cdk-ssm-secure-iam-access-key
Version:
Creates an IAM Access Key for a provided IAM User and stores the result in an SSM SecureString Parameter
30 lines (29 loc) • 1.45 kB
JavaScript
Object.defineProperty(exports, "__esModule", { value: true });
exports.AssumeRoleWithSAMLCommand = exports.$Command = void 0;
const middleware_endpoint_1 = require("@smithy/middleware-endpoint");
const middleware_serde_1 = require("@smithy/middleware-serde");
const smithy_client_1 = require("@smithy/smithy-client");
Object.defineProperty(exports, "$Command", { enumerable: true, get: function () { return smithy_client_1.Command; } });
const EndpointParameters_1 = require("../endpoint/EndpointParameters");
const models_0_1 = require("../models/models_0");
const Aws_query_1 = require("../protocols/Aws_query");
class AssumeRoleWithSAMLCommand extends smithy_client_1.Command
.classBuilder()
.ep({
...EndpointParameters_1.commonParams,
})
.m(function (Command, cs, config, o) {
return [
(0, middleware_serde_1.getSerdePlugin)(config, this.serialize, this.deserialize),
(0, middleware_endpoint_1.getEndpointPlugin)(config, Command.getEndpointParameterInstructions()),
];
})
.s("AWSSecurityTokenServiceV20110615", "AssumeRoleWithSAML", {})
.n("STSClient", "AssumeRoleWithSAMLCommand")
.f(models_0_1.AssumeRoleWithSAMLRequestFilterSensitiveLog, models_0_1.AssumeRoleWithSAMLResponseFilterSensitiveLog)
.ser(Aws_query_1.se_AssumeRoleWithSAMLCommand)
.de(Aws_query_1.de_AssumeRoleWithSAMLCommand)
.build() {
}
exports.AssumeRoleWithSAMLCommand = AssumeRoleWithSAMLCommand;
;