初始化环境文件
This commit is contained in:
9
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/SSO.js
generated
vendored
Normal file
9
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/SSO.js
generated
vendored
Normal file
@@ -0,0 +1,9 @@
|
||||
import { createAggregatedClient } from "@smithy/smithy-client";
|
||||
import { GetRoleCredentialsCommand, } from "./commands/GetRoleCredentialsCommand";
|
||||
import { SSOClient } from "./SSOClient";
|
||||
const commands = {
|
||||
GetRoleCredentialsCommand,
|
||||
};
|
||||
export class SSO extends SSOClient {
|
||||
}
|
||||
createAggregatedClient(commands, SSO);
|
||||
50
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/SSOClient.js
generated
vendored
Normal file
50
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/SSOClient.js
generated
vendored
Normal file
@@ -0,0 +1,50 @@
|
||||
import { getHostHeaderPlugin, resolveHostHeaderConfig, } from "@aws-sdk/middleware-host-header";
|
||||
import { getLoggerPlugin } from "@aws-sdk/middleware-logger";
|
||||
import { getRecursionDetectionPlugin } from "@aws-sdk/middleware-recursion-detection";
|
||||
import { getUserAgentPlugin, resolveUserAgentConfig, } from "@aws-sdk/middleware-user-agent";
|
||||
import { resolveRegionConfig } from "@smithy/config-resolver";
|
||||
import { DefaultIdentityProviderConfig, getHttpAuthSchemeEndpointRuleSetPlugin, getHttpSigningPlugin, } from "@smithy/core";
|
||||
import { getSchemaSerdePlugin } from "@smithy/core/schema";
|
||||
import { getContentLengthPlugin } from "@smithy/middleware-content-length";
|
||||
import { resolveEndpointConfig, } from "@smithy/middleware-endpoint";
|
||||
import { getRetryPlugin, resolveRetryConfig, } from "@smithy/middleware-retry";
|
||||
import { Client as __Client, } from "@smithy/smithy-client";
|
||||
import { defaultSSOHttpAuthSchemeParametersProvider, resolveHttpAuthSchemeConfig, } from "./auth/httpAuthSchemeProvider";
|
||||
import { resolveClientEndpointParameters, } from "./endpoint/EndpointParameters";
|
||||
import { getRuntimeConfig as __getRuntimeConfig } from "./runtimeConfig";
|
||||
import { resolveRuntimeExtensions } from "./runtimeExtensions";
|
||||
export { __Client };
|
||||
export class SSOClient extends __Client {
|
||||
config;
|
||||
constructor(...[configuration]) {
|
||||
const _config_0 = __getRuntimeConfig(configuration || {});
|
||||
super(_config_0);
|
||||
this.initConfig = _config_0;
|
||||
const _config_1 = resolveClientEndpointParameters(_config_0);
|
||||
const _config_2 = resolveUserAgentConfig(_config_1);
|
||||
const _config_3 = resolveRetryConfig(_config_2);
|
||||
const _config_4 = resolveRegionConfig(_config_3);
|
||||
const _config_5 = resolveHostHeaderConfig(_config_4);
|
||||
const _config_6 = resolveEndpointConfig(_config_5);
|
||||
const _config_7 = resolveHttpAuthSchemeConfig(_config_6);
|
||||
const _config_8 = resolveRuntimeExtensions(_config_7, configuration?.extensions || []);
|
||||
this.config = _config_8;
|
||||
this.middlewareStack.use(getSchemaSerdePlugin(this.config));
|
||||
this.middlewareStack.use(getUserAgentPlugin(this.config));
|
||||
this.middlewareStack.use(getRetryPlugin(this.config));
|
||||
this.middlewareStack.use(getContentLengthPlugin(this.config));
|
||||
this.middlewareStack.use(getHostHeaderPlugin(this.config));
|
||||
this.middlewareStack.use(getLoggerPlugin(this.config));
|
||||
this.middlewareStack.use(getRecursionDetectionPlugin(this.config));
|
||||
this.middlewareStack.use(getHttpAuthSchemeEndpointRuleSetPlugin(this.config, {
|
||||
httpAuthSchemeParametersProvider: defaultSSOHttpAuthSchemeParametersProvider,
|
||||
identityProviderConfigProvider: async (config) => new DefaultIdentityProviderConfig({
|
||||
"aws.auth#sigv4": config.credentials,
|
||||
}),
|
||||
}));
|
||||
this.middlewareStack.use(getHttpSigningPlugin(this.config));
|
||||
}
|
||||
destroy() {
|
||||
super.destroy();
|
||||
}
|
||||
}
|
||||
38
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/auth/httpAuthExtensionConfiguration.js
generated
vendored
Normal file
38
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/auth/httpAuthExtensionConfiguration.js
generated
vendored
Normal file
@@ -0,0 +1,38 @@
|
||||
export const getHttpAuthExtensionConfiguration = (runtimeConfig) => {
|
||||
const _httpAuthSchemes = runtimeConfig.httpAuthSchemes;
|
||||
let _httpAuthSchemeProvider = runtimeConfig.httpAuthSchemeProvider;
|
||||
let _credentials = runtimeConfig.credentials;
|
||||
return {
|
||||
setHttpAuthScheme(httpAuthScheme) {
|
||||
const index = _httpAuthSchemes.findIndex((scheme) => scheme.schemeId === httpAuthScheme.schemeId);
|
||||
if (index === -1) {
|
||||
_httpAuthSchemes.push(httpAuthScheme);
|
||||
}
|
||||
else {
|
||||
_httpAuthSchemes.splice(index, 1, httpAuthScheme);
|
||||
}
|
||||
},
|
||||
httpAuthSchemes() {
|
||||
return _httpAuthSchemes;
|
||||
},
|
||||
setHttpAuthSchemeProvider(httpAuthSchemeProvider) {
|
||||
_httpAuthSchemeProvider = httpAuthSchemeProvider;
|
||||
},
|
||||
httpAuthSchemeProvider() {
|
||||
return _httpAuthSchemeProvider;
|
||||
},
|
||||
setCredentials(credentials) {
|
||||
_credentials = credentials;
|
||||
},
|
||||
credentials() {
|
||||
return _credentials;
|
||||
},
|
||||
};
|
||||
};
|
||||
export const resolveHttpAuthRuntimeConfig = (config) => {
|
||||
return {
|
||||
httpAuthSchemes: config.httpAuthSchemes(),
|
||||
httpAuthSchemeProvider: config.httpAuthSchemeProvider(),
|
||||
credentials: config.credentials(),
|
||||
};
|
||||
};
|
||||
50
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/auth/httpAuthSchemeProvider.js
generated
vendored
Normal file
50
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/auth/httpAuthSchemeProvider.js
generated
vendored
Normal file
@@ -0,0 +1,50 @@
|
||||
import { resolveAwsSdkSigV4Config } from "@aws-sdk/core/httpAuthSchemes";
|
||||
import { getSmithyContext, normalizeProvider } from "@smithy/util-middleware";
|
||||
export const defaultSSOHttpAuthSchemeParametersProvider = async (config, context, input) => {
|
||||
return {
|
||||
operation: getSmithyContext(context).operation,
|
||||
region: (await normalizeProvider(config.region)()) ||
|
||||
(() => {
|
||||
throw new Error("expected `region` to be configured for `aws.auth#sigv4`");
|
||||
})(),
|
||||
};
|
||||
};
|
||||
function createAwsAuthSigv4HttpAuthOption(authParameters) {
|
||||
return {
|
||||
schemeId: "aws.auth#sigv4",
|
||||
signingProperties: {
|
||||
name: "awsssoportal",
|
||||
region: authParameters.region,
|
||||
},
|
||||
propertiesExtractor: (config, context) => ({
|
||||
signingProperties: {
|
||||
config,
|
||||
context,
|
||||
},
|
||||
}),
|
||||
};
|
||||
}
|
||||
function createSmithyApiNoAuthHttpAuthOption(authParameters) {
|
||||
return {
|
||||
schemeId: "smithy.api#noAuth",
|
||||
};
|
||||
}
|
||||
export const defaultSSOHttpAuthSchemeProvider = (authParameters) => {
|
||||
const options = [];
|
||||
switch (authParameters.operation) {
|
||||
case "GetRoleCredentials": {
|
||||
options.push(createSmithyApiNoAuthHttpAuthOption(authParameters));
|
||||
break;
|
||||
}
|
||||
default: {
|
||||
options.push(createAwsAuthSigv4HttpAuthOption(authParameters));
|
||||
}
|
||||
}
|
||||
return options;
|
||||
};
|
||||
export const resolveHttpAuthSchemeConfig = (config) => {
|
||||
const config_0 = resolveAwsSdkSigV4Config(config);
|
||||
return Object.assign(config_0, {
|
||||
authSchemePreference: normalizeProvider(config.authSchemePreference ?? []),
|
||||
});
|
||||
};
|
||||
16
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/commands/GetRoleCredentialsCommand.js
generated
vendored
Normal file
16
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/commands/GetRoleCredentialsCommand.js
generated
vendored
Normal file
@@ -0,0 +1,16 @@
|
||||
import { getEndpointPlugin } from "@smithy/middleware-endpoint";
|
||||
import { Command as $Command } from "@smithy/smithy-client";
|
||||
import { commonParams } from "../endpoint/EndpointParameters";
|
||||
import { GetRoleCredentials$ } from "../schemas/schemas_0";
|
||||
export { $Command };
|
||||
export class GetRoleCredentialsCommand extends $Command
|
||||
.classBuilder()
|
||||
.ep(commonParams)
|
||||
.m(function (Command, cs, config, o) {
|
||||
return [getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
|
||||
})
|
||||
.s("SWBPortalService", "GetRoleCredentials", {})
|
||||
.n("SSOClient", "GetRoleCredentialsCommand")
|
||||
.sc(GetRoleCredentials$)
|
||||
.build() {
|
||||
}
|
||||
1
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/commands/index.js
generated
vendored
Normal file
1
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/commands/index.js
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
export * from "./GetRoleCredentialsCommand";
|
||||
13
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/endpoint/EndpointParameters.js
generated
vendored
Normal file
13
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/endpoint/EndpointParameters.js
generated
vendored
Normal file
@@ -0,0 +1,13 @@
|
||||
export const resolveClientEndpointParameters = (options) => {
|
||||
return Object.assign(options, {
|
||||
useDualstackEndpoint: options.useDualstackEndpoint ?? false,
|
||||
useFipsEndpoint: options.useFipsEndpoint ?? false,
|
||||
defaultSigningName: "awsssoportal",
|
||||
});
|
||||
};
|
||||
export const commonParams = {
|
||||
UseFIPS: { type: "builtInParams", name: "useFipsEndpoint" },
|
||||
Endpoint: { type: "builtInParams", name: "endpoint" },
|
||||
Region: { type: "builtInParams", name: "region" },
|
||||
UseDualStack: { type: "builtInParams", name: "useDualstackEndpoint" },
|
||||
};
|
||||
14
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/endpoint/endpointResolver.js
generated
vendored
Normal file
14
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/endpoint/endpointResolver.js
generated
vendored
Normal file
@@ -0,0 +1,14 @@
|
||||
import { awsEndpointFunctions } from "@aws-sdk/util-endpoints";
|
||||
import { customEndpointFunctions, EndpointCache, resolveEndpoint } from "@smithy/util-endpoints";
|
||||
import { ruleSet } from "./ruleset";
|
||||
const cache = new EndpointCache({
|
||||
size: 50,
|
||||
params: ["Endpoint", "Region", "UseDualStack", "UseFIPS"],
|
||||
});
|
||||
export const defaultEndpointResolver = (endpointParams, context = {}) => {
|
||||
return cache.get(endpointParams, () => resolveEndpoint(ruleSet, {
|
||||
endpointParams: endpointParams,
|
||||
logger: context.logger,
|
||||
}));
|
||||
};
|
||||
customEndpointFunctions.aws = awsEndpointFunctions;
|
||||
103
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/endpoint/ruleset.js
generated
vendored
Normal file
103
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/endpoint/ruleset.js
generated
vendored
Normal file
@@ -0,0 +1,103 @@
|
||||
const u = "required", v = "fn", w = "argv", x = "ref";
|
||||
const a = true, b = "isSet", c = "booleanEquals", d = "error", e = "endpoint", f = "tree", g = "PartitionResult", h = "getAttr", i = { [u]: false, type: "string" }, j = { [u]: true, default: false, type: "boolean" }, k = { [x]: "Endpoint" }, l = { [v]: c, [w]: [{ [x]: "UseFIPS" }, true] }, m = { [v]: c, [w]: [{ [x]: "UseDualStack" }, true] }, n = {}, o = { [v]: h, [w]: [{ [x]: g }, "supportsFIPS"] }, p = { [x]: g }, q = { [v]: c, [w]: [true, { [v]: h, [w]: [p, "supportsDualStack"] }] }, r = [l], s = [m], t = [{ [x]: "Region" }];
|
||||
const _data = {
|
||||
version: "1.0",
|
||||
parameters: { Region: i, UseDualStack: j, UseFIPS: j, Endpoint: i },
|
||||
rules: [
|
||||
{
|
||||
conditions: [{ [v]: b, [w]: [k] }],
|
||||
rules: [
|
||||
{ conditions: r, error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: d },
|
||||
{ conditions: s, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", type: d },
|
||||
{ endpoint: { url: k, properties: n, headers: n }, type: e },
|
||||
],
|
||||
type: f,
|
||||
},
|
||||
{
|
||||
conditions: [{ [v]: b, [w]: t }],
|
||||
rules: [
|
||||
{
|
||||
conditions: [{ [v]: "aws.partition", [w]: t, assign: g }],
|
||||
rules: [
|
||||
{
|
||||
conditions: [l, m],
|
||||
rules: [
|
||||
{
|
||||
conditions: [{ [v]: c, [w]: [a, o] }, q],
|
||||
rules: [
|
||||
{
|
||||
endpoint: {
|
||||
url: "https://portal.sso-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",
|
||||
properties: n,
|
||||
headers: n,
|
||||
},
|
||||
type: e,
|
||||
},
|
||||
],
|
||||
type: f,
|
||||
},
|
||||
{ error: "FIPS and DualStack are enabled, but this partition does not support one or both", type: d },
|
||||
],
|
||||
type: f,
|
||||
},
|
||||
{
|
||||
conditions: r,
|
||||
rules: [
|
||||
{
|
||||
conditions: [{ [v]: c, [w]: [o, a] }],
|
||||
rules: [
|
||||
{
|
||||
conditions: [{ [v]: "stringEquals", [w]: [{ [v]: h, [w]: [p, "name"] }, "aws-us-gov"] }],
|
||||
endpoint: { url: "https://portal.sso.{Region}.amazonaws.com", properties: n, headers: n },
|
||||
type: e,
|
||||
},
|
||||
{
|
||||
endpoint: {
|
||||
url: "https://portal.sso-fips.{Region}.{PartitionResult#dnsSuffix}",
|
||||
properties: n,
|
||||
headers: n,
|
||||
},
|
||||
type: e,
|
||||
},
|
||||
],
|
||||
type: f,
|
||||
},
|
||||
{ error: "FIPS is enabled but this partition does not support FIPS", type: d },
|
||||
],
|
||||
type: f,
|
||||
},
|
||||
{
|
||||
conditions: s,
|
||||
rules: [
|
||||
{
|
||||
conditions: [q],
|
||||
rules: [
|
||||
{
|
||||
endpoint: {
|
||||
url: "https://portal.sso.{Region}.{PartitionResult#dualStackDnsSuffix}",
|
||||
properties: n,
|
||||
headers: n,
|
||||
},
|
||||
type: e,
|
||||
},
|
||||
],
|
||||
type: f,
|
||||
},
|
||||
{ error: "DualStack is enabled but this partition does not support DualStack", type: d },
|
||||
],
|
||||
type: f,
|
||||
},
|
||||
{
|
||||
endpoint: { url: "https://portal.sso.{Region}.{PartitionResult#dnsSuffix}", properties: n, headers: n },
|
||||
type: e,
|
||||
},
|
||||
],
|
||||
type: f,
|
||||
},
|
||||
],
|
||||
type: f,
|
||||
},
|
||||
{ error: "Invalid Configuration: Missing Region", type: d },
|
||||
],
|
||||
};
|
||||
export const ruleSet = _data;
|
||||
1
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/extensionConfiguration.js
generated
vendored
Normal file
1
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/extensionConfiguration.js
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
export {};
|
||||
7
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/index.js
generated
vendored
Normal file
7
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/index.js
generated
vendored
Normal file
@@ -0,0 +1,7 @@
|
||||
export * from "./SSOClient";
|
||||
export * from "./SSO";
|
||||
export * from "./commands";
|
||||
export * from "./schemas/schemas_0";
|
||||
export * from "./models/errors";
|
||||
export * from "./models/models_0";
|
||||
export { SSOServiceException } from "./models/SSOServiceException";
|
||||
8
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/models/SSOServiceException.js
generated
vendored
Normal file
8
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/models/SSOServiceException.js
generated
vendored
Normal file
@@ -0,0 +1,8 @@
|
||||
import { ServiceException as __ServiceException, } from "@smithy/smithy-client";
|
||||
export { __ServiceException };
|
||||
export class SSOServiceException extends __ServiceException {
|
||||
constructor(options) {
|
||||
super(options);
|
||||
Object.setPrototypeOf(this, SSOServiceException.prototype);
|
||||
}
|
||||
}
|
||||
49
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/models/errors.js
generated
vendored
Normal file
49
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/models/errors.js
generated
vendored
Normal file
@@ -0,0 +1,49 @@
|
||||
import { SSOServiceException as __BaseException } from "./SSOServiceException";
|
||||
export class InvalidRequestException extends __BaseException {
|
||||
name = "InvalidRequestException";
|
||||
$fault = "client";
|
||||
constructor(opts) {
|
||||
super({
|
||||
name: "InvalidRequestException",
|
||||
$fault: "client",
|
||||
...opts,
|
||||
});
|
||||
Object.setPrototypeOf(this, InvalidRequestException.prototype);
|
||||
}
|
||||
}
|
||||
export class ResourceNotFoundException extends __BaseException {
|
||||
name = "ResourceNotFoundException";
|
||||
$fault = "client";
|
||||
constructor(opts) {
|
||||
super({
|
||||
name: "ResourceNotFoundException",
|
||||
$fault: "client",
|
||||
...opts,
|
||||
});
|
||||
Object.setPrototypeOf(this, ResourceNotFoundException.prototype);
|
||||
}
|
||||
}
|
||||
export class TooManyRequestsException extends __BaseException {
|
||||
name = "TooManyRequestsException";
|
||||
$fault = "client";
|
||||
constructor(opts) {
|
||||
super({
|
||||
name: "TooManyRequestsException",
|
||||
$fault: "client",
|
||||
...opts,
|
||||
});
|
||||
Object.setPrototypeOf(this, TooManyRequestsException.prototype);
|
||||
}
|
||||
}
|
||||
export class UnauthorizedException extends __BaseException {
|
||||
name = "UnauthorizedException";
|
||||
$fault = "client";
|
||||
constructor(opts) {
|
||||
super({
|
||||
name: "UnauthorizedException",
|
||||
$fault: "client",
|
||||
...opts,
|
||||
});
|
||||
Object.setPrototypeOf(this, UnauthorizedException.prototype);
|
||||
}
|
||||
}
|
||||
1
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/models/models_0.js
generated
vendored
Normal file
1
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/models/models_0.js
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
export {};
|
||||
33
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/runtimeConfig.browser.js
generated
vendored
Normal file
33
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/runtimeConfig.browser.js
generated
vendored
Normal file
@@ -0,0 +1,33 @@
|
||||
import packageInfo from "../../../package.json";
|
||||
import { Sha256 } from "@aws-crypto/sha256-browser";
|
||||
import { createDefaultUserAgentProvider } from "@aws-sdk/util-user-agent-browser";
|
||||
import { DEFAULT_USE_DUALSTACK_ENDPOINT, DEFAULT_USE_FIPS_ENDPOINT } from "@smithy/config-resolver";
|
||||
import { FetchHttpHandler as RequestHandler, streamCollector } from "@smithy/fetch-http-handler";
|
||||
import { invalidProvider } from "@smithy/invalid-dependency";
|
||||
import { loadConfigsForDefaultMode } from "@smithy/smithy-client";
|
||||
import { calculateBodyLength } from "@smithy/util-body-length-browser";
|
||||
import { resolveDefaultsModeConfig } from "@smithy/util-defaults-mode-browser";
|
||||
import { DEFAULT_MAX_ATTEMPTS, DEFAULT_RETRY_MODE } from "@smithy/util-retry";
|
||||
import { getRuntimeConfig as getSharedRuntimeConfig } from "./runtimeConfig.shared";
|
||||
export const getRuntimeConfig = (config) => {
|
||||
const defaultsMode = resolveDefaultsModeConfig(config);
|
||||
const defaultConfigProvider = () => defaultsMode().then(loadConfigsForDefaultMode);
|
||||
const clientSharedValues = getSharedRuntimeConfig(config);
|
||||
return {
|
||||
...clientSharedValues,
|
||||
...config,
|
||||
runtime: "browser",
|
||||
defaultsMode,
|
||||
bodyLengthChecker: config?.bodyLengthChecker ?? calculateBodyLength,
|
||||
defaultUserAgentProvider: config?.defaultUserAgentProvider ??
|
||||
createDefaultUserAgentProvider({ serviceId: clientSharedValues.serviceId, clientVersion: packageInfo.version }),
|
||||
maxAttempts: config?.maxAttempts ?? DEFAULT_MAX_ATTEMPTS,
|
||||
region: config?.region ?? invalidProvider("Region is missing"),
|
||||
requestHandler: RequestHandler.create(config?.requestHandler ?? defaultConfigProvider),
|
||||
retryMode: config?.retryMode ?? (async () => (await defaultConfigProvider()).retryMode || DEFAULT_RETRY_MODE),
|
||||
sha256: config?.sha256 ?? Sha256,
|
||||
streamCollector: config?.streamCollector ?? streamCollector,
|
||||
useDualstackEndpoint: config?.useDualstackEndpoint ?? (() => Promise.resolve(DEFAULT_USE_DUALSTACK_ENDPOINT)),
|
||||
useFipsEndpoint: config?.useFipsEndpoint ?? (() => Promise.resolve(DEFAULT_USE_FIPS_ENDPOINT)),
|
||||
};
|
||||
};
|
||||
49
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/runtimeConfig.js
generated
vendored
Normal file
49
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/runtimeConfig.js
generated
vendored
Normal file
@@ -0,0 +1,49 @@
|
||||
import packageInfo from "../../../package.json";
|
||||
import { emitWarningIfUnsupportedVersion as awsCheckVersion } from "@aws-sdk/core/client";
|
||||
import { NODE_AUTH_SCHEME_PREFERENCE_OPTIONS } from "@aws-sdk/core/httpAuthSchemes";
|
||||
import { createDefaultUserAgentProvider, NODE_APP_ID_CONFIG_OPTIONS } from "@aws-sdk/util-user-agent-node";
|
||||
import { NODE_REGION_CONFIG_FILE_OPTIONS, NODE_REGION_CONFIG_OPTIONS, NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS, NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS, } from "@smithy/config-resolver";
|
||||
import { Hash } from "@smithy/hash-node";
|
||||
import { NODE_MAX_ATTEMPT_CONFIG_OPTIONS, NODE_RETRY_MODE_CONFIG_OPTIONS } from "@smithy/middleware-retry";
|
||||
import { loadConfig as loadNodeConfig } from "@smithy/node-config-provider";
|
||||
import { NodeHttpHandler as RequestHandler, streamCollector } from "@smithy/node-http-handler";
|
||||
import { emitWarningIfUnsupportedVersion, loadConfigsForDefaultMode } from "@smithy/smithy-client";
|
||||
import { calculateBodyLength } from "@smithy/util-body-length-node";
|
||||
import { resolveDefaultsModeConfig } from "@smithy/util-defaults-mode-node";
|
||||
import { DEFAULT_RETRY_MODE } from "@smithy/util-retry";
|
||||
import { getRuntimeConfig as getSharedRuntimeConfig } from "./runtimeConfig.shared";
|
||||
export const getRuntimeConfig = (config) => {
|
||||
emitWarningIfUnsupportedVersion(process.version);
|
||||
const defaultsMode = resolveDefaultsModeConfig(config);
|
||||
const defaultConfigProvider = () => defaultsMode().then(loadConfigsForDefaultMode);
|
||||
const clientSharedValues = getSharedRuntimeConfig(config);
|
||||
awsCheckVersion(process.version);
|
||||
const loaderConfig = {
|
||||
profile: config?.profile,
|
||||
logger: clientSharedValues.logger,
|
||||
};
|
||||
return {
|
||||
...clientSharedValues,
|
||||
...config,
|
||||
runtime: "node",
|
||||
defaultsMode,
|
||||
authSchemePreference: config?.authSchemePreference ?? loadNodeConfig(NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, loaderConfig),
|
||||
bodyLengthChecker: config?.bodyLengthChecker ?? calculateBodyLength,
|
||||
defaultUserAgentProvider: config?.defaultUserAgentProvider ??
|
||||
createDefaultUserAgentProvider({ serviceId: clientSharedValues.serviceId, clientVersion: packageInfo.version }),
|
||||
maxAttempts: config?.maxAttempts ?? loadNodeConfig(NODE_MAX_ATTEMPT_CONFIG_OPTIONS, config),
|
||||
region: config?.region ??
|
||||
loadNodeConfig(NODE_REGION_CONFIG_OPTIONS, { ...NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
|
||||
requestHandler: RequestHandler.create(config?.requestHandler ?? defaultConfigProvider),
|
||||
retryMode: config?.retryMode ??
|
||||
loadNodeConfig({
|
||||
...NODE_RETRY_MODE_CONFIG_OPTIONS,
|
||||
default: async () => (await defaultConfigProvider()).retryMode || DEFAULT_RETRY_MODE,
|
||||
}, config),
|
||||
sha256: config?.sha256 ?? Hash.bind(null, "sha256"),
|
||||
streamCollector: config?.streamCollector ?? streamCollector,
|
||||
useDualstackEndpoint: config?.useDualstackEndpoint ?? loadNodeConfig(NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS, loaderConfig),
|
||||
useFipsEndpoint: config?.useFipsEndpoint ?? loadNodeConfig(NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS, loaderConfig),
|
||||
userAgentAppId: config?.userAgentAppId ?? loadNodeConfig(NODE_APP_ID_CONFIG_OPTIONS, loaderConfig),
|
||||
};
|
||||
};
|
||||
11
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/runtimeConfig.native.js
generated
vendored
Normal file
11
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/runtimeConfig.native.js
generated
vendored
Normal file
@@ -0,0 +1,11 @@
|
||||
import { Sha256 } from "@aws-crypto/sha256-js";
|
||||
import { getRuntimeConfig as getBrowserRuntimeConfig } from "./runtimeConfig.browser";
|
||||
export const getRuntimeConfig = (config) => {
|
||||
const browserDefaults = getBrowserRuntimeConfig(config);
|
||||
return {
|
||||
...browserDefaults,
|
||||
...config,
|
||||
runtime: "react-native",
|
||||
sha256: config?.sha256 ?? Sha256,
|
||||
};
|
||||
};
|
||||
45
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/runtimeConfig.shared.js
generated
vendored
Normal file
45
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/runtimeConfig.shared.js
generated
vendored
Normal file
@@ -0,0 +1,45 @@
|
||||
import { AwsSdkSigV4Signer } from "@aws-sdk/core/httpAuthSchemes";
|
||||
import { AwsRestJsonProtocol } from "@aws-sdk/core/protocols";
|
||||
import { NoAuthSigner } from "@smithy/core";
|
||||
import { NoOpLogger } from "@smithy/smithy-client";
|
||||
import { parseUrl } from "@smithy/url-parser";
|
||||
import { fromBase64, toBase64 } from "@smithy/util-base64";
|
||||
import { fromUtf8, toUtf8 } from "@smithy/util-utf8";
|
||||
import { defaultSSOHttpAuthSchemeProvider } from "./auth/httpAuthSchemeProvider";
|
||||
import { defaultEndpointResolver } from "./endpoint/endpointResolver";
|
||||
import { errorTypeRegistries } from "./schemas/schemas_0";
|
||||
export const getRuntimeConfig = (config) => {
|
||||
return {
|
||||
apiVersion: "2019-06-10",
|
||||
base64Decoder: config?.base64Decoder ?? fromBase64,
|
||||
base64Encoder: config?.base64Encoder ?? toBase64,
|
||||
disableHostPrefix: config?.disableHostPrefix ?? false,
|
||||
endpointProvider: config?.endpointProvider ?? defaultEndpointResolver,
|
||||
extensions: config?.extensions ?? [],
|
||||
httpAuthSchemeProvider: config?.httpAuthSchemeProvider ?? defaultSSOHttpAuthSchemeProvider,
|
||||
httpAuthSchemes: config?.httpAuthSchemes ?? [
|
||||
{
|
||||
schemeId: "aws.auth#sigv4",
|
||||
identityProvider: (ipc) => ipc.getIdentityProvider("aws.auth#sigv4"),
|
||||
signer: new AwsSdkSigV4Signer(),
|
||||
},
|
||||
{
|
||||
schemeId: "smithy.api#noAuth",
|
||||
identityProvider: (ipc) => ipc.getIdentityProvider("smithy.api#noAuth") || (async () => ({})),
|
||||
signer: new NoAuthSigner(),
|
||||
},
|
||||
],
|
||||
logger: config?.logger ?? new NoOpLogger(),
|
||||
protocol: config?.protocol ?? AwsRestJsonProtocol,
|
||||
protocolSettings: config?.protocolSettings ?? {
|
||||
defaultNamespace: "com.amazonaws.sso",
|
||||
errorTypeRegistries,
|
||||
version: "2019-06-10",
|
||||
serviceTarget: "SWBPortalService",
|
||||
},
|
||||
serviceId: config?.serviceId ?? "SSO",
|
||||
urlParser: config?.urlParser ?? parseUrl,
|
||||
utf8Decoder: config?.utf8Decoder ?? fromUtf8,
|
||||
utf8Encoder: config?.utf8Encoder ?? toUtf8,
|
||||
};
|
||||
};
|
||||
9
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/runtimeExtensions.js
generated
vendored
Normal file
9
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/runtimeExtensions.js
generated
vendored
Normal file
@@ -0,0 +1,9 @@
|
||||
import { getAwsRegionExtensionConfiguration, resolveAwsRegionExtensionConfiguration, } from "@aws-sdk/region-config-resolver";
|
||||
import { getHttpHandlerExtensionConfiguration, resolveHttpHandlerRuntimeConfig } from "@smithy/protocol-http";
|
||||
import { getDefaultExtensionConfiguration, resolveDefaultRuntimeConfig } from "@smithy/smithy-client";
|
||||
import { getHttpAuthExtensionConfiguration, resolveHttpAuthRuntimeConfig } from "./auth/httpAuthExtensionConfiguration";
|
||||
export const resolveRuntimeExtensions = (runtimeConfig, extensions) => {
|
||||
const extensionConfiguration = Object.assign(getAwsRegionExtensionConfiguration(runtimeConfig), getDefaultExtensionConfiguration(runtimeConfig), getHttpHandlerExtensionConfiguration(runtimeConfig), getHttpAuthExtensionConfiguration(runtimeConfig));
|
||||
extensions.forEach((extension) => extension.configure(extensionConfiguration));
|
||||
return Object.assign(runtimeConfig, resolveAwsRegionExtensionConfiguration(extensionConfiguration), resolveDefaultRuntimeConfig(extensionConfiguration), resolveHttpHandlerRuntimeConfig(extensionConfiguration), resolveHttpAuthRuntimeConfig(extensionConfiguration));
|
||||
};
|
||||
87
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/schemas/schemas_0.js
generated
vendored
Normal file
87
node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso/schemas/schemas_0.js
generated
vendored
Normal file
@@ -0,0 +1,87 @@
|
||||
const _ATT = "AccessTokenType";
|
||||
const _GRC = "GetRoleCredentials";
|
||||
const _GRCR = "GetRoleCredentialsRequest";
|
||||
const _GRCRe = "GetRoleCredentialsResponse";
|
||||
const _IRE = "InvalidRequestException";
|
||||
const _RC = "RoleCredentials";
|
||||
const _RNFE = "ResourceNotFoundException";
|
||||
const _SAKT = "SecretAccessKeyType";
|
||||
const _STT = "SessionTokenType";
|
||||
const _TMRE = "TooManyRequestsException";
|
||||
const _UE = "UnauthorizedException";
|
||||
const _aI = "accountId";
|
||||
const _aKI = "accessKeyId";
|
||||
const _aT = "accessToken";
|
||||
const _ai = "account_id";
|
||||
const _c = "client";
|
||||
const _e = "error";
|
||||
const _ex = "expiration";
|
||||
const _h = "http";
|
||||
const _hE = "httpError";
|
||||
const _hH = "httpHeader";
|
||||
const _hQ = "httpQuery";
|
||||
const _m = "message";
|
||||
const _rC = "roleCredentials";
|
||||
const _rN = "roleName";
|
||||
const _rn = "role_name";
|
||||
const _s = "smithy.ts.sdk.synthetic.com.amazonaws.sso";
|
||||
const _sAK = "secretAccessKey";
|
||||
const _sT = "sessionToken";
|
||||
const _xasbt = "x-amz-sso_bearer_token";
|
||||
const n0 = "com.amazonaws.sso";
|
||||
import { TypeRegistry } from "@smithy/core/schema";
|
||||
import { InvalidRequestException, ResourceNotFoundException, TooManyRequestsException, UnauthorizedException, } from "../models/errors";
|
||||
import { SSOServiceException } from "../models/SSOServiceException";
|
||||
const _s_registry = TypeRegistry.for(_s);
|
||||
export var SSOServiceException$ = [-3, _s, "SSOServiceException", 0, [], []];
|
||||
_s_registry.registerError(SSOServiceException$, SSOServiceException);
|
||||
const n0_registry = TypeRegistry.for(n0);
|
||||
export var InvalidRequestException$ = [-3, n0, _IRE, { [_e]: _c, [_hE]: 400 }, [_m], [0]];
|
||||
n0_registry.registerError(InvalidRequestException$, InvalidRequestException);
|
||||
export var ResourceNotFoundException$ = [-3, n0, _RNFE, { [_e]: _c, [_hE]: 404 }, [_m], [0]];
|
||||
n0_registry.registerError(ResourceNotFoundException$, ResourceNotFoundException);
|
||||
export var TooManyRequestsException$ = [-3, n0, _TMRE, { [_e]: _c, [_hE]: 429 }, [_m], [0]];
|
||||
n0_registry.registerError(TooManyRequestsException$, TooManyRequestsException);
|
||||
export var UnauthorizedException$ = [-3, n0, _UE, { [_e]: _c, [_hE]: 401 }, [_m], [0]];
|
||||
n0_registry.registerError(UnauthorizedException$, UnauthorizedException);
|
||||
export const errorTypeRegistries = [_s_registry, n0_registry];
|
||||
var AccessTokenType = [0, n0, _ATT, 8, 0];
|
||||
var SecretAccessKeyType = [0, n0, _SAKT, 8, 0];
|
||||
var SessionTokenType = [0, n0, _STT, 8, 0];
|
||||
export var GetRoleCredentialsRequest$ = [
|
||||
3,
|
||||
n0,
|
||||
_GRCR,
|
||||
0,
|
||||
[_rN, _aI, _aT],
|
||||
[
|
||||
[0, { [_hQ]: _rn }],
|
||||
[0, { [_hQ]: _ai }],
|
||||
[() => AccessTokenType, { [_hH]: _xasbt }],
|
||||
],
|
||||
3,
|
||||
];
|
||||
export var GetRoleCredentialsResponse$ = [
|
||||
3,
|
||||
n0,
|
||||
_GRCRe,
|
||||
0,
|
||||
[_rC],
|
||||
[[() => RoleCredentials$, 0]],
|
||||
];
|
||||
export var RoleCredentials$ = [
|
||||
3,
|
||||
n0,
|
||||
_RC,
|
||||
0,
|
||||
[_aKI, _sAK, _sT, _ex],
|
||||
[0, [() => SecretAccessKeyType, 0], [() => SessionTokenType, 0], 1],
|
||||
];
|
||||
export var GetRoleCredentials$ = [
|
||||
9,
|
||||
n0,
|
||||
_GRC,
|
||||
{ [_h]: ["GET", "/federation/credentials", 200] },
|
||||
() => GetRoleCredentialsRequest$,
|
||||
() => GetRoleCredentialsResponse$,
|
||||
];
|
||||
Reference in New Issue
Block a user