "SigninServiceException", 0, [], []];
|
|
||||||
schema.TypeRegistry.for(_sm).registerError(SigninServiceException$, SigninServiceException);
|
|
||||||
var CreateOAuth2Token$ = [
|
|
||||||
9,
|
|
||||||
n0,
|
|
||||||
_COAT,
|
|
||||||
{ [_h]: ["POST", "/v1/token", 200] },
|
|
||||||
() => CreateOAuth2TokenRequest$,
|
|
||||||
() => CreateOAuth2TokenResponse$,
|
|
||||||
];
|
|
||||||
|
|
||||||
class CreateOAuth2TokenCommand extends smithyClient.Command
|
class CreateOAuth2TokenCommand extends smithyClient.Command
|
||||||
.classBuilder()
|
.classBuilder()
|
||||||
.ep(commonParams)
|
.ep(commonParams)
|
||||||
@ -409,7 +356,7 @@ class CreateOAuth2TokenCommand extends smithyClient.Command
|
|||||||
})
|
})
|
||||||
.s("Signin", "CreateOAuth2Token", {})
|
.s("Signin", "CreateOAuth2Token", {})
|
||||||
.n("SigninClient", "CreateOAuth2TokenCommand")
|
.n("SigninClient", "CreateOAuth2TokenCommand")
|
||||||
.sc(CreateOAuth2Token$)
|
.sc(schemas_0.CreateOAuth2Token$)
|
||||||
.build() {
|
.build() {
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -429,34 +376,123 @@ const OAuth2ErrorCode = {
|
|||||||
USER_CREDENTIALS_CHANGED: "USER_CREDENTIALS_CHANGED",
|
USER_CREDENTIALS_CHANGED: "USER_CREDENTIALS_CHANGED",
|
||||||
};
|
};
|
||||||
|
|
||||||
__webpack_unused_export__ = ({
|
exports.$Command = smithyClient.Command;
|
||||||
enumerable: true,
|
exports.__Client = smithyClient.Client;
|
||||||
get: function () { return smithyClient.Command; }
|
exports.SigninServiceException = SigninServiceException.SigninServiceException;
|
||||||
});
|
|
||||||
__webpack_unused_export__ = ({
|
|
||||||
enumerable: true,
|
|
||||||
get: function () { return smithyClient.Client; }
|
|
||||||
});
|
|
||||||
__webpack_unused_export__ = AccessDeniedException;
|
|
||||||
__webpack_unused_export__ = AccessDeniedException$;
|
|
||||||
__webpack_unused_export__ = AccessToken$;
|
|
||||||
__webpack_unused_export__ = CreateOAuth2Token$;
|
|
||||||
exports.CreateOAuth2TokenCommand = CreateOAuth2TokenCommand;
|
exports.CreateOAuth2TokenCommand = CreateOAuth2TokenCommand;
|
||||||
__webpack_unused_export__ = CreateOAuth2TokenRequest$;
|
exports.OAuth2ErrorCode = OAuth2ErrorCode;
|
||||||
__webpack_unused_export__ = CreateOAuth2TokenRequestBody$;
|
exports.Signin = Signin;
|
||||||
__webpack_unused_export__ = CreateOAuth2TokenResponse$;
|
|
||||||
__webpack_unused_export__ = CreateOAuth2TokenResponseBody$;
|
|
||||||
__webpack_unused_export__ = InternalServerException;
|
|
||||||
__webpack_unused_export__ = InternalServerException$;
|
|
||||||
__webpack_unused_export__ = OAuth2ErrorCode;
|
|
||||||
__webpack_unused_export__ = Signin;
|
|
||||||
exports.SigninClient = SigninClient;
|
exports.SigninClient = SigninClient;
|
||||||
__webpack_unused_export__ = SigninServiceException;
|
Object.prototype.hasOwnProperty.call(schemas_0, '__proto__') &&
|
||||||
__webpack_unused_export__ = SigninServiceException$;
|
!Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
|
||||||
__webpack_unused_export__ = TooManyRequestsError;
|
Object.defineProperty(exports, '__proto__', {
|
||||||
__webpack_unused_export__ = TooManyRequestsError$;
|
enumerable: true,
|
||||||
__webpack_unused_export__ = ValidationException;
|
value: schemas_0['__proto__']
|
||||||
__webpack_unused_export__ = ValidationException$;
|
});
|
||||||
|
|
||||||
|
Object.keys(schemas_0).forEach(function (k) {
|
||||||
|
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = schemas_0[k];
|
||||||
|
});
|
||||||
|
Object.prototype.hasOwnProperty.call(errors, '__proto__') &&
|
||||||
|
!Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
|
||||||
|
Object.defineProperty(exports, '__proto__', {
|
||||||
|
enumerable: true,
|
||||||
|
value: errors['__proto__']
|
||||||
|
});
|
||||||
|
|
||||||
|
Object.keys(errors).forEach(function (k) {
|
||||||
|
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = errors[k];
|
||||||
|
});
|
||||||
|
|
||||||
|
|
||||||
|
/***/ }),
|
||||||
|
|
||||||
|
/***/ 2831:
|
||||||
|
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
||||||
|
|
||||||
|
|
||||||
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
||||||
|
exports.SigninServiceException = exports.__ServiceException = void 0;
|
||||||
|
const smithy_client_1 = __webpack_require__(1411);
|
||||||
|
Object.defineProperty(exports, "__ServiceException", ({ enumerable: true, get: function () { return smithy_client_1.ServiceException; } }));
|
||||||
|
class SigninServiceException extends smithy_client_1.ServiceException {
|
||||||
|
constructor(options) {
|
||||||
|
super(options);
|
||||||
|
Object.setPrototypeOf(this, SigninServiceException.prototype);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
exports.SigninServiceException = SigninServiceException;
|
||||||
|
|
||||||
|
|
||||||
|
/***/ }),
|
||||||
|
|
||||||
|
/***/ 7214:
|
||||||
|
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
||||||
|
|
||||||
|
|
||||||
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
||||||
|
exports.ValidationException = exports.TooManyRequestsError = exports.InternalServerException = exports.AccessDeniedException = void 0;
|
||||||
|
const SigninServiceException_1 = __webpack_require__(2831);
|
||||||
|
class AccessDeniedException extends SigninServiceException_1.SigninServiceException {
|
||||||
|
name = "AccessDeniedException";
|
||||||
|
$fault = "client";
|
||||||
|
error;
|
||||||
|
constructor(opts) {
|
||||||
|
super({
|
||||||
|
name: "AccessDeniedException",
|
||||||
|
$fault: "client",
|
||||||
|
...opts,
|
||||||
|
});
|
||||||
|
Object.setPrototypeOf(this, AccessDeniedException.prototype);
|
||||||
|
this.error = opts.error;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
exports.AccessDeniedException = AccessDeniedException;
|
||||||
|
class InternalServerException extends SigninServiceException_1.SigninServiceException {
|
||||||
|
name = "InternalServerException";
|
||||||
|
$fault = "server";
|
||||||
|
error;
|
||||||
|
constructor(opts) {
|
||||||
|
super({
|
||||||
|
name: "InternalServerException",
|
||||||
|
$fault: "server",
|
||||||
|
...opts,
|
||||||
|
});
|
||||||
|
Object.setPrototypeOf(this, InternalServerException.prototype);
|
||||||
|
this.error = opts.error;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
exports.InternalServerException = InternalServerException;
|
||||||
|
class TooManyRequestsError extends SigninServiceException_1.SigninServiceException {
|
||||||
|
name = "TooManyRequestsError";
|
||||||
|
$fault = "client";
|
||||||
|
error;
|
||||||
|
constructor(opts) {
|
||||||
|
super({
|
||||||
|
name: "TooManyRequestsError",
|
||||||
|
$fault: "client",
|
||||||
|
...opts,
|
||||||
|
});
|
||||||
|
Object.setPrototypeOf(this, TooManyRequestsError.prototype);
|
||||||
|
this.error = opts.error;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
exports.TooManyRequestsError = TooManyRequestsError;
|
||||||
|
class ValidationException extends SigninServiceException_1.SigninServiceException {
|
||||||
|
name = "ValidationException";
|
||||||
|
$fault = "client";
|
||||||
|
error;
|
||||||
|
constructor(opts) {
|
||||||
|
super({
|
||||||
|
name: "ValidationException",
|
||||||
|
$fault: "client",
|
||||||
|
...opts,
|
||||||
|
});
|
||||||
|
Object.setPrototypeOf(this, ValidationException.prototype);
|
||||||
|
this.error = opts.error;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
exports.ValidationException = ValidationException;
|
||||||
|
|
||||||
|
|
||||||
/***/ }),
|
/***/ }),
|
||||||
@ -536,6 +572,7 @@ const util_base64_1 = __webpack_require__(8385);
|
|||||||
const util_utf8_1 = __webpack_require__(1577);
|
const util_utf8_1 = __webpack_require__(1577);
|
||||||
const httpAuthSchemeProvider_1 = __webpack_require__(7709);
|
const httpAuthSchemeProvider_1 = __webpack_require__(7709);
|
||||||
const endpointResolver_1 = __webpack_require__(2547);
|
const endpointResolver_1 = __webpack_require__(2547);
|
||||||
|
const schemas_0_1 = __webpack_require__(890);
|
||||||
const getRuntimeConfig = (config) => {
|
const getRuntimeConfig = (config) => {
|
||||||
return {
|
return {
|
||||||
apiVersion: "2023-01-01",
|
apiVersion: "2023-01-01",
|
||||||
@ -561,6 +598,7 @@ const getRuntimeConfig = (config) => {
|
|||||||
protocol: config?.protocol ?? protocols_1.AwsRestJsonProtocol,
|
protocol: config?.protocol ?? protocols_1.AwsRestJsonProtocol,
|
||||||
protocolSettings: config?.protocolSettings ?? {
|
protocolSettings: config?.protocolSettings ?? {
|
||||||
defaultNamespace: "com.amazonaws.signin",
|
defaultNamespace: "com.amazonaws.signin",
|
||||||
|
errorTypeRegistries: schemas_0_1.errorTypeRegistries,
|
||||||
version: "2023-01-01",
|
version: "2023-01-01",
|
||||||
serviceTarget: "Signin",
|
serviceTarget: "Signin",
|
||||||
},
|
},
|
||||||
@ -573,12 +611,144 @@ const getRuntimeConfig = (config) => {
|
|||||||
exports.getRuntimeConfig = getRuntimeConfig;
|
exports.getRuntimeConfig = getRuntimeConfig;
|
||||||
|
|
||||||
|
|
||||||
|
/***/ }),
|
||||||
|
|
||||||
|
/***/ 890:
|
||||||
|
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
||||||
|
|
||||||
|
|
||||||
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
||||||
|
exports.CreateOAuth2Token$ = exports.CreateOAuth2TokenResponseBody$ = exports.CreateOAuth2TokenResponse$ = exports.CreateOAuth2TokenRequestBody$ = exports.CreateOAuth2TokenRequest$ = exports.AccessToken$ = exports.errorTypeRegistries = exports.ValidationException$ = exports.TooManyRequestsError$ = exports.InternalServerException$ = exports.AccessDeniedException$ = exports.SigninServiceException$ = void 0;
|
||||||
|
const _ADE = "AccessDeniedException";
|
||||||
|
const _AT = "AccessToken";
|
||||||
|
const _COAT = "CreateOAuth2Token";
|
||||||
|
const _COATR = "CreateOAuth2TokenRequest";
|
||||||
|
const _COATRB = "CreateOAuth2TokenRequestBody";
|
||||||
|
const _COATRBr = "CreateOAuth2TokenResponseBody";
|
||||||
|
const _COATRr = "CreateOAuth2TokenResponse";
|
||||||
|
const _ISE = "InternalServerException";
|
||||||
|
const _RT = "RefreshToken";
|
||||||
|
const _TMRE = "TooManyRequestsError";
|
||||||
|
const _VE = "ValidationException";
|
||||||
|
const _aKI = "accessKeyId";
|
||||||
|
const _aT = "accessToken";
|
||||||
|
const _c = "client";
|
||||||
|
const _cI = "clientId";
|
||||||
|
const _cV = "codeVerifier";
|
||||||
|
const _co = "code";
|
||||||
|
const _e = "error";
|
||||||
|
const _eI = "expiresIn";
|
||||||
|
const _gT = "grantType";
|
||||||
|
const _h = "http";
|
||||||
|
const _hE = "httpError";
|
||||||
|
const _iT = "idToken";
|
||||||
|
const _jN = "jsonName";
|
||||||
|
const _m = "message";
|
||||||
|
const _rT = "refreshToken";
|
||||||
|
const _rU = "redirectUri";
|
||||||
|
const _s = "smithy.ts.sdk.synthetic.com.amazonaws.signin";
|
||||||
|
const _sAK = "secretAccessKey";
|
||||||
|
const _sT = "sessionToken";
|
||||||
|
const _se = "server";
|
||||||
|
const _tI = "tokenInput";
|
||||||
|
const _tO = "tokenOutput";
|
||||||
|
const _tT = "tokenType";
|
||||||
|
const n0 = "com.amazonaws.signin";
|
||||||
|
const schema_1 = __webpack_require__(6890);
|
||||||
|
const errors_1 = __webpack_require__(7214);
|
||||||
|
const SigninServiceException_1 = __webpack_require__(2831);
|
||||||
|
const _s_registry = schema_1.TypeRegistry.for(_s);
|
||||||
|
exports.SigninServiceException$ = [-3, _s, "SigninServiceException", 0, [], []];
|
||||||
|
_s_registry.registerError(exports.SigninServiceException$, SigninServiceException_1.SigninServiceException);
|
||||||
|
const n0_registry = schema_1.TypeRegistry.for(n0);
|
||||||
|
exports.AccessDeniedException$ = [-3, n0, _ADE, { [_e]: _c }, [_e, _m], [0, 0], 2];
|
||||||
|
n0_registry.registerError(exports.AccessDeniedException$, errors_1.AccessDeniedException);
|
||||||
|
exports.InternalServerException$ = [-3, n0, _ISE, { [_e]: _se, [_hE]: 500 }, [_e, _m], [0, 0], 2];
|
||||||
|
n0_registry.registerError(exports.InternalServerException$, errors_1.InternalServerException);
|
||||||
|
exports.TooManyRequestsError$ = [-3, n0, _TMRE, { [_e]: _c, [_hE]: 429 }, [_e, _m], [0, 0], 2];
|
||||||
|
n0_registry.registerError(exports.TooManyRequestsError$, errors_1.TooManyRequestsError);
|
||||||
|
exports.ValidationException$ = [-3, n0, _VE, { [_e]: _c, [_hE]: 400 }, [_e, _m], [0, 0], 2];
|
||||||
|
n0_registry.registerError(exports.ValidationException$, errors_1.ValidationException);
|
||||||
|
exports.errorTypeRegistries = [_s_registry, n0_registry];
|
||||||
|
var RefreshToken = [0, n0, _RT, 8, 0];
|
||||||
|
exports.AccessToken$ = [
|
||||||
|
3,
|
||||||
|
n0,
|
||||||
|
_AT,
|
||||||
|
8,
|
||||||
|
[_aKI, _sAK, _sT],
|
||||||
|
[
|
||||||
|
[0, { [_jN]: _aKI }],
|
||||||
|
[0, { [_jN]: _sAK }],
|
||||||
|
[0, { [_jN]: _sT }],
|
||||||
|
],
|
||||||
|
3,
|
||||||
|
];
|
||||||
|
exports.CreateOAuth2TokenRequest$ = [
|
||||||
|
3,
|
||||||
|
n0,
|
||||||
|
_COATR,
|
||||||
|
0,
|
||||||
|
[_tI],
|
||||||
|
[[() => exports.CreateOAuth2TokenRequestBody$, 16]],
|
||||||
|
1,
|
||||||
|
];
|
||||||
|
exports.CreateOAuth2TokenRequestBody$ = [
|
||||||
|
3,
|
||||||
|
n0,
|
||||||
|
_COATRB,
|
||||||
|
0,
|
||||||
|
[_cI, _gT, _co, _rU, _cV, _rT],
|
||||||
|
[
|
||||||
|
[0, { [_jN]: _cI }],
|
||||||
|
[0, { [_jN]: _gT }],
|
||||||
|
0,
|
||||||
|
[0, { [_jN]: _rU }],
|
||||||
|
[0, { [_jN]: _cV }],
|
||||||
|
[() => RefreshToken, { [_jN]: _rT }],
|
||||||
|
],
|
||||||
|
2,
|
||||||
|
];
|
||||||
|
exports.CreateOAuth2TokenResponse$ = [
|
||||||
|
3,
|
||||||
|
n0,
|
||||||
|
_COATRr,
|
||||||
|
0,
|
||||||
|
[_tO],
|
||||||
|
[[() => exports.CreateOAuth2TokenResponseBody$, 16]],
|
||||||
|
1,
|
||||||
|
];
|
||||||
|
exports.CreateOAuth2TokenResponseBody$ = [
|
||||||
|
3,
|
||||||
|
n0,
|
||||||
|
_COATRBr,
|
||||||
|
0,
|
||||||
|
[_aT, _tT, _eI, _rT, _iT],
|
||||||
|
[
|
||||||
|
[() => exports.AccessToken$, { [_jN]: _aT }],
|
||||||
|
[0, { [_jN]: _tT }],
|
||||||
|
[1, { [_jN]: _eI }],
|
||||||
|
[() => RefreshToken, { [_jN]: _rT }],
|
||||||
|
[0, { [_jN]: _iT }],
|
||||||
|
],
|
||||||
|
4,
|
||||||
|
];
|
||||||
|
exports.CreateOAuth2Token$ = [
|
||||||
|
9,
|
||||||
|
n0,
|
||||||
|
_COAT,
|
||||||
|
{ [_h]: ["POST", "/v1/token", 200] },
|
||||||
|
() => exports.CreateOAuth2TokenRequest$,
|
||||||
|
() => exports.CreateOAuth2TokenResponse$,
|
||||||
|
];
|
||||||
|
|
||||||
|
|
||||||
/***/ }),
|
/***/ }),
|
||||||
|
|
||||||
/***/ 9955:
|
/***/ 9955:
|
||||||
/***/ ((module) => {
|
/***/ ((module) => {
|
||||||
|
|
||||||
module.exports = /*#__PURE__*/JSON.parse('{"name":"@aws-sdk/nested-clients","version":"3.975.0","description":"Nested clients for AWS SDK packages.","main":"./dist-cjs/index.js","module":"./dist-es/index.js","types":"./dist-types/index.d.ts","scripts":{"build":"yarn lint && concurrently \'yarn:build:types\' \'yarn:build:es\' && yarn build:cjs","build:cjs":"node ../../scripts/compilation/inline nested-clients","build:es":"tsc -p tsconfig.es.json","build:include:deps":"yarn g:turbo run build -F=\\"$npm_package_name\\"","build:types":"tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4","clean":"premove dist-cjs dist-es dist-types tsconfig.cjs.tsbuildinfo tsconfig.es.tsbuildinfo tsconfig.types.tsbuildinfo","lint":"node ../../scripts/validation/submodules-linter.js --pkg nested-clients","test":"yarn g:vitest run","test:watch":"yarn g:vitest watch"},"engines":{"node":">=20.0.0"},"sideEffects":false,"author":{"name":"AWS SDK for JavaScript Team","url":"https://aws.amazon.com/javascript/"},"license":"Apache-2.0","dependencies":{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"^3.973.1","@aws-sdk/middleware-host-header":"^3.972.1","@aws-sdk/middleware-logger":"^3.972.1","@aws-sdk/middleware-recursion-detection":"^3.972.1","@aws-sdk/middleware-user-agent":"^3.972.2","@aws-sdk/region-config-resolver":"^3.972.1","@aws-sdk/types":"^3.973.0","@aws-sdk/util-endpoints":"3.972.0","@aws-sdk/util-user-agent-browser":"^3.972.1","@aws-sdk/util-user-agent-node":"^3.972.1","@smithy/config-resolver":"^4.4.6","@smithy/core":"^3.21.1","@smithy/fetch-http-handler":"^5.3.9","@smithy/hash-node":"^4.2.8","@smithy/invalid-dependency":"^4.2.8","@smithy/middleware-content-length":"^4.2.8","@smithy/middleware-endpoint":"^4.4.11","@smithy/middleware-retry":"^4.4.27","@smithy/middleware-serde":"^4.2.9","@smithy/middleware-stack":"^4.2.8","@smithy/node-config-provider":"^4.3.8","@smithy/node-http-handler":"^4.4.8","@smithy/protocol-http":"^5.3.8","@smithy/smithy-client":"^4.10.12","@smithy/types":"^4.12.0","@smithy/url-parser":"^4.2.8","@smithy/util-base64":"^4.3.0","@smithy/util-body-length-browser":"^4.2.0","@smithy/util-body-length-node":"^4.2.1","@smithy/util-defaults-mode-browser":"^4.3.26","@smithy/util-defaults-mode-node":"^4.2.29","@smithy/util-endpoints":"^3.2.8","@smithy/util-middleware":"^4.2.8","@smithy/util-retry":"^4.2.8","@smithy/util-utf8":"^4.2.0","tslib":"^2.6.2"},"devDependencies":{"concurrently":"7.0.0","downlevel-dts":"0.10.1","premove":"4.0.0","typescript":"~5.8.3"},"typesVersions":{"<4.0":{"dist-types/*":["dist-types/ts3.4/*"]}},"files":["./signin.d.ts","./signin.js","./sso-oidc.d.ts","./sso-oidc.js","./sts.d.ts","./sts.js","dist-*/**"],"browser":{"./dist-es/submodules/signin/runtimeConfig":"./dist-es/submodules/signin/runtimeConfig.browser","./dist-es/submodules/sso-oidc/runtimeConfig":"./dist-es/submodules/sso-oidc/runtimeConfig.browser","./dist-es/submodules/sts/runtimeConfig":"./dist-es/submodules/sts/runtimeConfig.browser"},"react-native":{},"homepage":"https://github.com/aws/aws-sdk-js-v3/tree/main/packages/nested-clients","repository":{"type":"git","url":"https://github.com/aws/aws-sdk-js-v3.git","directory":"packages/nested-clients"},"exports":{"./package.json":"./package.json","./sso-oidc":{"types":"./dist-types/submodules/sso-oidc/index.d.ts","module":"./dist-es/submodules/sso-oidc/index.js","node":"./dist-cjs/submodules/sso-oidc/index.js","import":"./dist-es/submodules/sso-oidc/index.js","require":"./dist-cjs/submodules/sso-oidc/index.js"},"./sts":{"types":"./dist-types/submodules/sts/index.d.ts","module":"./dist-es/submodules/sts/index.js","node":"./dist-cjs/submodules/sts/index.js","import":"./dist-es/submodules/sts/index.js","require":"./dist-cjs/submodules/sts/index.js"},"./signin":{"types":"./dist-types/submodules/signin/index.d.ts","module":"./dist-es/submodules/signin/index.js","node":"./dist-cjs/submodules/signin/index.js","import":"./dist-es/submodules/signin/index.js","require":"./dist-cjs/submodules/signin/index.js"}}}');
|
module.exports = /*#__PURE__*/JSON.parse('{"name":"@aws-sdk/nested-clients","version":"3.996.3","description":"Nested clients for AWS SDK packages.","main":"./dist-cjs/index.js","module":"./dist-es/index.js","types":"./dist-types/index.d.ts","scripts":{"build":"yarn lint && concurrently \'yarn:build:types\' \'yarn:build:es\' && yarn build:cjs","build:cjs":"node ../../scripts/compilation/inline nested-clients","build:es":"tsc -p tsconfig.es.json","build:include:deps":"yarn g:turbo run build -F=\\"$npm_package_name\\"","build:types":"tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4","clean":"premove dist-cjs dist-es dist-types tsconfig.cjs.tsbuildinfo tsconfig.es.tsbuildinfo tsconfig.types.tsbuildinfo","lint":"node ../../scripts/validation/submodules-linter.js --pkg nested-clients","test":"yarn g:vitest run","test:watch":"yarn g:vitest watch"},"engines":{"node":">=20.0.0"},"sideEffects":false,"author":{"name":"AWS SDK for JavaScript Team","url":"https://aws.amazon.com/javascript/"},"license":"Apache-2.0","dependencies":{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"^3.973.15","@aws-sdk/middleware-host-header":"^3.972.6","@aws-sdk/middleware-logger":"^3.972.6","@aws-sdk/middleware-recursion-detection":"^3.972.6","@aws-sdk/middleware-user-agent":"^3.972.15","@aws-sdk/region-config-resolver":"^3.972.6","@aws-sdk/types":"^3.973.4","@aws-sdk/util-endpoints":"^3.996.3","@aws-sdk/util-user-agent-browser":"^3.972.6","@aws-sdk/util-user-agent-node":"^3.973.0","@smithy/config-resolver":"^4.4.9","@smithy/core":"^3.23.6","@smithy/fetch-http-handler":"^5.3.11","@smithy/hash-node":"^4.2.10","@smithy/invalid-dependency":"^4.2.10","@smithy/middleware-content-length":"^4.2.10","@smithy/middleware-endpoint":"^4.4.20","@smithy/middleware-retry":"^4.4.37","@smithy/middleware-serde":"^4.2.11","@smithy/middleware-stack":"^4.2.10","@smithy/node-config-provider":"^4.3.10","@smithy/node-http-handler":"^4.4.12","@smithy/protocol-http":"^5.3.10","@smithy/smithy-client":"^4.12.0","@smithy/types":"^4.13.0","@smithy/url-parser":"^4.2.10","@smithy/util-base64":"^4.3.1","@smithy/util-body-length-browser":"^4.2.1","@smithy/util-body-length-node":"^4.2.2","@smithy/util-defaults-mode-browser":"^4.3.36","@smithy/util-defaults-mode-node":"^4.2.39","@smithy/util-endpoints":"^3.3.1","@smithy/util-middleware":"^4.2.10","@smithy/util-retry":"^4.2.10","@smithy/util-utf8":"^4.2.1","tslib":"^2.6.2"},"devDependencies":{"concurrently":"7.0.0","downlevel-dts":"0.10.1","premove":"4.0.0","typescript":"~5.8.3"},"typesVersions":{"<4.0":{"dist-types/*":["dist-types/ts3.4/*"]}},"files":["./cognito-identity.d.ts","./cognito-identity.js","./signin.d.ts","./signin.js","./sso-oidc.d.ts","./sso-oidc.js","./sso.d.ts","./sso.js","./sts.d.ts","./sts.js","dist-*/**"],"browser":{"./dist-es/submodules/signin/runtimeConfig":"./dist-es/submodules/signin/runtimeConfig.browser","./dist-es/submodules/sso-oidc/runtimeConfig":"./dist-es/submodules/sso-oidc/runtimeConfig.browser","./dist-es/submodules/sts/runtimeConfig":"./dist-es/submodules/sts/runtimeConfig.browser"},"react-native":{},"homepage":"https://github.com/aws/aws-sdk-js-v3/tree/main/packages/nested-clients","repository":{"type":"git","url":"https://github.com/aws/aws-sdk-js-v3.git","directory":"packages/nested-clients"},"exports":{"./package.json":"./package.json","./sso-oidc":{"types":"./dist-types/submodules/sso-oidc/index.d.ts","module":"./dist-es/submodules/sso-oidc/index.js","node":"./dist-cjs/submodules/sso-oidc/index.js","import":"./dist-es/submodules/sso-oidc/index.js","require":"./dist-cjs/submodules/sso-oidc/index.js"},"./sts":{"types":"./dist-types/submodules/sts/index.d.ts","module":"./dist-es/submodules/sts/index.js","node":"./dist-cjs/submodules/sts/index.js","import":"./dist-es/submodules/sts/index.js","require":"./dist-cjs/submodules/sts/index.js"},"./signin":{"types":"./dist-types/submodules/signin/index.d.ts","module":"./dist-es/submodules/signin/index.js","node":"./dist-cjs/submodules/signin/index.js","import":"./dist-es/submodules/signin/index.js","require":"./dist-cjs/submodules/signin/index.js"},"./cognito-identity":{"types":"./dist-types/submodules/cognito-identity/index.d.ts","module":"./dist-es/submodules/cognito-identity/index.js","node":"./dist-cjs/submodules/cognito-identity/index.js","import":"./dist-es/submodules/cognito-identity/index.js","require":"./dist-cjs/submodules/cognito-identity/index.js"},"./sso":{"types":"./dist-types/submodules/sso/index.d.ts","module":"./dist-es/submodules/sso/index.js","node":"./dist-cjs/submodules/sso/index.js","import":"./dist-es/submodules/sso/index.js","require":"./dist-cjs/submodules/sso/index.js"}}}');
|
||||||
|
|
||||||
/***/ })
|
/***/ })
|
||||||
|
|
||||||
|
|||||||
2
dist/762.index.js.map
generated
vendored
2
dist/762.index.js.map
generated
vendored
File diff suppressed because one or more lines are too long
4
dist/869.index.js
generated
vendored
4
dist/869.index.js
generated
vendored
@ -183,7 +183,7 @@ const isWebIdentityProfile = (arg) => Boolean(arg) &&
|
|||||||
typeof arg.web_identity_token_file === "string" &&
|
typeof arg.web_identity_token_file === "string" &&
|
||||||
typeof arg.role_arn === "string" &&
|
typeof arg.role_arn === "string" &&
|
||||||
["undefined", "string"].indexOf(typeof arg.role_session_name) > -1;
|
["undefined", "string"].indexOf(typeof arg.role_session_name) > -1;
|
||||||
const resolveWebIdentityCredentials = async (profile, options, callerClientConfig) => __webpack_require__.e(/* import() */ 956).then(__webpack_require__.t.bind(__webpack_require__, 9956, 23)).then(({ fromTokenFile }) => fromTokenFile({
|
const resolveWebIdentityCredentials = async (profile, options, callerClientConfig) => Promise.all(/* import() */[__webpack_require__.e(136), __webpack_require__.e(956)]).then(__webpack_require__.t.bind(__webpack_require__, 9956, 23)).then(({ fromTokenFile }) => fromTokenFile({
|
||||||
webIdentityTokenFile: profile.web_identity_token_file,
|
webIdentityTokenFile: profile.web_identity_token_file,
|
||||||
roleArn: profile.role_arn,
|
roleArn: profile.role_arn,
|
||||||
roleSessionName: profile.role_session_name,
|
roleSessionName: profile.role_session_name,
|
||||||
@ -284,7 +284,7 @@ class LoginCredentialsFetcher {
|
|||||||
return this.profileData.login_session;
|
return this.profileData.login_session;
|
||||||
}
|
}
|
||||||
async refresh(token) {
|
async refresh(token) {
|
||||||
const { SigninClient, CreateOAuth2TokenCommand } = await __webpack_require__.e(/* import() */ 762).then(__webpack_require__.t.bind(__webpack_require__, 9762, 19));
|
const { SigninClient, CreateOAuth2TokenCommand } = await __webpack_require__.e(/* import() */ 762).then(__webpack_require__.t.bind(__webpack_require__, 9762, 23));
|
||||||
const { logger, userAgentAppId } = this.callerClientConfig ?? {};
|
const { logger, userAgentAppId } = this.callerClientConfig ?? {};
|
||||||
const isH2 = (requestHandler) => {
|
const isH2 = (requestHandler) => {
|
||||||
return requestHandler?.metadata?.handlerProtocol === "h2";
|
return requestHandler?.metadata?.handlerProtocol === "h2";
|
||||||
|
|||||||
919
dist/956.index.js
generated
vendored
919
dist/956.index.js
generated
vendored
@ -1,5 +1,5 @@
|
|||||||
export const id = 956;
|
export const id = 956;
|
||||||
export const ids = [956,136];
|
export const ids = [956];
|
||||||
export const modules = {
|
export const modules = {
|
||||||
|
|
||||||
/***/ 8079:
|
/***/ 8079:
|
||||||
@ -11,7 +11,7 @@ exports.fromTokenFile = void 0;
|
|||||||
const client_1 = __webpack_require__(5152);
|
const client_1 = __webpack_require__(5152);
|
||||||
const property_provider_1 = __webpack_require__(8857);
|
const property_provider_1 = __webpack_require__(8857);
|
||||||
const shared_ini_file_loader_1 = __webpack_require__(4964);
|
const shared_ini_file_loader_1 = __webpack_require__(4964);
|
||||||
const fs_1 = __webpack_require__(9896);
|
const node_fs_1 = __webpack_require__(3024);
|
||||||
const fromWebToken_1 = __webpack_require__(4453);
|
const fromWebToken_1 = __webpack_require__(4453);
|
||||||
const ENV_TOKEN_FILE = "AWS_WEB_IDENTITY_TOKEN_FILE";
|
const ENV_TOKEN_FILE = "AWS_WEB_IDENTITY_TOKEN_FILE";
|
||||||
const ENV_ROLE_ARN = "AWS_ROLE_ARN";
|
const ENV_ROLE_ARN = "AWS_ROLE_ARN";
|
||||||
@ -29,7 +29,7 @@ const fromTokenFile = (init = {}) => async (awsIdentityProperties) => {
|
|||||||
const credentials = await (0, fromWebToken_1.fromWebToken)({
|
const credentials = await (0, fromWebToken_1.fromWebToken)({
|
||||||
...init,
|
...init,
|
||||||
webIdentityToken: shared_ini_file_loader_1.externalDataInterceptor?.getTokenRecord?.()[webIdentityTokenFile] ??
|
webIdentityToken: shared_ini_file_loader_1.externalDataInterceptor?.getTokenRecord?.()[webIdentityTokenFile] ??
|
||||||
(0, fs_1.readFileSync)(webIdentityTokenFile, { encoding: "ascii" }),
|
(0, node_fs_1.readFileSync)(webIdentityTokenFile, { encoding: "ascii" }),
|
||||||
roleArn,
|
roleArn,
|
||||||
roleSessionName,
|
roleSessionName,
|
||||||
})(awsIdentityProperties);
|
})(awsIdentityProperties);
|
||||||
@ -122,911 +122,28 @@ var fromWebToken = __webpack_require__(4453);
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Object.prototype.hasOwnProperty.call(fromTokenFile, '__proto__') &&
|
||||||
|
!Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
|
||||||
|
Object.defineProperty(exports, '__proto__', {
|
||||||
|
enumerable: true,
|
||||||
|
value: fromTokenFile['__proto__']
|
||||||
|
});
|
||||||
|
|
||||||
Object.keys(fromTokenFile).forEach(function (k) {
|
Object.keys(fromTokenFile).forEach(function (k) {
|
||||||
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) Object.defineProperty(exports, k, {
|
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = fromTokenFile[k];
|
||||||
|
});
|
||||||
|
Object.prototype.hasOwnProperty.call(fromWebToken, '__proto__') &&
|
||||||
|
!Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
|
||||||
|
Object.defineProperty(exports, '__proto__', {
|
||||||
enumerable: true,
|
enumerable: true,
|
||||||
get: function () { return fromTokenFile[k]; }
|
value: fromWebToken['__proto__']
|
||||||
});
|
|
||||||
});
|
});
|
||||||
|
|
||||||
Object.keys(fromWebToken).forEach(function (k) {
|
Object.keys(fromWebToken).forEach(function (k) {
|
||||||
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) Object.defineProperty(exports, k, {
|
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = fromWebToken[k];
|
||||||
enumerable: true,
|
|
||||||
get: function () { return fromWebToken[k]; }
|
|
||||||
});
|
|
||||||
});
|
});
|
||||||
|
|
||||||
|
|
||||||
/***/ }),
|
|
||||||
|
|
||||||
/***/ 3723:
|
|
||||||
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
||||||
|
|
||||||
|
|
||||||
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
||||||
exports.STSClient = exports.__Client = void 0;
|
|
||||||
const middleware_host_header_1 = __webpack_require__(2590);
|
|
||||||
const middleware_logger_1 = __webpack_require__(5242);
|
|
||||||
const middleware_recursion_detection_1 = __webpack_require__(1568);
|
|
||||||
const middleware_user_agent_1 = __webpack_require__(2959);
|
|
||||||
const config_resolver_1 = __webpack_require__(9316);
|
|
||||||
const core_1 = __webpack_require__(402);
|
|
||||||
const schema_1 = __webpack_require__(6890);
|
|
||||||
const middleware_content_length_1 = __webpack_require__(7212);
|
|
||||||
const middleware_endpoint_1 = __webpack_require__(99);
|
|
||||||
const middleware_retry_1 = __webpack_require__(9618);
|
|
||||||
const smithy_client_1 = __webpack_require__(1411);
|
|
||||||
Object.defineProperty(exports, "__Client", ({ enumerable: true, get: function () { return smithy_client_1.Client; } }));
|
|
||||||
const httpAuthSchemeProvider_1 = __webpack_require__(7851);
|
|
||||||
const EndpointParameters_1 = __webpack_require__(6811);
|
|
||||||
const runtimeConfig_1 = __webpack_require__(6578);
|
|
||||||
const runtimeExtensions_1 = __webpack_require__(7742);
|
|
||||||
class STSClient extends smithy_client_1.Client {
|
|
||||||
config;
|
|
||||||
constructor(...[configuration]) {
|
|
||||||
const _config_0 = (0, runtimeConfig_1.getRuntimeConfig)(configuration || {});
|
|
||||||
super(_config_0);
|
|
||||||
this.initConfig = _config_0;
|
|
||||||
const _config_1 = (0, EndpointParameters_1.resolveClientEndpointParameters)(_config_0);
|
|
||||||
const _config_2 = (0, middleware_user_agent_1.resolveUserAgentConfig)(_config_1);
|
|
||||||
const _config_3 = (0, middleware_retry_1.resolveRetryConfig)(_config_2);
|
|
||||||
const _config_4 = (0, config_resolver_1.resolveRegionConfig)(_config_3);
|
|
||||||
const _config_5 = (0, middleware_host_header_1.resolveHostHeaderConfig)(_config_4);
|
|
||||||
const _config_6 = (0, middleware_endpoint_1.resolveEndpointConfig)(_config_5);
|
|
||||||
const _config_7 = (0, httpAuthSchemeProvider_1.resolveHttpAuthSchemeConfig)(_config_6);
|
|
||||||
const _config_8 = (0, runtimeExtensions_1.resolveRuntimeExtensions)(_config_7, configuration?.extensions || []);
|
|
||||||
this.config = _config_8;
|
|
||||||
this.middlewareStack.use((0, schema_1.getSchemaSerdePlugin)(this.config));
|
|
||||||
this.middlewareStack.use((0, middleware_user_agent_1.getUserAgentPlugin)(this.config));
|
|
||||||
this.middlewareStack.use((0, middleware_retry_1.getRetryPlugin)(this.config));
|
|
||||||
this.middlewareStack.use((0, middleware_content_length_1.getContentLengthPlugin)(this.config));
|
|
||||||
this.middlewareStack.use((0, middleware_host_header_1.getHostHeaderPlugin)(this.config));
|
|
||||||
this.middlewareStack.use((0, middleware_logger_1.getLoggerPlugin)(this.config));
|
|
||||||
this.middlewareStack.use((0, middleware_recursion_detection_1.getRecursionDetectionPlugin)(this.config));
|
|
||||||
this.middlewareStack.use((0, core_1.getHttpAuthSchemeEndpointRuleSetPlugin)(this.config, {
|
|
||||||
httpAuthSchemeParametersProvider: httpAuthSchemeProvider_1.defaultSTSHttpAuthSchemeParametersProvider,
|
|
||||||
identityProviderConfigProvider: async (config) => new core_1.DefaultIdentityProviderConfig({
|
|
||||||
"aws.auth#sigv4": config.credentials,
|
|
||||||
}),
|
|
||||||
}));
|
|
||||||
this.middlewareStack.use((0, core_1.getHttpSigningPlugin)(this.config));
|
|
||||||
}
|
|
||||||
destroy() {
|
|
||||||
super.destroy();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
exports.STSClient = STSClient;
|
|
||||||
|
|
||||||
|
|
||||||
/***/ }),
|
|
||||||
|
|
||||||
/***/ 4532:
|
|
||||||
/***/ ((__unused_webpack_module, exports) => {
|
|
||||||
|
|
||||||
|
|
||||||
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
||||||
exports.resolveHttpAuthRuntimeConfig = exports.getHttpAuthExtensionConfiguration = void 0;
|
|
||||||
const getHttpAuthExtensionConfiguration = (runtimeConfig) => {
|
|
||||||
const _httpAuthSchemes = runtimeConfig.httpAuthSchemes;
|
|
||||||
let _httpAuthSchemeProvider = runtimeConfig.httpAuthSchemeProvider;
|
|
||||||
let _credentials = runtimeConfig.credentials;
|
|
||||||
return {
|
|
||||||
setHttpAuthScheme(httpAuthScheme) {
|
|
||||||
const index = _httpAuthSchemes.findIndex((scheme) => scheme.schemeId === httpAuthScheme.schemeId);
|
|
||||||
if (index === -1) {
|
|
||||||
_httpAuthSchemes.push(httpAuthScheme);
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
_httpAuthSchemes.splice(index, 1, httpAuthScheme);
|
|
||||||
}
|
|
||||||
},
|
|
||||||
httpAuthSchemes() {
|
|
||||||
return _httpAuthSchemes;
|
|
||||||
},
|
|
||||||
setHttpAuthSchemeProvider(httpAuthSchemeProvider) {
|
|
||||||
_httpAuthSchemeProvider = httpAuthSchemeProvider;
|
|
||||||
},
|
|
||||||
httpAuthSchemeProvider() {
|
|
||||||
return _httpAuthSchemeProvider;
|
|
||||||
},
|
|
||||||
setCredentials(credentials) {
|
|
||||||
_credentials = credentials;
|
|
||||||
},
|
|
||||||
credentials() {
|
|
||||||
return _credentials;
|
|
||||||
},
|
|
||||||
};
|
|
||||||
};
|
|
||||||
exports.getHttpAuthExtensionConfiguration = getHttpAuthExtensionConfiguration;
|
|
||||||
const resolveHttpAuthRuntimeConfig = (config) => {
|
|
||||||
return {
|
|
||||||
httpAuthSchemes: config.httpAuthSchemes(),
|
|
||||||
httpAuthSchemeProvider: config.httpAuthSchemeProvider(),
|
|
||||||
credentials: config.credentials(),
|
|
||||||
};
|
|
||||||
};
|
|
||||||
exports.resolveHttpAuthRuntimeConfig = resolveHttpAuthRuntimeConfig;
|
|
||||||
|
|
||||||
|
|
||||||
/***/ }),
|
|
||||||
|
|
||||||
/***/ 7851:
|
|
||||||
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
||||||
|
|
||||||
|
|
||||||
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
||||||
exports.resolveHttpAuthSchemeConfig = exports.resolveStsAuthConfig = exports.defaultSTSHttpAuthSchemeProvider = exports.defaultSTSHttpAuthSchemeParametersProvider = void 0;
|
|
||||||
const core_1 = __webpack_require__(8704);
|
|
||||||
const util_middleware_1 = __webpack_require__(6324);
|
|
||||||
const STSClient_1 = __webpack_require__(3723);
|
|
||||||
const defaultSTSHttpAuthSchemeParametersProvider = async (config, context, input) => {
|
|
||||||
return {
|
|
||||||
operation: (0, util_middleware_1.getSmithyContext)(context).operation,
|
|
||||||
region: (await (0, util_middleware_1.normalizeProvider)(config.region)()) ||
|
|
||||||
(() => {
|
|
||||||
throw new Error("expected `region` to be configured for `aws.auth#sigv4`");
|
|
||||||
})(),
|
|
||||||
};
|
|
||||||
};
|
|
||||||
exports.defaultSTSHttpAuthSchemeParametersProvider = defaultSTSHttpAuthSchemeParametersProvider;
|
|
||||||
function createAwsAuthSigv4HttpAuthOption(authParameters) {
|
|
||||||
return {
|
|
||||||
schemeId: "aws.auth#sigv4",
|
|
||||||
signingProperties: {
|
|
||||||
name: "sts",
|
|
||||||
region: authParameters.region,
|
|
||||||
},
|
|
||||||
propertiesExtractor: (config, context) => ({
|
|
||||||
signingProperties: {
|
|
||||||
config,
|
|
||||||
context,
|
|
||||||
},
|
|
||||||
}),
|
|
||||||
};
|
|
||||||
}
|
|
||||||
function createSmithyApiNoAuthHttpAuthOption(authParameters) {
|
|
||||||
return {
|
|
||||||
schemeId: "smithy.api#noAuth",
|
|
||||||
};
|
|
||||||
}
|
|
||||||
const defaultSTSHttpAuthSchemeProvider = (authParameters) => {
|
|
||||||
const options = [];
|
|
||||||
switch (authParameters.operation) {
|
|
||||||
case "AssumeRoleWithWebIdentity": {
|
|
||||||
options.push(createSmithyApiNoAuthHttpAuthOption(authParameters));
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
default: {
|
|
||||||
options.push(createAwsAuthSigv4HttpAuthOption(authParameters));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return options;
|
|
||||||
};
|
|
||||||
exports.defaultSTSHttpAuthSchemeProvider = defaultSTSHttpAuthSchemeProvider;
|
|
||||||
const resolveStsAuthConfig = (input) => Object.assign(input, {
|
|
||||||
stsClientCtor: STSClient_1.STSClient,
|
|
||||||
});
|
|
||||||
exports.resolveStsAuthConfig = resolveStsAuthConfig;
|
|
||||||
const resolveHttpAuthSchemeConfig = (config) => {
|
|
||||||
const config_0 = (0, exports.resolveStsAuthConfig)(config);
|
|
||||||
const config_1 = (0, core_1.resolveAwsSdkSigV4Config)(config_0);
|
|
||||||
return Object.assign(config_1, {
|
|
||||||
authSchemePreference: (0, util_middleware_1.normalizeProvider)(config.authSchemePreference ?? []),
|
|
||||||
});
|
|
||||||
};
|
|
||||||
exports.resolveHttpAuthSchemeConfig = resolveHttpAuthSchemeConfig;
|
|
||||||
|
|
||||||
|
|
||||||
/***/ }),
|
|
||||||
|
|
||||||
/***/ 6811:
|
|
||||||
/***/ ((__unused_webpack_module, exports) => {
|
|
||||||
|
|
||||||
|
|
||||||
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
||||||
exports.commonParams = exports.resolveClientEndpointParameters = void 0;
|
|
||||||
const resolveClientEndpointParameters = (options) => {
|
|
||||||
return Object.assign(options, {
|
|
||||||
useDualstackEndpoint: options.useDualstackEndpoint ?? false,
|
|
||||||
useFipsEndpoint: options.useFipsEndpoint ?? false,
|
|
||||||
useGlobalEndpoint: options.useGlobalEndpoint ?? false,
|
|
||||||
defaultSigningName: "sts",
|
|
||||||
});
|
|
||||||
};
|
|
||||||
exports.resolveClientEndpointParameters = resolveClientEndpointParameters;
|
|
||||||
exports.commonParams = {
|
|
||||||
UseGlobalEndpoint: { type: "builtInParams", name: "useGlobalEndpoint" },
|
|
||||||
UseFIPS: { type: "builtInParams", name: "useFipsEndpoint" },
|
|
||||||
Endpoint: { type: "builtInParams", name: "endpoint" },
|
|
||||||
Region: { type: "builtInParams", name: "region" },
|
|
||||||
UseDualStack: { type: "builtInParams", name: "useDualstackEndpoint" },
|
|
||||||
};
|
|
||||||
|
|
||||||
|
|
||||||
/***/ }),
|
|
||||||
|
|
||||||
/***/ 9765:
|
|
||||||
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
||||||
|
|
||||||
|
|
||||||
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
||||||
exports.defaultEndpointResolver = void 0;
|
|
||||||
const util_endpoints_1 = __webpack_require__(3068);
|
|
||||||
const util_endpoints_2 = __webpack_require__(9674);
|
|
||||||
const ruleset_1 = __webpack_require__(1670);
|
|
||||||
const cache = new util_endpoints_2.EndpointCache({
|
|
||||||
size: 50,
|
|
||||||
params: ["Endpoint", "Region", "UseDualStack", "UseFIPS", "UseGlobalEndpoint"],
|
|
||||||
});
|
|
||||||
const defaultEndpointResolver = (endpointParams, context = {}) => {
|
|
||||||
return cache.get(endpointParams, () => (0, util_endpoints_2.resolveEndpoint)(ruleset_1.ruleSet, {
|
|
||||||
endpointParams: endpointParams,
|
|
||||||
logger: context.logger,
|
|
||||||
}));
|
|
||||||
};
|
|
||||||
exports.defaultEndpointResolver = defaultEndpointResolver;
|
|
||||||
util_endpoints_2.customEndpointFunctions.aws = util_endpoints_1.awsEndpointFunctions;
|
|
||||||
|
|
||||||
|
|
||||||
/***/ }),
|
|
||||||
|
|
||||||
/***/ 1670:
|
|
||||||
/***/ ((__unused_webpack_module, exports) => {
|
|
||||||
|
|
||||||
|
|
||||||
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
||||||
exports.ruleSet = void 0;
|
|
||||||
const F = "required", G = "type", H = "fn", I = "argv", J = "ref";
|
|
||||||
const a = false, b = true, c = "booleanEquals", d = "stringEquals", e = "sigv4", f = "sts", g = "us-east-1", h = "endpoint", i = "https://sts.{Region}.{PartitionResult#dnsSuffix}", j = "tree", k = "error", l = "getAttr", m = { [F]: false, [G]: "string" }, n = { [F]: true, "default": false, [G]: "boolean" }, o = { [J]: "Endpoint" }, p = { [H]: "isSet", [I]: [{ [J]: "Region" }] }, q = { [J]: "Region" }, r = { [H]: "aws.partition", [I]: [q], "assign": "PartitionResult" }, s = { [J]: "UseFIPS" }, t = { [J]: "UseDualStack" }, u = { "url": "https://sts.amazonaws.com", "properties": { "authSchemes": [{ "name": e, "signingName": f, "signingRegion": g }] }, "headers": {} }, v = {}, w = { "conditions": [{ [H]: d, [I]: [q, "aws-global"] }], [h]: u, [G]: h }, x = { [H]: c, [I]: [s, true] }, y = { [H]: c, [I]: [t, true] }, z = { [H]: l, [I]: [{ [J]: "PartitionResult" }, "supportsFIPS"] }, A = { [J]: "PartitionResult" }, B = { [H]: c, [I]: [true, { [H]: l, [I]: [A, "supportsDualStack"] }] }, C = [{ [H]: "isSet", [I]: [o] }], D = [x], E = [y];
|
|
||||||
const _data = { version: "1.0", parameters: { Region: m, UseDualStack: n, UseFIPS: n, Endpoint: m, UseGlobalEndpoint: n }, rules: [{ conditions: [{ [H]: c, [I]: [{ [J]: "UseGlobalEndpoint" }, b] }, { [H]: "not", [I]: C }, p, r, { [H]: c, [I]: [s, a] }, { [H]: c, [I]: [t, a] }], rules: [{ conditions: [{ [H]: d, [I]: [q, "ap-northeast-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "ap-south-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "ap-southeast-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "ap-southeast-2"] }], endpoint: u, [G]: h }, w, { conditions: [{ [H]: d, [I]: [q, "ca-central-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "eu-central-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "eu-north-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "eu-west-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "eu-west-2"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "eu-west-3"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "sa-east-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, g] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "us-east-2"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "us-west-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "us-west-2"] }], endpoint: u, [G]: h }, { endpoint: { url: i, properties: { authSchemes: [{ name: e, signingName: f, signingRegion: "{Region}" }] }, headers: v }, [G]: h }], [G]: j }, { conditions: C, rules: [{ conditions: D, error: "Invalid Configuration: FIPS and custom endpoint are not supported", [G]: k }, { conditions: E, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", [G]: k }, { endpoint: { url: o, properties: v, headers: v }, [G]: h }], [G]: j }, { conditions: [p], rules: [{ conditions: [r], rules: [{ conditions: [x, y], rules: [{ conditions: [{ [H]: c, [I]: [b, z] }, B], rules: [{ endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: v, headers: v }, [G]: h }], [G]: j }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", [G]: k }], [G]: j }, { conditions: D, rules: [{ conditions: [{ [H]: c, [I]: [z, b] }], rules: [{ conditions: [{ [H]: d, [I]: [{ [H]: l, [I]: [A, "name"] }, "aws-us-gov"] }], endpoint: { url: "https://sts.{Region}.amazonaws.com", properties: v, headers: v }, [G]: h }, { endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dnsSuffix}", properties: v, headers: v }, [G]: h }], [G]: j }, { error: "FIPS is enabled but this partition does not support FIPS", [G]: k }], [G]: j }, { conditions: E, rules: [{ conditions: [B], rules: [{ endpoint: { url: "https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: v, headers: v }, [G]: h }], [G]: j }, { error: "DualStack is enabled but this partition does not support DualStack", [G]: k }], [G]: j }, w, { endpoint: { url: i, properties: v, headers: v }, [G]: h }], [G]: j }], [G]: j }, { error: "Invalid Configuration: Missing Region", [G]: k }] };
|
|
||||||
exports.ruleSet = _data;
|
|
||||||
|
|
||||||
|
|
||||||
/***/ }),
|
|
||||||
|
|
||||||
/***/ 1136:
|
|
||||||
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
var STSClient = __webpack_require__(3723);
|
|
||||||
var smithyClient = __webpack_require__(1411);
|
|
||||||
var middlewareEndpoint = __webpack_require__(99);
|
|
||||||
var EndpointParameters = __webpack_require__(6811);
|
|
||||||
var schema = __webpack_require__(6890);
|
|
||||||
var client = __webpack_require__(5152);
|
|
||||||
var regionConfigResolver = __webpack_require__(6463);
|
|
||||||
|
|
||||||
class STSServiceException extends smithyClient.ServiceException {
|
|
||||||
constructor(options) {
|
|
||||||
super(options);
|
|
||||||
Object.setPrototypeOf(this, STSServiceException.prototype);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
class ExpiredTokenException extends STSServiceException {
|
|
||||||
name = "ExpiredTokenException";
|
|
||||||
$fault = "client";
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "ExpiredTokenException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, ExpiredTokenException.prototype);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
class MalformedPolicyDocumentException extends STSServiceException {
|
|
||||||
name = "MalformedPolicyDocumentException";
|
|
||||||
$fault = "client";
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "MalformedPolicyDocumentException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, MalformedPolicyDocumentException.prototype);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
class PackedPolicyTooLargeException extends STSServiceException {
|
|
||||||
name = "PackedPolicyTooLargeException";
|
|
||||||
$fault = "client";
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "PackedPolicyTooLargeException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, PackedPolicyTooLargeException.prototype);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
class RegionDisabledException extends STSServiceException {
|
|
||||||
name = "RegionDisabledException";
|
|
||||||
$fault = "client";
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "RegionDisabledException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, RegionDisabledException.prototype);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
class IDPRejectedClaimException extends STSServiceException {
|
|
||||||
name = "IDPRejectedClaimException";
|
|
||||||
$fault = "client";
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "IDPRejectedClaimException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, IDPRejectedClaimException.prototype);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
class InvalidIdentityTokenException extends STSServiceException {
|
|
||||||
name = "InvalidIdentityTokenException";
|
|
||||||
$fault = "client";
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "InvalidIdentityTokenException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, InvalidIdentityTokenException.prototype);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
class IDPCommunicationErrorException extends STSServiceException {
|
|
||||||
name = "IDPCommunicationErrorException";
|
|
||||||
$fault = "client";
|
|
||||||
constructor(opts) {
|
|
||||||
super({
|
|
||||||
name: "IDPCommunicationErrorException",
|
|
||||||
$fault: "client",
|
|
||||||
...opts,
|
|
||||||
});
|
|
||||||
Object.setPrototypeOf(this, IDPCommunicationErrorException.prototype);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
const _A = "Arn";
|
|
||||||
const _AKI = "AccessKeyId";
|
|
||||||
const _AR = "AssumeRole";
|
|
||||||
const _ARI = "AssumedRoleId";
|
|
||||||
const _ARR = "AssumeRoleRequest";
|
|
||||||
const _ARRs = "AssumeRoleResponse";
|
|
||||||
const _ARU = "AssumedRoleUser";
|
|
||||||
const _ARWWI = "AssumeRoleWithWebIdentity";
|
|
||||||
const _ARWWIR = "AssumeRoleWithWebIdentityRequest";
|
|
||||||
const _ARWWIRs = "AssumeRoleWithWebIdentityResponse";
|
|
||||||
const _Au = "Audience";
|
|
||||||
const _C = "Credentials";
|
|
||||||
const _CA = "ContextAssertion";
|
|
||||||
const _DS = "DurationSeconds";
|
|
||||||
const _E = "Expiration";
|
|
||||||
const _EI = "ExternalId";
|
|
||||||
const _ETE = "ExpiredTokenException";
|
|
||||||
const _IDPCEE = "IDPCommunicationErrorException";
|
|
||||||
const _IDPRCE = "IDPRejectedClaimException";
|
|
||||||
const _IITE = "InvalidIdentityTokenException";
|
|
||||||
const _K = "Key";
|
|
||||||
const _MPDE = "MalformedPolicyDocumentException";
|
|
||||||
const _P = "Policy";
|
|
||||||
const _PA = "PolicyArns";
|
|
||||||
const _PAr = "ProviderArn";
|
|
||||||
const _PC = "ProvidedContexts";
|
|
||||||
const _PCLT = "ProvidedContextsListType";
|
|
||||||
const _PCr = "ProvidedContext";
|
|
||||||
const _PDT = "PolicyDescriptorType";
|
|
||||||
const _PI = "ProviderId";
|
|
||||||
const _PPS = "PackedPolicySize";
|
|
||||||
const _PPTLE = "PackedPolicyTooLargeException";
|
|
||||||
const _Pr = "Provider";
|
|
||||||
const _RA = "RoleArn";
|
|
||||||
const _RDE = "RegionDisabledException";
|
|
||||||
const _RSN = "RoleSessionName";
|
|
||||||
const _SAK = "SecretAccessKey";
|
|
||||||
const _SFWIT = "SubjectFromWebIdentityToken";
|
|
||||||
const _SI = "SourceIdentity";
|
|
||||||
const _SN = "SerialNumber";
|
|
||||||
const _ST = "SessionToken";
|
|
||||||
const _T = "Tags";
|
|
||||||
const _TC = "TokenCode";
|
|
||||||
const _TTK = "TransitiveTagKeys";
|
|
||||||
const _Ta = "Tag";
|
|
||||||
const _V = "Value";
|
|
||||||
const _WIT = "WebIdentityToken";
|
|
||||||
const _a = "arn";
|
|
||||||
const _aKST = "accessKeySecretType";
|
|
||||||
const _aQE = "awsQueryError";
|
|
||||||
const _c = "client";
|
|
||||||
const _cTT = "clientTokenType";
|
|
||||||
const _e = "error";
|
|
||||||
const _hE = "httpError";
|
|
||||||
const _m = "message";
|
|
||||||
const _pDLT = "policyDescriptorListType";
|
|
||||||
const _s = "smithy.ts.sdk.synthetic.com.amazonaws.sts";
|
|
||||||
const _tLT = "tagListType";
|
|
||||||
const n0 = "com.amazonaws.sts";
|
|
||||||
var accessKeySecretType = [0, n0, _aKST, 8, 0];
|
|
||||||
var clientTokenType = [0, n0, _cTT, 8, 0];
|
|
||||||
var AssumedRoleUser$ = [3, n0, _ARU, 0, [_ARI, _A], [0, 0], 2];
|
|
||||||
var AssumeRoleRequest$ = [
|
|
||||||
3,
|
|
||||||
n0,
|
|
||||||
_ARR,
|
|
||||||
0,
|
|
||||||
[_RA, _RSN, _PA, _P, _DS, _T, _TTK, _EI, _SN, _TC, _SI, _PC],
|
|
||||||
[0, 0, () => policyDescriptorListType, 0, 1, () => tagListType, 64 | 0, 0, 0, 0, 0, () => ProvidedContextsListType],
|
|
||||||
2,
|
|
||||||
];
|
|
||||||
var AssumeRoleResponse$ = [
|
|
||||||
3,
|
|
||||||
n0,
|
|
||||||
_ARRs,
|
|
||||||
0,
|
|
||||||
[_C, _ARU, _PPS, _SI],
|
|
||||||
[[() => Credentials$, 0], () => AssumedRoleUser$, 1, 0],
|
|
||||||
];
|
|
||||||
var AssumeRoleWithWebIdentityRequest$ = [
|
|
||||||
3,
|
|
||||||
n0,
|
|
||||||
_ARWWIR,
|
|
||||||
0,
|
|
||||||
[_RA, _RSN, _WIT, _PI, _PA, _P, _DS],
|
|
||||||
[0, 0, [() => clientTokenType, 0], 0, () => policyDescriptorListType, 0, 1],
|
|
||||||
3,
|
|
||||||
];
|
|
||||||
var AssumeRoleWithWebIdentityResponse$ = [
|
|
||||||
3,
|
|
||||||
n0,
|
|
||||||
_ARWWIRs,
|
|
||||||
0,
|
|
||||||
[_C, _SFWIT, _ARU, _PPS, _Pr, _Au, _SI],
|
|
||||||
[[() => Credentials$, 0], 0, () => AssumedRoleUser$, 1, 0, 0, 0],
|
|
||||||
];
|
|
||||||
var Credentials$ = [
|
|
||||||
3,
|
|
||||||
n0,
|
|
||||||
_C,
|
|
||||||
0,
|
|
||||||
[_AKI, _SAK, _ST, _E],
|
|
||||||
[0, [() => accessKeySecretType, 0], 0, 4],
|
|
||||||
4,
|
|
||||||
];
|
|
||||||
var ExpiredTokenException$ = [
|
|
||||||
-3,
|
|
||||||
n0,
|
|
||||||
_ETE,
|
|
||||||
{ [_aQE]: [`ExpiredTokenException`, 400], [_e]: _c, [_hE]: 400 },
|
|
||||||
[_m],
|
|
||||||
[0],
|
|
||||||
];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(ExpiredTokenException$, ExpiredTokenException);
|
|
||||||
var IDPCommunicationErrorException$ = [
|
|
||||||
-3,
|
|
||||||
n0,
|
|
||||||
_IDPCEE,
|
|
||||||
{ [_aQE]: [`IDPCommunicationError`, 400], [_e]: _c, [_hE]: 400 },
|
|
||||||
[_m],
|
|
||||||
[0],
|
|
||||||
];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(IDPCommunicationErrorException$, IDPCommunicationErrorException);
|
|
||||||
var IDPRejectedClaimException$ = [
|
|
||||||
-3,
|
|
||||||
n0,
|
|
||||||
_IDPRCE,
|
|
||||||
{ [_aQE]: [`IDPRejectedClaim`, 403], [_e]: _c, [_hE]: 403 },
|
|
||||||
[_m],
|
|
||||||
[0],
|
|
||||||
];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(IDPRejectedClaimException$, IDPRejectedClaimException);
|
|
||||||
var InvalidIdentityTokenException$ = [
|
|
||||||
-3,
|
|
||||||
n0,
|
|
||||||
_IITE,
|
|
||||||
{ [_aQE]: [`InvalidIdentityToken`, 400], [_e]: _c, [_hE]: 400 },
|
|
||||||
[_m],
|
|
||||||
[0],
|
|
||||||
];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(InvalidIdentityTokenException$, InvalidIdentityTokenException);
|
|
||||||
var MalformedPolicyDocumentException$ = [
|
|
||||||
-3,
|
|
||||||
n0,
|
|
||||||
_MPDE,
|
|
||||||
{ [_aQE]: [`MalformedPolicyDocument`, 400], [_e]: _c, [_hE]: 400 },
|
|
||||||
[_m],
|
|
||||||
[0],
|
|
||||||
];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(MalformedPolicyDocumentException$, MalformedPolicyDocumentException);
|
|
||||||
var PackedPolicyTooLargeException$ = [
|
|
||||||
-3,
|
|
||||||
n0,
|
|
||||||
_PPTLE,
|
|
||||||
{ [_aQE]: [`PackedPolicyTooLarge`, 400], [_e]: _c, [_hE]: 400 },
|
|
||||||
[_m],
|
|
||||||
[0],
|
|
||||||
];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(PackedPolicyTooLargeException$, PackedPolicyTooLargeException);
|
|
||||||
var PolicyDescriptorType$ = [3, n0, _PDT, 0, [_a], [0]];
|
|
||||||
var ProvidedContext$ = [3, n0, _PCr, 0, [_PAr, _CA], [0, 0]];
|
|
||||||
var RegionDisabledException$ = [
|
|
||||||
-3,
|
|
||||||
n0,
|
|
||||||
_RDE,
|
|
||||||
{ [_aQE]: [`RegionDisabledException`, 403], [_e]: _c, [_hE]: 403 },
|
|
||||||
[_m],
|
|
||||||
[0],
|
|
||||||
];
|
|
||||||
schema.TypeRegistry.for(n0).registerError(RegionDisabledException$, RegionDisabledException);
|
|
||||||
var Tag$ = [3, n0, _Ta, 0, [_K, _V], [0, 0], 2];
|
|
||||||
var STSServiceException$ = [-3, _s, "STSServiceException", 0, [], []];
|
|
||||||
schema.TypeRegistry.for(_s).registerError(STSServiceException$, STSServiceException);
|
|
||||||
var policyDescriptorListType = [1, n0, _pDLT, 0, () => PolicyDescriptorType$];
|
|
||||||
var ProvidedContextsListType = [1, n0, _PCLT, 0, () => ProvidedContext$];
|
|
||||||
var tagListType = [1, n0, _tLT, 0, () => Tag$];
|
|
||||||
var AssumeRole$ = [9, n0, _AR, 0, () => AssumeRoleRequest$, () => AssumeRoleResponse$];
|
|
||||||
var AssumeRoleWithWebIdentity$ = [
|
|
||||||
9,
|
|
||||||
n0,
|
|
||||||
_ARWWI,
|
|
||||||
0,
|
|
||||||
() => AssumeRoleWithWebIdentityRequest$,
|
|
||||||
() => AssumeRoleWithWebIdentityResponse$,
|
|
||||||
];
|
|
||||||
|
|
||||||
class AssumeRoleCommand extends smithyClient.Command
|
|
||||||
.classBuilder()
|
|
||||||
.ep(EndpointParameters.commonParams)
|
|
||||||
.m(function (Command, cs, config, o) {
|
|
||||||
return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
|
|
||||||
})
|
|
||||||
.s("AWSSecurityTokenServiceV20110615", "AssumeRole", {})
|
|
||||||
.n("STSClient", "AssumeRoleCommand")
|
|
||||||
.sc(AssumeRole$)
|
|
||||||
.build() {
|
|
||||||
}
|
|
||||||
|
|
||||||
class AssumeRoleWithWebIdentityCommand extends smithyClient.Command
|
|
||||||
.classBuilder()
|
|
||||||
.ep(EndpointParameters.commonParams)
|
|
||||||
.m(function (Command, cs, config, o) {
|
|
||||||
return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
|
|
||||||
})
|
|
||||||
.s("AWSSecurityTokenServiceV20110615", "AssumeRoleWithWebIdentity", {})
|
|
||||||
.n("STSClient", "AssumeRoleWithWebIdentityCommand")
|
|
||||||
.sc(AssumeRoleWithWebIdentity$)
|
|
||||||
.build() {
|
|
||||||
}
|
|
||||||
|
|
||||||
const commands = {
|
|
||||||
AssumeRoleCommand,
|
|
||||||
AssumeRoleWithWebIdentityCommand,
|
|
||||||
};
|
|
||||||
class STS extends STSClient.STSClient {
|
|
||||||
}
|
|
||||||
smithyClient.createAggregatedClient(commands, STS);
|
|
||||||
|
|
||||||
const getAccountIdFromAssumedRoleUser = (assumedRoleUser) => {
|
|
||||||
if (typeof assumedRoleUser?.Arn === "string") {
|
|
||||||
const arnComponents = assumedRoleUser.Arn.split(":");
|
|
||||||
if (arnComponents.length > 4 && arnComponents[4] !== "") {
|
|
||||||
return arnComponents[4];
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return undefined;
|
|
||||||
};
|
|
||||||
const resolveRegion = async (_region, _parentRegion, credentialProviderLogger, loaderConfig = {}) => {
|
|
||||||
const region = typeof _region === "function" ? await _region() : _region;
|
|
||||||
const parentRegion = typeof _parentRegion === "function" ? await _parentRegion() : _parentRegion;
|
|
||||||
let stsDefaultRegion = "";
|
|
||||||
const resolvedRegion = region ?? parentRegion ?? (stsDefaultRegion = await regionConfigResolver.stsRegionDefaultResolver(loaderConfig)());
|
|
||||||
credentialProviderLogger?.debug?.("@aws-sdk/client-sts::resolveRegion", "accepting first of:", `${region} (credential provider clientConfig)`, `${parentRegion} (contextual client)`, `${stsDefaultRegion} (STS default: AWS_REGION, profile region, or us-east-1)`);
|
|
||||||
return resolvedRegion;
|
|
||||||
};
|
|
||||||
const getDefaultRoleAssumer$1 = (stsOptions, STSClient) => {
|
|
||||||
let stsClient;
|
|
||||||
let closureSourceCreds;
|
|
||||||
return async (sourceCreds, params) => {
|
|
||||||
closureSourceCreds = sourceCreds;
|
|
||||||
if (!stsClient) {
|
|
||||||
const { logger = stsOptions?.parentClientConfig?.logger, profile = stsOptions?.parentClientConfig?.profile, region, requestHandler = stsOptions?.parentClientConfig?.requestHandler, credentialProviderLogger, userAgentAppId = stsOptions?.parentClientConfig?.userAgentAppId, } = stsOptions;
|
|
||||||
const resolvedRegion = await resolveRegion(region, stsOptions?.parentClientConfig?.region, credentialProviderLogger, {
|
|
||||||
logger,
|
|
||||||
profile,
|
|
||||||
});
|
|
||||||
const isCompatibleRequestHandler = !isH2(requestHandler);
|
|
||||||
stsClient = new STSClient({
|
|
||||||
...stsOptions,
|
|
||||||
userAgentAppId,
|
|
||||||
profile,
|
|
||||||
credentialDefaultProvider: () => async () => closureSourceCreds,
|
|
||||||
region: resolvedRegion,
|
|
||||||
requestHandler: isCompatibleRequestHandler ? requestHandler : undefined,
|
|
||||||
logger: logger,
|
|
||||||
});
|
|
||||||
}
|
|
||||||
const { Credentials, AssumedRoleUser } = await stsClient.send(new AssumeRoleCommand(params));
|
|
||||||
if (!Credentials || !Credentials.AccessKeyId || !Credentials.SecretAccessKey) {
|
|
||||||
throw new Error(`Invalid response from STS.assumeRole call with role ${params.RoleArn}`);
|
|
||||||
}
|
|
||||||
const accountId = getAccountIdFromAssumedRoleUser(AssumedRoleUser);
|
|
||||||
const credentials = {
|
|
||||||
accessKeyId: Credentials.AccessKeyId,
|
|
||||||
secretAccessKey: Credentials.SecretAccessKey,
|
|
||||||
sessionToken: Credentials.SessionToken,
|
|
||||||
expiration: Credentials.Expiration,
|
|
||||||
...(Credentials.CredentialScope && { credentialScope: Credentials.CredentialScope }),
|
|
||||||
...(accountId && { accountId }),
|
|
||||||
};
|
|
||||||
client.setCredentialFeature(credentials, "CREDENTIALS_STS_ASSUME_ROLE", "i");
|
|
||||||
return credentials;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
const getDefaultRoleAssumerWithWebIdentity$1 = (stsOptions, STSClient) => {
|
|
||||||
let stsClient;
|
|
||||||
return async (params) => {
|
|
||||||
if (!stsClient) {
|
|
||||||
const { logger = stsOptions?.parentClientConfig?.logger, profile = stsOptions?.parentClientConfig?.profile, region, requestHandler = stsOptions?.parentClientConfig?.requestHandler, credentialProviderLogger, userAgentAppId = stsOptions?.parentClientConfig?.userAgentAppId, } = stsOptions;
|
|
||||||
const resolvedRegion = await resolveRegion(region, stsOptions?.parentClientConfig?.region, credentialProviderLogger, {
|
|
||||||
logger,
|
|
||||||
profile,
|
|
||||||
});
|
|
||||||
const isCompatibleRequestHandler = !isH2(requestHandler);
|
|
||||||
stsClient = new STSClient({
|
|
||||||
...stsOptions,
|
|
||||||
userAgentAppId,
|
|
||||||
profile,
|
|
||||||
region: resolvedRegion,
|
|
||||||
requestHandler: isCompatibleRequestHandler ? requestHandler : undefined,
|
|
||||||
logger: logger,
|
|
||||||
});
|
|
||||||
}
|
|
||||||
const { Credentials, AssumedRoleUser } = await stsClient.send(new AssumeRoleWithWebIdentityCommand(params));
|
|
||||||
if (!Credentials || !Credentials.AccessKeyId || !Credentials.SecretAccessKey) {
|
|
||||||
throw new Error(`Invalid response from STS.assumeRoleWithWebIdentity call with role ${params.RoleArn}`);
|
|
||||||
}
|
|
||||||
const accountId = getAccountIdFromAssumedRoleUser(AssumedRoleUser);
|
|
||||||
const credentials = {
|
|
||||||
accessKeyId: Credentials.AccessKeyId,
|
|
||||||
secretAccessKey: Credentials.SecretAccessKey,
|
|
||||||
sessionToken: Credentials.SessionToken,
|
|
||||||
expiration: Credentials.Expiration,
|
|
||||||
...(Credentials.CredentialScope && { credentialScope: Credentials.CredentialScope }),
|
|
||||||
...(accountId && { accountId }),
|
|
||||||
};
|
|
||||||
if (accountId) {
|
|
||||||
client.setCredentialFeature(credentials, "RESOLVED_ACCOUNT_ID", "T");
|
|
||||||
}
|
|
||||||
client.setCredentialFeature(credentials, "CREDENTIALS_STS_ASSUME_ROLE_WEB_ID", "k");
|
|
||||||
return credentials;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
const isH2 = (requestHandler) => {
|
|
||||||
return requestHandler?.metadata?.handlerProtocol === "h2";
|
|
||||||
};
|
|
||||||
|
|
||||||
const getCustomizableStsClientCtor = (baseCtor, customizations) => {
|
|
||||||
if (!customizations)
|
|
||||||
return baseCtor;
|
|
||||||
else
|
|
||||||
return class CustomizableSTSClient extends baseCtor {
|
|
||||||
constructor(config) {
|
|
||||||
super(config);
|
|
||||||
for (const customization of customizations) {
|
|
||||||
this.middlewareStack.use(customization);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
};
|
|
||||||
};
|
|
||||||
const getDefaultRoleAssumer = (stsOptions = {}, stsPlugins) => getDefaultRoleAssumer$1(stsOptions, getCustomizableStsClientCtor(STSClient.STSClient, stsPlugins));
|
|
||||||
const getDefaultRoleAssumerWithWebIdentity = (stsOptions = {}, stsPlugins) => getDefaultRoleAssumerWithWebIdentity$1(stsOptions, getCustomizableStsClientCtor(STSClient.STSClient, stsPlugins));
|
|
||||||
const decorateDefaultCredentialProvider = (provider) => (input) => provider({
|
|
||||||
roleAssumer: getDefaultRoleAssumer(input),
|
|
||||||
roleAssumerWithWebIdentity: getDefaultRoleAssumerWithWebIdentity(input),
|
|
||||||
...input,
|
|
||||||
});
|
|
||||||
|
|
||||||
Object.defineProperty(exports, "$Command", ({
|
|
||||||
enumerable: true,
|
|
||||||
get: function () { return smithyClient.Command; }
|
|
||||||
}));
|
|
||||||
exports.AssumeRole$ = AssumeRole$;
|
|
||||||
exports.AssumeRoleCommand = AssumeRoleCommand;
|
|
||||||
exports.AssumeRoleRequest$ = AssumeRoleRequest$;
|
|
||||||
exports.AssumeRoleResponse$ = AssumeRoleResponse$;
|
|
||||||
exports.AssumeRoleWithWebIdentity$ = AssumeRoleWithWebIdentity$;
|
|
||||||
exports.AssumeRoleWithWebIdentityCommand = AssumeRoleWithWebIdentityCommand;
|
|
||||||
exports.AssumeRoleWithWebIdentityRequest$ = AssumeRoleWithWebIdentityRequest$;
|
|
||||||
exports.AssumeRoleWithWebIdentityResponse$ = AssumeRoleWithWebIdentityResponse$;
|
|
||||||
exports.AssumedRoleUser$ = AssumedRoleUser$;
|
|
||||||
exports.Credentials$ = Credentials$;
|
|
||||||
exports.ExpiredTokenException = ExpiredTokenException;
|
|
||||||
exports.ExpiredTokenException$ = ExpiredTokenException$;
|
|
||||||
exports.IDPCommunicationErrorException = IDPCommunicationErrorException;
|
|
||||||
exports.IDPCommunicationErrorException$ = IDPCommunicationErrorException$;
|
|
||||||
exports.IDPRejectedClaimException = IDPRejectedClaimException;
|
|
||||||
exports.IDPRejectedClaimException$ = IDPRejectedClaimException$;
|
|
||||||
exports.InvalidIdentityTokenException = InvalidIdentityTokenException;
|
|
||||||
exports.InvalidIdentityTokenException$ = InvalidIdentityTokenException$;
|
|
||||||
exports.MalformedPolicyDocumentException = MalformedPolicyDocumentException;
|
|
||||||
exports.MalformedPolicyDocumentException$ = MalformedPolicyDocumentException$;
|
|
||||||
exports.PackedPolicyTooLargeException = PackedPolicyTooLargeException;
|
|
||||||
exports.PackedPolicyTooLargeException$ = PackedPolicyTooLargeException$;
|
|
||||||
exports.PolicyDescriptorType$ = PolicyDescriptorType$;
|
|
||||||
exports.ProvidedContext$ = ProvidedContext$;
|
|
||||||
exports.RegionDisabledException = RegionDisabledException;
|
|
||||||
exports.RegionDisabledException$ = RegionDisabledException$;
|
|
||||||
exports.STS = STS;
|
|
||||||
exports.STSServiceException = STSServiceException;
|
|
||||||
exports.STSServiceException$ = STSServiceException$;
|
|
||||||
exports.Tag$ = Tag$;
|
|
||||||
exports.decorateDefaultCredentialProvider = decorateDefaultCredentialProvider;
|
|
||||||
exports.getDefaultRoleAssumer = getDefaultRoleAssumer;
|
|
||||||
exports.getDefaultRoleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity;
|
|
||||||
Object.keys(STSClient).forEach(function (k) {
|
|
||||||
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) Object.defineProperty(exports, k, {
|
|
||||||
enumerable: true,
|
|
||||||
get: function () { return STSClient[k]; }
|
|
||||||
});
|
|
||||||
});
|
|
||||||
|
|
||||||
|
|
||||||
/***/ }),
|
|
||||||
|
|
||||||
/***/ 6578:
|
|
||||||
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
||||||
|
|
||||||
|
|
||||||
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
||||||
exports.getRuntimeConfig = void 0;
|
|
||||||
const tslib_1 = __webpack_require__(1860);
|
|
||||||
const package_json_1 = tslib_1.__importDefault(__webpack_require__(9955));
|
|
||||||
const core_1 = __webpack_require__(8704);
|
|
||||||
const util_user_agent_node_1 = __webpack_require__(1656);
|
|
||||||
const config_resolver_1 = __webpack_require__(9316);
|
|
||||||
const core_2 = __webpack_require__(402);
|
|
||||||
const hash_node_1 = __webpack_require__(2711);
|
|
||||||
const middleware_retry_1 = __webpack_require__(9618);
|
|
||||||
const node_config_provider_1 = __webpack_require__(5704);
|
|
||||||
const node_http_handler_1 = __webpack_require__(1279);
|
|
||||||
const smithy_client_1 = __webpack_require__(1411);
|
|
||||||
const util_body_length_node_1 = __webpack_require__(3638);
|
|
||||||
const util_defaults_mode_node_1 = __webpack_require__(673);
|
|
||||||
const util_retry_1 = __webpack_require__(5518);
|
|
||||||
const runtimeConfig_shared_1 = __webpack_require__(4443);
|
|
||||||
const getRuntimeConfig = (config) => {
|
|
||||||
(0, smithy_client_1.emitWarningIfUnsupportedVersion)(process.version);
|
|
||||||
const defaultsMode = (0, util_defaults_mode_node_1.resolveDefaultsModeConfig)(config);
|
|
||||||
const defaultConfigProvider = () => defaultsMode().then(smithy_client_1.loadConfigsForDefaultMode);
|
|
||||||
const clientSharedValues = (0, runtimeConfig_shared_1.getRuntimeConfig)(config);
|
|
||||||
(0, core_1.emitWarningIfUnsupportedVersion)(process.version);
|
|
||||||
const loaderConfig = {
|
|
||||||
profile: config?.profile,
|
|
||||||
logger: clientSharedValues.logger,
|
|
||||||
};
|
|
||||||
return {
|
|
||||||
...clientSharedValues,
|
|
||||||
...config,
|
|
||||||
runtime: "node",
|
|
||||||
defaultsMode,
|
|
||||||
authSchemePreference: config?.authSchemePreference ?? (0, node_config_provider_1.loadConfig)(core_1.NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, loaderConfig),
|
|
||||||
bodyLengthChecker: config?.bodyLengthChecker ?? util_body_length_node_1.calculateBodyLength,
|
|
||||||
defaultUserAgentProvider: config?.defaultUserAgentProvider ??
|
|
||||||
(0, util_user_agent_node_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
|
|
||||||
httpAuthSchemes: config?.httpAuthSchemes ?? [
|
|
||||||
{
|
|
||||||
schemeId: "aws.auth#sigv4",
|
|
||||||
identityProvider: (ipc) => ipc.getIdentityProvider("aws.auth#sigv4") ||
|
|
||||||
(async (idProps) => await config.credentialDefaultProvider(idProps?.__config || {})()),
|
|
||||||
signer: new core_1.AwsSdkSigV4Signer(),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
schemeId: "smithy.api#noAuth",
|
|
||||||
identityProvider: (ipc) => ipc.getIdentityProvider("smithy.api#noAuth") || (async () => ({})),
|
|
||||||
signer: new core_2.NoAuthSigner(),
|
|
||||||
},
|
|
||||||
],
|
|
||||||
maxAttempts: config?.maxAttempts ?? (0, node_config_provider_1.loadConfig)(middleware_retry_1.NODE_MAX_ATTEMPT_CONFIG_OPTIONS, config),
|
|
||||||
region: config?.region ??
|
|
||||||
(0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_REGION_CONFIG_OPTIONS, { ...config_resolver_1.NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
|
|
||||||
requestHandler: node_http_handler_1.NodeHttpHandler.create(config?.requestHandler ?? defaultConfigProvider),
|
|
||||||
retryMode: config?.retryMode ??
|
|
||||||
(0, node_config_provider_1.loadConfig)({
|
|
||||||
...middleware_retry_1.NODE_RETRY_MODE_CONFIG_OPTIONS,
|
|
||||||
default: async () => (await defaultConfigProvider()).retryMode || util_retry_1.DEFAULT_RETRY_MODE,
|
|
||||||
}, config),
|
|
||||||
sha256: config?.sha256 ?? hash_node_1.Hash.bind(null, "sha256"),
|
|
||||||
streamCollector: config?.streamCollector ?? node_http_handler_1.streamCollector,
|
|
||||||
useDualstackEndpoint: config?.useDualstackEndpoint ?? (0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS, loaderConfig),
|
|
||||||
useFipsEndpoint: config?.useFipsEndpoint ?? (0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS, loaderConfig),
|
|
||||||
userAgentAppId: config?.userAgentAppId ?? (0, node_config_provider_1.loadConfig)(util_user_agent_node_1.NODE_APP_ID_CONFIG_OPTIONS, loaderConfig),
|
|
||||||
};
|
|
||||||
};
|
|
||||||
exports.getRuntimeConfig = getRuntimeConfig;
|
|
||||||
|
|
||||||
|
|
||||||
/***/ }),
|
|
||||||
|
|
||||||
/***/ 4443:
|
|
||||||
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
||||||
|
|
||||||
|
|
||||||
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
||||||
exports.getRuntimeConfig = void 0;
|
|
||||||
const core_1 = __webpack_require__(8704);
|
|
||||||
const protocols_1 = __webpack_require__(7288);
|
|
||||||
const core_2 = __webpack_require__(402);
|
|
||||||
const smithy_client_1 = __webpack_require__(1411);
|
|
||||||
const url_parser_1 = __webpack_require__(4494);
|
|
||||||
const util_base64_1 = __webpack_require__(8385);
|
|
||||||
const util_utf8_1 = __webpack_require__(1577);
|
|
||||||
const httpAuthSchemeProvider_1 = __webpack_require__(7851);
|
|
||||||
const endpointResolver_1 = __webpack_require__(9765);
|
|
||||||
const getRuntimeConfig = (config) => {
|
|
||||||
return {
|
|
||||||
apiVersion: "2011-06-15",
|
|
||||||
base64Decoder: config?.base64Decoder ?? util_base64_1.fromBase64,
|
|
||||||
base64Encoder: config?.base64Encoder ?? util_base64_1.toBase64,
|
|
||||||
disableHostPrefix: config?.disableHostPrefix ?? false,
|
|
||||||
endpointProvider: config?.endpointProvider ?? endpointResolver_1.defaultEndpointResolver,
|
|
||||||
extensions: config?.extensions ?? [],
|
|
||||||
httpAuthSchemeProvider: config?.httpAuthSchemeProvider ?? httpAuthSchemeProvider_1.defaultSTSHttpAuthSchemeProvider,
|
|
||||||
httpAuthSchemes: config?.httpAuthSchemes ?? [
|
|
||||||
{
|
|
||||||
schemeId: "aws.auth#sigv4",
|
|
||||||
identityProvider: (ipc) => ipc.getIdentityProvider("aws.auth#sigv4"),
|
|
||||||
signer: new core_1.AwsSdkSigV4Signer(),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
schemeId: "smithy.api#noAuth",
|
|
||||||
identityProvider: (ipc) => ipc.getIdentityProvider("smithy.api#noAuth") || (async () => ({})),
|
|
||||||
signer: new core_2.NoAuthSigner(),
|
|
||||||
},
|
|
||||||
],
|
|
||||||
logger: config?.logger ?? new smithy_client_1.NoOpLogger(),
|
|
||||||
protocol: config?.protocol ?? protocols_1.AwsQueryProtocol,
|
|
||||||
protocolSettings: config?.protocolSettings ?? {
|
|
||||||
defaultNamespace: "com.amazonaws.sts",
|
|
||||||
xmlNamespace: "https://sts.amazonaws.com/doc/2011-06-15/",
|
|
||||||
version: "2011-06-15",
|
|
||||||
serviceTarget: "AWSSecurityTokenServiceV20110615",
|
|
||||||
},
|
|
||||||
serviceId: config?.serviceId ?? "STS",
|
|
||||||
urlParser: config?.urlParser ?? url_parser_1.parseUrl,
|
|
||||||
utf8Decoder: config?.utf8Decoder ?? util_utf8_1.fromUtf8,
|
|
||||||
utf8Encoder: config?.utf8Encoder ?? util_utf8_1.toUtf8,
|
|
||||||
};
|
|
||||||
};
|
|
||||||
exports.getRuntimeConfig = getRuntimeConfig;
|
|
||||||
|
|
||||||
|
|
||||||
/***/ }),
|
|
||||||
|
|
||||||
/***/ 7742:
|
|
||||||
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
||||||
|
|
||||||
|
|
||||||
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
||||||
exports.resolveRuntimeExtensions = void 0;
|
|
||||||
const region_config_resolver_1 = __webpack_require__(6463);
|
|
||||||
const protocol_http_1 = __webpack_require__(2356);
|
|
||||||
const smithy_client_1 = __webpack_require__(1411);
|
|
||||||
const httpAuthExtensionConfiguration_1 = __webpack_require__(4532);
|
|
||||||
const resolveRuntimeExtensions = (runtimeConfig, extensions) => {
|
|
||||||
const extensionConfiguration = Object.assign((0, region_config_resolver_1.getAwsRegionExtensionConfiguration)(runtimeConfig), (0, smithy_client_1.getDefaultExtensionConfiguration)(runtimeConfig), (0, protocol_http_1.getHttpHandlerExtensionConfiguration)(runtimeConfig), (0, httpAuthExtensionConfiguration_1.getHttpAuthExtensionConfiguration)(runtimeConfig));
|
|
||||||
extensions.forEach((extension) => extension.configure(extensionConfiguration));
|
|
||||||
return Object.assign(runtimeConfig, (0, region_config_resolver_1.resolveAwsRegionExtensionConfiguration)(extensionConfiguration), (0, smithy_client_1.resolveDefaultRuntimeConfig)(extensionConfiguration), (0, protocol_http_1.resolveHttpHandlerRuntimeConfig)(extensionConfiguration), (0, httpAuthExtensionConfiguration_1.resolveHttpAuthRuntimeConfig)(extensionConfiguration));
|
|
||||||
};
|
|
||||||
exports.resolveRuntimeExtensions = resolveRuntimeExtensions;
|
|
||||||
|
|
||||||
|
|
||||||
/***/ }),
|
|
||||||
|
|
||||||
/***/ 9955:
|
|
||||||
/***/ ((module) => {
|
|
||||||
|
|
||||||
module.exports = /*#__PURE__*/JSON.parse('{"name":"@aws-sdk/nested-clients","version":"3.975.0","description":"Nested clients for AWS SDK packages.","main":"./dist-cjs/index.js","module":"./dist-es/index.js","types":"./dist-types/index.d.ts","scripts":{"build":"yarn lint && concurrently \'yarn:build:types\' \'yarn:build:es\' && yarn build:cjs","build:cjs":"node ../../scripts/compilation/inline nested-clients","build:es":"tsc -p tsconfig.es.json","build:include:deps":"yarn g:turbo run build -F=\\"$npm_package_name\\"","build:types":"tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4","clean":"premove dist-cjs dist-es dist-types tsconfig.cjs.tsbuildinfo tsconfig.es.tsbuildinfo tsconfig.types.tsbuildinfo","lint":"node ../../scripts/validation/submodules-linter.js --pkg nested-clients","test":"yarn g:vitest run","test:watch":"yarn g:vitest watch"},"engines":{"node":">=20.0.0"},"sideEffects":false,"author":{"name":"AWS SDK for JavaScript Team","url":"https://aws.amazon.com/javascript/"},"license":"Apache-2.0","dependencies":{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"^3.973.1","@aws-sdk/middleware-host-header":"^3.972.1","@aws-sdk/middleware-logger":"^3.972.1","@aws-sdk/middleware-recursion-detection":"^3.972.1","@aws-sdk/middleware-user-agent":"^3.972.2","@aws-sdk/region-config-resolver":"^3.972.1","@aws-sdk/types":"^3.973.0","@aws-sdk/util-endpoints":"3.972.0","@aws-sdk/util-user-agent-browser":"^3.972.1","@aws-sdk/util-user-agent-node":"^3.972.1","@smithy/config-resolver":"^4.4.6","@smithy/core":"^3.21.1","@smithy/fetch-http-handler":"^5.3.9","@smithy/hash-node":"^4.2.8","@smithy/invalid-dependency":"^4.2.8","@smithy/middleware-content-length":"^4.2.8","@smithy/middleware-endpoint":"^4.4.11","@smithy/middleware-retry":"^4.4.27","@smithy/middleware-serde":"^4.2.9","@smithy/middleware-stack":"^4.2.8","@smithy/node-config-provider":"^4.3.8","@smithy/node-http-handler":"^4.4.8","@smithy/protocol-http":"^5.3.8","@smithy/smithy-client":"^4.10.12","@smithy/types":"^4.12.0","@smithy/url-parser":"^4.2.8","@smithy/util-base64":"^4.3.0","@smithy/util-body-length-browser":"^4.2.0","@smithy/util-body-length-node":"^4.2.1","@smithy/util-defaults-mode-browser":"^4.3.26","@smithy/util-defaults-mode-node":"^4.2.29","@smithy/util-endpoints":"^3.2.8","@smithy/util-middleware":"^4.2.8","@smithy/util-retry":"^4.2.8","@smithy/util-utf8":"^4.2.0","tslib":"^2.6.2"},"devDependencies":{"concurrently":"7.0.0","downlevel-dts":"0.10.1","premove":"4.0.0","typescript":"~5.8.3"},"typesVersions":{"<4.0":{"dist-types/*":["dist-types/ts3.4/*"]}},"files":["./signin.d.ts","./signin.js","./sso-oidc.d.ts","./sso-oidc.js","./sts.d.ts","./sts.js","dist-*/**"],"browser":{"./dist-es/submodules/signin/runtimeConfig":"./dist-es/submodules/signin/runtimeConfig.browser","./dist-es/submodules/sso-oidc/runtimeConfig":"./dist-es/submodules/sso-oidc/runtimeConfig.browser","./dist-es/submodules/sts/runtimeConfig":"./dist-es/submodules/sts/runtimeConfig.browser"},"react-native":{},"homepage":"https://github.com/aws/aws-sdk-js-v3/tree/main/packages/nested-clients","repository":{"type":"git","url":"https://github.com/aws/aws-sdk-js-v3.git","directory":"packages/nested-clients"},"exports":{"./package.json":"./package.json","./sso-oidc":{"types":"./dist-types/submodules/sso-oidc/index.d.ts","module":"./dist-es/submodules/sso-oidc/index.js","node":"./dist-cjs/submodules/sso-oidc/index.js","import":"./dist-es/submodules/sso-oidc/index.js","require":"./dist-cjs/submodules/sso-oidc/index.js"},"./sts":{"types":"./dist-types/submodules/sts/index.d.ts","module":"./dist-es/submodules/sts/index.js","node":"./dist-cjs/submodules/sts/index.js","import":"./dist-es/submodules/sts/index.js","require":"./dist-cjs/submodules/sts/index.js"},"./signin":{"types":"./dist-types/submodules/signin/index.d.ts","module":"./dist-es/submodules/signin/index.js","node":"./dist-cjs/submodules/signin/index.js","import":"./dist-es/submodules/signin/index.js","require":"./dist-cjs/submodules/signin/index.js"}}}');
|
|
||||||
|
|
||||||
/***/ })
|
/***/ })
|
||||||
|
|
||||||
};
|
};
|
||||||
|
|||||||
2
dist/956.index.js.map
generated
vendored
2
dist/956.index.js.map
generated
vendored
File diff suppressed because one or more lines are too long
1347
dist/998.index.js
generated
vendored
1347
dist/998.index.js
generated
vendored
File diff suppressed because it is too large
Load Diff
2
dist/998.index.js.map
generated
vendored
2
dist/998.index.js.map
generated
vendored
File diff suppressed because one or more lines are too long
14
dist/index.js
generated
vendored
14
dist/index.js
generated
vendored
File diff suppressed because one or more lines are too long
2
dist/index.js.map
generated
vendored
2
dist/index.js.map
generated
vendored
File diff suppressed because one or more lines are too long
205
dist/licenses.txt
generated
vendored
205
dist/licenses.txt
generated
vendored
@ -1,208 +1,3 @@
|
|||||||
@aws-sdk/client-sso
|
|
||||||
Apache-2.0
|
|
||||||
Apache License
|
|
||||||
Version 2.0, January 2004
|
|
||||||
http://www.apache.org/licenses/
|
|
||||||
|
|
||||||
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
|
|
||||||
|
|
||||||
1. Definitions.
|
|
||||||
|
|
||||||
"License" shall mean the terms and conditions for use, reproduction,
|
|
||||||
and distribution as defined by Sections 1 through 9 of this document.
|
|
||||||
|
|
||||||
"Licensor" shall mean the copyright owner or entity authorized by
|
|
||||||
the copyright owner that is granting the License.
|
|
||||||
|
|
||||||
"Legal Entity" shall mean the union of the acting entity and all
|
|
||||||
other entities that control, are controlled by, or are under common
|
|
||||||
control with that entity. For the purposes of this definition,
|
|
||||||
"control" means (i) the power, direct or indirect, to cause the
|
|
||||||
direction or management of such entity, whether by contract or
|
|
||||||
otherwise, or (ii) ownership of fifty percent (50%) or more of the
|
|
||||||
outstanding shares, or (iii) beneficial ownership of such entity.
|
|
||||||
|
|
||||||
"You" (or "Your") shall mean an individual or Legal Entity
|
|
||||||
exercising permissions granted by this License.
|
|
||||||
|
|
||||||
"Source" form shall mean the preferred form for making modifications,
|
|
||||||
including but not limited to software source code, documentation
|
|
||||||
source, and configuration files.
|
|
||||||
|
|
||||||
"Object" form shall mean any form resulting from mechanical
|
|
||||||
transformation or translation of a Source form, including but
|
|
||||||
not limited to compiled object code, generated documentation,
|
|
||||||
and conversions to other media types.
|
|
||||||
|
|
||||||
"Work" shall mean the work of authorship, whether in Source or
|
|
||||||
Object form, made available under the License, as indicated by a
|
|
||||||
copyright notice that is included in or attached to the work
|
|
||||||
(an example is provided in the Appendix below).
|
|
||||||
|
|
||||||
"Derivative Works" shall mean any work, whether in Source or Object
|
|
||||||
form, that is based on (or derived from) the Work and for which the
|
|
||||||
editorial revisions, annotations, elaborations, or other modifications
|
|
||||||
represent, as a whole, an original work of authorship. For the purposes
|
|
||||||
of this License, Derivative Works shall not include works that remain
|
|
||||||
separable from, or merely link (or bind by name) to the interfaces of,
|
|
||||||
the Work and Derivative Works thereof.
|
|
||||||
|
|
||||||
"Contribution" shall mean any work of authorship, including
|
|
||||||
the original version of the Work and any modifications or additions
|
|
||||||
to that Work or Derivative Works thereof, that is intentionally
|
|
||||||
submitted to Licensor for inclusion in the Work by the copyright owner
|
|
||||||
or by an individual or Legal Entity authorized to submit on behalf of
|
|
||||||
the copyright owner. For the purposes of this definition, "submitted"
|
|
||||||
means any form of electronic, verbal, or written communication sent
|
|
||||||
to the Licensor or its representatives, including but not limited to
|
|
||||||
communication on electronic mailing lists, source code control systems,
|
|
||||||
and issue tracking systems that are managed by, or on behalf of, the
|
|
||||||
Licensor for the purpose of discussing and improving the Work, but
|
|
||||||
excluding communication that is conspicuously marked or otherwise
|
|
||||||
designated in writing by the copyright owner as "Not a Contribution."
|
|
||||||
|
|
||||||
"Contributor" shall mean Licensor and any individual or Legal Entity
|
|
||||||
on behalf of whom a Contribution has been received by Licensor and
|
|
||||||
subsequently incorporated within the Work.
|
|
||||||
|
|
||||||
2. Grant of Copyright License. Subject to the terms and conditions of
|
|
||||||
this License, each Contributor hereby grants to You a perpetual,
|
|
||||||
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
|
||||||
copyright license to reproduce, prepare Derivative Works of,
|
|
||||||
publicly display, publicly perform, sublicense, and distribute the
|
|
||||||
Work and such Derivative Works in Source or Object form.
|
|
||||||
|
|
||||||
3. Grant of Patent License. Subject to the terms and conditions of
|
|
||||||
this License, each Contributor hereby grants to You a perpetual,
|
|
||||||
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
|
||||||
(except as stated in this section) patent license to make, have made,
|
|
||||||
use, offer to sell, sell, import, and otherwise transfer the Work,
|
|
||||||
where such license applies only to those patent claims licensable
|
|
||||||
by such Contributor that are necessarily infringed by their
|
|
||||||
Contribution(s) alone or by combination of their Contribution(s)
|
|
||||||
with the Work to which such Contribution(s) was submitted. If You
|
|
||||||
institute patent litigation against any entity (including a
|
|
||||||
cross-claim or counterclaim in a lawsuit) alleging that the Work
|
|
||||||
or a Contribution incorporated within the Work constitutes direct
|
|
||||||
or contributory patent infringement, then any patent licenses
|
|
||||||
granted to You under this License for that Work shall terminate
|
|
||||||
as of the date such litigation is filed.
|
|
||||||
|
|
||||||
4. Redistribution. You may reproduce and distribute copies of the
|
|
||||||
Work or Derivative Works thereof in any medium, with or without
|
|
||||||
modifications, and in Source or Object form, provided that You
|
|
||||||
meet the following conditions:
|
|
||||||
|
|
||||||
(a) You must give any other recipients of the Work or
|
|
||||||
Derivative Works a copy of this License; and
|
|
||||||
|
|
||||||
(b) You must cause any modified files to carry prominent notices
|
|
||||||
stating that You changed the files; and
|
|
||||||
|
|
||||||
(c) You must retain, in the Source form of any Derivative Works
|
|
||||||
that You distribute, all copyright, patent, trademark, and
|
|
||||||
attribution notices from the Source form of the Work,
|
|
||||||
excluding those notices that do not pertain to any part of
|
|
||||||
the Derivative Works; and
|
|
||||||
|
|
||||||
(d) If the Work includes a "NOTICE" text file as part of its
|
|
||||||
distribution, then any Derivative Works that You distribute must
|
|
||||||
include a readable copy of the attribution notices contained
|
|
||||||
within such NOTICE file, excluding those notices that do not
|
|
||||||
pertain to any part of the Derivative Works, in at least one
|
|
||||||
of the following places: within a NOTICE text file distributed
|
|
||||||
as part of the Derivative Works; within the Source form or
|
|
||||||
documentation, if provided along with the Derivative Works; or,
|
|
||||||
within a display generated by the Derivative Works, if and
|
|
||||||
wherever such third-party notices normally appear. The contents
|
|
||||||
of the NOTICE file are for informational purposes only and
|
|
||||||
do not modify the License. You may add Your own attribution
|
|
||||||
notices within Derivative Works that You distribute, alongside
|
|
||||||
or as an addendum to the NOTICE text from the Work, provided
|
|
||||||
that such additional attribution notices cannot be construed
|
|
||||||
as modifying the License.
|
|
||||||
|
|
||||||
You may add Your own copyright statement to Your modifications and
|
|
||||||
may provide additional or different license terms and conditions
|
|
||||||
for use, reproduction, or distribution of Your modifications, or
|
|
||||||
for any such Derivative Works as a whole, provided Your use,
|
|
||||||
reproduction, and distribution of the Work otherwise complies with
|
|
||||||
the conditions stated in this License.
|
|
||||||
|
|
||||||
5. Submission of Contributions. Unless You explicitly state otherwise,
|
|
||||||
any Contribution intentionally submitted for inclusion in the Work
|
|
||||||
by You to the Licensor shall be under the terms and conditions of
|
|
||||||
this License, without any additional terms or conditions.
|
|
||||||
Notwithstanding the above, nothing herein shall supersede or modify
|
|
||||||
the terms of any separate license agreement you may have executed
|
|
||||||
with Licensor regarding such Contributions.
|
|
||||||
|
|
||||||
6. Trademarks. This License does not grant permission to use the trade
|
|
||||||
names, trademarks, service marks, or product names of the Licensor,
|
|
||||||
except as required for reasonable and customary use in describing the
|
|
||||||
origin of the Work and reproducing the content of the NOTICE file.
|
|
||||||
|
|
||||||
7. Disclaimer of Warranty. Unless required by applicable law or
|
|
||||||
agreed to in writing, Licensor provides the Work (and each
|
|
||||||
Contributor provides its Contributions) on an "AS IS" BASIS,
|
|
||||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
|
||||||
implied, including, without limitation, any warranties or conditions
|
|
||||||
of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
|
|
||||||
PARTICULAR PURPOSE. You are solely responsible for determining the
|
|
||||||
appropriateness of using or redistributing the Work and assume any
|
|
||||||
risks associated with Your exercise of permissions under this License.
|
|
||||||
|
|
||||||
8. Limitation of Liability. In no event and under no legal theory,
|
|
||||||
whether in tort (including negligence), contract, or otherwise,
|
|
||||||
unless required by applicable law (such as deliberate and grossly
|
|
||||||
negligent acts) or agreed to in writing, shall any Contributor be
|
|
||||||
liable to You for damages, including any direct, indirect, special,
|
|
||||||
incidental, or consequential damages of any character arising as a
|
|
||||||
result of this License or out of the use or inability to use the
|
|
||||||
Work (including but not limited to damages for loss of goodwill,
|
|
||||||
work stoppage, computer failure or malfunction, or any and all
|
|
||||||
other commercial damages or losses), even if such Contributor
|
|
||||||
has been advised of the possibility of such damages.
|
|
||||||
|
|
||||||
9. Accepting Warranty or Additional Liability. While redistributing
|
|
||||||
the Work or Derivative Works thereof, You may choose to offer,
|
|
||||||
and charge a fee for, acceptance of support, warranty, indemnity,
|
|
||||||
or other liability obligations and/or rights consistent with this
|
|
||||||
License. However, in accepting such obligations, You may act only
|
|
||||||
on Your own behalf and on Your sole responsibility, not on behalf
|
|
||||||
of any other Contributor, and only if You agree to indemnify,
|
|
||||||
defend, and hold each Contributor harmless for any liability
|
|
||||||
incurred by, or claims asserted against, such Contributor by reason
|
|
||||||
of your accepting any such warranty or additional liability.
|
|
||||||
|
|
||||||
END OF TERMS AND CONDITIONS
|
|
||||||
|
|
||||||
APPENDIX: How to apply the Apache License to your work.
|
|
||||||
|
|
||||||
To apply the Apache License to your work, attach the following
|
|
||||||
boilerplate notice, with the fields enclosed by brackets "{}"
|
|
||||||
replaced with your own identifying information. (Don't include
|
|
||||||
the brackets!) The text should be enclosed in the appropriate
|
|
||||||
comment syntax for the file format. We also recommend that a
|
|
||||||
file or class name and description of purpose be included on the
|
|
||||||
same "printed page" as the copyright notice for easier
|
|
||||||
identification within third-party archives.
|
|
||||||
|
|
||||||
Copyright 2018-2020 Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
you may not use this file except in compliance with the License.
|
|
||||||
You may obtain a copy of the License at
|
|
||||||
|
|
||||||
http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing, software
|
|
||||||
distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
See the License for the specific language governing permissions and
|
|
||||||
limitations under the License.
|
|
||||||
|
|
||||||
|
|
||||||
@aws-sdk/core
|
@aws-sdk/core
|
||||||
Apache-2.0
|
Apache-2.0
|
||||||
Apache License
|
Apache License
|
||||||
|
|||||||
@ -23,8 +23,8 @@
|
|||||||
"packageManager": "yarn@4.9.2",
|
"packageManager": "yarn@4.9.2",
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"@actions/core": "^3.0.0",
|
"@actions/core": "^3.0.0",
|
||||||
"@aws-sdk/client-ecr": "^3.978.0",
|
"@aws-sdk/client-ecr": "^3.1000.0",
|
||||||
"@aws-sdk/client-ecr-public": "^3.978.0",
|
"@aws-sdk/client-ecr-public": "^3.1000.0",
|
||||||
"@docker/actions-toolkit": "^0.77.0",
|
"@docker/actions-toolkit": "^0.77.0",
|
||||||
"http-proxy-agent": "^7.0.2",
|
"http-proxy-agent": "^7.0.2",
|
||||||
"https-proxy-agent": "^7.0.6",
|
"https-proxy-agent": "^7.0.6",
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user