diff --git a/dist/869.index.js b/dist/869.index.js index 8880385..bd52f44 100644 --- a/dist/869.index.js +++ b/dist/869.index.js @@ -27,7 +27,7 @@ const resolveCredentialSource = (credentialSource, profileName, logger) => { }, Environment: async (options) => { logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment"); - const { fromEnv } = await Promise.resolve(/* import() */).then(__webpack_require__.t.bind(__webpack_require__, 5606, 19)); + const { fromEnv } = await __webpack_require__.e(/* import() */ 121).then(__webpack_require__.t.bind(__webpack_require__, 7121, 19)); return async () => fromEnv(options)().then(setNamedProvider); }, }; diff --git a/dist/cleanup/869.index.js b/dist/cleanup/869.index.js index 8880385..bd52f44 100644 --- a/dist/cleanup/869.index.js +++ b/dist/cleanup/869.index.js @@ -27,7 +27,7 @@ const resolveCredentialSource = (credentialSource, profileName, logger) => { }, Environment: async (options) => { logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment"); - const { fromEnv } = await Promise.resolve(/* import() */).then(__webpack_require__.t.bind(__webpack_require__, 5606, 19)); + const { fromEnv } = await __webpack_require__.e(/* import() */ 121).then(__webpack_require__.t.bind(__webpack_require__, 7121, 19)); return async () => fromEnv(options)().then(setNamedProvider); }, }; diff --git a/dist/cleanup/index.js b/dist/cleanup/index.js index 13a995b..e5880a2 100644 --- a/dist/cleanup/index.js +++ b/dist/cleanup/index.js @@ -8162,55 +8162,6 @@ exports.parseXmlBody = parseXmlBody; exports.parseXmlErrorBody = parseXmlErrorBody; -/***/ }), - -/***/ 5606: -/***/ ((__unused_webpack_module, exports, __nccwpck_require__) => { - -"use strict"; - - -var client = __nccwpck_require__(5152); -var propertyProvider = __nccwpck_require__(1238); - -const ENV_KEY = "AWS_ACCESS_KEY_ID"; -const ENV_SECRET = "AWS_SECRET_ACCESS_KEY"; -const ENV_SESSION = "AWS_SESSION_TOKEN"; -const ENV_EXPIRATION = "AWS_CREDENTIAL_EXPIRATION"; -const ENV_CREDENTIAL_SCOPE = "AWS_CREDENTIAL_SCOPE"; -const ENV_ACCOUNT_ID = "AWS_ACCOUNT_ID"; -const fromEnv = (init) => async () => { - init?.logger?.debug("@aws-sdk/credential-provider-env - fromEnv"); - const accessKeyId = process.env[ENV_KEY]; - const secretAccessKey = process.env[ENV_SECRET]; - const sessionToken = process.env[ENV_SESSION]; - const expiry = process.env[ENV_EXPIRATION]; - const credentialScope = process.env[ENV_CREDENTIAL_SCOPE]; - const accountId = process.env[ENV_ACCOUNT_ID]; - if (accessKeyId && secretAccessKey) { - const credentials = { - accessKeyId, - secretAccessKey, - ...(sessionToken && { sessionToken }), - ...(expiry && { expiration: new Date(expiry) }), - ...(credentialScope && { credentialScope }), - ...(accountId && { accountId }), - }; - client.setCredentialFeature(credentials, "CREDENTIALS_ENV_VARS", "g"); - return credentials; - } - throw new propertyProvider.CredentialsProviderError("Unable to find environment variable credentials.", { logger: init?.logger }); -}; - -exports.ENV_ACCOUNT_ID = ENV_ACCOUNT_ID; -exports.ENV_CREDENTIAL_SCOPE = ENV_CREDENTIAL_SCOPE; -exports.ENV_EXPIRATION = ENV_EXPIRATION; -exports.ENV_KEY = ENV_KEY; -exports.ENV_SECRET = ENV_SECRET; -exports.ENV_SESSION = ENV_SESSION; -exports.fromEnv = fromEnv; - - /***/ }), /***/ 5861: @@ -8219,7 +8170,7 @@ exports.fromEnv = fromEnv; "use strict"; -var credentialProviderEnv = __nccwpck_require__(5606); +var credentialProviderEnv = __nccwpck_require__(6153); var propertyProvider = __nccwpck_require__(1238); var sharedIniFileLoader = __nccwpck_require__(4964); @@ -8369,6 +8320,55 @@ exports.credentialsWillNeedRefresh = credentialsWillNeedRefresh; exports.defaultProvider = defaultProvider; +/***/ }), + +/***/ 6153: +/***/ ((__unused_webpack_module, exports, __nccwpck_require__) => { + +"use strict"; + + +var client = __nccwpck_require__(5152); +var propertyProvider = __nccwpck_require__(1238); + +const ENV_KEY = "AWS_ACCESS_KEY_ID"; +const ENV_SECRET = "AWS_SECRET_ACCESS_KEY"; +const ENV_SESSION = "AWS_SESSION_TOKEN"; +const ENV_EXPIRATION = "AWS_CREDENTIAL_EXPIRATION"; +const ENV_CREDENTIAL_SCOPE = "AWS_CREDENTIAL_SCOPE"; +const ENV_ACCOUNT_ID = "AWS_ACCOUNT_ID"; +const fromEnv = (init) => async () => { + init?.logger?.debug("@aws-sdk/credential-provider-env - fromEnv"); + const accessKeyId = process.env[ENV_KEY]; + const secretAccessKey = process.env[ENV_SECRET]; + const sessionToken = process.env[ENV_SESSION]; + const expiry = process.env[ENV_EXPIRATION]; + const credentialScope = process.env[ENV_CREDENTIAL_SCOPE]; + const accountId = process.env[ENV_ACCOUNT_ID]; + if (accessKeyId && secretAccessKey) { + const credentials = { + accessKeyId, + secretAccessKey, + ...(sessionToken && { sessionToken }), + ...(expiry && { expiration: new Date(expiry) }), + ...(credentialScope && { credentialScope }), + ...(accountId && { accountId }), + }; + client.setCredentialFeature(credentials, "CREDENTIALS_ENV_VARS", "g"); + return credentials; + } + throw new propertyProvider.CredentialsProviderError("Unable to find environment variable credentials.", { logger: init?.logger }); +}; + +exports.ENV_ACCOUNT_ID = ENV_ACCOUNT_ID; +exports.ENV_CREDENTIAL_SCOPE = ENV_CREDENTIAL_SCOPE; +exports.ENV_EXPIRATION = ENV_EXPIRATION; +exports.ENV_KEY = ENV_KEY; +exports.ENV_SECRET = ENV_SECRET; +exports.ENV_SESSION = ENV_SESSION; +exports.fromEnv = fromEnv; + + /***/ }), /***/ 2590: @@ -11547,6 +11547,9 @@ class HttpBindingProtocol extends HttpProtocol { } } } + else if (nonHttpBindingMembers.discardResponseBody) { + await collectBody(response.body, context); + } dataObject.$metadata = this.deserializeMetadata(response); return dataObject; } @@ -11558,12 +11561,14 @@ class HttpBindingProtocol extends HttpProtocol { else { dataObject = arg4; } + let discardResponseBody = true; const deserializer = this.deserializer; const ns = schema.NormalizedSchema.of(schema$1); const nonHttpBindingMembers = []; for (const [memberName, memberSchema] of ns.structIterator()) { const memberTraits = memberSchema.getMemberTraits(); if (memberTraits.httpPayload) { + discardResponseBody = false; const isStreaming = memberSchema.isStreaming(); if (isStreaming) { const isEventStream = memberSchema.isStructSchema(); @@ -11627,6 +11632,7 @@ class HttpBindingProtocol extends HttpProtocol { nonHttpBindingMembers.push(memberName); } } + nonHttpBindingMembers.discardResponseBody = discardResponseBody; return nonHttpBindingMembers; } } diff --git a/dist/index.js b/dist/index.js index 9d2d8a5..9e2a46d 100644 --- a/dist/index.js +++ b/dist/index.js @@ -9023,55 +9023,6 @@ exports.parseXmlBody = parseXmlBody; exports.parseXmlErrorBody = parseXmlErrorBody; -/***/ }), - -/***/ 5606: -/***/ ((__unused_webpack_module, exports, __nccwpck_require__) => { - -"use strict"; - - -var client = __nccwpck_require__(5152); -var propertyProvider = __nccwpck_require__(1238); - -const ENV_KEY = "AWS_ACCESS_KEY_ID"; -const ENV_SECRET = "AWS_SECRET_ACCESS_KEY"; -const ENV_SESSION = "AWS_SESSION_TOKEN"; -const ENV_EXPIRATION = "AWS_CREDENTIAL_EXPIRATION"; -const ENV_CREDENTIAL_SCOPE = "AWS_CREDENTIAL_SCOPE"; -const ENV_ACCOUNT_ID = "AWS_ACCOUNT_ID"; -const fromEnv = (init) => async () => { - init?.logger?.debug("@aws-sdk/credential-provider-env - fromEnv"); - const accessKeyId = process.env[ENV_KEY]; - const secretAccessKey = process.env[ENV_SECRET]; - const sessionToken = process.env[ENV_SESSION]; - const expiry = process.env[ENV_EXPIRATION]; - const credentialScope = process.env[ENV_CREDENTIAL_SCOPE]; - const accountId = process.env[ENV_ACCOUNT_ID]; - if (accessKeyId && secretAccessKey) { - const credentials = { - accessKeyId, - secretAccessKey, - ...(sessionToken && { sessionToken }), - ...(expiry && { expiration: new Date(expiry) }), - ...(credentialScope && { credentialScope }), - ...(accountId && { accountId }), - }; - client.setCredentialFeature(credentials, "CREDENTIALS_ENV_VARS", "g"); - return credentials; - } - throw new propertyProvider.CredentialsProviderError("Unable to find environment variable credentials.", { logger: init?.logger }); -}; - -exports.ENV_ACCOUNT_ID = ENV_ACCOUNT_ID; -exports.ENV_CREDENTIAL_SCOPE = ENV_CREDENTIAL_SCOPE; -exports.ENV_EXPIRATION = ENV_EXPIRATION; -exports.ENV_KEY = ENV_KEY; -exports.ENV_SECRET = ENV_SECRET; -exports.ENV_SESSION = ENV_SESSION; -exports.fromEnv = fromEnv; - - /***/ }), /***/ 5861: @@ -9080,7 +9031,7 @@ exports.fromEnv = fromEnv; "use strict"; -var credentialProviderEnv = __nccwpck_require__(5606); +var credentialProviderEnv = __nccwpck_require__(6153); var propertyProvider = __nccwpck_require__(1238); var sharedIniFileLoader = __nccwpck_require__(4964); @@ -9230,6 +9181,55 @@ exports.credentialsWillNeedRefresh = credentialsWillNeedRefresh; exports.defaultProvider = defaultProvider; +/***/ }), + +/***/ 6153: +/***/ ((__unused_webpack_module, exports, __nccwpck_require__) => { + +"use strict"; + + +var client = __nccwpck_require__(5152); +var propertyProvider = __nccwpck_require__(1238); + +const ENV_KEY = "AWS_ACCESS_KEY_ID"; +const ENV_SECRET = "AWS_SECRET_ACCESS_KEY"; +const ENV_SESSION = "AWS_SESSION_TOKEN"; +const ENV_EXPIRATION = "AWS_CREDENTIAL_EXPIRATION"; +const ENV_CREDENTIAL_SCOPE = "AWS_CREDENTIAL_SCOPE"; +const ENV_ACCOUNT_ID = "AWS_ACCOUNT_ID"; +const fromEnv = (init) => async () => { + init?.logger?.debug("@aws-sdk/credential-provider-env - fromEnv"); + const accessKeyId = process.env[ENV_KEY]; + const secretAccessKey = process.env[ENV_SECRET]; + const sessionToken = process.env[ENV_SESSION]; + const expiry = process.env[ENV_EXPIRATION]; + const credentialScope = process.env[ENV_CREDENTIAL_SCOPE]; + const accountId = process.env[ENV_ACCOUNT_ID]; + if (accessKeyId && secretAccessKey) { + const credentials = { + accessKeyId, + secretAccessKey, + ...(sessionToken && { sessionToken }), + ...(expiry && { expiration: new Date(expiry) }), + ...(credentialScope && { credentialScope }), + ...(accountId && { accountId }), + }; + client.setCredentialFeature(credentials, "CREDENTIALS_ENV_VARS", "g"); + return credentials; + } + throw new propertyProvider.CredentialsProviderError("Unable to find environment variable credentials.", { logger: init?.logger }); +}; + +exports.ENV_ACCOUNT_ID = ENV_ACCOUNT_ID; +exports.ENV_CREDENTIAL_SCOPE = ENV_CREDENTIAL_SCOPE; +exports.ENV_EXPIRATION = ENV_EXPIRATION; +exports.ENV_KEY = ENV_KEY; +exports.ENV_SECRET = ENV_SECRET; +exports.ENV_SESSION = ENV_SESSION; +exports.fromEnv = fromEnv; + + /***/ }), /***/ 2590: @@ -12408,6 +12408,9 @@ class HttpBindingProtocol extends HttpProtocol { } } } + else if (nonHttpBindingMembers.discardResponseBody) { + await collectBody(response.body, context); + } dataObject.$metadata = this.deserializeMetadata(response); return dataObject; } @@ -12419,12 +12422,14 @@ class HttpBindingProtocol extends HttpProtocol { else { dataObject = arg4; } + let discardResponseBody = true; const deserializer = this.deserializer; const ns = schema.NormalizedSchema.of(schema$1); const nonHttpBindingMembers = []; for (const [memberName, memberSchema] of ns.structIterator()) { const memberTraits = memberSchema.getMemberTraits(); if (memberTraits.httpPayload) { + discardResponseBody = false; const isStreaming = memberSchema.isStreaming(); if (isStreaming) { const isEventStream = memberSchema.isStructSchema(); @@ -12488,6 +12493,7 @@ class HttpBindingProtocol extends HttpProtocol { nonHttpBindingMembers.push(memberName); } } + nonHttpBindingMembers.discardResponseBody = discardResponseBody; return nonHttpBindingMembers; } }