Initial
This commit is contained in:
8
resources/app/node_modules/@aws-sdk/middleware-bucket-endpoint/dist-es/NodeDisableMultiregionAccessPointConfigOptions.js
generated
vendored
Normal file
8
resources/app/node_modules/@aws-sdk/middleware-bucket-endpoint/dist-es/NodeDisableMultiregionAccessPointConfigOptions.js
generated
vendored
Normal file
@@ -0,0 +1,8 @@
|
||||
import { booleanSelector, SelectorType } from "@smithy/util-config-provider";
|
||||
export const NODE_DISABLE_MULTIREGION_ACCESS_POINT_ENV_NAME = "AWS_S3_DISABLE_MULTIREGION_ACCESS_POINTS";
|
||||
export const NODE_DISABLE_MULTIREGION_ACCESS_POINT_INI_NAME = "s3_disable_multiregion_access_points";
|
||||
export const NODE_DISABLE_MULTIREGION_ACCESS_POINT_CONFIG_OPTIONS = {
|
||||
environmentVariableSelector: (env) => booleanSelector(env, NODE_DISABLE_MULTIREGION_ACCESS_POINT_ENV_NAME, SelectorType.ENV),
|
||||
configFileSelector: (profile) => booleanSelector(profile, NODE_DISABLE_MULTIREGION_ACCESS_POINT_INI_NAME, SelectorType.CONFIG),
|
||||
default: false,
|
||||
};
|
||||
8
resources/app/node_modules/@aws-sdk/middleware-bucket-endpoint/dist-es/NodeUseArnRegionConfigOptions.js
generated
vendored
Normal file
8
resources/app/node_modules/@aws-sdk/middleware-bucket-endpoint/dist-es/NodeUseArnRegionConfigOptions.js
generated
vendored
Normal file
@@ -0,0 +1,8 @@
|
||||
import { booleanSelector, SelectorType } from "@smithy/util-config-provider";
|
||||
export const NODE_USE_ARN_REGION_ENV_NAME = "AWS_S3_USE_ARN_REGION";
|
||||
export const NODE_USE_ARN_REGION_INI_NAME = "s3_use_arn_region";
|
||||
export const NODE_USE_ARN_REGION_CONFIG_OPTIONS = {
|
||||
environmentVariableSelector: (env) => booleanSelector(env, NODE_USE_ARN_REGION_ENV_NAME, SelectorType.ENV),
|
||||
configFileSelector: (profile) => booleanSelector(profile, NODE_USE_ARN_REGION_INI_NAME, SelectorType.CONFIG),
|
||||
default: false,
|
||||
};
|
||||
81
resources/app/node_modules/@aws-sdk/middleware-bucket-endpoint/dist-es/bucketEndpointMiddleware.js
generated
vendored
Normal file
81
resources/app/node_modules/@aws-sdk/middleware-bucket-endpoint/dist-es/bucketEndpointMiddleware.js
generated
vendored
Normal file
@@ -0,0 +1,81 @@
|
||||
import { parse as parseArn, validate as validateArn } from "@aws-sdk/util-arn-parser";
|
||||
import { HttpRequest } from "@smithy/protocol-http";
|
||||
import { bucketHostname } from "./bucketHostname";
|
||||
export const bucketEndpointMiddleware = (options) => (next, context) => async (args) => {
|
||||
const { Bucket: bucketName } = args.input;
|
||||
let replaceBucketInPath = options.bucketEndpoint;
|
||||
const request = args.request;
|
||||
if (HttpRequest.isInstance(request)) {
|
||||
if (options.bucketEndpoint) {
|
||||
request.hostname = bucketName;
|
||||
}
|
||||
else if (validateArn(bucketName)) {
|
||||
const bucketArn = parseArn(bucketName);
|
||||
const clientRegion = await options.region();
|
||||
const useDualstackEndpoint = await options.useDualstackEndpoint();
|
||||
const useFipsEndpoint = await options.useFipsEndpoint();
|
||||
const { partition, signingRegion = clientRegion } = (await options.regionInfoProvider(clientRegion, { useDualstackEndpoint, useFipsEndpoint })) || {};
|
||||
const useArnRegion = await options.useArnRegion();
|
||||
const { hostname, bucketEndpoint, signingRegion: modifiedSigningRegion, signingService, } = bucketHostname({
|
||||
bucketName: bucketArn,
|
||||
baseHostname: request.hostname,
|
||||
accelerateEndpoint: options.useAccelerateEndpoint,
|
||||
dualstackEndpoint: useDualstackEndpoint,
|
||||
fipsEndpoint: useFipsEndpoint,
|
||||
pathStyleEndpoint: options.forcePathStyle,
|
||||
tlsCompatible: request.protocol === "https:",
|
||||
useArnRegion,
|
||||
clientPartition: partition,
|
||||
clientSigningRegion: signingRegion,
|
||||
clientRegion: clientRegion,
|
||||
isCustomEndpoint: options.isCustomEndpoint,
|
||||
disableMultiregionAccessPoints: await options.disableMultiregionAccessPoints(),
|
||||
});
|
||||
if (modifiedSigningRegion && modifiedSigningRegion !== signingRegion) {
|
||||
context["signing_region"] = modifiedSigningRegion;
|
||||
}
|
||||
if (signingService && signingService !== "s3") {
|
||||
context["signing_service"] = signingService;
|
||||
}
|
||||
request.hostname = hostname;
|
||||
replaceBucketInPath = bucketEndpoint;
|
||||
}
|
||||
else {
|
||||
const clientRegion = await options.region();
|
||||
const dualstackEndpoint = await options.useDualstackEndpoint();
|
||||
const fipsEndpoint = await options.useFipsEndpoint();
|
||||
const { hostname, bucketEndpoint } = bucketHostname({
|
||||
bucketName,
|
||||
clientRegion,
|
||||
baseHostname: request.hostname,
|
||||
accelerateEndpoint: options.useAccelerateEndpoint,
|
||||
dualstackEndpoint,
|
||||
fipsEndpoint,
|
||||
pathStyleEndpoint: options.forcePathStyle,
|
||||
tlsCompatible: request.protocol === "https:",
|
||||
isCustomEndpoint: options.isCustomEndpoint,
|
||||
});
|
||||
request.hostname = hostname;
|
||||
replaceBucketInPath = bucketEndpoint;
|
||||
}
|
||||
if (replaceBucketInPath) {
|
||||
request.path = request.path.replace(/^(\/)?[^\/]+/, "");
|
||||
if (request.path === "") {
|
||||
request.path = "/";
|
||||
}
|
||||
}
|
||||
}
|
||||
return next({ ...args, request });
|
||||
};
|
||||
export const bucketEndpointMiddlewareOptions = {
|
||||
tags: ["BUCKET_ENDPOINT"],
|
||||
name: "bucketEndpointMiddleware",
|
||||
relation: "before",
|
||||
toMiddleware: "hostHeaderMiddleware",
|
||||
override: true,
|
||||
};
|
||||
export const getBucketEndpointPlugin = (options) => ({
|
||||
applyToStack: (clientStack) => {
|
||||
clientStack.addRelativeTo(bucketEndpointMiddleware(options), bucketEndpointMiddlewareOptions);
|
||||
},
|
||||
});
|
||||
124
resources/app/node_modules/@aws-sdk/middleware-bucket-endpoint/dist-es/bucketHostname.js
generated
vendored
Normal file
124
resources/app/node_modules/@aws-sdk/middleware-bucket-endpoint/dist-es/bucketHostname.js
generated
vendored
Normal file
@@ -0,0 +1,124 @@
|
||||
import { DOT_PATTERN, getArnResources, getSuffix, getSuffixForArnEndpoint, isBucketNameOptions, isDnsCompatibleBucketName, validateAccountId, validateArnEndpointOptions, validateCustomEndpoint, validateDNSHostLabel, validateMrapAlias, validateNoDualstack, validateNoFIPS, validateOutpostService, validatePartition, validateRegion, validateRegionalClient, validateS3Service, validateService, } from "./bucketHostnameUtils";
|
||||
export const bucketHostname = (options) => {
|
||||
validateCustomEndpoint(options);
|
||||
return isBucketNameOptions(options)
|
||||
?
|
||||
getEndpointFromBucketName(options)
|
||||
:
|
||||
getEndpointFromArn(options);
|
||||
};
|
||||
const getEndpointFromBucketName = ({ accelerateEndpoint = false, clientRegion: region, baseHostname, bucketName, dualstackEndpoint = false, fipsEndpoint = false, pathStyleEndpoint = false, tlsCompatible = true, isCustomEndpoint = false, }) => {
|
||||
const [clientRegion, hostnameSuffix] = isCustomEndpoint ? [region, baseHostname] : getSuffix(baseHostname);
|
||||
if (pathStyleEndpoint || !isDnsCompatibleBucketName(bucketName) || (tlsCompatible && DOT_PATTERN.test(bucketName))) {
|
||||
return {
|
||||
bucketEndpoint: false,
|
||||
hostname: dualstackEndpoint ? `s3.dualstack.${clientRegion}.${hostnameSuffix}` : baseHostname,
|
||||
};
|
||||
}
|
||||
if (accelerateEndpoint) {
|
||||
baseHostname = `s3-accelerate${dualstackEndpoint ? ".dualstack" : ""}.${hostnameSuffix}`;
|
||||
}
|
||||
else if (dualstackEndpoint) {
|
||||
baseHostname = `s3.dualstack.${clientRegion}.${hostnameSuffix}`;
|
||||
}
|
||||
return {
|
||||
bucketEndpoint: true,
|
||||
hostname: `${bucketName}.${baseHostname}`,
|
||||
};
|
||||
};
|
||||
const getEndpointFromArn = (options) => {
|
||||
const { isCustomEndpoint, baseHostname, clientRegion } = options;
|
||||
const hostnameSuffix = isCustomEndpoint ? baseHostname : getSuffixForArnEndpoint(baseHostname)[1];
|
||||
const { pathStyleEndpoint, accelerateEndpoint = false, fipsEndpoint = false, tlsCompatible = true, bucketName, clientPartition = "aws", } = options;
|
||||
validateArnEndpointOptions({ pathStyleEndpoint, accelerateEndpoint, tlsCompatible });
|
||||
const { service, partition, accountId, region, resource } = bucketName;
|
||||
validateService(service);
|
||||
validatePartition(partition, { clientPartition });
|
||||
validateAccountId(accountId);
|
||||
const { accesspointName, outpostId } = getArnResources(resource);
|
||||
if (service === "s3-object-lambda") {
|
||||
return getEndpointFromObjectLambdaArn({ ...options, tlsCompatible, bucketName, accesspointName, hostnameSuffix });
|
||||
}
|
||||
if (region === "") {
|
||||
return getEndpointFromMRAPArn({ ...options, clientRegion, mrapAlias: accesspointName, hostnameSuffix });
|
||||
}
|
||||
if (outpostId) {
|
||||
return getEndpointFromOutpostArn({ ...options, clientRegion, outpostId, accesspointName, hostnameSuffix });
|
||||
}
|
||||
return getEndpointFromAccessPointArn({ ...options, clientRegion, accesspointName, hostnameSuffix });
|
||||
};
|
||||
const getEndpointFromObjectLambdaArn = ({ dualstackEndpoint = false, fipsEndpoint = false, tlsCompatible = true, useArnRegion, clientRegion, clientSigningRegion = clientRegion, accesspointName, bucketName, hostnameSuffix, }) => {
|
||||
const { accountId, region, service } = bucketName;
|
||||
validateRegionalClient(clientRegion);
|
||||
validateRegion(region, {
|
||||
useArnRegion,
|
||||
clientRegion,
|
||||
clientSigningRegion,
|
||||
allowFipsRegion: true,
|
||||
useFipsEndpoint: fipsEndpoint,
|
||||
});
|
||||
validateNoDualstack(dualstackEndpoint);
|
||||
const DNSHostLabel = `${accesspointName}-${accountId}`;
|
||||
validateDNSHostLabel(DNSHostLabel, { tlsCompatible });
|
||||
const endpointRegion = useArnRegion ? region : clientRegion;
|
||||
const signingRegion = useArnRegion ? region : clientSigningRegion;
|
||||
return {
|
||||
bucketEndpoint: true,
|
||||
hostname: `${DNSHostLabel}.${service}${fipsEndpoint ? "-fips" : ""}.${endpointRegion}.${hostnameSuffix}`,
|
||||
signingRegion,
|
||||
signingService: service,
|
||||
};
|
||||
};
|
||||
const getEndpointFromMRAPArn = ({ disableMultiregionAccessPoints, dualstackEndpoint = false, isCustomEndpoint, mrapAlias, hostnameSuffix, }) => {
|
||||
if (disableMultiregionAccessPoints === true) {
|
||||
throw new Error("SDK is attempting to use a MRAP ARN. Please enable to feature.");
|
||||
}
|
||||
validateMrapAlias(mrapAlias);
|
||||
validateNoDualstack(dualstackEndpoint);
|
||||
return {
|
||||
bucketEndpoint: true,
|
||||
hostname: `${mrapAlias}${isCustomEndpoint ? "" : `.accesspoint.s3-global`}.${hostnameSuffix}`,
|
||||
signingRegion: "*",
|
||||
};
|
||||
};
|
||||
const getEndpointFromOutpostArn = ({ useArnRegion, clientRegion, clientSigningRegion = clientRegion, bucketName, outpostId, dualstackEndpoint = false, fipsEndpoint = false, tlsCompatible = true, accesspointName, isCustomEndpoint, hostnameSuffix, }) => {
|
||||
validateRegionalClient(clientRegion);
|
||||
validateRegion(bucketName.region, { useArnRegion, clientRegion, clientSigningRegion, useFipsEndpoint: fipsEndpoint });
|
||||
const DNSHostLabel = `${accesspointName}-${bucketName.accountId}`;
|
||||
validateDNSHostLabel(DNSHostLabel, { tlsCompatible });
|
||||
const endpointRegion = useArnRegion ? bucketName.region : clientRegion;
|
||||
const signingRegion = useArnRegion ? bucketName.region : clientSigningRegion;
|
||||
validateOutpostService(bucketName.service);
|
||||
validateDNSHostLabel(outpostId, { tlsCompatible });
|
||||
validateNoDualstack(dualstackEndpoint);
|
||||
validateNoFIPS(fipsEndpoint);
|
||||
const hostnamePrefix = `${DNSHostLabel}.${outpostId}`;
|
||||
return {
|
||||
bucketEndpoint: true,
|
||||
hostname: `${hostnamePrefix}${isCustomEndpoint ? "" : `.s3-outposts.${endpointRegion}`}.${hostnameSuffix}`,
|
||||
signingRegion,
|
||||
signingService: "s3-outposts",
|
||||
};
|
||||
};
|
||||
const getEndpointFromAccessPointArn = ({ useArnRegion, clientRegion, clientSigningRegion = clientRegion, bucketName, dualstackEndpoint = false, fipsEndpoint = false, tlsCompatible = true, accesspointName, isCustomEndpoint, hostnameSuffix, }) => {
|
||||
validateRegionalClient(clientRegion);
|
||||
validateRegion(bucketName.region, {
|
||||
useArnRegion,
|
||||
clientRegion,
|
||||
clientSigningRegion,
|
||||
allowFipsRegion: true,
|
||||
useFipsEndpoint: fipsEndpoint,
|
||||
});
|
||||
const hostnamePrefix = `${accesspointName}-${bucketName.accountId}`;
|
||||
validateDNSHostLabel(hostnamePrefix, { tlsCompatible });
|
||||
const endpointRegion = useArnRegion ? bucketName.region : clientRegion;
|
||||
const signingRegion = useArnRegion ? bucketName.region : clientSigningRegion;
|
||||
validateS3Service(bucketName.service);
|
||||
return {
|
||||
bucketEndpoint: true,
|
||||
hostname: `${hostnamePrefix}${isCustomEndpoint
|
||||
? ""
|
||||
: `.s3-accesspoint${fipsEndpoint ? "-fips" : ""}${dualstackEndpoint ? ".dualstack" : ""}.${endpointRegion}`}.${hostnameSuffix}`,
|
||||
signingRegion,
|
||||
};
|
||||
};
|
||||
132
resources/app/node_modules/@aws-sdk/middleware-bucket-endpoint/dist-es/bucketHostnameUtils.js
generated
vendored
Normal file
132
resources/app/node_modules/@aws-sdk/middleware-bucket-endpoint/dist-es/bucketHostnameUtils.js
generated
vendored
Normal file
@@ -0,0 +1,132 @@
|
||||
const DOMAIN_PATTERN = /^[a-z0-9][a-z0-9\.\-]{1,61}[a-z0-9]$/;
|
||||
const IP_ADDRESS_PATTERN = /(\d+\.){3}\d+/;
|
||||
const DOTS_PATTERN = /\.\./;
|
||||
export const DOT_PATTERN = /\./;
|
||||
export const S3_HOSTNAME_PATTERN = /^(.+\.)?s3(-fips)?(\.dualstack)?[.-]([a-z0-9-]+)\./;
|
||||
const S3_US_EAST_1_ALTNAME_PATTERN = /^s3(-external-1)?\.amazonaws\.com$/;
|
||||
const AWS_PARTITION_SUFFIX = "amazonaws.com";
|
||||
export const isBucketNameOptions = (options) => typeof options.bucketName === "string";
|
||||
export const isDnsCompatibleBucketName = (bucketName) => DOMAIN_PATTERN.test(bucketName) && !IP_ADDRESS_PATTERN.test(bucketName) && !DOTS_PATTERN.test(bucketName);
|
||||
const getRegionalSuffix = (hostname) => {
|
||||
const parts = hostname.match(S3_HOSTNAME_PATTERN);
|
||||
return [parts[4], hostname.replace(new RegExp(`^${parts[0]}`), "")];
|
||||
};
|
||||
export const getSuffix = (hostname) => S3_US_EAST_1_ALTNAME_PATTERN.test(hostname) ? ["us-east-1", AWS_PARTITION_SUFFIX] : getRegionalSuffix(hostname);
|
||||
export const getSuffixForArnEndpoint = (hostname) => S3_US_EAST_1_ALTNAME_PATTERN.test(hostname)
|
||||
? [hostname.replace(`.${AWS_PARTITION_SUFFIX}`, ""), AWS_PARTITION_SUFFIX]
|
||||
: getRegionalSuffix(hostname);
|
||||
export const validateArnEndpointOptions = (options) => {
|
||||
if (options.pathStyleEndpoint) {
|
||||
throw new Error("Path-style S3 endpoint is not supported when bucket is an ARN");
|
||||
}
|
||||
if (options.accelerateEndpoint) {
|
||||
throw new Error("Accelerate endpoint is not supported when bucket is an ARN");
|
||||
}
|
||||
if (!options.tlsCompatible) {
|
||||
throw new Error("HTTPS is required when bucket is an ARN");
|
||||
}
|
||||
};
|
||||
export const validateService = (service) => {
|
||||
if (service !== "s3" && service !== "s3-outposts" && service !== "s3-object-lambda") {
|
||||
throw new Error("Expect 's3' or 's3-outposts' or 's3-object-lambda' in ARN service component");
|
||||
}
|
||||
};
|
||||
export const validateS3Service = (service) => {
|
||||
if (service !== "s3") {
|
||||
throw new Error("Expect 's3' in Accesspoint ARN service component");
|
||||
}
|
||||
};
|
||||
export const validateOutpostService = (service) => {
|
||||
if (service !== "s3-outposts") {
|
||||
throw new Error("Expect 's3-posts' in Outpost ARN service component");
|
||||
}
|
||||
};
|
||||
export const validatePartition = (partition, options) => {
|
||||
if (partition !== options.clientPartition) {
|
||||
throw new Error(`Partition in ARN is incompatible, got "${partition}" but expected "${options.clientPartition}"`);
|
||||
}
|
||||
};
|
||||
export const validateRegion = (region, options) => {
|
||||
if (region === "") {
|
||||
throw new Error("ARN region is empty");
|
||||
}
|
||||
if (options.useFipsEndpoint) {
|
||||
if (!options.allowFipsRegion) {
|
||||
throw new Error("FIPS region is not supported");
|
||||
}
|
||||
else if (!isEqualRegions(region, options.clientRegion)) {
|
||||
throw new Error(`Client FIPS region ${options.clientRegion} doesn't match region ${region} in ARN`);
|
||||
}
|
||||
}
|
||||
if (!options.useArnRegion &&
|
||||
!isEqualRegions(region, options.clientRegion || "") &&
|
||||
!isEqualRegions(region, options.clientSigningRegion || "")) {
|
||||
throw new Error(`Region in ARN is incompatible, got ${region} but expected ${options.clientRegion}`);
|
||||
}
|
||||
};
|
||||
export const validateRegionalClient = (region) => {
|
||||
if (["s3-external-1", "aws-global"].includes(region)) {
|
||||
throw new Error(`Client region ${region} is not regional`);
|
||||
}
|
||||
};
|
||||
const isEqualRegions = (regionA, regionB) => regionA === regionB;
|
||||
export const validateAccountId = (accountId) => {
|
||||
if (!/[0-9]{12}/.exec(accountId)) {
|
||||
throw new Error("Access point ARN accountID does not match regex '[0-9]{12}'");
|
||||
}
|
||||
};
|
||||
export const validateDNSHostLabel = (label, options = { tlsCompatible: true }) => {
|
||||
if (label.length >= 64 ||
|
||||
!/^[a-z0-9][a-z0-9.-]*[a-z0-9]$/.test(label) ||
|
||||
/(\d+\.){3}\d+/.test(label) ||
|
||||
/[.-]{2}/.test(label) ||
|
||||
(options?.tlsCompatible && DOT_PATTERN.test(label))) {
|
||||
throw new Error(`Invalid DNS label ${label}`);
|
||||
}
|
||||
};
|
||||
export const validateCustomEndpoint = (options) => {
|
||||
if (options.isCustomEndpoint) {
|
||||
if (options.dualstackEndpoint)
|
||||
throw new Error("Dualstack endpoint is not supported with custom endpoint");
|
||||
if (options.accelerateEndpoint)
|
||||
throw new Error("Accelerate endpoint is not supported with custom endpoint");
|
||||
}
|
||||
};
|
||||
export const getArnResources = (resource) => {
|
||||
const delimiter = resource.includes(":") ? ":" : "/";
|
||||
const [resourceType, ...rest] = resource.split(delimiter);
|
||||
if (resourceType === "accesspoint") {
|
||||
if (rest.length !== 1 || rest[0] === "") {
|
||||
throw new Error(`Access Point ARN should have one resource accesspoint${delimiter}{accesspointname}`);
|
||||
}
|
||||
return { accesspointName: rest[0] };
|
||||
}
|
||||
else if (resourceType === "outpost") {
|
||||
if (!rest[0] || rest[1] !== "accesspoint" || !rest[2] || rest.length !== 3) {
|
||||
throw new Error(`Outpost ARN should have resource outpost${delimiter}{outpostId}${delimiter}accesspoint${delimiter}{accesspointName}`);
|
||||
}
|
||||
const [outpostId, _, accesspointName] = rest;
|
||||
return { outpostId, accesspointName };
|
||||
}
|
||||
else {
|
||||
throw new Error(`ARN resource should begin with 'accesspoint${delimiter}' or 'outpost${delimiter}'`);
|
||||
}
|
||||
};
|
||||
export const validateNoDualstack = (dualstackEndpoint) => {
|
||||
if (dualstackEndpoint)
|
||||
throw new Error("Dualstack endpoint is not supported with Outpost or Multi-region Access Point ARN.");
|
||||
};
|
||||
export const validateNoFIPS = (useFipsEndpoint) => {
|
||||
if (useFipsEndpoint)
|
||||
throw new Error(`FIPS region is not supported with Outpost.`);
|
||||
};
|
||||
export const validateMrapAlias = (name) => {
|
||||
try {
|
||||
name.split(".").forEach((label) => {
|
||||
validateDNSHostLabel(label);
|
||||
});
|
||||
}
|
||||
catch (e) {
|
||||
throw new Error(`"${name}" is not a DNS compatible name.`);
|
||||
}
|
||||
};
|
||||
13
resources/app/node_modules/@aws-sdk/middleware-bucket-endpoint/dist-es/configurations.js
generated
vendored
Normal file
13
resources/app/node_modules/@aws-sdk/middleware-bucket-endpoint/dist-es/configurations.js
generated
vendored
Normal file
@@ -0,0 +1,13 @@
|
||||
export function resolveBucketEndpointConfig(input) {
|
||||
const { bucketEndpoint = false, forcePathStyle = false, useAccelerateEndpoint = false, useArnRegion = false, disableMultiregionAccessPoints = false, } = input;
|
||||
return {
|
||||
...input,
|
||||
bucketEndpoint,
|
||||
forcePathStyle,
|
||||
useAccelerateEndpoint,
|
||||
useArnRegion: typeof useArnRegion === "function" ? useArnRegion : () => Promise.resolve(useArnRegion),
|
||||
disableMultiregionAccessPoints: typeof disableMultiregionAccessPoints === "function"
|
||||
? disableMultiregionAccessPoints
|
||||
: () => Promise.resolve(disableMultiregionAccessPoints),
|
||||
};
|
||||
}
|
||||
6
resources/app/node_modules/@aws-sdk/middleware-bucket-endpoint/dist-es/index.js
generated
vendored
Normal file
6
resources/app/node_modules/@aws-sdk/middleware-bucket-endpoint/dist-es/index.js
generated
vendored
Normal file
@@ -0,0 +1,6 @@
|
||||
export * from "./NodeDisableMultiregionAccessPointConfigOptions";
|
||||
export * from "./NodeUseArnRegionConfigOptions";
|
||||
export * from "./bucketEndpointMiddleware";
|
||||
export * from "./bucketHostname";
|
||||
export * from "./configurations";
|
||||
export { getArnResources, getSuffixForArnEndpoint, validateOutpostService, validatePartition, validateAccountId, validateRegion, validateDNSHostLabel, validateNoDualstack, validateNoFIPS, } from "./bucketHostnameUtils";
|
||||
Reference in New Issue
Block a user