@agentlang/lstudio 0.4.9 → 0.5.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/assets/{index-DlR52aIS.js → index-0JmHOPsf.js} +1 -1
- package/assets/{index-D4z_hbl0-DVb0XdF1.js → index-D4z_hbl0-MSJ43mR7.js} +1 -1
- package/assets/{index-C3_OVcss.js → index-DPVspNVL.js} +1 -1
- package/assets/{index-CzBJT8iQ.js → index-Dt_ETtFl.js} +1 -1
- package/assets/{index-B_J_G8RH.js → index-V-xWzSNb.js} +263 -201
- package/assets/{index-DB0LQhhO.js → index-nAh4PLWc.js} +1 -1
- package/assets/{index.browser-DNJ60IWS.js → index.browser-lOmG7_PN.js} +3 -3
- package/assets/{loadCognitoIdentity-B6WTsNhm.js → loadCognitoIdentity-DZFjtemX.js} +1 -1
- package/assets/{loadSts-CEybG6x8.js → loadSts-ByIZDCSr.js} +1 -1
- package/assets/{replService-Clm5yIgf.js → replService-BZQN4pqx.js} +1 -1
- package/assets/{resolveDefaultsModeConfig-CdugAlDm.js → resolveDefaultsModeConfig-tQhK1DqL.js} +1 -1
- package/assets/{util-DtOepkNk.js → util-BtFUhH79.js} +1 -1
- package/assets/{winston-1qzyIKCb-CBXeuxcc.js → winston-1qzyIKCb-DDRDQd62.js} +1 -1
- package/assets/{winston-CtxF18qc-DNwFpHfg.js → winston-CtxF18qc-BdIq9r55.js} +1 -1
- package/assets/{winston-YCU5q-9s.js → winston-WF_w71lY.js} +1 -1
- package/assets/{winston-CEk0FIBZ.js → winston-dEjhd1YE.js} +1 -1
- package/index.html +1 -1
- package/package.json +1 -1
|
@@ -1 +1 @@
|
|
|
1
|
-
import{r as Pe,a as ye,A as Ae,b as ve,c as Ie,g as Re,d as Ce,e as xe,k as De,f as be,h as _e,i as Te,j as ke,s as N}from"./index-DlR52aIS.js";import{n as ee,k as we,E as We,r as $e,c as Ue,p as He,l as Fe,o as Oe,q as Le,s as je,D as Me,t as Ne,u as Ke,w as qe,x as ze,y as Ge,z as Ve,A as Be,B as Qe,C as Je,F as Xe,G as Ye,H as Ze,I as et,J as tt,K as nt,M as ot,O as st,P as it,U as rt,Q as at,V as ct,T as P,W as dt,X as lt}from"./resolveDefaultsModeConfig-CdugAlDm.js";import{b as ut,i as pt,t as mt,f as gt,s as ht,F as ft}from"./normalizeProvider-CtDY37Q6.js";import"./preload-helper-BlTxHScW.js";import"./index-B_J_G8RH.js";import"./_commonjsHelpers-D6-XlEtG.js";import"./index-ChvoNxcO.js";import"./__vite-browser-external-DLjrMatA.js";import"./inherits_browser-nmOknR35-Bp0mvRSL.js";import"./index-6mKfgpcs-DsgiI2lM.js";import"./_commonjsHelpers-B4e78b8K-W3E8ocG7.js";import"./index-DsIu-45t-Bejjlpz4.js";import"./index-DSosZ5sh-Ceejs_jv.js";import"./index-69shuAsh-DF18H7zf.js";import"./index-BJBOx-Z---hbiLl7B.js";import"./index.browser-BHPvGrwi-6Mh8eUw-.js";import"./_commonjs-dynamic-modules-BpilXLfW-DfYEAvWy.js";import"./_commonjs-dynamic-modules-DkOKMH7F.js";function St(){return async()=>"us-east-1"}const Et=async(e,t,i)=>({operation:we(t).operation,region:await ee(e.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()});function Pt(e){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"sts",region:e.region},propertiesExtractor:(t,i)=>({signingProperties:{config:t,context:i}})}}function yt(e){return{schemeId:"smithy.api#noAuth"}}const At=e=>{const t=[];switch(e.operation){case"AssumeRoleWithWebIdentity":{t.push(yt());break}default:t.push(Pt(e))}return t},vt=e=>Object.assign(e,{stsClientCtor:ue}),It=e=>{const t=vt(e),i=Pe(t);return Object.assign(i,{authSchemePreference:ee(e.authSchemePreference??[])})},Rt=e=>Object.assign(e,{useDualstackEndpoint:e.useDualstackEndpoint??!1,useFipsEndpoint:e.useFipsEndpoint??!1,useGlobalEndpoint:e.useGlobalEndpoint??!1,defaultSigningName:"sts"}),Ct={UseGlobalEndpoint:{type:"builtInParams",name:"useGlobalEndpoint"},UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}},xt="3.974.0",Dt={version:xt},te="required",n="type",o="fn",s="argv",y="ref",K=!1,w=!0,E="booleanEquals",l="stringEquals",ne="sigv4",oe="sts",se="us-east-1",a="endpoint",q="https://sts.{Region}.{PartitionResult#dnsSuffix}",h="tree",D="error",$="getAttr",z={[te]:!1,[n]:"string"},W={[te]:!0,default:!1,[n]:"boolean"},ie={[y]:"Endpoint"},G={[o]:"isSet",[s]:[{[y]:"Region"}]},u={[y]:"Region"},V={[o]:"aws.partition",[s]:[u],assign:"PartitionResult"},re={[y]:"UseFIPS"},ae={[y]:"UseDualStack"},p={url:"https://sts.amazonaws.com",properties:{authSchemes:[{name:ne,signingName:oe,signingRegion:se}]},headers:{}},m={},B={conditions:[{[o]:l,[s]:[u,"aws-global"]}],[a]:p,[n]:a},ce={[o]:E,[s]:[re,!0]},de={[o]:E,[s]:[ae,!0]},Q={[o]:$,[s]:[{[y]:"PartitionResult"},"supportsFIPS"]},le={[y]:"PartitionResult"},J={[o]:E,[s]:[!0,{[o]:$,[s]:[le,"supportsDualStack"]}]},X=[{[o]:"isSet",[s]:[ie]}],Y=[ce],Z=[de],bt={parameters:{Region:z,UseDualStack:W,UseFIPS:W,Endpoint:z,UseGlobalEndpoint:W},rules:[{conditions:[{[o]:E,[s]:[{[y]:"UseGlobalEndpoint"},w]},{[o]:"not",[s]:X},G,V,{[o]:E,[s]:[re,K]},{[o]:E,[s]:[ae,K]}],rules:[{conditions:[{[o]:l,[s]:[u,"ap-northeast-1"]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,"ap-south-1"]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,"ap-southeast-1"]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,"ap-southeast-2"]}],endpoint:p,[n]:a},B,{conditions:[{[o]:l,[s]:[u,"ca-central-1"]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,"eu-central-1"]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,"eu-north-1"]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,"eu-west-1"]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,"eu-west-2"]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,"eu-west-3"]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,"sa-east-1"]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,se]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,"us-east-2"]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,"us-west-1"]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,"us-west-2"]}],endpoint:p,[n]:a},{endpoint:{url:q,properties:{authSchemes:[{name:ne,signingName:oe,signingRegion:"{Region}"}]},headers:m},[n]:a}],[n]:h},{conditions:X,rules:[{conditions:Y,error:"Invalid Configuration: FIPS and custom endpoint are not supported",[n]:D},{conditions:Z,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",[n]:D},{endpoint:{url:ie,properties:m,headers:m},[n]:a}],[n]:h},{conditions:[G],rules:[{conditions:[V],rules:[{conditions:[ce,de],rules:[{conditions:[{[o]:E,[s]:[w,Q]},J],rules:[{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:m,headers:m},[n]:a}],[n]:h},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",[n]:D}],[n]:h},{conditions:Y,rules:[{conditions:[{[o]:E,[s]:[Q,w]}],rules:[{conditions:[{[o]:l,[s]:[{[o]:$,[s]:[le,"name"]},"aws-us-gov"]}],endpoint:{url:"https://sts.{Region}.amazonaws.com",properties:m,headers:m},[n]:a},{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dnsSuffix}",properties:m,headers:m},[n]:a}],[n]:h},{error:"FIPS is enabled but this partition does not support FIPS",[n]:D}],[n]:h},{conditions:Z,rules:[{conditions:[J],rules:[{endpoint:{url:"https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:m,headers:m},[n]:a}],[n]:h},{error:"DualStack is enabled but this partition does not support DualStack",[n]:D}],[n]:h},B,{endpoint:{url:q,properties:m,headers:m},[n]:a}],[n]:h}],[n]:h},{error:"Invalid Configuration: Missing Region",[n]:D}]},_t=bt,Tt=new We({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS","UseGlobalEndpoint"]}),kt=(e,t={})=>Tt.get(e,()=>$e(_t,{endpointParams:e,logger:t.logger}));Ue.aws=ye;const wt=e=>({apiVersion:"2011-06-15",base64Decoder:e?.base64Decoder??gt,base64Encoder:e?.base64Encoder??mt,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??kt,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??At,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:t=>t.getIdentityProvider("aws.auth#sigv4"),signer:new ve},{schemeId:"smithy.api#noAuth",identityProvider:t=>t.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new Oe}],logger:e?.logger??new Fe,protocol:e?.protocol??Ae,protocolSettings:e?.protocolSettings??{defaultNamespace:"com.amazonaws.sts",xmlNamespace:"https://sts.amazonaws.com/doc/2011-06-15/",version:"2011-06-15",serviceTarget:"AWSSecurityTokenServiceV20110615"},serviceId:e?.serviceId??"STS",urlParser:e?.urlParser??He,utf8Decoder:e?.utf8Decoder??pt,utf8Encoder:e?.utf8Encoder??ut}),Wt=e=>{const t=Le(e),i=()=>t().then(Ve),d=wt(e);return{...d,...e,runtime:"browser",defaultsMode:t,bodyLengthChecker:e?.bodyLengthChecker??qe,credentialDefaultProvider:e?.credentialDefaultProvider??(r=>()=>Promise.reject(new Error("Credential is missing"))),defaultUserAgentProvider:e?.defaultUserAgentProvider??Ie({serviceId:d.serviceId,clientVersion:Dt.version}),maxAttempts:e?.maxAttempts??Ke,region:e?.region??Ne("Region is missing"),requestHandler:ft.create(e?.requestHandler??i),retryMode:e?.retryMode??(async()=>(await i()).retryMode||Me),sha256:e?.sha256??je,streamCollector:e?.streamCollector??ht,useDualstackEndpoint:e?.useDualstackEndpoint??(()=>Promise.resolve(Ge)),useFipsEndpoint:e?.useFipsEndpoint??(()=>Promise.resolve(ze))}},$t=e=>{const t=e.httpAuthSchemes;let i=e.httpAuthSchemeProvider,d=e.credentials;return{setHttpAuthScheme(r){const S=t.findIndex(g=>g.schemeId===r.schemeId);S===-1?t.push(r):t.splice(S,1,r)},httpAuthSchemes(){return t},setHttpAuthSchemeProvider(r){i=r},httpAuthSchemeProvider(){return i},setCredentials(r){d=r},credentials(){return d}}},Ut=e=>({httpAuthSchemes:e.httpAuthSchemes(),httpAuthSchemeProvider:e.httpAuthSchemeProvider(),credentials:e.credentials()}),Ht=(e,t)=>{const i=Object.assign(Re(e),Be(e),Qe(e),$t(e));return t.forEach(d=>d.configure(i)),Object.assign(e,Ce(i),Je(i),Xe(i),Ut(i))};class ue extends Ye{config;constructor(...[t]){const i=Wt(t||{});super(i),this.initConfig=i;const d=Rt(i),r=xe(d),S=Ze(r),g=et(S),A=De(g),_=tt(A),T=It(_),k=Ht(T,t?.extensions||[]);this.config=k,this.middlewareStack.use(nt(this.config)),this.middlewareStack.use(be(this.config)),this.middlewareStack.use(ot(this.config)),this.middlewareStack.use(st(this.config)),this.middlewareStack.use(_e(this.config)),this.middlewareStack.use(Te(this.config)),this.middlewareStack.use(ke(this.config)),this.middlewareStack.use(it(this.config,{httpAuthSchemeParametersProvider:Et,identityProviderConfigProvider:async b=>new rt({"aws.auth#sigv4":b.credentials})})),this.middlewareStack.use(at(this.config))}destroy(){super.destroy()}}class f extends ct{constructor(t){super(t),Object.setPrototypeOf(this,f.prototype)}}class U extends f{name="ExpiredTokenException";$fault="client";constructor(t){super({name:"ExpiredTokenException",$fault:"client",...t}),Object.setPrototypeOf(this,U.prototype)}}class H extends f{name="MalformedPolicyDocumentException";$fault="client";constructor(t){super({name:"MalformedPolicyDocumentException",$fault:"client",...t}),Object.setPrototypeOf(this,H.prototype)}}class F extends f{name="PackedPolicyTooLargeException";$fault="client";constructor(t){super({name:"PackedPolicyTooLargeException",$fault:"client",...t}),Object.setPrototypeOf(this,F.prototype)}}class O extends f{name="RegionDisabledException";$fault="client";constructor(t){super({name:"RegionDisabledException",$fault:"client",...t}),Object.setPrototypeOf(this,O.prototype)}}class L extends f{name="IDPRejectedClaimException";$fault="client";constructor(t){super({name:"IDPRejectedClaimException",$fault:"client",...t}),Object.setPrototypeOf(this,L.prototype)}}class j extends f{name="InvalidIdentityTokenException";$fault="client";constructor(t){super({name:"InvalidIdentityTokenException",$fault:"client",...t}),Object.setPrototypeOf(this,j.prototype)}}class M extends f{name="IDPCommunicationErrorException";$fault="client";constructor(t){super({name:"IDPCommunicationErrorException",$fault:"client",...t}),Object.setPrototypeOf(this,M.prototype)}}const Ft="Arn",Ot="AccessKeyId",Lt="AssumedRoleId",pe="AssumedRoleUser",jt="AssumeRoleWithWebIdentity",Mt="AssumeRoleWithWebIdentityRequest",Nt="AssumeRoleWithWebIdentityResponse",Kt="Audience",me="Credentials",qt="DurationSeconds",zt="Expiration",Gt="ExpiredTokenException",Vt="IDPCommunicationErrorException",Bt="IDPRejectedClaimException",Qt="InvalidIdentityTokenException",Jt="MalformedPolicyDocumentException",Xt="Policy",Yt="PolicyArns",Zt="PolicyDescriptorType",en="ProviderId",tn="PackedPolicySize",nn="PackedPolicyTooLargeException",on="Provider",sn="RoleArn",rn="RegionDisabledException",an="RoleSessionName",cn="SecretAccessKey",dn="SubjectFromWebIdentityToken",ln="SourceIdentity",un="SessionToken",pn="WebIdentityToken",mn="arn",gn="accessKeySecretType",v="awsQueryError",I="client",hn="clientTokenType",R="error",C="httpError",x="message",fn="policyDescriptorListType",ge="smithy.ts.sdk.synthetic.com.amazonaws.sts",c="com.amazonaws.sts";var Sn=[0,c,gn,8,0],En=[0,c,hn,8,0],Pn=[3,c,pe,0,[Lt,Ft],[0,0],2],yn=[3,c,Mt,0,[sn,an,pn,en,Yt,Xt,qt],[0,0,[()=>En,0],0,()=>wn,0,1],3],An=[3,c,Nt,0,[me,dn,pe,tn,on,Kt,ln],[[()=>vn,0],0,()=>Pn,1,0,0,0]],vn=[3,c,me,0,[Ot,cn,un,zt],[0,[()=>Sn,0],0,4],4],In=[-3,c,Gt,{[v]:["ExpiredTokenException",400],[R]:I,[C]:400},[x],[0]];P.for(c).registerError(In,U);var Rn=[-3,c,Vt,{[v]:["IDPCommunicationError",400],[R]:I,[C]:400},[x],[0]];P.for(c).registerError(Rn,M);var Cn=[-3,c,Bt,{[v]:["IDPRejectedClaim",403],[R]:I,[C]:403},[x],[0]];P.for(c).registerError(Cn,L);var xn=[-3,c,Qt,{[v]:["InvalidIdentityToken",400],[R]:I,[C]:400},[x],[0]];P.for(c).registerError(xn,j);var Dn=[-3,c,Jt,{[v]:["MalformedPolicyDocument",400],[R]:I,[C]:400},[x],[0]];P.for(c).registerError(Dn,H);var bn=[-3,c,nn,{[v]:["PackedPolicyTooLarge",400],[R]:I,[C]:400},[x],[0]];P.for(c).registerError(bn,F);var _n=[3,c,Zt,0,[mn],[0]],Tn=[-3,c,rn,{[v]:["RegionDisabledException",403],[R]:I,[C]:403},[x],[0]];P.for(c).registerError(Tn,O);var kn=[-3,ge,"STSServiceException",0,[],[]];P.for(ge).registerError(kn,f);var wn=[1,c,fn,0,()=>_n],Wn=[9,c,jt,0,()=>yn,()=>An];class $n extends dt.classBuilder().ep(Ct).m(function(t,i,d,r){return[lt(d,t.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRoleWithWebIdentity",{}).n("STSClient","AssumeRoleWithWebIdentityCommand").sc(Wn).build(){}const Un=e=>{if(typeof e?.Arn=="string"){const t=e.Arn.split(":");if(t.length>4&&t[4]!=="")return t[4]}},Hn=async(e,t,i,d={})=>{const r=typeof e=="function"?await e():e,S=typeof t=="function"?await t():t;let g="";const A=r??S??(g=await St()());return i?.debug?.("@aws-sdk/client-sts::resolveRegion","accepting first of:",`${r} (credential provider clientConfig)`,`${S} (contextual client)`,`${g} (STS default: AWS_REGION, profile region, or us-east-1)`),A},Fn=(e,t)=>{let i;return async d=>{if(!i){const{logger:_=e?.parentClientConfig?.logger,profile:T=e?.parentClientConfig?.profile,region:k,requestHandler:b=e?.parentClientConfig?.requestHandler,credentialProviderLogger:he,userAgentAppId:fe=e?.parentClientConfig?.userAgentAppId}=e,Se=await Hn(k,e?.parentClientConfig?.region,he,{}),Ee=!On(b);i=new t({...e,userAgentAppId:fe,profile:T,region:Se,requestHandler:Ee?b:void 0,logger:_})}const{Credentials:r,AssumedRoleUser:S}=await i.send(new $n(d));if(!r||!r.AccessKeyId||!r.SecretAccessKey)throw new Error(`Invalid response from STS.assumeRoleWithWebIdentity call with role ${d.RoleArn}`);const g=Un(S),A={accessKeyId:r.AccessKeyId,secretAccessKey:r.SecretAccessKey,sessionToken:r.SessionToken,expiration:r.Expiration,...r.CredentialScope&&{credentialScope:r.CredentialScope},...g&&{accountId:g}};return g&&N(A,"RESOLVED_ACCOUNT_ID","T"),N(A,"CREDENTIALS_STS_ASSUME_ROLE_WEB_ID","k"),A}},On=e=>e?.metadata?.handlerProtocol==="h2",Ln=(e,t)=>t?class extends e{constructor(d){super(d);for(const r of t)this.middlewareStack.use(r)}}:e,io=(e={},t)=>Fn(e,Ln(ue,t));export{dt as $Command,Wn as AssumeRoleWithWebIdentity$,$n as AssumeRoleWithWebIdentityCommand,yn as AssumeRoleWithWebIdentityRequest$,An as AssumeRoleWithWebIdentityResponse$,Pn as AssumedRoleUser$,vn as Credentials$,U as ExpiredTokenException,In as ExpiredTokenException$,M as IDPCommunicationErrorException,Rn as IDPCommunicationErrorException$,L as IDPRejectedClaimException,Cn as IDPRejectedClaimException$,j as InvalidIdentityTokenException,xn as InvalidIdentityTokenException$,H as MalformedPolicyDocumentException,Dn as MalformedPolicyDocumentException$,F as PackedPolicyTooLargeException,bn as PackedPolicyTooLargeException$,_n as PolicyDescriptorType$,O as RegionDisabledException,Tn as RegionDisabledException$,ue as STSClient,f as STSServiceException,kn as STSServiceException$,Ye as __Client,io as getDefaultRoleAssumerWithWebIdentity};
|
|
1
|
+
import{r as Pe,a as ye,A as Ae,b as ve,c as Ie,g as Re,d as Ce,e as xe,k as De,f as be,h as _e,i as Te,j as ke,s as N}from"./index-0JmHOPsf.js";import{n as ee,k as we,E as We,r as $e,c as Ue,p as He,l as Fe,o as Oe,q as Le,s as je,D as Me,t as Ne,u as Ke,w as qe,x as ze,y as Ge,z as Ve,A as Be,B as Qe,C as Je,F as Xe,G as Ye,H as Ze,I as et,J as tt,K as nt,M as ot,O as st,P as it,U as rt,Q as at,V as ct,T as P,W as dt,X as lt}from"./resolveDefaultsModeConfig-tQhK1DqL.js";import{b as ut,i as pt,t as mt,f as gt,s as ht,F as ft}from"./normalizeProvider-CtDY37Q6.js";import"./preload-helper-BlTxHScW.js";import"./index-V-xWzSNb.js";import"./_commonjsHelpers-D6-XlEtG.js";import"./index-ChvoNxcO.js";import"./__vite-browser-external-DLjrMatA.js";import"./inherits_browser-nmOknR35-Bp0mvRSL.js";import"./index-6mKfgpcs-DsgiI2lM.js";import"./_commonjsHelpers-B4e78b8K-W3E8ocG7.js";import"./index-DsIu-45t-Bejjlpz4.js";import"./index-DSosZ5sh-Ceejs_jv.js";import"./index-69shuAsh-DF18H7zf.js";import"./index-BJBOx-Z---hbiLl7B.js";import"./index.browser-BHPvGrwi-6Mh8eUw-.js";import"./_commonjs-dynamic-modules-BpilXLfW-DfYEAvWy.js";import"./_commonjs-dynamic-modules-DkOKMH7F.js";function St(){return async()=>"us-east-1"}const Et=async(e,t,i)=>({operation:we(t).operation,region:await ee(e.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()});function Pt(e){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"sts",region:e.region},propertiesExtractor:(t,i)=>({signingProperties:{config:t,context:i}})}}function yt(e){return{schemeId:"smithy.api#noAuth"}}const At=e=>{const t=[];switch(e.operation){case"AssumeRoleWithWebIdentity":{t.push(yt());break}default:t.push(Pt(e))}return t},vt=e=>Object.assign(e,{stsClientCtor:ue}),It=e=>{const t=vt(e),i=Pe(t);return Object.assign(i,{authSchemePreference:ee(e.authSchemePreference??[])})},Rt=e=>Object.assign(e,{useDualstackEndpoint:e.useDualstackEndpoint??!1,useFipsEndpoint:e.useFipsEndpoint??!1,useGlobalEndpoint:e.useGlobalEndpoint??!1,defaultSigningName:"sts"}),Ct={UseGlobalEndpoint:{type:"builtInParams",name:"useGlobalEndpoint"},UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}},xt="3.974.0",Dt={version:xt},te="required",n="type",o="fn",s="argv",y="ref",K=!1,w=!0,E="booleanEquals",l="stringEquals",ne="sigv4",oe="sts",se="us-east-1",a="endpoint",q="https://sts.{Region}.{PartitionResult#dnsSuffix}",h="tree",D="error",$="getAttr",z={[te]:!1,[n]:"string"},W={[te]:!0,default:!1,[n]:"boolean"},ie={[y]:"Endpoint"},G={[o]:"isSet",[s]:[{[y]:"Region"}]},u={[y]:"Region"},V={[o]:"aws.partition",[s]:[u],assign:"PartitionResult"},re={[y]:"UseFIPS"},ae={[y]:"UseDualStack"},p={url:"https://sts.amazonaws.com",properties:{authSchemes:[{name:ne,signingName:oe,signingRegion:se}]},headers:{}},m={},B={conditions:[{[o]:l,[s]:[u,"aws-global"]}],[a]:p,[n]:a},ce={[o]:E,[s]:[re,!0]},de={[o]:E,[s]:[ae,!0]},Q={[o]:$,[s]:[{[y]:"PartitionResult"},"supportsFIPS"]},le={[y]:"PartitionResult"},J={[o]:E,[s]:[!0,{[o]:$,[s]:[le,"supportsDualStack"]}]},X=[{[o]:"isSet",[s]:[ie]}],Y=[ce],Z=[de],bt={parameters:{Region:z,UseDualStack:W,UseFIPS:W,Endpoint:z,UseGlobalEndpoint:W},rules:[{conditions:[{[o]:E,[s]:[{[y]:"UseGlobalEndpoint"},w]},{[o]:"not",[s]:X},G,V,{[o]:E,[s]:[re,K]},{[o]:E,[s]:[ae,K]}],rules:[{conditions:[{[o]:l,[s]:[u,"ap-northeast-1"]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,"ap-south-1"]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,"ap-southeast-1"]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,"ap-southeast-2"]}],endpoint:p,[n]:a},B,{conditions:[{[o]:l,[s]:[u,"ca-central-1"]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,"eu-central-1"]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,"eu-north-1"]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,"eu-west-1"]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,"eu-west-2"]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,"eu-west-3"]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,"sa-east-1"]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,se]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,"us-east-2"]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,"us-west-1"]}],endpoint:p,[n]:a},{conditions:[{[o]:l,[s]:[u,"us-west-2"]}],endpoint:p,[n]:a},{endpoint:{url:q,properties:{authSchemes:[{name:ne,signingName:oe,signingRegion:"{Region}"}]},headers:m},[n]:a}],[n]:h},{conditions:X,rules:[{conditions:Y,error:"Invalid Configuration: FIPS and custom endpoint are not supported",[n]:D},{conditions:Z,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",[n]:D},{endpoint:{url:ie,properties:m,headers:m},[n]:a}],[n]:h},{conditions:[G],rules:[{conditions:[V],rules:[{conditions:[ce,de],rules:[{conditions:[{[o]:E,[s]:[w,Q]},J],rules:[{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:m,headers:m},[n]:a}],[n]:h},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",[n]:D}],[n]:h},{conditions:Y,rules:[{conditions:[{[o]:E,[s]:[Q,w]}],rules:[{conditions:[{[o]:l,[s]:[{[o]:$,[s]:[le,"name"]},"aws-us-gov"]}],endpoint:{url:"https://sts.{Region}.amazonaws.com",properties:m,headers:m},[n]:a},{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dnsSuffix}",properties:m,headers:m},[n]:a}],[n]:h},{error:"FIPS is enabled but this partition does not support FIPS",[n]:D}],[n]:h},{conditions:Z,rules:[{conditions:[J],rules:[{endpoint:{url:"https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:m,headers:m},[n]:a}],[n]:h},{error:"DualStack is enabled but this partition does not support DualStack",[n]:D}],[n]:h},B,{endpoint:{url:q,properties:m,headers:m},[n]:a}],[n]:h}],[n]:h},{error:"Invalid Configuration: Missing Region",[n]:D}]},_t=bt,Tt=new We({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS","UseGlobalEndpoint"]}),kt=(e,t={})=>Tt.get(e,()=>$e(_t,{endpointParams:e,logger:t.logger}));Ue.aws=ye;const wt=e=>({apiVersion:"2011-06-15",base64Decoder:e?.base64Decoder??gt,base64Encoder:e?.base64Encoder??mt,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??kt,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??At,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:t=>t.getIdentityProvider("aws.auth#sigv4"),signer:new ve},{schemeId:"smithy.api#noAuth",identityProvider:t=>t.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new Oe}],logger:e?.logger??new Fe,protocol:e?.protocol??Ae,protocolSettings:e?.protocolSettings??{defaultNamespace:"com.amazonaws.sts",xmlNamespace:"https://sts.amazonaws.com/doc/2011-06-15/",version:"2011-06-15",serviceTarget:"AWSSecurityTokenServiceV20110615"},serviceId:e?.serviceId??"STS",urlParser:e?.urlParser??He,utf8Decoder:e?.utf8Decoder??pt,utf8Encoder:e?.utf8Encoder??ut}),Wt=e=>{const t=Le(e),i=()=>t().then(Ve),d=wt(e);return{...d,...e,runtime:"browser",defaultsMode:t,bodyLengthChecker:e?.bodyLengthChecker??qe,credentialDefaultProvider:e?.credentialDefaultProvider??(r=>()=>Promise.reject(new Error("Credential is missing"))),defaultUserAgentProvider:e?.defaultUserAgentProvider??Ie({serviceId:d.serviceId,clientVersion:Dt.version}),maxAttempts:e?.maxAttempts??Ke,region:e?.region??Ne("Region is missing"),requestHandler:ft.create(e?.requestHandler??i),retryMode:e?.retryMode??(async()=>(await i()).retryMode||Me),sha256:e?.sha256??je,streamCollector:e?.streamCollector??ht,useDualstackEndpoint:e?.useDualstackEndpoint??(()=>Promise.resolve(Ge)),useFipsEndpoint:e?.useFipsEndpoint??(()=>Promise.resolve(ze))}},$t=e=>{const t=e.httpAuthSchemes;let i=e.httpAuthSchemeProvider,d=e.credentials;return{setHttpAuthScheme(r){const S=t.findIndex(g=>g.schemeId===r.schemeId);S===-1?t.push(r):t.splice(S,1,r)},httpAuthSchemes(){return t},setHttpAuthSchemeProvider(r){i=r},httpAuthSchemeProvider(){return i},setCredentials(r){d=r},credentials(){return d}}},Ut=e=>({httpAuthSchemes:e.httpAuthSchemes(),httpAuthSchemeProvider:e.httpAuthSchemeProvider(),credentials:e.credentials()}),Ht=(e,t)=>{const i=Object.assign(Re(e),Be(e),Qe(e),$t(e));return t.forEach(d=>d.configure(i)),Object.assign(e,Ce(i),Je(i),Xe(i),Ut(i))};class ue extends Ye{config;constructor(...[t]){const i=Wt(t||{});super(i),this.initConfig=i;const d=Rt(i),r=xe(d),S=Ze(r),g=et(S),A=De(g),_=tt(A),T=It(_),k=Ht(T,t?.extensions||[]);this.config=k,this.middlewareStack.use(nt(this.config)),this.middlewareStack.use(be(this.config)),this.middlewareStack.use(ot(this.config)),this.middlewareStack.use(st(this.config)),this.middlewareStack.use(_e(this.config)),this.middlewareStack.use(Te(this.config)),this.middlewareStack.use(ke(this.config)),this.middlewareStack.use(it(this.config,{httpAuthSchemeParametersProvider:Et,identityProviderConfigProvider:async b=>new rt({"aws.auth#sigv4":b.credentials})})),this.middlewareStack.use(at(this.config))}destroy(){super.destroy()}}class f extends ct{constructor(t){super(t),Object.setPrototypeOf(this,f.prototype)}}class U extends f{name="ExpiredTokenException";$fault="client";constructor(t){super({name:"ExpiredTokenException",$fault:"client",...t}),Object.setPrototypeOf(this,U.prototype)}}class H extends f{name="MalformedPolicyDocumentException";$fault="client";constructor(t){super({name:"MalformedPolicyDocumentException",$fault:"client",...t}),Object.setPrototypeOf(this,H.prototype)}}class F extends f{name="PackedPolicyTooLargeException";$fault="client";constructor(t){super({name:"PackedPolicyTooLargeException",$fault:"client",...t}),Object.setPrototypeOf(this,F.prototype)}}class O extends f{name="RegionDisabledException";$fault="client";constructor(t){super({name:"RegionDisabledException",$fault:"client",...t}),Object.setPrototypeOf(this,O.prototype)}}class L extends f{name="IDPRejectedClaimException";$fault="client";constructor(t){super({name:"IDPRejectedClaimException",$fault:"client",...t}),Object.setPrototypeOf(this,L.prototype)}}class j extends f{name="InvalidIdentityTokenException";$fault="client";constructor(t){super({name:"InvalidIdentityTokenException",$fault:"client",...t}),Object.setPrototypeOf(this,j.prototype)}}class M extends f{name="IDPCommunicationErrorException";$fault="client";constructor(t){super({name:"IDPCommunicationErrorException",$fault:"client",...t}),Object.setPrototypeOf(this,M.prototype)}}const Ft="Arn",Ot="AccessKeyId",Lt="AssumedRoleId",pe="AssumedRoleUser",jt="AssumeRoleWithWebIdentity",Mt="AssumeRoleWithWebIdentityRequest",Nt="AssumeRoleWithWebIdentityResponse",Kt="Audience",me="Credentials",qt="DurationSeconds",zt="Expiration",Gt="ExpiredTokenException",Vt="IDPCommunicationErrorException",Bt="IDPRejectedClaimException",Qt="InvalidIdentityTokenException",Jt="MalformedPolicyDocumentException",Xt="Policy",Yt="PolicyArns",Zt="PolicyDescriptorType",en="ProviderId",tn="PackedPolicySize",nn="PackedPolicyTooLargeException",on="Provider",sn="RoleArn",rn="RegionDisabledException",an="RoleSessionName",cn="SecretAccessKey",dn="SubjectFromWebIdentityToken",ln="SourceIdentity",un="SessionToken",pn="WebIdentityToken",mn="arn",gn="accessKeySecretType",v="awsQueryError",I="client",hn="clientTokenType",R="error",C="httpError",x="message",fn="policyDescriptorListType",ge="smithy.ts.sdk.synthetic.com.amazonaws.sts",c="com.amazonaws.sts";var Sn=[0,c,gn,8,0],En=[0,c,hn,8,0],Pn=[3,c,pe,0,[Lt,Ft],[0,0],2],yn=[3,c,Mt,0,[sn,an,pn,en,Yt,Xt,qt],[0,0,[()=>En,0],0,()=>wn,0,1],3],An=[3,c,Nt,0,[me,dn,pe,tn,on,Kt,ln],[[()=>vn,0],0,()=>Pn,1,0,0,0]],vn=[3,c,me,0,[Ot,cn,un,zt],[0,[()=>Sn,0],0,4],4],In=[-3,c,Gt,{[v]:["ExpiredTokenException",400],[R]:I,[C]:400},[x],[0]];P.for(c).registerError(In,U);var Rn=[-3,c,Vt,{[v]:["IDPCommunicationError",400],[R]:I,[C]:400},[x],[0]];P.for(c).registerError(Rn,M);var Cn=[-3,c,Bt,{[v]:["IDPRejectedClaim",403],[R]:I,[C]:403},[x],[0]];P.for(c).registerError(Cn,L);var xn=[-3,c,Qt,{[v]:["InvalidIdentityToken",400],[R]:I,[C]:400},[x],[0]];P.for(c).registerError(xn,j);var Dn=[-3,c,Jt,{[v]:["MalformedPolicyDocument",400],[R]:I,[C]:400},[x],[0]];P.for(c).registerError(Dn,H);var bn=[-3,c,nn,{[v]:["PackedPolicyTooLarge",400],[R]:I,[C]:400},[x],[0]];P.for(c).registerError(bn,F);var _n=[3,c,Zt,0,[mn],[0]],Tn=[-3,c,rn,{[v]:["RegionDisabledException",403],[R]:I,[C]:403},[x],[0]];P.for(c).registerError(Tn,O);var kn=[-3,ge,"STSServiceException",0,[],[]];P.for(ge).registerError(kn,f);var wn=[1,c,fn,0,()=>_n],Wn=[9,c,jt,0,()=>yn,()=>An];class $n extends dt.classBuilder().ep(Ct).m(function(t,i,d,r){return[lt(d,t.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRoleWithWebIdentity",{}).n("STSClient","AssumeRoleWithWebIdentityCommand").sc(Wn).build(){}const Un=e=>{if(typeof e?.Arn=="string"){const t=e.Arn.split(":");if(t.length>4&&t[4]!=="")return t[4]}},Hn=async(e,t,i,d={})=>{const r=typeof e=="function"?await e():e,S=typeof t=="function"?await t():t;let g="";const A=r??S??(g=await St()());return i?.debug?.("@aws-sdk/client-sts::resolveRegion","accepting first of:",`${r} (credential provider clientConfig)`,`${S} (contextual client)`,`${g} (STS default: AWS_REGION, profile region, or us-east-1)`),A},Fn=(e,t)=>{let i;return async d=>{if(!i){const{logger:_=e?.parentClientConfig?.logger,profile:T=e?.parentClientConfig?.profile,region:k,requestHandler:b=e?.parentClientConfig?.requestHandler,credentialProviderLogger:he,userAgentAppId:fe=e?.parentClientConfig?.userAgentAppId}=e,Se=await Hn(k,e?.parentClientConfig?.region,he,{}),Ee=!On(b);i=new t({...e,userAgentAppId:fe,profile:T,region:Se,requestHandler:Ee?b:void 0,logger:_})}const{Credentials:r,AssumedRoleUser:S}=await i.send(new $n(d));if(!r||!r.AccessKeyId||!r.SecretAccessKey)throw new Error(`Invalid response from STS.assumeRoleWithWebIdentity call with role ${d.RoleArn}`);const g=Un(S),A={accessKeyId:r.AccessKeyId,secretAccessKey:r.SecretAccessKey,sessionToken:r.SessionToken,expiration:r.Expiration,...r.CredentialScope&&{credentialScope:r.CredentialScope},...g&&{accountId:g}};return g&&N(A,"RESOLVED_ACCOUNT_ID","T"),N(A,"CREDENTIALS_STS_ASSUME_ROLE_WEB_ID","k"),A}},On=e=>e?.metadata?.handlerProtocol==="h2",Ln=(e,t)=>t?class extends e{constructor(d){super(d);for(const r of t)this.middlewareStack.use(r)}}:e,io=(e={},t)=>Fn(e,Ln(ue,t));export{dt as $Command,Wn as AssumeRoleWithWebIdentity$,$n as AssumeRoleWithWebIdentityCommand,yn as AssumeRoleWithWebIdentityRequest$,An as AssumeRoleWithWebIdentityResponse$,Pn as AssumedRoleUser$,vn as Credentials$,U as ExpiredTokenException,In as ExpiredTokenException$,M as IDPCommunicationErrorException,Rn as IDPCommunicationErrorException$,L as IDPRejectedClaimException,Cn as IDPRejectedClaimException$,j as InvalidIdentityTokenException,xn as InvalidIdentityTokenException$,H as MalformedPolicyDocumentException,Dn as MalformedPolicyDocumentException$,F as PackedPolicyTooLargeException,bn as PackedPolicyTooLargeException$,_n as PolicyDescriptorType$,O as RegionDisabledException,Tn as RegionDisabledException$,ue as STSClient,f as STSServiceException,kn as STSServiceException$,Ye as __Client,io as getDefaultRoleAssumerWithWebIdentity};
|